This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography
October 1998 (vol. 20 no. 10)
pp. 1097-1102

Abstract—Personal identification documents, such as photo ID cards, are being used increasingly for such activities as financial transactions; entry into restricted areas; and personal verification for medical, government, and commercial (in particular, airlines) services. With this trend, there is also the increasing trend toward counterfeiting these documents for illegal gain. We present an approach to authenticating photo-ID documents that relies on pattern recognition and public-key cryptography and has security advantages over physical mechanisms that currently safeguard cards, such as optical laminates and holograms. The pattern-recognition component of this approach is based on a photo signature that is a concise representation of the photo image on the document. This photo signature is stored in a database for remote authentication or in encrypted form on the card for stand-alone authentication. Verification of the ID document entails scanning both the photo image and a machine-readable form of the text information, determining the photo signature, and comparing this information against the reference. In this paper, we describe the method and present results of testing a large database of images for photo-signature match in the presence of noise.

[1] B.A. Metz, "Technologies Used in the War Against Counterfeiting," CardTech/SecurTech, Arlington, Va., Apr. 1994, pp. 727-732.
[2] R.L. van Renesse, ed., Optical Document Security. Artech House, 1994.
[3] L.A. Ray and R.N. Ellson, "Method and Apparatus for Credit Card Verification," U.S. Patent 5,321,751, June 1994.
[4] T.E. Bell, "Invisible Images Ensure Security," IEEE Spectrum, p. 17, Apr. 1995.
[5] J.T. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying," IEEE J. Selected Areas of Comm., vol. 13, no. 8, pp. 1,495-1,504, Oct. 1995.
[6] H. Berghel and L. O'Gorman, "Protecting Ownership Rights Through Digital Watermarking," IEEE Computer, vol. 29, no. 7, pp. 101-103, July 1996.
[7] T. Pavlidis, J. Swartz, and Y.P. Wang, "Information Encoding with Two-Dimensional Barcodes," Computer, June 1992, pp. 18-28.
[8] American National Standards Institute (ANSI), "Working Draft X9.30-199X: Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part I: The Digital Signature Algorithm (DSA)," Am. Bankers Assoc., Washington, D.C.,4 Mar. 1993.
[9] C.I. Watson, "NIST Special Database 18—Mugshot Identification Data, Fronts and Profiles," U.S. Nat'l Inst. of Standards and Tech nology, Gaithersburg, Md., Dec. 1994.
[10] B. Schneier, Applied Cryptography, 2nd ed., pp. 34-41, 483-502.New York: John Wiley and Sons, Inc., 1996,.

Index Terms:
Document authentication, document image recognition, photo signature, photo-ID documents, ID cards, counterfeiting, cryptography, pattern recognition.
Citation:
Lawrence O'Gorman, Irina Rabinovich, "Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 10, pp. 1097-1102, Oct. 1998, doi:10.1109/34.722623
Usage of this product signifies your acceptance of the Terms of Use.