PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

The Template Selection in Biometric Systems Based on Binary Iris Codes

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Since the variability of data within readings from the same person is intrinsic property of every biometric system, the problem of finding a good representative - the template - was recognized and present since the beginning of biometrics. This problem was solved differently for different biometric types, yet usually the template somehow averages the collected data samples. However, for the iris type, the template is usually just one or a few samples. In this paper we describe the experiments that suggest that the averaging is also justified in case of iris template creation. This is an important fact, which can significantly improve a performance of biometric template protection methods for iris.
Rocznik
Tom
Strony
86--92
Opis fizyczny
Bibliogr. 18 poz., rys., tab.
Twórcy
  • Research and Academic Computer Network (NASK), Biometric Laboratories, Wąwozowa st 18, 02-796 Warsaw, Poland, Marcin.Chochowski@nask.pl
Bibliografia
  • [1] ISO/IEC, “CD 24745.2 Information technology – Security techniques – Biometric template protection”.
  • [2] A. K. Jain, K. Nandakumar and A. Nagar, “Biometric template security”, EURASIP J. Adv. Sign. Proces., Spec. Issue Adv. Sign. Proces. Patt. Recogn. Meth. Biometr., pp. 1–17, Jan. 2008.
  • [3] R. Sanchez-Reillo and C. Sanchez-Avila, “Biometric identification through hand geometry measurements”, IEEE Trans. Patt. Anal. Mach. Intell., vol. 22, no. 10, pp. 1168–1171, 2000.
  • [4] L. Stasiak, “Weryfikacja tożsamości poprzez wykorzystanie cech dłoni”, M.Sc. thesis, Institute of Control and Computation Engineering, Warsaw University of Technology, Warsaw, 2004.
  • [5] U. Uludag, A. Ross, and A. K. Jain, “Biometric template selection and update: a case study in fingerprints”, Patt. Recogn., vol. 37, no. 7, pp. 1533–1542, 2004.
  • [6] A. Ross, S. Shah, and J. Shah, “Image versus feature mosaicing: a case study in fingerprints”, in Proc. SPIE, Biometric Technologies for Human Identification III, Orlando, USA, 2006, vol. 6202, pp. 1–12.
  • [7] A. Juels and M. Sudan, “A fuzzy vault scheme”, in IEEE Int. Symp. Infor. Theory, Lausanne, Switzerland, 2002, pp. 408–421.
  • [8] K. Nandakumar, A. K. Jain and S. Pankanti, “Fingerprint-based fuzzy vault: implementation and performance”, IEEE Trans. Inform. Foren. Secur., issue 4, vol. 2, pp. 744–757, 2007.
  • [9] J. Putz-Leszczyńska and A. Pacut, “Hidden signature – a new solution for on-line verification using DTW”, in Proc. 42nd Ann. IEEE Int.l Carnahan Conf. Secur. Technol. ICCST 2008, Prague, Czech Republic, 2008, pp. 162–166.
  • [10] E. Krichen, A. Mellakh, S. Salicetti, and B. Dorizzi, “OSIRIS (Open Source for IRIS) reference system”, BioSecure Project [On-line]. Available: http://www.cilab.upf.edu/biosecure1/public docsdeli/BioSecure Deliverable D02-2-2 b4.pdf.pdf
  • [11] L. Masek and P. Kovesi, MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. The School of Computer Science and Software Engineering, The University of Western Australia, 2003.
  • [12] “VeriEye 2.2 SDK” [Online]. Available: www.neurotechnology.com
  • [13] “BiomIris SDK” [Online]. Available: www.BiometricLabs.pl
  • [14] G. I. Davida, Y. Frankel, and B. J. Matt, “On enabling secure applications through off-line biometric identification”, in Proc. IEEE Symp. Secur. Priv. 1998, Oakland, USA, 1998, pp. 148–157, 1998.
  • [15] F. Hao, R. Anderson, and J. Daugman, “Combining cryptography with biometrics effectively”, Techn. Rep. UCAM-CL-TR-640, University of Cambridge, 2005.
  • [16] A. Pacut, A. Czajka, and P. Strzelczyk, “Iris biometrics for secure remote access”, in Cyberspace Security and Defense: Research Issues, J. S. Kowalik et al., Eds. Dordrecht: Springer, 2005, pp. 259–278.
  • [17] J. Daugman, “High confidence personal identification by rapid video analysis of iris texture”, in Proc. IEEE Int. Carnahan Conf. Secur. Technol., Atlanta USA, 1992, pp. 50–60.
  • [18] N. Yager and T. Dunstone, “The Biometric Menagerie”, IEEE Trans. Patt. Anal. Mach. Intell., vol. 32, no. 2, pp. 220–230, 2010.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT8-0020-0021
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.