scispace - formally typeset
Journal ArticleDOI

Context-based biometric key generation for Iris

Christian Rathgeb, +1 more
- 15 Dec 2011 - 
- Vol. 5, Iss: 6, pp 389-397
Reads0
Chats0
TLDR
A context-based analysis of iris biometric feature vectors based on which stable biometric keys are extracted is proposed, and most reliable bits in binary iris codes are detected and utilised to construct keys from fuzzy biometric data.
Abstract
In this study, a generic treatment of how to generate biometric keys from binary biometric templates is presented. A context-based analysis of iris biometric feature vectors based on which stable biometric keys are extracted is proposed. Most reliable bits in binary iris codes are detected and utilised to construct keys from fuzzy biometric data. The proposed key-generation scheme is adapted to diverse iris biometric feature extraction algorithms, evaluated on a comprehensive database and compared against existing iris biometric cryptosystems. In addition, the scheme is extended to provide fully revocable biometric keys, long enough to be applied in generic cryptosystems. Experimental results confirm the soundness of the approach.

read more

Citations
More filters
Journal ArticleDOI

Smartphone based visible iris recognition using deep sparse filtering

TL;DR: A new segmentation scheme is proposed and adapted to smartphone based visible iris images for approximating the radius of the iris to achieve robust segmentation and a new feature extraction method based on deepsparsefiltering is proposed to obtain robust features for unconstrained iris image images.
Book ChapterDOI

Design Decisions for an Iris Recognition SDK

TL;DR: This chapter provides a summary of relevant design decisions for software modules constituting an iris recognition system and a detailed description of how according design decisions are implemented in the University of Salzburg Iris Toolkit, an open-source iris Recognition software which contains diverse algorithms for iris segmentation, feature extraction, and comparison.
Proceedings ArticleDOI

Combining Iris and Periocular Recognition Using Light Field Camera

TL;DR: This work proposes a robust Iris and Periocular erification scheme in visible spectrum using Light Field Camera (LFC), and proposes a new scheme for feature extraction and classification by exploring the combination of Local Binary Patterns (LBP) and Sparse Reconstruction Classifier (SRC).
Journal ArticleDOI

Reliable iris localization using Hough transform, histogram-bisection, and eccentricity

TL;DR: A reliable iris localization algorithm that includes localizing a coarse iris location in the eye image using the Hough transform and image statistics and regularizing these boundaries using a technique based on the Fourier series and radial gradients is proposed.
Journal ArticleDOI

Iris localization in frontal eye images for less constrained iris recognition systems

TL;DR: Experimental results show that the proposed iris localization algorithm is tolerant to off-axis eye images, specular reflections, non-uniform illumination; glasses, contact lens, hair, eyelashes, and eyelids occlusions.
References
More filters
Proceedings ArticleDOI

How iris recognition works

TL;DR: Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in many field and laboratory trials, producing no false matches in several million comparison tests.
Book ChapterDOI

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Proceedings ArticleDOI

A fuzzy commitment scheme

TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Journal ArticleDOI

Enhancing security and privacy in biometrics-based authentication systems

TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Proceedings ArticleDOI

A fuzzy vault scheme

TL;DR: In this article, the authors describe a fuzzy vault construction that allows Alice to place a secret value /spl kappa/ in a secure vault and lock it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the vault using B, he obtains the secret value if B is close to A, i.e., only if A and B overlap substantially.