Skip to main content

Iris Authentication by Encoded Variant Length Iris Templates

  • Conference paper
Global Trends in Information Systems and Software Applications (ObCom 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 270))

Included in the following conference series:

  • 2587 Accesses

Abstract

Biometric-based personal verification and identification methods have gained much interest with an increasing emphasis on database security. Of all the physiological traits of the human body that help in personal identification, the iris is probably the most robust and accurate one by research. Iris recognition using texture based method is a robust biometric, that can operate in both verification and identification modes. The feature templates are the vital source for authentication which can be easily attacked. Hence securing this iris template is very essential. In this paper, a new encoded technique is been performed on the binary iris codes, generated from feature extraction method producing a non binary variant length codes which in turn securing the iris templates. Finally the hamming distance is calculated with a threshold in order to match the generated binary code of a given input with the database’s encoded templates by decoding process. The iris code matching task is performed much faster by decoding process rather repeating the whole recognition process step by step for each individual data in the database for which the input to be authenticated or verified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bae, K., Noh, S., Kim, J.: Personal Authentication based on iris texture Analysis. IEEE Transactions on Computer Systems and Applications Analysis and Machine Intelligence  25, 12 (2008)

    Google Scholar 

  2. Bowyer, K.W., Hollingsworth, K., Flynn, P.J.: Image Understanding for Iris Biometrics: A Survey. Computer Vision and Image Understanding 110(2), 281–307 (2008)

    Article  Google Scholar 

  3. Benhammadi, F., Kihal, N.: Personal Authentication Based on Iris Texture Analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 537–543 (2008)

    Google Scholar 

  4. Mohapatra, A.K., Sandhu, M.: Biometric Template Encryption. International Journal of Advanced Engineering & Application, 282–284 (January 2010)

    Google Scholar 

  5. Ozturk, I., Sogukpınar, I.: IsmetOzturk and Ibrahim Sogukpınar: Analysis and Comparison of Image Encryption Algorithms. World Academy of Science, Engineering and Technology 3 (2005)

    Google Scholar 

  6. Upmanyu, M., et al.: Blind Authentication: A Secure Crypto-Biometric Verification Protocol. IEEE Transactions on Information Forensics and Security 5(2), 255–268 (2010)

    Article  Google Scholar 

  7. Li, X., et al.: A Novel Cryptographic Algorithm based on Iris Feature. In: International Conference on Computational Intelligence and Security. IEEE (2008)

    Google Scholar 

  8. Yang, L., et al.: Iris Recognition System Based on Chaos Encryption. In: International Conference on Computer Design and Applications (ICCDA 2010), vol. 1, pp. 537–539. IEEE (2010)

    Google Scholar 

  9. Canny, J.F.: A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8(6), 679–698 (1986)

    Article  Google Scholar 

  10. Boles, W., Boashash, B.: A human identification technique using images of the iris and wavelet Transform. IEEE Trans. on Signal Processing 46(4), 1185–1188 (1998)

    Article  Google Scholar 

  11. Krichen, E., AnouarMellakh, M., Salicetti, S.G., Dorizzi, B.: Iris Identification using wavelet packets. In: Int. Conf. on Pattern Recognition, pp. 335–338 (2004)

    Google Scholar 

  12. http://www.cbsr.ia.ac.cn/IrisDatabase/irislogin.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poornima, S., Subramanian, S. (2012). Iris Authentication by Encoded Variant Length Iris Templates. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29216-3_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29215-6

  • Online ISBN: 978-3-642-29216-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics