Open Access Open Access  Restricted Access Subscription or Fee Access

Enhancement of Iris Biometric Recognition System Using Cryptography and Error Correction Codes – A Review

R. Manikandan, B.S. Sathishkumar, G. Jayaseelan

Abstract


The Main challenge on iris and most biometric identifier’s is the user variability in the acquired identifiers. The Iris of the same person captured in different time may differ due to the signal noise of the environment or the iris camera. In Error Correction Code, ECC is introduced to reduce the variability and noise of the iris data. To find best system performance, This paper reviews an approach is tested using 2 different distance metric measurement functions for the iris pattern matching identification process which are Hamming Distance and Weighted Euclidean Distance. An experiment with the CASIA version 1.0 iris database indicates that results can assure a higher security with a false acceptance rate (FAR).


Keywords


CASIA, ECC, FAR.

Full Text:

PDF

References


Kuo, C., Romanosky, S., and Cranor, L. F., ”Human selection of mnemonic phrase-based passwords”. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, vol. 149. ACM, New York, NY, 67-78.

Teoh, A.B.J., D.C.L. Ngo, and A. Goh, Personalised cryptographic key generation based on FaceHashing. Computers & Security, 2004. 23(7): pp. 606-614.

Jain A.K., Bolle R. and Pankanti S., “Biometrics: Personal Identification in Networked Society,” eds. Kluwer Academic, 1999.

Sheikh Ziauddin, Matthew N. Dailey, Robust iris verification for key management, Pattern Recognition Letters, In Press, Corrected Proof, Available online 4 January 2010, ISSN 0167-8655

Reed I. S. and Solomon G., “Polynomial Codes Over Certain Finite Fields” SIAM Journal of Applied Mathematics, Volume 8, pp. 300-304, 1960

Bowyer, K.W., K. Hollingsworth, and P.J. Flynn, Image understanding for iris biometrics: A survey. Computer Vision and Image Understanding, 2008. 110(2): p. 281-307.

Pattraporn A., Nongluk C., “An Improvement of Iris Pattern Identification Using Radon Transform,” ECTI Transactions On Computer And Information Technology, vol. 3, No.1 May 2007, pp. 45–50.

Wildes, R.P., Asmuth, J.C., Green, G.L., Hsu, S.C., Kolczynski, R.J.,Matey, J.R., McBride, S.E.: A System for Automated Iris Recognition. In: Proc. of the 2nd IEEE Workshop on Applicant Computer Vision, pp. 121–128 (1994)

Wildes, R.P.: Iris Recognition: An Emerging Biometric Technology. Proceedings of IEEE 85, 1348–1363 (1997)

Chen, C., Chu, C.: Low Complexity Iris Recognition Based on Wavelet Probabilistic Neural Networks. In: Proceeding of International Joint Conference on Neural Networks, pp. 1930–1935 (2005)

John Daugman, Biometric personal identification system based on iris analysis. U.S. Patern No. 5,291,560, March 1994.

Davida G. I., Frankel Y., and Matt B. J., “On enabling secure applications through off-line biometric identification,” in Proc. 1998 IEEE Symp. Privacy and Security, pp. 148–157.

Ratha N. K., Chikkerur S., Connell J. H., and Bolle R. M., “Generating cancelable fingerprint templates,“ IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, no. 2, pp. 561-572, April 2007.

Savvides M., Kumar B. V., and Khosla P., “Cancelable biometric filters for face recognition,” in Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), vol. 3, August 2004, pp.922–925.

Soutar C., Roberge D., Stojanov S. A., Gilroy R., and Vijaya B. V. K. Kumar, “Biometric encryption using image processing,” in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, 1998, pp. 178–188.

Juels A. and Wattenberg M., “A Fuzzy Commitment Scheme,” in Proceedings of Sixth ACM Conference on Computer and Communications Security, Singapore, November 1999, pp. 28–36.

Monrose F., Reiter M., Li Q., and Wetzel S., “Cryptographic key generation from voice,” in Proceedings of the IEEE Symposium on Security and Privacy, May 2001, pp. 202–213.

Hao F., Anderson R., and Daugman J., “Combining crypto with biometrics effectively,” IEEE Transactions on Computers, vol. 55, no. 9, pp.1081–1088, 2006.

Xiangqian Wu, Kuanquan Wang, David Zhang, “A cryptosystem based on palmprint feature,” ICPR 2008, pp. 1-4.

Wu, X., Qi, N., Wang, K., and Zhang, D., “ A Novel Cryptosystem Based on Iris Key Generation”. In Proceedings of the 2008 Fourth

international Conference on Natural Computation - Volume 04 (October 18 - 20, 2008). ICNC. IEEE Computer Society, Washington, DC, 53-56.

Daugman J. G., “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Patterm Anal. Machine Intell., vol. 15, pp. 1148–1161, Nov. 1993.

Tee C., Andrew T., Michael G., David N., “Palmprint Recognition with PCA and ICA”, Faculty of Information Sciences and Technology, Multimedia University, Melaka, Malaysia, Palmerston North, November 2003.

Sim Hiew Moi, Nazeema Binti Abdul Rahim, Puteh Saad, Pang Li Sim, Zalmiyah Zakaria, Subariah Ibrahim, "Iris Biometric Cryptography for Identity Document," 2009 International Conference of Soft Computing and Pattern Recognition, IEEE Computer Society Conference on, pp. 736-741, Dec 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.