A single-sensor hand geometry and palmprint verification system
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
A survey of biometric technology based on hand shape
Pattern Recognition
Robust palmprint verification using 2D and 3D features
Pattern Recognition
It's No Secret. Measuring the Security and Reliability of Authentication via "Secret Questions
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Personal verification using palmprint and hand geometry biometric
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Comparison of distance-based features for hand geometry authentication
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
WYSIWYF: exploring and annotating volume data with a tangible handheld device
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Contactless palmprint and knuckle biometrics for mobile devices
Pattern Analysis & Applications
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Embedded palmprint recognition system on mobile devices
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.00 |
We propose a biometric authentication scheme suitable for multi-touch devices such as tablet computers. Our scheme is based on hand geometry. It improves on prior work by introducing a dynamic element, where movement challenges are issued based on static hand geometry data. Specifically, we demonstrate a set of multi-touch interactions that can capture hand geometry information of users. For each of the interactions, we extract different but complimentary hand geometric information from the user. Our approach has several advantages over traditional text password and other biometric authentications. First, unlike other recognition based authentication schemes, a user is only expected to interact with the multi-touch surface according to the challenges she is posed. In other words, she does not have to memorize any type of credential. In addition, the system provides security against replay attacks--which is a drawback associated with many authentication schemes, such as traditional biometric system based on recognition of face, iris or fingerprint. Last but not least, our approach works on current tablet computers without any needs for updates of hardware, firmware or drivers -- it can be carried out by an application. We demonstrate experimentally a configuration using 14 consecutive challenges on iPad2 tablet (taking approximately 3.32 minutes for novice users to respond to), wherein the user is authenticated with almost 97% accuracy.