Abstract
Nowadays, new security and protection systems for citizens are being developed, since criminals have found techniques to violate those already known, such as those based on fingerprints, facial recognition, iris and voice. Thus, using biometric data, new systems are being developed that are more secure, infallible and fast to identify each person, making it impossible to impersonate them, as has happened with other methods. Recently new identification methods have been proposed based on hand geometry and palmprint based on texture techniques for the identification of hand characteristics such as ridges, edges, points, and textures. Following this trend, this paper presents a method based on the detection of the palm print, acquired by contact, through the use of a scanner. For this purpose, the image is segmented to detect the silhouette of the hand and delimit the working area, achieving greater speed in identification. The images are then used as input to a convolutional neural network VGG 16 for learning and identification of subjects, achieving 100% accuracy.
Original language | English |
---|---|
Title of host publication | Applications of Digital Image Processing XLIII |
Editors | Andrew G. Tescher, Touradj Ebrahimi |
Publisher | SPIE |
ISBN (Electronic) | 9781510638266 |
DOIs | |
State | Published - 2020 |
Externally published | Yes |
Event | Applications of Digital Image Processing XLIII 2020 - Virtual, Online, United States Duration: 24 Aug 2020 → 4 Sep 2020 |
Publication series
Name | Proceedings of SPIE - The International Society for Optical Engineering |
---|---|
Volume | 11510 |
ISSN (Print) | 0277-786X |
ISSN (Electronic) | 1996-756X |
Conference
Conference | Applications of Digital Image Processing XLIII 2020 |
---|---|
Country/Territory | United States |
City | Virtual, Online |
Period | 24/08/20 → 4/09/20 |
Bibliographical note
Publisher Copyright:© 2020 SPIE
Keywords
- Biometry
- Convolutional neural networks
- Fingerprints
- Impersonation
- Iris prints
- Palmprint
- Protection methods
- Security methods