High security Iris verification system based on random secret integration

被引:79
作者
Chin, CS [1 ]
Jin, ATB [1 ]
Ling, DNC [1 ]
机构
[1] Multimedia Univ, FIST, Melaka 75450, Malaysia
关键词
S-Iris encoding; two-factor authentication; cancelable biometrics; Iris verification; weak inner-product exclusion;
D O I
10.1016/j.cviu.2006.01.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A dual-factor authentication methodology coined as S-Iris Encoding is proposed based on the iterated inner-products between the secret pseudo-random number and the iris feature, and with thresholding to produce a unique compact binary code per person. A thresholding method is devised to exclude the weak inner-product during the encoding process, and thus contribute to the improvement of performance. S-Iris Encoding is primary formulated based on the cancelable biometrics principle to protect against biometrics fabrication. The problem could be rectified by S-Iris code through the token replacement so that a new code can be generated instantly just as a new credit card number can be issued if the old one is compromised. Besides that, S-Iris code is non-invertible and can only contribute to the authentication process when both genuine biometrics template and token are presented. By applying S-Iris Encoding with weak inner-product exclusion, the original iris feature length can be greatly reduced to around 4% of the original size and a 0% of equal error rate (EER) can be attained in CASIA Iris image database. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:169 / 177
页数:9
相关论文
共 22 条
[1]  
[Anonymous], 2003, THESIS U W AUSTR
[2]  
[Anonymous], 2004, IEEE T CIRCUITS SYST
[3]  
[Anonymous], 1987, J OPT SOC AM
[4]   Biometric perils and patches [J].
Bolle, RM ;
Connell, JH ;
Ratha, NK .
PATTERN RECOGNITION, 2002, 35 (12) :2727-2738
[5]  
Daugman J, 2003, PATTERN RECOGN, V36, P279, DOI 10.1016/S0031-3203(02)00030-4
[6]  
DAUGMAN J, 2002, P 2002 INT C IM PROC, V1
[7]   HIGH CONFIDENCE VISUAL RECOGNITION OF PERSONS BY A TEST OF STATISTICAL INDEPENDENCE [J].
DAUGMAN, JG .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1993, 15 (11) :1148-1161
[8]   On enabling secure applications through off-line biometric identification [J].
Davida, GI ;
Frankel, Y ;
Matt, BJ .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :148-157
[9]  
DEMMEL JW, 1990, CS90113 U TENN COMP
[10]  
HUANG JZ, IRIS MODEL BASED LOC