Abstract
We propose a new iris texture coding technique with optimal feature extraction, and design a secure remote (internet) access system using the proposed biometrics. The proposed iris coding method is based on Zak-Gabor coefficients sequence, and additionally uses an optimal selection of a subset of iris features. The secure access involves a communication scenario that employs a usual client-server network model, thus incorporating standard security mechanisms with biometric enhancements. The proposed access scenario enables to include the aliveness detection capability and the biometric replay attack prevention.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Flom and Safir, “Iris recognition system,” United State Patent 4.641.349, February 3, 1987
Daugman, John, “Biometric identification system based on iris analysis,” United States Patent 5.291.560, March 1, 1994
Wildes, Richard P., et al., “Automated, non-invasive iris recognition system and method,” United States Patent 5.572.596, November 5, 1996
Kim, Daniel Daehoon, et al., “Iris identification system and method of identifying a person through iris recognition,” United States Patent 6.247.813, June 19, 2001
Zhu, Y., T. Tan, and Y. Wang, “Iris image acquisition system,” Chinese Patent Application No. 99217063.X, 1999
Zhu, Y., T. Tan, and Y. Wang, “Biometric Personal Identification System Based on Iris Pattern,” Chinese Patent Application No. 9911025.6, 1999
Matsushita, et al., “Iris identification system and iris identification method,” United States Patent 5.901.238, May 4, 1999
Doster, et al., “Iris recognition apparatus and method,“ United States Patent 5.956.122, September 21, 1999
Mann, et al., “System and method for aircraft passenger check-in and boarding using iris recognition,” United States Patent 6.119.096, September 12, 2000
McHugh, et al., “Handheld iris imaging apparatus and method,” United States Patent 6.289.113, September 11, 2001
Musgrave, et al., “Iris imaging telephone security module and method,” United States Patent 6.377.699, April 23, 2002
Boles, W. W. and B. Boashash, “A Human Identification Technique Using Images of te Iris and Wavelet Transform,” IEEE Transactions on Signal Processing, Vol. 46, No. 4, April 1998
Tieniu, Tan, “Identity identifying method based on iris identification and its equipment,” State Intellectual Property Office of the People's Republic of China, No. 1282048, applicant: Institute of Automation, Chinese Academy of Science, January 31, 2001
Wildes, Richard Patrick, Jane Circle Asmuth, Keith James Hanna, Stephen Charles Hsu, Raymond Joseph Kolczynski, James Regis Matey, and Sterling Eduard McBridge, “Automated, non-invasive iris recognition system and method,” United States Patent US 5,572,596, assignee: David Sarnoff Research Center Inc., Princeton, N.J., USA, November 5, 1996
Czajka, Adam and Andrzej Pacut, “Zak's transform for automatic identity verification,” Proceedings of the 4th International Conference on Recent Advances in Soft Computing RASC2002, 12–13 December 2002, Nottingham, United Kingdom, pp. 374–379, 2002
Adler, F. H., “Physiology of the Eye,” St. Louis, MO: Mosby, 1965
Davson, H., “The Physiology of the Eye,” 2nd ed. Boston, MA: Little, Brown & Co., 1963
Snell, R. S. and M. A. Lemp, “Clinical anatomy of the eye,” 2nd Edition, Blackwell Science, 1998
Ivins, James P. and John Porrill, “A deformable model of the human iris for measuring small three-dimensional eye movements,” Machine Vision and Applications, vol. 11, str. 42–51, 1998
Gabor, Denis, “Theory of communication,” Proc. Inst. Electr. Eng., Vol. 93(III), pp. 429–457, 1946
Chinen, Troy T. and Todd R. Reed, “A Performance Analysis of Fast Gabor Transform Methods,” Graphical Models And Image Processing, Vol. 59, No. 3, pp. 117–127, May 1997
Bastiaans, Martin J., “Gabor's Expansion and the Zak Transform for Continuous-Time and Discrete-Time Signals,” w Josh Zeevi and Ronald Coifman (ed.), Signal and Image Representation in Combined Spaces, pp. 1–43, Academic Press, Inc., 1995
Fisher, B., S. Perkins, A. Walker, and E. Wolfart, Hypermedia Image Processing Reference, available online: http://www.cee.hw.ac.uk/hipr/html/hipr_top.html
Mallat, S. G., “Zero-crossing of wavelet transform,” IEEE Transactions Information Theory, vol. 37, no. 14, pp. 1019–1033, 1991
Chinen, Troy T., “A Performance Analysis of Fast Gabor Transform Methods,” Graphical Models and Image Processing, Vol. 59, No. 3, pp. 117–127, 1997
Mansfield, A. J. and J.L. Wayman, “Best Practises in Testing and Reporting Performance of Biometric Devices,” NPL Report CMSC 14/02, August 2002
Common Criteria Biometric Evaluation Methodology Working Group, “Common Methodology for Information Technology Security Evaluation. Biometric Evaluation Methodology Supplement,” August 2002
Cambier, Jim, “Biometric Data Interchange Formats—Part 6: Iris image data,” ISO/IEC 19794 Final Committee Draft
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer
About this paper
Cite this paper
Pacut, A., Czajka, A., Strzelczyk, P. (2005). IRIS Biometrics for Secure Remote Access. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds) Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol 196. Springer, Dordrecht. https://doi.org/10.1007/1-4020-3381-8_14
Download citation
DOI: https://doi.org/10.1007/1-4020-3381-8_14
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-3379-7
Online ISBN: 978-1-4020-3381-0
eBook Packages: Computer ScienceComputer Science (R0)