Biometrics Acquisition in a Hungarian University: The Óbuda University Case - Bánki Donát Faculty
Keywords:
Biometrics, Biometric devices, palm vein, security systemAbstract
Nowadays, due to the expansion of Internet Communication Technology (ICT), people are becoming interconnected via internet environment. Establishing the identity of an individual is highly essential in our network society. The requirement of a reliable user authentication technique is the main concern about networking security, communication and mobility. Biometric technology is a method that is able to recognize a person based on his/her physical or behavioral traits faster and more convenient than the traditional ways such as password and ID cards. This article describes the biometric data acquisition process at an educational institution using a hand vein recognition device in order to authenticate students, workers and professors. Furthermore, it describes the procedure, the device used and some results achieved since the system was implemented.
References
[2] M. W. David Zhang, Guang-Ming Lu, Adams Wai-Kin Kong, “Online Palmprint Indentification system for civil applications,” Comput. Sci. Technol., vol. 20, no. 1, pp. 70–76.
[3] “Vascular network in hand.” .
[4] I. Biometrics, No Title. .
[5] S. Crisan, “Biometric Security and Privacy,” pp. 21–50, 2017.
[6] a. Nadort, “The hand vein pattern used as a biometric feature,” Master Lit. Thesis, no. May, p. 162, 2007.
[7] M. Watanabe, “Palm vein authentication,” Advances in Biometrics: Sensors, Algorithms and Systems, 2008. .
[8] K. Yang, E. Y. Du, and Z. Zhou, “Consent biometrics,” Neurocomputing, vol. 100, pp. 153–162, 2013.
[9] “Vascular Pattern Recognition,” 2012. .
[10] S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric recognition: security and privacy concerns,” IEEE Secur. Priv. Mag., vol. 1, no. 2, pp. 33–42, 2003.
[11] H. P. D. Nguyen, “Fingerprint Device ( Suprema ) Is Safe or Not ?,” Hadmérnök, vol. 4, pp. 10–18, 2016.
[12] M. G. K. Ong, C. Tee, and A. T. B. Jin, “Touch-less palm print biometric system,” Visapp 2008 Proc. Third Int. Conf. Comput. Vis. Theory Appl. Vol 2, pp. 423–430, 2008.
[13] Growth Business Co, “Biometrics in Business,” Growth Business UK, 2005. [Online]. Available: http://www.growthbusiness.co.uk/biometrics-in-business-18454/.
[14] J. Malik, D. Girdhar, R. Dahiya, and G. Sainarayanan, “Reference Threshold Calculation for Biometric Authentication,” Int. J. Image, Graph. Signal Process., vol. 6, no. January, pp. 46–53, 2014.
[15] “Technavio, “Biometrics Market in the United States in Education Sector 2015-2019.”
[16] “I. Inc, “Biometrics in Education- A Growing Demand.” .
[17] “Palm system architecture.” .
Downloads
Published
Issue
Section
License
Bánki Közlemények is loyal to open access for academic work. All the original articles and review papers published in this journal are free to access immediately from the date of publication. We don’t charge any fees for any reader to download articles and reviews for their own scholarly use.
The Bánki Közlemények also operates under the Creative Commons Licence CC-BY-NC-ND. This allows for the reproduction of articles, free of charge, for non-commercial use only and with the appropriate citation information. All authors publishing with the Bánki Közlemények accept these as the terms of publication.