Robust iris verification for key management

نویسندگان

  • Sheikh Ziauddin
  • Matthew N. Dailey
چکیده

In this paper, we present a method for secret key generation and recovery based on iris verification that, unlike typical systems which store iris templates persistently, stores recovery information on a smart card carried by the user. The scheme uses error-correcting codes to overcome the noisiness inherent in biometric readings. Our iris template incorporates reliable region selection, reliable bit estimation and onesided masking techniques that provide for both robust verification and large key sizes. An implementation and experiments with the University of Bath iris dataset indicate that our scheme provides for generation and recovery of 260-bit keys with an EER of 0%.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Iris Recognition in Unconstrained Environments

A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by him/her. Iris recognition (IR) is known to be the most reliable and accurate biometric identification system. The iris recognition system (IRS) consists of an automatic segmentation mechanism which is based on the Hough transform (HT). This paper presents a robust IRS i...

متن کامل

Robust Iris Recognition Baseline for the Grand Challenge

Due to its distinctiveness, the human iris is a popular biometric feature used to identity a person with high accuracy. The “Grand Challenge” in iris recognition is to have an effective algorithm for subject verification or identification under a broad range of image and environmental conditions. This paper presents both baseline performance results and an enhanced version of VASIR (Video-based...

متن کامل

Iris Based Identity Verification Robust to Sample Presentation Security Attacks

Iris based identity verification is highly reliable but it can also be subject to attacks. Pupil dilation or constriction stimulated by the application of drugs are examples of sample presentation security attacks which can lead to higher false rejection rates. Suspects on a watch list can potentially circumvent the iris based system using such methods. This paper investigates a new approach us...

متن کامل

Robust and Compositional Verification of Object Capability Pa erns

In scenarios such as web programming, where code is linked together from multiple sources, object capability patterns (OCPs) provide an essential safeguard, enabling programmers to protect the private state of their objects from corruption by unknown and untrusted code. However, the bene ts of OCPs in terms of program veri cation have never been properly formalized. In this paper, building on t...

متن کامل

A Design and Implementation of a Wireless Iris Recognition Attendance Management System

Iris recognition verification is one of the most reliable personal identification methods in biometrics.With the rapid development of iris recognition verification, a number of its applications have been proposed until now including time attendance system etc. In this paper, a wireless iris recognition attendance management system is designed and implemented using Daugman’s algorithm [15].This ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Pattern Recognition Letters

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2010