The use of hand's geometry is the most popular method employed for access control particularly in the USA. In France this technique is not used very often. It requires a special tray, having guides to position fingers, which is rather cumbersome. However biometrics by the shape of the hand is a popular technology which is largely employed for physical access control or time pointing. It is a very simple and cheap system. The element used for the identification is only hand geometry and not the palmar print. The reader of the contour of the hand offers a very reasonable level of exactitude, but can have high rates of false acceptances for twins or other members of the same family.
[...] How does it work? To use the hand's geometry, the user places his hand on a tray with guides to position fingers. This technology does not carry out any reading of prints, it measures only the thickness of fingers using mirrors. These measures of the hand are in three dimensions. The biometrics of the pattern recognition of the hand measures 90 characteristics on the following parameters: The thickness The length The Surface The width The position of the articulations The venous network for most advanced systems In general, an infra-red camera takes the image of the hand under two different angles to obtain the three dimensional image. [...]
[...] Biometrics sytems Contents I. Hand's Geometry 2 Introduction 2 How does it work? 3 Advantages and disadvantages 3 Use cases: 4 II. Face recognition 4 Introduction 4 How does it work? 4 Image capture of the face: 4 Samples' Treatment: 5 Advantages and disadvantages 6 Use Cases 6 III. Voice Identification 6 Introduction 6 Capture and treatment of the voice 7 Criteria of evaluation of an identifier 7 Conclusion on voice recognition 8 IV. FINGERPRINTS 8 What is a fingerprint? [...]
[...] An important surgery of the cartilage of the face could mislead the system. Use Cases Nowadays, this technology is implemented: In several casinos in the United States and in France for the identification of the prohibited players In airports for the identifications of undesirable people In stadiums for the repression of known and dangerous hooligans In shopping malls to locate the entry of small known robbers Voice Identification Introduction Voice identification is regarded by the users as one of the most normal forms of biometric technology, because it is not intrusive and does not require any physical contact with the reader of the system. [...]
[...] A macro is essential. Constraints on lighting are often solve by using the sensor close to the eye. In fact, the number of problems increases proportionally with the distance between Eye and camera. Numeric Treatment The method employed for the iris characterization (for the moment) is patented by John Daugman. After the eye digitalization, the software will determine the center of the pupil and the iris location. The software cuts out bands of regular size and generates a stencil (IrisCode®) Conclusion Biometrics which use iris is one of the technologies which ensures an high level of safety. [...]
[...] Arch Loop Whorl Then by affecting to each finger a value and to each of the three patterns another value the system effect to each finger the sum of all numbers. This will enable the computer to find easily the fingerprint by only looking theses calculated numbers. How does fingerprints scanner work? Fingerprint scanners essentially provide an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint. Standard systems are comprised of a sensor for scanning the fingerprint, a processor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. [...]
Source aux normes APA
Pour votre bibliographieLecture en ligne
avec notre liseuse dédiée !Contenu vérifié
par notre comité de lecture