Hand geometry

Last updated
Geometry of a hand and some examples of measurements that can be taken by hand geometry reading devices. Hand Geometry and Measurements.jpg
Geometry of a hand and some examples of measurements that can be taken by hand geometry reading devices.
A hand geometry reading device with pegs to control the placement of the hand. Angled mirror on the left reflects the side view image of the hand to the camera. A CCD camera is beneath the keypad to take the top view image of the hand and the mirror image. Hand Geometry Reading Device.jpg
A hand geometry reading device with pegs to control the placement of the hand. Angled mirror on the left reflects the side view image of the hand to the camera. A CCD camera is beneath the keypad to take the top view image of the hand and the mirror image.

Hand geometry is a biometric that identifies users from the shape of their hands. Hand geometry readers measure a user's palm and fingers along many dimensions including length, width, deviation, and angle and compare those measurements to measurements stored in a file. [3]

Contents

History

Viable hand geometry devices have been manufactured since the early 1970s, making hand geometry the first biometric to find widespread computerized use. [4] Robert Miller realized the distinctive features of hand sizes and shapes could be used for identification and patented the first automated hand geometry device at the Stanford Research Institute in 1971. The device would measure the hand, and the numbers needed to match the punched holes of a user ID card to activate the circuit to be identified. David Sidlauskas was also a major player in the hand geometry device production, and he patented Handkey ID3D, the first hand scanner that worked in 3D that involved an optical measuring plate, camera, and numeric keypad to enter a personal PIN. [5] In the academic literature, one of the earliest papers on the topic of hand geometry was by Jain et al., where the authors designed a prototype hand geometry system that uses 16 geometric features for identity verification.

As an add-on

Hand geometry is not thought to be as unique as fingerprints, palm veins or irises. Fingerprinting and iris recognition remain the preferred technology for high-security applications. In large populations, hand geometry is not suitable for so-called one-to-many applications, in which a user is identified from his biometric without any other identification. However, hand geometry is very reliable when combined with other forms of identification, such as identification cards or personal identification numbers. There have also been proposed methods to include hand-geometry with palm print-based verification for better accuracy and performance. [6]

Commercial use

There have been many patents issued for devices that measure hand geometry from the U.S. patent office. [7]

A hand-geometry system‚ Identimat, was used at Shearson Hamil on Wall Street to track attendance, marking the beginning of biometric technology usage. [8] [9] Based on Robert Miller's patent, Identimat utilized light sensing cells to measure finger length and a magnetic strip card reader to verify identification cards and compared the information given to determine the authorization of the person. Although production ceased in 1987, the idea remains popular; common applications include access control and time-and-attendance operations. [10]

Advantages

Although hand geometry is not considered to be the most secure compared to other biometric points, there are some advantages to this method. This includes: [3]

Disadvantages

Although the performance of these systems is not shown to be influenced by factors such as dry skin, large rings and swelling in the fingers may pose problems.

They are not universally accessible, as they cannot be used by those with paralysis or Parkinson's disease, and they can be deceived using high-quality bone structure models. [11]

Pay-by-hand

Hand-recognition payment, also named pay-by-hand is a payment method that uses the scanning of one's hand. [12] It is an alternative payment system to using credit cards. The technology uses biometric identification by scanning the client's hand and reading various features like the position of veins and bones and it was tested by Amazon since 2019. [13]

See also

Related Research Articles

<span class="mw-page-title-main">Authentication</span> Act of proving an assertion

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

<span class="mw-page-title-main">Iris recognition</span> Method of biometric identification

Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance. The discriminating powers of all biometric technologies depend on the amount of entropy they are able to encode and use in matching. Iris recognition is exceptional in this regard, enabling the avoidance of "collisions" even in cross-comparisons across massive populations. Its major limitation is that image acquisition from distances greater than a meter or two, or without cooperation, can be very difficult. However, the technology is in development and iris recognition can be accomplished from even up to 10 meters away or in a live camera feed.

A retinal scan is a biometric technique that uses unique patterns on a person's retina blood vessels. It is not to be confused with other ocular-based technologies: iris recognition, commonly called an "iris scan", and eye vein verification that uses scleral veins.

Speaker recognition is the identification of a person from characteristics of voices. It is used to answer the question "Who is speaking?" The term voice recognition can refer to speaker recognition or speech recognition. Speaker verification contrasts with identification, and speaker recognition differs from speaker diarisation.

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols and optional in others (TLS).

Keystroke dynamics, keystroke biometrics, typing dynamics, ortyping biometrics refer to the collection of biometric information generated by key-press-related events that occur when a user types on a keyboard. Use of patterns in key operation to identify operators predates modern computing, and has been proposed as an authentication alternative to passwords and PIN numbers.

A card reader is a data input device that reads data from a card-shaped storage medium and provides the data to a computer. Card readers can acquire data from a card via a number of methods, including: optical scanning of printed text or barcodes or holes on punched cards, electrical signals from connections made or interrupted by a card's punched holes or embedded circuitry, or electronic devices that can read plastic cards embedded with either a magnetic strip, computer chip, RFID chip, or another storage medium.

<span class="mw-page-title-main">Multi-factor authentication</span> Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

Soft Biometrics traits are physical, behavioural or adhered human characteristics, classifiable in pre–defined human compliant categories. These categories are, unlike in the classical biometric case, established and time–proven by humans with the aim of differentiating individuals. In other words the soft biometric traits instances are created in a natural way, used by humans to distinguish their peers.

<span class="mw-page-title-main">Vein matching</span> Technique of biometric identification

Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin. Though used by the Federal Bureau of Investigation and the Central Intelligence Agency, this method of identification is still in development and has not yet been universally adopted by crime labs as it is not considered as reliable as more established techniques, such as fingerprinting. However, it can be used in conjunction with existing forensic data in support of a conclusion.

A whole new range of techniques has been developed to identify people since the 1960s from the measurement and analysis of parts of their bodies to DNA profiles. Forms of identification are used to ensure that citizens are eligible for rights to benefits and to vote without fear of impersonation while private individuals have used seals and signatures for centuries to lay claim to real and personal estate. Generally, the amount of proof of identity that is required to gain access to something is proportionate to the value of what is being sought. It is estimated that only 4% of online transactions use methods other than simple passwords. Security of systems resources generally follows a three-step process of identification, authentication and authorization. Today, a high level of trust is as critical to eCommerce transactions as it is to traditional face-to-face transactions.

<span class="mw-page-title-main">Smudge attack</span> Discerning a password via screen smudges

A smudge attack is an information extraction attack that discerns the password input of a touchscreen device such as a cell phone or tablet computer from fingerprint smudges. A team of researchers at the University of Pennsylvania were the first to investigate this type of attack in 2010. An attack occurs when an unauthorized user is in possession or is nearby the device of interest. The attacker relies on detecting the oily smudges produced and left behind by the user's fingers to find the pattern or code needed to access the device and its contents. Simple cameras, lights, fingerprint powder, and image processing software can be used to capture the fingerprint deposits created when the user unlocks their device. Under proper lighting and camera settings, the finger smudges can be easily detected, and the heaviest smudges can be used to infer the most frequent input swipes or taps from the user.

Eye vein verification is a method of biometric authentication that applies pattern-recognition techniques to video images of the veins in a user's eyes. The complex and random patterns are unique, and modern hardware and software can detect and differentiate those patterns at some distance from the eyes.

Identity-based security is a type of security that focuses on access to digital information or services based on the authenticated identity of an entity. It ensures that the users and services of these digital resources are entitled to what they receive. The most common form of identity-based security involves the login of an account with a username and password. However, recent technology has evolved into fingerprinting or facial recognition.

<span class="mw-page-title-main">Biometric device</span> Identification and authentication device

A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.

<span class="mw-page-title-main">Pulse watch</span> Electronic devices

A pulse watch, also known as a pulsometer or pulsograph, is an individual monitoring and measuring device with the ability to measure heart or pulse rate. Detection can occur in real time or can be saved and stored for later review. The pulse watch measures electrocardiography data while the user is performing tasks, whether it be simple daily tasks or intense physical activity. The pulse watch functions without the use of wires and multiple sensors. This makes it useful in health and medical settings where wires and sensors may be an inconvenience. Use of the device is also common in sport and exercise environments where individuals are required to measure and monitor their biometric data.

Passwordless authentication is an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret. In most common implementations users are asked to enter their public identifier and then complete the authentication process by providing a secure proof of identity through a registered device or token.

