Skip to main content

Secure Iris Recognition Based on Local Intensity Variations

  • Conference paper
Image Analysis and Recognition (ICIAR 2010)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6112))

Included in the following conference series:

Abstract

In this paper we propose a fast and efficient iris recognition algorithm which makes use of local intensity variations in iris textures. The presented system provides fully revocable biometric templates suppressing any loss of recognition performance.

This work has been supported by the Austrian Science Fund, project no. L554-N15.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. on Circuits and Systems for Video Technology 14, 4–20 (2004)

    Article  Google Scholar 

  2. Jain, A.K., Flynn, P.J., Ross, A.A.: Handbook of Biometrics. Springer, Heidelberg (2008)

    Book  Google Scholar 

  3. Bowyer, K., Hollingsworth, K., Flynn, P.: Image understanding for iris biometrics: a survey. Computer Vision and Image Understanding 110, 281–307 (2008)

    Article  Google Scholar 

  4. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process., 1–17 (2008)

    Google Scholar 

  5. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  6. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 614–634 (2001)

    Article  Google Scholar 

  7. Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 1148–1161 (1993)

    Article  Google Scholar 

  8. Daugman, J.: How Iris Recognition Works. IEEE Trans. CSVT 14(1), 21–30 (2004)

    Google Scholar 

  9. Wildes, R.P.: Iris recognition: an emerging biometric technology. Proceedings of the IEEE 85, 1348–1363 (1997)

    Article  Google Scholar 

  10. Ma, L., Tan, T., Wang, Y., Zhang, D.: Efficient Iris Recognition by Characterizing Key Local Variations. IEEE Transactions on Image Processing 13(6), 739–750 (2004)

    Article  Google Scholar 

  11. Masek, L.: Recognition of Human Iris Patterns for Biometric Identification, Master’s thesis, University of Western Australia (2003)

    Google Scholar 

  12. Chenhong, L., Zhaoyang, L.: Effcient iris recognition by computing discriminable textons. In: Interantional Conference on Neural Networks and Brain, vol. 2, pp. 1164–1167 (2005)

    Google Scholar 

  13. Chou, C.T., Shih, S.W., Chen, W.S., Cheng, V.W.: Iris recognition with multi-scale edge-type matching. In: Interantional Conference on Pattern Recognition, pp. 545–548 (2006)

    Google Scholar 

  14. Ko, J.G., Gil, Y.H., Yoo, J.H.: Iris Recognition using Cumulative SUM based Change Analysis. In: Intelligent Signal Processing and Communications, ISPACS’06, pp. 275–278 (2006)

    Google Scholar 

  15. Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: Proc. of IEEE, Symp. on Security and Privacy, pp. 148–157 (1998)

    Google Scholar 

  16. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Sixth ACM Conference on Computer and Communications Security, pp. 28–36 (1999)

    Google Scholar 

  17. Zuiderveld, K.: Contrast Limited Adaptive Histogram Equalization. In: Graphics Gems IV, pp. 474–485. Morgan Kaufmann, San Francisco (1994)

    Google Scholar 

  18. The Center of Biometrics and Security Research: CASIA Iris Image Database, http://www.sinobiometrics.com

  19. Zuo, J., Ratha, N.K., Connel, J.H.: Cancelable iris biometric. In: Proceedings of the 19th International Conference on Pattern Recognition (ICPR’08), pp. 1–4 (2008)

    Google Scholar 

  20. Hämmerle-Uhl, J., Pschernig, E., Uhl, A.: Cancelable iris biometrics using block re-mapping and image warping. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 135–142. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rathgeb, C., Uhl, A. (2010). Secure Iris Recognition Based on Local Intensity Variations. In: Campilho, A., Kamel, M. (eds) Image Analysis and Recognition. ICIAR 2010. Lecture Notes in Computer Science, vol 6112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13775-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13775-4_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13774-7

  • Online ISBN: 978-3-642-13775-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics