An Efficient Biocryptosystem Based on the Iris Biometrics

  • Ali Shojaee Bakhtiari
  • Ali Asghar Beheshti Shirazi
  • Babak Zamanlooy
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4872)

Abstract

A new and efficient method for combining iris biometrics with custom cryptographic schemes to obtain an efficient biocryptosystem is proposed in this paper. Though the method structure is basically derived from a previously described biocryptosystem scheme, the introduction of new image processing methods alongside with efficient utilization of traditional methods show promising developments compared with the previous biocryposystem especially in the field of generating longer cryptographic key strings while keeping the system quality

Keywords

Authentication system biocryptosystem error correction coding iris segmentation 

References

  1. 1.
    Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55, 1081–1088 (2006)CrossRefGoogle Scholar
  2. 2.
    Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)MathSciNetMATHGoogle Scholar
  3. 3.
    Chen, W.: Linear Networks and Systems, Belmont, CA: Wadsworth, USA (1993)Google Scholar
  4. 4.
    Daugman, J.: How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology 14, 21–30 (2004)CrossRefGoogle Scholar
  5. 5.
    Shojaee Bakhtiari, A., Beheshti, A.-A, Zamanlooy, B.: Phase congruency based image enhancement method and its application in enhancing iris feature extraction. In: Proceedings of Iranian conference on electrical engineering (2007)Google Scholar
  6. 6.
    Kovesi, P.: Phase Congruency Detects Corners and Edges. School of Computer Science & Software Engineering, The University of Western Australia (2003)Google Scholar
  7. 7.
    Kong, W.-K, Zhang, D.: Accurate iris segmentation based on novel reflection and eyelash detection model. In: Proceedings of International Symposium on Intelligent Multimedia, Video and Speech processing (2001)Google Scholar
  8. 8.
    Daugman, J.: Biometric personal identification system based on iris analysis. US Patents 291560 (1994)Google Scholar
  9. 9.
    Morrone, M.C., Owens, R.A.: Feature detection from local energy. Pattern Recognition Letters 6, 303–313 (1987)CrossRefGoogle Scholar
  10. 10.
    Shojaee Bakhtiari, A.: Design of a Biocryptosystem Based on the Key Extracted from the Iris Biometrics. School of Electrical Engineering, MSc Thesis, Iran University of Science and Technology, Tehran, Iran (2007)Google Scholar
  11. 11.
    National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, http://www.cbsr.ia.ac.cn
  12. 12.
    Canny, J.: A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence 8, 679–714 (1986)CrossRefGoogle Scholar
  13. 13.
    Kovesi, P.D.: MATLAB Code for Calculating Phase Congruency and Phase Symmetry Asymmetry (1996), http://www.cs.uwa.edu.au/_pk/Research/MatlabFns/

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ali Shojaee Bakhtiari
    • 1
  • Ali Asghar Beheshti Shirazi
    • 1
  • Babak Zamanlooy
    • 1
  1. 1.Department of Electrical Engineering, Iran University of Science and Technology, Narmak, 16846, TehranIran

Personalised recommendations