An approach to hand biometrics in mobile devices


This paper focuses on hand biometrics applied to images acquired from a mobile device. The system offers the possibility of identifying individuals based on features extracted from hand pictures obtained with a low-quality camera embedded on a mobile device. Furthermore, the acquisitions have been carried out regardless illumination control, orientation, distance to camera, and similar aspects. In addition, the whole system has been tested with an owned database. Finally, the results obtained (6.0% ± 0.2) and the algorithm structure are both promising in relation to a posterior mobile implementation.

This is a preview of subscription content, log in to check access.


  1. 1

    Bolle R., Pankanti S.: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norewell, MA (1998)

    Google Scholar 

  2. 2

    Arif, M., Brouard, T., Vincent, N.: Personal identification and verification by hand recognition. In: IEEE International Conference on Engineering of Intelligent Systems, pp. 1–6 (2006)

  3. 3

    Su C.L.: Overlapped finger geometry signal processing and finger shape comparisons for person identification. Informatica 18, 447–456 (2007)

    MATH  Google Scholar 

  4. 4

    Kang B.J., Park K.R.: Multimodal biometric authentication based on the fusion of finger vein and finger geometry. Opt. Eng. 48, 090501 (2009)

    Article  Google Scholar 

  5. 5

    Malassiotis S., Aifanti N., Strintzis M.: Personal authentication using 3-d finger geometry. IEEE Trans. Inf. Forensics Secur. 1, 12–21 (2006)

    Article  Google Scholar 

  6. 6

    Yoruk E., Konukoglu E., Sankur B., Darbon J.: Shape-based hand recognition. IEEE Trans. Image Process. 15, 1803–1815 (2006)

    Article  Google Scholar 

  7. 7

    de Santos Sierra, A., Casanova, J., Avila, C., Vera, V.: Silhouette-based hand recognition on mobile devices. In: 43rd Annual 2009 International Carnahan Conference on Security Technology, pp. 160–166 (2009)

  8. 8

    Morales, A., Ferrer, M., Alonso, J., Travieso, C.: Comparing infrared and visible illumination for contactless hand based biometric scheme. In:42nd Annual IEEE International Carnahan Conference on Security Technology (ICCST), pp. 191–197 (2008)

  9. 9

    Cortes, C., Vapnik, V.: Support-vector networks. In: Machine Learning, Springer, New York, pp. 273–297 (1995)

  10. 10

    Cristianini N., Shawe-Taylor J.: An introduction to support vector machines: and other kernel-based learning methods. 1st edn. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  11. 11

    Shahin, M., Badawi, A., Rasmy, M.: A multimodal hand vein, hand geometry, and fingerprint prototype design for high security biometrics. In: Cairo International Biomedical Engineering Conference (CIBEC), pp. 1–6 (2008)

  12. 12

    Alpert, S., Galun, M., Basri, R., Brandt, A.: Image segmentation by probabilistic bottom-up aggregation and cue integration. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–8 (2007)

  13. 13

    Son, T., Mita, S., Takeuchi, A.: Road detection using segmentation by weighted aggregation based on visual information and a posteriori probability of road regions. In: IEEE International Conference on Systems, Man and Cybernetics (SMC), pp. 3018–3025 (2008)

  14. 14

    Hunter R.S.: Photoelectric color difference meter. J. Opt. Soc. Am. 48, 985–993 (1958)

    Article  Google Scholar 

  15. 15

    Gonzalez R.C., Woods R.E.: Digital Image Processing. Addison-Wesley Longman Publishing Co., Inc., Boston, MA (2001)

    Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Alberto de Santos Sierra.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

de Santos Sierra, A., Sánchez-Ávila, C., Mendaza Ormaza, A. et al. An approach to hand biometrics in mobile devices. SIViP 5, 469 (2011).

Download citation


  • Contact-less hand biometrics
  • Mobile devices
  • Support vector machines
  • Security
  • Segmentation