WorldWideScience

Sample records for bartus iris biometrics

  1. Bartus Iris biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R.; Grace, W.

    1996-07-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). We won a 1994 R&D 100 Award for inventing the Bartas Iris Verification System. The system has been delivered to a sponsor and is no longer available to us. This technology can verify the identity of a person for purposes of access control, national security, law enforcement, forensics, counter-terrorism, and medical, financial, or scholastic records. The technique is non-invasive, psychologically acceptable, works in real-time, and obtains more biometric data than any other biometric except DNA analysis. This project sought to develop a new, second-generation prototype instrument.

  2. Iris and periocular biometrics

    CERN Document Server

    Rathgeb, Christian

    2017-01-01

    This book provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition. It covers: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends.

  3. Privacy Preserving Iris Based Biometric Identity Verification

    Directory of Open Access Journals (Sweden)

    Przemyslaw Strzelczyk

    2011-08-01

    Full Text Available Iris biometrics is considered one of the most accurate and robust methods of identity verification. Individually unique iris features can be presented in a compact binary form easily compared with reference template to confirm identity. However, when templates or features are disclosed, iris biometrics is no longer suitable for verification. Therefore, there is a need to perform iris feature matching without revealing the features itself and reference template. The paper proposes an extension of the standard iris-based verification protocol that introduces features and a template locking mechanism, which guarantees that no sensitive information is exposed.Article in English

  4. Iris analysis for biometric recognition systems

    CERN Document Server

    Bodade, Rajesh M

    2014-01-01

    The book presents three most significant areas in Biometrics and Pattern Recognition. A step-by-step approach for design and implementation of Dual Tree Complex Wavelet Transform (DTCWT) plus Rotated Complex Wavelet Filters (RCWF) is discussed in detail. In addition to the above, the book provides detailed analysis of iris images and two methods of iris segmentation. It also discusses simplified study of some subspace-based methods and distance measures for iris recognition backed by empirical studies and statistical success verifications.

  5. Correlation of iris biometrics and DNA

    DEFF Research Database (Denmark)

    Harder, Stine; Clemmensen, Line Katrine Harder; Dahl, Anders Bjorholm

    2013-01-01

    The presented work concerns prediction of complex human phenotypes from genotypes. We were interested in correlating iris color and texture with DNA. Our data consist of 212 eye images along with DNA: 32 single-nucleotide polymorphisms (SNPs). We used two types of biometrics to describe the eye...... images: One for iris color and one for iris texture. Both biometrics were high dimensional and a sparse principle component analysis (SPCA) reduced the dimensions and resulted in a representation of data with good interpretability. The correlations between the sparse principal components (SPCs......) and the 32 SNPs were found using a canonical correlation analysis (CCA). The result was a single significant canonical correlation (CC) for both biometrics. Each CC comprised two correlated canonical variables, consisting of a linear combination of SPCs and a linear combination of SNPs, respectively...

  6. Iris biometric system design using multispectral imaging

    Science.gov (United States)

    Widhianto, Benedictus Yohanes Bagus Y. B.; Nasution, Aulia M. T.

    2016-11-01

    An identity recognition system is a vital component that cannot be separated from life, iris biometric is one of the biometric that has the best accuracy reaching 99%. Usually, iris biometric systems use infrared spectrum lighting to reduce discomfort caused by radiation when the eye is given direct light, while the eumelamin that is forming the iris has the most flourescent radiation when given a spectrum of visible light. This research will be conducted by detecting iris wavelengths of 850 nm, 560 nm, and 590 nm, where the detection algorithm will be using Daugman algorithm by using a Gabor wavelet extraction feature, and matching feature using a Hamming distance. Results generated will be analyzed to identify how much differences there are, and to improve the accuracy of the multispectral biometric system and as a detector of the authenticity of the iris. The results obtained from the analysis of wavelengths 850 nm, 560 nm, and 590 nm respectively has an accuracy of 99,35 , 97,5 , 64,5 with a matching score of 0,26 , 0,23 , 0,37.

  7. IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION

    OpenAIRE

    Dr M V Bramhananda Reddy; Dr V Goutham

    2018-01-01

    Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using ...

  8. ORNL Biometric Eye Model for Iris Recognition

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J [ORNL; Barstow, Del R [ORNL; Karakaya, Mahmut [ORNL; Chaum, Edward [University of Tennessee, Knoxville (UTK); Boehnen, Chris Bensing [ORNL

    2012-01-01

    Iris recognition has been proven to be an accurate and reliable biometric. However, the recognition of non-ideal iris images such as off angle images is still an unsolved problem. We propose a new biometric targeted eye model and a method to reconstruct the off-axis eye to its frontal view allowing for recognition using existing methods and algorithms. This allows for existing enterprise level algorithms and approaches to be largely unmodified by using our work as a pre-processor to improve performance. In addition, we describe the `Limbus effect' and its importance for an accurate segmentation of off-axis irides. Our method uses an anatomically accurate human eye model and ray-tracing techniques to compute a transformation function, which reconstructs the iris to its frontal, non-refracted state. Then, the same eye model is used to render a frontal view of the reconstructed iris. The proposed method is fully described and results from synthetic data are shown to establish an upper limit on performance improvement and establish the importance of the proposed approach over traditional linear elliptical unwrapping methods. Our results with synthetic data demonstrate the ability to perform an accurate iris recognition with an image taken as much as 70 degrees off-axis.

  9. Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images

    OpenAIRE

    Youmaran, R.; Adler, A.

    2012-01-01

    This paper develops an approach to measure the information content in a biometric feature representation of iris images. In this context, the biometric feature information is calculated using the relative entropy between the intraclass and interclass feature distributions. The collected data is regularized using a Gaussian model of the feature covariances in order to practically measure the biometric information with limited data samples. An example of this method is shown for iris templates ...

  10. Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images

    Directory of Open Access Journals (Sweden)

    R. Youmaran

    2012-01-01

    Full Text Available This paper develops an approach to measure the information content in a biometric feature representation of iris images. In this context, the biometric feature information is calculated using the relative entropy between the intraclass and interclass feature distributions. The collected data is regularized using a Gaussian model of the feature covariances in order to practically measure the biometric information with limited data samples. An example of this method is shown for iris templates processed using Principal-Component Analysis- (PCA- and Independent-Component Analysis- (ICA- based feature decomposition schemes. From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. This value approximately matches previous estimates of iris information content.

  11. Iris recognition as a biometric method after cataract surgery

    Directory of Open Access Journals (Sweden)

    Roizenblatt Jaime

    2004-01-01

    Full Text Available Abstract Background Biometric methods are security technologies, which use human characteristics for personal identification. Iris recognition systems use iris textures as unique identifiers. This paper presents an analysis of the verification of iris identities after intra-ocular procedures, when individuals were enrolled before the surgery. Methods Fifty-five eyes from fifty-five patients had their irises enrolled before a cataract surgery was performed. They had their irises verified three times before and three times after the procedure, and the Hamming (mathematical distance of each identification trial was determined, in a controlled ideal biometric environment. The mathematical difference between the iris code before and after the surgery was also compared to a subjective evaluation of the iris anatomy alteration by an experienced surgeon. Results A correlation between visible subjective iris texture alteration and mathematical difference was verified. We found only six cases in which the eye was no more recognizable, but these eyes were later reenrolled. The main anatomical changes that were found in the new impostor eyes are described. Conclusions Cataract surgeries change iris textures in such a way that iris recognition systems, which perform mathematical comparisons of textural biometric features, are able to detect these changes and sometimes even discard a pre-enrolled iris considering it an impostor. In our study, re-enrollment proved to be a feasible procedure.

  12. Iris recognition as a biometric method after cataract surgery.

    Science.gov (United States)

    Roizenblatt, Roberto; Schor, Paulo; Dante, Fabio; Roizenblatt, Jaime; Belfort, Rubens

    2004-01-28

    Biometric methods are security technologies, which use human characteristics for personal identification. Iris recognition systems use iris textures as unique identifiers. This paper presents an analysis of the verification of iris identities after intra-ocular procedures, when individuals were enrolled before the surgery. Fifty-five eyes from fifty-five patients had their irises enrolled before a cataract surgery was performed. They had their irises verified three times before and three times after the procedure, and the Hamming (mathematical) distance of each identification trial was determined, in a controlled ideal biometric environment. The mathematical difference between the iris code before and after the surgery was also compared to a subjective evaluation of the iris anatomy alteration by an experienced surgeon. A correlation between visible subjective iris texture alteration and mathematical difference was verified. We found only six cases in which the eye was no more recognizable, but these eyes were later reenrolled. The main anatomical changes that were found in the new impostor eyes are described. Cataract surgeries change iris textures in such a way that iris recognition systems, which perform mathematical comparisons of textural biometric features, are able to detect these changes and sometimes even discard a pre-enrolled iris considering it an impostor. In our study, re-enrollment proved to be a feasible procedure.

  13. Extending the imaging volume for biometric iris recognition.

    Science.gov (United States)

    Narayanswamy, Ramkumar; Johnson, Gregory E; Silveira, Paulo E X; Wach, Hans B

    2005-02-10

    The use of the human iris as a biometric has recently attracted significant interest in the area of security applications. The need to capture an iris without active user cooperation places demands on the optical system. Unlike a traditional optical design, in which a large imaging volume is traded off for diminished imaging resolution and capacity for collecting light, Wavefront Coded imaging is a computational imaging technology capable of expanding the imaging volume while maintaining an accurate and robust iris identification capability. We apply Wavefront Coded imaging to extend the imaging volume of the iris recognition application.

  14. Challenges at different stages of an iris based biometric system

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2012-04-01

    Full Text Available Iris recognition has been used for authentication for the past few years and is capable of positive/negative authenticationof an individual without any physical contact or intervention. This technique is being used mainly because of its uniqueness,stability, and reliability but still many challenges are being faced an the iris based recognition system. This paperpresents the difficulties faced in different modules, like the sensor module, preprocessing module, feature extraction module,and matching module of an iris biometric system.

  15. Cosmetic Detection Framework for Face and Iris Biometrics

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2018-04-01

    Full Text Available Cosmetics pose challenges to the recognition performance of face and iris biometric systems due to its ability to alter natural facial and iris patterns. Facial makeup and iris contact lens are considered to be commonly applied cosmetics for the face and iris in this study. The present work aims to present a novel solution for the detection of cosmetics in both face and iris biometrics by the fusion of texture, shape and color descriptors of images. The proposed cosmetic detection scheme combines the microtexton information from the local primitives of texture descriptors with the color spaces achieved from overlapped blocks in order to achieve better detection of spots, flat areas, edges, edge ends, curves, appearance and colors. The proposed cosmetic detection scheme was applied to the YMU YouTube makeup database (YMD facial makeup database and IIIT-Delhi Contact Lens iris database. The results demonstrate that the proposed cosmetic detection scheme is significantly improved compared to the other schemes implemented in this study.

  16. Biometric verificaton and biometric identification of a person by methods of statistical analysis of digitized iris images

    Czech Academy of Sciences Publication Activity Database

    Machala, L.; Pospíšil, Jaroslav

    40-41, - (2001), s. 155-162 ISSN 0231-9365 Institutional research plan: CEZ:AV0Z1010921 Keywords : biometric verification * biometric idntification * human eye`s iris * statistical error of type I * statistical erroer II * charasteristic iris vector Subject RIV: BH - Optics, Masers, Lasers

  17. Laboratory evaluation of the IriScan prototype biometric identifier

    Energy Technology Data Exchange (ETDEWEB)

    Bouchier, F.; Ahrens, J.S.; Wells, G.

    1996-04-01

    One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometric device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.

  18. Biometric iris image acquisition system with wavefront coding technology

    Science.gov (United States)

    Hsieh, Sheng-Hsun; Yang, Hsi-Wen; Huang, Shao-Hung; Li, Yung-Hui; Tien, Chung-Hao

    2013-09-01

    Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiological attributes, such as DNA, facial features, retinal vasculature, fingerprint, hand geometry, iris texture and so on; the other scenario is dependent on the individual behavioral attributes, such as signature, keystroke, voice and gait style. Among these features, iris recognition is one of the most attractive approaches due to its nature of randomness, texture stability over a life time, high entropy density and non-invasive acquisition. While the performance of iris recognition on high quality image is well investigated, not too many studies addressed that how iris recognition performs subject to non-ideal image data, especially when the data is acquired in challenging conditions, such as long working distance, dynamical movement of subjects, uncontrolled illumination conditions and so on. There are three main contributions in this paper. Firstly, the optical system parameters, such as magnification and field of view, was optimally designed through the first-order optics. Secondly, the irradiance constraints was derived by optical conservation theorem. Through the relationship between the subject and the detector, we could estimate the limitation of working distance when the camera lens and CCD sensor were known. The working distance is set to 3m in our system with pupil diameter 86mm and CCD irradiance 0.3mW/cm2. Finally, We employed a hybrid scheme combining eye tracking with pan and tilt system, wavefront coding technology, filter optimization and post signal recognition to implement a robust iris recognition system in dynamic operation. The blurred image was restored to ensure recognition accuracy over 3m working distance with 400mm focal length and aperture F/6.3 optics. The simulation result as well as experiment validates the proposed code

  19. Gaze estimation for off-angle iris recognition based on the biometric eye model

    Science.gov (United States)

    Karakaya, Mahmut; Barstow, Del; Santos-Villalobos, Hector; Thompson, Joseph; Bolme, David; Boehnen, Christopher

    2013-05-01

    Iris recognition is among the highest accuracy biometrics. However, its accuracy relies on controlled high quality capture data and is negatively affected by several factors such as angle, occlusion, and dilation. Non-ideal iris recognition is a new research focus in biometrics. In this paper, we present a gaze estimation method designed for use in an off-angle iris recognition framework based on the ORNL biometric eye model. Gaze estimation is an important prerequisite step to correct an off-angle iris images. To achieve the accurate frontal reconstruction of an off-angle iris image, we first need to estimate the eye gaze direction from elliptical features of an iris image. Typically additional information such as well-controlled light sources, head mounted equipment, and multiple cameras are not available. Our approach utilizes only the iris and pupil boundary segmentation allowing it to be applicable to all iris capture hardware. We compare the boundaries with a look-up-table generated by using our biologically inspired biometric eye model and find the closest feature point in the look-up-table to estimate the gaze. Based on the results from real images, the proposed method shows effectiveness in gaze estimation accuracy for our biometric eye model with an average error of approximately 3.5 degrees over a 50 degree range.

  20. Gaze Estimation for Off-Angle Iris Recognition Based on the Biometric Eye Model

    Energy Technology Data Exchange (ETDEWEB)

    Karakaya, Mahmut [ORNL; Barstow, Del R [ORNL; Santos-Villalobos, Hector J [ORNL; Thompson, Joseph W [ORNL; Bolme, David S [ORNL; Boehnen, Chris Bensing [ORNL

    2013-01-01

    Iris recognition is among the highest accuracy biometrics. However, its accuracy relies on controlled high quality capture data and is negatively affected by several factors such as angle, occlusion, and dilation. Non-ideal iris recognition is a new research focus in biometrics. In this paper, we present a gaze estimation method designed for use in an off-angle iris recognition framework based on the ANONYMIZED biometric eye model. Gaze estimation is an important prerequisite step to correct an off-angle iris images. To achieve the accurate frontal reconstruction of an off-angle iris image, we first need to estimate the eye gaze direction from elliptical features of an iris image. Typically additional information such as well-controlled light sources, head mounted equipment, and multiple cameras are not available. Our approach utilizes only the iris and pupil boundary segmentation allowing it to be applicable to all iris capture hardware. We compare the boundaries with a look-up-table generated by using our biologically inspired biometric eye model and find the closest feature point in the look-up-table to estimate the gaze. Based on the results from real images, the proposed method shows effectiveness in gaze estimation accuracy for our biometric eye model with an average error of approximately 3.5 degrees over a 50 degree range.

  1. Iris Segmentation using Gradient Magnitude and Fourier Descriptor for Multimodal Biometric Authentication System

    Directory of Open Access Journals (Sweden)

    Defiana Sulaeman

    2016-12-01

    Full Text Available Perfectly segmenting the area of the iris is one of the most important steps in iris recognition. There are several problematic areas that affect the accuracy of the iris segmentation step, such as eyelids, eyelashes, glasses, pupil (due to less accurate iris segmentation, motion blur, and lighting and specular reflections. To solve these problems, gradient magnitude and Fourier descriptor are employed to do iris segmentation in the proposed Multimodal Biometric Authentication System (MBAS. This approach showed quite promising results, i.e. an accuracy rate of 97%. The result of the iris recognition system was combined with the result of an open-source fingerprint recognition system to develop a multimodal biometrics authentication system. The results of the fusion between iris and fingerprint authentication were 99% accurate. Data from Multimedia Malaysia University (MMUI and our own prepared database, the SGU-MB-1 dataset, were used to test the accuracy of the proposed system.

  2. Information analysis of iris biometrics for the needs of cryptology key extraction

    Directory of Open Access Journals (Sweden)

    Adamović Saša

    2013-01-01

    Full Text Available The paper presents a rigorous analysis of iris biometric information for the synthesis of an optimized system for the extraction of a high quality cryptology key. Estimations of local entropy and mutual information were identified as segments of the iris most suitable for this purpose. In order to optimize parameters, corresponding wavelets were transformed, in order to obtain the highest possible entropy and mutual information lower in the transformation domain, which set frameworks for the synthesis of systems for the extraction of truly random sequences of iris biometrics, without compromising authentication properties. [Projekat Ministarstva nauke Republike Srbije, br. TR32054 i br. III44006

  3. Fusing iris and palmprint at image level for multi-biometrics verification

    Science.gov (United States)

    Liu, Jingwang; Hou, Yan; Wang, Jingyan; Li, Yongping; Wang, Quanquan; Man, Jiaju; Xie, Honglan; He, Jianhua

    2011-12-01

    The phase-based image matching is effective for both iris and palm recognition tasks. Hence, we can expect that the approach may be useful for multimodal biometric system having palmprint and iris recognition capabilities. This paper investigates the fusion of palmprint and iris biometric at image level. A new image fusion algorithm named Baud limited image product (BLIP) especially for phase-based image matching is proposed. Based on this, a new multi-biometric fusion scheme at image level that combines BLIP and phase-based image matching is proposed. The effective region of iris and palm images are first extracted respectively, then they are fused into one small size image using BLIP, finally matched with the template using phase-based image matching to get a score. The experimental results show that this new scheme can not only improve the system accuracy performance, but also reduce the memory size used to store the template and time consumed by the matching.

  4. Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

    Directory of Open Access Journals (Sweden)

    Jinyu Lu

    2014-01-01

    Full Text Available A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the singular values of each host image's coefficients which are obtained through discrete cosine transform (DCT. Numerical results reveal that proposed method can extract the watermark effectively and illustrate its security and robustness.

  5. Information fusion in personal biometric authentication based on the iris pattern

    International Nuclear Information System (INIS)

    Wang, Fenghua; Han, Jiuqiang

    2009-01-01

    Information fusion in biometrics has received considerable attention. This paper focuses on the application of information fusion techniques in iris recognition. To improve the reliability and accuracy of personal identification based on the iris pattern, this paper proposes the schemes of multialgorithmic fusion and multiinstance fusion. Multialgorithmic fusion integrates the improved phase algorithm and the DCT-based algorithm, and multiinstance fusion combines information from the left iris and the right iris of an individual. Both multialgorithmic fusion and multiinstance fusion are carried out at the matching score level and the support vector machine (SVM)-based fusion rule is utilized to generate fused scores for final decision. The experimental results on the noisy iris database UBIRIS demonstrate that the proposed fusion schemes can perform better than the single recognition systems, and further prove that information fusion techniques are feasible and effective to improve the accuracy and robustness of iris recognition especially under noisy conditions

  6. Information fusion in personal biometric authentication based on the iris pattern

    Science.gov (United States)

    Wang, Fenghua; Han, Jiuqiang

    2009-04-01

    Information fusion in biometrics has received considerable attention. This paper focuses on the application of information fusion techniques in iris recognition. To improve the reliability and accuracy of personal identification based on the iris pattern, this paper proposes the schemes of multialgorithmic fusion and multiinstance fusion. Multialgorithmic fusion integrates the improved phase algorithm and the DCT-based algorithm, and multiinstance fusion combines information from the left iris and the right iris of an individual. Both multialgorithmic fusion and multiinstance fusion are carried out at the matching score level and the support vector machine (SVM)-based fusion rule is utilized to generate fused scores for final decision. The experimental results on the noisy iris database UBIRIS demonstrate that the proposed fusion schemes can perform better than the single recognition systems, and further prove that information fusion techniques are feasible and effective to improve the accuracy and robustness of iris recognition especially under noisy conditions.

  7. Advances in the biometric recognition methods: a survey on iris and fingerprint recognition

    Science.gov (United States)

    Zaeri, Naser; Alkoot, Fuad

    2010-02-01

    Human recognition based on biometrics finds many important applications in many life sectors and in particular in commercial and law enforcement. This paper aims to give a general overview of the advances in the biometric recognition methods. We concentrate on main methods and accessible ideas presented for human recognition systems based on two types of biometrics: iris and fingerprint. We present a quick overview of the landmark papers that laid the foundation in each track then we present the latest updates and important turns and solutions that developed in each track in the last few years.

  8. A field study of the accuracy and reliability of a biometric iris recognition system.

    Science.gov (United States)

    Latman, Neal S; Herb, Emily

    2013-06-01

    The iris of the eye appears to satisfy the criteria for a good anatomical characteristic for use in a biometric system. The purpose of this study was to evaluate a biometric iris recognition system: Mobile-Eyes™. The enrollment, verification, and identification applications were evaluated in a field study for accuracy and reliability using both irises of 277 subjects. Independent variables included a wide range of subject demographics, ambient light, and ambient temperature. A sub-set of 35 subjects had alcohol-induced nystagmus. There were 2710 identification and verification attempts, which resulted in 1,501,340 and 5540 iris comparisons respectively. In this study, the system successfully enrolled all subjects on the first attempt. All 277 subjects were successfully verified and identified on the first day of enrollment. None of the current or prior eye conditions prevented enrollment, verification, or identification. All 35 subjects with alcohol-induced nystagmus were successfully verified and identified. There were no false verifications or false identifications. Two conditions were identified that potentially could circumvent the use of iris recognitions systems in general. The Mobile-Eyes™ iris recognition system exhibited accurate and reliable enrollment, verification, and identification applications in this study. It may have special applications in subjects with nystagmus. Copyright © 2012 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  9. Reliability of automatic biometric iris recognition after phacoemulsification or drug-induced pupil dilation.

    Science.gov (United States)

    Seyeddain, Orang; Kraker, Hannes; Redlberger, Andreas; Dexl, Alois K; Grabner, Günther; Emesz, Martin

    2014-01-01

    To investigate the reliability of a biometric iris recognition system for personal authentication after cataract surgery or iatrogenic pupil dilation. This was a prospective, nonrandomized, single-center, cohort study for evaluating the performance of an iris recognition system 2-24 hours after phacoemulsification and intraocular lens implantation (group 1) and before and after iatrogenic pupil dilation (group 2). Of the 173 eyes that could be enrolled before cataract surgery, 164 (94.8%) were easily recognized postoperatively, whereas in 9 (5.2%) this was not possible. However, these 9 eyes could be reenrolled and afterwards recognized successfully. In group 2, of a total of 184 eyes that were enrolled in miosis, a total of 22 (11.9%) could not be recognized in mydriasis and therefore needed reenrollment. No single case of false-positive acceptance occurred in either group. The results of this trial indicate that standard cataract surgery seems not to be a limiting factor for iris recognition in the large majority of cases. Some patients (5.2% in this study) might need "reenrollment" after cataract surgery. Iris recognition was primarily successful in eyes with medically dilated pupils in nearly 9 out of 10 eyes. No single case of false-positive acceptance occurred in either group in this trial. It seems therefore that iris recognition is a valid biometric method in the majority of cases after cataract surgery or after pupil dilation.

  10. Edge detection of iris of the eye for human biometric identification system

    Directory of Open Access Journals (Sweden)

    Kateryna O. Tryfonova

    2015-03-01

    Full Text Available Method of human biometric identification by iris of the eye is considered as one of the most accurate and reliable methods of identification. Aim of the research is to solve the problem of edge detection of digital image of the human eye iris to be able to implement human biometric identification system by means of mobile device. To achieve this aim the algorithm of edge detection by Canny is considered in work. It consists of the following steps: smoothing, finding gradients, non-maximum suppression, double thresholding with hysteresis. The software implementation of the Canny algorithm is carried out for the Android mobile platform with the use of high level programming language Java.

  11. The Iris biometric feature segmentation using finite element method

    Directory of Open Access Journals (Sweden)

    David Ibitayo LANLEGE

    2015-05-01

    Full Text Available This manuscript presents a method for segmentation of iris images based on a deformable contour (active contour paradigm. The deformable contour is a novel approach in image segmentation. A type of active contour is the Snake. Snake is a parametric curve defined within the domain of the image. Snake properties are specified through a function called energy functional. This means they consist of packets of energy which expressed as partial Differential Equations. The partial Differential Equation is the controlling engine of the active contour since this project, the Finite Element Method (Standard Galerkin Method implementation for deformable model is presented.

  12. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.

    Science.gov (United States)

    Galbally, Javier; Marcel, Sébastien; Fierrez, Julian

    2014-02-01

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

  13. Extended depth of field in an intrinsically wavefront-encoded biometric iris camera

    Science.gov (United States)

    Bergkoetter, Matthew D.; Bentley, Julie L.

    2014-12-01

    This work describes a design process which greatly increases the depth of field of a simple three-element lens system intended for biometric iris recognition. The system is optimized to produce a point spread function which is insensitive to defocus, so that recorded images may be deconvolved without knowledge of the exact object distance. This is essentially a variation on the technique of wavefront encoding, however the desired encoding effect is achieved by aberrations intrinsic to the lens system itself, without the need for a pupil phase mask.

  14. Comparative biometric study between plateau iris configuration and primary open angle glaucoma with narrow angle.

    Science.gov (United States)

    Diniz Filho, Alberto; Cronemberger, Sebastião; Mérula, Rafael Vidal; Calixto, Nassim

    2009-01-01

    To investigate biometrically the differences between plateau iris configuration (PIC) eyes and primary open angle glaucoma with narrow angle eyes. A comparative study involving a case series with 20 eyes of 11 plateau iris configuration patients and 45 eyes of 27 primary open angle glaucoma with narrow angle eyes patients was done. The following measurements were taken: corneal curvature, central corneal thickness, anterior chamber depth, lens thickness (LT), axial length (AL), lens thickness and axial length ratio, lens position (LP) and relative lens position (RLP). The plateau iris configuration eyes presented a higher corneal cuvature value than primary open angle glaucoma with narrow angle eyes eyes but not with clinical and statistical difference (P=0.090). The plateau iris configuration eyes demonstrated a higher central corneal thickness, with statistical significance, when compared to primary open angle glaucoma with narrow angle eyes (P=0.010). Statistical significant difference between plateau iris configuration and primary open angle glaucoma with narrow angle eyes was found in axial length (21.69 +/- 0.98 vs. 22.42 +/- 0.89; P=0.003). No significant difference was found when anterior chamber depth (2.62 +/- 0.23 vs. 2.71 +/- 0.31; P=0.078), LT (4.67 +/- 0.36 vs. 4.69 +/- 0.45; P=0.975), LT/AL (2.16 +/- 0.17 vs. 2.10 +/- 0.21; P=0.569), LP (4.95 +/- 0.25 vs. 5.06 +/- 0.34; P=0.164) and RLP (0.23 +/- 0.01 vs. 0.22 +/- 0.14; P=0.348) were evaluated. The eyes with plateau iris configuration presented statistical significantly shorter axial length and higher central corneal thickness than primary open angle glaucoma with narrow angle eyes.

  15. Face-iris multimodal biometric scheme based on feature level fusion

    Science.gov (United States)

    Huo, Guang; Liu, Yuanning; Zhu, Xiaodong; Dong, Hongxing; He, Fei

    2015-11-01

    Unlike score level fusion, feature level fusion demands all the features extracted from unimodal traits with high distinguishability, as well as homogeneity and compatibility, which is difficult to achieve. Therefore, most multimodal biometric research focuses on score level fusion, whereas few investigate feature level fusion. We propose a face-iris recognition method based on feature level fusion. We build a special two-dimensional-Gabor filter bank to extract local texture features from face and iris images, and then transform them by histogram statistics into an energy-orientation variance histogram feature with lower dimensions and higher distinguishability. Finally, through a fusion-recognition strategy based on principal components analysis and support vector machine (FRSPS), feature level fusion and one-to-n identification are accomplished. The experimental results demonstrate that this method can not only effectively extract face and iris features but also provide higher recognition accuracy. Compared with some state-of-the-art fusion methods, the proposed method has a significant performance advantage.

  16. Comparative Study of Multimodal Biometric Recognition by Fusion of Iris and Fingerprint

    Science.gov (United States)

    Benaliouche, Houda; Touahria, Mohamed

    2014-01-01

    This research investigates the comparative performance from three different approaches for multimodal recognition of combined iris and fingerprints: classical sum rule, weighted sum rule, and fuzzy logic method. The scores from the different biometric traits of iris and fingerprint are fused at the matching score and the decision levels. The scores combination approach is used after normalization of both scores using the min-max rule. Our experimental results suggest that the fuzzy logic method for the matching scores combinations at the decision level is the best followed by the classical weighted sum rule and the classical sum rule in order. The performance evaluation of each method is reported in terms of matching time, error rates, and accuracy after doing exhaustive tests on the public CASIA-Iris databases V1 and V2 and the FVC 2004 fingerprint database. Experimental results prior to fusion and after fusion are presented followed by their comparison with related works in the current literature. The fusion by fuzzy logic decision mimics the human reasoning in a soft and simple way and gives enhanced results. PMID:24605065

  17. Comparative Study of Multimodal Biometric Recognition by Fusion of Iris and Fingerprint

    Directory of Open Access Journals (Sweden)

    Houda Benaliouche

    2014-01-01

    Full Text Available This research investigates the comparative performance from three different approaches for multimodal recognition of combined iris and fingerprints: classical sum rule, weighted sum rule, and fuzzy logic method. The scores from the different biometric traits of iris and fingerprint are fused at the matching score and the decision levels. The scores combination approach is used after normalization of both scores using the min-max rule. Our experimental results suggest that the fuzzy logic method for the matching scores combinations at the decision level is the best followed by the classical weighted sum rule and the classical sum rule in order. The performance evaluation of each method is reported in terms of matching time, error rates, and accuracy after doing exhaustive tests on the public CASIA-Iris databases V1 and V2 and the FVC 2004 fingerprint database. Experimental results prior to fusion and after fusion are presented followed by their comparison with related works in the current literature. The fusion by fuzzy logic decision mimics the human reasoning in a soft and simple way and gives enhanced results.

  18. Comparative study of multimodal biometric recognition by fusion of iris and fingerprint.

    Science.gov (United States)

    Benaliouche, Houda; Touahria, Mohamed

    2014-01-01

    This research investigates the comparative performance from three different approaches for multimodal recognition of combined iris and fingerprints: classical sum rule, weighted sum rule, and fuzzy logic method. The scores from the different biometric traits of iris and fingerprint are fused at the matching score and the decision levels. The scores combination approach is used after normalization of both scores using the min-max rule. Our experimental results suggest that the fuzzy logic method for the matching scores combinations at the decision level is the best followed by the classical weighted sum rule and the classical sum rule in order. The performance evaluation of each method is reported in terms of matching time, error rates, and accuracy after doing exhaustive tests on the public CASIA-Iris databases V1 and V2 and the FVC 2004 fingerprint database. Experimental results prior to fusion and after fusion are presented followed by their comparison with related works in the current literature. The fusion by fuzzy logic decision mimics the human reasoning in a soft and simple way and gives enhanced results.

  19. Score level fusion scheme based on adaptive local Gabor features for face-iris-fingerprint multimodal biometric

    Science.gov (United States)

    He, Fei; Liu, Yuanning; Zhu, Xiaodong; Huang, Chun; Han, Ye; Chen, Ying

    2014-05-01

    A multimodal biometric system has been considered a promising technique to overcome the defects of unimodal biometric systems. We have introduced a fusion scheme to gain a better understanding and fusion method for a face-iris-fingerprint multimodal biometric system. In our case, we use particle swarm optimization to train a set of adaptive Gabor filters in order to achieve the proper Gabor basic functions for each modality. For a closer analysis of texture information, two different local Gabor features for each modality are produced by the corresponding Gabor coefficients. Next, all matching scores of the two Gabor features for each modality are projected to a single-scalar score via a trained, supported, vector regression model for a final decision. A large-scale dataset is formed to validate the proposed scheme using the Facial Recognition Technology database-fafb and CASIA-V3-Interval together with FVC2004-DB2a datasets. The experimental results demonstrate that as well as achieving further powerful local Gabor features of multimodalities and obtaining better recognition performance by their fusion strategy, our architecture also outperforms some state-of-the-art individual methods and other fusion approaches for face-iris-fingerprint multimodal biometric systems.

  20. Template characterization and correlation algorithm created from segmentation for the iris biometric authentication based on analysis of textures implemented on a FPGA

    International Nuclear Information System (INIS)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L

    2011-01-01

    Among the most used biometric signals to set personal security permissions, taker increasingly importance biometric iris recognition based on their textures and images of blood vessels due to the rich in these two unique characteristics that are unique to each individual. This paper presents an implementation of an algorithm characterization and correlation of templates created for biometric authentication based on iris texture analysis programmed on a FPGA (Field Programmable Gate Array), authentication is based on processes like characterization methods based on frequency analysis of the sample, and frequency correlation to obtain the expected results of authentication.

  1. MULTIMODAL BIOMETRIC AUTHENTICATION USING PARTICLE SWARM OPTIMIZATION ALGORITHM WITH FINGERPRINT AND IRIS

    Directory of Open Access Journals (Sweden)

    A. Muthukumar

    2012-02-01

    Full Text Available In general, the identification and verification are done by passwords, pin number, etc., which is easily cracked by others. In order to overcome this issue biometrics is a unique tool for authenticate an individual person. Nevertheless, unimodal biometric is suffered due to noise, intra class variations, spoof attacks, non-universality and some other attacks. In order to avoid these attacks, the multimodal biometrics i.e. combining of more modalities is adapted. In a biometric authentication system, the acceptance or rejection of an entity is dependent on the similarity score falling above or below the threshold. Hence this paper has focused on the security of the biometric system, because compromised biometric templates cannot be revoked or reissued and also this paper has proposed a multimodal system based on an evolutionary algorithm, Particle Swarm Optimization that adapts for varying security environments. With these two concerns, this paper had developed a design incorporating adaptability, authenticity and security.

  2. Iris

    Science.gov (United States)

    ... of color granules in the iris determines the iris color (pigment). The amount of pigment is often related to a person's genes, skin type, and hair color. Inflammation of the iris is called iritis. Rarely, tumors can form in ...

  3. Distinct iris gene expression profiles of primary angle closure glaucoma and primary open angle glaucoma and their interaction with ocular biometric parameters.

    Science.gov (United States)

    Seet, Li-Fong; Narayanaswamy, Arun; Finger, Sharon N; Htoon, Hla M; Nongpiur, Monisha E; Toh, Li Zhen; Ho, Henrietta; Perera, Shamira A; Wong, Tina T

    2016-11-01

    This study aimed to evaluate differences in iris gene expression profiles between primary angle closure glaucoma (PACG) and primary open angle glaucoma (POAG) and their interaction with biometric characteristics. Prospective study. Thirty-five subjects with PACG and thirty-three subjects with POAG who required trabeculectomy were enrolled at the Singapore National Eye Centre, Singapore. Iris specimens, obtained by iridectomy, were analysed by real-time polymerase chain reaction for expression of type I collagen, vascular endothelial growth factor (VEGF)-A, -B and -C, as well as VEGF receptors (VEGFRs) 1 and 2. Anterior segment optical coherence tomography (ASOCT) imaging for biometric parameters, including anterior chamber depth (ACD), anterior chamber volume (ACV) and lens vault (LV), was also performed pre-operatively. Relative mRNA levels between PACG and POAG irises, biometric measurements, discriminant analyses using genes and biometric parameters. COL1A1, VEGFB, VEGFC and VEGFR2 mRNA expression was higher in PACG compared to POAG irises. LV, ACD and ACV were significantly different between the two subgroups. Discriminant analyses based on gene expression, biometric parameters or a combination of both gene expression and biometrics (LV and ACV), correctly classified 94.1%, 85.3% and 94.1% of the original PACG and POAG cases, respectively. The discriminant function combining genes and biometrics demonstrated the highest accuracy in cross-validated classification of the two glaucoma subtypes. Distinct iris gene expression supports the pathophysiological differences that exist between PACG and POAG. Biometric parameters can combine with iris gene expression to more accurately define PACG from POAG. © 2016 The Authors. Clinical & Experimental Ophthalmology published by John Wiley & Sons Australia, Ltd on behalf of Royal Australian and New Zealand College of Ophthalmologists.

  4. Biometrics-based service marketing issues: exploring acceptability and risk factors of iris scans associated with registered travel programmes.

    Science.gov (United States)

    Smith, Alan D

    2008-01-01

    The marketability and viability of biometric technologies by companies marketing their own versions of pre-approved registered travel programmes have generated a number of controversies. Data were collected and analysed to formulate graphs, run regression and correlation analyses, and use Chi-square to formally test basic research propositions on a sample of 241 professionals in the Pittsburgh area. It was found that there was a significant relationship between the respondents' familiarity with new technology (namely web-enabled and internet sophistication) and knowledge of biometrics, in particular iris scans. Participants who frequently use the internet are more comfortable with innovative technology; although individuals with higher income levels have less trust in the government, it appeared that virtually everyone is concerned about trusting the government with their personal information. Healthcare professionals need to document the safety, CRM-related factors, and provide leadership in the international collaboration of biometric-related personal identification technologies, since they will be one of the main beneficiaries of the implementation of such technologies.

  5. Method of preliminary localization of the iris in biometric access control systems

    Science.gov (United States)

    Minacova, N.; Petrov, I.

    2015-10-01

    This paper presents a method of preliminary localization of the iris, based on the stable brightness features of the iris in images of the eye. In tests on images of eyes from publicly available databases method showed good accuracy and speed compared to existing methods preliminary localization.

  6. Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

    Energy Technology Data Exchange (ETDEWEB)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L, E-mail: franciscogiacometto@unicesar.edu.co [Laboratorio de Optica e Informatica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Cesar (Colombia)

    2011-01-01

    Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Masek's, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

  7. Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

    Science.gov (United States)

    Giacometto, F. J.; Vilardy, J. M.; Torres, C. O.; Mattos, L.

    2011-01-01

    Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Masek's, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

  8. IRIS

    International Nuclear Information System (INIS)

    Malfaro, W.; Zygmont, A.

    1991-01-01

    This paper discusses development of ISOLATION RESET INFORMATION SYSTEM (IRIS), an expert system to aid nuclear plant operators during plant transients known as automatic containment isolations. IRIS is implemented using the Personal Consultant Plus expert system shell, taking advantage of the dBase III Plus interface. The design of IRIS is discussed as well as the system's current state of development. The use of expert systems for training operators is discussed. The importance of gaining regulatory acceptance of expert systems is presented. This issue will ultimately determine the extent of expert system use in nuclear applications

  9. Iris Recognition - Beyond One Meter

    Science.gov (United States)

    Matey, James R.; Kennell, Lauren R.

    Iris recognition Iris recognition is, arguably, the most robust form of biometric Biometrics identification. It has been deployed in large-scale systems that have been very effective. The systems deployed to date make use of iris Remote Biometric cameras that require significant user cooperation; that in turn imposes significant constraints on the deployment scenarios that are practical.

  10. Fingerprint + Iris = IrisPrint

    Science.gov (United States)

    Othman, Asem; Ross, Arun

    2015-05-01

    We consider the problem of generating a biometric image from two different traits. Specifically, we focus on generating an IrisPrint that inherits its structure from a fingerprint image and an iris image. To facilitate this, the continuous phase of the fingerprint image, characterizing its ridge flow, is first extracted. Next, a scheme is developed to extract "minutiae" from an iris image. Finally, an IrisPrint, that resembles a fingerprint, is created by mixing the ridge flow of the fingerprint with the iris minutiae. Preliminary experiments suggest that the new biometric image (i.e., IrisPrint) (a) can potentially be used for authentication by an existing fingerprint matcher, and (b) can potentially conceal and preserve the privacy of the original fingerprint and iris images.

  11. Improvement of Varioptic's liquid lens based on electrowetting: how to obtain a short response time and its application in the design of a high resolution iris biometric system

    Science.gov (United States)

    Burger, Benjamin; Meimon, Serge C.; Petit, Cyril; Nguyen, Minh Chau

    2015-02-01

    This communication presents the results obtained for decreasing the response time of electrowetting-based real time focus correctors (liquid lenses). In order to provide a compact iris biometric system demonstrator, we have achieved a response time at 90% of 7.5 ms for a change in focalization from 0 diopter to 10 diopter with a liquid lens having an aperture of 1.9 mm. We have used a hydrodynamic fluid reorganization model to predict the features of these fast liquid lenses and evaluated the sensivity of the response time to the different conception parameters.

  12. Iris Recognition for Human Identification

    Science.gov (United States)

    Alandkar, Lajari; Gengaje, Sachin

    2010-11-01

    Iris recognition system is the biometric identification system. Iris has an intricate structure, uniqueness, stability, and natural protection. Due to these features of the iris it can be used for biometric identification. This system gives better performance than other biometric identification systems. A novel eyelash removal method for preprocessing of human iris images in a human iris recognition system is presented.. Discrete cosine transform (DCT) method is used for feature extraction. For matching of two-iris code Hamming distance calculation is used. EER value must be less for the optimum performance of the system.

  13. Machine Learning for Biometrics

    NARCIS (Netherlands)

    A.A. Salah (Albert Ali); E. Soria; J.D. Martin; R. Magdalena; M. Martinez; A.J. Serrano

    2009-01-01

    htmlabstractBiometrics aims at reliable and robust identification of humans from their personal traits, mainly for security and authentication purposes, but also for identifying and tracking the users of smarter applications. Frequently considered modalities are fingerprint, face, iris, palmprint

  14. Iris Recognition Using Wavelet

    Directory of Open Access Journals (Sweden)

    Khaliq Masood

    2013-08-01

    Full Text Available Biometric systems are getting more attention in the present era. Iris recognition is one of the most secure and authentic among the other biometrics and this field demands more authentic, reliable and fast algorithms to implement these biometric systems in real time. In this paper, an efficient localization technique is presented to identify pupil and iris boundaries using histogram of the iris image. Two small portions of iris have been used for polar transformation to reduce computational time and to increase the efficiency of the system. Wavelet transform is used for feature vector generation. Rotation of iris is compensated without shifts in the iris code. System is tested on Multimedia University Iris Database and results show that proposed system has encouraging performance.

  15. Biometric citizenship and alienage

    DEFF Research Database (Denmark)

    Stenum, Helle

    Biometric identifiers (finger prints, face scans, iris scans etc.) have increasingly become a key element in technology of EU border and migration management. SIS II, EURODAC and VIS are centralized systems that contain fingerprints of different groups of non-EU citizen, and the biometric identif...

  16. Multispectral Imaging for Biometrics – A Review

    OpenAIRE

    Shrestha, Raju

    2011-01-01

    Multispectral imaging has been used in many biometrics modalities including fingerprint, whole hand, iris and vein recognition. It not only increases the effectiveness of the biometrics recognition but facilitates detection of breaching and spoofing. There are already many commercial biometrics systems based on multispectral imaging available in the industry. However, one type of biometrics is still not 100% strong enough for full proof biometrics system. Multimodal biometrics have been propo...

  17. A new approach for cancelable iris recognition

    Science.gov (United States)

    Yang, Kai; Sui, Yan; Zhou, Zhi; Du, Yingzi; Zou, Xukai

    2010-04-01

    The iris is a stable and reliable biometric for positive human identification. However, the traditional iris recognition scheme raises several privacy concerns. One's iris pattern is permanently bound with him and cannot be changed. Hence, once it is stolen, this biometric is lost forever as well as all the applications where this biometric is used. Thus, new methods are desirable to secure the original pattern and ensure its revocability and alternatives when compromised. In this paper, we propose a novel scheme which incorporates iris features, non-invertible transformation and data encryption to achieve "cancelability" and at the same time increases iris recognition accuracy.

  18. Issues in Biometric Security

    African Journals Online (AJOL)

    Ogechukwu Iloanusi

    extraction and enrolment. The recognition process could be either identification or verification. The steps followed here are input acquisition, digital signal processing, feature extraction, verification or identification. § The input may be the user face, finger pattern, iris, voice, etc. § The biometric sensing device is specific to.

  19. Computer Based Behavioral Biometric Authentication via Multi-Modal Fusion

    Science.gov (United States)

    2013-03-01

    Bhattacharyya, et al. [25], found that the iris scanner, with an Equal Error Rate (EER) of 0.01% performed the best. 1.2 Behavioral Biometrics Behavioral...include voice and facial recognition; fingerprint, voice, and iris ; and iris and retinal features [33]. 2.7.1 Fusion Methods. Fusion of biometric ...COMPUTER BASED BEHAVIORAL BIOMETRIC AUTHENTICATION VIA MULTI-MODAL FUSION THESIS Kyle O. Bailey, Second Lieutenant, USAF AFIT-ENG-13-M-04 DEPARTMENT

  20. Reliability of Iris Scanning as a Means of Identity Verification and Future Impact on Transportation Worker Identification Credential

    National Research Council Canada - National Science Library

    McLaren, Simon

    2008-01-01

    .... Congress mandated the TWIC have a biometric authenticator; DHS chose fingerprints. This thesis argues iris scanning is a better choice because of the nature of the maritime environment and because iris scanning is a more accurate biometric...

  1. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  2. Using crypts as iris minutiae

    Science.gov (United States)

    Shen, Feng; Flynn, Patrick J.

    2013-05-01

    Iris recognition is one of the most reliable biometric technologies for identity recognition and verification, but it has not been used in a forensic context because the representation and matching of iris features are not straightforward for traditional iris recognition techniques. In this paper we concentrate on the iris crypt as a visible feature used to represent the characteristics of irises in a similar way to fingerprint minutiae. The matching of crypts is based on their appearances and locations. The number of matching crypt pairs found between two irises can be used for identity verification and the convenience of manual inspection makes iris crypts a potential candidate for forensic applications.

  3. Biometric systems technology, design and performance evaluation

    CERN Document Server

    Wayman, James; Maltoni, Davide

    2005-01-01

    A reference book for anyone involved in the design, management or implementation of biometric systems, and provides all the information needed to a build reliable system. It focuses on the four most widely used types of biometric technology - speech, fingerprint, iris and face recognition.

  4. The biometric menagerie.

    Science.gov (United States)

    Yager, Neil; Dunstone, Ted

    2010-02-01

    It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user's genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms. We establish formal definitions for these animals and a statistical test for their existence. A thorough investigation is conducted using a broad range of biometric modalities, including 2D and 3D faces, fingerprints, iris, speech, and keystroke dynamics. Patterns that emerge from the results expose novel, important, and encouraging insights into the nature of biometric match results. A new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics, is proposed.

  5. Iris Template Protection Based on Local Ranking

    Directory of Open Access Journals (Sweden)

    Dongdong Zhao

    2018-01-01

    Full Text Available Biometrics have been widely studied in recent years, and they are increasingly employed in real-world applications. Meanwhile, a number of potential threats to the privacy of biometric data arise. Iris template protection demands that the privacy of iris data should be protected when performing iris recognition. According to the international standard ISO/IEC 24745, iris template protection should satisfy the irreversibility, revocability, and unlinkability. However, existing works about iris template protection demonstrate that it is difficult to satisfy the three privacy requirements simultaneously while supporting effective iris recognition. In this paper, we propose an iris template protection method based on local ranking. Specifically, the iris data are first XORed (Exclusive OR operation with an application-specific string; next, we divide the results into blocks and then partition the blocks into groups. The blocks in each group are ranked according to their decimal values, and original blocks are transformed to their rank values for storage. We also extend the basic method to support the shifting strategy and masking strategy, which are two important strategies for iris recognition. We demonstrate that the proposed method satisfies the irreversibility, revocability, and unlinkability. Experimental results on typical iris datasets (i.e., CASIA-IrisV3-Interval, CASIA-IrisV4-Lamp, UBIRIS-V1-S1, and MMU-V1 show that the proposed method could maintain the recognition performance while protecting the privacy of iris data.

  6. Exploring the feasibility of iris recognition for visible spectrum iris images obtained using smartphone camera

    Science.gov (United States)

    Trokielewicz, Mateusz; Bartuzi, Ewelina; Michowska, Katarzyna; Andrzejewska, Antonina; Selegrat, Monika

    2015-09-01

    In the age of modern, hyperconnected society that increasingly relies on mobile devices and solutions, implementing a reliable and accurate biometric system employing iris recognition presents new challenges. Typical biometric systems employing iris analysis require expensive and complicated hardware. We therefore explore an alternative way using visible spectrum iris imaging. This paper aims at answering several questions related to applying iris biometrics for images obtained in the visible spectrum using smartphone camera. Can irides be successfully and effortlessly imaged using a smartphone's built-in camera? Can existing iris recognition methods perform well when presented with such images? The main advantage of using near-infrared (NIR) illumination in dedicated iris recognition cameras is good performance almost independent of the iris color and pigmentation. Are the images obtained from smartphone's camera of sufficient quality even for the dark irides? We present experiments incorporating simple image preprocessing to find the best visibility of iris texture, followed by a performance study to assess whether iris recognition methods originally aimed at NIR iris images perform well with visible light images. To our best knowledge this is the first comprehensive analysis of iris recognition performance using a database of high-quality images collected in visible light using the smartphones flashlight together with the application of commercial off-the-shelf (COTS) iris recognition methods.

  7. [Electronic Device for Retinal and Iris Imaging].

    Science.gov (United States)

    Drahanský, M; Kolář, R; Mňuk, T

    This paper describes design and construction of a new device for automatic capturing of eye retina and iris. This device has two possible ways of utilization - either for biometric purposes (persons recognition on the base of their eye characteristics) or for medical purposes as supporting diagnostic device. eye retina, eye iris, device, acquisition, image.

  8. CDIS: Circle Density Based Iris Segmentation

    Science.gov (United States)

    Gupta, Anand; Kumari, Anita; Kundu, Boris; Agarwal, Isha

    Biometrics is an automated approach of measuring and analysing physical and behavioural characteristics for identity verification. The stability of the Iris texture makes it a robust biometric tool for security and authentication purposes. Reliable Segmentation of Iris is a necessary precondition as an error at this stage will propagate into later stages and requires proper segmentation of non-ideal images having noises like eyelashes, etc. Iris Segmentation work has been done earlier but we feel it lacks in detecting iris in low contrast images, removal of specular reflections, eyelids and eyelashes. Hence, it motivates us to enhance the said parameters. Thus, we advocate a new approach CDIS for Iris segmentation along with new algorithms for removal of eyelashes, eyelids and specular reflections and pupil segmentation. The results obtained have been presented using GAR vs. FAR graphs at the end and have been compared with prior works related to segmentation of iris.

  9. Iris segmentation using an edge detector based on fuzzy sets theory and cellular learning automata.

    Science.gov (United States)

    Ghanizadeh, Afshin; Abarghouei, Amir Atapour; Sinaie, Saman; Saad, Puteh; Shamsuddin, Siti Mariyam

    2011-07-01

    Iris-based biometric systems identify individuals based on the characteristics of their iris, since they are proven to remain unique for a long time. An iris recognition system includes four phases, the most important of which is preprocessing in which the iris segmentation is performed. The accuracy of an iris biometric system critically depends on the segmentation system. In this paper, an iris segmentation system using edge detection techniques and Hough transforms is presented. The newly proposed edge detection system enhances the performance of the segmentation in a way that it performs much more efficiently than the other conventional iris segmentation methods.

  10. Ethnicity prediction and classification from iris texture patterns: A survey on recent advances

    CSIR Research Space (South Africa)

    Mabuza-Hocquet, Gugulethu

    2017-03-01

    Full Text Available The prediction and classification of ethnicity based on iris texture patterns using image processing, artificial intelligence and computer vision techniques is still a recent topic in iris biometrics. While the large body of knowledge and research...

  11. Biometrics Technology

    Science.gov (United States)

    2012-03-13

    patterns: arch, tented arch, left loop, right loop and whorl .‖12 While the usefulness and effectiveness of fingerprinting biometrics as a deterrent to...example, early forms of biometrics were used in ―Babylon in 500 B.C. by recording fingerprints in clay tablets to record business transactions.‖4 Another...physical biometrics is fingerprinting , which stems from research conducted in the late 19th century by Alphonse Bertillon, a French criminologist who

  12. Exploiting iris dynamics

    Science.gov (United States)

    Hsu, Charles; Szu, Harold

    2010-04-01

    The human iris is a circular curtain over the light entrance pupil which is controlled directly by the intensity of blue light from photosensitive ganglions in the retina within the eye. The human iris dynamic is remarkable in that it is capable of shrinking concentrically along the radial direction by a factor 4 from 8mm to 2mm, and constantly oscillates in 1/2 second periodicity. Pupil dilation and contraction causes the iris texture to undergo nonlinear deformation with discrete components and minutia features. Thus, iris recognition must be scale invariant due to the pupil dynamics. We propose the Mandelbrot fractal dimension count of minutia iris details, at different intensity thresholds, in dilation-invariant wedge-boxes, formed at specific angular sizes, but spatially varying over 4 90° quadrants due to the cellular growth under the gravity. Despite the concentric dynamic, we have sought an invariant fractal dimensionality in the circular direction and discovered the non-isotropic effect, departed from the simple Richardson fractal law. Furthermore, we choose an optimum Rayleigh criterion λ/D matching the robust fine resolution scale for the given lens aperture D and the illumination wavelength λ for a potential application from a distant, with the help of comprehensive biometric including iris.

  13. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available cardholder to card MDS-IS Offerings ? CSIR 2012 Slide 13 Biometric Authentication Solutions ? Fingerprint recognition systems ? Iris recognition ? Otoacoustic emissions ? Face recognition systems Smart Cards ? Smart ID systems ? Smart card designs...

  14. Does iris change over time?

    Directory of Open Access Journals (Sweden)

    Hunny Mehrotra

    Full Text Available Iris as a biometric identifier is assumed to be stable over a period of time. However, some researchers have observed that for long time lapse, the genuine match score distribution shifts towards the impostor score distribution and the performance of iris recognition reduces. The main purpose of this study is to determine if the shift in genuine scores can be attributed to aging or not. The experiments are performed on the two publicly available iris aging databases namely, ND-Iris-Template-Aging-2008-2010 and ND-TimeLapseIris-2012 using a commercial matcher, VeriEye. While existing results are correct about increase in false rejection over time, we observe that it is primarily due to the presence of other covariates such as blur, noise, occlusion, and pupil dilation. This claim is substantiated with quality score comparison of the gallery and probe pairs.

  15. Does iris change over time?

    Science.gov (United States)

    Mehrotra, Hunny; Vatsa, Mayank; Singh, Richa; Majhi, Banshidhar

    2013-01-01

    Iris as a biometric identifier is assumed to be stable over a period of time. However, some researchers have observed that for long time lapse, the genuine match score distribution shifts towards the impostor score distribution and the performance of iris recognition reduces. The main purpose of this study is to determine if the shift in genuine scores can be attributed to aging or not. The experiments are performed on the two publicly available iris aging databases namely, ND-Iris-Template-Aging-2008-2010 and ND-TimeLapseIris-2012 using a commercial matcher, VeriEye. While existing results are correct about increase in false rejection over time, we observe that it is primarily due to the presence of other covariates such as blur, noise, occlusion, and pupil dilation. This claim is substantiated with quality score comparison of the gallery and probe pairs.

  16. Beyond Biometrics

    NARCIS (Netherlands)

    van den Broek, Egon

    Throughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images. After a brief introduction on biometrics, biosignals are discussed, including

  17. Performance and Security Evaluation of Biometric-Based Web ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... Biometric recognition is the use of individual biometric physical or behavioural characteristics such as iris, retina, and ... reliable and convenient solution to the problem of personal recognition. Fingerprint identification and ...... Face Recognition Technology: Cognitive Considerations in. System Design, s.l.: ...

  18. A Vein Map Biometric System

    OpenAIRE

    Felix Fuentes; Dulal C. Kar

    2013-01-01

    There is increasing demand world-wide, from government agencies and the private sector for cutting-edge biometric security technology that is difficult to breach but userfriendly at the same time. Some of the older tools, such as fingerprint, retina and iris scanning, and facial recognition software have all been found to have flaws and often viewed negatively because of many cultural and hygienic issues associated with them. Comparatively, mapping veins as a human barcode, a new technology, ...

  19. Multispectral biometrics systems and applications

    CERN Document Server

    Zhang, David; Gong, Yazhuo

    2016-01-01

    Describing several new biometric technologies, such as high-resolution fingerprint, finger-knuckle-print, multi-spectral backhand, 3D fingerprint, tongueprint, 3D ear, and multi-spectral iris recognition technologies, this book analyzes a number of efficient feature extraction, matching and fusion algorithms and how potential systems have been developed. Focusing on how to develop new biometric technologies based on the requirements of applications, and how to design efficient algorithms to deliver better performance, the work is based on the author’s research with experimental results under different challenging conditions described in the text. The book offers a valuable resource for researchers, professionals and postgraduate students working in the fields of computer vision, pattern recognition, biometrics, and security applications, amongst others.

  20. Computational cameras for moving iris recognition

    Science.gov (United States)

    McCloskey, Scott; Venkatesha, Sharath

    2015-05-01

    Iris-based biometric identification is increasingly used for facility access and other security applications. Like all methods that exploit visual information, however, iris systems are limited by the quality of captured images. Optical defocus due to a small depth of field (DOF) is one such challenge, as is the acquisition of sharply-focused iris images from subjects in motion. This manuscript describes the application of computational motion-deblurring cameras to the problem of moving iris capture, from the underlying theory to system considerations and performance data.

  1. A new method for generating an invariant iris private key based on the fuzzy vault system.

    Science.gov (United States)

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  2. Cross Disciplinary Biometric Systems

    CERN Document Server

    Liu, Chengjun

    2012-01-01

    Cross disciplinary biometric systems help boost the performance of the conventional systems. Not only is the recognition accuracy significantly improved, but also the robustness of the systems is greatly enhanced in the challenging environments, such as varying illumination conditions. By leveraging the cross disciplinary technologies, face recognition systems, fingerprint recognition systems, iris recognition systems, as well as image search systems all benefit in terms of recognition performance.  Take face recognition for an example, which is not only the most natural way human beings recognize the identity of each other, but also the least privacy-intrusive means because people show their face publicly every day. Face recognition systems display superb performance when they capitalize on the innovative ideas across color science, mathematics, and computer science (e.g., pattern recognition, machine learning, and image processing). The novel ideas lead to the development of new color models and effective ...

  3. SCAN secure processor and its biometric capabilities

    Science.gov (United States)

    Kannavara, Raghudeep; Mertoguno, Sukarno; Bourbakis, Nikolaos

    2011-04-01

    This paper presents the design of the SCAN secure processor and its extended instruction set to enable secure biometric authentication. The SCAN secure processor is a modified SparcV8 processor architecture with a new instruction set to handle voice, iris, and fingerprint-based biometric authentication. The algorithms for processing biometric data are based on the local global graph methodology. The biometric modules are synthesized in reconfigurable logic and the results of the field-programmable gate array (FPGA) synthesis are presented. We propose to implement the above-mentioned modules in an off-chip FPGA co-processor. Further, the SCAN-secure processor will offer a SCAN-based encryption and decryption of 32 bit instructions and data.

  4. FLIR biometrics

    Science.gov (United States)

    O'Kane, Barbara L.; Krzywicki, Alan T.

    2009-04-01

    Biometrics are generally thought of as anatomical features that allow positive identification of a person. This paper describes biometrics that are also physiological in nature. The differences between anatomy and physiology have to do with the fact that physiology is dynamic, functioning, and changing with the state or actions of a person whereas anatomy is generally more stable. Biometrics in general usually refers to a trait, whereas the new type of biometrics discussed in this paper refer to a state, which is temporary, and often even transitory. By state, what is meant is the condition of a person at a particular time relative to their psychological, physical, medical, or physiological status. The present paper describes metrics that are cues to the state of a functioning individual observable through a thermal camera video system. An inferred state might then be tied to the positive identification of the person. Using thermal for this purpose is significant because the thermal signature of a human is dynamic and changes with physical and emotional state, while also revealing underlying anatomical structures. A new method involving the counting of open pores on the skin is discussed as a way of observing the Electrodermal Activity (EDA) of the skin, a primary component of the polygraph.

  5. Multimodal biometric authentication based on score level fusion using support vector machine

    Science.gov (United States)

    Wang, F.; Han, J.

    2009-03-01

    Fusion of multiple biometrics for human authentication performance improvement has received considerable attention. This paper presents a novel multimodal biometric authentication method integrating face and iris based on score level fusion. For score level fusion, support vector machine (SVM) based fusion rule is applied to combine two matching scores, respectively from Laplacianface based face verifier and phase information based iris verifier, to generate a single scalar score which is used to make the final decision. Experimental results show that the performance of the proposed method can bring obvious improvement comparing to the unimodal biometric identification methods and the previous fused face-iris methods.

  6. Hand Grasping Synergies As Biometrics

    Directory of Open Access Journals (Sweden)

    Ramana Vinjamuri

    2017-05-01

    Full Text Available Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements. Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic. Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies—postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security.

  7. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  8. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  9. The best bits in an iris code.

    Science.gov (United States)

    Hollingsworth, Karen P; Bowyer, Kevin W; Flynn, Patrick J

    2009-06-01

    Iris biometric systems apply filters to iris images to extract information about iris texture. Daugman's approach maps the filter output to a binary iris code. The fractional Hamming distance between two iris codes is computed and decisions about the identity of a person are based on the computed distance. The fractional Hamming distance weights all bits in an iris code equally. However, not all the bits in an iris code are equally useful. Our research is the first to present experiments documenting that some bits are more consistent than others. Different regions of the iris are compared to evaluate their relative consistency, and contrary to some previous research, we find that the middle bands of the iris are more consistent than the inner bands. The inconsistent-bit phenomenon is evident across genders and different filter types. Possible causes of inconsistencies, such as segmentation, alignment issues, and different filters are investigated. The inconsistencies are largely due to the coarse quantization of the phase response. Masking iris code bits corresponding to complex filter responses near the axes of the complex plane improves the separation between the match and nonmatch Hamming distance distributions.

  10. Fusion of hand vein, iris and fingerprint for person identity verification based on Bayesian theory

    Science.gov (United States)

    Li, Xiuyan; Liu, Tiegen; Deng, Shichao; Wang, Yunxin

    2009-11-01

    Biometric identification is an important guarantee for social security. In recent years, as the development of social and economic, the more accuracy and safety of identification are required. The person identity verification systems that use a single biometric appear inherent limitations in accuracy, user acceptance, universality. Limitations of unimodal biometric systems can be overcome by using multimodal biometric systems, which combines the conclusions made by a number of unrelated biometrics indicators. Aiming at the limitations of unimodal biometric identification, a recognition algorithm for multimodal biometric fusion based on hand vein, iris and fingerprint was proposed. To verify person identity, the hand vein images, iris images and fingerprint images were preprocessed firstly. The region of interest (ROI) of hand vein image was obtained and filtered to reduce image noises. The multiresolution analysis theory was utilized to extract the texture information of hand vein. The iris image was preprocessed through iris localization, eyelid detection, image normalization and image enhancement, and then the feature code of iris was extracted from the detail images obtained using wavelet transform. The texture feature information represented fingerprint pattern was extracted after filtering and image enhancement. The Bayesian theorem was employed to realize the fusion at the matching score level and the fusion recognition result was finally obtained. The experimental results were presented, which showed that the recognition performance of the proposed fusion method was obviously higher than that of single biometric recognition algorithm. It had verified the efficiency of the proposed method for biometrics.

  11. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.

    Science.gov (United States)

    Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K

    2011-09-01

    Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.

  12. Iris recognition using the JAVAVis Library

    Directory of Open Access Journals (Sweden)

    L.Martin García

    2008-12-01

    Full Text Available This project has been created to develop a biometric identification system through a man’s iris using a computer to perform the processing of the pictures. To develop this application, and to differentiate the project from others who have already implemented, we have used the image processing library JAVAVis and JAVA as a programming language.

  13. Statistical feature extraction based iris recognition system

    Indian Academy of Sciences (India)

    Atul Bansal

    Abstract. Iris recognition systems have been proposed by numerous researchers using different feature extraction techniques for accurate and reliable biometric authentication. In this paper, a statistical feature extraction technique based on correlation between adjacent pixels has been proposed and implemented. Ham-.

  14. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

    Science.gov (United States)

    Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum

    2012-01-01

    Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing. PMID:22919273

  15. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

    Directory of Open Access Journals (Sweden)

    Min-Gu Kim

    2012-01-01

    Full Text Available Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

  16. Plateau iris configuration in eyes with narrow-angle: an ultrasound biomicroscopic study.

    Science.gov (United States)

    Diniz Filho, Alberto; Cronemberger, Sebastião; Ferreira, Dollores Martins; Mérula, Rafael Vidal; Calixto, Nassim

    2010-01-01

    To investigate, through ultrasound biomicroscopy images, the presence of plateau iris configuration in eyes with narrow-angle from patients with open-angle glaucoma and in eyes with previous acute primary angle-closure and compare the biometric features of eyes with plateau iris configuration with those of normal eyes. Ultrasound biomicroscopic images from 196 patients with open-angle glaucoma and narrow-angle and 32 patients with acute primary angle-closure were retrospectively analyzed. The inclusion and specific criteria for the diagnosis of plateau iris configuration was the presence of an anterior positioning of the ciliary processes, supporting the peripheral iris so that it was parallel to the trabecular meshwork; the iris root had a steep rise from its insertion point, followed by a downward angulation from the corneoscleral wall; presence of a central flat iris plane; an absent (complete plateau iris configuration) or partially absent (incomplete plateau iris configuration) ciliary sulcus. The ultrasound biomicroscopic parameters were compared between complete and incomplete plateau iris configuration. The same parameters of both groups were compared with those of normal eyes. The following measurements were performed: anterior chamber depth; angle opening distance at 500 microm from the scleral spur; peripheral iris thickness at 500 microm from the scleral spur; iris-ciliary process distance; trabecular-ciliary process distance and angle recess area. Plateau iris configuration was found in 33 eyes of 20 (10.2%) out of 196 patients with open-angle glaucoma and narrow-angle and in 4 eyes of 2 (6.3%) out of 32 patients with acute primary angleclosure. Seventeen (77.3%) patients with plateau iris configuration were female and 5 (22.7%) male. Twenty-three (62.2%) out of 37 eyes had complete plateau iris configuration, and 14 (37.8%) had incomplete plateau iris configuration. Complete and incomplete plateau iris configuration presented similar biometric

  17. An overview on biometric identification methods and implementations

    Science.gov (United States)

    Stroica, Petre; Vladescu, Marian

    2010-11-01

    The paper presents the three most efficient methods of biometric identification: fingerprint recognition, face recognition and iris recognition. The authors evaluated the performance of each method, based on the concept of error rates. The paper also presents an overview of the biometric identification implementations, highlighting the advantages and disadvantages from a practical point of view, based on a balance between reliability and invasiveness of each method.

  18. Iris Recognition: The Consequences of Image Compression

    Directory of Open Access Journals (Sweden)

    Bishop DanielA

    2010-01-01

    Full Text Available Iris recognition for human identification is one of the most accurate biometrics, and its employment is expanding globally. The use of portable iris systems, particularly in law enforcement applications, is growing. In many of these applications, the portable device may be required to transmit an iris image or template over a narrow-bandwidth communication channel. Typically, a full resolution image (e.g., VGA is desired to ensure sufficient pixels across the iris to be confident of accurate recognition results. To minimize the time to transmit a large amount of data over a narrow-bandwidth communication channel, image compression can be used to reduce the file size of the iris image. In other applications, such as the Registered Traveler program, an entire iris image is stored on a smart card, but only 4 kB is allowed for the iris image. For this type of application, image compression is also the solution. This paper investigates the effects of image compression on recognition system performance using a commercial version of the Daugman iris2pi algorithm along with JPEG-2000 compression, and links these to image quality. Using the ICE 2005 iris database, we find that even in the face of significant compression, recognition performance is minimally affected.

  19. New biometric modalities using internal physical characteristics

    Science.gov (United States)

    Mortenson, Juliana (Brooks)

    2010-04-01

    Biometrics is described as the science of identifying people based on physical characteristics such as their fingerprints, facial features, hand geometry, iris patterns, palm prints, or speech recognition. Notably, all of these physical characteristics are visible or detectable from the exterior of the body. These external characteristics can be lifted, photographed, copied or recorded for unauthorized access to a biometric system. Individual humans are unique internally, however, just as they are unique externally. New biometric modalities have been developed which identify people based on their unique internal characteristics. For example, "BoneprintsTM" use acoustic fields to scan the unique bone density pattern of a thumb pressed on a small acoustic sensor. Thanks to advances in piezoelectric materials the acoustic sensor can be placed in virtually any device such as a steering wheel, door handle, or keyboard. Similarly, "Imp-PrintsTM" measure the electrical impedance patterns of a hand to identify or verify a person's identity. Small impedance sensors can be easily embedded in devices such as smart cards, handles, or wall mounts. These internal biometric modalities rely on physical characteristics which are not visible or photographable, providing an added level of security. In addition, both the acoustic and impedance methods can be combined with physiologic measurements such as acoustic Doppler or impedance plethysmography, respectively. Added verification that the biometric pattern came from a living person can be obtained. These new biometric modalities have the potential to allay user concerns over protection of privacy, while providing a higher level of security.*

  20. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  1. Iris Recognition Using Feature Extraction of Box Counting Fractal Dimension

    Science.gov (United States)

    Khotimah, C.; Juniati, D.

    2018-01-01

    Biometrics is a science that is now growing rapidly. Iris recognition is a biometric modality which captures a photo of the eye pattern. The markings of the iris are distinctive that it has been proposed to use as a means of identification, instead of fingerprints. Iris recognition was chosen for identification in this research because every human has a special feature that each individual is different and the iris is protected by the cornea so that it will have a fixed shape. This iris recognition consists of three step: pre-processing of data, feature extraction, and feature matching. Hough transformation is used in the process of pre-processing to locate the iris area and Daugman’s rubber sheet model to normalize the iris data set into rectangular blocks. To find the characteristics of the iris, it was used box counting method to get the fractal dimension value of the iris. Tests carried out by used k-fold cross method with k = 5. In each test used 10 different grade K of K-Nearest Neighbor (KNN). The result of iris recognition was obtained with the best accuracy was 92,63 % for K = 3 value on K-Nearest Neighbor (KNN) method.

  2. Improved iris localization by using wide and narrow field of view cameras for iris recognition

    Science.gov (United States)

    Kim, Yeong Gon; Shin, Kwang Yong; Park, Kang Ryoung

    2013-10-01

    Biometrics is a method of identifying individuals by their physiological or behavioral characteristics. Among other biometric identifiers, iris recognition has been widely used for various applications that require a high level of security. When a conventional iris recognition camera is used, the size and position of the iris region in a captured image vary according to the X, Y positions of a user's eye and the Z distance between a user and the camera. Therefore, the searching area of the iris detection algorithm is increased, which can inevitably decrease both the detection speed and accuracy. To solve these problems, we propose a new method of iris localization that uses wide field of view (WFOV) and narrow field of view (NFOV) cameras. Our study is new as compared to previous studies in the following four ways. First, the device used in our research acquires three images, one each of the face and both irises, using one WFOV and two NFOV cameras simultaneously. The relation between the WFOV and NFOV cameras is determined by simple geometric transformation without complex calibration. Second, the Z distance (between a user's eye and the iris camera) is estimated based on the iris size in the WFOV image and anthropometric data of the size of the human iris. Third, the accuracy of the geometric transformation between the WFOV and NFOV cameras is enhanced by using multiple matrices of the transformation according to the Z distance. Fourth, the searching region for iris localization in the NFOV image is significantly reduced based on the detected iris region in the WFOV image and the matrix of geometric transformation corresponding to the estimated Z distance. Experimental results showed that the performance of the proposed iris localization method is better than that of conventional methods in terms of accuracy and processing time.

  3. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  4. Biometric Methods for Application in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna; Šárek, Milan

    2011-01-01

    Roč. 7, č. 1 (2011), s. 37-43 ISSN 1801-5603 R&D Projects: GA MŠk(CZ) 1M06014 Institutional research plan: CEZ:AV0Z10300504 Keywords : biometrics * data security * EHR (electronic health record) * fingerprints * hand geometry * face recognition * iris recognition * retinal scanning * keystroke dynamics * multi-factor authentification Subject RIV: IN - Informatics, Computer Science http://www.ejbi.eu/images/2011-1/Schlenker_en.pdf

  5. Defense Biometric and Forensic Office Research, Development, Test and Evaluation Strategy

    Science.gov (United States)

    2015-01-06

    identification and examination  Collecting biometrics at a distance (e.g., iris , face) Non- Compliant Collection Mitigate Threats...DEFENSE 3030 DEFENSE PENTAGON WASHINGTON, DC 20301-3030 6 January 2015 I am pleased to present the Defense Biometric and Forensic Office’s (DBFO... biometric and forensic RDT &E. It anticipates that other organizations that fund projects across these enterprises will develop their own priorities and

  6. Iris Segmentation and Normalization Algorithm Based on Zigzag Collarette

    Science.gov (United States)

    Rizky Faundra, M.; Ratna Sulistyaningrum, Dwi

    2017-01-01

    In this paper, we proposed iris segmentation and normalization algorithm based on the zigzag collarette. First of all, iris images are processed by using Canny Edge Detection to detect pupil edge, then finding the center and the radius of the pupil with the Hough Transform Circle. Next, isolate important part in iris based zigzag collarette area. Finally, Daugman Rubber Sheet Model applied to get the fixed dimensions or normalization iris by transforming cartesian into polar format and thresholding technique to remove eyelid and eyelash. This experiment will be conducted with a grayscale eye image data taken from a database of iris-Chinese Academy of Sciences Institute of Automation (CASIA). Data iris taken is the data reliable and widely used to study the iris biometrics. The result show that specific threshold level is 0.3 have better accuracy than other, so the present algorithm can be used to segmentation and normalization zigzag collarette with accuracy is 98.88%

  7. Haar-like Rectangular Features for Biometric Recognition

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.; Rashidi, Maryam

    2013-01-01

    Developing a reliable, fast, and robust biometric recognition system is still a challenging task. This is because the inputs to these systems can be noisy, occluded, poorly illuminated, rotated, and of very low-resolutions. This paper proposes a probabilistic classifier using Haar-like features......, which mostly have been used for detection, for biometric recognition. The proposed system has been tested for three different biometrics: ear, iris, and hand vein patterns and it is shown that it is robust against most of the mentioned degradations and it outperforms state-of-the-art systems...

  8. Remote secure proof of identity using biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Sengupta, S. K.; Pearson, P.; Strait, R.S.

    1997-06-10

    Biometric measurements derived from finger- or voiceprints, hand geometry, retinal vessel pattern and iris texture characteristics etc. can be identifiers of individuals. In each case, the measurements can be coded into a statistically unique bit-string for each individual. While in electronic commerce and other electronic transactions the proof of identity of an individual is provided by the use of either public key cryptography or biometric data, more secure applications can be achieved by employing both. However the former requires the use of exact bit patterns. An error correction procedure allows us to successfully combine the use of both to provide a general procedure for remote secure proof of identity using a generic biometric device. One such procedure has been demonstrated using a device based on hand geometry.

  9. Multispectral iris recognition based on group selection and game theory

    Science.gov (United States)

    Ahmad, Foysal; Roy, Kaushik

    2017-05-01

    A commercially available iris recognition system uses only a narrow band of the near infrared spectrum (700-900 nm) while iris images captured in the wide range of 405 nm to 1550 nm offer potential benefits to enhance recognition performance of an iris biometric system. The novelty of this research is that a group selection algorithm based on coalition game theory is explored to select the best patch subsets. In this algorithm, patches are divided into several groups based on their maximum contribution in different groups. Shapley values are used to evaluate the contribution of patches in different groups. Results show that this group selection based iris recognition

  10. Gabor Weber Local Descriptor for Bovine Iris Recognition

    Directory of Open Access Journals (Sweden)

    Shengnan Sun

    2013-01-01

    Full Text Available Iris recognition is a robust biometric technology. This paper proposes a novel local descriptor for bovine iris recognition, named Gabor Weber local descriptor (GWLD. We first compute the Gabor magnitude maps for the input bovine iris image, and then calculate the differential excitation and orientation for each pixel over each Gabor magnitude map. After that, we use these differential excitations and orientations to construct the GWLD histogram representation. Finally, histogram intersection is adopted to measure the similarity between different GWLD histograms. The experimental results on the SEU bovine iris database verify the representation power of our proposed local descriptor.

  11. Trade off between variable and fixed size normalization in orthogonal polynomials based iris recognition system.

    Science.gov (United States)

    Krishnamoorthi, R; Anna Poorani, G

    2016-01-01

    Iris normalization is an important stage in any iris biometric, as it has a propensity to trim down the consequences of iris distortion. To indemnify the variation in size of the iris owing to the action of stretching or enlarging the pupil in iris acquisition process and camera to eyeball distance, two normalization schemes has been proposed in this work. In the first method, the iris region of interest is normalized by converting the iris into the variable size rectangular model in order to avoid the under samples near the limbus border. In the second method, the iris region of interest is normalized by converting the iris region into a fixed size rectangular model in order to avoid the dimensional discrepancies between the eye images. The performance of the proposed normalization methods is evaluated with orthogonal polynomials based iris recognition in terms of FAR, FRR, GAR, CRR and EER.

  12. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  13. Analyzing personalized policies for online biometric verification.

    Directory of Open Access Journals (Sweden)

    Apaar Sadhwani

    Full Text Available Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR subject to constraints on the false accept rate (FAR and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses 12 biometrics for each resident, which represents a five (four, respectively log reduction in FRR relative to fingerprint (iris, respectively policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR and acquires an average of 1.3 fingerprints per resident.

  14. Iris recognition in the presence of ocular disease.

    Science.gov (United States)

    Aslam, Tariq Mehmood; Tan, Shi Zhuan; Dhillon, Baljean

    2009-05-06

    Iris recognition systems are among the most accurate of all biometric technologies with immense potential for use in worldwide security applications. This study examined the effect of eye pathology on iris recognition and in particular whether eye disease could cause iris recognition systems to fail. The experiment involved a prospective cohort of 54 patients with anterior segment eye disease who were seen at the acute referral unit of the Princess Alexandra Eye Pavilion in Edinburgh. Iris camera images were obtained from patients before treatment was commenced and again at follow-up appointments after treatment had been given. The principal outcome measure was that of mathematical difference in the iris recognition templates obtained from patients' eyes before and after treatment of the eye disease. Results showed that the performance of iris recognition was remarkably resilient to most ophthalmic disease states, including corneal oedema, iridotomies (laser puncture of iris) and conjunctivitis. Problems were, however, encountered in some patients with acute inflammation of the iris (iritis/anterior uveitis). The effects of a subject developing anterior uveitis may cause current recognition systems to fail. Those developing and deploying iris recognition should be aware of the potential problems that this could cause to this key biometric technology.

  15. New algorithm for iris recognition based on video sequences

    Science.gov (United States)

    Bourennane, Salah; Fossati, Caroline; Ketchantang, William

    2010-07-01

    Among existing biometrics, iris recognition systems are among the most accurate personal biometric identification systems. However, the acquisition of a workable iris image requires strict cooperation of the user; otherwise, the image will be rejected by a verification module because of its poor quality, inducing a high false reject rate (FRR). The FRR may also increase when iris localization fails or when the pupil is too dilated. To improve the existing methods, we propose to use video sequences acquired in real time by a camera. In order to keep the same computational load to identify the iris, we propose a new method to estimate the iris characteristics. First, we propose a new iris texture characterization based on Fourier-Mellin transform, which is less sensitive to pupil dilatations than previous methods. Then, we develop a new iris localization algorithm that is robust to variations of quality (partial occlusions due to eyelids and eyelashes, light reflects, etc.), and finally, we introduce a fast and new criterion of suitable image selection from an iris video sequence for an accurate recognition. The accuracy of each step of the algorithm in the whole proposed recognition process is tested and evaluated using our own iris video database and several public image databases, such as CASIA, UBIRIS, and BATH.

  16. Limbus Impact on Off-angle Iris Degradation

    Energy Technology Data Exchange (ETDEWEB)

    Karakaya, Mahmut [ORNL; Barstow, Del R [ORNL; Santos-Villalobos, Hector J [ORNL; Thompson, Joseph W [ORNL; Bolme, David S [ORNL; Boehnen, Chris Bensing [ORNL

    2013-01-01

    The accuracy of iris recognition depends on the quality of data capture and is negatively affected by several factors such as angle, occlusion, and dilation. Off-angle iris recognition is a new research focus in biometrics that tries to address several issues including corneal refraction, complex 3D iris texture, and blur. In this paper, we present an additional significant challenge that degrades the performance of the off-angle iris recognition systems, called the limbus effect . The limbus is the region at the border of the cornea where the cornea joins the sclera. The limbus is a semitransparent tissue that occludes a side portion of the iris plane. The amount of occluded iris texture on the side nearest the camera increases as the image acquisition angle increases. Without considering the role of the limbus effect, it is difficult to design an accurate off-angle iris recognition system. To the best of our knowledge, this is the first work that investigates the limbus effect in detail from a biometrics perspective. Based on results from real images and simulated experiments with real iris texture, the limbus effect increases the hamming distance score between frontal and off-angle iris images ranging from 0.05 to 0.2 depending upon the limbus height.

  17. Enhanced iris recognition method based on multi-unit iris images

    Science.gov (United States)

    Shin, Kwang Yong; Kim, Yeong Gon; Park, Kang Ryoung

    2013-04-01

    For the purpose of biometric person identification, iris recognition uses the unique characteristics of the patterns of the iris; that is, the eye region between the pupil and the sclera. When obtaining an iris image, the iris's image is frequently rotated because of the user's head roll toward the left or right shoulder. As the rotation of the iris image leads to circular shifting of the iris features, the accuracy of iris recognition is degraded. To solve this problem, conventional iris recognition methods use shifting of the iris feature codes to perform the matching. However, this increases the computational complexity and level of false acceptance error. To solve these problems, we propose a novel iris recognition method based on multi-unit iris images. Our method is novel in the following five ways compared with previous methods. First, to detect both eyes, we use Adaboost and a rapid eye detector (RED) based on the iris shape feature and integral imaging. Both eyes are detected using RED in the approximate candidate region that consists of the binocular region, which is determined by the Adaboost detector. Second, we classify the detected eyes into the left and right eyes, because the iris patterns in the left and right eyes in the same person are different, and they are therefore considered as different classes. We can improve the accuracy of iris recognition using this pre-classification of the left and right eyes. Third, by measuring the angle of head roll using the two center positions of the left and right pupils, detected by two circular edge detectors, we obtain the information of the iris rotation angle. Fourth, in order to reduce the error and processing time of iris recognition, adaptive bit-shifting based on the measured iris rotation angle is used in feature matching. Fifth, the recognition accuracy is enhanced by the score fusion of the left and right irises. Experimental results on the iris open database of low-resolution images showed that the

  18. Corneal topography measurements for biometric applications

    Science.gov (United States)

    Lewis, Nathan D.

    The term biometrics is used to describe the process of analyzing biological and behavioral traits that are unique to an individual in order to confirm or determine his or her identity. Many biometric modalities are currently being researched and implemented including, fingerprints, hand and facial geometry, iris recognition, vein structure recognition, gait, voice recognition, etc... This project explores the possibility of using corneal topography measurements as a trait for biometric identification. Two new corneal topographers were developed for this study. The first was designed to function as an operator-free device that will allow a user to approach the device and have his or her corneal topography measured. Human subject topography data were collected with this device and compared to measurements made with the commercially available Keratron Piccolo topographer (Optikon, Rome, Italy). A third topographer that departs from the standard Placido disk technology allows for arbitrary pattern illumination through the use of LCD monitors. This topographer was built and tested to be used in future research studies. Topography data was collected from 59 subjects and modeled using Zernike polynomials, which provide for a simple method of compressing topography data and comparing one topographical measurement with a database for biometric identification. The data were analyzed to determine the biometric error rates associated with corneal topography measurements. Reasonably accurate results, between three to eight percent simultaneous false match and false non-match rates, were achieved.

  19. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    Biometrics security technology uses the physiological and behavourial characteristics of a person to properly identify him and helps to tell the class of person he belongs based on the available data. Your fingerprint, face and iris can grant or deny you access if they are tampered with. Since nobody can be trusted, our ...

  20. Iris classification based on sparse representations using on-line dictionary learning for large-scale de-duplication applications.

    Science.gov (United States)

    Nalla, Pattabhi Ramaiah; Chalavadi, Krishna Mohan

    2015-01-01

    De-duplication of biometrics is not scalable when the number of people to be enrolled into the biometric system runs into billions, while creating a unique identity for every person. In this paper, we propose an iris classification based on sparse representation of log-gabor wavelet features using on-line dictionary learning (ODL) for large-scale de-duplication applications. Three different iris classes based on iris fiber structures, namely, stream, flower, jewel and shaker, are used for faster retrieval of identities. Also, an iris adjudication process is illustrated by comparing the matched iris-pair images side-by-side to make the decision on the identification score using color coding. Iris classification and adjudication are included in iris de-duplication architecture to speed-up the identification process and to reduce the identification errors. The efficacy of the proposed classification approach is demonstrated on the standard iris database, UPOL.

  1. Dynamic Features for Iris Recognition.

    Science.gov (United States)

    da Costa, R M; Gonzaga, A

    2012-08-01

    The human eye is sensitive to visible light. Increasing illumination on the eye causes the pupil of the eye to contract, while decreasing illumination causes the pupil to dilate. Visible light causes specular reflections inside the iris ring. On the other hand, the human retina is less sensitive to near infra-red (NIR) radiation in the wavelength range from 800 nm to 1400 nm, but iris detail can still be imaged with NIR illumination. In order to measure the dynamic movement of the human pupil and iris while keeping the light-induced reflexes from affecting the quality of the digitalized image, this paper describes a device based on the consensual reflex. This biological phenomenon contracts and dilates the two pupils synchronously when illuminating one of the eyes by visible light. In this paper, we propose to capture images of the pupil of one eye using NIR illumination while illuminating the other eye using a visible-light pulse. This new approach extracts iris features called "dynamic features (DFs)." This innovative methodology proposes the extraction of information about the way the human eye reacts to light, and to use such information for biometric recognition purposes. The results demonstrate that these features are discriminating features, and, even using the Euclidean distance measure, an average accuracy of recognition of 99.1% was obtained. The proposed methodology has the potential to be "fraud-proof," because these DFs can only be extracted from living irises.

  2. An Efficient Human Identification through MultiModal Biometric System

    Directory of Open Access Journals (Sweden)

    K. Meena

    Full Text Available ABSTRACT Human identification is essential for proper functioning of society. Human identification through multimodal biometrics is becoming an emerging trend, and one of the reasons is to improve recognition accuracy. Unimodal biometric systems are affected by various problemssuch as noisy sensor data,non-universality, lack of individuality, lack of invariant representation and susceptibility to circumvention.A unimodal system has limited accuracy. Hence, Multimodal biometric systems by combining more than one biometric feature in different levels are proposed in order to enhance the performance of the system. A supervisor module combines the different opinions or decisions delivered by each subsystem and then make a final decision. In this paper, a multimodal biometrics authentication is proposed by combining face, iris and finger features. Biometric features are extracted by Local Derivative Ternary Pattern (LDTP in Contourlet domain and an extensive evaluation of LDTP is done using Support Vector Machine and Nearest Neighborhood Classifier. The experimental evaluations are performed on a public dataset demonstrating the accuracy of the proposed system compared with the existing systems. It is observed that, the combination of face, fingerprint and iris gives better performance in terms of accuracy, False Acceptance Rate, False Rejection Rate with minimum computation time.

  3. Trends in Biometric Technology

    African Journals Online (AJOL)

    Nafiisah

    licenses. The use of biometric features for identification purposes requires that a particular biometric factor be unique for each individual, that it can be readily ... operates by acquiring biometric data from an individual, extracting a feature set .... areas called ridges and the bright areas called valleys are the most important.

  4. Modeling IrisCode and its variants as convex polyhedral cones and its security implications.

    Science.gov (United States)

    Kong, Adams Wai-Kin

    2013-03-01

    IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode or its variants is a convex polyhedral cone in a hyperspace. Its central ray, being a rough representation of the original biometric signal, can be computed by a simple algorithm, which can often be implemented in one Matlab command line. The central ray is an expected ray and also an optimal ray of an objective function on a group of distributions. This algorithm is derived from geometric properties of a convex polyhedral cone but does not rely on any prior knowledge (e.g., iris images). The experimental results show that biometric templates, including iris and palmprint templates, produced by different recognition methods can be matched through the central rays in their convex polyhedral cones and that templates protected by a method extended from IrisCode can be broken into. These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. Additionally, the simplicity of the algorithm implies that even junior hackers without knowledge of advanced image processing and biometric databases can still break into protected templates and reveal relationships among templates produced by different recognition methods.

  5. A Vein Map Biometric System

    Directory of Open Access Journals (Sweden)

    Felix Fuentes

    2013-08-01

    Full Text Available There is increasing demand world-wide, from government agencies and the private sector for cutting-edge biometric security technology that is difficult to breach but userfriendly at the same time. Some of the older tools, such as fingerprint, retina and iris scanning, and facial recognition software have all been found to have flaws and often viewed negatively because of many cultural and hygienic issues associated with them. Comparatively, mapping veins as a human barcode, a new technology, has many advantages over older technologies. Specifically, reproducing a three-dimensional model of a human vein system is impossible to replicate. Vein map technology is distinctive because of its state-of-the-art sensors are only able to recognize vein patterns if hemoglobin is actively flowing through the person

  6. Demographic Analysis from Biometric Data: Achievements, Challenges, and New Frontiers.

    Science.gov (United States)

    Sun, Yunlian; Zhang, Man; Sun, Zhenan; Tan, Tieniu

    2018-02-01

    Biometrics is the technique of automatically recognizing individuals based on their biological or behavioral characteristics. Various biometric traits have been introduced and widely investigated, including fingerprint, iris, face, voice, palmprint, gait and so forth. Apart from identity, biometric data may convey various other personal information, covering affect, age, gender, race, accent, handedness, height, weight, etc. Among these, analysis of demographics (age, gender, and race) has received tremendous attention owing to its wide real-world applications, with significant efforts devoted and great progress achieved. This survey first presents biometric demographic analysis from the standpoint of human perception, then provides a comprehensive overview of state-of-the-art advances in automated estimation from both academia and industry. Despite these advances, a number of challenging issues continue to inhibit its full potential. We second discuss these open problems, and finally provide an outlook into the future of this very active field of research by sharing some promising opportunities.

  7. Enhancing the early differential diagnosis of plateau iris and pupillary block using a-scan ultrasonography.

    Science.gov (United States)

    Chen, Yu-Yen; Chu, Dachen; Chou, Pesus

    2015-01-01

    To distinguish the frequently misdiagnosed plateau iris eyes from pupillary block group and normal group, we compared the ocular biometrical parameters of them by A-scan ultrasongraphy. In total, we retrospectively reviewed general characteristics and ocular findings including ocular biometric measurements of 71 normal, 39 plateau iris, and 83 pupillary block eyes. The normal controls, plateau iris group and pupillary block group were significantly different in age, but not in gender. The anterior chamber depth tended to decrease and the lens thickness tended to increase from normal to plateau iris to pupillary block eyes. Compared to those of plateau iris group, the pupillary block group had significantly shallower anterior chamber depth (2.90mm vs. 2.33mm; piris and normal eyes, only axial length and lens/axial length factor were significantly different (23.16 vs. 23.54; pbiometrics of plateau iris were significantly different from those of pupillary block eyes. However, our A-scan ultrasongraphy generally found no significant biometric differences between plateau iris and normal eyes. These findings suggest that while A-scan ultrasonography might be used as a practical tool for differentiating plateau iris and papillary block eyes, a more meticulous gonioscopy and other assessments may be necessary to distinguish plateau iris from normal eyes.

  8. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  9. An Offline Fuzzy Based Approach for Iris Recognition with Enhanced Feature Detection

    Science.gov (United States)

    Kodituwakku, S. R.; Fazeen, M. I. M.

    Among many biometric identification methods iris recognition is more attractive due to the unique features of the human eye [1]. There are many proposed algorithms for iris recognition. Although all these methods are based on the properties of the iris, they are subject to some limitations. In this research we attempt to develop an algorithm for iris recognition based on Fuzzy logic incorporated with not only the visible properties of the human iris but also considering the iris function. Visible features of the human iris such as pigment related features, features controlling the size of the pupil, visible rare anomalies, pigment frill and Collarette are considered [2]. This paper presents the algorithm we developed to recognize iris. A prototype system developed is also discussed.

  10. [Artificial iris].

    Science.gov (United States)

    Szurman, P; Jaissle, G

    2011-08-01

    The flexible iris prosthesis according to Koch with a customized iris design serves for anterior segment reconstruction in patients with partial or complete aniridia. It is designed for implantation in the ciliary sulcus and is recommended only for pseudophakic or aphakic eyes. The multilayered implant consists of a core of a silicone matrix with incorporated color pigment coated with another layer of medical grade silicone. As a design variant the implant is available with or without an additionally embedded tissue layer. Without tissue the implant is more flexible, can be easily folded and perfectly adapts to the anatomical course of the sulcus. In contrast, implants with tissue show a greater rigidity and provide a better grip for sutures. This article describes various techniques for implantation of partial and full prostheses and gives instructions for calculating the implant size. Full prostheses can be combined with other reconstructive measures, such as sutured intraocular lenses and are particularly helpful in silicone oil surgery by avoiding endothelial contact. With careful consideration of the indications and application the flexible iris prosthesis is a valuable extension of the spectrum of reconstructive anterior segment surgery.

  11. AN APPROACH TO REDUCE THE STORAGE REQUIREMENT FOR BIOMETRIC DATA IN AADHAR PROJECT

    Directory of Open Access Journals (Sweden)

    T. Sivakumar

    2013-02-01

    Full Text Available AADHAR is an Indian Government Project to provide unique identification to each Citizen of India. The objective of the project is to collect all the personal details and the biometric traits from each individual. Biometric traits such as iris, face and fingerprint are being collected for authentication. All the information will be stored in a centralized data repository. Considering about the storage requirement for the biometric data of the entire population of India, approximately 20,218 TB of storage space will be required. Since 10 fingerprint data are stored, fingerprint details will take most of the space. In this paper, the storage requirement for the biometric data in the AADHAR project is analyzed and a method is proposed to reduce the storage by cropping the original biometric image before storing. This method can reduce the storage space of the biometric data drastically. All the measurements given in this paper are approximate only.

  12. Reliability of iris recognition as a means of identity verification and future impact on transportation worker identification credential

    OpenAIRE

    McLaren, Simon R.

    2008-01-01

    The Department of Homeland Security is deploying the Transportation Worker Identification Credential (TWIC) to U.S. ports to help ensure only authorized individuals having undergone background checks have access to secure areas. Congress mandated the TWIC have a biometric authenticator; DHS chose fingerprints. This thesis argues iris scanning is a better choice because of the nature of the maritime environment and because iris scanning is a more accurate biometric. This thesis also argues th...

  13. Integrating iris and signature traits for personal authentication using user-specific weighting.

    Science.gov (United States)

    Viriri, Serestina; Tapamo, Jules R

    2012-01-01

    Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR) of 0.08% and a false acceptance rate (FAR) of 0.01%.

  14. Integrating Iris and Signature Traits for Personal Authentication Using User-SpecificWeighting

    Directory of Open Access Journals (Sweden)

    Serestina Viriri

    2012-03-01

    Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.

  15. Multimodal Algorithm for Iris Recognition with Local Topological Descriptors

    Science.gov (United States)

    Campos, Sergio; Salas, Rodrigo; Allende, Hector; Castro, Carlos

    This work presents a new method for feature extraction of iris images to improve the identification process. The valuable information of the iris is intrinsically located in its natural texture, and preserving and extracting the most relevant features is of paramount importance. The technique consists in several steps from adquisition up to the person identification. Our contribution consists in a multimodal algorithm where a fragmentation of the normalized iris image is performed and, afterwards, regional statistical descriptors with Self-Organizing-Maps are extracted. By means of a biometric fusion of the resulting descriptors, the features of the iris are compared and classified. The results with the iris data set obtained from the Bath University repository show an excellent accuracy reaching up to 99.867%.

  16. Investigation on Optimization in Segmentation Phase of Iris Recognition

    Directory of Open Access Journals (Sweden)

    Selvamuthukumaran Shanmugam

    2010-01-01

    Full Text Available In a progressively more digital society, the demandfor secure identification has led to amplified development ofbiometric systems. Iris biometric systems are becoming widelyadopted and accepted as one of the most effective ways topositively identify people. In this paper, the Segmentation phasesof Iris recognition has been examined. The performance of theSegmentation phase could be amplified by the proposedoptimization technique- Optimized Iris Segmentation using SobelEdge Detection. By the proposed method, the overall rank-onerecognition rate of 90% is being achieved which is much betterthan reported accuracies for iris recognition in the literature.Also the proposed approach makes the overall iris recognitionsystem performance by the improvement factor of 10 fold as well.

  17. A NEURAL NETWORK BASED IRIS RECOGNITION SYSTEM FOR PERSONAL IDENTIFICATION

    Directory of Open Access Journals (Sweden)

    Usham Dias

    2010-10-01

    Full Text Available This paper presents biometric personal identification based on iris recognition using artificial neural networks. Personal identification system consists of localization of the iris region, normalization, enhancement and then iris pattern recognition using neural network. In this paper, through results obtained, we have shown that a person’s left and right eye are unique. In this paper, we also show that the network is sensitive to the initial weights and that over-training gives bad results. We also propose a fast algorithm for the localization of the inner and outer boundaries of the iris region. Results of simulations illustrate the effectiveness of the neural system in personal identification. Finally a hardware iris recognition model is proposed and implementation aspects are discussed.

  18. Touchless fingerprint biometrics

    CERN Document Server

    Labati, Ruggero Donida; Scotti, Fabio

    2015-01-01

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most accurate current biometric technologies in touch-based fingerprint-recognition systems require a relatively high level of user cooperation to acquire samples of the concerned biometric trait. With the potential for reduced constraints, reduced hardw

  19. Biometric Authentication Using Infrared Imaging of Hand Vein Patterns

    Science.gov (United States)

    Bhattacharyya, Debnath; Shrotri, A.; Rethrekar, S. C.; Patil, M. H.; Alisherov, Farkhod A.; Kim, Tai-Hoon

    Hand vein patterns are unique and universal. Vein pattern is used as biometric feature in recent years. But, it is not very much popular biometric system as compared to other systems like fingerprint, iris etc, because of the higher cost. For conventional algorithm, it is necessary to use high quality images, which demand high-priced collection devices. There are two approaches for vein authentication, these are hand dorsa and hand ventral. Currently we are working on hand dorsa vein patterns. Here we are putting forward the new approach for low cost hand dorsa vein pattern acquisition using low cost device and proposing a algorithm to extract features from these low quality images.

  20. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  1. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  2. Enhancing the early differential diagnosis of plateau iris and pupillary block using a-scan ultrasonography.

    Directory of Open Access Journals (Sweden)

    Yu-Yen Chen

    Full Text Available To distinguish the frequently misdiagnosed plateau iris eyes from pupillary block group and normal group, we compared the ocular biometrical parameters of them by A-scan ultrasongraphy.In total, we retrospectively reviewed general characteristics and ocular findings including ocular biometric measurements of 71 normal, 39 plateau iris, and 83 pupillary block eyes.The normal controls, plateau iris group and pupillary block group were significantly different in age, but not in gender. The anterior chamber depth tended to decrease and the lens thickness tended to increase from normal to plateau iris to pupillary block eyes. Compared to those of plateau iris group, the pupillary block group had significantly shallower anterior chamber depth (2.90mm vs. 2.33mm; p<0.001, thicker lens (4.77mm vs. 5.11mm; p<0.001, shorter axial length (23.16mm vs. 22.63mm; p<0.001, smaller relative lens position (2.28 vs. 2.16; p<0.001 and larger lens/axial length factor (2.06 vs. 2.26; p<0.001. However, when comparing plateau iris and normal eyes, only axial length and lens/axial length factor were significantly different (23.16 vs. 23.54; p<0.05 and 2.06 vs. 1.96; p<0.05.Measured by A-scan ultrasonography, the ocular biometrics of plateau iris were significantly different from those of pupillary block eyes. However, our A-scan ultrasongraphy generally found no significant biometric differences between plateau iris and normal eyes. These findings suggest that while A-scan ultrasonography might be used as a practical tool for differentiating plateau iris and papillary block eyes, a more meticulous gonioscopy and other assessments may be necessary to distinguish plateau iris from normal eyes.

  3. On Soft Biometrics

    DEFF Research Database (Denmark)

    Nixon, Mark; Correia, Paulo; Nasrollahi, Kamal

    2015-01-01

    Innovation has formed much of the rich history in biometrics. The field of soft biometrics was originally aimed to augment the recognition process by fusion of metrics that were sufficient to discriminate populations rather than individuals. This was later refined to use measures that could be used...... to discriminate individuals, especially using descriptions that can be perceived using human vision and in surveillance imagery. A further branch of this new field concerns approaches to estimate soft biometrics, either using conventional biometrics approaches or just from images alone. These three strands...... combine to form what is now known as soft biometrics. We survey the achievements that have been made in recognition by and in estimation of these parameters, describing how these approaches can be used and where they might lead to. The approaches lead to a new type of recognition, and one similar...

  4. A multi-approach feature extractions for iris recognition

    Science.gov (United States)

    Sanpachai, H.; Settapong, M.

    2014-04-01

    Biometrics is a promising technique that is used to identify individual traits and characteristics. Iris recognition is one of the most reliable biometric methods. As iris texture and color is fully developed within a year of birth, it remains unchanged throughout a person's life. Contrary to fingerprint, which can be altered due to several aspects including accidental damage, dry or oily skin and dust. Although iris recognition has been studied for more than a decade, there are limited commercial products available due to its arduous requirement such as camera resolution, hardware size, expensive equipment and computational complexity. However, at the present time, technology has overcome these obstacles. Iris recognition can be done through several sequential steps which include pre-processing, features extractions, post-processing, and matching stage. In this paper, we adopted the directional high-low pass filter for feature extraction. A box-counting fractal dimension and Iris code have been proposed as feature representations. Our approach has been tested on CASIA Iris Image database and the results are considered successful.

  5. Comparative biometric study between plateau iris configuration and primary open angle glaucoma with narrow angle Estudo biométrico comparativo entre configuração da íris em platô e glaucoma primário de ângulo aberto com seio camerular estreito

    Directory of Open Access Journals (Sweden)

    Alberto Diniz Filho

    2009-06-01

    Full Text Available PURPOSE: To investigate biometrically the differences between plateau iris configuration (PIC eyes and primary open angle glaucoma with narrow angle eyes. METHODS: A comparative study involving a case series with 20 eyes of 11 plateau iris configuration patients and 45 eyes of 27 primary open angle glaucoma with narrow angle eyes patients was done. The following measurements were taken: corneal curvature, central corneal thickness, anterior chamber depth, lens thickness (LT, axial length (AL, lens thickness and axial length ratio, lens position (LP and relative lens position (RLP. RESULTS: The plateau iris configuration eyes presented a higher corneal cuvature value than primary open angle glaucoma with narrow angle eyes eyes but not with clinical and statistical difference (P=0.090. The plateau iris configuration eyes demonstrated a higher central corneal thickness, with statistical significance, when compared to primary open angle glaucoma with narrow angle eyes (P=0.010. Statistical significant difference between plateau iris configuration and primary open angle glaucoma with narrow angle eyes was found in axial length (21.69 ± 0.98 vs. 22.42 ± 0.89; P=0.003. No significant difference was found when anterior chamber depth (2.62 ± 0.23 vs. 2.71 ± 0.31; P=0.078, LT (4.67 ± 0.36 vs. 4.69 ± 0.45; P=0.975, LT/AL (2.16 ± 0.17 vs. 2.10 ± 0.21; P=0.569, LP (4.95 ± 0.25 vs. 5.06 ± 0.34; P=0.164 and RLP (0.23 ± 0.01 vs. 0.22 ± 0.14; P=0.348 were evaluated. CONCLUSION: The eyes with plateau iris configuration presented statistical significantly shorter axial length and higher central corneal thickness than primary open angle glaucoma with narrow angle eyes.OBJETIVO: Comparar, biometricamente, olhos portadores de configuração da íris em platô (CIP e olhos portadores de glaucoma primário de ângulo aberto com seio camerular estreito. MÉTODOS: Estudo prospectivo comparativo envolvendo 20 olhos de 11 pacientes portadores de íris em plat

  6. Fast Iris Segmentation by Rotation Average Analysis of Intensity-Inversed Image

    Science.gov (United States)

    Li, Wei; Jiang, Lin-Hua

    Iris recognition is a reliable and accurate biometric technique used in modern personnel identification system. Segmentation of the effective iris region is the base of iris feature encoding and recognition. In this paper, a novel method is presented for fast iris segmentation. There are two steps to finish the iris segmentation. The first step is iris location, which is based on rotation average analysis of intensity-inversed image and non-linear circular regression. The second step is eyelid detection. A new method to detect the eyelids utilizing a simplified mathematical model of arc with three free parameters is implemented for quick fitting. Comparatively, the conventional model with four parameters is less optimal. Experiments were carried out on both self-collected images and CASIA database. The results show that our method is fast and robust in segmenting the effective iris region with high tolerance of noise and scaling.

  7. Multimodal Biometric System Based on the Recognition of Face and Both Irises

    Directory of Open Access Journals (Sweden)

    Yeong Gon Kim

    2012-09-01

    Full Text Available The performance of unimodal biometric systems (based on a single modality such as face or fingerprint has to contend with various problems, such as illumination variation, skin condition and environmental conditions, and device variations. Therefore, multimodal biometric systems have been used to overcome the limitations of unimodal biometrics and provide high accuracy recognition. In this paper, we propose a new multimodal biometric system based on score level fusion of face and both irises' recognition. Our study has the following novel features. First, the device proposed acquires images of the face and both irises simultaneously. The proposed device consists of a face camera, two iris cameras, near-infrared illuminators and cold mirrors. Second, fast and accurate iris detection is based on two circular edge detections, which are accomplished in the iris image on the basis of the size of the iris detected in the face image. Third, the combined accuracy is enhanced by combining each score for the face and both irises using a support vector machine. The experimental results show that the equal error rate for the proposed method is 0.131%, which is lower than that of face or iris recognition and other fusion methods.

  8. Modeling and prototyping of biometric systems using dataflow programming

    Science.gov (United States)

    Minakova, N.; Petrov, I.

    2018-01-01

    The development of biometric systems is one of the labor-intensive processes. Therefore, the creation and analysis of approaches and techniques is an urgent task at present. This article presents a technique of modeling and prototyping biometric systems based on dataflow programming. The technique includes three main stages: the development of functional blocks, the creation of a dataflow graph and the generation of a prototype. A specially developed software modeling environment that implements this technique is described. As an example of the use of this technique, an example of the implementation of the iris localization subsystem is demonstrated. A variant of modification of dataflow programming is suggested to solve the problem related to the undefined order of block activation. The main advantage of the presented technique is the ability to visually display and design the model of the biometric system, the rapid creation of a working prototype and the reuse of the previously developed functional blocks.

  9. Privacy protecting biometric authentication systems

    OpenAIRE

    Kholmatov, Alisher Anatolyevich

    2008-01-01

    As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can not be canceled or reissued), and iii) disclosure of sensitive information such as race, gender and health problems which may be revealed by biometric ...

  10. Biometric systems - possibilities and dangers

    OpenAIRE

    Petržilka, Jakub

    2013-01-01

    This bachelor thesis is focused on biometric methods, particularly on fingerprint recognition. First part of thesis places biometric into other methods of people's identification. Identification by token and by knowledge. It also describes the beginning and evolution of biometric. The theoretical part also closely clarify working with data and different view on the biometric systems. The following part of the thesis defines the basic principles of using biometric systems, counting FAR and FRR...

  11. BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tonimir Kišasondi

    2007-06-01

    Full Text Available In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems.

  12. Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication

    Science.gov (United States)

    Pishva, Davar

    This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.

  13. Simplified Multimodal Biometric Identification

    Directory of Open Access Journals (Sweden)

    Abhijit Shete

    2014-03-01

    Full Text Available Multibiometric systems are expected to be more reliable than unimodal biometric systems for personal identification due to the presence of multiple, fairly independent pieces of evidence e.g. Unique Identification Project "Aadhaar" of Government of India. In this paper, we present a novel wavelet based technique to perform fusion at the feature level and score level by considering two biometric modalities, face and fingerprint. The results indicate that the proposed technique can lead to substantial improvement in multimodal matching performance. The proposed technique is simple because of no preprocessing of raw biometric traits as well as no feature and score normalization.

  14. Comparison of DCT, SVD and BFOA based multimodal biometric watermarking system

    Directory of Open Access Journals (Sweden)

    S. Anu H. Nair

    2015-12-01

    Full Text Available Digital image watermarking is a major domain for hiding the biometric information, in which the watermark data are made to be concealed inside a host image imposing imperceptible change in the picture. Due to the advance in digital image watermarking, the majority of research aims to make a reliable improvement in robustness to prevent the attack. The reversible invisible watermarking scheme is used for fingerprint and iris multimodal biometric system. A novel approach is used for fusing different biometric modalities. Individual unique modalities of fingerprint and iris biometric are extracted and fused using different fusion techniques. The performance of different fusion techniques is evaluated and the Discrete Wavelet Transform fusion method is identified as the best. Then the best fused biometric template is watermarked into a cover image. The various watermarking techniques such as the Discrete Cosine Transform (DCT, Singular Value Decomposition (SVD and Bacterial Foraging Optimization Algorithm (BFOA are implemented to the fused biometric feature image. Performance of watermarking systems is compared using different metrics. It is found that the watermarked images are found robust over different attacks and they are able to reverse the biometric template for Bacterial Foraging Optimization Algorithm (BFOA watermarking technique.

  15. A study on quality-adjusted impact of time lapse on iris recognition

    Science.gov (United States)

    Sazonova, Nadezhda; Hua, Fang; Liu, Xuan; Remus, Jeremiah; Ross, Arun; Hornak, Lawrence; Schuckers, Stephanie

    2012-06-01

    Although human iris pattern is widely accepted as a stable biometric feature, recent research has found some evidences on the aging effect of iris system. In order to investigate changes in iris recognition performance due to the elapsed time between probe and gallery iris images, we examine the effect of elapsed time on iris recognition utilizing 7,628 iris images from 46 subjects with an average of ten visits acquired over two years from a legacy database at Clarkson University. Taken into consideration the impact of quality factors such as local contrast, illumination, blur and noise on iris recognition performance, regression models are built with and without quality metrics to evaluate the degradation of iris recognition performance based on time lapse factors. Our experimental results demonstrate the decrease of iris recognition performance along with increased elapsed time based on two iris recognition system (the modified Masek algorithm and a commercial software VeriEye SDK). These results also reveal the significance of quality factors in iris recognition regression indicating the variability in match scores. According to the regression analysis, our study in this paper helps provide the quantified decrease on match scores with increased elapsed time, which indicates the possibility to implement the prediction scheme for iris recognition performance based on learning of impact on time lapse factors.

  16. A novel iris patterns matching algorithm of weighted polar frequency correlation

    Science.gov (United States)

    Zhao, Weijie; Jiang, Linhua

    2014-11-01

    Iris recognition is recognized as one of the most accurate techniques for biometric authentication. In this paper, we present a novel correlation method - Weighted Polar Frequency Correlation(WPFC) - to match and evaluate two iris images, actually it can also be used for evaluating the similarity of any two images. The WPFC method is a novel matching and evaluating method for iris image matching, which is complete different from the conventional methods. For instance, the classical John Daugman's method of iris recognition uses 2D Gabor wavelets to extract features of iris image into a compact bit stream, and then matching two bit streams with hamming distance. Our new method is based on the correlation in the polar coordinate system in frequency domain with regulated weights. The new method is motivated by the observation that the pattern of iris that contains far more information for recognition is fine structure at high frequency other than the gross shapes of iris images. Therefore, we transform iris images into frequency domain and set different weights to frequencies. Then calculate the correlation of two iris images in frequency domain. We evaluate the iris images by summing the discrete correlation values with regulated weights, comparing the value with preset threshold to tell whether these two iris images are captured from the same person or not. Experiments are carried out on both CASIA database and self-obtained images. The results show that our method is functional and reliable. Our method provides a new prospect for iris recognition system.

  17. Dynamic analysis of iris configuration with anterior segment optical coherence tomography.

    Science.gov (United States)

    Cheung, Carol Yim-lui; Liu, Shu; Weinreb, Robert N; Liu, Jing; Li, Haitao; Leung, Dexter Yu-lung; Dorairaj, Syril; Liebmann, Jeffrey; Ritch, Robert; Lam, Dennis Shun Chiu; Leung, Christopher Kai-shun

    2010-08-01

    To evaluate dynamic changes in iris configuration and their association with anterior chamber angle width by using anterior segment optical coherence tomography (ASOCT). Forty-six normal subjects with open angles and 40 with narrow angles (Shaffer grade dark room gonioscopy) were analyzed. The dynamic ASOCT dark-light changes of iris bowing were captured with real-time video recording and nasal iris bowing, nasal anterior chamber angle, and pupil diameter were measured in serial image frames selected from the video capture. The associations between iris bowing, iris thickness, anterior chamber depth (ACD), age, anterior chamber angle, and pupillary diameter measurements were evaluated with univariate and multivariate regression analyses. The relationship between iris bowing and pupil diameter was largely linear, with three dynamic patterns observed: (1) convex-to-convex (iris remains convex in dark and light); (2) concave-to-convex (iris changes from concave to convex from light to dark); and (3) concave-to-concave (iris remains concave in dark and light). All the subjects with narrow angles had convex-to-convex anatomy, although 43% of the subjects with open angles also demonstrated this pattern. These individuals were older and had shorter axial length (both with P dark (r = 0.472, P dark. ACD and iris bowing were independently associated with anterior chamber angle width. Independent of ACD, iris bowing is an important biometric parameter that determines angle width. Investigation of iris dynamics may offer a new perspective in understanding the risk and mechanism of primary angle closure.

  18. Biometrics Technology Review 2002

    National Research Council Canada - National Science Library

    Blackburn, T

    2003-01-01

    .... The report characterizes the main categories of biometric techniques, with a focus on face recognition, which is the least intrusive but most effective means of applying filters at access points to the country...

  19. Biometric identification standards research

    Science.gov (United States)

    1998-11-01

    A "biometric" technology is an automatic method for the identification, or identity verification, of an individual based on physiological or behavioral characteristics. The primary objective of the study summarized in this tech brief was to make reco...

  20. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  1. On a methodology for robust segmentation of nonideal iris images.

    Science.gov (United States)

    Schmid, Natalia A; Zuo, Jinyu

    2010-06-01

    Iris biometric is one of the most reliable biometrics with respect to performance. However, this reliability is a function of the ideality of the data. One of the most important steps in processing nonideal data is reliable and precise segmentation of the iris pattern from remaining background. In this paper, a segmentation methodology that aims at compensating various nonidealities contained in iris images during segmentation is proposed. The virtue of this methodology lies in its capability to reliably segment nonideal imagery that is simultaneously affected with such factors as specular reflection, blur, lighting variation, occlusion, and off-angle images. We demonstrate the robustness of our segmentation methodology by evaluating ideal and nonideal data sets, namely, the Chinese Academy of Sciences iris data version 3 interval subdirectory, the iris challenge evaluation data, the West Virginia University (WVU) data, and the WVU off-angle data. Furthermore, we compare our performance to that of our implementation of Camus and Wildes's algorithm and Masek's algorithm. We demonstrate considerable improvement in segmentation performance over the formerly mentioned algorithms.

  2. Biometrics Theory, Methods, and Applications

    CERN Document Server

    Boulgouris, N V; Micheli-Tzanakou, Evangelia

    2009-01-01

    An in-depth examination of the cutting edge of biometrics. This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:. Multilinear discriminant analysis for biometric signal recognition;. Biometric identity authentication techniques based on neural networks;. Multimodal biometrics and design of classifiers for biometric fusion;. Feature selection and facial aging modeling for face recognition;. Geometrical and

  3. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  4. Iris image enhancement for feature recognition and extraction

    CSIR Research Space (South Africa)

    Mabuza, GP

    2012-10-01

    Full Text Available Gonzalez, R.C. and Woods, R.E. 2002. Digital Image Processing 2nd Edition, Instructor?s manual .Englewood Cliffs, Prentice Hall, pp 17-36. Proen?a, H. and Alexandre, L.A. 2007. Toward Noncooperative Iris Recognition: A classification approach using... multiple signatures. IEEE Transactions on Pattern Analysis and Machine Intelligence. IEEE Computer Society, 29 (4): 607-611. Sazonova, N. and Schuckers, S. 2011. Fast and efficient iris image enhancement using logarithmic image processing. Biometric...

  5. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  6. Multi-order analysis framework for comprehensive biometric performance evaluation

    Science.gov (United States)

    Gorodnichy, Dmitry O.

    2010-04-01

    It is not uncommon for contemporary biometric systems to have more than one match below the matching threshold, or to have two or more matches having close matching scores. This is especially true for those that store large quantities of identities and/or are applied to measure loosely constrained biometric traits, such as in identification from video or at a distance. Current biometric performance evaluation standards however are still largely based on measuring single-score statistics such as False Match, False Non-Match rates and the trade-off curves based thereon. Such methodology and reporting makes it impossible to investigate the risks and risk mitigation strategies associated with not having a unique identifying score. To address the issue, Canada Border Services Agency has developed a novel modality-agnostic multi-order performance analysis framework. The framework allows one to analyze the system performance at several levels of detail, by defining the traditional single-score-based metrics as Order-1 analysis, and introducing Order- 2 and Order-3 analysis to permit the investigation of the system reliability and the confidence of its recognition decisions. Implemented in a toolkit called C-BET (Comprehensive Biometrics Evaluation Toolkit), the framework has been applied in a recent examination of the state-of-the art iris recognition systems, the results of which are presented, and is now recommended to other agencies interested in testing and tuning the biometric systems.

  7. Performance and Usage of Biometrics in a Testbed Environment for Tactical Purposes

    Science.gov (United States)

    2006-12-01

    between the black pupil and the white sclera .” (Wang, 2003) It is the texture of the iris that provides the unique quality. Other characteristics...few of them. Other biometric areas for research are: • Hand Geometry – Vein Patters (Thermal) • Retina • DNA pattern • Ear recognition • Odor

  8. Enhancement of Iris Recognition System Based on Phase Only Correlation

    Directory of Open Access Journals (Sweden)

    Nuriza Pramita

    2011-08-01

    Full Text Available Iris recognition system is one of biometric based recognition/identification systems. Numerous techniques have been implemented to achieve a good recognition rate, including the ones based on Phase Only Correlation (POC. Significant and higher correlation peaks suggest that the system recognizes iris images of the same subject (person, while lower and unsignificant peaks correspond to recognition of those of difference subjects. Current POC methods have not investigated minimum iris point that can be used to achieve higher correlation peaks. This paper proposed a method that used only one-fourth of full normalized iris size to achieve higher (or at least the same recognition rate. Simulation on CASIA version 1.0 iris image database showed that averaged recognition rate of the proposed method achieved 67%, higher than that of using one-half (56% and full (53% iris point. Furthermore, all (100% POC peak values of the proposed method was higher than that of the method with full iris points.

  9. A simple shape prior model for iris image segmentation

    Science.gov (United States)

    Bishop, Daniel A.; Yezzi, Anthony, Jr.

    2011-06-01

    In order to make biometric systems faster and more user-friendly, lower-quality images must be accepted. A major hurdle in this task is accurate segmentation of the boundaries of the iris in these images. Quite commonly, circle-fitting is used to approximate the boundaries of the inner (pupil) and outer (limbic) boundaries of the iris, but this assumption does not hold for off-axis or otherwise non-circular boundaries. In this paper we present a novel, foundational method for elliptical segmentation of off-axis iris images. This method uses active contours with constrained flow to achieve a simplified form of shape prior active contours. This is done by calculating a region-based contour evolution and projecting it upon a properly chosen set of vectors to confine it to a class of shapes. In this case, that class of shapes is ellipses. This serves to regularize the contour, simplifying the curve evolution and preventing the development of irregularities that present challenges in iris segmentation. The proposed method is tested using images from the UBIRIS v.1 and CASIA-IrisV3 image data sets, with both near-ideal and off-axis images. Additional testing has been performed using the WVU Off Axis/Angle Iris Dataset, Release 1. By avoiding many of the assumptions commonly used in iris segmentation methods, the proposed method is able to accurately fit elliptical boundaries to off-axis images.

  10. Embedded System for Biometric Identification

    OpenAIRE

    Rosli, Ahmad Nasir Che

    2010-01-01

    This chapter describes the design and implementation of an Embedded System for Biometric Identification from hardware and software perspectives. The first part of the chapter describes the idea of biometric identification. This includes the definition of

  11. Anatomy of Biometric Passports

    Directory of Open Access Journals (Sweden)

    Dominik Malčík

    2012-01-01

    Full Text Available Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification technology and biometrics, especially (but not only in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation; moreover, specific security mechanisms are optional and can be omitted.

  12. Anatomy of biometric passports.

    Science.gov (United States)

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted).

  13. A review of data acquisition and difficulties in sensor module of biometric systems

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2013-10-01

    Full Text Available Biometrics refers to the recognition of individuals based on their physiological and/or behavioral characteristics. Thebiometric traits which may be considered for the authentication of a person are face, hand geometry, finger print, vein, iris,etc. A competent selection of a sensor, its mechanism and adaptability is required, as the absence of these will leave thebiometric sensor deceptive to information sensing. Selecting a sensor for a biometric application from the large number ofavailable sensors with different technologies always brought the issue of performance and accuracy. Therefore, various errorrates and sensibility contention differentiate the available biometric sensors. This paper presents the difficulties faced in thesensor module of the biometric system and the incomparable alternatives on the basis of availability of information at sensormodule of the various systems.

  14. Physiological Biometric Authentication Systems Advantages Disadvantages And Future Development A Review

    Directory of Open Access Journals (Sweden)

    Israa M. Alsaadi

    2015-08-01

    Full Text Available Abstract With the fast increasing of the electronic crimes and their related issues deploying a reliable user authentication system became a significant task for both of access control and securing users private data. Human biometric characteristics such as face finger iris scanning voice signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading imposters attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques. Also a brief summary to the advantages disadvantages and future developments of each method is provided in this paper.

  15. IDENTIFIKASI IRIS MATA MENGGUNAKAN TAPIS GABOR WAVELET DAN JARINGAN SYARAF TIRUAN LEARNING VECTOR QUANTIZATION (LVQ

    Directory of Open Access Journals (Sweden)

    Budi Setiyono

    2012-02-01

    Full Text Available Biometric represents the human identification method development using natural characteristic of humanbeing as its bases. Every iris has the detail and unique texture, even differ between right and left eye.Theeye iris identification process in this research are data acquisition, early processing, feature exctractionand classification. Algorithm used for classification of texture slice the eye is Gabor wavelet filtering, andclassification process of slice the eye texture will be used by a Artificial Neural Network LVQ. Recognitionthe value of feature vektor in each iris obtained from to the number of right recognition value or thepercentage of right one. The best recognition percentage is 87,5 %.

  16. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2018-04-01

    Full Text Available Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD method for an iris recognition system (iPAD using a near infrared light (NIR camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED. Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM. Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  17. A Study on EMG-based Biometrics

    Directory of Open Access Journals (Sweden)

    Jin Su Kim

    2017-05-01

    Full Text Available Biometrics is a technology that recognizes user's information by using unique physical features of his or her body such as face, fingerprint, and iris. It also uses behavioral features such as signature, electrocardiogram (ECG, electromyogram (EMG, and electroencephalogram (EEG. Among them, the EMG signal is a sign generated when the muscles move, which can be used in various fields such as motion recognition, personal identification, and disease diagnosis. In this paper, we analyze EMG-based biometrics and implement a motion recognition and personal identification system. The system extracted features using non-uniform filter bank and Waveform Length (WL, and reduces the dimension using Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA. Afterward, it classified the features using Euclidean Distance (ED, Support Vector Machine (SVM and K Nearest Neighbors (KNN. As a result of the motion recognition experiment, 95% of acquired EMG data and 84.66% of UCI data were obtained and as a result of the personal recognition experiment, 85% of acquired EMG data and 88.66% of UCI data were obtained.

  18. Plateau iris in Japanese patients with primary angle closure and primary angle closure glaucoma.

    Science.gov (United States)

    Mizoguchi, Takanori; Ozaki, Mineo; Wakiyama, Harumi; Ogino, Nobuchika

    2015-01-01

    To determine the prevalence of plateau iris in Japanese patients with primary angle closure (PAC) and primary angle closure glaucoma (PACG) and analyze the biometric parameters in patients with plateau iris using ultrasound biomicroscopy (UBM). In this cross-sectional observational study, subjects aged >50 years with PAC and PACG who had previously undergone a patent laser peripheral iridotomy underwent UBM in one eye. UBM images were qualitatively analyzed using standardized criteria. Plateau iris in a quadrant was defined by anteriorly directed ciliary body, absent ciliary sulcus, steep iris root from its point of insertion followed by a downward angulation, flat iris plane, and irido-angle contact. At least two quadrants had to fulfill these UBM criteria for an eye to be classified as having plateau iris. A-scan biometry was used to measure anterior segment parameters. Ninety-one subjects with PAC (58 subjects) or PACG (33 subjects) and 68 normal controls were recruited. The mean (standard deviation) ages of PAC and PACG patients and normal controls were 73.5 (6.2) and 72.6 (7.3), respectively. Based on UBM criteria, plateau iris was found in 16 eyes (17.6%) of 91 eyes. In these 16 eyes, quadrant-wise analysis showed ten eyes (62.5%) had plateau iris in two quadrants; four eyes (25%) had plateau iris in three quadrants; and two eyes (12.5%) had plateau iris in four quadrants. Anterior chamber depth, lens thickness, axial length, lens position, and relative lens position were not statistically significant between the group having plateau iris and that not having plateau iris, respectively. Approximately 20% of Japanese subjects with PAC and PACG with a patent laser peripheral iridotomy were found to have plateau iris on UBM. No morphological difference was noted in the anterior segment of the eye between those with or without plateau iris.

  19. SINGLE FRAME SUPER RESOLUTION OF NONCOOPERATIVE IRIS IMAGES

    Directory of Open Access Journals (Sweden)

    Anand Deshpande

    2016-11-01

    Full Text Available Image super-resolution, a process to enhance image resolution, has important applications in biometrics, satellite imaging, high definition television, medical imaging, etc. The long range captured iris identification systems often suffer from low resolution and meager focus of the captured iris images. These degrade the iris recognition performance. This paper proposes enhanced iterated back projection (EIBP method to super resolute the long range captured iris polar images. The performance of proposed method is tested and analyzed on CASIA long range iris database by comparing peak signal to noise ratio (PSNR and structural similarity index (SSIM with state-of-the-art super resolution (SR algorithms. It is further analyzed by increasing the up-sampling factor. Performance analysis shows that the proposed method is superior to state-of-the-art algorithms, the peak signal-to-noise ratio improved about 0.1-1.5 dB. The results demonstrate that the proposed method is well suited to super resolve the iris polar images captured at a long distance

  20. Iris recognition using image moments and k-means algorithm.

    Science.gov (United States)

    Khan, Yaser Daanial; Khan, Sher Afzal; Ahmad, Farooq; Islam, Saeed

    2014-01-01

    This paper presents a biometric technique for identification of a person using the iris image. The iris is first segmented from the acquired image of an eye using an edge detection algorithm. The disk shaped area of the iris is transformed into a rectangular form. Described moments are extracted from the grayscale image which yields a feature vector containing scale, rotation, and translation invariant moments. Images are clustered using the k-means algorithm and centroids for each cluster are computed. An arbitrary image is assumed to belong to the cluster whose centroid is the nearest to the feature vector in terms of Euclidean distance computed. The described model exhibits an accuracy of 98.5%.

  1. Iris Recognition Using Image Moments and k-Means Algorithm

    Directory of Open Access Journals (Sweden)

    Yaser Daanial Khan

    2014-01-01

    Full Text Available This paper presents a biometric technique for identification of a person using the iris image. The iris is first segmented from the acquired image of an eye using an edge detection algorithm. The disk shaped area of the iris is transformed into a rectangular form. Described moments are extracted from the grayscale image which yields a feature vector containing scale, rotation, and translation invariant moments. Images are clustered using the k-means algorithm and centroids for each cluster are computed. An arbitrary image is assumed to belong to the cluster whose centroid is the nearest to the feature vector in terms of Euclidean distance computed. The described model exhibits an accuracy of 98.5%.

  2. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  3. Tongue prints: A novel biometric and potential forensic tool.

    Science.gov (United States)

    Radhika, T; Jeddy, Nadeem; Nithya, S

    2016-01-01

    Tongue is a vital internal organ well encased within the oral cavity and protected from the environment. It has unique features which differ from individual to individual and even between identical twins. The color, shape, and surface features are characteristic of every individual, and this serves as a tool for identification. Many modes of biometric systems have come into existence such as fingerprint, iris scan, skin color, signature verification, voice recognition, and face recognition. The search for a new personal identification method secure has led to the use of the lingual impression or the tongue print as a method of biometric authentication. Tongue characteristics exhibit sexual dimorphism thus aiding in the identification of the person. Emerging as a novel biometric tool, tongue prints also hold the promise of a potential forensic tool. This review highlights the uniqueness of tongue prints and its superiority over other biometric identification systems. The various methods of tongue print collection and the classification of tongue features are also elucidated.

  4. The research and application of multi-biometric acquisition embedded system

    Science.gov (United States)

    Deng, Shichao; Liu, Tiegen; Guo, Jingjing; Li, Xiuyan

    2009-11-01

    The identification technology based on multi-biometric can greatly improve the applicability, reliability and antifalsification. This paper presents a multi-biometric system bases on embedded system, which includes: three capture daughter boards are applied to obtain different biometric: one each for fingerprint, iris and vein of the back of hand; FPGA (Field Programmable Gate Array) is designed as coprocessor, which uses to configure three daughter boards on request and provides data path between DSP (digital signal processor) and daughter boards; DSP is the master processor and its functions include: control the biometric information acquisition, extracts feature as required and responsible for compare the results with the local database or data server through network communication. The advantages of this system were it can acquire three different biometric in real time, extracts complexity feature flexibly in different biometrics' raw data according to different purposes and arithmetic and network interface on the core-board will be the solution of big data scale. Because this embedded system has high stability, reliability, flexibility and fit for different data scale, it can satisfy the demand of multi-biometric recognition.

  5. A Narrative Methodology to Recognize Iris Patterns By Extracting Features Using Gabor Filters and Wavelets

    Directory of Open Access Journals (Sweden)

    Shristi Jha

    2016-01-01

    Full Text Available Iris pattern Recognition is an automated method of biometric identification that uses mathematical pattern-Recognition techniques on images of one or both of the irises of an individual’s eyes, whose complex random patterns are unique, stable, and can be seen from some distance. Iris recognition uses video camera technology with subtle near infrared illumination to acquire images of the detail-rich, intricate structures of the iris which are visible externally. In this narrative research paper the input image is captured and the success of the iris recognition depends on the quality of the image so the captured image is subjected to the preliminary image preprocessing techniques like localization, segmentation, normalization and noise detection followed by texture and edge feature extraction by using Gabor filters and wavelets then the processed image is matched with templates stored in the database to detect the Iris Patterns.

  6. A Multi-Sample Standoff Multimodal Biometric System

    Energy Technology Data Exchange (ETDEWEB)

    Barstow, Del R [ORNL; Patlolla, Dilip Reddy [ORNL; Mann, Christopher J [ORNL; Boehnen, Chris Bensing [ORNL

    2012-01-01

    Abstract The data captured by existing standoff biometric systems typically has lower biometric recognition performance than their close range counterparts due to imaging challenges, pose challenges, and other factors. To assist in overcoming these limitations systems typically perform in a multi-modal capacity such as Honeywell s Combined Face and Iris (CFAIRS) [21] system. While this improves the systems performance, standoff systems have yet to be proven as accurate as their close range equivalents. We will present a standoff system capable of operating up to 7 meters in range. Unlike many systems such as the CFAIRS our system captures high quality 12 MP video allowing for a multi-sample as well as multi-modal comparison. We found that for standoff systems multi-sample improved performance more than multi-modal. For a small test group of 50 subjects we were able to achieve 100% rank one recognition performance with our system.

  7. TAPIOCA MELANOMA OF THE IRIS

    NARCIS (Netherlands)

    DEKEIZER, RJW; OOSTERHUIS, JA; HOUTMAN, WA; DEWOLFFROUENDAAL, D

    Clinical identification of tapioca melanoma of the iris is important because its medical treatment may differ from that of other malignant iris melanomas. The characteristic iris nodules must be differentiated from granulomatous uveitis, metastases, and Lisch nodules (neurofibromatosis). We will

  8. Biometric Borders and Counterterrorism

    Science.gov (United States)

    2010-12-01

    Despite these advantages, there is a fair amount of public stigma about the intrusiveness of capturing iris images.67 This perception is likely due...that the targets associated with these attacks were found to be various abortion clinics, these events were disregarded with relatively high confidence

  9. BIOMETRICS IN ZOOTECHNICS

    Directory of Open Access Journals (Sweden)

    Gordana Kralik

    2012-12-01

    Full Text Available University textbook Biometrics in zootechnics, by authors Prof.Dr.Sc.Dr.hc. Gordana Kralik, Prof.Dr. Zoran Škrtić and Assist.Prof.Dr. Zlata Kralik from the Faculty of Agriculture in Osijek, contains the following chapters: 1. Introduction overview, 2. Sample analysis, 3. Parameter estimation, 4. Hypothesis testing, 5. Variance analysis of experimental plans, 6. Regression and correlation, 7. Calculation of statistical parameters in Microsoft Office Excel 2007, 8. Scientific and professional work, Literature, Symbols and formulas, Material (tables and Index – glossary. The textbook is written for undergraduate, graduate and postgraduate students of the Faculty of Agriculture, J.J. Strossmayer University of Osijek. As longtime university teachers, authors noticed the need for publishing textbook Biometrics in zootechnics due to the lack of literature. The textbook can also be used by students from other agricultural universities and agronomists who want to acquire basic knowledge about the use of biometric methods in the zootechnics. The aim of the authors is to clarify the core issues of research work and biometric data processing to interested readers in a simple and acceptable way. Students and professionals who wish to be engaged in research work should be familiar with the planning and conduction of experiments, data collection and analysis, data processing, as well as interpretation of results. From cooperation and contacts with the students, authors have realized the fact that many of them are not prone to mathematics. The textbook is written without mathematical “derivation” and theoretical interpretations and is easily accessible to students and experts to whom it is intended.

  10. Biometrics Foundation Documents

    Science.gov (United States)

    2009-01-01

    aircraft , signing for a piece of equipment, or recording the chain of evidence. Of course, biometrics perform more reliably in controlled environments...or she walks. As in face recognition, this technique is one that humans intuitively use to recognize someone.7 Facial Thermography measures how...photochemical effects, the principal potential damage modality is thermal. When NIR is produced using light emitting diodes, the resulting light is

  11. [Personal identification with biometric and genetic methods].

    Science.gov (United States)

    Cabanis, Emmanuel-Alain; Le Gall, Jean-Yves; Ardaillou, Raymond

    2007-11-01

    The need for personal identification is growing in many avenues of society. To "identify" a person is to establish a link between his or her observed characteristics and those previously stored in a database. To "authenticate" is to decide whether or not someone is the person he or she claims to be. These two objectives can now be achieved by analysing biometric data and genetic prints. All biometric techniques proceed in several stages: acquisition of an image or physical parameters, encoding them with a mathematical model, comparing the results of this model with those contained in the database, and calculating the error risk. These techniques must be usable worldwide and must examine specific and permanent personal data. The most widely used are facial recognition, digital prints (flexion folds and dermatoglyphs, that offer the advantage of leaving marks), and the surface and texture of the iris. Other biometric techniques analyse behaviours such as walking, signing, typing, or speaking. Implanted radio-transmitters are another means of identification. All these systems are evaluated on the basis of the same parameters, namely the false rejection rate, the false acceptance rate, and the failure-to-enrol rate. The uses of biometrics are increasing and diversifying, and now include national and international identification systems, control of access to protected sites, criminal and victim identification, and transaction security. Genetic methods can identify individuals almost infallibly, based on short tandem repeats of 2-5 nucleotides, or microsatellites. The most recent kits analyze 11-16 independent autosomal markers. Mitochondrial DNA and Y chromosome DNA can also be analyzed. These genetic tests are currently used to identify suspected criminals or their victims from biological samples, and to establish paternity. Personal identification raises many ethical questions, however, such as when to create and how to use a database while preserving personal freedom

  12. Improved Iris Recognition through Fusion of Hamming Distance and Fragile Bit Distance.

    Science.gov (United States)

    Hollingsworth, Karen P; Bowyer, Kevin W; Flynn, Patrick J

    2011-12-01

    The most common iris biometric algorithm represents the texture of an iris using a binary iris code. Not all bits in an iris code are equally consistent. A bit is deemed fragile if its value changes across iris codes created from different images of the same iris. Previous research has shown that iris recognition performance can be improved by masking these fragile bits. Rather than ignoring fragile bits completely, we consider what beneficial information can be obtained from the fragile bits. We find that the locations of fragile bits tend to be consistent across different iris codes of the same eye. We present a metric, called the fragile bit distance, which quantitatively measures the coincidence of the fragile bit patterns in two iris codes. We find that score fusion of fragile bit distance and Hamming distance works better for recognition than Hamming distance alone. To our knowledge, this is the first and only work to use the coincidence of fragile bit locations to improve the accuracy of matches.

  13. Age factors in biometric processing

    CERN Document Server

    Fairhurst, Michael

    2013-01-01

    As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly important to consider more carefully issues relating to reliability, usability and inclusion. One factor which is particularly important in this context is that of the relationship between the nature of the measurements extracted from a particular biometric modality and the age of the sample donor, and the effect which age has on physiological and behavioural characteristics invoked in a biometric transaction. In Age Factors in Biometric Processing an in

  14. Applying intelligent statistical methods on biometric systems

    OpenAIRE

    Betschart, Willie

    2005-01-01

    This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The l...

  15. The UBIRIS.v2: a database of visible wavelength iris images captured on-the-move and at-a-distance.

    Science.gov (United States)

    Proença, Hugo; Filipe, Sílvio; Santos, Ricardo; Oliveira, João; Alexandre, Luís A

    2010-08-01

    The iris is regarded as one of the most useful traits for biometric recognition and the dissemination of nationwide iris-based recognition systems is imminent. However, currently deployed systems rely on heavy imaging constraints to capture near infrared images with enough quality. Also, all of the publicly available iris image databases contain data correspondent to such imaging constraints and therefore are exclusively suitable to evaluate methods thought to operate on these type of environments. The main purpose of this paper is to announce the availability of the UBIRIS.v2 database, a multisession iris images database which singularly contains data captured in the visible wavelength, at-a-distance (between four and eight meters) and on on-the-move. This database is freely available for researchers concerned about visible wavelength iris recognition and will be useful in accessing the feasibility and specifying the constraints of this type of biometric recognition.

  16. Plateau iris in Japanese patients with primary angle closure and primary angle closure glaucoma

    Directory of Open Access Journals (Sweden)

    Mizoguchi T

    2015-06-01

    Full Text Available Takanori Mizoguchi,1 Mineo Ozaki,2,3 Harumi Wakiyama,1,4 Nobuchika Ogino1,51Mizoguchi Eye Clinic, Nagasaki, Japan; 2Ozaki Eye Clinic Miyazaki, Japan; 3Department of Ophthalmology, Faculty of Medicine, University of Miyazaki, Miyazaki, Japan; 4The Japanese Red Cross Nagasaki Genbaku Hospital, Nagasaki, Japan; 5Nishigaki Eye Clinic, Nagoya, JapanPurpose: To determine the prevalence of plateau iris in Japanese patients with primary angle closure (PAC and primary angle closure glaucoma (PACG and analyze the biometric parameters in patients with plateau iris using ultrasound biomicroscopy (UBM.Methods: In this cross-sectional observational study, subjects aged >50 years with PAC and PACG who had previously undergone a patent laser peripheral iridotomy underwent UBM in one eye. UBM images were qualitatively analyzed using standardized criteria. Plateau iris in a quadrant was defined by anteriorly directed ciliary body, absent ciliary sulcus, steep iris root from its point of insertion followed by a downward angulation, flat iris plane, and irido-angle contact. At least two quadrants had to fulfill these UBM criteria for an eye to be classified as having plateau iris. A-scan biometry was used to measure anterior segment parameters.Results: Ninety-one subjects with PAC (58 subjects or PACG (33 subjects and 68 normal controls were recruited. The mean (standard deviation ages of PAC and PACG patients and normal controls were 73.5 (6.2 and 72.6 (7.3, respectively. Based on UBM criteria, plateau iris was found in 16 eyes (17.6% of 91 eyes. In these 16 eyes, quadrant-wise analysis showed ten eyes (62.5% had plateau iris in two quadrants; four eyes (25% had plateau iris in three quadrants; and two eyes (12.5% had plateau iris in four quadrants. Anterior chamber depth, lens thickness, axial length, lens position, and relative lens position were not statistically significant between the group having plateau iris and that not having plateau iris

  17. Iris identification system based on Fourier coefficients and singular value decomposition

    Science.gov (United States)

    Somnugpong, Sawet; Phimoltares, Suphakant; Maneeroj, Saranya

    2011-12-01

    Nowadays, both personal identification and classification are very important. In order to identify the person for some security applications, physical or behavior-based characteristics of individuals with high uniqueness might be analyzed. Biometric becomes the mostly used in personal identification purpose. There are many types of biometric information currently used. In this work, iris, one kind of personal characteristics is considered because of its uniqueness and collectable. Recently, the problem of various iris recognition systems is the limitation of space to store the data in a variety of environments. This work proposes the iris recognition system with small-size of feature vector causing a reduction in space complexity term. For this experiment, each iris is presented in terms of frequency domain, and based on neural network classification model. First, Fast Fourier Transform (FFT) is used to compute the Discrete Fourier Coefficients of iris data in frequency domain. Once the iris data was transformed into frequency-domain matrix, Singular Value Decomposition (SVD) is used to reduce a size of the complex matrix to single vector. All of these vectors would be input for neural networks for the classification step. With this approach, the merit of our technique is that size of feature vector is smaller than that of other techniques with the acceptable level of accuracy when compared with other existing techniques.

  18. Extended depth of field system for long distance iris acquisition

    Science.gov (United States)

    Chen, Yuan-Lin; Hsieh, Sheng-Hsun; Hung, Kuo-En; Yang, Shi-Wen; Li, Yung-Hui; Tien, Chung-Hao

    2012-10-01

    Using biometric signatures for identity recognition has been practiced for centuries. Recently, iris recognition system attracts much attention due to its high accuracy and high stability. The texture feature of iris provides a signature that is unique for each subject. Currently most commercial iris recognition systems acquire images in less than 50 cm, which is a serious constraint that needs to be broken if we want to use it for airport access or entrance that requires high turn-over rate . In order to capture the iris patterns from a distance, in this study, we developed a telephoto imaging system with image processing techniques. By using the cubic phase mask positioned front of the camera, the point spread function was kept constant over a wide range of defocus. With adequate decoding filter, the blurred image was restored, where the working distance between the subject and the camera can be achieved over 3m associated with 500mm focal length and aperture F/6.3. The simulation and experimental results validated the proposed scheme, where the depth of focus of iris camera was triply extended over the traditional optics, while keeping sufficient recognition accuracy.

  19. Efficient iris texture analysis method based on Gabor ordinal measures

    Science.gov (United States)

    Tajouri, Imen; Aydi, Walid; Ghorbel, Ahmed; Masmoudi, Nouri

    2017-07-01

    With the remarkably increasing interest directed to the security dimension, the iris recognition process is considered to stand as one of the most versatile technique critically useful for the biometric identification and authentication process. This is mainly due to every individual's unique iris texture. A modestly conceived efficient approach relevant to the feature extraction process is proposed. In the first place, iris zigzag "collarette" is extracted from the rest of the image by means of the circular Hough transform, as it includes the most significant regions lying in the iris texture. In the second place, the linear Hough transform is used for the eyelids' detection purpose while the median filter is applied for the eyelashes' removal. Then, a special technique combining the richness of Gabor features and the compactness of ordinal measures is implemented for the feature extraction process, so that a discriminative feature representation for every individual can be achieved. Subsequently, the modified Hamming distance is used for the matching process. Indeed, the advanced procedure turns out to be reliable, as compared to some of the state-of-the-art approaches, with a recognition rate of 99.98%, 98.12%, and 95.02% on CASIAV1.0, CASIAV3.0, and IIT Delhi V1 iris databases, respectively.

  20. Association Between Baseline Iris Thickness and Prophylactic Laser Peripheral Iridotomy Outcomes in Primary Angle Closure Suspects

    Science.gov (United States)

    Lee, Roland Y.; Kasuga, Toshimitsu; Cui, Qi N.; Porco, Travis C.; Huang, Guofu; He, Mingguang; Lin, Shan C.

    2014-01-01

    Objective To evaluate the association between baseline measurements of iris thickness at three positions and change in anterior segment biometric parameters after prophylactic laser peripheral iridotomy (LPI). Design Prospective clinical cohort study. Participants Fifty-two eyes of 52 nonglaucomatous subjects with anatomically narrow angles. Methods Anterior segment optical coherence tomography images captured before and after LPI were analyzed using customized software, the Zhongshan Angle Assessment Program. Differences in preoperative and postoperative measurements for anterior segment biometric parameters were compared by paired Student’s t-tests. Multivariate linear regression models, adjusted for age, sex, ethnicity, and preoperative pupil diameter, were used to examine the association between the baseline measurements of iris thickness at three positions and the change in anterior segment biometric parameters after LPI. Main Outcome Measures Baseline iris thickness measured at 750μm (IT750) and 2000μm (IT2000) from the scleral spur and maximal iris thickness (ITM). Changes in iris curvature (ICURV) and trabecular–iris space area at 500μm (TISA500) and 750μm (TISA750) from the scleral spur after LPI. Results ICURV significantly decreased, while TISA500 and TISA750 significantly increased following LPI (all Piris thickness are associated with greater decrease in ICURV and increases in TISA500 and TISA750 after LPI. This suggests that eyes with thinner irides undergoing LPI were more likely to exhibit greater magnitude of change in terms of flattening of the iris convexity (i.e., ICURV) and widening of the anterior chamber angle (i.e., TISA500 and TISA750). PMID:24534754

  1. Logistic Map for Cancellable Biometrics

    Science.gov (United States)

    Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr

    2017-08-01

    This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.

  2. Biometrics — Developments and Potential

    NARCIS (Netherlands)

    Meuwly, Didier; Veldhuis, Raymond N.J.

    2014-01-01

    This article describes the use of biometric technology in forensic science, for the development of new methods and tools, improving the current forensic biometric applications, and allowing for the creation of new ones. The article begins with a definition and a summary of the development of this

  3. Association between baseline iris thickness and prophylactic laser peripheral iridotomy outcomes in primary angle-closure suspects.

    Science.gov (United States)

    Lee, Roland Y; Kasuga, Toshimitsu; Cui, Qi N; Porco, Travis C; Huang, Guofu; He, Mingguang; Lin, Shan C

    2014-06-01

    To evaluate the association between baseline measurements of iris thickness at 3 positions and change in anterior segment biometric parameters after prophylactic laser peripheral iridotomy (LPI). Prospective clinical cohort study. Fifty-two eyes of 52 nonglaucomatous subjects with anatomically narrow angles. Anterior segment optical coherence tomography (ASOCT) images captured before and after LPI were analyzed using customized software, the Zhongshan Angle Assessment Program (ZAAP) (Zhongshan Ophthalmic Centre, Guangzhou, China). Differences in preoperative and postoperative measurements for anterior segment biometric parameters were compared by paired Student t tests. Multivariate linear regression models, adjusted for age, sex, ethnicity, and preoperative pupil diameter, were used to examine the association between the baseline measurements of iris thickness at 3 positions and the change in anterior segment biometric parameters after LPI. Baseline iris thickness measured at 750 μm from the scleral spur (IT750), iris thickness measured at 2000 μm from the scleral spur (IT2000), and maximal iris thickness (ITM). Changes in iris curvature (ICURV) and trabecular-iris space area at 500 μm from the scleral spur (TISA500) and 750 μm from the scleral spur (TISA750) after LPI. The ICURV significantly decreased, whereas TISA500 and TISA750 significantly increased after LPI (all P iris thickness are associated with greater decrease in ICURV and increases in TISA500 and TISA750 after LPI. This suggests that eyes with thinner irides undergoing LPI were more likely to exhibit greater magnitude of change in terms of flattening of the iris convexity (i.e., ICURV) and widening of the anterior chamber angle (i.e., TISA500 and TISA750). Copyright © 2014 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  4. A statistical investigation into the stability of iris recognition in diverse population sets

    Science.gov (United States)

    Howard, John J.; Etter, Delores M.

    2014-05-01

    Iris recognition is increasingly being deployed on population wide scales for important applications such as border security, social service administration, criminal identification and general population management. The error rates for this incredibly accurate form of biometric identification are established using well known, laboratory quality datasets. However, it is has long been acknowledged in biometric theory that not all individuals have the same likelihood of being correctly serviced by a biometric system. Typically, techniques for identifying clients that are likely to experience a false non-match or a false match error are carried out on a per-subject basis. This research makes the novel hypothesis that certain ethnical denominations are more or less likely to experience a biometric error. Through established statistical techniques, we demonstrate this hypothesis to be true and document the notable effect that the ethnicity of the client has on iris similarity scores. Understanding the expected impact of ethnical diversity on iris recognition accuracy is crucial to the future success of this technology as it is deployed in areas where the target population consists of clientele from a range of geographic backgrounds, such as border crossings and immigration check points.

  5. Dual watermarking technique with multiple biometric watermarks

    Indian Academy of Sciences (India)

    multiple biometric watermarks in which it embeds speech and face biometric traits of owner invisibly and lastly ... Digital watermarking is useful in DRM systems as it can hide information within the digital content ... Biometric data itself is vulnerable to attacks and security of biometric data is of prime importance. For instance ...

  6. Biometrics: Accessibility challenge or opportunity?

    Directory of Open Access Journals (Sweden)

    Ramon Blanco-Gonzalo

    Full Text Available Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  7. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Directory of Open Access Journals (Sweden)

    C. Chen

    2009-01-01

    Full Text Available Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP approach and a greedy search (GS approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  8. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Science.gov (United States)

    Chen, C.; Veldhuis, R. N. J.; Kevenaar, T. A. M.; Akkermans, A. H. M.

    2009-12-01

    Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA) principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP) approach and a greedy search (GS) approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  9. ECG based biometrics verification system using LabVIEW

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2010-07-01

    Full Text Available Biometric based authentication systems provide solutions to the problems in high security which remain with conventionalsecurity systems. In a biometric verification system, human’s biological parameters (such as voice, finger print,palm print or hand geometry, face, iris etc. are used to verify the authenticity of a person. These parameters are good to beused as biometric parameters but do not provide the guarantee that the person is present and alive. As voice can be copied,finger print can be picked from glass on synthetic skin and in face recognition system due to genetic factors identical twinsor father-son may have the same facial appearance. ECG does not have these problems. It can not be recorded without theknowledge of the person and ECG of every person is unique even identical twins have different ECG. In this paper an ECGbasedbiometrics verification system which was developed using Laboratory Virtual Instruments Engineering Workbench(LabVIEW version 7.1 is discussed. Experiments were conducted on the database stored in the laboratory of 20 individualshaving 10 samples each and the results revealed a false rejection rate (FRR of 3% and false acceptance rate (FAR of 3.21%.

  10. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  11. Comparative and Analysis of Biometric Systems

    OpenAIRE

    Manivannan,; Padma

    2011-01-01

    Biometric as the science of recognizing an individual based on his or her physical or behavioral traits, it is beginning to gain acceptance as a legitimate method for determining an individual identity.Biometric have now been deployed in various commercial, civilian, and national security applications. Biometric described overview of various biometric techniques and the need to be addressed form making biometric technology an effective tool for providing information security.

  12. Low-cost mobile video-based iris recognition for small databases

    Science.gov (United States)

    Thomas, N. Luke; Du, Yingzi; Muttineni, Sriharsha; Mang, Shing; Sran, Dylan

    2009-05-01

    This paper presents a low-cost method for providing biometric verification for applications that do not require large database sizes. Existing portable iris recognition systems are typically self-contained and expensive. For some applications, low cost is more important than extremely discerning matching ability. In these instances, the proposed system could be implemented at low cost, with adequate matching performance for verification. Additionally, the proposed system could be used in conjunction with any image based biometric identification system. A prototype system was developed and tested on a small database, with promising preliminary results.

  13. Locating An IRIS From Image Using Canny And Hough Transform

    Directory of Open Access Journals (Sweden)

    Poorvi Bhatt

    2017-11-01

    Full Text Available Iris recognition a relatively new biometric technology has great advantages such as variability stability and security thus it is the most promising for high security environments. The proposed system here is a simple system design and implemented to find the iris from the image using Hough Transform Algorithm. Canny Edge detector has been used to get edge image to use it as an input to the Hough Transform. To get the general idea of Hough Transform the Hough Transform for circle is also implemented. RGB value of 3-D accumulator array of peaks of inner circle and outer circle has been performed. And at the end some suggestions are made to improve the system and performance gets discussed.

  14. VASIR: An Open-Source Research Platform for Advanced Iris Recognition Technologies.

    Science.gov (United States)

    Lee, Yooyoung; Micheals, Ross J; Filliben, James J; Phillips, P Jonathon

    2013-01-01

    The performance of iris recognition systems is frequently affected by input image quality, which in turn is vulnerable to less-than-optimal conditions due to illuminations, environments, and subject characteristics (e.g., distance, movement, face/body visibility, blinking, etc.). VASIR (Video-based Automatic System for Iris Recognition) is a state-of-the-art NIST-developed iris recognition software platform designed to systematically address these vulnerabilities. We developed VASIR as a research tool that will not only provide a reference (to assess the relative performance of alternative algorithms) for the biometrics community, but will also advance (via this new emerging iris recognition paradigm) NIST's measurement mission. VASIR is designed to accommodate both ideal (e.g., classical still images) and less-than-ideal images (e.g., face-visible videos). VASIR has three primary modules: 1) Image Acquisition 2) Video Processing, and 3) Iris Recognition. Each module consists of several sub-components that have been optimized by use of rigorous orthogonal experiment design and analysis techniques. We evaluated VASIR performance using the MBGC (Multiple Biometric Grand Challenge) NIR (Near-Infrared) face-visible video dataset and the ICE (Iris Challenge Evaluation) 2005 still-based dataset. The results showed that even though VASIR was primarily developed and optimized for the less-constrained video case, it still achieved high verification rates for the traditional still-image case. For this reason, VASIR may be used as an effective baseline for the biometrics community to evaluate their algorithm performance, and thus serves as a valuable research platform.

  15. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  16. Biometrics Research and Engineering Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — As the Department of Defense moves forward in its pursuit of integrating biometrics technology into facility access control, the Global War on Terrorism and weapon...

  17. Biometrics Evaluation under Spoofing Attacks

    OpenAIRE

    Chingovska, Ivana; Anjos, André; Marcel, Sébastien

    2014-01-01

    While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes. However, an important, but often overlooked issue regards their engagement into a verification task and how to measure their impact on the verification systems themselves. A novel evalu...

  18. Genetic Optimization of Neural Networks for Person Recognition based on the Iris

    Directory of Open Access Journals (Sweden)

    Oscar Castillo

    2012-06-01

    Full Text Available This paper describes the application of modular neural network architectures for person recognition using the human iris images as a biometric measure. The iris database was obtained from the Institute of Automation of the Academy of Sciences China (CASIA. We show simulation results with the modular neural network approach, its optimization using genetic algorithms, and the integration with different methods, such as: the gating network method, type-1 fuzzy integration and optimized fuzzy integration using genetic algorithms. Simulation results show a good identification rate using fuzzy integrators and the best structure found by the genetic algorithm.

  19. Signal and image processing for biometrics

    CERN Document Server

    Proença, Hugo; Du, Eliza

    2014-01-01

    This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.

  20. Iris - nimi marmortahvlilt / Tiit Tuumalu

    Index Scriptorium Estoniae

    Tuumalu, Tiit, 1971-

    2003-01-01

    Briti kirjanikust Iris Murdochist pajatava inglise-ameerika mängufilmist "Iris" eesti videolevisse jõudmise puhul. Võrreldakse inglise teatrilavastaja Richard Eyre filmidebüüti Elmo Nüganeni debüütfilmiga "Nimed marmortahvlil"

  1. Iris Crypts Influence Dynamic Changes of Iris Volume.

    Science.gov (United States)

    Chua, Jacqueline; Thakku, Sri Gowtham; Tun, Tin A; Nongpiur, Monisha E; Tan, Marcus Chiang Lee; Girard, Michael J A; Wong, Tien Yin; Quah, Joanne Hui Min; Aung, Tin; Cheng, Ching-Yu

    2016-10-01

    To determine the association of iris surface features with iris volume change after physiologic pupil dilation in adults. Cross-sectional observational study. Chinese adults aged ≥ 50 years without ocular diseases. Digital iris photographs were taken from eyes of each participant and graded for crypts (by number and size) and furrows (by number and circumferential extent) following a standardized grading scheme. Iris color was measured objectively, using the Commission Internationale de l'Eclairage (CIE) L* color parameter (higher value denoting lighter iris). The anterior segment was imaged by swept-source optical coherence tomography (SS-OCT) (Casia; Tomey, Nagoya, Japan) under bright light and dark room conditions. Iris volumes in light and dark conditions were measured with custom semiautomated software, and the change in iris volume was quantified. Associations of the change in iris volume after pupil dilation with underlying iris surface features in right eyes were assessed using linear regression analysis. Iris volume change after physiologic pupil dilation from light to dark condition. A total of 65 Chinese participants (mean age, 59.8±5.7 years) had gradable data for iris surface features. In light condition, higher iris crypt grade was associated independently with smaller iris volume (β [change in iris volume in millimeters per crypt grade increment] = -1.43, 95% confidence interval [CI], -2.26 to -0.59; P = 0.001) and greater reduction of iris volume on pupil dilation (β [change in iris volume in millimeters per crypt grade increment] = 0.23, 95% CI, 0.06-0.40; P = 0.010), adjusting for age, gender, presence of corneal arcus, and change in pupil size. Iris furrows and iris color were not associated with iris volume in light condition or change in iris volume (all P > 0.05). Although few Chinese persons have multiple crypts on their irides, irides with more crypts were significantly thinner and lost more volume on pupil dilation. In view that

  2. Iris reactor development

    Energy Technology Data Exchange (ETDEWEB)

    Paramonov, D.V.; Carelli, M.D. [Westinghouse Electric Corp., Baltimore, MD (United States); Miller, K. [BNFL, Inc., (United Kingdom); Lombardi, C.V.; Ricotti, M.E. [Polytechnic of Milan, Polimi (Italy); Todreas, N.E. [Masachussets Institute of Technology, MIT (United States); Greenspan, E. [University of California at Berkeley, UCB (United States); Yamamoto, K. [JAPC Japan Atomic Power Co., Tokyo (Japan); Nagano, A. [Mitsubishi Heavy Industries Ltd., Tokyo (Japan); Ninokata, H. [Tokyo Institut of Technology, TIT (Japan); Robertson, J. [Westinghouse and bechtel (United States); Oriolo, F. [Pisa Univ. (Italy)

    2001-07-01

    The development progress of the IRIS (International Reactor Innovative and Secure) nuclear power system is presented. IRIS is currently being developed by an international consortium of industry, laboratory, university and utility establishments, led by Westinghouse. It is aimed at achieving the four major objectives of the Generation IV nuclear systems, i.e., proliferation resistance, enhanced safety, economic competitiveness and reduced waste. The project first year activities, which are summarized here, were focused on core neutronics, in-vessel configuration, steam generator and containment design, safety approach and economic performance. Details of these studies are provided in parallel papers in these proceedings. (author)

  3. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    Science.gov (United States)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  4. Tapioca melanoma of the iris without iris heterochromia.

    Science.gov (United States)

    Bach, Austin; McGowan, Sara; Gold, Aaron S; Villegas, Victor M; Wildner, Andrea C; Ehlies, Fiona J; Thompson, Jordan M; Bermudez-Magner, Jose Antonio; Dubovy, Sander R; Murray, Timothy G

    2014-04-01

    A case of a teenage girl with tapioca melanoma of the iris is presented. This case is unusual, as the patient did not have heterochromia and did not present with elevated intraocular pressure. A 14-year-old female patient presented with an amelanotic, multinodular, multifocal lesion of the right iris. Pathology confirmed a diagnosis of tapioca melanoma using immunohistologic staining. The patient underwent enucleation of her right eye and has been free of metastatic disease 3 years later. Tapioca melanoma of the iris must be included among the other differential diagnoses when examining patients with amelanotic iris lesions, even when iris heterochromia is not clearly evident.

  5. Gaze as a biometric

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Hong-Jun [ORNL; Carmichael, Tandy [Tennessee Technological University; Tourassi, Georgia [ORNL

    2014-01-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing different still images with different spatial relationships. Specifically, we created 5 visual dot-pattern tests to be shown on a standard computer monitor. These tests challenged the viewer s capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  6. IRIS (Version 200)

    International Nuclear Information System (INIS)

    Pansart, J.P.

    1987-01-01

    IRIS is a Monte Carlo generator of nucleon-nucleus and nucleus-nucleus interactions at high energy (≥50 GeV per nucleon for the projectile on a fixed target). The physics basis of the generator is the exchange of colour. (orig./HSI)

  7. IRI topside correction

    CERN Document Server

    Bilitza, D

    2002-01-01

    The topside segment of the International Reference Ionosphere (IRI) electron density model (and also of the Bent model) is based on the limited amount of topside data available at the time (approx 40,000 Alouette 1 profiles). Being established from such a small database it is therefore not surprising that these models have well-known shortcomings, for example, at high solar activities. Meanwhile a large data base of close to 200,000 topside profiles from Alouette 1, 2, and ISIS 1, 2 has become available online. A program of automated scaling and inversion of a large volume of digitized ionograms adds continuously to this data pool. We have used the currently available ISIS/Alouette topside profiles to evaluate the IRI topside model and to investigate ways of improving the model. The IRI model performs generally well at middle latitudes and shows discrepancies at low and high latitudes and these discrepancies are largest during high solar activity. In the upper topside IRI consistently overestimates the measur...

  8. IRIS Simplified LERF Model

    International Nuclear Information System (INIS)

    Maioli, A.; Finnicum, D.J.; Kumagai, Y.

    2004-01-01

    Westinghouse is currently conducting the pre-application licensing of the International Reactor Innovative and Secure (IRIS). One of the key aspects of the IRIS design is its safety-by-designTM philosophy and within this framework the PRA is being used as an integral part of the design process. The most ambitious risk-related goal for IRIS is to reduce the Emergency Planning Zone (EPZ) to within the exclusion area by demonstrating that the off-site doses are consistent with the US Protective Action Guidelines (PAGs) for initiation of emergency response so that the required protective actions would be limited to the exclusion area. As a first step, a model has been developed to provide a first order approximation of the Large Early Release Frequency (LERF) as a surrogate predictor of the off-site doses. A key-aspect of the LERF model development is the characterization of the possible paths of release. Four main categories have been historically pointed out: (1) Core Damage (CD ) sequences with containment bypass, (2) CD sequences with containment isolation failure, (3) CD sequences with containment failure at low pressure and (4) CD sequences with containment failure at high pressure. They have been reevaluated to account for the IRIS design features

  9. Performance Evaluation of the IrisScan2200 Against Four Respirator Masks; TOPICAL

    International Nuclear Information System (INIS)

    WRIGHT, LARRY J.; TERRY, PRESTON L.

    2002-01-01

    The use of biometrics for the identification of individuals is becoming more prevalent in society and in the general government community. As the demand for these devices increases, it becomes necessary for the user community to have the facts needed to determine which device is the most appropriate for any given application. One such application is the use of biometric devices in areas where an individual may not be able to present a biometric feature that requires contact with the identifier (e.g., when dressed in anti-contamination suits or when wearing a respirator). This paper discusses a performance evaluation conducted on the IrisScan2200 from Iridian Technologies to determine if it could be used in such a role

  10. Human Iris Recognition System using Wavelet Transform and LVQ

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Kwan Yong; Lim, Shin Young [Electronics and Telecommunications Research Institute (Korea); Cho, Seong Won [Hongik University (Korea)

    2000-07-01

    The popular methods to check the identity of individuals include passwords and ID cards. These conventional methods for user identification and authentication are not altogether reliable because they can be stolen and forgotten. As an alternative of the existing methods, biometric technology has been paid much attention for the last few decades. In this paper, we propose an efficient system for recognizing the identity of a living person by analyzing iris patterns which have a high level of stability and distinctiveness than other biometric measurements. The proposed system is based on wavelet transform and a competitive neural network with the improved mechanisms. After preprocessing the iris data acquired through a CCD camera, feature vectors are extracted by using Haar wavelet transform. LVQ(Learning Vector Quantization) is exploited to classify these feature vectors. We improve the overall performance of the proposed system by optimizing the size of feature vectors and by introducing an efficient initialization of the weight vectors and a new method for determining the winner in order to increase the recognition accuracy of LVQ. From the experiments, we confirmed that the proposed system has a great potential of being applied to real applications in an efficient and effective way. (author). 14 refs., 13 figs., 7 tabs.

  11. Biometric Authorization and Registration Systems and Methods

    National Research Council Canada - National Science Library

    Caulfield, H

    2002-01-01

    Biometric authorization and registration systems and methods are disclosed. In one embodiment, the system preferably comprises a firearm that includes a biometric authorization system, a plurality of training computers, and a server...

  12. Iris pigmentation and AC thresholds.

    Science.gov (United States)

    Roche, A F; Mukherjee, D; Chumlea, W C; Siervogel, R M

    1983-03-01

    Data from 160 White children were used to analyze possible associations between iris pigmentation and AC pure-tone thresholds. Iris pigmentation was graded from iris color using glass models of eyes, and AC thresholds were obtained under carefully controlled conditions. Analyses of variance using two groupings of iris color grades showed no evidence of an association between iris color grade and AC thresholds. Furthermore, inspection of arrays of the actual glass eye models, in conjunction with the order of mean thresholds at each test frequency, did not indicate the presence of an association between iris color grades and thresholds. It was concluded that while iris pigmentation may be related to some aspects of hearing ability, it does not appear to be related to AC thresholds in children.

  13. Biometrics for electronic health records.

    Science.gov (United States)

    Flores Zuniga, Alejandro Enrique; Win, Khin Than; Susilo, Willy

    2010-10-01

    Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment.

  14. Optical coherence tomography quantitative analysis of iris volume changes after pharmacologic mydriasis.

    Science.gov (United States)

    Aptel, Florent; Denis, Philippe

    2010-01-01

    To describe a method using anterior segment optical coherence tomography (AS OCT) for estimating iris volume. To quantify changes in iris volume induced by pharmacologic mydriasis in narrow-angle eyes predisposed to angle-closure compared with normal open-angle eyes. Cross-sectional study. Thirty fellow eyes of 30 patients who had an episode of primary acute angle-closure and 30 eyes of 30 normal age- and gender-matched subjects with open angles. All fellow eyes had a patent laser peripheral iridotomy. Iris volume and all biometric measurements were performed before and after instillation of 1% tropicamide and at least 1 week later 10% phenylephrine. Iris volume was estimated using AS OCT radial sections of the iris and a customized image-processing software. Iris volume, pupil diameter, angle configuration including angle opening distance at 500 mum (AOD 500) and trabecular-iris space at 500 mum (TISA 500), AS OCT anterior chamber depth, and A-scan ultrasonography axial length before and after pupil dilation. Iris volumes measured before dilation of the pupil were 44.94+/-2.1 mm(3) and 44.29+/-3.9 mm(3) in the fellow eyes and open-angle eyes, respectively, which was not significantly different (P>0.1). Thirty minutes after instillation of 1% tropicamide, mean iris volume increased significantly in the fellow eyes (from 44.94+/-2.1 mm(3) to 49.92+/-2.9 mm(3); Piris volume after pupil dilation were eyes predisposed to angle-closure compared with open-angle eyes (P = 0.008), larger pupil diameter (P = 0.02), and brown eyes (P = 0.01). Relative iris volume increase was correlated significantly with AOD 500 and TISA 500 relative decrease in the narrow-angle group (Piris volume may be estimated with AS OCT. The iris volume increases after pupil dilation in narrow-angle eyes predisposed to acute angle closure. In those patients, this biometric change is associated with a narrowing of the angle despite a patent laser peripheral iridotomy. The author(s) have no proprietary

  15. Analysis of iris structure and iridocorneal angle parameters with anterior segment optical coherence tomography in Fuchs' uveitis syndrome.

    Science.gov (United States)

    Basarir, Berna; Altan, Cigdem; Pinarci, Eylem Yaman; Celik, Ugur; Satana, Banu; Demirok, Ahmet

    2013-06-01

    To evaluate the differences in the biometric parameters of iridocorneal angle and iris structure measured by anterior segment optical coherence tomography (AS-OCT) in Fuchs' uveitis syndrome (FUS). Seventy-six eyes of 38 consecutive patients with the diagnosis of unilateral FUS were recruited into this prospective, cross-sectional and comparative study. After a complete ocular examination, anterior segment biometric parameters were measured by Visante(®) AS-OCT. All parameters were compared between the two eyes of each patient statistically. The mean age of the 38 subjects was 32.5 ± 7.5 years (18 female and 20 male). The mean visual acuity was lower in eyes with FUS (0.55 ± 0.31) than in healthy eyes (0.93 ± 0.17). The central corneal thickness did not differ significantly between eyes. All iridocorneal angle parameters (angle-opening distance 500 and 750, scleral spur angle, trabecular-iris space (TISA) 500 and 750) except TISA 500 in temporal quadrant were significantly larger in eyes with FUS than in healthy eyes. Anterior chamber depth was deeper in the eyes with FUS than in the unaffected eyes. With regard to iris measurements, iris thickness in the thickest part, iris bowing and iris shape were all statistically different between the affected eye and the healthy eye in individual patients with FUS. However, no statistically significant differences were evident in iris thickness 500 μm, thickness in the middle and iris length. There were significant difference in iris shape between the two eyes of patients with glaucoma. AS-OCT as an imaging method provides us with many informative resultsin the analysis of anterior segment parameters in FUS.

  16. Design and Implementation of a Multi-Modal Biometric System for Company Access Control

    Directory of Open Access Journals (Sweden)

    Elisabetta Stefani

    2017-05-01

    Full Text Available This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions, possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.

  17. Biometric Score Calibration for Forensic Face Recognition

    NARCIS (Netherlands)

    Ali, Tauseef

    2014-01-01

    When two biometric specimens are compared using an automatic biometric recognition system, a similarity metric called “score‿ can be computed. In forensics, one of the biometric specimens is from an unknown source, for example, from a CCTV footage or a fingermark found at a crime scene and the other

  18. 3D biometrics systems and applications

    CERN Document Server

    Zhang, David

    2013-01-01

    Includes discussions on popular 3D imaging technologies, combines them with biometric applications, and then presents real 3D biometric systems Introduces many efficient 3D feature extraction, matching, and fusion algorithms Techniques presented have been supported by experimental results using various 3D biometric classifications

  19. Biometric Recognition: Overview and Applications | Iloanusi ...

    African Journals Online (AJOL)

    ... sufficiently effective in handling Internet crimes, frauds and security threats. Biometric person identification is preferred because biometric identifiers are unique to each person, permanent and hardly subject to change. These advantages make biometric recognition the preferred mode for most virtual and access control.

  20. Biometric verification of a subject through eye movements.

    Science.gov (United States)

    Juhola, Martti; Zhang, Youming; Rasku, Jyrki

    2013-01-01

    Matching digital fingerprint, face or iris images, biometric verification of persons has advanced. Notwithstanding the progress, this is no easy computational task because of great numbers of complicated data. Since the 1990s, eye movements previously only applied to various tests of medicine and psychology are also studied for the purpose of computer interfaces. Such a short one-dimensional measurement signal contains less data than images and may therefore be simpler and faster to recognize. Using saccadic eye movements we developed a computational verification method to reliably distinguish a legitimate person or a subject in general from others. We tested features extracted from signals recorded from saccade eye movements. We used saccades of 19 healthy subjects and 21 otoneurological patients recorded with electro-oculography and additional 40 healthy subjects recorded with a videocamera system. Verification tests produced high accuracies. Copyright © 2012 Elsevier Ltd. All rights reserved.

  1. An efficient iris segmentation approach

    Science.gov (United States)

    Gomai, Abdu; El-Zaart, A.; Mathkour, H.

    2011-10-01

    Iris recognition system became a reliable system for authentication and verification tasks. It consists of five stages: image acquisition, iris segmentation, iris normalization, feature encoding, and feature matching. Iris segmentation stage is one of the most important stages. It plays an essential role to locate the iris efficiently and accurately. In this paper, we present a new approach for iris segmentation using image processing technique. This approach is composed of four main parts. (1) Eliminating reflections of light on the eye image based on inverting the color of the grayscale image, filling holes in the intensity image, and inverting the color of the intensity image to get the original grayscale image without any reflections. (2) Pupil boundary detection based on dividing an eye image to nine sub-images and finding the minimum value of the mean intensity for each sub-image to get a suitable threshold value of pupil. (3) Enhancing the contrast of outer iris boundary using exponential operator to have sharp variation. (4) Outer iris boundary localization based on applying a gray threshold and morphological operations on the rectangular part of an eye image including the pupil and the outer boundaries of iris to find the small radius of outer iris boundary from the center of pupil. The proposed approach has been tested on CASIA v1.0 iris image database and other collected iris image database. The experimental results show that the approach is able to detect pupil and outer iris boundary with high accuracy results approximately 100% and reduce time consuming.

  2. Associations of iris structural measurements in a Chinese population: the Singapore Chinese Eye Study.

    Science.gov (United States)

    Sng, Chelvin C; Allen, John C; Nongpiur, Monisha E; Foo, Li-Lian; Zheng, Yingfeng; Cheung, Carol Y; He, Mingguang; Friedman, David S; Wong, Tien Y; Aung, Tin

    2013-04-23

    We determined the ocular biometric and demographic factors associated with iris parameters in Singaporean Chinese persons from a population-based sample. Subjects were participants in the Singapore Chinese Eye Study, a population-based cross-sectional study of eye disease. Anterior segment optical coherence tomography images were analyzed using customized software to measure iris thickness at 750 μm from the scleral spur (IT750), iris area (I-Area), and iris curvature (I-Curv). Regression analyses were performed to assess the association between iris measurements with a range of demographic and ocular variables. The contribution of each independent variable to the iris parameter of interest was determined sequentially using a stepwise selection algorithm. We included 1473 participants with a mean age of 57.7 + 8.68 years, and 50.6% were men. The mean IT750, I-Area, and I-Curv were 0.46 ± 0.10 mm, 1.49 ± 0.24 mm(2), and 0.25 ± 0.13 mm, respectively. Statistical regression models, including a range of demographic and ocular parameters, explained 59.3%, 41.9%, and 34.3% of the variability in I-Curv, IT750, and I-Area, respectively. Angle opening distance at 750 μm from the scleral spur (AOD750) was the single factor associated most strongly with I-Curv, and explained 46.6% of its variation. A significant proportion of the variation in iris area, curvature, and thickness was not explained by other ocular and demographic parameters. Iris curvature was associated strongly with angle width, and of all parameters investigated, AOD750 was most highly correlated with iris curvature.

  3. Iris reactor conceptual design

    Energy Technology Data Exchange (ETDEWEB)

    Carelli, M.D.; Conway, L.E.; Petrovic, B.; Paramonov, D.V. [Westinghouse Electric Comp., Pittsburgh, PA (United States); Galvin, M.; Todreas, N.E. [Massachusetts Inst. of Tech., Cambridge, MA (United States); Lombardi, C.V.; Maldari, F.; Ricotti, M.E. [Politecnico di Milano, Milan (Italy); Cinotti, L. [Ansaldo SpA, Genoa (Italy)

    2001-07-01

    IRIS (International Reactor Innovative and Secure) is a modular, integral, light water cooled, low-to-medium power (100-350 MWe) reactor which addresses the requirements defined by the US DOE for Generation IV reactors, i.e., proliferation resistance, enhanced safety, improved economics and fuel cycle sustainability. It relies on the proven technology of light water reactors and features innovative engineering, but it does not require new technology development. This paper discusses the current reference IRIS design, which features a 1000 MWt thermal core with proven 5%-enriched uranium oxide fuel and five-year long straight burn fuel cycle, integral reactor vessel housing helical tube steam generators and immersed spool pumps. Other major contributors to the high level of safety and economic attractiveness are the safety by design and optimized maintenance approaches, which allow elimination of some classes of accidents, lower capital cost, long operating cycle, and high capacity factors. (author)

  4. Ocular biometrics by score-level fusion of disparate experts.

    Science.gov (United States)

    Proença, Hugo

    2014-12-01

    The concept of periocular biometrics emerged to improve the robustness of iris recognition to degraded data. Being a relatively recent topic, most of the periocular recognition algorithms work in a holistic way and apply a feature encoding/matching strategy without considering each biological component in the periocular area. This not only augments the correlation between the components in the resulting biometric signature, but also increases the sensitivity to particular data covariates. The main novelty in this paper is to propose a periocular recognition ensemble made of two disparate components: 1) one expert analyses the iris texture and exhaustively exploits the multispectral information in visible-light data and 2) another expert parameterizes the shape of eyelids and defines a surrounding dimensionless region-of-interest, from where statistics of the eyelids, eyelashes, and skin wrinkles/furrows are encoded. Both experts work on disjoint regions of the periocular area and meet three important properties. First, they produce practically independent responses, which is behind the better performance of the ensemble when compared to the best individual recognizer. Second, they do not share particularly sensitivity to any image covariate, which accounts for augmenting the robustness against degraded data. Finally, it should be stressed that we disregard information in the periocular region that can be easily forged (e.g., shape of eyebrows), which constitutes an active anticounterfeit measure. An empirical evaluation was conducted on two public data sets (FRGC and UBIRIS.v2), and points for consistent improvements in performance of the proposed ensemble over the state-of-the-art periocular recognition algorithms.

  5. Biometric Features in Person Recognition Systems

    Directory of Open Access Journals (Sweden)

    Edgaras Ivanovas

    2011-03-01

    Full Text Available Lately a lot of research effort is devoted for recognition of a human being using his biometric characteristics. Biometric recognition systems are used in various applications, e. g., identification for state border crossing or firearm, which allows only enrolled persons to use it. In this paper biometric characteristics and their properties are reviewed. Development of high accuracy system requires distinctive and permanent characteristics, whereas development of user friendly system requires collectable and acceptable characteristics. It is showed that properties of biometric characteristics do not influence research effort significantly. Properties of biometric characteristic features and their influence are discussed.Article in Lithuanian

  6. A Review Of Multimodal Biometric Authentication Systems

    Directory of Open Access Journals (Sweden)

    Kunal Kumar

    2015-08-01

    Full Text Available Authentication is the process of validating the identity of a person based on certain input that the person provides. Authentication has become a major topic of research due to the increasing number of attacks on computer networks around the globe. This review paper focuses on multimodal biometric authentication systems in use today. The aim is to elicit the best combination of authentication factors for multimodal use. We study the strengths and weakness of selected biometric mechanisms and recommend novel solutions to include in multimodal biometric systems to improve on the current biometric drawbacks. We believe this paper will provide security researchers some useful insight whilst designing better biometric systems.

  7. Recommendation on the Use of Biometric Technology

    DEFF Research Database (Denmark)

    Juul, Niels Christian

    2013-01-01

    Biometric technology is based on the use of information linked to individuals. Hence, privacy and security in biometric applications becomes a concern and the need to assess such applications thoroughly becomes equally important. Guidelines for application of biometric technology must ensure...... a positive impact on both security and privacy. Based on two cases of biometric application, which have been assessed by the Danish Data Protecting Agency, this chapter present a set of recommendations to legislators, regulators, corporations and individuals on the appropriate use of biometric technologies...

  8. Longitudinal study of iris concavity, corneal biomechanics, and correlations to ocular biometry in a cohort of 10- to 12-year-old UK schoolboys: 2-year follow-up data.

    Science.gov (United States)

    Shah, Ameet; Lascaratos, Gerassimos; Garway-Heath, David F; Foster, Paul J; Barton, Keith

    2014-06-10

    To explore changes in iris curvature over a 2-year period. To investigate associations between iris curvature and ocular biometric parameters. To explore relationships between a number of nonocular measurements and ocular biometric parameters. Schoolboys enrolled 2 years previously were invited to return for anterior segment optical coherence tomography, corneal hysteresis (CH), corneal resistance factor (CRF), and axial biometric measurements. Refractive error was assessed and measures of height, weight, waist circumference, digit ratio, and percentage body fat taken. Mean spherical equivalent refraction reduced by 0.76 diopters and mean iris concavity, defined as a measurement of less than or equal to -0.1 mm, increased by 0.018 mm at distance fixation and 0.04 mm on accommodation. Compared with 2 years previously, the prevalence of iris concavity increased from 24% to 32% on distance fixation and from 65% to 84% on accommodation. Variables significantly associated with nonaccommodating iris curvature were anterior chamber depth (ACD, P = 0.029) and mean scleral spur angle (P = 0.0001). Variables significantly associated with accommodating iris curvature were ACD (P = 0.02), lens vault (P = 0.047), and scleral spur angle (P Iris concavity was more prevalent in this cohort of schoolboys than 2 years earlier. The degree of concavity remains related to ACD and lens vault. The association between spur-to-spur distance and CH was similar at baseline and after 2 years. Copyright 2014 The Association for Research in Vision and Ophthalmology, Inc.

  9. Secure authentication system that generates seed from biometric information.

    Science.gov (United States)

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.

  10. Integrated risk information system (IRIS)

    Energy Technology Data Exchange (ETDEWEB)

    Tuxen, L. [Environmental Protection Agency, Washington, DC (United States)

    1990-12-31

    The Integrated Risk Information System (IRIS) is an electronic information system developed by the US Environmental Protection Agency (EPA) containing information related to health risk assessment. IRIS is the Agency`s primary vehicle for communication of chronic health hazard information that represents Agency consensus following comprehensive review by intra-Agency work groups. The original purpose for developing IRIS was to provide guidance to EPA personnel in making risk management decisions. This original purpose for developing IRIS was to guidance to EPA personnel in making risk management decisions. This role has expanded and evolved with wider access and use of the system. IRIS contains chemical-specific information in summary format for approximately 500 chemicals. IRIS is available to the general public on the National Library of Medicine`s Toxicology Data Network (TOXNET) and on diskettes through the National Technical Information Service (NTIS).

  11. IRIS-economics review

    International Nuclear Information System (INIS)

    Miller, K.

    2005-01-01

    IRIS is a medium sized advanced light water cooled modular reactor being developed by an international Group led by Westinghouse/BNFL. This reactor design is aimed at a broad spectrum of Utilities looking to install nuclear capacity to match market demands, or at emerging Nations with specific financial constraints looking to strategically optimise their debit levels. The IRIS building block is a multiple module sized at 335 MWe, with a construction period of 3 years and a 60-year plant life. Modules can be installed individually or in parks. In the latter case, deployment can be in single modules or in pairs (twin-unit); both will be built in staggered fashion at time intervals as dictated by economic and market considerations. One of the unique features of IRIS is its ability to offer reduction in costs through increased experience 'Learning' at a single site: In construction, the principal benefit is derived for subsequent modules, and is dependent on maintaining the 'core' team throughout. This is particularly important if there is any significant period between the completion of say module 1 and the start of module 2. This time frame will be driven by the overall market size, projected growth in demand and the level of financial risk the utility is prepared to accept. Learning benefits in construction are derived from skills and experience retention impacting on reducing the number of inputs and construction time. Learning in operation may benefit from a certain delay between modules as this allows operators to build up their 'cumulative experience'. Reactor operations on day 1 would be significantly different from those of say 3 years later. These benefits would be passed on to modules 2 and 3, which would realise them from day 1. Learning in operation is dependent on the ability to retain within the organisation knowledge and records of key events. The benefits from Learning in operation may also be applicable to different sites, in different countries. It

  12. Compact dynamic microfluidic iris array

    Science.gov (United States)

    Kimmle, Christina; Doering, Christoph; Steuer, Anna; Fouckhardt, Henning

    2011-09-01

    A dynamic microfluidic iris is realized. Light attenuation is achieved by absorption of an opaque liquid (e.g. black ink). The adjustment of the iris diameter is achieved by fluid displacement via a transparent elastomer (silicone) half-sphere. This silicone calotte is hydraulically pressed against a polymethylmethacrylate (PMMA) substrate as the bottom window, such that the opaque liquid is squeezed away, this way opening the iris. With this approach a dynamic range of more than 60 dB can be achieved with response times in the ms to s regime. The design allows the realization of a single iris as well as an iris array. So far the master for the molded silicone structure was fabricated by precision mechanics. The aperture diameter was changed continuously from 0 to 8 mm for a single iris and 0 to 4 mm in case of a 3 x 3 iris array. Moreover, an iris array was combined with a PMMA lens array into a compact module, the distance of both arrays equaling the focal length of the lenses. This way e.g. spatial frequency filter arrays can be realized. The possibility to extend the iris array concept to an array with many elements is demonstrated. Such arrays could be applied e.g. in light-field cameras.

  13. Modelling of Biometric Identification System with Given Parameters Using Colored Petri Nets

    Science.gov (United States)

    Petrosyan, G.; Ter-Vardanyan, L.; Gaboutchian, A.

    2017-05-01

    Biometric identification systems use given parameters and function on the basis of Colored Petri Nets as a modelling language developed for systems in which communication, synchronization and distributed resources play an important role. Colored Petri Nets combine the strengths of Classical Petri Nets with the power of a high-level programming language. Coloured Petri Nets have both, formal intuitive and graphical presentations. Graphical CPN model consists of a set of interacting modules which include a network of places, transitions and arcs. Mathematical representation has a well-defined syntax and semantics, as well as defines system behavioural properties. One of the best known features used in biometric is the human finger print pattern. During the last decade other human features have become of interest, such as iris-based or face recognition. The objective of this paper is to introduce the fundamental concepts of Petri Nets in relation to tooth shape analysis. Biometric identification systems functioning has two phases: data enrollment phase and identification phase. During the data enrollment phase images of teeth are added to database. This record contains enrollment data as a noisy version of the biometrical data corresponding to the individual. During the identification phase an unknown individual is observed again and is compared to the enrollment data in the database and then system estimates the individual. The purpose of modeling biometric identification system by means of Petri Nets is to reveal the following aspects of the functioning model: the efficiency of the model, behavior of the model, mistakes and accidents in the model, feasibility of the model simplification or substitution of its separate components for more effective components without interfering system functioning. The results of biometric identification system modeling and evaluating are presented and discussed.

  14. Comparative review of studies on aging effects in context of biometric authentication

    Science.gov (United States)

    Scheidat, Tobias; Heinze, Juliane; Vielhauer, Claus; Dittmann, Jana; Kraetzer, Christian

    2011-02-01

    The performance of a biometric system from the point of view of authentication, enrollment and usability depends not only on the algorithms, hardware and software used, but also on aging effects of the human body. Thus, the examination of the influence of ageing depended physiological and mental variances of potential user groups is an important part of biometric research. In this paper a survey of studies is presented which examining effects of biological aging on enrollment and authentication performance as well as usability of biometric systems based on modalities fingerprint, face and iris. In order to compare the findings of the studies and overcome the problem, that nearly every one of these studies uses its own database with varying number of users and different sensors, measurements and/or aging levels, we developed a novel graphical representation of the results. It provides an overview of changes appearing with increasing age and possible influences on performance or usability. The outcomes of a high number of evaluations are compared for each of the three biometric modalities in context of aging and finally concluded in the novel graphical representation.

  15. The Economics of IRIS

    International Nuclear Information System (INIS)

    Miller, K.; Paramonov, D.

    2002-01-01

    IRIS (International Reactor Innovative and Secure) is a small to medium advanced light water cooled modular reactor being developed by an international consortium led by Westinghouse/BNFL. This reactor design is specifically aimed at utilities looking to install new (or replacement) nuclear capacity to match market demands, or at developing countries for their distributed power needs. To determine the optimal configuration for IRIS, analysis was undertaken to establish Generation Costs ($/MWh) and Internal Rate of Return (IRR %) to the Utility at alternative power ratings. This was then combined with global market projections for electricity demand out to 2030, segmented into key geographical regions. Finally this information is brought together to form insights, conclusions and recommendations regarding the optimal design. The resultant analysis reveals a single module sized at 335 MWe, with a construction period of 3 years and a 60-year plant life. Individual modules can be installed in a staggered fashion (3 equivalent to 1005 MWe) or built in pairs (2 sets of twin units' equivalent to 1340 MWe). Uncertainty in Market Clearing Price for electricity, Annual Operating Costs and Construction Costs primarily influence lifetime Net Present Values (NPV) and hence IRR % for Utilities. Generation Costs in addition are also influenced by Fuel Costs, Plant Output, Plant Availability and Plant Capacity Factor. Therefore for a site based on 3 single modules, located in North America, Generations Costs of 28.5 $/MWh are required to achieve an IRR of 20%, a level which enables IRIS to compete with all other forms of electricity production. Plant size is critical to commercial success. Sustained (lifetime) high factors for Plant Output, Availability and Capacity Factor are required to achieve a competitive advantage. Modularity offers Utilities the option to match their investments with market conditions, adding additional capacity as and when the circumstances are right

  16. Disk space and load time requirements for eye movement biometric databases

    Science.gov (United States)

    Kasprowski, Pawel; Harezlak, Katarzyna

    2016-06-01

    Biometric identification is a very popular area of interest nowadays. Problems with the so-called physiological methods like fingerprints or iris recognition resulted in increased attention paid to methods measuring behavioral patterns. Eye movement based biometric (EMB) identification is one of the interesting behavioral methods and due to the intensive development of eye tracking devices it has become possible to define new methods for the eye movement signal processing. Such method should be supported by an efficient storage used to collect eye movement data and provide it for further analysis. The aim of the research was to check various setups enabling such a storage choice. There were various aspects taken into consideration, like disk space usage, time required for loading and saving whole data set or its chosen parts.

  17. Eye Safety Related to Near Infrared Radiation Exposure to Biometric Devices

    Directory of Open Access Journals (Sweden)

    Nikolaos Kourkoumelis

    2011-01-01

    Full Text Available Biometrics has become an emerging field of technology due to its intrinsic security features concerning the identification of individuals by means of measurable biological characteristics. Two of the most promising biometric modalities are iris and retina recognition, which primarily use nonionizing radiation in the infrared region. Illumination of the eye is achieved by infrared light emitting diodes (LEDs. Even if few LED sources are capable of causing direct eye damage as they emit incoherent light, there is a growing concern about the possible use of LED arrays that might pose a potential threat. Exposure to intense coherent infrared radiation has been proven to have significant effects on living tissues. The purpose of this study is to explore the biological effects arising from exposing the eye to near infrared radiation with reference to international legislation.

  18. Zeroing Biometrics: Collecting Biometrics Before the Shooting Starts

    Science.gov (United States)

    2012-04-01

    vulnerabilities is the best way to ensure success. Biometrics is a tool recently added that has attained a great degree of success in identifying insurgents... Practise (New York: Lyle Stuart, 1965), 19. 2 U.S. Joint Chiefs of Staff , Counterinsurgency Operations, Joint Publication 3-24 (Washington, D.C.: U.S...473. 8 Marighella argues the motivation for insurgency is the desire for political change and this change is in the best interest of the people

  19. Iris concavity, corneal biomechanics, and their correlations with ocular biometry in a cohort of 10- to 12-year-old UK school boys: baseline data.

    Science.gov (United States)

    Shah, Ameet; Low, Sancy; Garway-Heath, David F; Foster, Paul J; Barton, Keith

    2014-04-17

    Pigment dispersion syndrome is associated with iris concavity. This study investigated the prevalence of iris concavity, defined as a measurement of ≤-0.1 mm, in a cohort of 10- to 12-year-old boys, and explored the relationship between iris curvature and anterior segment biometry. Associations with corneal biomechanical parameters also were explored. A cohort of school boys (n = 96) was recruited from a local school. Anterior segment optical coherence tomography (AS-OCT) was performed under accommodative and nonaccommodative conditions, and iris curvature quantified. Corneal hysteresis (CH) and corneal resistance factor (CRF) were measured with the ocular response analyzer (ORA). Noncontact axial biometry was performed using laser interferometry. The prevalence of iris concavity was 24% on distance fixation, increasing to 65% on accommodation. Variables significantly associated with nonaccommodating iris curvature were lens vault (P = 0.02) and mean keratometry (P = 0.02). For both variables acting jointly, R(2) = 0.30. Variables associated significantly with accommodating iris curvature were anterior chamber depth (P = 0.009), lens vault (P = 0.049), and mean scleral spur angle (P Iris concavity was a common finding in this cohort and related to anterior segment biometric parameters. Further work is required to clarify whether anatomical differences exist between iris concavity seen in the adolescent eye and that found in adults with pigment dispersion syndrome. Copyright 2014 The Association for Research in Vision and Ophthalmology, Inc.

  20. Hand-Based Biometric Analysis

    Science.gov (United States)

    Bebis, George (Inventor); Amayeh, Gholamreza (Inventor)

    2015-01-01

    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  1. A concatenated coding scheme for biometric template protection

    NARCIS (Netherlands)

    Shao, X.; Xu, H.; Veldhuis, Raymond N.J.; Slump, Cornelis H.

    2012-01-01

    Cryptography may mitigate the privacy problem in biometric recognition systems. However, cryptography technologies lack error-tolerance and biometric samples cannot be reproduced exactly, rising the robustness problem. The biometric template protection system needs a good feature extraction

  2. Presentation attack detection in voice biometrics

    OpenAIRE

    Korshunov, Pavel; Marcel, Sébastien; Vielhauer, Claus

    2017-01-01

    Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, however, exposed their major flaw --- high vulnerability to spoofing attacks. A fingerprint sensor can be ...

  3. Mobile biometric device (MBD) technology :

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, Chris D.

    2013-06-01

    Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

  4. Can we recognize horses by their ocular biometric traits using deep convolutional neural networks?

    Science.gov (United States)

    Trokielewicz, Mateusz; Szadkowski, Mateusz

    2017-08-01

    This paper aims at determining the viability of horse recognition by the means of ocular biometrics and deep convolutional neural networks (deep CNNs). Fast and accurate identification of race horses before racing is crucial for ensuring that exactly the horses that were declared are participating, using methods that are non-invasive and friendly to these delicate animals. As typical iris recognition methods require lot of fine-tuning of the method parameters and high-quality data, CNNs seem like a natural candidate to be applied for recognition thanks to their potentially excellent abilities in describing texture, combined with ease of implementation in an end-to-end manner. Also, with such approach we can easily utilize both iris and periocular features without constructing complicated algorithms for each. We thus present a simple CNN classifier, able to correctly identify almost 80% of the samples in an identification scenario, and give equal error rate (EER) of less than 10% in a verification scenario.

  5. Emerging Biometric Modalities: Challenges and Opportunities

    Science.gov (United States)

    Gafurov, Davrondzhon

    Recent advances in sensor technology and wide spread use of various electronics (computers, PDA, mobile phones etc.) provide new opportunities for capturing and analyses of novel physiological and behavioural traits of human beings for biometric authentication. This paper presents an overview of several such types of human characteristics that have been proposed as alternatives to traditional types of biometrics. We refer to these characteristics as emerging biometrics. We survey various types of emerging modalities and techniques, and discuss their pros and cons. Emerging biometrics faces several limitations and challenges which include subject population coverage (focusing mostly on adults); unavailability of benchmark databases; little research with respect to vulnerability/robustness against attacks; and some privacy concerns they may arise. In addition, recognition performance of emerging modalities are generally less accurate compared to the traditional biometrics. Despite all of these emerging biometrics posses their own benefits and advantages compared to traditional biometrics which makes them still attractive for research. First of all, emerging biometrics can always serve as a complementary source for identity information; they can be suitable in applications where traditional biometrics are difficult or impossible to adapt such as continuous or periodic re-verification of the user's identity etc.

  6. Encryption Technology based on Human Biometrics

    Directory of Open Access Journals (Sweden)

    Wei Yang

    2017-08-01

    Full Text Available The research progress of encryption technologies based on human biometrics is reviewed in this paper.The technologies that utilize human biometrics to make information encryption and identity authentication,and the technologies which combine biometrics encryption with optical encryption methods are introduced in detail.The advantages and disadvantages of these encryption systems are discussed,and the obstacles in practical applications are pointed out.Finally,the prospect of the new encryption technologies that are based on human biometrics are predicted.

  7. 77 FR 31869 - Iris Lacustris (Dwarf Lake Iris); Draft Recovery Plan for Review and Comment

    Science.gov (United States)

    2012-05-30

    ...-FF03E00000] Iris Lacustris (Dwarf Lake Iris); Draft Recovery Plan for Review and Comment AGENCY: Fish and... lacustris (dwarf lake iris), a species that is federally listed as threatened under the Endangered Species... the course of implementing approved recovery plans. Dwarf Lake Iris The dwarf lake iris was listed as...

  8. Biometric Collection, Transmission and Storage Standards. Version 1.1

    National Research Council Canada - National Science Library

    2006-01-01

    This document provides a comprehensive technical reference that lists published biometric standards and describes their applicability to the biometric functions described in the Capstone Concept of Operations (CONOPS...

  9. Iris recognition via plenoptic imaging

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J.; Boehnen, Chris Bensing; Bolme, David S.

    2017-11-07

    Iris recognition can be accomplished for a wide variety of eye images by using plenoptic imaging. Using plenoptic technology, it is possible to correct focus after image acquisition. One example technology reconstructs images having different focus depths and stitches them together, resulting in a fully focused image, even in an off-angle gaze scenario. Another example technology determines three-dimensional data for an eye and incorporates it into an eye model used for iris recognition processing. Another example technology detects contact lenses. Application of the technologies can result in improved iris recognition under a wide variety of scenarios.

  10. Shape adaptive, robust iris feature extraction from noisy iris images.

    Science.gov (United States)

    Ghodrati, Hamed; Dehghani, Mohammad Javad; Danyali, Habibolah

    2013-10-01

    In the current iris recognition systems, noise removing step is only used to detect noisy parts of the iris region and features extracted from there will be excluded in matching step. Whereas depending on the filter structure used in feature extraction, the noisy parts may influence relevant features. To the best of our knowledge, the effect of noise factors on feature extraction has not been considered in the previous works. This paper investigates the effect of shape adaptive wavelet transform and shape adaptive Gabor-wavelet for feature extraction on the iris recognition performance. In addition, an effective noise-removing approach is proposed in this paper. The contribution is to detect eyelashes and reflections by calculating appropriate thresholds by a procedure called statistical decision making. The eyelids are segmented by parabolic Hough transform in normalized iris image to decrease computational burden through omitting rotation term. The iris is localized by an accurate and fast algorithm based on coarse-to-fine strategy. The principle of mask code generation is to assign the noisy bits in an iris code in order to exclude them in matching step is presented in details. An experimental result shows that by using the shape adaptive Gabor-wavelet technique there is an improvement on the accuracy of recognition rate.

  11. Dual watermarking technique with multiple biometric watermarks

    Indian Academy of Sciences (India)

    We have proposed dual watermarking scheme with multiple biometric watermarks in which it embeds speech and face biometric traits of owner invisibly and lastly offline signature is overlaid translucently on image. Before embedding, speech is compressed using Linear Predictive Coding (LPC) and Gabor face is created ...

  12. Semiparametric Copula Models for Biometric Score Level

    NARCIS (Netherlands)

    Caselli, M.

    2016-01-01

    In biometric recognition systems, biometric samples (images of faces, finger- prints, voices, gaits, etc.) of people are compared and classifiers (matchers) indicate the level of similarity between any pair of samples by a score. If two samples of the same person are compared, a genuine score is

  13. Controlling Leakage of Biometric Information using Dithering

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Buhan, I.R.; Doumen, J.M.; Hartel, P.H.

    Fuzzy extractors allow cryptographic keys to be generated from noisy, non-uniform biometric data. Fuzzy extractors can be used to authenticate a user to a server without storing her biometric data directly. However, in the Information Theoretic sense fuzzy extractors will leak information about the

  14. Dual watermarking technique with multiple biometric watermarks

    Indian Academy of Sciences (India)

    right protection and authentication validation, Digital Rights Management (DRM) is gaining importance. DRM refers to a range of access ... channel might not be aware that the biometric host is invisibly hidden. 1.1b Biometric watermarking: The ... affect the visual quality of the original art. On the contrary, removable visible ...

  15. Academy Distance Learning Tools (IRIS) -

    Data.gov (United States)

    Department of Transportation — IRIS is a suite of front-end web applications utilizing a centralized back-end Oracle database. The system fully supports the FAA Academy's Distance Learning Program...

  16. Integrated Risk Information System (IRIS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — EPA?s Integrated Risk Information System (IRIS) is a compilation of electronic reports on specific substances found in the environment and their potential to cause...

  17. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Directory of Open Access Journals (Sweden)

    Ralf Steinmetz

    2004-04-01

    Full Text Available In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation, the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  18. Mobile networks for biometric data analysis

    CERN Document Server

    Madrid, Natividad; Seepold, Ralf; Orcioni, Simone

    2016-01-01

    This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health care, biometric data in automotive and home applications, embedded systems for biometric data analysis, biometric data analysis: EMG and ECG, and ICT for gait analysis. The background to the book is the challenge posed by the prevention and treatment of common, widespread chronic diseases in modern, aging societies. Capture of biometric data is a cornerstone for any analysis and treatment strategy. The latest advances in sensor technology allow accurate data measurement in a non-intrusive way, and in many cases it is necessary to provide online monitoring and real-time data capturing to support a patient’s prevention pl...

  19. Biometric and intelligent decision making support

    CERN Document Server

    Kaklauskas, Arturas

    2015-01-01

    This book presents different methods for analyzing the body language (movement, position, use of personal space, silences, pauses and tone, the eyes, pupil dilation or constriction, smiles, body temperature and the like) for better understanding people’s needs and actions, including biometric data gathering and reading. Different studies described in this book indicate that sufficiently much data, information and knowledge can be gained by utilizing biometric technologies. This is the first, wide-ranging book that is devoted completely to the area of intelligent decision support systems, biometrics technologies and their integrations. This book is designated for scholars, practitioners and doctoral and master’s degree students in various areas and those who are interested in the latest biometric and intelligent decision making support problems and means for their resolutions, biometric and intelligent decision making support systems and the theory and practice of their integration and the opportunities fo...

  20. ANTIMICROBIAL ACTIVITY OF EXTRACTS OF IRIS HUNGARICA AND IRIS SIBIRICA

    Directory of Open Access Journals (Sweden)

    Kovalev V. M.

    2017-06-01

    Full Text Available Introduction. Referring to the latest data, infectious diseases command a large part of among the total number of pathologies in the world and are an important problem in medicine. The leading role in prevention and treatment of diseases of microbial origin belongs to antibacterial chemotherapeutic agents. Advantages of antibiotics of synthetic origin are the high activity compared to phytogenic drugs. But it is known that microorganisms can release the resistance to synthetic antibiotics, so the use of drugs based on the plant materials is appropriate: phytogenic drugs more rarely induce the formation of resistance of the strains of microorganisms, they have a gentle action, can be used for a long-term, have the low cost. Therefore, it is appropriate to examine the drug plants with the aim of determination their antibacterial activity.Iris hungarica Waldst et Kit. and Iris sibirica L. are the representatives of the family Iridaceae, genus Iris and they have a wide spectrum of the pharmacological activity. Biologically active substances that were recovered from plants of the genus Iris (tectoridin, iristectorigenin B, nigracin, kaempferol, quercetin, etc. exhibited an antitumor, antimicrobial, estrogenic, insecticidal, antiplasmatic, anticholinesterase action, they were the inhibitors of enzymes and exhibited the immunomodulatory properties, which made these plants perspective for the research study. Raw materials Irises are constituent components of more than 9 medicines. Materials and Methods. The objects of the study were the leaves and rhizomes of Iris hungarica and Iris sibirica that were prepared during the growing season in 2014 in the M.M. Gryshko National botanical garden (Kiev, Ukraine. The dry and lipophilic extracts from the leaves and rhizomes of Irises were used to establish the antimicrobial activity. For the study of extracts antimicrobial activity was used agar well diffusion method. According to the WHO recommendations the

  1. Bridging the gap: from biometrics to forensics.

    Science.gov (United States)

    Jain, Anil K; Ross, Arun

    2015-08-05

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  2. Realization of a universal patient identifier for electronic medical records through biometric technology.

    Science.gov (United States)

    Leonard, D C; Pons, Alexander P; Asfour, Shihab S

    2009-07-01

    The technology exists for the migration of healthcare data from its archaic paper-based system to an electronic one, and, once in digital form, to be transported anywhere in the world in a matter of seconds. The advent of universally accessible healthcare data has benefited all participants, but one of the outstanding problems that must be addressed is how the creation of a standardized nationwide electronic healthcare record system in the United States would uniquely identify and match a composite of an individual's recorded healthcare information to an identified individual patients out of approximately 300 million people to a 1:1 match. To date, a few solutions to this problem have been proposed that are limited in their effectiveness. We propose the use of biometric technology within our fingerprint, iris, retina scan, and DNA (FIRD) framework, which is a multiphase system whose primary phase is a multilayer consisting of these four types of biometric identifiers: 1) fingerprint; 2) iris; 3) retina scan; and 4) DNA. In addition, it also consists of additional phases of integration, consolidation, and data discrepancy functions to solve the unique association of a patient to their medical data distinctively. This would allow a patient to have real-time access to all of their recorded healthcare information electronically whenever it is necessary, securely with minimal effort, greater effectiveness, and ease.

  3. Biometric and structural ocular manifestations of Marfan syndrome

    Science.gov (United States)

    Gehle, Petra; Goergen, Barbara; Pilger, Daniel; Ruokonen, Peter; Robinson, Peter N.

    2017-01-01

    Background To study biometric and structural ocular manifestations of Marfan syndrome (MFS). Methods Observational, retrospective, comparative cohort study in a tertiary referral center on 285 MFS patients and 267 controls. Structural and biometric ocular characteristic were compared. Results MFS eyes were longer (axial length 24.25 ± 1.74 mm versus 23.89 ± 1.31 mm, p < 0.001) and had a flatter cornea than control eyes (mean keratometry 41.78 ± 1.80 diopters (D) versus 43.05 ± 1.51 D, p < 0.001). Corneal astigmatism was greater and the central cornea was thinner in MFS eyes (530.14 ± 41.31 μm versus 547.02 ± 39.18 μm, p < 0.001). MFS eyes were more myopic than control eyes (spherical equivalent -2.16 ± 3.75 D versus -1.17 ± 2.58 D, p < 0.001). Visual acuity was reduced (0.13 ± 0.25 logMAR versus 0.05 ± 0.18 logMAR, p < 0.001) and intraocular pressure was lower in MFS eyes (14.6 ± 3.4 mmHg versus 15.1 ± 3.2 mmHg, p = 0.01). Iris transillumination defects (ITD) were significantly more common in MFS eyes (odds ratio for MFS in the presence of ITD, 3.7). Ectopia lentis (EL) was only present in MFS eyes (33.4%). History of retinal detachment was significantly more common in MFS eyes. Glaucoma was equally common in both groups. Conclusions ITD and EL are most characteristic findings in MFS. ITD and corneal curvature should be studied as diagnostic criteria for MFS. Visual acuity is reduced in MFS. MFS patients need regular eye exams to identify serious ocular complications. PMID:28931008

  4. Biometric and structural ocular manifestations of Marfan syndrome.

    Directory of Open Access Journals (Sweden)

    Petra Gehle

    Full Text Available To study biometric and structural ocular manifestations of Marfan syndrome (MFS.Observational, retrospective, comparative cohort study in a tertiary referral center on 285 MFS patients and 267 controls. Structural and biometric ocular characteristic were compared.MFS eyes were longer (axial length 24.25 ± 1.74 mm versus 23.89 ± 1.31 mm, p < 0.001 and had a flatter cornea than control eyes (mean keratometry 41.78 ± 1.80 diopters (D versus 43.05 ± 1.51 D, p < 0.001. Corneal astigmatism was greater and the central cornea was thinner in MFS eyes (530.14 ± 41.31 μm versus 547.02 ± 39.18 μm, p < 0.001. MFS eyes were more myopic than control eyes (spherical equivalent -2.16 ± 3.75 D versus -1.17 ± 2.58 D, p < 0.001. Visual acuity was reduced (0.13 ± 0.25 logMAR versus 0.05 ± 0.18 logMAR, p < 0.001 and intraocular pressure was lower in MFS eyes (14.6 ± 3.4 mmHg versus 15.1 ± 3.2 mmHg, p = 0.01. Iris transillumination defects (ITD were significantly more common in MFS eyes (odds ratio for MFS in the presence of ITD, 3.7. Ectopia lentis (EL was only present in MFS eyes (33.4%. History of retinal detachment was significantly more common in MFS eyes. Glaucoma was equally common in both groups.ITD and EL are most characteristic findings in MFS. ITD and corneal curvature should be studied as diagnostic criteria for MFS. Visual acuity is reduced in MFS. MFS patients need regular eye exams to identify serious ocular complications.

  5. Biometric features and privacy : condemned, based upon your finger print

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Veldhuis, Raymond N.J.

    What information is available in biometric features besides that needed for the biometric recognition process? What if a biometric feature contains Personally Identifiable Information? Will the whole biometric system become a threat to privacy? This paper is an attempt to quantifiy the link between

  6. Iris color and visual functions.

    Science.gov (United States)

    Nischler, Christian; Michael, Ralph; Wintersteller, Christine; Marvan, Patrick; van Rijn, Laurentius J; Coppens, Joris E; van den Berg, Thomas J T P; Emesz, Martin; Grabner, Günther

    2013-01-01

    The aim of this study was to evaluate if iris color is associated with differences in visual functions such as intraocular straylight (IOSL), contrast sensitivity (CS), or best-corrected visual acuity (BCVA). In this retrospective cohort study, which is a subgroup analysis of a large prospective trial about visual impairments in European car drivers, we included 853 persons between 20 and 80 years of age and without a history of ocular surgery or any eye disease including cataract. Subjects participated in an ophthalmological examination, grading of lens opacity, and the measurement of visual functions such as IOSL, CS, and BCVA. Dependent on iris color, participants were divided into four groups: light-blue, blue-grey, green-hazel, and brown. Independent of age, IOSL was significantly (all p values colored iris (1.14 log(IOSL) [95 % CI: 1.11-1.17]) compared to participants with blue-grey (1.07 log(IOSL) [95 % CI: 1.05-1.09]), green-hazel (1.06 log(IOSL) [95 % CI: 1.04-1.08]) or brown (1.06 log(IOSL) [95 % CI: 1.04-1.08]) iris color. CS was also lower in participants with light-blue pigmented irises (1.60 log(CS) [95 % CI: 1.58-1.62]) than in the other groups, but statistically significant (p = 0.013, Fisher's LSD test) only compared to brown iris color. For BCVA we could not found any difference between the four groups. We could show in this study that iris color has a significant impact on IOSL and to a lower degree on CS, but not on BCVA. Persons with light-blue iris color who showed significantly higher IOSL values therefore may experience disability glare in daily situations such as driving at night more often than others.

  7. Soft Biometrics; Human Identification Using Comparative Descriptions.

    Science.gov (United States)

    Reid, Daniel A; Nixon, Mark S; Stevenage, Sarah V

    2014-06-01

    Soft biometrics are a new form of biometric identification which use physical or behavioral traits that can be naturally described by humans. Unlike other biometric approaches, this allows identification based solely on verbal descriptions, bridging the semantic gap between biometrics and human description. To permit soft biometric identification the description must be accurate, yet conventional human descriptions comprising of absolute labels and estimations are often unreliable. A novel method of obtaining human descriptions will be introduced which utilizes comparative categorical labels to describe differences between subjects. This innovative approach has been shown to address many problems associated with absolute categorical labels-most critically, the descriptions contain more objective information and have increased discriminatory capabilities. Relative measurements of the subjects' traits can be inferred from comparative human descriptions using the Elo rating system. The resulting soft biometric signatures have been demonstrated to be robust and allow accurate recognition of subjects. Relative measurements can also be obtained from other forms of human representation. This is demonstrated using a support vector machine to determine relative measurements from gait biometric signatures-allowing retrieval of subjects from video footage by using human comparisons, bridging the semantic gap.

  8. Using Biometric Characteristics to Increase ITS Security

    Directory of Open Access Journals (Sweden)

    Miroslav Bača

    2007-11-01

    Full Text Available Terrorist attacks in New York City and Washington, Districtof Columbia on the morning of September 11, 2001 havechanged our lives. The secwity problem became very importantregarding all spheres of human activities. Tracking persons(employees, customers etc. in ITS (Intelligent Transport Systemis a huge problem. Biometrics offers a very good solutionfor this problem and is today maybe one of the most promisingtechniques for person's secure verification and authentication;biometric system also features some advantages when comparedto other security systems. When using a biometric systemone has to be careful because the functionality of a biometricapplication can be dramatically aggravated if inappropriatebiometric features are selected. Classification of biometric featureson contact and contactless, or distinction between"strong" and "soft" biometric features gives a framework for usingbiometric features, but it does not ensure that biometric featŁtres are implemented at a satisfactory level. The usage ofmultimodal or unimodal biometric system can significantly increasethe system security but it also opens plenty of questionslike privacy etc. This paper describes the implementation ofbiometric features which can be used in ITS, and delineates anew model of usage.

  9. Joint Feature Extraction and Classifier Design for ECG-Based Biometric Recognition.

    Science.gov (United States)

    Gutta, Sandeep; Cheng, Qi

    2016-03-01

    Traditional biometric recognition systems often utilize physiological traits such as fingerprint, face, iris, etc. Recent years have seen a growing interest in electrocardiogram (ECG)-based biometric recognition techniques, especially in the field of clinical medicine. In existing ECG-based biometric recognition methods, feature extraction and classifier design are usually performed separately. In this paper, a multitask learning approach is proposed, in which feature extraction and classifier design are carried out simultaneously. Weights are assigned to the features within the kernel of each task. We decompose the matrix consisting of all the feature weights into sparse and low-rank components. The sparse component determines the features that are relevant to identify each individual, and the low-rank component determines the common feature subspace that is relevant to identify all the subjects. A fast optimization algorithm is developed, which requires only the first-order information. The performance of the proposed approach is demonstrated through experiments using the MIT-BIH Normal Sinus Rhythm database.

  10. Soft biometrics using clothing attributes for human identification

    OpenAIRE

    Jaha, Emad Sami

    2016-01-01

    Recently, soft biometrics has emerged as a novel attribute-based person description for identification. It is likely that soft biometrics can be deployed where other biometrics cannot, and have stronger invariance properties than traditional vision-based biometrics, such as invariance to illumination and contrast. Previously, a variety of soft body and face biometrics have been used for identifying people and have increasingly garnered more research interest and are often considered as major ...

  11. Biometric analysis of pigment dispersion syndrome using anterior segment optical coherence tomography.

    Science.gov (United States)

    Aptel, Florent; Beccat, Sylvain; Fortoul, Vincent; Denis, Philippe

    2011-08-01

    To compare anterior chamber volume (ACV), iris volume, and iridolenticular contact (ILC) area before and after laser peripheral iridotomy (LPI) in eyes with pigment dispersion syndrome (PDS) using anterior segment optical coherence tomography (AS OCT) and image processing software. Cross-sectional study. Eighteen eyes of 18 patients with PDS; 30 eyes of 30 controls matched for age, gender, and refraction. Anterior segment OCT imaging was performed in all eyes before LPI and 1, 4, and 12 weeks after LPI. At each visit, 12 cross-sectional images of the AS were taken: 4 in bright conditions with accommodation (accommodation), 4 in bright conditions without accommodation (physiological miosis), and 4 under dark conditions (physiologic mydriasis). Biometric parameters were estimated using AS OCT radial sections and customized image-processing software. Anterior chamber volume, iris volume-to-length ratio, ILC area, AS OCT anterior chamber depth, and A-scan ultrasonography axial length. Before LPI, PDS eyes had a significantly greater ACV and ILC area than control eyes (Piris volume-to-length ratio than the controls (Piris volume-to-length ratio increased significantly (Pbiometric changes were stable over time. Iris volume-to-length ratio decreased significantly from accommodation to mydriasis and from miosis to mydriasis, both in PDS and control eyes (Piris that is abnormally large, relative to the AS size, but have a weakly resistant iris that is stretched and pushed against the lens when there is a pressure difference across the iris. The author(s) have no proprietary or commercial interest in any materials discussed in this article. Copyright © 2011 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  12. Iris colour in relation to myopia among Chinese school-aged children.

    Science.gov (United States)

    Pan, Chen-Wei; Qiu, Qin-Xiao; Qian, Deng-Juan; Hu, Dan-Ning; Li, Jun; Saw, Seang-Mei; Zhong, Hua

    2018-01-01

    Understanding the association of iris colour and myopia may provide further insights into the role of the wavelength of lights in the pathophysiology of myopia. We aim to assess the association of iris colour and myopia in a school-based sample of Chinese students. Two thousand three hundred and forty-six Year 7 students from 10 middle schools (93.5% response rate) aged 13-14 years in Mojiang, a small county located in Southwestern China, participated in the study. We obtained standardised slit lamp photographs and developed a grading system assessing iris colour (higher grade denoting a darker iris). Refractive error was measured after cycloplegia using an autorefractor by optometrists or trained technicians. An IOLMaster (www.zeiss.com) was used to measure ocular biometric parameters including axial length (AL). Of all the study participants, 693 (29.5%) were affected by myopia with the prevalence estimates being higher in girls (36.8%; 95% confidence interval [CI]: 34.0, 39.6) than in boys (22.8%; 95% CI: 20.4, 25.1) (p iris colour tended to have a higher prevalence of myopia, a more myopic refraction and a longer AL. Dose-response relationships were observed in all regression models (p for trend iris colour was associated with more myopic refractive errors and longer ALs among Chinese school-aged children and this association was independent of other known myopia-related risk factors. © 2017 The Authors Ophthalmic & Physiological Optics © 2017 The College of Optometrists.

  13. The biometric antecedents to happiness

    Science.gov (United States)

    Bryson, Alex; Viinikainen, Jutta; Hakulinen, Christian; Hintsanen, Mirka; Pehkonen, Jaakko; Viikari, Jorma; Raitakari, Olli

    2017-01-01

    It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905) and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980) are associated with happiness in adulthood (2001). Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986) on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood. PMID:28915269

  14. The biometric antecedents to happiness.

    Science.gov (United States)

    Böckerman, Petri; Bryson, Alex; Viinikainen, Jutta; Hakulinen, Christian; Hintsanen, Mirka; Pehkonen, Jaakko; Viikari, Jorma; Raitakari, Olli

    2017-01-01

    It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905) and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980) are associated with happiness in adulthood (2001). Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986) on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood.

  15. The biometric antecedents to happiness.

    Directory of Open Access Journals (Sweden)

    Petri Böckerman

    Full Text Available It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905 and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980 are associated with happiness in adulthood (2001. Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986 on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood.

  16. Quantitative analysis of iris changes after physiologic and pharmacologic mydriasis in a rural Chinese population.

    Science.gov (United States)

    Zhang, Ye; Li, Si Zhen; Li, Lei; He, Ming Guang; Thomas, Ravi; Wang, Ning Li

    2014-04-24

    To estimate and compare the change in iris cross-sectional area (IA) and iris volume (IV) following physiologic and pharmacologic pupil dilation in primary angle closure suspects (PACS) and normal subjects. Anterior segment-optical coherence tomography (AS-OCT) measurements in light, dark, and following pharmacologic dilation were obtained on 186 PACS and 224 normal subjects examined during the 5-year follow-up of the Handan Eye Study. Iris cross-sectional area, IV, and other biometric parameters calculated using the Zhongshan angle assessment program in the right eyes of all subjects were analyzed. The mean IA and IV decreased in dark compared with light and after pharmacologic dilation in both PACS and normal eyes. This change was statistically significant in normal eyes: light versus pharmacologic dilation for IA (P = 0.038) and for IV, both light versus dark (P = 0.031) and light versus pharmacologic dilation (P = 0.012). A longer axial length (P = 0.028) and a greater change in pupil diameter (PD) (P iris behavior between PACS and normal rural Chinese subjects following physiologic or pharmacologic pupillary dilation may help provide insights into the pathogenesis of angle closure. Copyright 2014 The Association for Research in Vision and Ophthalmology, Inc.

  17. IRIS Toxicological Review of Acrolein (2003 Final)

    Science.gov (United States)

    EPA announced the release of the final report, Toxicological Review of Acrolein: in support of the Integrated Risk Information System (IRIS). The updated Summary for Acrolein and accompanying toxicological review have been added to the IRIS Database.

  18. Quality assessment for online iris images

    CSIR Research Space (South Africa)

    Makinana, S

    2015-01-01

    Full Text Available Iris recognition systems have attracted much attention for their uniqueness, stability and reliability. However, performance of this system depends on quality of iris image. Therefore there is a need to select good quality images before features can...

  19. Eyelid Localization for Iris Identification

    Directory of Open Access Journals (Sweden)

    T. Ea

    2008-12-01

    Full Text Available This article presents a new eyelid localization algorithm based on a parabolic curve fitting. To deal with eyelashes, low contrast or false detection due to iris texture, we propose a two steps algorithm. First, possible edge candidates are selected by applying edge detection on a restricted area inside the iris. Then, a gradient maximization is applied along every parabola, on a larger area, to refine parameters and select the best one. Experiments have been conducted on a database of 151 iris that have been manually segmented. The performance evaluation is carried out by comparing the segmented images obtained by the proposed method with the manual segmentation. The results are satisfactory in more than 90% of the cases.

  20. Automatic quantification of iris color

    DEFF Research Database (Denmark)

    Christoffersen, S.; Harder, Stine; Andersen, J. D.

    2012-01-01

    An automatic algorithm to quantify the eye colour and structural information from standard hi-resolution photos of the human iris has been developed. Initially, the major structures in the eye region are identified including the pupil, iris, sclera, and eyelashes. Based on this segmentation, the ...... is completely data driven and it can divide a group of eye images into classes based on structure, colour or a combination of the two. The methods have been tested on a large set of photos with promising results....... regions. The result is a blue-brown ratio for each eye. Furthermore, an image clustering approach has been used with promising results. The approach is based on using a sparse dictionary of feature vectors learned from a training set of iris regions. The feature vectors contain both local structural...

  1. Biometric recognition via fixation density maps

    Science.gov (United States)

    Rigas, Ioannis; Komogortsev, Oleg V.

    2014-05-01

    This work introduces and evaluates a novel eye movement-driven biometric approach that employs eye fixation density maps for person identification. The proposed feature offers a dynamic representation of the biometric identity, storing rich information regarding the behavioral and physical eye movement characteristics of the individuals. The innate ability of fixation density maps to capture the spatial layout of the eye movements in conjunction with their probabilistic nature makes them a particularly suitable option as an eye movement biometrical trait in cases when free-viewing stimuli is presented. In order to demonstrate the effectiveness of the proposed approach, the method is evaluated on three different datasets containing a wide gamut of stimuli types, such as static images, video and text segments. The obtained results indicate a minimum EER (Equal Error Rate) of 18.3 %, revealing the perspectives on the utilization of fixation density maps as an enhancing biometrical cue during identification scenarios in dynamic visual environments.

  2. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    .g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...... level fusion, i.e., the scores of each biometric system are usually incompatible, as they have different score ranges as well as different probability distributions. We have integrated remote biometrics with the PAISE prototype and the experimental results on a publicly available dataset, show...

  3. Voice Biometrics for Information Assurance Applications

    National Research Council Canada - National Science Library

    Kang, George

    2002-01-01

    In 2002, the President of the United States established an organization within the DOD to develop and promulgate biometrics technologies to achieve security in information, information systems, weapons, and facilities...

  4. Report printer (COBOL IRIS 50)

    International Nuclear Information System (INIS)

    Paul, Daniele

    1973-10-01

    The research thesis reports a detailed study of the Report Writer of the COBOL language in order to integrate it into the IRIS 50 COBOL compiler. In order to use existing compiler processing, the author developed a simulation of the Report Writer by using Cobol statements generated in the declarative part of the Division procedure. After a brief presentation of the IRIS 50 computer, the author presents the general plan of the compiler with modifications and adjunctions exclusively due to the Report Writer. The next part addresses the practical implementation and the problems met and solved during this implementation

  5. Biometric Image Recognition Based on Optical Correlator

    Directory of Open Access Journals (Sweden)

    David Solus

    2017-01-01

    Full Text Available The aim of this paper is to design a biometric images recognition system able to recognize biometric images-eye and DNA marker. The input scenes are processed by user-friendly software created in C# programming language and then are compared with reference images stored in database. In this system, Cambridge optical correlator is used as an image comparator based on similarity of images in the recognition phase.

  6. Light stimulation of iris tyrosinase in vivo

    International Nuclear Information System (INIS)

    Dryja, T.P.; Kimball, G.P.; Albert, D.M.

    1980-01-01

    This paper presents evidence that light stimulates tyrosinase activity in iris melanocytes in rabbits. Levels of iris tyrosinase were found to be greater in eyes of rabbits exposed to light for 6 weeks than in eyes of rabbits maintained in darkness. Despite increasing tyrosinase levels, exposure to light produced no clinically observable change in iris color

  7. What Genes Tell about Iris Appearance

    DEFF Research Database (Denmark)

    Harder, Stine; Christoffersen, Susanne R.; Johansen, Peter

    2012-01-01

    Predicting phenotypes based on genotypes is generally hard, but has shown good results for prediction of iris color. We propose to correlate the appearance of iris with DNA. Six single-nucleotide polymorphisms (SNPs) have previously been shown to correlate with human iris color, and we demonstrat...

  8. Biometrics IRB best practices and data protection

    Science.gov (United States)

    Boehnen, Christopher; Bolme, David; Flynn, Patrick

    2015-05-01

    The collection of data from human subjects for biometrics research in the United States requires the development of a data collection protocol that is reviewed by a Human Subjects Institutional Review Board (IRB). The IRB reviews the protocol for risks and approves it if it meets the criteria for approval specified in the relevant Federal regulations (45 CFR 46). Many other countries operate similar mechanisms for the protection of human subjects. IRBs review protocols for safety, confidentiality, and for minimization of risk associated with identity disclosure. Since biometric measurements are potentially identifying, IRB scrutiny of biometrics data collection protocols can be expected to be thorough. This paper discusses the intricacies of IRB best practices within the worldwide biometrics community. This is important because research decisions involving human subjects are made at a local level and do not set a precedent for decisions made by another IRB board. In many cases, what one board approves is not approved by another board, resulting in significant inconsistencies that prove detrimental to both researchers and human subjects. Furthermore, the level of biometrics expertise may be low on IRBs, which can contribute to the unevenness of reviews. This publication will suggest possible best practices for designing and seeking IRB approval for human subjects research involving biometrics measurements. The views expressed are the opinions of the authors.

  9. Crop Biometric Maps: The Key to Prediction

    Directory of Open Access Journals (Sweden)

    Francisco Rovira-Más

    2013-09-01

    Full Text Available The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular “identity.” This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  10. Crop biometric maps: the key to prediction.

    Science.gov (United States)

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-09-23

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular "identity." This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  11. Crop Biometric Maps: The Key to Prediction

    Science.gov (United States)

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-01-01

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular “identity.” This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed. PMID:24064605

  12. IRIS Nuclear Power Plant design

    International Nuclear Information System (INIS)

    Carelli, M. D.; Cobian, J.

    2002-01-01

    IRIS(International Reactor Innovative and Secure) is a novel light water reactor with a modular, integral primary system configuration. This concept, initially developed in response to the first NERI solicitation, is now being pursued by an international consortium of 20 participants from seven countries. IRIS is designed to satisfy the four key requirements for Generation IV systems: enhanced safety, improved economics, proliferation resistance and waste minimization. Its main features are: small-to-medium power (100-335 MWe/module); long life core 5 to 10 years) without shuffling or refueling; optimized maintenance with repair shutdown intervals of a least four years; simplified compact design with the primary vessel housing steam generators, pressurizer and pumps; safety by design where accidents are positively eliminated by design rather than engineering to cope with their consequences; loss of coolant accidents of any size and loss of low accidents are eliminated as major safety concerns; estimated power generation total cost is projected to be competitive with other power options. IRIS is one of four new reactor designs currently under NRC review. Projected schedule calls for design certification by 2008 and being ready for deployment by 2001 or later. This rather short schedule is made possible by the fact that IRIS is based on proven light water technology and new technology development is not required. (Author)

  13. Multimodal Biometric System- Fusion Of Face And Fingerprint Biometrics At Match Score Fusion Level

    Directory of Open Access Journals (Sweden)

    Grace Wangari Mwaura

    2017-04-01

    Full Text Available Biometrics has developed to be one of the most relevant technologies used in Information Technology IT security. Unimodal biometric systems have a variety of problems which decreases the performance and accuracy of these system. One way to overcome the limitations of the unimodal biometric systems is through fusion to form a multimodal biometric system. Generally biometric fusion is defined as the use of multiple types of biometric data or ways of processing the data to improve the performance of biometric systems. This paper proposes to develop a model for fusion of the face and fingerprint biometric at the match score fusion level. The face and fingerprint unimodal in the proposed model are built using scale invariant feature transform SIFT algorithm and the hamming distance to measure the distance between key points. To evaluate the performance of the multimodal system the FAR and FRR of the multimodal are compared along those of the individual unimodal systems. It has been established that the multimodal has a higher accuracy of 92.5 compared to the face unimodal system at 90 while the fingerprint unimodal system is at 82.5.

  14. The relation between the secrecy rate of biometric template protection and biometric recognition performance

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    2015-01-01

    A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the

  15. IRIS Final Technical Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    M. D. Carelli

    2003-11-03

    OAK-B135 This NERI project, originally started as the Secure Transportable Autonomous Light Water Reactor (STAR-LW) and currently known as the International Reactor Innovative and Secure (IRIS) project, had the objective of investigating a novel type of water-cooled reactor to satisfy the Generation IV goals: fuel cycle sustainability, enhanced reliability and safety, and improved economics. The research objectives over the three-year (1999-2002) program were as follows: First year: Assess various design alternatives and establish main characteristics of a point design; Second year: Perform feasibility and engineering assessment of the selected design solutions; Third year: Complete reactor design and performance evaluation, including cost assessment These objectives were fully attained and actually they served to launch IRIS as a full fledged project for eventual commercial deployment. The program did not terminate in 2002 at the end of the NERI program, and has just entered in its fifth year. This has been made possible by the IRIS project participants which have grown from the original four member, two-countries team to the current twenty members, nine countries consortium. All the consortium members work under their own funding and it is estimated that the value of their in-kind contributions over the life of the project has been of the order of $30M. Currently, approximately 100 people worldwide are involved in the project. A very important constituency of the IRIS project is the academia: 7 universities from four countries are members of the consortium and five more US universities are associated via parallel NERI programs. To date, 97 students have worked or are working on IRIS; 59 IRIS-related graduate theses have been prepared or are in preparation, and 41 of these students have already graduated with M.S. (33) or Ph.D. (8) degrees. This ''final'' report (final only as far as the NERI program is concerned) summarizes the work performed

  16. Review of modern biometric user authentication and their development prospects

    Science.gov (United States)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  17. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  18. Entropy Measurement for Biometric Verification Systems.

    Science.gov (United States)

    Lim, Meng-Hui; Yuen, Pong C

    2016-05-01

    Biometric verification systems are designed to accept multiple similar biometric measurements per user due to inherent intrauser variations in the biometric data. This is important to preserve reasonable acceptance rate of genuine queries and the overall feasibility of the recognition system. However, such acceptance of multiple similar measurements decreases the imposter's difficulty of obtaining a system-acceptable measurement, thus resulting in a degraded security level. This deteriorated security needs to be measurable to provide truthful security assurance to the users. Entropy is a standard measure of security. However, the entropy formula is applicable only when there is a single acceptable possibility. In this paper, we develop an entropy-measuring model for biometric systems that accepts multiple similar measurements per user. Based on the idea of guessing entropy, the proposed model quantifies biometric system security in terms of adversarial guessing effort for two practical attacks. Excellent agreement between analytic and experimental simulation-based measurement results on a synthetic and a benchmark face dataset justify the correctness of our model and thus the feasibility of the proposed entropy-measuring approach.

  19. Multi-image encryption based on synchronization of chaotic lasers and iris authentication

    Science.gov (United States)

    Banerjee, Santo; Mukhopadhyay, Sumona; Rondoni, Lamberto

    2012-07-01

    A new technique of transmitting encrypted combinations of gray scaled and chromatic images using chaotic lasers derived from Maxwell-Bloch's equations has been proposed. This novel scheme utilizes the general method of solution of a set of linear equations to transmit similar sized heterogeneous images which are a combination of monochrome and chromatic images. The chaos encrypted gray scaled images are concatenated along the three color planes resulting in color images. These are then transmitted over a secure channel along with a cover image which is an iris scan. The entire cryptology is augmented with an iris-based authentication scheme. The secret messages are retrieved once the authentication is successful. The objective of our work is briefly outlined as (a) the biometric information is the iris which is encrypted before transmission, (b) the iris is used for personal identification and verifying for message integrity, (c) the information is transmitted securely which are colored images resulting from a combination of gray images, (d) each of the images transmitted are encrypted through chaos based cryptography, (e) these encrypted multiple images are then coupled with the iris through linear combination of images before being communicated over the network. The several layers of encryption together with the ergodicity and randomness of chaos render enough confusion and diffusion properties which guarantee a fool-proof approach in achieving secure communication as demonstrated by exhaustive statistical methods. The result is vital from the perspective of opening a fundamental new dimension in multiplexing and simultaneous transmission of several monochromatic and chromatic images along with biometry based authentication and cryptography.

