PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Privacy Preserving and Secure Iris-Based Biometric Authentication for Computer Networks

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The iris biometrics is considered one of the most accurate and robust methods of the identity verification. The unique iris features of an individual can be presented in a compact binary form which can be easily compared with the reference template to confirm identity. However in contrast to passwords and PINs biometric authentication factors cannot be revoked and changed as they are inherently connected to our characteristics. Once the biometric information is compromised or disclosed it became useless for the purpose of authentication. Therefore there is a need to perform iris features matching without revealing the features itself and the reference template. We propose an extension of the standard irisbased verification protocol which introduces a features and template locking mechanism, which guarantee that no sensitive information is exposed. Presented solutions can be easily integrated into authentication mechanisms used in modern computer networks.
Rocznik
Tom
Strony
115--118
Opis fizyczny
Bibliogr. 15 poz., rys., fot.
Twórcy
Bibliografia
  • [1] L. Flom and A. Safir, “Iris Recognition System”, February 3, 1987. US Patent 4,641,349.
  • [2] J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence”, IEEE Trans. Pattern Anal. Machine Intell., vol. 15, no. 11, pp. 1148–1161, 1993.
  • [3] J. G. Daugman, “Biometric Personal Identification System Based on Iris Analysis”, US Patent 5,291,560, March 1, 1994.
  • [4] A. Czajka and A. Pacut, “Iris recognition with adaptive coding”, Rough Sets and Knowledge Technology, Lecture Notes in Artifical Intelligence, vol. 4481, Springer, 2007, pp. 195–202.
  • [5] J. Daugman, “How iris recognition works”, IEEE Trans. Circ. Sys. Video Technol., vol. 14, no. 1, pp. 21–30, 2004.
  • [6] H. J. Wyatt, “A minimum-wear-and-tear’meshwork for the iris”, Vision Res., vol. 40, no. 16, pp. 2167–2176, 2000.
  • [7] W. W Boles and B. Boashash, “A human identification technique using images of the iris and wavelet transform”, IEEE Trans. Signal Process, vol. 46, no. 4, pp. 1185–1188, 1998.
  • [8] L. Chenhong and L. Zhaoyang, Efficient iris recognition by computing discriminable textons”, in Proc. Int. Conf. Neural Netw. Brain ICNN&B’05, Beijing, China, 2005, vol. 2, pp. 1164–1167
  • [9] C. T. Chou, S. W. Shih, W. S. Chen, and V. W. Cheng, “Iris recognition with multi-scale edge-type matching”, Pattern Recogn., vol. 4, pp. 545–548, 2006.
  • [10] J. Thornton, M. Savvides, and B. V. K. Kumar, “An evaluation of iris pattern representations”, in Proc. First IEEE Int. Conf. Biometrics: Theory, Appl. Systems BTAS 2007, Washington, DC, USA, 2007, pp. 1–6.
  • [11] P. Yao, J. Li, X. Ye, Z. Zhuang, and B. Li, “Iris recognition algorithm using modified log-gabor filters”, Pattern Recogn., vol. 4, pp. 461–464, 2006.
  • [12] C. E. Shannon, “Communication theory of secrecy systems”, AT&T Bell Labs Tech. J., vol. 28, pp. 656–715, 1949.
  • [13] J. Daugman, “Results from 200 billion iris cross-comparisons”, Tech. Rep. UCAM-CL-TR-635, University of Cambridge, 2005.
  • [14] B. Schneier, Applied cryptography. Wiley, 1996.
  • [15] P. C. Van Oorschot, A. J. Menezes, and S. A. Vanstone, Handbook of applied cryptography. Boca Raton, Fl, USA: Crc Press, 1996.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0015-0026
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.