The encroachment of information is considered the most important attack that affects the performance of the network. Biometric based authentications have emerged as promising components of information security. Biometric is used for two major purposes: identification and authentication. We propose a palm based authentication method that uses hand images to define a set of referencing points considered as invariable and unique in the authentication process. The method of circular histogram analysis has been used to enable the definition of the angular orientation of palm representation and the corner of turn where it is necessary to turn the image for correct determination of supporting points which is based on two- dimensional discrete differentiations of image with the next analysis of given points of brightness projections forming the curves of peaks and cavities of hand- fingers and facilitating the searching process for such given points. The system of signs- recognition, which allows authentication of identity, regardless of palm location and its position within the limits of the scanning field has been used and proved to be economic and capable of improving the operability of the authentication system.
The encroachment of information is considered the most important attack that affects the performance of the network. Biometric based authentications have emerged as promising components of information security. Biometric is used for two major purposes: identification and authentication. We propo...
مادة فرعية