Skip to main content

Robust and Secure Iris Recognition

  • Chapter
  • First Online:
Handbook of Iris Recognition

Part of the book series: Advances in Computer Vision and Pattern Recognition ((ACVPR))

Abstract

Iris biometric entails using the patterns on the iris as a biometric for personal authentication. It has additional benefits over contact-based biometrics such as fingerprints and hand geometry. However, iris biometric often suffers from the following three challenges: ability to handle unconstrained acquisition, privacy enhancement without compromising security, and robust matching. This chapter discusses a unified framework based on sparse representations and random projections that can address these issues simultaneously. Furthermore, recognition from iris videos as well as generation of cancelable iris templates for enhancing the privacy and security is also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Baraniuk, Compressive sensing. IEEE Sig. Process. Mag. 24(4), 118–121 (2007)

    Article  MathSciNet  Google Scholar 

  2. J.D. Blanchard, C. Cartis, J. Tanner, The restricted isometry property and \(\ell _{q}\) regularization: phase transition for sparse approximation. preprint

    Google Scholar 

  3. R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches. Pattern Recogn. 35(12), 2727–2738 (2002)

    Article  MATH  Google Scholar 

  4. K.W. Bowyer, P.J. Flynn, The ND-IRIS-0405 Iris Image Dataset

    Google Scholar 

  5. K.W. Bowyer, K. Hollingsworth, P.J. Flynn, Image understanding for iris biometrics: a survey. Comput. Vis. Image Underst. 110(2), 281–307 (2008)

    Article  Google Scholar 

  6. E. Candes, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inform. Theor. 52(2), 489–509 (2006)

    Google Scholar 

  7. E. Candes, J. Romberg, T. Tao, Stable signal recovery from incomplete and inaccurate measurements. Commun. Pure Appl. Math. 59, 1207–1223 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  8. Y. Chen, S.C. Dass, A.K. Jain, Localized iris image quality using 2-D wavelets, in Lecture Notes in Computer Science, vol. 3832 (Springer, 2006), pp. 373–381

    Google Scholar 

  9. J. Daugman, High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 15, 1148–1161 (1993)

    Article  Google Scholar 

  10. G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in IEEE Symposiam on Security and Privacy (1998), pp. 148–157

    Google Scholar 

  11. D.L. Donoho, High-Dimensional centrally symmetric polytopes with neighborliness proportional to dimension. Discrete Comput. Geom. 35(4), 617–652 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  12. Y. Du, N.L. Thomas, E. Arslanturk, Multi-level iris video image thresholding, in IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, (CIB) (Mar. 2009), pp. 38–45

    Google Scholar 

  13. F. Hao, R. Anderson, J. Daugman, Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)

    Article  Google Scholar 

  14. K.P. Hollingsworth, K.W. Bowyer, P.J. Flynn, Image Averaging for Improved Iris Recognition. Lecture Notes in Computer Science, vol. 5558 (2009)

    Google Scholar 

  15. A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Sig. Process. Spec. Issue Biometrics 2008(113), 1–17 (2008)

    Article  Google Scholar 

  16. A. Juels, M. Wattenberg, A fuzzy commitment scheme, in ACM Conference on Computers and Communications Security (1999), pp. 28–36

    Google Scholar 

  17. S. Kanade, D. Petrovska-Delacretaz, B. Dorizzi, Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data, in Computer Vision and Pattern Recognition (2009)

    Google Scholar 

  18. E. Krichen et al., Specific texture analysis for iris recognition. Lecture Notes in Computer Science, vol 3546 (Springer, Heidelberg, 2005), pp. 23–30

    Google Scholar 

  19. C. Liu, M. Xie, Iris recognition based on DLDA, in International Conference on Pattern Recognition (2006), pp. 489–492

    Google Scholar 

  20. L. Ma et al., Efficient iris recognition by characterizing key local variations. IEEE Trans. Image Process. 13(6), 739–750 (2004)

    Article  Google Scholar 

  21. L. Masek, P. Kovesi, MATLAB Source Code for a Biometric Identification System Based on Iris Patterns (2003)

    Google Scholar 

  22. E.M. Newton, P.J. Phillips, Meta-analysis of third-party evaluations of iris recognition. IEEE Trans. Syst. Man Cybern. 39(1), 4–11 (2009)

    Article  Google Scholar 

  23. P.J. Phillips, FRGC and ICE Workshop (2006)

    Google Scholar 

  24. P. Phillips et al, Overview of the multiple biometrics grand challenge, in Advances in Biometrics (2009), pp. 705–714

    Google Scholar 

  25. J.K. Pillai, V.M. Patel, R. Chellappa, Sparsity Inspired Selection and Recognition of Iris Images, in Third IEEE International Conference on Biometrics–Technology and Systems (2009)

    Google Scholar 

  26. J.K. Pillai, V.M. Patel, R. Chellappa, Sparsity inspired selection and recognition of iris images, in IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (Sept. 2009), pp. 1–6

    Google Scholar 

  27. J.K. Pillai et al, Sectored random projections for cancelable iris biometrics, in International Conference on Acoustics, Speech, and Signal Processing (2009)

    Google Scholar 

  28. N.K. Ratha, J.H. Connel, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  29. H. Rauhut, K. Schnass, P. Vandergheynst, Compressed sensing and redundant dictionaries. IEEE Trans. Inform.Theor. 54(5), 2210–2219 (2008)

    Google Scholar 

  30. K. Roy, P. Bhattacharya, Iris recognition with support vector machines, in International Conference on Biometrics (2006), pp. 486–492

    Google Scholar 

  31. N.A. Schmid, F. Nicolo, A method for selecting and ranking quality metrics for optimization of biometric recognition systems, in Computer Vision and Pattern Recognition Workshops (CVPR Workshops) (June 2009), pp. 126–133

    Google Scholar 

  32. Specification of CASIA Iris Image Database(ver 1.0), Chinese Academy of Sciences (Mar. 2007), http://www.nlpr.ia.ac.cn/english/irds/irisdatabase.htm

  33. A. Teoh, A. Goh, D. Ngo, Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892–1901 (2006)

    Article  Google Scholar 

  34. West Virginia University Iris Dataset

    Google Scholar 

  35. J. Wright et al., Robust face recognition via sparse representation. IEEE Trans. Pattern Anal. Mach. Intell. 31(2), 210–227 (2009)

    Article  Google Scholar 

  36. J. Zuo, N. Ratha, J. Connell, Cancelable Iris Biometric, in Proceeding of International Conference on Pattern Recognition (2008), pp. 1–4

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by a MURI grant N00014-08-1-0638 from the Office of Naval Research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag London

About this chapter

Cite this chapter

Pillai, J.K., Patel, V., Chellappa, R., Ratha, N. (2016). Robust and Secure Iris Recognition. In: Bowyer, K., Burge, M. (eds) Handbook of Iris Recognition. Advances in Computer Vision and Pattern Recognition. Springer, London. https://doi.org/10.1007/978-1-4471-6784-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6784-6_11

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6782-2

  • Online ISBN: 978-1-4471-6784-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics