Retinal Angiography Based Authentication

  • C. Mariño
  • M. G. Penedo
  • M. J. Carreira
  • F. González
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2905)


Traditional authentication (identity verification) systems, employed to gain access to a private area in a building or to data stored in a computer, are based on something the user has (an authentication card, a magnetic key) or something the user knows (a password, an identification code). But emerging technologies allow for more reliable and comfortable for the user, authentication methods, most of them based in biometric parameters. Much work could be found in literature about biometric based authentication, using parameters like iris, voice, fingerprint, face characteristics, and others. In this work a novel authentication method is presented, and first results obtained are shown. The biometric parameter employed for the authentication is the retinal vessel tree, acquired through a retinal angiography. It has already been asserted by expert clinicians that the configuration of the retinal vessels is unique for each individual and that it does not vary in his life, so it is a very well suited identification characteristic. Before the verification process can be executed, a registration step is needed to align both the reference image and the picture to be verified. A fast and reliable registration method is used to perform that step, so that the whole authentication process takes very little time.


Image Registration Retinal Vessel Registration Method Authentication Process Authentication System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Daugman, J.G.: Biometric personal identification system based on iris analysis. United States Patent (5), 291–560 (1994)Google Scholar
  2. 2.
    Federal Bureau of Investigation. The science of fingerprints: Classifications and uses. Technical report, U.S.Government Printing Office, Washington D.C (1984)Google Scholar
  3. 3.
    Jain, A., Hong, L., Pankanti, S., Bolle, R.: An identity authentication system using fingerprints. Proceedings of the IEEE 85(9) (September 1997)Google Scholar
  4. 4.
    Zunkel, R.: Hand geometry based verification. In: BIOMETRICS:Personal Identification in Networked Society, Kluwert Academic Publishers, Dordrecht (1999)Google Scholar
  5. 5.
    Zhao, W., Chellappa, R., Rosenfeld, A., Phillips, P.: Face recognition: A literature survey. Technical report, National Institute of Standards and Technology (2000)Google Scholar
  6. 6.
    Bigüin, J., Chollet, C., Borgefors, G. (eds.): Proceedings of the 1st.International Conference on Audio- and Video-Based Biometric Person Authentication, Crans- Montana, Switzerland (March 1997)Google Scholar
  7. 7.
    Verlinde, P., Chollet, G., Acheroy, M.: Multi-modal identity verification using expert fusion. Information Fusion 1(1), 17–33 (2000)CrossRefGoogle Scholar
  8. 8.
    Brown, L.G.: A survey of image registration techniques. ACM Computer Surveys 24(4), 325–376 (1992)CrossRefGoogle Scholar
  9. 9.
    Maintz, J.B.A., Viergever, M.A.: A survey of medical image registration. Medical Image Analysis 2(1), 1–36 (1998)CrossRefGoogle Scholar
  10. 10.
    Lloret, D., Mariño, C., Serrat, J., López, A.M., Villanueva, J.J.: Landmark-based registration of full slo video sequences. In: Proceedings of the IX Spanish Symposium on Pattern Recognition and Image Analysis, vol. I, pp. 189–194 (2001)Google Scholar
  11. 11.
    Mariño, C., Penas, M., Penedo, M.G., Lloret, D., Carreira, M.J.: Integration of mutual information and creaseness based methods for the automatic registration of slo sequences. In: Proceedings of the SIARP 2001, VI Simpósio Ibero-Americano de Reconhecimento de Padrões, vol. I (2001)Google Scholar
  12. 12.
    López, A., Lloret, D., Serrat, J., Villanueva, J.J.: Multilocal creasness based on the level set extrinsic curvature. Computer Vision and Image Understanding 77, 111–144 (2000)CrossRefGoogle Scholar
  13. 13.
    Press, W., Teukolsky, S., Vetterling, W., Flannery, B.: Numerical Recipes in C, 2nd edn. Cambridge University Press, Cambridge (1992)zbMATHGoogle Scholar
  14. 14.
    Lloret, D., López, A., Serrat, J., Villanueva, J.J.: Creaseness-based CT and MR registration: comparison with the mutual information method. Journal of Electronic Imaging 8(3), 255–262 (1999)CrossRefGoogle Scholar
  15. 15.
    Lewis, J.P.: Fast template matching. In: Vision Interface, pp. 120–123 (1995)Google Scholar
  16. 16.
    Ehrenfeld, S., Littauer, S.B.: Introduction to Statistical Method, p. 132. McGraw-Hill, New York (1964)Google Scholar
  17. 17.
    Christensen, G.E., Johnson, H.J.: Consistent image registration. IEEE Trans. on Medical Imaging 20(7), 568–582 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • C. Mariño
    • 1
  • M. G. Penedo
    • 1
  • M. J. Carreira
    • 2
  • F. González
    • 3
  1. 1.Dep.ComputaciónUniversidade da CoruñaCoruña
  2. 2.Dep.Electrónica e ComputaciónFac.Física de Santiago de CompostelaSantiago de Compostela
  3. 3.Dep.Fisiología, Servicio de OftalmologíaCentro Hospitalario Universitario de SantiagoSantiago de Compostela

Personalised recommendations