Hand geometry

Last updated
Geometry of a hand and some examples of measurements that can be taken by hand geometry reading devices. Hand Geometry and Measurements.jpg
Geometry of a hand and some examples of measurements that can be taken by hand geometry reading devices.
A hand geometry reading device with pegs to control the placement of the hand. Angled mirror on the left reflects the side view image of the hand to the camera. A CCD camera is beneath the keypad to take the top view image of the hand and the mirror image. Hand Geometry Reading Device.jpg
A hand geometry reading device with pegs to control the placement of the hand. Angled mirror on the left reflects the side view image of the hand to the camera. A CCD camera is beneath the keypad to take the top view image of the hand and the mirror image.

Hand geometry is a biometric that identifies users from the shape of their hands. Hand geometry readers measure a user's palm and fingers along many dimensions including length, width, deviation, and angle and compare those measurements to measurements stored in a file. [3]

Contents

History

Viable hand geometry devices have been manufactured since the early 1970s, making hand geometry the first biometric to find widespread computerized use. [4] Robert Miller realized the distinctive features of hand sizes and shapes could be used for identification and patented the first automated hand geometry device at the Stanford Research Institute in 1971. The device would measure the hand, and the numbers needed to match the punched holes of a user ID card to activate the circuit to be identified. David Sidlauskas was also a major player in the hand geometry device production, and he patented Handkey ID3D, the first hand scanner that worked in 3D that involved an optical measuring plate, camera, and numeric keypad to enter a personal PIN. [5]

As an add-on

Hand geometry is not thought to be as unique as fingerprints, palm veins or irises. Fingerprinting and iris recognition remain the preferred technology for high-security applications. In large populations, hand geometry is not suitable for so-called one-to-many applications, in which a user is identified from his biometric without any other identification. However, hand geometry is very reliable when combined with other forms of identification, such as identification cards or personal identification numbers. There have also been proposed methods to include hand-geometry with palm print-based verification for better accuracy and performance. [6]

Commercial use

There have been many patents issued for devices that measure hand geometry from the U.S. patent office. [7]

A hand-geometry system‚ Identimat, was used at Shearson Hamil on Wall Street to track attendance, marking the beginning of biometric technology usage. [8] [9] Based on Robert Miller's patent, Identimat utilized light sensing cells to measure finger length and a magnetic strip card reader to verify identification cards and compared the information given to determine the authorization of the person. Although production ceased in 1987, the idea remains popular; common applications include access control and time-and-attendance operations. [10]

Advantages

Although hand geometry is not considered to be the most secure compared to other biometric points, there are some advantages to this method. This includes: [3]

Disadvantages

Although the performance of these systems is not shown to be influenced by factors such as dry skin, large rings and swelling in the fingers may pose problems.

They are not universally accessible, as they cannot be used by those with paralysis or Parkinson's disease, and they can be deceived using high-quality bone structure models. [11]

Pay-by-hand

Hand-recognition payment, also named pay-by-hand is a payment method that uses the scanning of one's hand. [12] It is an alternative payment system to using credit cards. The technology uses biometric identification by scanning the client's hand and reading various features like the position of veins and bones and it was tested by Amazon since 2019. [13]

See also

Related Research Articles

<span class="mw-page-title-main">Authentication</span> Act of proving an assertion, often the identity of a computer system user

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

<span class="mw-page-title-main">Fingerprint</span> Biometric identifier

A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfaces such as glass or metal. Deliberate impressions of entire fingerprints can be obtained by ink or other substances transferred from the peaks of friction ridges on the skin to a smooth surface such as paper. Fingerprint records normally contain impressions from the pad on the last joint of fingers and thumbs, though fingerprint cards also typically record portions of lower joint areas of the fingers.

Biometrics are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

A retinal scan is a biometric technique that uses unique patterns on a person's retina blood vessels. It is not to be confused with other ocular-based technologies: iris recognition, commonly called an "iris scan", and eye vein verification that uses scleral veins.

In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.

Speaker recognition is the identification of a person from characteristics of voices. It is used to answer the question "Who is speaking?" The term voice recognition can refer to speaker recognition or speech recognition. Speaker verification contrasts with identification, and speaker recognition differs from speaker diarisation.

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols and optional in others (TLS).

Keystroke dynamics, keystroke biometrics, typing dynamics andtyping biometrics refer to the detailed timing information that describes each key press related event that occurs when a user is typing on a keyboard.

A card reader is a data input device that reads data from a card-shaped storage medium. The first were punched card readers, which read the paper or cardboard punched cards that were used during the first several decades of the computer industry to store information and programs for computer systems. Modern card readers are electronic devices that can read plastic cards embedded with either a barcode, magnetic strip, computer chip or another storage medium.

M2SYS Technology is a global biometric identification management company that provides biometric identity management software, and hardware along with enterprise software applications to several markets including; public safety, workforce management, point of sale, healthcare, education, child care, transportation security, banking and membership management. They offer Software Development Kits to software vendors that want to add biometric identification to their applications directly to end users.

<span class="mw-page-title-main">Vein matching</span> Technique of biometric identification

Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin. Though used by the Federal Bureau of Investigation and the Central Intelligence Agency, this method of identification is still in development and has not yet been universally adopted by crime labs as it is not considered as reliable as more established techniques, such as fingerprinting. However, it can be used in conjunction with existing forensic data in support of a conclusion.

In order to identify a person, a security system has to compare personal characteristics with a database. A scan of a person's iris, fingerprint, face, or other distinguishing feature is created, and a series of biometric points are drawn at key locations in the scan. For example, in the case of a facial scan, biometric points might be placed at the tip of each ear lobe and in the corners of both eyes. Measurements taken between all the points of a scan are compiled and result in a numerical "score". This score is unique for every individual, but it can quickly and easily be compared to any compiled scores of the facial scans in the database to determine if there is a match.

A whole new range of techniques has been developed to identify people since the 1960s from the measurement and analysis of parts of their bodies to DNA profiles. Forms of identification are used to ensure that citizens are eligible for rights to benefits and to vote without fear of impersonation while private individuals have used seals and signatures for centuries to lay claim to real and personal estate. Generally, the amount of proof of identity that is required to gain access to something is proportionate to the value of what is being sought. It is estimated that only 4% of online transactions use methods other than simple passwords. Security of systems resources generally follows a three-step process of identification, authentication and authorization. Today, a high level of trust is as critical to eCommerce transactions as it is to traditional face-to-face transactions.

<span class="mw-page-title-main">Smudge attack</span> Discerning a password via screen smudges

A smudge attack is an information extraction attack that discerns the password input of a touchscreen device such as a cell phone or tablet computer from fingerprint smudges. A team of researchers at the University of Pennsylvania were the first to investigate this type of attack in 2010. An attack occurs when an unauthorized user is in possession or is nearby the device of interest. The attacker relies on detecting the oily smudges produced and left behind by the user's fingers to find the pattern or code needed to access the device and its contents. Simple cameras, lights, fingerprint powder, and image processing software can be used to capture the fingerprint deposits created when the user unlocks their device. Under proper lighting and camera settings, the finger smudges can be easily detected, and the heaviest smudges can be used to infer the most frequent input swipes or taps from the user.

Eye vein verification is a method of biometric authentication that applies pattern-recognition techniques to video images of the veins in a user's eyes. The complex and random patterns are unique, and modern hardware and software can detect and differentiate those patterns at some distance from the eyes.

Identity-based security is a type of security that focuses on access to digital information or services based on the authenticated identity of an entity. It ensures that the users and services of these digital resources are entitled to what they receive. The most common form of identity-based security involves the login of an account with a username and password. However, recent technology has evolved into fingerprinting or facial recognition.

<span class="mw-page-title-main">Biometric device</span> Identification and authentication device

A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.

<span class="mw-page-title-main">Pulse watch</span> Electronic devices

A pulse watch, also known as a pulsometer or pulsograph, is an individual monitoring and measuring device with the ability to measure heart or pulse rate. Detection can occur in real time or can be saved and stored for later review. The pulse watch measures electrocardiography data while the user is performing tasks, whether it be simple daily tasks or intense physical activity. The pulse watch functions without the use of wires and multiple sensors. This makes it useful in health and medical settings where wires and sensors may be an inconvenience. Use of the device is also common in sport and exercise environments where individuals are required to measure and monitor their biometric data.

Passwordless authentication is an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret. In most common implementations users are asked to enter their public identifier and then complete the authentication process by providing a secure proof of identity through a registered device or token.

Identity replacement technology is any technology that is used to cover up all or parts of a person's identity, either in real life or virtually. This can include face masks, face authentication technology, and deepfakes on the Internet that spread fake editing of videos and images. Face replacement and identity masking are used by either criminals or law-abiding citizens. Identity replacement tech, when operated on by criminals, leads to heists or robbery activities. Law-abiding citizens utilize identity replacement technology to prevent government or various entities from tracking private information such as locations, social connections, and daily behaviors.

References

  1. "Hand Geometry" (PDF). National Science and Technology Council (US). 7 August 2006. Retrieved 28 November 2013.
  2. Bača, Miroslav; Grd, Petra; Fotak, Tomislav (2012). "Basic Principles and Trends in Hand Geometry and Hand Shape Biometrics". New Trends and Developments in Biometrics. doi:10.5772/51912. ISBN   978-953-51-0859-7. S2CID   35307022.
  3. 1 2 Sanchez-Reillo, R.; Sanchez-Avila, C.; Gonzalez-Marcos, A. (October 2000). "Biometric identification through hand geometry measurements". IEEE Transactions on Pattern Analysis and Machine Intelligence. 22 (10): 1168–1171. doi:10.1109/34.879796.
  4. Mayhew, Stephen (2012-06-22). "Explainer: Hand Geometry Recognition | Biometric Update". www.biometricupdate.com. Retrieved 2021-05-24.
  5. Prihodova, Katerina; Hub, Miloslav (June 2019). Biometric Privacy through Hand Geometry- A Survey. 2019 International Conference on Information and Digital Technologies. pp. 395–401. doi:10.1109/DT.2019.8813660. ISBN   978-1-7281-1401-9. S2CID   201811120.
  6. Kumar, Ajay; Wong, David C.M.; Shen, Helen C.; Jain, Anil K. (October 2006). "Personal authentication using hand images". Pattern Recognition Letters. 27 (13): 1478–1486. Bibcode:2006PaReL..27.1478K. doi:10.1016/j.patrec.2006.02.021.
  7. Kumar, Ajay; Wong, David C. M.; Shen, Helen C.; Jain, Anil K. (2003), "Personal Verification Using Palmprint and Hand Geometry Biometric", Audio- and Video-Based Biometric Person Authentication, Lecture Notes in Computer Science, vol. 2688, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 668–678, doi:10.1007/3-540-44887-x_78, ISBN   978-3-540-40302-9 , retrieved 2021-11-05
  8. Kumar, Ajay; Zhang, David (June 2007). "Hand-Geometry Recognition Using Entropy-Based Discretization". IEEE Transactions on Information Forensics and Security. 2 (2): 181–187. doi:10.1109/tifs.2007.896915. hdl: 10397/222 . S2CID   3175836.
  9. "Introduction". Palmprint Authentication. International Series on Biometrics. Vol. 3. 2004. pp. 3–19. doi:10.1007/1-4020-8097-2_1. ISBN   1-4020-8096-4.
  10. Prihodova, Katerina; Hub, Miloslav (2019). "Biometric Privacy through Hand Geometry- A Survey". 2019 International Conference on Information and Digital Technologies (IDT). pp. 395–401. doi:10.1109/dt.2019.8813660. ISBN   978-1-7281-1401-9. S2CID   201811120.
  11. Varchol, P., Levický, D., Sk, P., Levicky@tuke, D., & Sk. (n.d.). Using of Hand Geometry in Biometric Security Systems. Retrieved March 9, 2023, from https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=f007fec363d2e2cba1cd96fe556ab2d4674201e8
  12. Grothaus, Michael (20 January 2020). "Amazon wants you to use your hand to pay for things at third-party retailers". Fast Company.
  13. Levy, Nat (20 January 2020). "Here's how Amazon's rumored pay-by-hand tech could work". GeekWire.

References