scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A biometric security based electronic gadget control using hand gestures

04 Dec 2009-pp 1-8
TL;DR: An automatic hand-gesture based control system that works after authentication (using Iris recognition) of the user is developed that proves to be very propitious for high security environments.
Abstract: The control over electronic system using hand gestures is an innovative user interface that resolves the complications of using numerous remote controls for appliances. Founded on a unified set of hand gestures, this system interprets the user's hand gestures into pre-specified commands to control one or many devices simultaneously. However, of late, security has been of major concern among the people in using such a system, especially, at critical places like Home Entrances, Cashbox, etc. In order to minimize this issue, we have incorporated Biometric security through Iris recognition that will help in user authentication. Iris recognition, which is a relatively new biometric technology, has great advantages such as variability, stability and security. This proves to be very propitious for high security environments. This paper presents an elaboration of the methodologies employed including object recognition, artificial neural networks, and biometric security systems. All image processing was performed using NI Vision Assistant. In addition, NI LabVIEW was used to train and implement Neural Networks for Hand Gesture Classification. We have developed an automatic hand-gesture based control system that works after authentication (using Iris recognition) of the user.
Citations
More filters
Book
01 Jan 1994

607 citations

Book ChapterDOI
01 Jan 2013
TL;DR: This new survey is intended to update the previous one, and covers iris biometrics research over the period of roughly 2008–2010, and lists a larger number of references than the inception-through-2007 survey.
Abstract: A recent survey of iris biometric research from its inception through 2007, roughly 15 years of research, lists approximately 180 publications. This new survey is intended to update the previous one, and covers iris biometrics research over the period of roughly 2008–2010. Research in iris biometrics has expanded so much that, although covering only 3 years and intentionally being selective about coverage, this new survey lists a larger number of references than the inception-through-2007 survey.

151 citations


Cites background from "A biometric security based electron..."

  • ...[54] propose a vision system that will recognize a set of hand gestures to control devices and use iris biometrics to authenticate the user identity....

    [...]

Journal ArticleDOI
TL;DR: This paper discusses the stages involved in the biometric system recognition process and further discusses multimodal systems in terms of their architecture, mode of operation, and algorithms used to develop the systems.
Abstract: Biometric systems are used for the verification and identification of individuals using their physiological or behavioral features. These features can be categorized into unimodal and multimodal systems, in which the former have several deficiencies that reduce the accuracy of the system, such as noisy data, inter-class similarity, intra-class variation, spoofing, and non-universality. However, multimodal biometric sensing and processing systems, which make use of the detection and processing of two or more behavioral or physiological traits, have proved to improve the success rate of identification and verification significantly. This paper provides a detailed survey of the various unimodal and multimodal biometric sensing types providing their strengths and weaknesses. It discusses the stages involved in the biometric system recognition process and further discusses multimodal systems in terms of their architecture, mode of operation, and algorithms used to develop the systems. It also touches on levels and methods of fusion involved in biometric systems and gives researchers in this area a better understanding of multimodal biometric sensing and processing systems and research trends in this area. It furthermore gives room for research on how to find solutions to issues on various unimodal biometric systems.

94 citations


Cites methods from "A biometric security based electron..."

  • ...AnAir Auth (a biometric authentication technique that uses an air gesture input to authenticate users) was designed using air hand gestures as an authentication technique to recognize individuals using a short range depth sensor that finds several unique points simultaneously [62]....

    [...]

Patent
Gwang Ha Park1, Do Hun Kim1, Jin Ho Ahn1, Dai-IL Oh1, Jae In Lee1, Hyun Suk Lee1 
15 Oct 2014
TL;DR: In this paper, a method for authentication in a portable electronic device is presented, which includes identifying whether a peripheral device is located within a certain distance from the portable device, receiving biometrics information from the peripheral electronic device when the peripheral device was located within the same distance from a portable device.
Abstract: A method for performing authentication in a portable electronic device is provided. The method includes identifying whether a peripheral electronic device is located within a certain distance from the portable electronic device, receiving biometrics information from the peripheral electronic device when the peripheral electronic device is located within the certain distance from the portable electronic device, identifying whether the biometrics information received from the peripheral electronic device is identical to biometrics information stored in the portable electronic device, and releasing security set to the portable electronic device when the biometrics information received from the peripheral electronic device is identical to the biometrics information stored in the portable electronic device.

15 citations

Patent
20 Jan 2012
TL;DR: In this paper, a method for user recognition, comprising receiving user information from an information unit of a user, detecting the user face in a captured user image, and recognizing the user identity in the captured image according to a predetermined gesture associated with the user information and performed by the user.
Abstract: A method for user recognition, comprising receiving user information from an information unit of a user; detecting the user face in a captured user image; and recognizing the user identity in the captured image according to a predetermined gesture associated with the user information and performed by the user.

8 citations

References
More filters
Journal ArticleDOI
TL;DR: Consider writing, perhaps the first information technology: The ability to capture a symbolic representation of spoken language for long-term storage freed information from the limits of individual memory.
Abstract: Specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence.

9,073 citations

Journal ArticleDOI
Ming-Kuei Hu1
TL;DR: It is shown that recognition of geometrical patterns and alphabetical characters independently of position, size and orientation can be accomplished and it is indicated that generalization is possible to include invariance with parallel projection.
Abstract: In this paper a theory of two-dimensional moment invariants for planar geometric figures is presented. A fundamental theorem is established to relate such moment invariants to the well-known algebraic invariants. Complete systems of moment invariants under translation, similitude and orthogonal transformations are derived. Some moment invariants under general two-dimensional linear transformations are also included. Both theoretical formulation and practical models of visual pattern recognition based upon these moment invariants are discussed. A simple simulation program together with its performance are also presented. It is shown that recognition of geometrical patterns and alphabetical characters independently of position, size and orientation can be accomplished. It is also indicated that generalization is possible to include invariance with parallel projection.

7,963 citations


"A biometric security based electron..." refers background in this paper

  • ...Moment invariants offer a set of features that cater to all these properties [9]....

    [...]

Journal Article
TL;DR: In this article, the authors propose that specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence.
Abstract: Specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence

5,041 citations

Journal Article

2,465 citations


"A biometric security based electron..." refers background in this paper

  • ...In perspective of safety and the urge to live a more comfortable life, it is anticipated that more people will prefer to choose the smart homes solution in the future, for the range of benefits that is offered [1]....

    [...]

Journal ArticleDOI
TL;DR: The statistical variability that is the basis of iris recognition is analysed in this paper using new large databases, presenting the results of 9.1 million comparisons among several thousand eye images acquired in trials in Britain, the USA, Japan and Korea.

989 citations


"A biometric security based electron..." refers background in this paper

  • ...If more than one neuron fires at the same time or if none fires then the gesture is considered unrecognized [11]....

    [...]

Trending Questions (1)
What are the different ways to control the gadget?

The paper does not provide information about the different ways to control the gadget. The paper focuses on the use of hand gestures and biometric security through iris recognition for controlling electronic systems.