Security certification is drawing more and more attention in recent years; the biometric technology is used in a variety of different areas of security certification. In this paper, we propose a palm image recognition method to identify an individual for vehicular application; it uses palm image as a key for detecting the car owner. We used mobile phone cameras to take palm images and performed a new identification approach by using feature regularization of palm contour. After identification is confirmed, the phone uses Bluetooth/WiFi to connect the car to unlock it. In our evaluation, the experiments show that our approach is effective and feasible. 1. Introduction The car as a daily transport already has a history of 120 years; with the development of science and technology, the car has also experienced rapid changes which significantly improved human life. Automotive systems include vehicle monitoring systems, car GPS system, 3G car system, and in-car information systems. With the rapid development of automobile electronic technology, automotive intelligent technology is gradually applied. Automotive intelligent technology is making handling a car simpler, and driving safety is getting better and better. However, so far, the on-board system focused on the improvement of driving and riding experience, and there is no significant improvement in the antitheft. In fact, it has been one of the problems bothering people; it will be a major issue to ordinary people once a car is stolen. So we focused on the enhancement of a civilian vehicular lock by providing a new biometric technology. Throughout our journey of life, the recognition of personal identity is inseparable. However, the wide varieties of identifications have led to an inconvenience in real life, and there are often cases of forging others’ identity documents. In order to change this situation, to protect the property of people, we want to use the unique features of individuals as authentication approach, so we use a biometric technology to turn the biology characteristics into a secure password. Biometric technology is more and more concerned in a secure authentication in recent years [1]; it is used in a variety of different areas of authentication. In biometric technology, we must obtain a biometric as personal feature that does not change easily over time and that most people make use of. This paper hopes to identify a personal characteristic through the palm image recognition to increase the security of automotive protection as a supplement of the car key. When a mobile phone is connected
References
[1]
D. Kumar and Y. Ryu, “A brief introduction of biometrics and fingerprint payment technology,” International Journal of Advanced Science and Technology, vol. 4, pp. 25–38, 2009.
[2]
A. Kong, D. Zhang, and M. Kamel, “Palmprint identification using feature-level fusion,” Pattern Recognition, vol. 39, no. 3, pp. 478–487, 2006.
[3]
A. Kumar, C. M. Wong, C. Shen, and K. Jain, “Personal verification using palmprint and hand geometry biometric,” in Proceedings of the 4th International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA '03), pp. 668–678, 2003.
[4]
A. Kumar and A. Passi, “Comparison and combination of iris matchers for reliable personal identification,” in Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW '08), pp. 1–7, June 2008.
[5]
Y. Zhou and A. Kumar, “Personal identification from iris images using localized Radon transform,” in Proceedings of the 20th International Conference on Pattern Recognition (ICPR '10), pp. 2840–2843, August 2010.
[6]
M. Golfarelli, D. Maio, and D. Maltoni, “On the error-reject trade-off in biometrie verification systems,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 786–796, 1997.
[7]
A. Kumar and D. Zhang, “Combining fingerprint, palmprint and hand-shape for user authentication,” in Proceedings of the 18th International Conference on Pattern Recognition (ICPR '06), pp. 549–552, August 2006.
[8]
A. Kumar and D. Zhang, “Personal recognition using hand shape and texture,” IEEE Transactions on Image Processing, vol. 15, no. 8, pp. 2454–2461, 2006.
[9]
Y. Cao, “Biometric Selection Record,” RUN!PC, 2009(188), pp. 44–45.
[10]
W. Xiong, K. A. Toh, W. Y. Yau, and X. Jiang, “Model-guided deformable hand shape recognition without positioning aids,” Pattern Recognition, vol. 38, no. 10, pp. 1651–1664, 2005.
[11]
C. C. Han, H. L. Cheng, C. L. Lin, and K. C. Fan, “Personal authentication using palm-print features,” Pattern Recognition, vol. 36, no. 2, pp. 371–381, 2003.
[12]
R. Sanchez-Reillo, C. Sanchez-Avila, and A. Gonzalez-Marcos, “Biometric identification through hand geometry measurements,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 10, pp. 1168–1171, 2000.
[13]
A. K. Jain and N. Duta, “Deformable matching of hand shapes for user verification,” in Proceedings of IEEE International Conference on Image Processing (ICIP '99), pp. 857–861, October 1999.
[14]
R. S. Reillo, “Hand gemoetry patten recognition through gaussian mixture modelling,” in Proceedings of the 15th International Conference on Pattern Recognition, vol. 2, pp. 937–940, 2000.
[15]
W. Wang, Palm identification based on morphology [M.S. thesis], National Chi Nan University, 2008.
[16]
S. Liu, D. He, and X. Liang, “An improved hybrid model for automatic salient region detection,” IEEE Signal Processing Letters, vol. 109, no. 4, pp. 207–210, 2012.
[17]
C. H. Su, H. S. Chiu, and T. M. Hsieh, “An efficient image retrieval based on HSV color space,” in Proceedings of the International Conference on Electrical and Control Engineering (ICECE '11), pp. 5746–5749, September 2011.
[18]
S. Miu, Digital Image Processing, Princeton International Co. Ltd, 2006.
[19]
L. Yucheng and L. Yubin, “An algorithm of image segmentation based on fuzzy mathematical morphology,” in Proceedings of the International Forum on Information Technology and Applications (IFITA '09), vol. 2, pp. 517–520, May 2009.