Skip to main content
Top

2016 | OriginalPaper | Chapter

11. Robust and Secure Iris Recognition

Authors : Jaishanker K. Pillai, Vishal Patel, Rama Chellappa, Nalini Ratha

Published in: Handbook of Iris Recognition

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Iris biometric entails using the patterns on the iris as a biometric for personal authentication. It has additional benefits over contact-based biometrics such as fingerprints and hand geometry. However, iris biometric often suffers from the following three challenges: ability to handle unconstrained acquisition, privacy enhancement without compromising security, and robust matching. This chapter discusses a unified framework based on sparse representations and random projections that can address these issues simultaneously. Furthermore, recognition from iris videos as well as generation of cancelable iris templates for enhancing the privacy and security is also discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference J.D. Blanchard, C. Cartis, J. Tanner, The restricted isometry property and \(\ell _{q}\) regularization: phase transition for sparse approximation. preprint J.D. Blanchard, C. Cartis, J. Tanner, The restricted isometry property and \(\ell _{q}\) regularization: phase transition for sparse approximation. preprint
3.
go back to reference R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches. Pattern Recogn. 35(12), 2727–2738 (2002)CrossRefMATH R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches. Pattern Recogn. 35(12), 2727–2738 (2002)CrossRefMATH
4.
go back to reference K.W. Bowyer, P.J. Flynn, The ND-IRIS-0405 Iris Image Dataset K.W. Bowyer, P.J. Flynn, The ND-IRIS-0405 Iris Image Dataset
5.
go back to reference K.W. Bowyer, K. Hollingsworth, P.J. Flynn, Image understanding for iris biometrics: a survey. Comput. Vis. Image Underst. 110(2), 281–307 (2008)CrossRef K.W. Bowyer, K. Hollingsworth, P.J. Flynn, Image understanding for iris biometrics: a survey. Comput. Vis. Image Underst. 110(2), 281–307 (2008)CrossRef
6.
go back to reference E. Candes, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inform. Theor. 52(2), 489–509 (2006) E. Candes, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inform. Theor. 52(2), 489–509 (2006)
7.
go back to reference E. Candes, J. Romberg, T. Tao, Stable signal recovery from incomplete and inaccurate measurements. Commun. Pure Appl. Math. 59, 1207–1223 (2006)MathSciNetCrossRefMATH E. Candes, J. Romberg, T. Tao, Stable signal recovery from incomplete and inaccurate measurements. Commun. Pure Appl. Math. 59, 1207–1223 (2006)MathSciNetCrossRefMATH
8.
go back to reference Y. Chen, S.C. Dass, A.K. Jain, Localized iris image quality using 2-D wavelets, in Lecture Notes in Computer Science, vol. 3832 (Springer, 2006), pp. 373–381 Y. Chen, S.C. Dass, A.K. Jain, Localized iris image quality using 2-D wavelets, in Lecture Notes in Computer Science, vol. 3832 (Springer, 2006), pp. 373–381
9.
go back to reference J. Daugman, High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 15, 1148–1161 (1993)CrossRef J. Daugman, High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 15, 1148–1161 (1993)CrossRef
10.
go back to reference G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in IEEE Symposiam on Security and Privacy (1998), pp. 148–157 G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in IEEE Symposiam on Security and Privacy (1998), pp. 148–157
11.
go back to reference D.L. Donoho, High-Dimensional centrally symmetric polytopes with neighborliness proportional to dimension. Discrete Comput. Geom. 35(4), 617–652 (2006)MathSciNetCrossRefMATH D.L. Donoho, High-Dimensional centrally symmetric polytopes with neighborliness proportional to dimension. Discrete Comput. Geom. 35(4), 617–652 (2006)MathSciNetCrossRefMATH
12.
go back to reference Y. Du, N.L. Thomas, E. Arslanturk, Multi-level iris video image thresholding, in IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, (CIB) (Mar. 2009), pp. 38–45 Y. Du, N.L. Thomas, E. Arslanturk, Multi-level iris video image thresholding, in IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, (CIB) (Mar. 2009), pp. 38–45
13.
go back to reference F. Hao, R. Anderson, J. Daugman, Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)CrossRef F. Hao, R. Anderson, J. Daugman, Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)CrossRef
14.
go back to reference K.P. Hollingsworth, K.W. Bowyer, P.J. Flynn, Image Averaging for Improved Iris Recognition. Lecture Notes in Computer Science, vol. 5558 (2009) K.P. Hollingsworth, K.W. Bowyer, P.J. Flynn, Image Averaging for Improved Iris Recognition. Lecture Notes in Computer Science, vol. 5558 (2009)
15.
go back to reference A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Sig. Process. Spec. Issue Biometrics 2008(113), 1–17 (2008)CrossRef A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Sig. Process. Spec. Issue Biometrics 2008(113), 1–17 (2008)CrossRef
16.
go back to reference A. Juels, M. Wattenberg, A fuzzy commitment scheme, in ACM Conference on Computers and Communications Security (1999), pp. 28–36 A. Juels, M. Wattenberg, A fuzzy commitment scheme, in ACM Conference on Computers and Communications Security (1999), pp. 28–36
17.
go back to reference S. Kanade, D. Petrovska-Delacretaz, B. Dorizzi, Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data, in Computer Vision and Pattern Recognition (2009) S. Kanade, D. Petrovska-Delacretaz, B. Dorizzi, Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data, in Computer Vision and Pattern Recognition (2009)
18.
go back to reference E. Krichen et al., Specific texture analysis for iris recognition. Lecture Notes in Computer Science, vol 3546 (Springer, Heidelberg, 2005), pp. 23–30 E. Krichen et al., Specific texture analysis for iris recognition. Lecture Notes in Computer Science, vol 3546 (Springer, Heidelberg, 2005), pp. 23–30
19.
go back to reference C. Liu, M. Xie, Iris recognition based on DLDA, in International Conference on Pattern Recognition (2006), pp. 489–492 C. Liu, M. Xie, Iris recognition based on DLDA, in International Conference on Pattern Recognition (2006), pp. 489–492
20.
go back to reference L. Ma et al., Efficient iris recognition by characterizing key local variations. IEEE Trans. Image Process. 13(6), 739–750 (2004)CrossRef L. Ma et al., Efficient iris recognition by characterizing key local variations. IEEE Trans. Image Process. 13(6), 739–750 (2004)CrossRef
21.
go back to reference L. Masek, P. Kovesi, MATLAB Source Code for a Biometric Identification System Based on Iris Patterns (2003) L. Masek, P. Kovesi, MATLAB Source Code for a Biometric Identification System Based on Iris Patterns (2003)
22.
go back to reference E.M. Newton, P.J. Phillips, Meta-analysis of third-party evaluations of iris recognition. IEEE Trans. Syst. Man Cybern. 39(1), 4–11 (2009)CrossRef E.M. Newton, P.J. Phillips, Meta-analysis of third-party evaluations of iris recognition. IEEE Trans. Syst. Man Cybern. 39(1), 4–11 (2009)CrossRef
23.
go back to reference P.J. Phillips, FRGC and ICE Workshop (2006) P.J. Phillips, FRGC and ICE Workshop (2006)
24.
go back to reference P. Phillips et al, Overview of the multiple biometrics grand challenge, in Advances in Biometrics (2009), pp. 705–714 P. Phillips et al, Overview of the multiple biometrics grand challenge, in Advances in Biometrics (2009), pp. 705–714
25.
go back to reference J.K. Pillai, V.M. Patel, R. Chellappa, Sparsity Inspired Selection and Recognition of Iris Images, in Third IEEE International Conference on Biometrics–Technology and Systems (2009) J.K. Pillai, V.M. Patel, R. Chellappa, Sparsity Inspired Selection and Recognition of Iris Images, in Third IEEE International Conference on Biometrics–Technology and Systems (2009)
26.
go back to reference J.K. Pillai, V.M. Patel, R. Chellappa, Sparsity inspired selection and recognition of iris images, in IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (Sept. 2009), pp. 1–6 J.K. Pillai, V.M. Patel, R. Chellappa, Sparsity inspired selection and recognition of iris images, in IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (Sept. 2009), pp. 1–6
27.
go back to reference J.K. Pillai et al, Sectored random projections for cancelable iris biometrics, in International Conference on Acoustics, Speech, and Signal Processing (2009) J.K. Pillai et al, Sectored random projections for cancelable iris biometrics, in International Conference on Acoustics, Speech, and Signal Processing (2009)
28.
go back to reference N.K. Ratha, J.H. Connel, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)CrossRef N.K. Ratha, J.H. Connel, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)CrossRef
29.
go back to reference H. Rauhut, K. Schnass, P. Vandergheynst, Compressed sensing and redundant dictionaries. IEEE Trans. Inform.Theor. 54(5), 2210–2219 (2008) H. Rauhut, K. Schnass, P. Vandergheynst, Compressed sensing and redundant dictionaries. IEEE Trans. Inform.Theor. 54(5), 2210–2219 (2008)
30.
go back to reference K. Roy, P. Bhattacharya, Iris recognition with support vector machines, in International Conference on Biometrics (2006), pp. 486–492 K. Roy, P. Bhattacharya, Iris recognition with support vector machines, in International Conference on Biometrics (2006), pp. 486–492
31.
go back to reference N.A. Schmid, F. Nicolo, A method for selecting and ranking quality metrics for optimization of biometric recognition systems, in Computer Vision and Pattern Recognition Workshops (CVPR Workshops) (June 2009), pp. 126–133 N.A. Schmid, F. Nicolo, A method for selecting and ranking quality metrics for optimization of biometric recognition systems, in Computer Vision and Pattern Recognition Workshops (CVPR Workshops) (June 2009), pp. 126–133
33.
go back to reference A. Teoh, A. Goh, D. Ngo, Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892–1901 (2006)CrossRef A. Teoh, A. Goh, D. Ngo, Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892–1901 (2006)CrossRef
34.
35.
go back to reference J. Wright et al., Robust face recognition via sparse representation. IEEE Trans. Pattern Anal. Mach. Intell. 31(2), 210–227 (2009)CrossRef J. Wright et al., Robust face recognition via sparse representation. IEEE Trans. Pattern Anal. Mach. Intell. 31(2), 210–227 (2009)CrossRef
36.
go back to reference J. Zuo, N. Ratha, J. Connell, Cancelable Iris Biometric, in Proceeding of International Conference on Pattern Recognition (2008), pp. 1–4 J. Zuo, N. Ratha, J. Connell, Cancelable Iris Biometric, in Proceeding of International Conference on Pattern Recognition (2008), pp. 1–4
Metadata
Title
Robust and Secure Iris Recognition
Authors
Jaishanker K. Pillai
Vishal Patel
Rama Chellappa
Nalini Ratha
Copyright Year
2016
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-6784-6_11

Premium Partner