  20. Self-adaptive iris image acquisition system

    Science.gov (United States)

    Dong, Wenbo; Sun, Zhenan; Tan, Tieniu; Qiu, Xianchao

    2008-03-01

    Iris image acquisition is the fundamental step of the iris recognition, but capturing high-resolution iris images in real-time is very difficult. The most common systems have small capture volume and demand users to fully cooperate with machines, which has become the bottleneck of iris recognition's application. In this paper, we aim at building an active iris image acquiring system which is self-adaptive to users. Two low resolution cameras are co-located in a pan-tilt-unit (PTU), for face and iris image acquisition respectively. Once the face camera detects face region in real-time video, the system controls the PTU to move towards the eye region and automatically zooms, until the iris camera captures an clear iris image for recognition. Compared with other similar works, our contribution is that we use low-resolution cameras, which can transmit image data much faster and are much cheaper than the high-resolution cameras. In the system, we use Haar-like cascaded feature to detect faces and eyes, linear transformation to predict the iris camera's position, and simple heuristic PTU control method to track eyes. A prototype device has been established, and experiments show that our system can automatically capture high-quality iris image in the range of 0.6m×0.4m×0.4m in average 3 to 5 seconds.

  1. Biometrics and their use in e-passports

    NARCIS (Netherlands)

    Prof. Bart Jacobs; B.A.M. Ben Schouten

    2007-01-01

    A succesful design, deployment and operation of biometric systems depends highly on the results for existing biometrical technologies and components. These existing technologies as well as new solutions need to be evaluated on their performance. However it is often forgotten that the biometric

  2. 75 FR 39323 - Amendment to the Biometric Visa Program

    Science.gov (United States)

    2010-07-08

    ... an amendment to the Biometric Visa Program. Section 303 of the Enhanced Border Security and Visa... closely with the Department of Homeland Security (DHS). The Biometric Visa Program is a partner program to... under the Biometric Visa Program were also coordinated with the Department of Homeland Security to...

  3. Biometrics in Forensic Science: Challenges, Lessons and New Technologies

    NARCIS (Netherlands)

    Tistarelli, Massimo; Grosso, Enrico; Meuwly, Didier

    2014-01-01

    Biometrics has historically found its natural mate in Forensics. The first applications found in the literature and over cited so many times, are related to biometric measurements for the identification of multiple offenders from some of their biometric and anthropometric characteristics (tenprint

  4. 3D face analysis for demographic biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Tokola, Ryan A [ORNL; Mikkilineni, Aravind K [ORNL; Boehnen, Chris Bensing [ORNL

    2015-01-01

    Despite being increasingly easy to acquire, 3D data is rarely used for face-based biometrics applications beyond identification. Recent work in image-based demographic biometrics has enjoyed much success, but these approaches suffer from the well-known limitations of 2D representations, particularly variations in illumination, texture, and pose, as well as a fundamental inability to describe 3D shape. This paper shows that simple 3D shape features in a face-based coordinate system are capable of representing many biometric attributes without problem-specific models or specialized domain knowledge. The same feature vector achieves impressive results for problems as diverse as age estimation, gender classification, and race classification.

  5. Biometric identification using local iterated function

    Science.gov (United States)

    Al-Saidi, N. M. G.; Said, M. R. M.

    2014-06-01

    Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

  6. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  7. [A woman with iris heterochromia].

    Science.gov (United States)

    Birker, I L; Boons, L S T M; Luyten, G P M

    2016-01-01

    A 20-year-old woman with congenital iris heterochromia presented with loss of vision of her right eye. We made de diagnosis of a large 'uvea melanoma' and enucleated the eye. Pathological examination showed an underlying oculodermal melanocytosis (ODM). The life-time risk of uveal melanoma in the general population is 0.7:100,000, but 1:400 in patients with ODM. Therefore, annual fundoscopy is recommended in these patients.

  8. DCT-based iris recognition.

    Science.gov (United States)

    Monro, Donald M; Rakshit, Soumyadip; Zhang, Dexin

    2007-04-01

    This paper presents a novel iris coding method based on differences of discrete cosine transform (DCT) coefficients of overlapped angular patches from normalized iris images. The feature extraction capabilities of the DCT are optimized on the two largest publicly available iris image data sets, 2,156 images of 308 eyes from the CASIA database and 2,955 images of 150 eyes from the Bath database. On this data, we achieve 100 percent Correct Recognition Rate (CRR) and perfect Receiver-Operating Characteristic (ROC) Curves with no registered false accepts or rejects. Individual feature bit and patch position parameters are optimized for matching through a product-of-sum approach to Hamming distance calculation. For verification, a variable threshold is applied to the distance metric and the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are recorded. A new worst-case metric is proposed for predicting practical system performance in the absence of matching failures, and the worst case theoretical Equal Error Rate (EER) is predicted to be as low as 2.59 x 10(-4) on the available data sets.

  9. Lentes plegables suturadas a iris

    Directory of Open Access Journals (Sweden)

    Dunia Cruz Izquierdo

    Full Text Available Para la corrección quirúrgica de la afaquia existen en la actualidad varias técnicas quirúrgicas que permiten fijar los lentes intraoculares plegables o rígidos en cámara posterior suturados al iris o al sulcus ciliar. En estas circunstancias el cirujano determinará cuándo, dónde y el tipo de lente mejor a implantar. Se presenta un paciente con una afaquia traumática del ojo izquierdo, con agudeza visual sin corrección de movimiento de mano a 1 m. Se le realizó implante secundario de lente intraocular plegable de cámara posterior suturada al iris. En el examen biomicroscópico en lámpara de hendidura del ojo izquierdo se observó midriasis media paralítica, refracción dinámica de +11,00 (0,6 y tensión ocular normal. Se le realizó examen por bimicroscopía indirecta sin alteración. Al mes de operado la agudeza visual mejor corregida alcanzó la unidad de visión. Las complicaciones presentadas fueron ovalización de la pupila y depósitos de pigmentos de iris en el lente intraocular.

  10. Mathematical and information maintenance of biometric systems

    Science.gov (United States)

    Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.

    2016-04-01

    This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.

  11. State of the Art: Signature Biometrics Verification

    Directory of Open Access Journals (Sweden)

    Nourddine Guersi

    2010-04-01

    Full Text Available This paper presents a comparative analysis of the performance of three estimation algorithms: Expectation Maximization (EM, Greedy EM Algorithm (GEM and Figueiredo-Jain Algorithm (FJ - based on the Gaussian mixture models (GMMs for signature biometrics verification. The simulation results have shown significant performance achievements. The test performance of EER=5.49 % for "EM", EER=5.04 % for "GEM" and EER=5.00 % for "FJ", shows that the behavioral information scheme of signature biometrics is robust and has a discriminating power, which can be explored for identity authentication.

  12. Practical biometrics from aspiration to implementation

    CERN Document Server

    Ashbourn, Julian

    2015-01-01

    This practically-focused text presents a hands-on guide to making biometric technology work in real-life scenarios. Extensively revised and updated, this new edition takes a fresh look at what it takes to integrate biometrics into wider applications. An emphasis is placed on the importance of a complete understanding of the broader scenario, covering technical, human and implementation factors. This understanding may then be exercised through interactive chapters dealing with educational software utilities and the BANTAM Program Manager. Topics and features: provides a concise introduction t

  13. Improvement of security techniques and protection of biometric data in biometric systems: Presentation of International Standard ISO 24745

    OpenAIRE

    Milinković, Milorad

    2017-01-01

    This paper presents the International Standard ISO 24745 as a potential security tool for biometric information protection, more precisely as a tool for privacy protection in biometric systems. This is one of the latest internationally accepted standards that address the security issues of biometric systems.

  14. Monte Carlo modeling of eye iris color

    Science.gov (United States)

    Koblova, Ekaterina V.; Bashkatov, Alexey N.; Dolotov, Leonid E.; Sinichkin, Yuri P.; Kamenskikh, Tatyana G.; Genina, Elina A.; Tuchin, Valery V.

    2007-05-01

    Based on the presented two-layer eye iris model, the iris diffuse reflectance has been calculated by Monte Carlo technique in the spectral range 400-800 nm. The diffuse reflectance spectra have been recalculated in L*a*b* color coordinate system. Obtained results demonstrated that the iris color coordinates (hue and chroma) can be used for estimation of melanin content in the range of small melanin concentrations, i.e. for estimation of melanin content in blue and green eyes.

  15. Ocular biometric parameters associated with intraocular pressure reduction after cataract surgery in normal eyes.

    Science.gov (United States)

    Yang, Hyun Seung; Lee, Junsung; Choi, Sangkyung

    2013-07-01

    To evaluate the ocular biometric parameters associated with intraocular pressure (IOP) reduction after phacoemulsification. Prospective, observational case series. The study included 999 patients who had undergone uncomplicated phacoemulsification. IOP and ocular biometric parameters were checked preoperatively and 3 months postoperatively using anterior segment optical coherence tomography, optical biometry, and ultrasonic biomicroscopy. The relationship between IOP change and the parameters, including preoperative IOP, anterior chamber depth, axial length, angle opening distance at 500 μm, anterior chamber area, corneal thickness, lens thickness, and iris thickness at 750 μm, was evaluated. The mean patient age was 67.1 ± 4.3 years. The average change in IOP was -1.6 mm Hg (-11.8%). In univariate analysis, axial length, corneal thickness, and iris thickness were not significantly associated with IOP reduction. However, preoperative IOP, anterior chamber depth, angle opening distance, anterior chamber area, and lens thickness were significantly associated with IOP change (P < .05). Furthermore, changes in anterior chamber depth (standardized coefficient beta [B] = -0.082), angle opening distance (B = -0.095), and anterior chamber area (B = -0.380) were more strongly correlated with IOP change than were preoperative factors (B = -0.078, B = -0.071, and B = -0.067, respectively). In multivariate analysis, preoperative IOP, lens thickness, angle opening distance change, and anterior chamber area change were significantly associated with IOP change (P < .005). In addition to preoperative IOP and lens thickness, parameters such as changes in anterior chamber area and angle opening distance were significantly associated positively with reduced IOP after phacoemulsification. Copyright © 2013 Elsevier Inc. All rights reserved.

  16. Security analysis for biometric data in ID documents

    Science.gov (United States)

    Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton

    2005-03-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.

  17. A Systems Approach to Biometrics in the Military Domain.

    Science.gov (United States)

    Wilson, Lauren; Gahan, Michelle; Lennard, Chris; Robertson, James

    2018-02-21

    Forensic biometrics is the application of forensic science principles to physical and behavioral characteristics. Forensic biometrics is a secondary sub-system in the forensic science "system of systems," which describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military system. The purpose of this paper is to discuss biometrics in the military domain and integration into the wider forensic science system of systems. The holistic system thinking methodology was applied to the U.S. biometric system to map it to the system of systems framework. The U.S. biometric system is used as a case study to help guide other countries to develop military biometric systems that are integrated and interoperable at the whole-of-government level. The aim is to provide the system of systems framework for agencies to consider for proactive design of biometric systems. © 2018 American Academy of Forensic Sciences.

  18. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    Science.gov (United States)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  19. Privacy-Preserving Biometric Authentication: Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Elena Pagnin

    2017-01-01

    Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.

  20. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  1. Biometric authentication for a mobile personal device

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    2006-01-01

    Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a

  2. Quantum Biometrics with Retinal Photon Counting

    Science.gov (United States)

    Loulakis, M.; Blatsios, G.; Vrettou, C. S.; Kominis, I. K.

    2017-10-01

    It is known that the eye's scotopic photodetectors, rhodopsin molecules, and their associated phototransduction mechanism leading to light perception, are efficient single-photon counters. We here use the photon-counting principles of human rod vision to propose a secure quantum biometric identification based on the quantum-statistical properties of retinal photon detection. The photon path along the human eye until its detection by rod cells is modeled as a filter having a specific transmission coefficient. Precisely determining its value from the photodetection statistics registered by the conscious observer is a quantum parameter estimation problem that leads to a quantum secure identification method. The probabilities for false-positive and false-negative identification of this biometric technique can readily approach 10-10 and 10-4, respectively. The security of the biometric method can be further quantified by the physics of quantum measurements. An impostor must be able to perform quantum thermometry and quantum magnetometry with energy resolution better than 10-9ℏ , in order to foil the device by noninvasively monitoring the biometric activity of a user.

  3. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  4. Dual watermarking technique with multiple biometric watermarks

    Indian Academy of Sciences (India)

    Keywords. Biometric features; dual watermarking; multiple watermarking; Gabor filter; linear predictive coding (LPC); human visual system (HVS) model. ... As multiple watermarks are embedded at least one watermark survives under different attacks. It can find application for joint ownership or to address single ownership ...

  5. Extracting forensic evidence from biometric devices

    Science.gov (United States)

    Geradts, Zeno J.; Ruifrok, Arnout C.

    2003-08-01

    Over the past few years, both large multinationals and governments have begun to contribute to even larger projects on biometric devices. Terrorist attacks in America and in other countries have highlighted the need for better identification systems for people as well as improved systems for controlling access to buildings. Another reason for investment in Research and Development in Biometric Devices, is the massive growth in internet-based systems -- whether for e-commerce, e-government or internal processes within organizations. The interface between the system and the user is routinely abused, as people have to remember many complex passwords and handle tokens of various types. In this paper an overview is given of the information that is important to know before an examination of such is systems can be done in a forensic proper way. In forensic evidence with biometric devices the forensic examiner should consider the possibilities of tampering with the biometric systems or the possibilities of unauthorized access before drawing conclusions.

  6. Correlations between refractive error and biometric parameters in human eyes using the LenStar 900.

    Science.gov (United States)

    O'Donnell, Clare; Hartwig, Andreas; Radhakrishnan, Hema

    2011-02-01

    To investigate the relationship between refractive error and ocular biometry in healthy subjects using a new optical low coherence reflectometry device. Biometric measurements were obtained with a LenStar LS 900 (Haag Streit, Switzerland) on one eye of 70 phakic subjects (mean ± SD age; 29 ± 9 years). Forty myopes and 30 non-myopes (best sphere range -9.63 D to +0.63 D) were included. Outcome measures were compared for the two groups using one way between groups ANOVA. These included; keratometry, central corneal thickness, iris width, anterior chamber depth, pupil diameter, lens thickness, axial length and retinal thickness. No mydriatic or cycloplegic agents were used. There were significant differences between groups for keratometry readings (p = 0.021 and p = 0.038 for steep and flat k readings respectively), anterior chamber depth (p = 0.001), lens thickness (p = 0.026) and axial length (pbiometric parameters assessed and provides information about the relationships between these biometric parameters and age. The results, coupled with a unique ability to image and analyse the ocular structures non-invasively make the LenStar a promising new instrument for ocular evaluation in research and clinical practice. Copyright © 2010 British Contact Lens Association. Published by Elsevier Ltd. All rights reserved.

  7. Iris texture traits show associations with iris color and genomic ancestry.

    Science.gov (United States)

    Quillen, Ellen E; Guiltinan, Jenna S; Beleza, Sandra; Rocha, Jorge; Pereira, Rinaldo W; Shriver, Mark D

    2011-01-01

    This study seeks to identify associations among genomic biogeographic ancestry (BGA), quantitative iris color, and iris texture traits contributing to population-level variation in these phenotypes. DNA and iris photographs were collected from 300 individuals across three variably admixed populations (Portugal, Brazil, and Cape Verde). Two raters scored the photos for pigmentation spots, Fuchs' crypts, contraction furrows, and Wolflinn nodes. Iris color was quantified from RGB values. Maximum likelihood estimates of individual BGA were calculated from 176 ancestry informative markers. Pigmentation spots, Fuchs' crypts, contraction furrows, and iris color show significant positive correlation with increasing European BGA. Only contraction furrows are correlated with iris color. The relationship between BGA and iris texture illustrates a genetic contribution to this population-level variation. Copyright © 2011 Wiley-Liss, Inc.

  8. Feature Vector Construction Method for IRIS Recognition

    Science.gov (United States)

    Odinokikh, G.; Fartukov, A.; Korobkin, M.; Yoo, J.

    2017-05-01

    One of the basic stages of iris recognition pipeline is iris feature vector construction procedure. The procedure represents the extraction of iris texture information relevant to its subsequent comparison. Thorough investigation of feature vectors obtained from iris showed that not all the vector elements are equally relevant. There are two characteristics which determine the vector element utility: fragility and discriminability. Conventional iris feature extraction methods consider the concept of fragility as the feature vector instability without respect to the nature of such instability appearance. This work separates sources of the instability into natural and encodinginduced which helps deeply investigate each source of instability independently. According to the separation concept, a novel approach of iris feature vector construction is proposed. The approach consists of two steps: iris feature extraction using Gabor filtering with optimal parameters and quantization with separated preliminary optimized fragility thresholds. The proposed method has been tested on two different datasets of iris images captured under changing environmental conditions. The testing results show that the proposed method surpasses all the methods considered as a prior art by recognition accuracy on both datasets.

  9. Statistical feature extraction based iris recognition system

    Indian Academy of Sciences (India)

    Atul Bansal

    features obtained from one's face [1], finger [2], voice [3] and/or iris [4, 5]. Iris recognition system is widely used in high security areas. A number of researchers have proposed various algorithms for feature extraction. A little work [6,. 7] however, has been reported using statistical techniques directly on pixel values in order to ...

  10. An indexing method for color iris images

    Science.gov (United States)

    Crihalmeanu, Simona G.; Ross, Arun A.

    2015-05-01

    In this work, we study the possibility of indexing color iris images. In the proposed approach, a clustering scheme on a training set of iris images is used to determine cluster centroids that capture the variations in chromaticity of the iris texture. An input iris image is indexed by comparing its pixels against these centroids and determining the dominant clusters - i.e., those clusters to which the majority of its pixels are assigned to. The cluster indices serve as an index code for the input iris image and are used during the search process, when an input probe has to be compared with a gallery of irides. Experiments using multiple color spaces convey the efficacy of the scheme on good quality images, with hit rates closes to 100% being achieved at low penetration rates.

  11. IRIS Toxicological Review of Tetrahydrofuran (THF) (External ...

    Science.gov (United States)

    EPA is conducting a peer review and public comment of the scientific basis supporting the human health hazard and dose-response assessment of tetrahydrofuran (THF) that when finalized will appear on the Integrated Risk Information System (IRIS) database. EPA is undertaking an Integrated Risk Information System (IRIS) health assessment for tetrahydrofuran. IRIS is an EPA database containing Agency scientific positions on potential adverse human health effects that may result from chronic (or lifetime) exposure to chemicals in the environment. IRIS contains chemical-specific summaries of qualitative and quantitative health information in support of two steps of the risk assessment paradigm, i.e., hazard identification and dose-response evaluation. IRIS assessments are used in combination with specific situational exposure assessment information to evaluate potential public health risk associated with environmental contaminants.

  12. Efficient Iris Localization via Optimization Model

    Directory of Open Access Journals (Sweden)

    Qi Wang

    2017-01-01

    Full Text Available Iris localization is one of the most important processes in iris recognition. Because of different kinds of noises in iris image, the localization result may be wrong. Besides this, localization process is time-consuming. To solve these problems, this paper develops an efficient iris localization algorithm via optimization model. Firstly, the localization problem is modeled by an optimization model. Then SIFT feature is selected to represent the characteristic information of iris outer boundary and eyelid for localization. And SDM (Supervised Descent Method algorithm is employed to solve the final points of outer boundary and eyelids. Finally, IRLS (Iterative Reweighted Least-Square is used to obtain the parameters of outer boundary and upper and lower eyelids. Experimental result indicates that the proposed algorithm is efficient and effective.

  13. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    Directory of Open Access Journals (Sweden)

    Josua Tarigan

    2004-01-01

    Full Text Available As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges will face when develop biometric technology as control in accounting information system are standardization, hybrid technology uses, life cycle management. Abstract in Bahasa Indonesia : Adanya keinginan setiap organisasi untuk mencari metode pengamanan authentication yang lebih untuk akses user, dijawab dengan adanya teknologi biometric security yang mendapat perhatian yang cukup besar bagi organisasi. Implementasi teknologi biometric security cukup luas dalam sistem informasi akuntansi yaitu sebagai pengendalian pada physical access, virtual access, e-commerce applications dan covert surveillance. Dalam mengimplementasikan teknologi biometric, ada tiga tahapan yang harus dilakukan organisasi, yakni strategic planning and budgeting, developing a system reliability plan dan documentation. Tantangan yang akan dihadapi dalam mengembangkan teknologi biometric sebagai pengendalian dalam sistem informasi akuntansi yakni standarisasi, aplikasi teknologi hybrid dan manajemen siklus hidup pada biometric security. Kata kunci: authentication, akses user dan biometric security.

  14. Quantitative analysis of iris changes following mydriasis in subjects with different mechanisms of angle closure.

    Science.gov (United States)

    Zhang, Ye; Li, Si Zhen; Li, Lei; He, Ming Guang; Thomas, Ravi; Wang, Ning Li

    2015-01-08

    We estimate and compare change in iris cross-sectional area (IA) after physiologic and pharmacologic mydriasis in subjects with different dominant mechanisms for primary angle closure. Anterior segment optical coherence tomography (AS-OCT) measurements in light, dark, and following pharmacologic dilation were obtained on primary angle closure suspects (PACS), primary angle closure (PAC), and primary angle closure glaucoma (PACG) examined during the 5-year follow-up of the Handan Eye Study. Subjects were categorized into three subgroups according to their dominant angle closure (AC) mechanisms as determined by AS-OCT: pupillary block (PB), plateau iris configuration (PIC), and thick peripheral iris roll (TPIR). The IA and other biometric parameters measured using the Zhongshan Angle Assessment Program in the right eyes of all subjects were analyzed. A total of 364 right eyes of subjects with PACS (333), and PAC/PACG (31) was included in the analysis. Significant differences in the change of IAs (P = 0.030), IA loss per mm pupil diameter (PD) increase (P = 0.001) in light versus pharmacologic dilation, and IA loss per mm PD increase (P = 0.011) from dark versus pharmacologic dilation were observed among the three groups. The smallest decrease occurred in the PB group. There are significant differences in IA and IA loss per mm of pupil change following physiologic or pharmacologic mydriasis in Chinese subjects with dissimilar dominant mechanisms for AC. Dynamic iris change may have a more important role in angle closure where PB is the dominant mechanism. Copyright 2015 The Association for Research in Vision and Ophthalmology, Inc.

  15. Dynamic Iris Changes as a Risk Factor in Primary Angle Closure Disease.

    Science.gov (United States)

    Zhang, Ye; Li, Si Zhen; Li, Lei; He, Ming Guang; Thomas, Ravi; Wang, Ning Li

    2016-01-01

    We studied the association between dynamic iris changes and the spectrum of primary angle closure disease (PACD), using the anterior segment optical coherence tomography (ASOCT). Eligible primary angle closure (PAC), primary angle closure glaucoma (PACG), age, and sex comparable primary angle closure suspects (PACS) and normal subjects from the 5-year follow-up of the Handan Eye Study underwent ASOCT testing in dark and light conditions. The right eye of each subject was analyzed and biometric parameters including iris cross-sectional area (IA), lens vault (LV), pupil diameter (PD), and centroid-to-centroid distance (CCD) were calculated using the Zhongshan Angle Assessment Program. Totals of 31 PACS, 31 PAC/PACG, and 31 normal eyes were eligible for analysis. Loss of IA per mm PD increase in the dark compared to light was 0.18 mm in PACS, 0.13 mm in PAC/PACG, and 0.24 mm in normal (P = 0.015 between groups) groups. Diagnoses of normal (P = 0.001) and a smaller PD in light (P = 0.003) were statistically significant determinants of a larger IA loss per mm PD increase in the dark compared to light. Logistic regression analysis showed that LV (P = 0.002) and IA loss per mm PD increase (P = 0.017) were risk factors for an occludable angle. Significant differences in iris behavior in the dark compared to light in PACS, PACD, and normal eyes add to the evidence that dynamic iris change has a role in the pathogenesis of PAC in a rural Chinese population.

  16. IRIS

    African Journals Online (AJOL)

    Esem

    detected HIV DNA on polymerase chain reaction. (PCR). Anti-Retroviral Therapy (ART): Infants initiated on. ART on the ward or follow up clinics are reviewed fortnightly in the first month in out-patient clinic run by the unit. Those infants who were found to have. BGC reactivation which was defined as swelling or ulceration at ...

  17. Association of biometric factors with anterior chamber angle widening and intraocular pressure reduction after uneventful phacoemulsification for cataract.

    Science.gov (United States)

    Huang, Guofu; Gonzalez, Eduardo; Lee, Roland; Chen, Yi-Chun; He, Mingguang; Lin, Shan C

    2012-01-01

    To evaluate anterior chamber biometric factors associated with the degree of angle widening and intraocular pressure (IOP) reduction after phacoemulsification. University of California, San Francisco, California, USA. Case series. Anterior chamber parameters obtained by anterior segment coherence tomography were compared preoperatively and 3 months postoperatively. Measurements included the angle opening distance 500 μm anterior to the scleral spur (AOD500), trabecular-iris space area 500 μm from the scleral spur (TISA500), iris curvature (I-Curv), anterior chamber angle (ACA), trabecular-iris space area, anterior chamber volume, anterior chamber width, and lens vault (LV). The study enrolled 73 eyes. The mean patient age was 77.45 years ± 7.84 (SD); 65.75% of patients were women. From preoperatively to 3 months postoperatively, the mean AOD500 increased significantly (0.254 ± 0.105 to 0.433 ± 0.108 mm) and the mean IOP decreased significantly (14.97 ± 3.35 to 12.62 ± 3.37 mm Hg) (Pbiometric factors. Preoperative LV appears to be a significant factor in angle widening and IOP reduction after phacoemulsification. Copyright © 2011 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  18. Relationship of the Van Herick Grading System with Peripheral Iris Configuration and Level of Iris Insertion.

    Science.gov (United States)

    Khan, Faisal Aziz; Niazi, Shafaq Pervez Khan; Khan, Assad Zaman

    2017-09-01

    To determine the relationship of the van Herick angle grading system with the level of iris insertion and peripheral iris configuration. Observational study. Eye department, Combined Military Hospital, Malir Cantt., Karachi, from May to October 2015. Sixty-five eyes of 65 patients were recruited. Anterior chamber depth at the temporal limbus was measured as a fraction of corneal section thickness using van Herick technique and graded on the standard 4-point scale of the van Herick grading system. Gonioscopy of the temporal quadrant was performed with a Posner 4 mirror goniolens and both the true level of iris insertion and peripheral iris configuration were recorded on a 4-point scale so as to equate with the van Herick 4-point grading system. Spearman's rho test was applied to determine the relationship of the van Herick grading system with level of iris root insertion and peripheral iris configuration. Amoderate positive correlation between van Herick grade and peripheral iris configuration was found which was statistically significant (rs=0.42, p < 0.001). Astatistically significant and moderate positive correlation was also detected between van Herick grade and the level of iris insertion (rs=0.45, p < 0.001). The van Herick grade has a moderately positive relationship with the peripheral iris configuration and true level of iris insertion.

  19. Sensor-fusion-based biometric identity verification

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W. [Sandia National Labs., Albuquerque, NM (United States); Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L. [New Mexico State Univ., Las Cruces, NM (United States). Electronic Vision Research Lab.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person`s identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm.

  20. Unconstrained and Contactless Hand Geometry Biometrics

    Directory of Open Access Journals (Sweden)

    Carmen Sánchez-Ávila

    2011-10-01

    Full Text Available This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely Support Vector Machines (SVM and k-Nearest Neighbour (k-NN. Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  1. A biometric method to secure telemedicine systems.

    Science.gov (United States)

    Zhang, G H; Poon, Carmen C Y; Li, Ye; Zhang, Y T

    2009-01-01

    Security and privacy are among the most crucial issues for data transmission in telemedicine systems. This paper proposes a solution for securing wireless data transmission in telemedicine systems, i.e. within a body sensor network (BSN), between the BSN and server as well as between the server and professionals who have assess to the server. A unique feature of this solution is the generation of random keys by physiological data (i.e. a biometric approach) for securing communication at all 3 levels. In the performance analysis, inter-pulse interval of photoplethysmogram is used as an example to generate these biometric keys to protect wireless data transmission. The results of statistical analysis and computational complexity suggest that this type of key is random enough to make telemedicine systems resistant to attacks.

  2. Sensor-fusion-based biometric identity verification

    International Nuclear Information System (INIS)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person's identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm

  3. IRIS economics. A sensitivity review

    International Nuclear Information System (INIS)

    Miller, Keith

    2003-01-01

    IRIS (International Reactor Innovative and Secure) is a small to medium advanced light water cooled modular reactor being developed by an international consortium led by Westinghouse/BNFL. This reactor design is specifically aimed at utilities looking to install new (or replacement) nuclear capacity to match market demands, or at developing countries for their distributed power needs. To determine the optimal configuration for IRIS, analysis was undertaken to establish Generation Costs ($/MWh) and Internal Rate of Return (IRR %) to the Utility at alternative power ratings. This was then combined with global market projections for electricity demand out to 2030, segmented into key geographical regions. Finally this information is brought together to form insights, conclusions and recommendations regarding the optimal design. The resultant analysis reveals an optimum power rating for a single module of 335 MWe, with a construction period of 3 years or less and a minimum plant life of 60 years. Individual modules can be installed in a staggered fashion (3 equivalent to 1005 MWe) or built in pairs (2 sets of twin units' equivalent to 1340 MWe). Uncertainty in Market Clearing Price for electricity, Annual Operating Costs and Construction Costs primarily influence lifetime Net Present Values (NPV) and hence IRR % for Utilities. Generation Costs in addition are also influenced by Fuel Costs, Plant Output, Plant Availability and Plant Capacity Factor. Therefore for a site based on 3 single modules, located in North America, Generations Costs of 28.5 $/MWh are required to achieve an IRR of 20%, a level which enables IRIS to compete with all other forms of electricity production. Plant size is critical to commercial success. Sustained (lifetime) high factors for Plant Output, Availability and Capacity Factor are required to achieve a competitive advantage. Modularity offers Utilities the option to match their investments with market conditions, adding additional capacity as

  4. On enabling secure applications through off-line biometric identification

    International Nuclear Information System (INIS)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user's biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user's private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user's biometrics to facilitate cryptographic mechanisms

  5. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  6. Towards More Secure Biometric Readers for Effective Digital Forensic Investigation

    Science.gov (United States)

    Trabelsi, Zouheir; Al-Hemairy, Mohamed; Baggili, Ibrahim; Amin, Saad

    This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attacks. However, the experiments show that the tested biometric readers are secure from the ARP cache poisoning attack. This work demonstrates that biometric readers are easy targets for malicious network users, lack basic security mechanisms, and are vulnerable to common attacks. The confidentiality, and integrity of the log files in the biometric readers, could be compromised with such attacks. It then becomes important to study these attacks in order to find flags that could aid in a network forensic investigation of a biometric device.

  7. Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study

    Directory of Open Access Journals (Sweden)

    I. G. Damousis

    2012-01-01

    Full Text Available We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system. The algorithms examined are Gaussian Mixture Models (GMMs, Artificial Neural Networks (ANNs, Fuzzy Expert Systems (FESs, and Support Vector Machines (SVMs. The fusion of biometrics leads to security systems that exhibit higher recognition rates and lower false alarms compared to unimodal biometric security systems. Supervised learning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation/testing took place with patterns from the same database which were not included in the training dataset. The comparison of the algorithms reveals that the biometrics fusion system is superior to the original unimodal systems and also other fusion schemes found in the literature.

  8. Iris pigment epithelial cysts in a newborn

    Directory of Open Access Journals (Sweden)

    Zargar, Shabnam

    2016-04-01

    Full Text Available Purpose: We report a case of iris pigment epithelial cysts in a newborn and discuss the importance of an accurate diagnosis for prevention of amblyopia.Methods: We describe a case of an abnormal red reflex seen on a newborn exam.Results: A full-term female born via normal spontaneous vaginal delivery without any complications was seen in the newborn nursery. She was noted to have an abnormal eye exam. Pupils were large with circular dark excrescences of the iris pigment epithelium. She was referred to a pediatric ophthalmologist where she was noted to fixate and follow faces. No afferent pupillary defect was seen. OD red reflex was normal whereas OS red reflex was blocked mostly by dark excrescences. A 2– dark brown lesion was seen in the OD iris and a 3–5 mm dark brown lesion was seen in the OS iris, consistent with a pupillary iris pigment epithelial cyst. Central visual axis was clear OU. Glaucoma was not present and patching was not performed. Observations and clinical photographs were recommended with follow-up in three months.Conclusion: Iris pigment epithelial cysts are uncommonly seen in children. The primary care provider first seeing a newborn must be aware of lesions obscuring a red reflex with appropriate follow-up. Follow-up in three months with IOP measurements is recommended. Iris pigment epithelial cysts in children may be a cause of amblyopia, thus prompt evaluation is important for prognostic purposes and the prevention of amblyopia.

  9. IRIS Toxicological Review of Thallium and Compounds ...

    Science.gov (United States)

    Thallium compounds are used in the semiconductor industry, the manufacture of optic lenses and low-melting glass, low-temperature thermometers, alloys, electronic devices, mercury lamps, fireworks, and imitation germs, and clinically as an imaging agent in the diagnosis of certain tumors. EPA's assessment of noncancer health effects and carcinogenic potential of thallium compounds was last prepared and added to the IRIS database between 1988 and 1990. The IRIS program is preparing an assessment that will incorporate current health effects information available for thallium and compounds, and current risk assessment methods. The IRIS assessment for thallium compounds will consist of a Toxicological Review and IRIS Summary. The Toxicological Review is a critical review of the physiochemical and toxicokinetic properties of a chemical, and its toxicity in humans and experimental systems. The assessment will present reference values for the noncancer effects of thallium compounds (RfD and Rfc), and a cancer assessment. The Toxicological Review and IRIS Summary have been subject to Agency review, Interagency review, and external scientific peer review. The final product will reflect the Agency opinion on the overall toxicity of thallium and compounds. EPA is undertaking an Integrated Risk Information System (IRIS) health assessment for thallium and compounds. IRIS is an EPA database containing Agency scientific positions on potential adverse human health effec

  10. Off-Angle Iris Correction Methods

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J [ORNL; Thompson, Joseph T [ORNL; Karakaya, Mahmut [ORNL; Boehnen, Chris Bensing [ORNL

    2016-01-01

    In many real world iris recognition systems obtaining consistent frontal images is problematic do to inexperienced or uncooperative users, untrained operators, or distracting environments. As a result many collected images are unusable by modern iris matchers. In this chapter we present four methods for correcting off-angle iris images to appear frontal which makes them compatible with existing iris matchers. The methods include an affine correction, a retraced model of the human eye, measured displacements, and a genetic algorithm optimized correction. The affine correction represents a simple way to create an iris image that appears frontal but it does not account for refractive distortions of the cornea. The other method account for refraction. The retraced model simulates the optical properties of the cornea. The other two methods are data driven. The first uses optical flow to measure the displacements of the iris texture when compared to frontal images of the same subject. The second uses a genetic algorithm to learn a mapping that optimizes the Hamming Distance scores between off-angle and frontal images. In this paper we hypothesize that the biological model presented in our earlier work does not adequately account for all variations in eye anatomy and therefore the two data-driven approaches should yield better performance. Results are presented using the commercial VeriEye matcher that show that the genetic algorithm method clearly improves over prior work and makes iris recognition possible up to 50 degrees off-angle.

  11. Role of Arbuscular Mycorrhizal Fungi on Iris

    Directory of Open Access Journals (Sweden)

    CHEN Yuan

    2014-06-01

    Full Text Available For efficiency using the amphibious plant iris to restore polluted water, the promoting effect of different arbuscular mycorrhiza fungi(AMFon iris was investigated, by monitoring the plant growth index, the physicochemical properties of the soil and the plant photosynthesis indexes. The result showed that the promoting effects of the AMF on the aboveground part and the underground part of the iris were based on different mechanism. For the underground part of the iris, the AMF stimulated its growth through the nutrient enrichment which was performed by the enormous hypha network. The nitrogen absorbing rate of the G. mosseae and the G. intraradices infected iris increased about 71.75% and 42.55%, and the phosphorous absorbing rate increased 8.36% and 9.5% separately. For the aboveground part of the iris, the AMF strengthened the conductance of the leaves’ stomas to control the balance between the net photosynthesis rate and the transpiration rate, so that the utilization rate of water resources was optimized, the metabolic rate was accelerated and the growth of the plant was promoted eventually. In this study, the promoting effect of the G. mosseae on the photosynthesis rate of the iris was significantly better than that of the G. intraradices(P<0.05.

  12. Device for biometric verification of maternity

    OpenAIRE

    Lalović Komlen; Milosavljević Milan; Tot Ivan; Maček Nemanja

    2015-01-01

    Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that refere...

  13. A biometric approach to laboratory rodent identification.

    Science.gov (United States)

    Cameron, Jens; Jacobson, Christina; Nilsson, Kenneth; Rögnvaldsson, Thorsteinn

    2007-03-01

    Individual identification of laboratory rodents typically involves invasive methods, such as tattoos, ear clips, and implanted transponders. Beyond the ethical dilemmas they may present, these methods may cause pain or distress that confounds research results. The authors describe a prototype device for biometric identification of laboratory rodents that would allow researchers to identify rodents without the complications of other methods. The device, which uses the rodent's ear blood vessel pattern as the identifier, is fast, automatic, noninvasive, and painless.

  14. Heart Electrical Actions as Biometric Indicia

    Science.gov (United States)

    Schipper, John F. (Inventor); Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor); Belousof, Eugene (Inventor)

    2013-01-01

    A method and associated system for use of statistical parameters based on peak amplitudes and/or time interval lengths and/or depolarization-repolarization vector angles and/or depolarization-repolarization vector lengths for PQRST electrical signals associated with heart waves, to identify a person. The statistical parameters, estimated to be at least 192, serve as biometric indicia, to authenticate, or to decline to authenticate, an asserted identity of a candidate person.

  15. Iris Recognition Method Based on Natural Open Eyes | Latha ...

    African Journals Online (AJOL)

    ... makes codes to feature points and figures the iris pattern by iris codes. Finally, sorts the different iris patterns by auto accommodated pattern matching method and gives the recognition results. Many experiments show the recognition rates of this method can reach 99.687% that can meet the demand of iris recognition.

  16. 78 FR 44136 - Agency Information Collection Activities: Office of Biometric Identity Management (OBIM...

    Science.gov (United States)

    2013-07-23

    ... Security, National Protection and Programs Directorate, Office of Biometric Identity Management. Title... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0016] Agency Information Collection Activities: Office of Biometric Identity Management (OBIM) Biometric Data Collection at the Ports of Entry...

  17. From clothing to identity; manual and automatic soft biometrics

    OpenAIRE

    Jaha, Emad Sami; Nixon, Mark S.

    2016-01-01

    Soft biometrics have increasingly attracted research interest and are often considered as major cues for identity, especially in the absence of valid traditional biometrics, as in surveillance. In everyday life, several incidents and forensic scenarios highlight the usefulness and capability of identity information that can be deduced from clothing. Semantic clothing attributes have recently been introduced as a new form of soft biometrics. Although clothing traits can be naturally described ...

