The Fundamentals of Unimodal Palmprint Authentication based on a Biometric System: A Review
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Biometric system can be defined as the automated method of identifying or authenticating the identity of a living person based on physiological or behavioral traits. Palmprint biometric-based authentication has gained considerable attention in recent years. Globally, enterprises have been exploring biometric authorization for some time, for the purpose of security, payment processing, law enforcement CCTV systems, and even access to offices, buildings, and gyms via the entry doors. Palmprint biometric system can be divided into unimodal and multimodal. This paper will investigate the biometric system and provide a detailed overview of the palmprint technology with existing recognition approaches. Finally, we introduce a review of previous works based on a unimodal palmprint system using different databases.
Authors and Affiliations
Inass Shahadha Hussein, Shamsul Bin Sahibuddin, Nilam Nur Amir Sjarif
Analysis Method of Traffic Congestion Degree Based on Spatio-Temporal Simulation
The purpose of this research is to design and implement a road traffic congestion and traffic patterns simulation (TPS) model and integrate it with extension-information model (EIM). The problems of road traffic si...
Dominating Sets and Spanning Tree based Clustering Algorithms for Mobile Ad hoc Networks
The infrastructure less and dynamic nature of mobile ad hoc networks (MANET) needs efficient clustering algorithms to improve network management and to design hierarchical routing protocols. Clustering algorithms in mob...
Improving Assessment Management Using Tools
This paper firstly explains the importance of assessment management, then introduces two assessment tools currently used in the School of Information Technology at Deakin University. A comparison of assignment marking wa...
Validating a Novel Conflict Resolution Strategy Selection Method (ConfRSSM) Via Multi-Agent Simulation
Selecting a suitable conflict resolution strategy when conflicts appear in multi-agent environments is a hard problem. There is a need to develop a method that can select a suitable strategy which guaranties low cost in...
A Framework for an Effective Information Security Awareness Program in Healthcare
Electronic Health Record (EHR) is a valuable asset of every healthcare and it needs to be protected. Human errors are recognized as the major information security threats to EHR systems. Employees who interact with EHR s...