Identity verification using shape and geometry of human hands

S Sharma, SR Dubey, SK Singh, R Saxena… - Expert Systems with …, 2015 - Elsevier
A multimodal biometric system for personal identity verification is proposed using hand
shape and hand geometry in this paper. Shape and geometry features are derived with the …

A biometric authentication model using hand gesture images

S Fong, Y Zhuang, I Fister, I Fister - Biomedical engineering online, 2013 - Springer
A novel hand biometric authentication method based on measurements of the user's
stationary hand gesture of hand sign language is proposed. The measurement of hand …

Biometric privacy through hand geometry-a survey

K Přihodová, M Hub - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Reliable authentication is a key factor in ensuring data security. Information systems
requiring a high level of data security do not use passwords that are considered to be too …

The application of hierarchical clustering algorithms for recognition using biometrics of the hand

L Sousa, J Gama - 2014 - repositorio.ipv.pt
In data analysis, the hierarchical clustering algorithms are powerful tools allowing to identify
natural clusters, often without any priori information of the data structure, and are quite often …

Hand-Based Biometric Recognition Technique-Survey

K Příhodová, M Hub - … in Science, Technology and Engineering Systems …, 2020 - dk.upce.cz
In today's modern world, reliable automatic personal recognition is a crucial area of
discussion, primarily because of the increased security risks. A large number of systems first …

Comparison of Face Recognition algorithms & its subsequent impact on side face

S Shukla, S Dave - 2016 International Conference on ICT in …, 2016 - ieeexplore.ieee.org
The use of pattern recognition and classification has increased in various real world
applications such as face recognition and other crucial applications. The key aim, of these …

Current Challenges of Hand-Based Biometric Systems

K Prihodova, M Hub - Cyber Security and Business Intelligence, 2023 - taylorfrancis.com
Currently, more and more emphasis is placed on the security of information systems.
Password authentication is increasingly being replaced by biometric authentication, which is …

Contribution to the Knowledge of Hierarchical Clustering Algorithms and Consensus Clustering Studies Applied to Personal Recognition by Hands Biometrics

LPM de Sousa - 2015 - search.proquest.com
In exploratory data analysis, hierarchical clustering algorithms with its features can provide
different clusterings when applied to the same data set. In the presence of several …

[PDF][PDF] Contribution to the knowledge of hierarchical clustering algorithms and consensus clustering

LPM de Sousa - core.ac.uk
In exploratory data analysis, hierarchical clustering algorithms with its features can provide
different clusterings when applied to the same data set. In the presence of several …

[PDF][PDF] The Consensus Clustering as a Contribution to Parental Recognition Problem Based on Hand Biometrics

L Sousa - … Journal of Advanced Engineering Research and … - researchgate.net
The clustering analysis is a subject that has been interesting researchers from several
areas, such as health (medical diagnosis, clustering of proteins and genes), marketing …