4,453 research outputs found
Advancing iris biometric technology
PhD ThesisThe iris biometric is a well-established technology which is already in use in
several nation-scale applications and it is still an active research area with several
unsolved problems. This work focuses on three key problems in iris biometrics
namely: segmentation, protection and cross-matching. Three novel
methods in each of these areas are proposed and analyzed thoroughly.
In terms of iris segmentation, a novel iris segmentation method is designed
based on a fusion of an expanding and a shrinking active contour by integrating
a new pressure force within the Gradient Vector Flow (GVF) active
contour model. In addition, a new method for closed eye detection is proposed.
The experimental results on the CASIA V4, MMU2, UBIRIS V1 and
UBIRIS V2 databases show that the proposed method achieves state-of-theart
results in terms of segmentation accuracy and recognition performance
while being computationally more efficient. In this context, improvements
by 60.5%, 42% and 48.7% are achieved in segmentation accuracy for the
CASIA V4, MMU2 and UBIRIS V1 databases, respectively. For the UBIRIS
V2 database, a superior time reduction is reported (85.7%) while maintaining
a similar accuracy. Similarly, considerable time improvements by 63.8%,
56.6% and 29.3% are achieved for the CASIA V4, MMU2 and UBIRIS V1
databases, respectively.
With respect to iris biometric protection, a novel security architecture is designed
to protect the integrity of iris images and templates using watermarking
and Visual Cryptography (VC). Firstly, for protecting the iris image, text
which carries personal information is embedded in the middle band frequency
region of the iris image using a novel watermarking algorithm that randomly
interchanges multiple middle band pairs of the Discrete Cosine Transform
(DCT). Secondly, for iris template protection, VC is utilized to protect the
iii
iris template. In addition, the integrity of the stored template in the biometric
smart card is guaranteed by using the hash signatures. The proposed method
has a minimal effect on the iris recognition performance of only 3.6% and
4.9% for the CASIA V4 and UBIRIS V1 databases, respectively. In addition,
the VC scheme is designed to be readily applied to protect any biometric binary
template without any degradation to the recognition performance with a
complexity of only O(N).
As for cross-spectral matching, a framework is designed which is capable of
matching iris images in different lighting conditions. The first method is designed
to work with registered iris images where the key idea is to synthesize
the corresponding Near Infra-Red (NIR) images from the Visible Light (VL)
images using an Artificial Neural Network (ANN) while the second method
is capable of working with unregistered iris images based on integrating the
Gabor filter with different photometric normalization models and descriptors
along with decision level fusion to achieve the cross-spectral matching. A
significant improvement by 79.3% in cross-spectral matching performance is
attained for the UTIRIS database. As for the PolyU database, the proposed
verification method achieved an improvement by 83.9% in terms of NIR vs
Red channel matching which confirms the efficiency of the proposed method.
In summary, the most important open issues in exploiting the iris biometric
are presented and novel methods to address these problems are proposed.
Hence, this work will help to establish a more robust iris recognition system
due to the development of an accurate segmentation method working for iris
images taken under both the VL and NIR. In addition, the proposed protection
scheme paves the way for a secure iris images and templates storage.
Moreover, the proposed framework for cross-spectral matching will help to
employ the iris biometric in several security applications such as surveillance
at-a-distance and automated watch-list identification.Ministry of Higher Education and
Scientific Research in Ira
Relations among Security Metrics for Template Protection Algorithms
Many biometric template protection algorithms have been proposed mainly in
two approaches: biometric feature transformation and biometric cryptosystem.
Security evaluation of the proposed algorithms are often conducted in various
inconsistent manner. Thus, it is strongly demanded to establish the common
evaluation metrics for easier comparison among many algorithms. Simoens et al.
and Nagar et al. proposed good metrics covering nearly all aspect of
requirements expected for biometric template protection algorithms. One
drawback of the two papers is that they are biased to experimental evaluation
of security of biometric template protection algorithms. Therefore, it was
still difficult mainly for algorithms in biometric cryptosystem to prove their
security according to the proposed metrics. This paper will give a formal
definitions for security metrics proposed by Simoens et al. and Nagar et al. so
that it can be used for the evaluation of both of the two approaches. Further,
this paper will discuss the relations among several notions of security
metrics
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system
In this paper, we propose a new biometric verification and template
protection system which we call the THRIVE system. The system includes novel
enrollment and authentication protocols based on threshold homomorphic
cryptosystem where the private key is shared between a user and the verifier.
In the THRIVE system, only encrypted binary biometric templates are stored in
the database and verification is performed via homomorphically randomized
templates, thus, original templates are never revealed during the
authentication stage. The THRIVE system is designed for the malicious model
where the cheating party may arbitrarily deviate from the protocol
specification. Since threshold homomorphic encryption scheme is used, a
malicious database owner cannot perform decryption on encrypted templates of
the users in the database. Therefore, security of the THRIVE system is enhanced
using a two-factor authentication scheme involving the user's private key and
the biometric data. We prove security and privacy preservation capability of
the proposed system in the simulation-based model with no assumption. The
proposed system is suitable for applications where the user does not want to
reveal her biometrics to the verifier in plain form but she needs to proof her
physical presence by using biometrics. The system can be used with any
biometric modality and biometric feature extraction scheme whose output
templates can be binarized. The overall connection time for the proposed THRIVE
system is estimated to be 336 ms on average for 256-bit biohash vectors on a
desktop PC running with quad-core 3.2 GHz CPUs at 10 Mbit/s up/down link
connection speed. Consequently, the proposed system can be efficiently used in
real life applications
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Data privacy is crucial when dealing with biometric data. Accounting for the
latest European data privacy regulation and payment service directive,
biometric template protection is essential for any commercial application.
Ensuring unlinkability across biometric service operators, irreversibility of
leaked encrypted templates, and renewability of e.g., voice models following
the i-vector paradigm, biometric voice-based systems are prepared for the
latest EU data privacy legislation. Employing Paillier cryptosystems, Euclidean
and cosine comparators are known to ensure data privacy demands, without loss
of discrimination nor calibration performance. Bridging gaps from template
protection to speaker recognition, two architectures are proposed for the
two-covariance comparator, serving as a generative model in this study. The
first architecture preserves privacy of biometric data capture subjects. In the
second architecture, model parameters of the comparator are encrypted as well,
such that biometric service providers can supply the same comparison modules
employing different key pairs to multiple biometric service operators. An
experimental proof-of-concept and complexity analysis is carried out on the
data from the 2013-2014 NIST i-vector machine learning challenge
Anonymous subject identification and privacy information management in video surveillance
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. Of equal importance are the privacy and efficiency of techniques to first, identify those individuals for privacy protection and second, provide access to original surveillance video contents for security analysis. In this paper, we propose an anonymous subject identification and privacy data management system to be used in privacy-aware video surveillance. The anonymous subject identification system uses iris patterns to identify individuals for privacy protection. Anonymity of the iris-matching process is guaranteed through the use of a garbled-circuit (GC)-based iris matching protocol. A novel GC complexity reduction scheme is proposed by simplifying the iris masking process in the protocol. A user-centric privacy information management system is also proposed that allows subjects to anonymously access their privacy information via their iris patterns. The system is composed of two encrypted-domain protocols: The privacy information encryption protocol encrypts the original video records using the iris pattern acquired during the subject identification phase; the privacy information retrieval protocol allows the video records to be anonymously retrieved through a GC-based iris pattern matching process. Experimental results on a public iris biometric database demonstrate the validity of our framework
Fingerprint Verification Using Spectral Minutiae Representations
Most fingerprint recognition systems are based on the use of a minutiae set, which is an unordered collection of minutiae locations and orientations suffering from various deformations such as translation, rotation, and scaling. The spectral minutiae representation introduced in this paper is a novel method to represent a minutiae set as a fixed-length feature vector, which is invariant to translation, and in which rotation and scaling become translations, so that they can be easily compensated for. These characteristics enable the combination of fingerprint recognition systems with template protection schemes that require a fixed-length feature vector. This paper introduces the concept of algorithms for two representation methods: the location-based spectral minutiae representation and the orientation-based spectral minutiae representation. Both algorithms are evaluated using two correlation-based spectral minutiae matching algorithms. We present the performance of our algorithms on three fingerprint databases. We also show how the performance can be improved by using a fusion scheme and singular points
- …