Skip to main content

IRIS Biometrics for Secure Remote Access

  • Conference paper
Cyberspace Security and Defense: Research Issues

Abstract

We propose a new iris texture coding technique with optimal feature extraction, and design a secure remote (internet) access system using the proposed biometrics. The proposed iris coding method is based on Zak-Gabor coefficients sequence, and additionally uses an optimal selection of a subset of iris features. The secure access involves a communication scenario that employs a usual client-server network model, thus incorporating standard security mechanisms with biometric enhancements. The proposed access scenario enables to include the aliveness detection capability and the biometric replay attack prevention.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Flom and Safir, “Iris recognition system,” United State Patent 4.641.349, February 3, 1987

    Google Scholar 

  2. Daugman, John, “Biometric identification system based on iris analysis,” United States Patent 5.291.560, March 1, 1994

    Google Scholar 

  3. Wildes, Richard P., et al., “Automated, non-invasive iris recognition system and method,” United States Patent 5.572.596, November 5, 1996

    Google Scholar 

  4. Kim, Daniel Daehoon, et al., “Iris identification system and method of identifying a person through iris recognition,” United States Patent 6.247.813, June 19, 2001

    Google Scholar 

  5. Zhu, Y., T. Tan, and Y. Wang, “Iris image acquisition system,” Chinese Patent Application No. 99217063.X, 1999

    Google Scholar 

  6. Zhu, Y., T. Tan, and Y. Wang, “Biometric Personal Identification System Based on Iris Pattern,” Chinese Patent Application No. 9911025.6, 1999

    Google Scholar 

  7. Matsushita, et al., “Iris identification system and iris identification method,” United States Patent 5.901.238, May 4, 1999

    Google Scholar 

  8. Doster, et al., “Iris recognition apparatus and method,“ United States Patent 5.956.122, September 21, 1999

    Google Scholar 

  9. Mann, et al., “System and method for aircraft passenger check-in and boarding using iris recognition,” United States Patent 6.119.096, September 12, 2000

    Google Scholar 

  10. McHugh, et al., “Handheld iris imaging apparatus and method,” United States Patent 6.289.113, September 11, 2001

    Google Scholar 

  11. Musgrave, et al., “Iris imaging telephone security module and method,” United States Patent 6.377.699, April 23, 2002

    Google Scholar 

  12. Boles, W. W. and B. Boashash, “A Human Identification Technique Using Images of te Iris and Wavelet Transform,” IEEE Transactions on Signal Processing, Vol. 46, No. 4, April 1998

    Google Scholar 

  13. Tieniu, Tan, “Identity identifying method based on iris identification and its equipment,” State Intellectual Property Office of the People's Republic of China, No. 1282048, applicant: Institute of Automation, Chinese Academy of Science, January 31, 2001

    Google Scholar 

  14. Wildes, Richard Patrick, Jane Circle Asmuth, Keith James Hanna, Stephen Charles Hsu, Raymond Joseph Kolczynski, James Regis Matey, and Sterling Eduard McBridge, “Automated, non-invasive iris recognition system and method,” United States Patent US 5,572,596, assignee: David Sarnoff Research Center Inc., Princeton, N.J., USA, November 5, 1996

    Google Scholar 

  15. Czajka, Adam and Andrzej Pacut, “Zak's transform for automatic identity verification,” Proceedings of the 4th International Conference on Recent Advances in Soft Computing RASC2002, 12–13 December 2002, Nottingham, United Kingdom, pp. 374–379, 2002

    Google Scholar 

  16. Adler, F. H., “Physiology of the Eye,” St. Louis, MO: Mosby, 1965

    Google Scholar 

  17. Davson, H., “The Physiology of the Eye,” 2nd ed. Boston, MA: Little, Brown & Co., 1963

    Google Scholar 

  18. Snell, R. S. and M. A. Lemp, “Clinical anatomy of the eye,” 2nd Edition, Blackwell Science, 1998

    Google Scholar 

  19. Ivins, James P. and John Porrill, “A deformable model of the human iris for measuring small three-dimensional eye movements,” Machine Vision and Applications, vol. 11, str. 42–51, 1998

    Article  Google Scholar 

  20. Gabor, Denis, “Theory of communication,” Proc. Inst. Electr. Eng., Vol. 93(III), pp. 429–457, 1946

    Google Scholar 

  21. Chinen, Troy T. and Todd R. Reed, “A Performance Analysis of Fast Gabor Transform Methods,” Graphical Models And Image Processing, Vol. 59, No. 3, pp. 117–127, May 1997

    Article  Google Scholar 

  22. Bastiaans, Martin J., “Gabor's Expansion and the Zak Transform for Continuous-Time and Discrete-Time Signals,” w Josh Zeevi and Ronald Coifman (ed.), Signal and Image Representation in Combined Spaces, pp. 1–43, Academic Press, Inc., 1995

    Google Scholar 

  23. Fisher, B., S. Perkins, A. Walker, and E. Wolfart, Hypermedia Image Processing Reference, available online: http://www.cee.hw.ac.uk/hipr/html/hipr_top.html

    Google Scholar 

  24. Mallat, S. G., “Zero-crossing of wavelet transform,” IEEE Transactions Information Theory, vol. 37, no. 14, pp. 1019–1033, 1991

    Article  MathSciNet  Google Scholar 

  25. Chinen, Troy T., “A Performance Analysis of Fast Gabor Transform Methods,” Graphical Models and Image Processing, Vol. 59, No. 3, pp. 117–127, 1997

    Article  Google Scholar 

  26. Mansfield, A. J. and J.L. Wayman, “Best Practises in Testing and Reporting Performance of Biometric Devices,” NPL Report CMSC 14/02, August 2002

    Google Scholar 

  27. Common Criteria Biometric Evaluation Methodology Working Group, “Common Methodology for Information Technology Security Evaluation. Biometric Evaluation Methodology Supplement,” August 2002

    Google Scholar 

  28. Cambier, Jim, “Biometric Data Interchange Formats—Part 6: Iris image data,” ISO/IEC 19794 Final Committee Draft

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer

About this paper

Cite this paper

Pacut, A., Czajka, A., Strzelczyk, P. (2005). IRIS Biometrics for Secure Remote Access. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds) Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol 196. Springer, Dordrecht. https://doi.org/10.1007/1-4020-3381-8_14

Download citation

  • DOI: https://doi.org/10.1007/1-4020-3381-8_14

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-3379-7

  • Online ISBN: 978-1-4020-3381-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics