scispace - formally typeset
Search or ask a question

Showing papers on "Biometrics published in 2010"


Journal ArticleDOI
TL;DR: An efficient biometric-based remote user authentication scheme using smart cards, in which the computation cost is relatively low compared with other related schemes and the security is based on the one-way hash function, biometrics verification and smart card.

493 citations


Journal ArticleDOI
TL;DR: The main purpose of this paper is to announce the availability of the UBIRIS.v2 database, a multisession iris images database which singularly contains data captured in the visible wavelength, at-a-distance and on on-the-move.
Abstract: The iris is regarded as one of the most useful traits for biometric recognition and the dissemination of nationwide iris-based recognition systems is imminent. However, currently deployed systems rely on heavy imaging constraints to capture near infrared images with enough quality. Also, all of the publicly available iris image databases contain data correspondent to such imaging constraints and therefore are exclusively suitable to evaluate methods thought to operate on these type of environments. The main purpose of this paper is to announce the availability of the UBIRIS.v2 database, a multisession iris images database which singularly contains data captured in the visible wavelength, at-a-distance (between four and eight meters) and on on-the-move. This database is freely available for researchers concerned about visible wavelength iris recognition and will be useful in accessing the feasibility and specifying the constraints of this type of biometric recognition.

482 citations


Journal ArticleDOI
01 Oct 2010-Ibis
TL;DR: This work develops quantitative methods for a classic technique in systematic zoology, namely the use of divergence between undisputed sympatric species as a yardstick for assessing the taxonomic status of allopatric forms, which can be applied to the global avifauna to deliver taxonomic decisions with a high level of objectivity, consistency and transparency.
Abstract: Species are the fundamental units of biology, ecology and conservation, and progress in these fields is therefore hampered by widespread taxonomic bias and uncertainty. Numerous operational techniques based on molecular or phenotypic data have been designed to overcome this problem, yet existing procedures remain subjective or inconsistent, particularly when applying the biological species concept. We address this issue by developing quantitative methods for a classic technique in systematic zoology, namely the use of divergence between undisputed sympatric species as a yardstick for assessing the taxonomic status of allopatric forms. We calculated mean levels of differentiation in multiple phenotypic characters ‐ including biometrics, plumage and voice ‐ for 58 sympatric or parapatric species-pairs from 29 avian families. We then used estimates of mean divergence to develop criteria for species delimitation based on data-driven thresholds. Preliminary tests show that these criteria result in relatively few changes to avian taxonomy in Europe, yet are capable of extensive reassignment of species limits in poorly known tropical regions. While we recognize that species limits are in many cases inherently arbitrary, we argue that our system can be applied to the global avifauna to deliver taxonomic decisions with a high level of objectivity, consistency and transparency.

380 citations


Journal ArticleDOI
TL;DR: It is suggested that the performance from the Haar wavelet and Log-Gabor filter based phase encoding is the most promising among all the four approaches considered in this work and the combination of these two matchers is most promising, both in terms of performance and the computational complexity.

348 citations


Journal ArticleDOI
TL;DR: This paper presents a new biometric authentication system using finger-knuckle-print (FKP) imaging, which achieves much higher recognition rate and it works in real time and has great potentials for commercial applications.

345 citations


Journal ArticleDOI
TL;DR: It is argued that selecting the most relevant gait features that are invariant to changes in gait covariate conditions is the key to develop a gait recognition system that works without subject cooperation and an Adaptive Component and Discriminant Analysis is formulated which seamlessly integrates the feature selection method with subspace analysis for robust recognition.

307 citations


Journal ArticleDOI
TL;DR: Experimental results show that the use of soft biometric traits is able to improve the face-recognition performance of a state-of-the-art commercial matcher.
Abstract: Soft biometric traits embedded in a face (e.g., gender and facial marks) are ancillary information and are not fully distinctive by themselves in face-recognition tasks. However, this information can be explicitly combined with face matching score to improve the overall face-recognition accuracy. Moreover, in certain application domains, e.g., visual surveillance, where a face image is occluded or is captured in off-frontal pose, soft biometric traits can provide even more valuable information for face matching or retrieval. Facial marks can also be useful to differentiate identical twins whose global facial appearances are very similar. The similarities found from soft biometrics can also be useful as a source of evidence in courts of law because they are more descriptive than the numerical matching scores generated by a traditional face matcher. We propose to utilize demographic information (e.g., gender and ethnicity) and facial marks (e.g., scars, moles, and freckles) for improving face image matching and retrieval performance. An automatic facial mark detection method has been developed that uses (1) the active appearance model for locating primary facial features (e.g., eyes, nose, and mouth), (2) the Laplacian-of-Gaussian blob detection, and (3) morphological operators. Experimental results based on the FERET database (426 images of 213 subjects) and two mugshot databases from the forensic domain (1225 images of 671 subjects and 10 000 images of 10 000 subjects, respectively) show that the use of soft biometric traits is able to improve the face-recognition performance of a state-of-the-art commercial matcher.

239 citations


Journal ArticleDOI
TL;DR: A new framework for continuous user authentication that primarily uses soft biometric traits (e.g., color of user's clothing and facial skin) is proposed and automatically registers (enrolls) softBiometric traits every time the user logs in and fusessoft biometric matching with the conventional authentication schemes, namely password and face biometric.
Abstract: Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the initial user logs out. This situation is encountered when the logged in user takes a short break without logging out or an impostor coerces the valid user to allow access to the system. To address this security flaw, we propose a continuous authentication scheme that continuously monitors and authenticates the logged in user. Previous methods for continuous authentication primarily used hard biometric traits, specifically fingerprint and face to continuously authenticate the initial logged in user. However, the use of these biometric traits is not only inconvenient to the user, but is also not always feasible due to the user's posture in front of the sensor. To mitigate this problem, we propose a new framework for continuous user authentication that primarily uses soft biometric traits (e.g., color of user's clothing and facial skin). The proposed framework automatically registers (enrolls) soft biometric traits every time the user logs in and fuses soft biometric matching with the conventional authentication schemes, namely password and face biometric. The proposed scheme has high tolerance to the user's posture in front of the computer system. Experimental results show the effectiveness of the proposed method for continuous user authentication.

229 citations


Journal ArticleDOI
TL;DR: The aim is to identify a person in real time, with high efficiency and accuracy by analysing the random patters visible within the iris if an eye from some distance, by implementing modified Canny edge detector algorithm.
Abstract: In a biometric system a person is identified automatically by processing the unique features that are posed by the individual. Iris Recognition is regarded as the most reliable and accurate biometric identification system available. In Iris Recognition a person is identified by the iris which is the part of eye using pattern matching or image processing using concepts of neural networks. The aim is to identify a person in real time, with high efficiency and accuracy by analysing the random patters visible within the iris if an eye from some distance, by implementing modified Canny edge detector algorithm. The major applications of this technology so far have been: substituting for passports (automated international border crossing); aviation security and controlling access to restricted areas at airports; database access and computer login.

208 citations


Journal ArticleDOI
01 Aug 2010
TL;DR: The obtained results show that human identification by gait can be achieved without any knowledge of internal or external camera parameters with a mean correct classification rate of 73.6% across all views using purely dynamic gait features.
Abstract: We present a new method for viewpoint independent gait biometrics. The system relies on a single camera, does not require camera calibration, and works with a wide range of camera views. This is achieved by a formulation where the gait is self-calibrating. These properties make the proposed method particularly suitable for identification by gait, where the advantages of completely unobtrusiveness, remoteness, and covertness of the biometric system preclude the availability of camera information and specific walking directions. The approach has been assessed for feature extraction and recognition capabilities on the SOTON gait database and then evaluated on a multiview database to establish recognition capability with respect to view invariance. Moreover, tests on the multiview CASIA-B database, composed of more than 2270 video sequences with 65 different subjects walking freely along different walking directions, have been performed. The obtained results show that human identification by gait can be achieved without any knowledge of internal or external camera parameters with a mean correct classification rate of 73.6% across all views using purely dynamic gait features. The performance of the proposed method is particularly encouraging for application in surveillance scenarios.

201 citations


Journal ArticleDOI
TL;DR: The relationship between a user's genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms, which are proposed as new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics.
Abstract: It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user's genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms. We establish formal definitions for these animals and a statistical test for their existence. A thorough investigation is conducted using a broad range of biometric modalities, including 2D and 3D faces, fingerprints, iris, speech, and keystroke dynamics. Patterns that emerge from the results expose novel, important, and encouraging insights into the nature of biometric match results. A new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics, is proposed.

Proceedings ArticleDOI
09 Sep 2010
TL;DR: The main solution is a generic identification protocol that allows to select and report all the enrolled identities whose distance to the user's fingercode is under a given threshold and can be generalized to any biometric system that shares the same matching methodology, namely distance computation and thresholding.
Abstract: We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized entities managed by a server. For security, it is required that the client does not learn anything on the database and the server should not get any information about the requested biometry and the outcome of the matching process. The proposed protocol follows a multi-party computation approach and makes extensive use of homomorphic encryption as underlying cryptographic primitive. To keep the protocol complexity as low as possible, a particular representation of fingerprint images, named Fingercode, is adopted. Although the previous works on privacy-preserving biometric identification focus on selecting the best matching identity in the database, our main solution is a generic identification protocol and it allows to select and report all the enrolled identities whose distance to the user's fingercode is under a given threshold. Variants for simple authentication purposes are provided. Our protocols gain a notable bandwidth saving (about 25-39%) if compared with the best previous work (ICISC'09) and its computational complexity is still low and suitable for practical applications. Moreover, even if such protocols are presented in the context of a fingerprint-based system, they can be generalized to any biometric system that shares the same matching methodology, namely distance computation and thresholding.

Proceedings ArticleDOI
11 Nov 2010
TL;DR: A novel algorithm to recognize periocular images in visible spectrum is proposed and the results show promise towards using peroocular region for recognition when the information is not sufficient for iris recognition.
Abstract: The performance of iris recognition is affected if iris is captured at a distance. Further, images captured in visible spectrum are more susceptible to noise than if captured in near infrared spectrum. This research proposes periocular biometrics as an alternative to iris recognition if the iris images are captured at a distance. We propose a novel algorithm to recognize periocular images in visible spectrum and study the effect of capture distance on the performance of periocular biometrics. The performance of the algorithm is evaluated on more than 11,000 images of the UBIRIS v2 database. The results show promise towards using periocular region for recognition when the information is not sufficient for iris recognition.

Proceedings ArticleDOI
TL;DR: It is argued that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.
Abstract: One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.

Journal ArticleDOI
TL;DR: A new multimodal biometric database, acquired in the framework of the BiosecurID project, is presented together with the description of the acquisition setup and protocol and features such as: realistic acquisition scenario, balanced gender and population distributions, availability of information about particular demographic groups, and compatibility with other existing databases.
Abstract: A new multimodal biometric database, acquired in the framework of the BiosecurID project, is presented together with the description of the acquisition setup and protocol. The database includes eight unimodal biometric traits, namely: speech, iris, face (still images, videos of talking faces), handwritten signature and handwritten text (on-line dynamic signals, off-line scanned images), fingerprints (acquired with two different sensors), hand (palmprint, contour-geometry) and keystroking. The database comprises 400 subjects and presents features such as: realistic acquisition scenario, balanced gender and population distributions, availability of information about particular demographic groups (age, gender, handedness), acquisition of replay attacks for speech and keystroking, skilled forgeries for signatures, and compatibility with other existing databases. All these characteristics make it very useful in research and development of unimodal and multimodal biometric systems.

Journal ArticleDOI
TL;DR: Experimental results show that, using Fisherface to construct the input facial feature vector (face template), the proposed hybrid method can improve the recognition accuracy by 4, 11, and 15% on the FERET, CMU-PIE, and FRGC databases, respectively.
Abstract: Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store the template in its original form, have been reported in recent years. They can be categorized into two approaches, namely biometric cryptosystem and transform-based. However, most (if not all) algorithms in both approaches offer a trade-off between the template security and matching performance. Moreover, we believe that no single template protection method is capable of satisfying the security and performance simultaneously. In this paper, we propose a hybrid approach which takes advantage of both the biometric cryptosystem approach and the transform-based approach. A three-step hybrid algorithm is designed and developed based on random projection, discriminability-preserving (DP) transform, and fuzzy commitment scheme. The proposed algorithm not only provides good security, but also enhances the performance through the DP transform. Three publicly available face databases, namely FERET, CMU-PIE, and FRGC, are used for evaluation. The security strength of the binary templates generated from FERET, CMU-PIE, and FRGC databases are 206.3, 203.5, and 347.3 bits, respectively. Moreover, noninvertibility analysis and discussion on data leakage of the proposed hybrid algorithm are also reported. Experimental results show that, using Fisherface to construct the input facial feature vector (face template), the proposed hybrid method can improve the recognition accuracy by 4%, 11%, and 15% on the FERET, CMU-PIE, and FRGC databases, respectively. A comparison with the recently developed random multispace quantization biohashing algorithm is also reported.

Journal ArticleDOI
01 May 2010
TL;DR: An approach is proposed that is able to guarantee security and renewability to biometric templates, which can be applied to any biometrics whose template can be represented by a set of sequences, in order to generate multiple transformed versions of the template.
Abstract: Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the deployment of biometric-based authentication systems. In this paper, we propose an approach, which we refer to as BioConvolving, that is able to guarantee security and renewability to biometric templates. Specifically, we introduce a set of noninvertible transformations, which can be applied to any biometrics whose template can be represented by a set of sequences, in order to generate multiple transformed versions of the template. Once the transformation is performed, retrieving the original data from the transformed template is computationally as hard as random guessing. As a proof of concept, the proposed approach is applied to an on-line signature recognition system, where a hidden Markov model-based matching strategy is employed. The performance of a protected on-line signature recognition system employing the proposed BioConvolving approach is evaluated, both in terms of authentication rates and renewability capacity, using the MCYT signature database. The reported extensive set of experiments shows that protected and renewable biometric templates can be properly generated and used for recognition, at the expense of a slight degradation in authentication performance.

Proceedings ArticleDOI
23 Aug 2010
TL;DR: Experiments on the images extracted from the Near Infra-Red (NIR) face videos of the Multi Biometric Grand Challenge (MBGC) dataset demonstrate that valuable information is contained in the periocular region and it can be fused with the iris texture to improve the overall identification accuracy in non-ideal situations.
Abstract: Human recognition based on the iris biometric is severely impacted when encountering non-ideal images of the eye characterized by occluded irises, motion and spatial blur, poor contrast, and illumination artifacts. This paper discusses the use of the periocular region surrounding the iris, along with the iris texture patterns, in order to improve the overall recognition performance in such images. Periocular texture is extracted from a small, fixed region of the skin surrounding the eye. Experiments on the images extracted from the Near Infra-Red (NIR) face videos of the Multi Biometric Grand Challenge (MBGC) dataset demonstrate that valuable information is contained in the periocular region and it can be fused with the iris texture to improve the overall identification accuracy in non-ideal situations.

01 Jan 2010
TL;DR: The next generation biometric technology must overcome many hurdles and challenges to improve the recognition accuracy, including ability to handle poor quality and incomplete data, achieve scalability to accommodate hundreds of millions of users, ensure interoperability, and protect user privacy while reducing system cost and enhancing system integrity.
Abstract: Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications such as national ID cards, border crossings, government benefits, and access control. As a result, biometric recognition, or simply biometrics, which is based on physiological and behavioural characteristics of a person, is being increasingly adopted and mapped to rapidly growing person identification applications. Unlike credentials (documents and PIN), biometric traits (e.g., fingerprint, face, and iris) cannot be lost, stolen, or easily forged; they are also considered to be persistent and unique. Use of biometrics is not new; fingerprints have been successfully used for over one hundred years in law enforcement and forensics to identify and apprehend criminals. But, as biometrics permeates our society, this recognition technology faces new challenges. The design and suitability of biometric technology for person identification depends on the application requirements. These requirements are typically specified in terms of identification accuracy, throughput, user acceptance, system security, robustness, and return on investment. The next generation biometric technology must overcome many hurdles and challenges to improve the recognition accuracy. These include ability to handle poor quality and incomplete data, achieve scalability to accommodate hundreds of millions of users, ensure interoperability, and protect user privacy while reducing system cost and enhancing system integrity. This chapter presents an overview of biometrics, some of the emerging biometric technologies and their limitations, and examines future challenges.

Journal ArticleDOI
TL;DR: A model-based approach for human gait recognition, which is based on analyzing the leg and arm movements, and the main focus of this paper is on increasing the discrimination capability of the model through extra features produced from the motion of the arms.

Journal ArticleDOI
01 Jun 2010
TL;DR: This paper improves the recognition performance as well as the security of a fingerprint based biometric cryptosystem, called fingerprint fuzzy vault, by incorporating minutiae descriptors, which capture ridge orientation and frequency information in a minutia's neighborhood, in the vault construction using the fuzzy commitment approach.
Abstract: Security concerns regarding the stored biometric data is impeding the widespread public acceptance of biometric technology. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability due to the trade-off between recognition performance and security of the template. In this paper, we improve the recognition performance as well as the security of a fingerprint based biometric cryptosystem, called fingerprint fuzzy vault. We incorporate minutiae descriptors, which capture ridge orientation and frequency information in a minutia's neighborhood, in the vault construction using the fuzzy commitment approach. Experimental results show that with the use of minutiae descriptors, the fingerprint matching performance improves from an FAR of 0.7% to 0.01% at a GAR of 95% with some improvement in security as well. An analysis of security while considering two different attack scenarios is also presented. A preliminary version of this paper appeared in the International Conference on Pattern Recognition, 2008 and was selected as the Best Scientific Paper in the biometrics track.

Journal ArticleDOI
TL;DR: The experiments show that the proposed matrix-based complex PCA, a feature level fusion method for bimodal biometrics that uses a complex matrix to denote two biometric traits from one subject, can achieve a higher classification accuracy than the 2DPCA and PCA techniques.

Proceedings ArticleDOI
13 Jun 2010
TL;DR: It is demonstrated that recognition performance of the periocular region images is comparable to that of face.
Abstract: We evaluate the utility of the periocular region appearance cues for biometric identification. Even though periocular region is considered to be a highly discriminative part of a face, its utility as an independent modality or as a soft biometric is still an open ended question. It is our goal to establish a performance metric for the periocular region features so that their potential use in conjunction with iris or face can be evaluated. In this approach, we employ the local appearance based feature representation, where the image is divided into spatially salient patches, and histograms of texture and color are computed for each patch. The images are matched by computing the distance between the corresponding feature representations using various distance metrics. We report recognition results on images captured in the visible and near-infrared (NIR) spectrum. For the color periocular region data consisting of about 410 subjects and the NIR images of 85 subjects, we obtain the Rank-1 recognition rate of 91% and 87% respectively. Furthermore, we also demonstrate that recognition performance of the periocular region images is comparable to that of face.

BookDOI
01 Jan 2010
TL;DR: This free summary is provided by the National Academies as part of the authors' mission to educate the world on issues of science, engineering, and health.
Abstract: Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric recognition has been applied to identification of criminals, patient tracking in medical informatics, and the personalization of social services, among other things. In spite of substantial effort, however, there remain unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. Moreover, the general public has been exposed to biometrics largely as high-technology gadgets in spy thrillers or as fear-instilling instruments of state or corporate surveillance in speculative fiction.Now, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. A focus on fighting insurgencies and terrorism has led to the military deployment of biometric tools to enable recognition of individuals as friend or foe. Commercially, finger-imaging sensors, whose cost and physical size have been reduced, now appear on many laptop personal computers, handheld devices, mobile phones, and other consumer devices.Biometric Recognition: Challenges and Opportunities addresses the issues surrounding broader implementation of this technology, making two main points: first, biometric recognition systems are incredibly complex, and need to be addressed as such. Second, biometric recognition is an inherently probabilistic endeavor. Consequently, even when the technology and the system in which it is embedded are behaving as designed, there is inevitable uncertainty and risk of error. This book elaborates on these themes in detail to provide policy makers, developers, and researchers a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development.

Journal ArticleDOI
01 May 2010
TL;DR: This paper designs a fully automated iris image quality evaluation block that estimates defocus blur, motion blur, off-angle, occlusion, lighting, specular reflection, and pixel counts and fuses the estimated factors by using a Dempster-Shafer theory approach to evidential reasoning.
Abstract: Iris recognition, the ability to recognize and distinguish individuals by their iris pattern, is one of the most reliable biometrics in terms of recognition and identification performance. However, the performance of these systems is affected by poor-quality imaging. In this paper, we extend iris quality assessment research by analyzing the effect of various quality factors such as defocus blur, off-angle, occlusion/specular reflection, lighting, and iris resolution on the performance of a traditional iris recognition system. We further design a fully automated iris image quality evaluation block that estimates defocus blur, motion blur, off-angle, occlusion, lighting, specular reflection, and pixel counts. First, each factor is estimated individually, and then, the second step fuses the estimated factors by using a Dempster-Shafer theory approach to evidential reasoning. The designed block is evaluated on three data sets: Institute of Automation, Chinese Academy of Sciences (CASIA) 3.0 interval subset, West Virginia University (WVU) non-ideal iris, and Iris Challenge Evaluation (ICE) 1.0 dataset made available by National Institute for Standards and Technology (NIST). Considerable improvement in recognition performance is demonstrated when removing poor-quality images selected by our quality metric. The upper bound on computational complexity required to evaluate the quality of a single image is O(n2 log n).

