The Community for Technology Leaders
RSS Icon
Issue No.09 - September (2011 vol.33)
pp: 1877-1893
Jaishanker K. Pillai , University of Maryland, College Park
Vishal M. Patel , University of Maryland, College Park
Rama Chellappa , University of Maryland, College Park
Nalini K. Ratha , IBM T.J. Watson Research Center, Hawthorne
Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.
Iris recognition, cancelability, secure biometrics, random projections, sparse representations.
Jaishanker K. Pillai, Vishal M. Patel, Rama Chellappa, Nalini K. Ratha, "Secure and Robust Iris Recognition Using Random Projections and Sparse Representations", IEEE Transactions on Pattern Analysis & Machine Intelligence, vol.33, no. 9, pp. 1877-1893, September 2011, doi:10.1109/TPAMI.2011.34
[1] K.W. Bowyer, K. Hollingsworth, and P.J. Flynn, "Image Understanding for Iris Biometrics: A Survey," Computer Vision and Image Understanding, vol. 110, no. 2, pp. 281-307, 2008.
[2] J. Daugman, "Probing the Uniqueness and Randomness of Iris Codes: Results from 200 Billion Iris Pair Comparisons," Proc. IEEE, vol. 94, no. 11, pp. 1927-1935, Nov. 2006.
[3] E.M. Newton and P.J. Phillips, "Meta-Analysis of Third-Party Evaluations of Iris Recognition," IEEE Trans. Systems, Man, and Cybernetics, vol. 39, no. 1, pp. 4-11, Jan. 2009.
[4] J. Wright, A.Y. Yang, A. Ganesh, S.S. Sastry, and Y. Ma, "Robust Face Recognition via Sparse Representation," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 31, no. 2, pp. 210-227, Feb. 2009.
[5] H. Proenca and L.A. Alexandre, "Iris Segmentation Methodology for Non-Cooperative Recognition," IEE Proc. Vision, Image and Signal Processing, vol. 153, pp. 199-205, 2006.
[6] A.K. Jain, K. Nandakumar, and A. Nagar, "Biometric Template Security," EURASIP J. Advances in Signal Processing, Special Issue on Biometrics, vol. 2008, no. 113, pp. 1-17, 2008.
[7] R.M. Bolle, J.H. Connel, and N.K. Ratha, "Biometrics Perils and Patches," Pattern Recognition, vol. 35, no. 12, pp. 2727-2738, 2002.
[8] N.K. Ratha, J.H. Connel, and R.M. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication Systems," IBM Systems J., vol. 40, no. 3, pp. 614-634, 2001.
[9] J. Daugman, "High Confidence Visual Recognition of Persons by a Test of Statistical Independence," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148-1161, Nov. 1993.
[10] R.P. Wildes, "Iris Recognition: An Emerging Biometric Technology," Proc. IEEE, vol. 85, no. 9, pp. 1348-1363, Sept. 1997.
[11] Y. Chen, S.C. Dass, and A.K. Jain, "Localized Iris Image Quality Using 2-D Wavelets," Proc. Int'l Conf. Biometrics, pp. 373-381, 2006.
[12] N.D. Kalka, J. Zuo, N.A. Schmid, and B. Cukic, "Image Quality Assessment for Iris Biometric," Proc. SPIE Conf. Biometric Technology for Human Identification, p. 6202, 2006.
[13] H. Proenca and L.A. Alexandre, "A Method for the Identification of Noisy Regions in Normalized Iris Images," Proc. Int'l Conf. Pattern Recognition, pp. 405-408, 2006.
[14] X.-D. Zhu, Y.-N. Liu, X. Ming, and Q.-L. Cui, "Quality Evaluation Method of Iris Images Sequence Based on Wavelet Coefficients in Region of Interest," Proc. Fourth Int'l Conf. Computer and Information Technology, pp. 24-27, 2004.
[15] L. Ma, T. Tan, Y. Wang, and D. Zhang, "Personal Identification Based on Iris Texture Analysis," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 25, no. 12, pp. 1519-1533, Dec. 2003.
[16] S. Rakshit and D. Monro, "Iris Image Selection and Localization Based on Analysis of Specular Reflection," Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics, pp. 1-4, 2007.
[17] K.P. Hollingsworth, K.W. Bowyer, and P.J. Flynn, "Image Averaging for Improved Iris Recognition," Proc. Third Int'l Conf. Advances in Biometrics, 2009.
[18] Y. Du, "Using 2D Log-Gabor Spatial Filters for Iris Recognition," Proc. SPIE Conf. Biometric Technology for Human Identification III, 2006.
[19] L. Ma, T. Tan, Y. Wang, and D. Zhang, "Efficient Iris Recognition by Characterizing Key Local Variations," IEEE Trans. Image Processing, vol. 13, no. 6, pp. 739-750, June 2004.
[20] E. Krichen, L. Allano, S. Garcia-Salicetti, and B. Dorizzi, "Specific Texture Analysis for Iris Recognition," Proc. Fifth Int'l Conf. Audio- and Video-Based Biometric Person Authentication, pp. 23-30, 2005.
[21] N.A. Schmid, M.V. Ketkar, H. Singh, and B. Cukic, "Performance Analysis of Iris Based Identification System at the Matching Score Level," IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 154-168, June 2006.
[22] C. Liu and M. Xie, "Iris Recognition Based on DLDA," Proc. Int'l Conf. Pattern Recognition, pp. 489-492, 2006.
[23] K. Roy and P. Bhattacharya, "Iris Recognition with Support Vector Machines," Proc. Int'l Conf. Biometrics, pp. 486-492, 2006.
[24] G.I. Davida, Y. Frankel, and B.J. Matt, "On Enabling Secure Applications through Off-Line Biometric Identification," Proc. IEEE Symp. Security and Privacy, pp. 148-157, 1998.
[25] F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometrics Effectively," IEEE Trans. Computers, vol. 55, no. 9, pp. 1081-1088, Sept. 2006.
[26] S. Kanade, D. Petrovska-Delacretaz, and B. Dorizzi, "Cancelable Iris Biometrics and Using Error Correcting Codes to Reduce Variability in Biometric Data," Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2009.
[27] A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proc. ACM Conf. Computers and Comm. Security, pp. 28-36, 1999.
[28] A.B.J. Teoh, A. Goh, and D.C.L. Ngo, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892-1901, Dec. 2006.
[29] J. Zuo, N.K. Ratha, and J.H. Connell, "Cancelable Iris Biometric," Proc. Int'l Conf. Pattern Recognition, pp. 1-4, 2008.
[30] D.L. Donoho and X. Huo, "Uncertainty Principle and Ideal Atomic Decomposition," IEEE Trans. Information Theory, vol. 47, no. 7, pp. 2845-2862, Nov. 2001.
[31] D.L. Donoho and M. Elad, "On the Stability of the Basis Pursuit in the Presence of Noise," EURASIP Signal Processing J., vol. 86, no. 3, pp. 511-532, 2006.
[32] E. Candès, J. Romberg, and T. Tao, "Stable Signal Recovery from Incomplete and Inaccurate Measurements," Comm. Pure and Applied Math., vol. 59, pp. 1207-1223, 2006.
[33] R. Baraniuk, "Compressive Sensing," IEEE Signal Processing Magazine, vol. 24, no. 4, pp. 118-121, July 2007.
[34] S. Chen, D. Donoho, and M. Saunders, "Atomic Decomposition by Basis Pursuit," SIAM J. Scientific Computing, vol. 20, no. 1, pp. 33-61, 1998.
[35] J.A. Tropp and A.C. Gilbert, "Signal Recovery from Random Measurements via Orthogonal Matching Pursuit," IEEE Trans. Information Theory, vol. 53, no. 12, pp. 4655-4666, Dec. 2007.
[36] P.J. Phillips, "Matching Pursuit Filters Applied to Face Identification," IEEE Trans. Image Processing, vol. 7, no. 8, pp. 1150-1164, Aug. 1998.
[37] J.K. Pillai, V.M. Patel, and R. Chellappa, "Sparsity Inspired Selection and Recognition of Iris Images," Proc. Third IEEE Int'l Conf. Biometrics—Technology And Systems, 2009.
[38] A.B.J. Teoh and C.T. Yuang, "Cancelable Biometrics Realization with Multispace Random Projections," IEEE Trans. Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 37, no. 5, pp. 1096-1106, Oct. 2007.
[39] J.K. Pillai, V.M. Patel, R. Chellappa, and N.K. Ratha, "Sectored Random Projections for Cancelable Iris Biometrics," Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal Processing, 2010.
[40] H. Rauhut, K. Schnass, and P. Vandergheynst, "Compressed Sensing and Redundant Dictionaries," IEEE Trans. Information Theory, vol. 54, no. 5, pp. 2210-2219, May 2008.
[41] E. Candes, J. Romberg, and T. Tao, "Robust Uncertainty Principles: Exact Signal Reconstruction from Highly Incomplete Frequency Information," IEEE Trans. Information Theory, vol. 52, no. 2, pp. 489-509, Feb. 2006.
[42] D.L. Donoho, "High-Dimensional Centrally Symmetric Polytopes with Neighborliness Proportional to Dimension," Discrete and Computational Geometry, vol. 35, no. 4, pp. 617-652, 2006.
[43] J.D. Blanchard, C. Cartis, and J. Tanner, "The Restricted Isometry Property and $\ell_{q}$ -Regularization: Phase Transition for Sparse Approximation," to be published.
[44] K.W. Bowyer and P.J. Flynn, "The ND-IRIS-0405 Iris Image Data Set," technical report, Notre Dame CVRL, 2010.
[45] P.J. Phillips, P.J. Flynn, J.R. Beveridge, W.T. Scruggs, A.J. O'Toole, D.S. Bolme, K.W. Bowyer, B.A. Draper, G.H. Givens, Y.M. Lui, H. Sahibzada, J.A. Scallan, and S. Weimer, "Overview of the Multiple Biometrics Grand Challenge," Proc. Third Int'l Assoc. for Pattern Recognition/IEEE Conf. Biometrics, 2009.
[46] E. van den Berg and M.P. Friedlander, "Probing the Pareto Frontier for Basis Pursuit Solutions," SIAM J. Scientific Computing, vol. 31, no. 2, pp. 890-912, 2008.
[47] L. Masek and P. Kovesi, "MATLAB Source Code for a Biometric Identification System Based on Iris Patterns," Univ. of Western Australia, 2003.
[48] P.J. Phillips, "FRGC and ICE Workshop," Proc. NRECA Conf. Facility, 2006.
[49] J. Thornton, M. Savvides, and B.V.K.V. Kumar, "A Bayesian Approach to Deformed Pattern Matching of Iris Images," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 596-606, Apr. 2007.
[50] A. Yang, A. Ganesh, S. Sastry, and Y. Ma, "Fast L1-Minimization Algorithms and an Application in Robust Face Recognition: A Review," Technical Report No. UCB/EECS-2010-13, 2010.
[51] D. Needell and J.A. Tropp, "CoSaMP: Iterative Signal Recovery from Incomplete and Inaccurate Samples," Applied and Computational Harmonic Analysis, vol. 26, pp. 301-321, 2009.
[52] H. Zou and T. Hastie, "Regularization and Variable Selection via the Elastic Net," J. Royal Statistical Soc., vol. 67, no. 2, pp. 301-320, 2005.
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool