Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








114 Hits in 1.4 sec

Information Theory and the IrisCode

John Daugman
2016 IEEE Transactions on Information Forensics and Security  
Iris recognition has legendary resistance to False Matches, and the tools of information theory can help to explain why.  ...  in both phase and amplitude introduced by the Gabor wavelets underlying the IrisCode.  ...  ACKNOWLEDGMENTS The author would like to thank Markus Kuhn for generating the white noise images, and Cathryn Downing for running the Markov process simulations.  ... 
doi:10.1109/tifs.2015.2500196 fatcat:jy7jwjzypzc2vputftcjydaqgm

New Perspectives on Recognition Performance of Daugman's IrisCode or "Everything is new – it is well forgotten old."

Jinyu Zuo, Katelyn Hampel, Natalia A. Schmid
2021 IEEE Access  
Most Rate-Distortion theory results are presented in the form of bounds. Below we provide a brief summary of three upper bounds and illustrate how to apply them to the IrisCode.  ...  each carrying phase information and representing iris classes) into a set of binary codewords, each of length = 245 bits.  ... 
doi:10.1109/access.2021.3130100 fatcat:c2j5wouynvfa5jmfrnnsxw6kua

Extended Depth of Field Iris Recognition with Correlation Filters

Naresh Boddeti, B. V. K. Vijaya Kumar
2008 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems  
In this work we investigate the recognition performance of correlation filters and compare it with the popular iriscode method when the input images are unrestored images produced by the wavefront coding  ...  The conventional approach is to restore the iris images from the camera outputs and then apply iris recognition algorithms to the restored iris images.  ...  This means that, at least in theory we can recover the original information and acheive greater depth of focus at the same time.  ... 
doi:10.1109/btas.2008.4699371 fatcat:t6sykhpzobh35ppadp2gj4i3ke

Multibiometric Template Security Using Fuzzy Vault

Karthik Nandakumar, Anil K. Jain
2008 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems  
Further, we also show that the security of the system is only 41 bits when the iris and fingerprint vaults are stored separately.  ...  On the other hand, the multibiometric vault based on fingerprint and iris provides 49 bits of security.  ...  One of the main vulnerabilities of a biometric system is the exposure of a user's biometric template information.  ... 
doi:10.1109/btas.2008.4699352 fatcat:ige4njghnfbhpcgzswc47wdx3y

An efficient protocol for private iris-code matching by means of garbled circuits

Ying Luo, Sen-ching Samson Cheung, Tommaso Pignata, Riccardo Lazzeretti, Mauro Barni
2012 2012 19th IEEE International Conference on Image Processing  
Signal processing in the encrypted domain has been proposed as a viable solution to protect biometric templates and the privacy of the users.  ...  The computational and communication complexity of the on-line phase of the proposed protocol is extremely low, thus opening the way to its exploitation in practical applications.  ...  Moreover, GC is likely to become a more efficient alternative than HE as GC theory relies almost exclusively on symmetric encryption and HE on asymmetric encryption.  ... 
doi:10.1109/icip.2012.6467444 dblp:conf/icip/LuoCPLB12 fatcat:aw6yprapfvglvl7mya3mevaxlq

Iris Pattern Recognition

Dr. S. T. Deepa, Praneetha V
2016 IOSR Journal of Computer Engineering  
of recognition, which can be matched with the help of central rays in the convex polyhedral cones and that these templates are protected by a method which is extended from Iris-templates and it can be  ...  The astonishing success of Iris-templates depends deeply on its computational benefits and it includes the enormously high matching speed for identification of iris on a large-scale and automatic threshold  ...  between IrisCode and other coding methods.  ... 
doi:10.9790/0661-1804024350 fatcat:62o5ji2gqff7zinicqmfqfkxqi

Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its Security Implications

Adams Wai-Kin Kong
2013 IEEE Transactions on Image Processing  
IrisCode, developed by Daugman in 1993, is the most influential iris recognition algorithm.  ...  cones and that templates protected by a method extended from IrisCode can be broken into.  ...  Acknowledgements We would like to thank the University of West Virginia, the University of Beira Interior and the Hong Kong Polytechnic University for sharing their databases, Prof.  ... 
doi:10.1109/tip.2012.2227770 pmid:23193454 fatcat:csf2jrgpmfhohllj47dffacd64

Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons

J. Daugman
2006 Proceedings of the IEEE  
Empirically analyzing the tail of the resulting distribution of similarity scores enables specification of decision thresholds, and prediction of performance, of the iris recognition algorithms if deployed  ...  Chances are assessed of making false matches using iris recognition when huge numbers of individuals are enrolled and massive database searches are performed.  ...  His areas of research and teaching are computer vision and biological vision, pattern recognition, information theory, and neural computing.  ... 
doi:10.1109/jproc.2006.884092 fatcat:vbbkuofzvjd2plj5dgtbgwtzym

Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms

Javier Galbally, Arun Ross, Marta Gomez-Barrero, Julian Fierrez, Javier Ortega-Garcia
2013 Computer Vision and Image Understanding  
For a long time it was assumed that the iriscode did not contain enough information to allow for the reconstruction of the original iris.  ...  image and the original one.  ...  Javier Galbally would also like to thank Arun Ross of the Integrated Pattern Recognition and Biometrics Laboratory (iPRoBe) at West Virginia University for hosting him and collaborating with him during  ... 
doi:10.1016/j.cviu.2013.06.003 fatcat:mwwripbahneyxlwcygi2mck3oi

Alpha-wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems [article]

Sudipta Banerjee, Anubhav Jain, Zehua Jiang, Nasir Memon, Julian Togelius, Arun Ross
2023 arXiv   pre-print
We focus on dictionary attacks at the template level, specifically the IrisCodes used in iris recognition systems.  ...  We evaluate this vulnerability using the IITD, CASIA-IrisV4-Thousand and Synthetic datasets, and observe that an alpha-wolf (from two wolves) can match upto 71 identities @FMR=0.001%, while an alpha-mammal  ...  Alternatively, in the context of information theory, Daugman suggests that there should be no uncertainty about the identity X denoted by a biometric signal Y , i.e., H(X|Y ) = 0 [9] .  ... 
arXiv:2403.12047v1 fatcat:wi5xm454kfbklapzwlexnfhxmm

Complex-valued Iris Recognition Network [article]

Kien Nguyen, Clinton Fookes, Sridha Sridharan, Arun Ross
2022 arXiv   pre-print
This necessitates the extraction and processing of phase information that cannot be effectively handled by a real-valued neural network.  ...  Unlike the problem of general object recognition, where real-valued neural networks can be used to extract pertinent features, iris recognition depends on the extraction of both phase and magnitude information  ...  model and retain phase information through the whole network.  ... 
arXiv:2011.11198v4 fatcat:yq3why462zawjn4g3fpqx2htdm

Effect of Severe Image Compression on Iris Recognition Performance

John Daugman, Cathryn Downing
2008 IEEE Transactions on Information Forensics and Security  
Only some 2% to 3% of the bits in the IrisCode templates are changed by such severe image compression, and we calculate the entropy per code bit introduced by each compression scheme.  ...  Currently, standard iris images are 600 times larger than the IrisCode templates computed from them for database storage and search; but it is administratively desired that iris data should be stored,  ...  One of Shannon's fundamental insights in formulating information theory [1] was that the entropy of a random variable measures simultaneously its information content (expressed in bits) and its compressibility  ... 
doi:10.1109/tifs.2007.916009 fatcat:i4zqjhtskfewbdqfaic7skhwea

Complex-valued Iris Recognition Network

Kien Nguyen, Clinton Fookes, Sridha Sridharan, Arun Ross
2022 IEEE Transactions on Pattern Analysis and Machine Intelligence  
This necessitates the extraction and processing of phase information that cannot be effectively handled by a real-valued neural network.  ...  Unlike the problem of general object recognition, where real-valued neural networks can be used to extract pertinent features, iris recognition depends on the extraction of both phase and amplitude information  ...  Explicitly modeling and processing phase information in the automatic feature learning process Fig. 1 : The classic IrisCode depends on the complex-valued Gabor response followed by phase quantization  ... 
doi:10.1109/tpami.2022.3152857 pmid:35201979 fatcat:zvy5ora5wbftrek3jv7oljkdta

Morton Filters for Superior Template Protection for Iris Recognition [article]

Kiran B. Raja and R. Raghavendra and Sushma Venkatesh and Christoph Busch
2020 arXiv   pre-print
Through a set of experiments, we demonstrate the applicability of proposed approach and vet the strengths and weakness.  ...  and also analyzing the discriminable bits across various subjects.  ...  In the remainder of this paper, we present the principles and theory of Morton Filters in Section 2 . Section 3 presents the approach of template protection using Morton Filters mechanism.  ... 
arXiv:2001.05290v1 fatcat:tuzhp3yd7bcg3nwczvjyweol4a

Iris recognition technology

G.O. Williams
1997 IEEE Aerospace and Electronic Systems Magazine  
The resulting IrisCode record is compared to each and every IrisCode record enrolled in the database for recognition.  ...  Bit #1 from the presented IrisCode record is compared to bit #1 from the reference IrisCode record, bit #2 from the presented IrisCode record is compared to bit #2 from the reference IrisCode record, and  ... 
doi:10.1109/62.575997 fatcat:on53xaeah5h7be6gweqovcvzpa
« Previous Showing results 1 — 15 out of 114 results