Abstract
Biometric-based personal verification and identification methods have gained much interest with an increasing emphasis on database security. Of all the physiological traits of the human body that help in personal identification, the iris is probably the most robust and accurate one by research. Iris recognition using texture based method is a robust biometric, that can operate in both verification and identification modes. The feature templates are the vital source for authentication which can be easily attacked. Hence securing this iris template is very essential. In this paper, a new encoded technique is been performed on the binary iris codes, generated from feature extraction method producing a non binary variant length codes which in turn securing the iris templates. Finally the hamming distance is calculated with a threshold in order to match the generated binary code of a given input with the database’s encoded templates by decoding process. The iris code matching task is performed much faster by decoding process rather repeating the whole recognition process step by step for each individual data in the database for which the input to be authenticated or verified.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bae, K., Noh, S., Kim, J.: Personal Authentication based on iris texture Analysis. IEEE Transactions on Computer Systems and Applications Analysis and Machine Intelligence 25, 12 (2008)
Bowyer, K.W., Hollingsworth, K., Flynn, P.J.: Image Understanding for Iris Biometrics: A Survey. Computer Vision and Image Understanding 110(2), 281–307 (2008)
Benhammadi, F., Kihal, N.: Personal Authentication Based on Iris Texture Analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 537–543 (2008)
Mohapatra, A.K., Sandhu, M.: Biometric Template Encryption. International Journal of Advanced Engineering & Application, 282–284 (January 2010)
Ozturk, I., Sogukpınar, I.: IsmetOzturk and Ibrahim Sogukpınar: Analysis and Comparison of Image Encryption Algorithms. World Academy of Science, Engineering and Technology 3 (2005)
Upmanyu, M., et al.: Blind Authentication: A Secure Crypto-Biometric Verification Protocol. IEEE Transactions on Information Forensics and Security 5(2), 255–268 (2010)
Li, X., et al.: A Novel Cryptographic Algorithm based on Iris Feature. In: International Conference on Computational Intelligence and Security. IEEE (2008)
Yang, L., et al.: Iris Recognition System Based on Chaos Encryption. In: International Conference on Computer Design and Applications (ICCDA 2010), vol. 1, pp. 537–539. IEEE (2010)
Canny, J.F.: A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8(6), 679–698 (1986)
Boles, W., Boashash, B.: A human identification technique using images of the iris and wavelet Transform. IEEE Trans. on Signal Processing 46(4), 1185–1188 (1998)
Krichen, E., AnouarMellakh, M., Salicetti, S.G., Dorizzi, B.: Iris Identification using wavelet packets. In: Int. Conf. on Pattern Recognition, pp. 335–338 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poornima, S., Subramanian, S. (2012). Iris Authentication by Encoded Variant Length Iris Templates. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-29216-3_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29215-6
Online ISBN: 978-3-642-29216-3
eBook Packages: Computer ScienceComputer Science (R0)