Proof of personhood (PoP) is a means of resisting malicious attacks on peer to peer networks, particularly, attacks that utilize multiple fake identities, otherwise known as a Sybil attack. Decentralized online platforms are particularly vulnerable to such attacks by their very nature, as notionally democratic and responsive to large voting blocks. In PoP, each unique human participant obtains one equal unit of voting power, and any associated rewards.

Identity replacement technology is any technology that is used to cover up all or parts of a person's identity, either in real life or virtually. This can include face masks, face authentication technology, and deepfakes on the Internet that spread fake editing of videos and images. Face replacement and identity masking are used by either criminals or law-abiding citizens. Identity replacement tech, when operated on by criminals, leads to heists or robbery activities. Law-abiding citizens utilize identity replacement technology to prevent government or various entities from tracking private information such as locations, social connections, and daily behaviors.

References

  1. "Hand Geometry" (PDF). National Science and Technology Council (US). 7 August 2006. Retrieved 28 November 2013.
  2. Bača, Miroslav; Grd, Petra; Fotak, Tomislav (2012). "Basic Principles and Trends in Hand Geometry and Hand Shape Biometrics". New Trends and Developments in Biometrics. doi:10.5772/51912. ISBN   978-953-51-0859-7. S2CID   35307022.
  3. 1 2 Sanchez-Reillo, R.; Sanchez-Avila, C.; Gonzalez-Marcos, A. (October 2000). "Biometric identification through hand geometry measurements". IEEE Transactions on Pattern Analysis and Machine Intelligence. 22 (10): 1168–1171. doi:10.1109/34.879796.
  4. Mayhew, Stephen (2012-06-22). "Explainer: Hand Geometry Recognition | Biometric Update". www.biometricupdate.com. Retrieved 2021-05-24.
  5. Prihodova, Katerina; Hub, Miloslav (June 2019). Biometric Privacy through Hand Geometry- A Survey. 2019 International Conference on Information and Digital Technologies. pp. 395–401. doi:10.1109/DT.2019.8813660. ISBN   978-1-7281-1401-9. S2CID   201811120.
  6. Kumar, Ajay; Wong, David C.M.; Shen, Helen C.; Jain, Anil K. (October 2006). "Personal authentication using hand images". Pattern Recognition Letters. 27 (13): 1478–1486. Bibcode:2006PaReL..27.1478K. doi:10.1016/j.patrec.2006.02.021.
  7. Kumar, Ajay; Wong, David C. M.; Shen, Helen C.; Jain, Anil K. (2003), "Personal Verification Using Palmprint and Hand Geometry Biometric", Audio- and Video-Based Biometric Person Authentication, Lecture Notes in Computer Science, vol. 2688, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 668–678, doi:10.1007/3-540-44887-x_78, ISBN   978-3-540-40302-9 , retrieved 2021-11-05
  8. Kumar, Ajay; Zhang, David (June 2007). "Hand-Geometry Recognition Using Entropy-Based Discretization". IEEE Transactions on Information Forensics and Security. 2 (2): 181–187. doi:10.1109/tifs.2007.896915. hdl: 10397/222 . S2CID   3175836.
  9. "Introduction". Palmprint Authentication. International Series on Biometrics. Vol. 3. 2004. pp. 3–19. doi:10.1007/1-4020-8097-2_1. ISBN   1-4020-8096-4.
  10. Prihodova, Katerina; Hub, Miloslav (2019). "Biometric Privacy through Hand Geometry- A Survey". 2019 International Conference on Information and Digital Technologies (IDT). pp. 395–401. doi:10.1109/dt.2019.8813660. ISBN   978-1-7281-1401-9. S2CID   201811120.
  11. Varchol, P., Levický, D., Sk, P., Levicky@tuke, D., & Sk. (n.d.). Using of Hand Geometry in Biometric Security Systems. Retrieved March 9, 2023, from https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=f007fec363d2e2cba1cd96fe556ab2d4674201e8
  12. Grothaus, Michael (20 January 2020). "Amazon wants you to use your hand to pay for things at third-party retailers". Fast Company.
  13. Levy, Nat (20 January 2020). "Here's how Amazon's rumored pay-by-hand tech could work". GeekWire.

References