Journal ArticleDOI
TL;DR: Experimental results on four biometric datasets show that carrying out the authentication in the encrypted domain does not affect the accuracy, while the encryption key acts as an additional layer of security.
Abstract: Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the concerns of user's privacy, template protection, and trust issues. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user or the biometric to the authenticating server or vice-versa. As the protocol is based on asymmetric encryption of the biometric data, it captures the advantages of biometric authentication as well as the security of public key cryptography. The authentication protocol can run over public networks and provide nonrepudiable identity verification. The encryption also provides template protection, the ability to revoke enrolled templates, and alleviates the concerns on privacy in widespread use of biometrics. The proposed approach makes no restrictive assumptions on the biometric data and is hence applicable to multiple biometrics. Such a protocol has significant advantages over existing biometric cryptosystems, which use a biometric to secure a secret key, which in turn is used for authentication. We analyze the security of the protocol under various attack scenarios. Experimental results on four biometric datasets (face, iris, hand geometry, and fingerprint) show that carrying out the authentication in the encrypted domain does not affect the accuracy, while the encryption key acts as an additional layer of security.

Journal ArticleDOI
01 Jul 2010
TL;DR: This paper is a state-of-the-art advancement of multibiometrics, offering an innovative perspective on features fusion, and achieves interesting results with several commonly used databases.
Abstract: The basic aim of a biometric identification system is to discriminate automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependability. In this paper, an innovative multimodal biometric identification system based on iris and fingerprint traits is proposed. The paper is a state-of-the-art advancement of multibiometrics, offering an innovative perspective on features fusion. In greater detail, a frequency-based approach results in a homogeneous biometric vector, integrating iris and fingerprint data. Successively, a hamming-distance-based matching algorithm deals with the unified homogenous biometric vector. The proposed multimodal system achieves interesting results with several commonly used databases. For example, we have obtained an interesting working point with FAR = 0% and FRR = 5.71% using the entire fingerprint verification competition (FVC) 2002 DB2B database and a randomly extracted same-size subset of the BATH database. At the same time, considering the BATH database and the FVC2002 DB2A database, we have obtained a further interesting working point with FAR = 0% and FRR = 7.28% ÷ 9.7%.

Journal ArticleDOI
TL;DR: This research introduces a robust and fast segmentation approach towards less constrained iris recognition using noisy images contained in the UBIRIS.v2 database (the second version of the U BIRIS noisy iris database).

Proceedings ArticleDOI
11 Nov 2010
TL;DR: Several filter-based techniques and local feature extraction methods are explored in this study, where an increase of 15% verification performance at 0.1% false accept rate (FAR) is shown compared to raw pixels with the proposed Local Walsh-Transform Binary Pattern encoding.
Abstract: In this paper, we perform a detailed investigation of various features that can be extracted from the periocular region of human faces for biometric identification. The emphasis of this study is to explore the BEST feature extraction approach used in stand-alone mode without any generative or discriminative subspace training. Simple distance measures are used to determine the verification rate (VR) on a very large dataset. Several filter-based techniques and local feature extraction methods are explored in this study, where we show an increase of 15% verification performance at 0.1% false accept rate (FAR) compared to raw pixels with the proposed Local Walsh-Transform Binary Pattern encoding. Additionally, when fusing our best feature extraction method with Kernel Correlation Feature Analysis (KCFA) [36], we were able to obtain VR of 61.2%. Our experiments are carried out on the large validation set of the NIST FRGC database [6], which contains facial images from environments with uncontrolled illumination. Verification experiments based on a pure 1–1 similarity matrix of 16028×8014 (~128 million comparisons) carried out on the entire database, where we find that we can achieve a raw VR of 17.0% at 0.1% FAR using our proposed Local Walsh-Transform Binary Pattern approach. This result, while may seem low, is more than the NIST reported baseline VR on the same dataset (12% at 0.1% FAR), when PCA was trained on the entire facial features for recognition [6].

Journal ArticleDOI
01 Nov 2010
TL;DR: The first mouse dynamics biometric recognition system that fulfills this standard is presented, using a fuzzy classification based on the Learning Algorithm for Multivariate Data Analysis and using a score-level fusion scheme to merge corresponding biometric scores.
Abstract: The European standard for access control imposes stringent performance requirements on commercial biometric technologies that few existing recognition systems are able to meet. In this correspondence paper, we present the first mouse dynamics biometric recognition system that fulfills this standard. The proposed system achieves notable performance improvement by developing separate models for separate feature groups involved. The improvements are achieved through the use of a fuzzy classification based on the Learning Algorithm for Multivariate Data Analysis and using a score-level fusion scheme to merge corresponding biometric scores. Evaluation of the proposed framework using mouse data from 48 users achieves a false acceptance rate of 0% and a false rejection rate of 0.36%.