Journal ArticleDOI
Context-based biometric key generation for Iris
Christian Rathgeb,Andreas Uhl +1 more
Reads0
Chats0
TLDR
A context-based analysis of iris biometric feature vectors based on which stable biometric keys are extracted is proposed, and most reliable bits in binary iris codes are detected and utilised to construct keys from fuzzy biometric data.Abstract:
In this study, a generic treatment of how to generate biometric keys from binary biometric templates is presented. A context-based analysis of iris biometric feature vectors based on which stable biometric keys are extracted is proposed. Most reliable bits in binary iris codes are detected and utilised to construct keys from fuzzy biometric data. The proposed key-generation scheme is adapted to diverse iris biometric feature extraction algorithms, evaluated on a comprehensive database and compared against existing iris biometric cryptosystems. In addition, the scheme is extended to provide fully revocable biometric keys, long enough to be applied in generic cryptosystems. Experimental results confirm the soundness of the approach.read more
Citations
More filters
Journal ArticleDOI
Smartphone based visible iris recognition using deep sparse filtering
TL;DR: A new segmentation scheme is proposed and adapted to smartphone based visible iris images for approximating the radius of the iris to achieve robust segmentation and a new feature extraction method based on deepsparsefiltering is proposed to obtain robust features for unconstrained iris image images.
Book ChapterDOI
Design Decisions for an Iris Recognition SDK
TL;DR: This chapter provides a summary of relevant design decisions for software modules constituting an iris recognition system and a detailed description of how according design decisions are implemented in the University of Salzburg Iris Toolkit, an open-source iris Recognition software which contains diverse algorithms for iris segmentation, feature extraction, and comparison.
Proceedings ArticleDOI
Combining Iris and Periocular Recognition Using Light Field Camera
TL;DR: This work proposes a robust Iris and Periocular erification scheme in visible spectrum using Light Field Camera (LFC), and proposes a new scheme for feature extraction and classification by exploring the combination of Local Binary Patterns (LBP) and Sparse Reconstruction Classifier (SRC).
Journal ArticleDOI
Reliable iris localization using Hough transform, histogram-bisection, and eccentricity
TL;DR: A reliable iris localization algorithm that includes localizing a coarse iris location in the eye image using the Hough transform and image statistics and regularizing these boundaries using a technique based on the Fourier series and radial gradients is proposed.
Journal ArticleDOI
Iris localization in frontal eye images for less constrained iris recognition systems
TL;DR: Experimental results show that the proposed iris localization algorithm is tolerant to off-axis eye images, specular reflections, non-uniform illumination; glasses, contact lens, hair, eyelashes, and eyelids occlusions.
References
More filters
Proceedings ArticleDOI
How iris recognition works
TL;DR: Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in many field and laboratory trials, producing no false matches in several million comparison tests.
Book ChapterDOI
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Proceedings ArticleDOI
A fuzzy commitment scheme
Ari Juels,Martin Wattenberg +1 more
TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Journal ArticleDOI
Enhancing security and privacy in biometrics-based authentication systems
TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Proceedings ArticleDOI
A fuzzy vault scheme
Ari Juels,Madhu Sudan +1 more
TL;DR: In this article, the authors describe a fuzzy vault construction that allows Alice to place a secret value /spl kappa/ in a secure vault and lock it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the vault using B, he obtains the secret value if B is close to A, i.e., only if A and B overlap substantially.