  18. Compressed domain ECG biometric with two-lead features

    Science.gov (United States)

    Lee, Wan-Jou; Chang, Wen-Whei

    2016-07-01

    This study presents a new method to combine ECG biometrics with data compression within a common JPEG2000 framework. We target the two-lead ECG configuration that is routinely used in long-term heart monitoring. Incorporation of compressed-domain biometric techniques enables faster person identification as it by-passes the full decompression. Experiments on public ECG databases demonstrate the validity of the proposed method for biometric identification with high accuracies on both healthy and diseased subjects.

  19. Biometric Security: Alternatif Pengendalian Dalam Sistem Informasi Akuntansi Terkomputerisasi

    OpenAIRE

    Tarigan, Josua

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  20. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    OpenAIRE

    Josua Tarigan

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  1. Behavioural Biometrics for Multi-factor Authentication in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna; Šárek, M.

    2012-01-01

    Roč. 8, č. 5 (2012), s. 19-24 ISSN 1801-5603 Grant - others:GA MŠk(CZ) LM2010005; GA UK(CZ) SVV-2012-264513 Institutional support: RVO:67985807 Keywords : biometric s * anatomical-physiological biometric s * behavioural biometric s * multi-factor authentication * keystroke dynamics * mouse dynamics Subject RIV: IN - Informatics, Computer Science http://www.ejbi.org/img/ejbi/2012/5/Schlenker_en.pdf

  2. Improving Speaker Recognition by Biometric Voice Deconstruction

    Directory of Open Access Journals (Sweden)

    Luis Miguel eMazaira-Fernández

    2015-09-01

    Full Text Available Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g. YouTube to broadcast its message. In this new scenario, classical identification methods (such fingerprints or face recognition have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. Through the present paper, a new methodology to characterize speakers will be shown. This methodology is benefiting from the advances achieved during the last years in understanding and modelling voice production. The paper hypothesizes that a gender dependent characterization of speakers combined with the use of a new set of biometric parameters extracted from the components resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract gender-dependent extended biometric parameters are given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions.

  3. 360-Degree Iris Burns Following Conductive Keratoplasty.

    Science.gov (United States)

    Çakir, Hanefi; Genç, Selim; Güler, Emre

    2016-11-01

    The authors report a case with multiple iris burns after conductive keratoplasty to correct hyperopia. Case report. A 52-year-old woman with hyperopia had a previous conductive keratoplasty procedure and underwent a conductive keratoplasty re-treatment 6 months later. Postoperatively, she presented with 360-degree iris burns in both eyes that were correlated with the corneal conductive keratoplasty scars. In addition, specular microscopy revealed decreased endothelial cell density for both eyes. This is the first reported case of iris burns associated with conductive keratoplasty. [J Refract Surg. 2016;32(11):776-778.]. Copyright 2016, SLACK Incorporated.

  4. Infrared sensing of non-observable human biometrics

    Science.gov (United States)

    Willmore, Michael R.

    2005-05-01

    Interest and growth of biometric recognition technologies surged after 9/11. Once a technology mainly used for identity verification in law enforcement, biometrics are now being considered as a secure means of providing identity assurance in security related applications. Biometric recognition in law enforcement must, by necessity, use attributes of human uniqueness that are both observable and vulnerable to compromise. Privacy and protection of an individual's identity is not assured during criminal activity. However, a security system must rely on identity assurance for access control to physical or logical spaces while not being vulnerable to compromise and protecting the privacy of an individual. The solution resides in the use of non-observable attributes of human uniqueness to perform the biometric recognition process. This discussion will begin by presenting some key perspectives about biometric recognition and the characteristic differences between observable and non-observable biometric attributes. An introduction to the design, development, and testing of the Thermo-ID system will follow. The Thermo-ID system is an emerging biometric recognition technology that uses non-observable patterns of infrared energy naturally emanating from within the human body. As with all biometric systems, the infrared patterns recorded and compared within the Thermo-ID system are unique and individually distinguishable permitting a link to be confirmed between an individual and a claimed or previously established identity. The non-observable characteristics of infrared patterns of human uniqueness insure both the privacy and protection of an individual using this type of biometric recognition system.

  5. Secure access control to hidden data by biometric features

    Science.gov (United States)

    Cancellaro, M.; Carli, M.; Egiazarian, K.; Neri, A.

    2007-04-01

    In this paper, a novel authentications system combining biometric cryptosystems with digital watermarking is presented. One of the main vulnerabilities of the existing data hiding systems is the public knowledge of the embedding domain. We propose the use of biometric data, minutiae fingerprint set, for generating the encryption key needed to decompose an image in the Tree structured Haar transform. The uniqueness of the biometrics key together with other, embedded, biometric information guarantee the authentication of the user. Experimental tests show the effectiveness of the proposed system.

  6. Biometric technology authentication, biocryptography, and cloud-based architecture

    CERN Document Server

    Das, Ravi

    2014-01-01

    Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture is ideal for business, IT, or security managers that are faced with the task of making purchasing, migration, or adoption decisions. It brings biometrics down to an understandable level, so that you can immediately begin to implement the concepts discussed.Exploring the technological and social implications of widespread biometric use, the book considers the

  7. Deep Learning-Based Iris Segmentation for Iris Recognition in Visible Light Environment

    Directory of Open Access Journals (Sweden)

    Muhammad Arsalan

    2017-11-01

    Full Text Available Existing iris recognition systems are heavily dependent on specific conditions, such as the distance of image acquisition and the stop-and-stare environment, which require significant user cooperation. In environments where user cooperation is not guaranteed, prevailing segmentation schemes of the iris region are confronted with many problems, such as heavy occlusion of eyelashes, invalid off-axis rotations, motion blurs, and non-regular reflections in the eye area. In addition, iris recognition based on visible light environment has been investigated to avoid the use of additional near-infrared (NIR light camera and NIR illuminator, which increased the difficulty of segmenting the iris region accurately owing to the environmental noise of visible light. To address these issues; this study proposes a two-stage iris segmentation scheme based on convolutional neural network (CNN; which is capable of accurate iris segmentation in severely noisy environments of iris recognition by visible light camera sensor. In the experiment; the noisy iris challenge evaluation part-II (NICE-II training database (selected from the UBIRIS.v2 database and mobile iris challenge evaluation (MICHE dataset were used. Experimental results showed that our method outperformed the existing segmentation methods.

  8. [Color and form changes in the iris].

    Science.gov (United States)

    Wollensak, J

    1999-05-01

    The high variability of iris structures can be used for diagnostic purposes. An overview of the numerous changes visible at the slit lamp and possible diagnosis. Short description of possible irispathology with hints on pathology and treatment.

  9. On the Design of Forgiving Biometric Security Systems

    Science.gov (United States)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  10. Assessment of iris surface features and their relationship with iris thickness in Asian eyes.

    Science.gov (United States)

    Sidhartha, Elizabeth; Gupta, Preeti; Liao, Jiemin; Tham, Yih-Chung; Cheung, Carol Y; He, Mingguang; Wong, Tien Y; Aung, Tin; Cheng, Ching-Yu

    2014-05-01

    To assess iris surface features in Asian eyes and examine their associations with iris thickness measured by anterior segment optical coherence tomography (AS OCT). Cross-sectional study. We recruited 250 subjects from the Singapore Malay Eye Study. We obtained standardized slit-lamp photographs and developed a grading system assessing iris crypts (by number and size), furrows (by number and circumferential extent), and color (higher grade denoting darker iris). Vertical and horizontal cross-sections of the anterior chamber were imaged using AS OCT. Intragrader and intergrader agreements in the grading of iris surface were assessed by weighted κ (κ(w)) statistic. Associations of the average iris thickness with the grade of iris features were assessed using linear regression analysis. Frequency and size of iris crypts, furrows, and color; iris thickness at 750 μm (IT750) and 2000 μm (IT2000) from the scleral spur; and maximum iris thickness (ITM) averaged from the 4 quarters. Three hundred sixty-four eyes had complete and gradable data for crypts and color; 330 eyes were graded for furrows. The grading scheme showed good intragrader (crypt κ(w) = 0.919, furrow κ(w) =0.901, color κ(w) = 0.925) and intergrader (crypt κ(w) = 0.775, furrow κ(w) = 0.836, color κ(w) = 0.718) agreements. Higher crypt grade was associated independently with thinner IT750 (β [change in iris thickness per grade higher] = -0.007; P = 0.029), IT2000 (β = -0.018; P iris was also associated with thicker IT750 (β = 0.014; P = 0.001). Iris surface features, assessed and measured from slit-lamp photographs, correlate well with iris thickness. Irises with more crypts are thinner; irises with more extensive furrows and darker color are thicker peripherally. These findings may provide another means to assess angle closure risk based on iris features. Copyright © 2014 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  11. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Directory of Open Access Journals (Sweden)

    Rohit M Thanki

    2016-08-01

    Full Text Available Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature.

  12. Performance and Security Evaluation of Biometric-Based Web ...

    African Journals Online (AJOL)

    This paper evaluates the performance and security of biometric based web application, narrating the importance and challenges of using biometric to identify individuals in the web. To evaluate the system, Student Attendance Monitoring System was developed using java technology and MYSQL as the backend. The system ...

  13. Trends in Biometric Techonology | Boodoo-Jahangeer | University of ...

    African Journals Online (AJOL)

    Behavioural characteristics are based on data derived from actions, such as speech and signature. The aim of this paper is to provide an overview of the field of biometrics including the current trends. The commonly-used biometrics have been evaluated and some future research directions have been identified. Keywords: ...

  14. Biometric Authentication Systems Attacks: Liveness Detection to the ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... Keywords: Liveness, Biometrics, Biometric Systems, Authentication, Verification,. Vulnerabilities, attacks, Threats. 1.0 Introduction. Informaton security is the profession that protects the Confidentiality,. Integrity and Availability (CIA) of information systems and information services. The CIA triad is the pillar of.

  15. Factors impacting on the adoption of biometric technology by South ...

    African Journals Online (AJOL)

    12Key words: biometrics, authentication, financial sector, information security, empirical research, legacy systems ... Since a person cannot leave an eye or hand stuck on a computer monitor as they would a username .... the respondent was aware of, or had interacted with, biometric devices before, as this could influence ...

  16. Semiparametric copula models for biometric score level fusion

    NARCIS (Netherlands)

    Susyanto, N.

    2016-01-01

    In biometric recognition, biometric samples (images of faces, fingerprints, voices, gaits, etc.) of people are compared and matchers (classifiers) indicate the level of similarity between any pair of samples by a score. If we model the joint distribution of all scores by a (semiparametric) Gaussian

  17. Biometric Quantization through Detection Rate Optimized Bit Allocation

    NARCIS (Netherlands)

    Chen, C.; Veldhuis, Raymond N.J.; Kevenaar, T.A.M.; Akkermans, A.H.M.

    2009-01-01

    Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for

  18. Biometric Authentication Systems Attacks: Liveness Detection to the ...

    African Journals Online (AJOL)

    Before current era of security complexities, password alone was enough to protect systems. However, hackers have perfected algorithms to break through data bases protected only by pass words. This has led to extended research towards the deployment of of Biometric Authentication Systems (BAS). Biometric systems are ...

  19. Efficient and privacy-preserving biometric identification in cloud

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-09-01

    Full Text Available With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server.

  20. Forensic biometrics: From two communities to one discipline

    NARCIS (Netherlands)

    Meuwly, Didier; Meuwly, Didier; Veldhuis, Raymond N.J.

    2012-01-01

    This article describes how the fields of biometrics and forensic science can contribute and benefit from each other. The aim is to foster the development of new methods and tools improving the current forensic biometric applications and allowing for the creation of new ones. The article begins with

  1. Advances in biometrics for secure human authentication and recognition

    CERN Document Server

    Kisku, Dakshina Ranjan; Sing, Jamuna Kanta

    2013-01-01

    GENERAL BIOMETRICSSecurity and Reliability Assessment for Biometric Systems; Gayatri MirajkarReview of Human Recognition Based on Retinal Images; Amin DehghaniADVANCED TOPICS IN BIOMETRICSVisual Speech as Behavioral Biometric; Preety Singh, Vijay Laxmi, and Manoj Singh GaurHuman Gait Signature for Biometric Authentication; Vijay JohnHand-Based Biometric for Personal Identification Using Correlation Filter Classifier; Mohammed Saigaa , Abdallah Meraoumia , Salim Chitroub, and Ahmed BouridaneOn Deciding the Dynamic Periocular Boundary for Human Recognition; Sambit Bakshi , Pankaj Kumar Sa, and Banshidhar MajhiRetention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System; Nilanjan Dey, Bijurika Nandi, Poulami Das, Achintya Das, and Sheli Sinha ChaudhuriFacial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis; N. G. Chitaliya and A. I. TrivediCASE STUDIES AND LA...

  2. Are Haar-like Rectangular Features for Biometric Recognition Reducible?

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.

    2013-01-01

    Biometric recognition is still a very difficult task in real-world scenarios wherein unforeseen changes in degradations factors like noise, occlusion, blurriness and illumination can drastically affect the extracted features from the biometric signals. Very recently Haar-like rectangular features...... which have usually been used for object detection were introduced for biometric recognition resulting in systems that are robust against most of the mentioned degradations [9]. The problem with these features is that one can define many different such features for a given biometric signal...... and it is not clear whether all of these features are required for the actual recognition or not. This is exactly what we are dealing with in this paper: How can an initial set of Haar-like rectangular features, that have been used for biometric recognition, be reduced to a set of most influential features...

  3. Can visual evoked potentials be used in biometric identification?

    Science.gov (United States)

    Power, Alan J; Lalor, Edmund C; Reilly, Richard B

    2006-01-01

    Due to known differences in the anatomical structure of the visual pathways and generators in different individuals, the use of visual evoked potentials offers the possibility of an alternative to existing biometrics methods. A study based on visual evoked potentials from 13 individuals was carried out to assess the best combination of temporal, spectral and AR modeling features to realize a robust biometric. From the results it can be concluded that visual evoked potentials show considerable biometric qualities, with classification accuracies reaching a high of 86.54% and that a specific temporal and spectral combination was found to be optimal. Based on these results the visual evoked potential may be a useful tool in biometric identification when used in conjunction with more established biometric methods.

  4. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  5. On humanitarian refugee biometrics and new forms of intervention

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov

    2017-01-01

    This article traces a development from UNHCR's initial use of biometrics in a few pilot projects (early/mid-2000s), to the emergence of a UNHCR policy where biometric registration is considered a "strategic decision". Next it engages key insights from current debates about 'materiality' and agentic...... capacity in combination with current debates about new forms of intervention. Finally, these insights are combined into a framework through which the last part of the article engages critically with this development of humanitarian refugee biometrics by posing the following question: how does an approach...... biometric refugee data, has affected the relationship between UNHCR, donor states, host states and refugees, the article shows how UNHCR's trialling of new biometric technologies, combined with actual and potential data-sharing practices, has advanced the technology's performance as well as its...

  6. Sequences associated with human iris pigmentation.

    Science.gov (United States)

    Frudakis, Tony; Thomas, Matthew; Gaskin, Zach; Venkateswarlu, K; Chandra, K Suresh; Ginjupalli, Siva; Gunturi, Sitaram; Natrajan, Sivamani; Ponnuswamy, Viswanathan K; Ponnuswamy, K N

    2003-12-01

    To determine whether and how common polymorphisms are associated with natural distributions of iris colors, we surveyed 851 individuals of mainly European descent at 335 SNP loci in 13 pigmentation genes and 419 other SNPs distributed throughout the genome and known or thought to be informative for certain elements of population structure. We identified numerous SNPs, haplotypes, and diplotypes (diploid pairs of haplotypes) within the OCA2, MYO5A, TYRP1, AIM, DCT, and TYR genes and the CYP1A2-15q22-ter, CYP1B1-2p21, CYP2C8-10q23, CYP2C9-10q24, and MAOA-Xp11.4 regions as significantly associated with iris colors. Half of the associated SNPs were located on chromosome 15, which corresponds with results that others have previously obtained from linkage analysis. We identified 5 additional genes (ASIP, MC1R, POMC, and SILV) and one additional region (GSTT2-22q11.23) with haplotype and/or diplotypes, but not individual SNP alleles associated with iris colors. For most of the genes, multilocus gene-wise genotype sequences were more strongly associated with iris colors than were haplotypes or SNP alleles. Diplotypes for these genes explain 15% of iris color variation. Apart from representing the first comprehensive candidate gene study for variable iris pigmentation and constituting a first step toward developing a classification model for the inference of iris color from DNA, our results suggest that cryptic population structure might serve as a leverage tool for complex trait gene mapping if genomes are screened with the appropriate ancestry informative markers.

  7. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  8. Device for biometric verification of maternity

    Directory of Open Access Journals (Sweden)

    Lalović Komlen

    2015-01-01

    Full Text Available Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that reference. Technical issue that is solved with this work and the proposed device is scanning, processing, and storing encrypted biometric templates with a goal to provide a 100% guarantee maternity for each new born child. Scanning the fingerprints of both mother and the child simultaneously, at moment of birth, and pairing them with unique ID reference removes potential fears occurring from hospital negligence to malicious activities, while the data encryption raises the whole process to the highest level of security and confidentiality. The main contribution of the device that removes the fear that almost every mother has in this period as it provides an answer to the question: “Is this my baby?” with a 100% guarantee “It’s certainly yours!”

  9. Chaotic Neural Network for Biometric Pattern Recognition

    Directory of Open Access Journals (Sweden)

    Kushan Ahmadian

    2012-01-01

    Full Text Available Biometric pattern recognition emerged as one of the predominant research directions in modern security systems. It plays a crucial role in authentication of both real-world and virtual reality entities to allow system to make an informed decision on granting access privileges or providing specialized services. The major issues tackled by the researchers are arising from the ever-growing demands on precision and performance of security systems and at the same time increasing complexity of data and/or behavioral patterns to be recognized. In this paper, we propose to deal with both issues by introducing the new approach to biometric pattern recognition, based on chaotic neural network (CNN. The proposed method allows learning the complex data patterns easily while concentrating on the most important for correct authentication features and employs a unique method to train different classifiers based on each feature set. The aggregation result depicts the final decision over the recognized identity. In order to train accurate set of classifiers, the subspace clustering method has been used to overcome the problem of high dimensionality of the feature space. The experimental results show the superior performance of the proposed method.

  10. Correlation between intraocular pressure and the biometric structure of the anterior chamber in patients of chronic renal failure with hemodialysis

    Directory of Open Access Journals (Sweden)

    Zhi-Ying Yu

    2017-02-01

    Full Text Available AIM: To investigate the correlation between intraocular pressure(IOPchanges pre- and post-hemodialysis(HDand the biometric structure of the anterior chamber in patients of chronic renal failure. METHODS: Fifty-two patients(take right eye as study onewith hemodialysis that were diagnosed with chronic renal failure by nephrology in our hospital from January 2015 to December 2015 were collected. Fifty-two eyes were divided into four groups based on Shaffer classification combined with ultrasound biomicroscopy(UBMand gonioscopy manifestations: wide angle group, narrow angle group, extremely narrow group and close angle group. Venous blood was collected to get plasma colloid osmotic pressure before HD and within 60s after HD. IOP was measured with rebound intraocular pressure gauge in a supine positon approximately 30min before starting HD, 2h after HD begin and approximately 30min after HD ending. Approximately 30min before and after HD, central corneal thickness was measured with corneal endothelial cell counter, central anterior chamber depth and lens thickness were taken by A scan, angle opening distance, trabecular iris angle, iris thickness and ciliary body thickness were measured by UBM. RESULTS: Plasma osmotic pressure reduced after HD, the difference was statistically significant(t=3.04, PF=41.69, PPPF=6.44, PPt=2.61, PCONCLUSION: The influence of hemodialysis on IOP is related to the biometric structure of the anterior chamber. And extremely narrow angle is risk factor of elevated IOP during hemodialysis, narrow angle may be a risk factor. While patients with wide angle is relatively safe. We suggest to take ocular examination as early as possible for patients with hemodialysis, and focus on patients with narrow angle.

  11. DoD Biometrics Collaboration Forum 25-27 Jan 2011. Event Report

    Science.gov (United States)

    2011-03-01

    UNCLASSIFIED UNCLASSIFIED Event Report compiled and published by the Biometrics Identity Management Agency March 2011 Report... Event Report 6 Session Summaries International Biometrics Data Sharing Session Leads: Mr. Tony Demestihas, Biometrics Identity Management ...Privilege Management . 2011 DoD Biometrics Collaboration Forum Event Report 26  Reviewed and established consensus on differing roles of

  12. International Reactor Innovative and Secure (IRIS) summary

    International Nuclear Information System (INIS)

    Carelli, Mario D.

    2001-01-01

    The IRIS (International Reactor Innovative and Secure) reactor is described in the first part of the presentation. IRIS is a light water cooled reactor with an integral configuration, where steam generators, pumps and pressurizer are inside the reactor vessel. Partially funded by the DOE NERI program, IRIS is being developed by an international consortium of 16 organizations from seven countries. A key IRIS characteristic is its 'safety by design' approach which strives to eliminate, by design, as many accidents as possible rather than coping with their consequences. Initial returns are very positive; out of the eight Class IV accidents considered in the AP600 only one remains as a Class IV in IRIS, and at much reduced probability. Small-to-medium LOCAs have minimal consequences as the core remains safely under water for days, without the need for safety injection or water makeup. In spite of its novelty IRIS is firmly grounded on proven LWR technology and therefore a prototype is not needed to assure design certification. Rather, very extensive scaled tests will be performed to investigate the performance of in-vessel components such as steam generators and pumps, both individually and as interactive systems. Accident sequences will also be simulated and tested to prove IRIS safety by design claims. The first core fuel is less than 5% enriched and the fuel assembly is very similar to existing PWR assemblies, so there is no licensing challenge regarding the fuel. Because of the safety by design approach, yielding simplifications In design and accident management (e.g., IRIS does not have an emergency core cooling system), some accident scenarios are eliminated and others have lesser consequences. Thus, simplification and streamlining of the regulatory process might be possible. Risk informed regulation will be coupled with safety by design to show lower accident and damage probabilities. This could lead to a relaxation of siting regulatory requirements. It is

  13. Proton beam radiotherapy of iris melanoma

    International Nuclear Information System (INIS)

    Damato, Bertil; Kacperek, Andrzej; Chopra, Mona; Sheen, Martin A.; Campbell, Ian R.; Errington, R. Douglas

    2005-01-01

    Purpose: To report on outcomes after proton beam radiotherapy of iris melanoma. Methods and Materials: Between 1993 and 2004, 88 patients with iris melanoma received proton beam radiotherapy, with 53.1 Gy in 4 fractions. Results: The patients had a mean age of 52 years and a median follow-up of 2.7 years. The tumors had a median diameter of 4.3 mm, involving more than 2 clock hours of iris in 32% of patients and more than 2 hours of angle in 27%. The ciliary body was involved in 20%. Cataract was present in 13 patients before treatment and subsequently developed in another 18. Cataract had a 4-year rate of 63% and by Cox analysis was related to age (p = 0.05), initial visual loss (p < 0.0001), iris involvement (p < 0.0001), and tumor thickness (p < 0.0001). Glaucoma was present before treatment in 13 patients and developed after treatment in another 3. Three eyes were enucleated, all because of recurrence, which had an actuarial 4-year rate of 3.3% (95% CI 0-8.0%). Conclusions: Proton beam radiotherapy of iris melanoma is well tolerated, the main problems being radiation-cataract, which was treatable, and preexisting glaucoma, which in several patients was difficult to control

  14. PERSISTENT PUPILLARY MEMBRANE OR ACCESSORY IRIS MEMBRANE?.

    Science.gov (United States)

    Gavriş, Monica; Horge, Ioan; Avram, Elena; Belicioiu, Roxana; Olteanu, Ioana Alexandra; Kedves, Hanga

    2015-01-01

    Frequently, in literature and curent practice, accessory iris membrane (AIM) and persistant pupillary membrane (PPM) are confused. Both AIM and PPM are congenital iris anomalies in which fine or thick iris strands arrise form the collarette and obscure the pupil. AIM, which is also called iris duplication, closely resembles the normal iris tissue in color and thickness and presents a virtual second pseudopupil aperture in the centre while PPM even in its extreme forms presents as a translucent or opaque membranous structure that extends across the pupil and has no pseudopupil. Mydriatiscs, laser treatment or surgery is used to clear the visual axis and optimize visual development. Surgical intervention is reserved for large, dense AIMs and PPMs. Our patient, a 29 year old male, has come with bilateral dense AIM, bilateral compound hyperopic astigmatism, BCVA OD = 0.6, BCVA OS = 0.4, IOP OU = 17 mmHg. To improve the visual acuity of the patient we decided to do a bilateral membranectomy, restoring in this way transparency of the visual axis. After surgery, the visual acuity improved to BCVA OD= 0.8, BCVA OS=0.8.

  15. IRIS Toxicological Review of Ammonia (Revised External ...

    Science.gov (United States)

    In August 2013, EPA submitted a revised draft IRIS assessment of ammonia to the agency's Science Advisory Board (SAB) and posted this draft on the IRIS website. EPA had previously released a draft of the assessment for public comment, held a public meeting about the draft, and then revised it based on the comments received. The SAB CAAC-Ammonia panel will review this draft assessment. Details about the meeting dates, times, and location are available via the Federal Register Notice posted on March 25, 2014. The SAB provided information on how the public can participate in the external peer review meetings, as well as instructions about how to provide comments to the SAB in the notice. Additional information on the SAB review of ammonia is on the SAB website. Report Information: The Toxicological Review of Ammonia was originally released for a 60-day public comment period on June 8, 2012. [Federal Register Notice Jun 8, 2012] EPA revised the toxicological review in response to the public comments received. EPA has released the revised external review draft ammonia assessment and the SAB CAAC is conducting a peer review of the scientific basis supporting the assessment that will appear in the Integrated Risk Information System (IRIS) database. Information regarding the peer review can be found at the SAB review of ammonia website. EPA is undertaking an Integrated Risk Information System (IRIS) health assessment for ammonia. IRIS is an EPA database cont

  16. Periorbital biometric measurements using ImageJ software: Standardisation of technique and assessment of intra- and interobserver variability

    Directory of Open Access Journals (Sweden)

    R Rajyalakshmi

    2017-01-01

    Full Text Available Purpose: To assess the reliability and repeatability of periorbital biometric measurements using ImageJ software and to assess if the horizontal visible iris diameter (HVID serves as a reliable scale for facial measurements. Methods: This study was a prospective, single-blind, comparative study. Two clinicians performed 12 periorbital measurements on 100 standardised face photographs. Each individual’s HVID was determined by Orbscan IIz and used as a scale for measurements using ImageJ software. All measurements were repeated using the ‘average’ HVID of the study population as a measurement scale. Intraclass correlation coefficient (ICC and Pearson product-moment coefficient were used as statistical tests to analyse the data. Results: The range of ICC for intra- and interobserver variability was 0.79–0.99 and 0.86–0.99, respectively. Test-retest reliability ranged from 0.66–1.0 to 0.77–0.98, respectively. When average HVID of the study population was used as scale, ICC ranged from 0.83 to 0.99, and the test-retest reliability ranged from 0.83 to 0.96 and the measurements correlated well with recordings done with individual Orbscan HVID measurements. Conclusion: Periorbital biometric measurements using ImageJ software are reproducible and repeatable. Average HVID of the population as measured by Orbscan is a reliable scale for facial measurements.

  17. AHMCT Intelligent Roadway Information System (IRIS) technical support and testing.

    Science.gov (United States)

    2011-12-01

    This report documents the research project AHMCT IRIS Technical Support and Testing, : performed under contract 65A0275, Task ID 1777. It presents an overview of the Intelligent : Roadway Information System (IRIS), and its design and function. ...

  18. IRIS Toxicological Review of Biphenyl (External Review Draft) ...

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of biphenyl that will appear in the Integrated Risk Information System (IRIS) database. EPA is undertaking a new health assessment for biphenyl for the Integrated Risk Information System (IRIS). The outcome of this project will be a Toxicological Review and IRIS and IRIS Summary of biohenyl that will be entered on the IRIS database. IRIS is an EPA database containing Agency scientific positions on potential adverse human health effects that may result from chronic (or lifetime) exposure to chemicals in the environment. IRIS contains chemical-specific summaries of qualitative and quantitative health information to evaluate potential public health risks associated with exposure assessment information to evaluate potential public health risks associated with environmental contaminants. The IRIS database is relied on for the development of risk assessments sites-specific environmental decisions, and rule making.

  19. Changes of the eye optics after iris constriction

    Directory of Open Access Journals (Sweden)

    Robert Montés-Micó

    2010-10-01

    Conclusion: Iris constriction slightly modifies the optics of the eye. The small hyperopic shift of the best image plane after iris constriction may be explained by a change in the lens shape and/or position.

  20. AHMCT Intelligent Roadway Information System (IRIS) technical support and testing

    Science.gov (United States)

    2011-12-31

    This report documents the research project AHMCT IRIS Technical Support and Testing, : performed under contract 65A0275, Task ID 1777. It presents an overview of the Intelligent : Roadway Information System (IRIS), and its design and function. ...

  1. A fourier transform quality measure for iris images

    CSIR Research Space (South Africa)

    Makinana, S

    2014-08-01

    Full Text Available to ensure that good quality images are selected for feature extraction, in order to improve iris recognition system. In addition, this research proposes a measure of iris image quality using a Fourier Transform. The experimental results demonstrate...

  2. Internet Renewable energy Information System (IRIS)

    DEFF Research Database (Denmark)

    Bäurle, Britta; Nielsen, Vilhjalmur; Ménard, Lionel

    1999-01-01

    Even though the Internet is now a widely accessible data source, the unorganised flood of information makes a specific request e.g. for renewable energy products inefficient. In addition, existing databases on renewable energies are often old and incomplete. The objective of IRIS has been...... to organise and retrieve renewable energy product information on the Internet instead of collecting it manually. Updating coincides with the self interestself-interest of manufacturers to present their latest renewable energy products on their own HTML documents. IRIS is based on a set of powerful tools...... and intends to find, extract, collect and index HTML documents with standardised META tags that are widely spread across web servers on the Internet. This paper presents the structure of IRIS, the software tools, and gives one example of how to categorise and prepare web-sites with product information...

  3. Image compression with Iris-C

    Science.gov (United States)

    Gains, David

    2009-05-01

    Iris-C is an image codec designed for streaming video applications that demand low bit rate, low latency, lossless image compression. To achieve compression and low latency the codec features the discrete wavelet transform, Exp-Golomb coding, and online processes that construct dynamic models of the input video. Like H.264 and Dirac, the Iris-C codec accepts input video from both the YUV and YCOCG colour spaces, but the system can also operate on Bayer RAW data read directly from an image sensor. Testing shows that the Iris-C codec is competitive with the Dirac low delay syntax codec which is typically regarded as the state-of-the-art low latency, lossless video compressor.

  4. Possibilities of dynamic biometrics for authentication and the circumstances for using dynamic biometric signature

    Directory of Open Access Journals (Sweden)

    Frantisek Hortai

    2018-01-01

    Full Text Available New information technologies alongside their benefits also bring new dangers with themselves. It is difficult to decide which authentication tool to use and implement in the information systems and electronic documents. The final decision has to compromise among the facts that it faces several conflicting requirements: highly secure tool, to be a user-friendly and user simplicity method, ensure protection against errors and failures of users, speed of authentication and provide these features for a reasonable price. Even when the compromised solution is found it has to fulfill the given technology standards. For the listed reasons the paper argues one of the most natural biometric authentication method the dynamic biometric signature and lists its related standards. The paper also includes measurement evaluation which solves the independence between the person’s signature and device on which it was created

  5. Multispectral iris fusion for enhancement, interoperability, and cross wavelength matching

    Science.gov (United States)

    Burge, Mark J.; Monaco, Matthew K.

    2009-05-01

    Traditionally, only a narrow band of the Near-Infrared (NIR) spectrum (700-900nm) is utilized for iris recognition since this alleviates any physical discomfort from illumination, reduces specular reflections and increases the amount of texture captured for some iris colors. However, previous research has shown that matching performance is not invariant to iris color and can be improved by imaging outside of the NIR spectrum. Building on this research, we demonstrate that iris texture increases with the frequency of the illumination for lighter colored sections of the iris and decreases for darker sections. Using registered visible light and NIR iris images captured using a single-lens multispectral camera, we illustrate how physiological properties of the iris (e.g., the amount and distribution of melanin) impact the transmission, absorbance, and reflectance of different portions of the electromagnetic spectrum and consequently affect the quality of the imaged iris texture. We introduce a novel iris code, Multispectral Enhanced irisCode (MEC), which uses pixel-level fusion algorithms to exploit texture variations elicited by illuminating the iris at different frequencies, to improve iris matcher performance and reduce Failure-To-Enroll (FTE) rates. Finally, we present a model for approximating an NIR iris image using features derived from the color and structure of a visible light iris image. The simulated NIR images generated by this model are designed to improve the interoperability between legacy NIR iris images and those acquired under visible light by enabling cross wavelength matching of NIR and visible light iris images.

  6. Assessing Vulnerability of Biometric Technologies for Identity Management Applications

    Science.gov (United States)

    2011-10-01

    Statement of Work (SOW), “Role of Biometrics in Identity Management for IT System Access Control”, describes an assessment of biometric options in...négligent des éléments humains qui peuvent stimuler la performance, de sécurité et les vulnérabilités. L’amélioration du cadre qui intègre des facteurs...for spreading the use of biometrics such as: workshops at IT security conferences, disseminating guidance across IT security working groups, and

  7. Heartbeat Signal from Facial Video for Biometric Recognition

    DEFF Research Database (Denmark)

    Haque, Mohammad Ahsanul; Nasrollahi, Kamal; Moeslund, Thomas B.

    2015-01-01

    Different biometric traits such as face appearance and heartbeat signal from Electrocardiogram (ECG)/Phonocardiogram (PCG) are widely used in the human identity recognition. Recent advances in facial video based measurement of cardio-physiological parameters such as heartbeat rate, respiratory rate......, and blood volume pressure provide the possibility of extracting heartbeat signal from facial video instead of using obtrusive ECG or PCG sensors in the body. This paper proposes the Heartbeat Signal from Facial Video (HSFV) as a new biometric trait for human identity recognition, for the first time...... approach. The potential of the proposed HSFV biometric for human identification is demonstrated on a public database....

  8. Developing a multimodal biometric authentication system using soft computing methods.

    Science.gov (United States)

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

  9. Iris Heterochromia and Unilateral Eyelash Hypertrichosis

    OpenAIRE

    Rao, Rajesh C.; Ballard, Tiffany N.S.; Chen, Teresa C.

    2015-01-01

    An 87-year-old female with a history of open-angle glaucoma presented with longer, thicker eyelashes on the right side compared to the left. Her irides were also different colors, as the right iris was brown and the left was hazel (green-brown). The patient had noticed a gradual darkening of her right iris and lengthening of her eyelashes over the last year, but denied visual changes or foreign-body sensation. Past medical history included a remote history of breast cancer treated by lumpecto...

  10. IRIS Toxicological Review of Carbon Tetrachloride (External ...

    Science.gov (United States)

    EPA conducted a peer review of the scientific basis supporting the human health hazard and dose-response assessment of carbon tetrachloride that will appear on the Integrated Risk Information System (IRIS) database. Peer review is meant to ensure that science is used credibly and appropriately in derivation of the dose-response assessments and toxicological characterization. EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of carbon tetrachloride that will appear on the Integrated Risk Information System (IRIS) database.

  11. IRIS Toxicological Review of Trimethylbenzenes (External ...

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of trimethylbenzenes that will appear in the Integrated Risk Information System (IRIS) database. EPA is reassessing its IRIS toxicological review of Trimethylbenzenes (1,2,3-;1,2,4-;1,3,5-). This trimethylbenzene reassessment consists of an oral reference dose (RfD), an inhalation reference concentration (RfC), an inhalation unit risk (IUR) and a cancer weight of evidence descriptor. This is the first assessment developing an RfC or IUR for this compound. This assessment is intended to provide human health data to support agency regulatory decisions.

  12. A modified COMS plaque for iris melanoma

    Directory of Open Access Journals (Sweden)

    Daniel J. Scanderbeg

    2011-09-01

    Full Text Available Melanoma of the iris is a rare condition compared to posterior ocular tumors and in this case report we presenta 51-year-old female patient with diffuse iris melanoma. Traditional COMS (Collaborative Ocular Melanoma Studyplaques are used at our institution for radiation therapy, so a novel modification of the traditional plaque was requiredto allow better conformance with placement on the cornea. The usual silastic insert was machined to dimensions incompliance with the cornea, placed without incident, and treatment delivered with excellent patient tolerance of themodified plaque.

  13. [Iris heterochromia in acquired Horner's syndrome].

    Science.gov (United States)

    Beynat, J; Soichot, P; Bidot, S; Dugas, B; Creuzot-Garcher, C; Bron, A

    2007-09-01

    Horner's syndrome (HS) is related to an interruption of the oculosympathetic nerve pathway. The classic clinical findings associated with this condition are ptosis, miosis, and enophthalmos. Heterochromia is typically described in congenital HS, but it is an uncommon finding in acquired HS. We report a case of post-traumatic HS associated with heterochromia. A literature review indicates that this type of heterochromia may be related to a reduction in the number of iris melanocytes. This mechanism may be the same in the physiological iris color modifications in adulthood.

  14. Comparison of features response in texture-based iris segmentation

    CSIR Research Space (South Africa)

    Bachoo, A

    2009-03-01

    Full Text Available and eyelashes that corrupt the iris region of interest. An accurate segmentation algorithm must localize and remove these noise components. Texture features are considered in this paper for describing iris and non-iris regions. These regions are classified using...

  15. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  16. Bioinformatic and Biometric Methods in Plant Morphology

    Directory of Open Access Journals (Sweden)

    Surangi W. Punyasena

    2014-08-01

    Full Text Available Recent advances in microscopy, imaging, and data analyses have permitted both the greater application of quantitative methods and the collection of large data sets that can be used to investigate plant morphology. This special issue, the first for Applications in Plant Sciences, presents a collection of papers highlighting recent methods in the quantitative study of plant form. These emerging biometric and bioinformatic approaches to plant sciences are critical for better understanding how morphology relates to ecology, physiology, genotype, and evolutionary and phylogenetic history. From microscopic pollen grains and charcoal particles, to macroscopic leaves and whole root systems, the methods presented include automated classification and identification, geometric morphometrics, and skeleton networks, as well as tests of the limits of human assessment. All demonstrate a clear need for these computational and morphometric approaches in order to increase the consistency, objectivity, and throughput of plant morphological studies.

  17. The IRIS Mission: A Colorful EPO Program

    Science.gov (United States)

    Scherrer, Deborah K.

    2012-05-01

    We will overview NASA’s IRIS mission EPO program, which includes a nationwide spectroscopy contest, K-12 resources, a summer program for undergraduates, informal outreach elements, and a dynamic social media program based on the highly successful Camilla/Little SDO program for NASA’s SDO mission.

  18. Statistical feature extraction based iris recognition system

    Indian Academy of Sciences (India)

    Performance of the proposed iris recognition system (IRS) has been measured by recording false acceptance rate (FAR) and false rejection rate (FRR) at differentthresholds in the distance metric. System performance has been evaluated by computing statistical features along two directions, namely, radial direction of ...

  19. IRIS Toxicological Review of Chloroprene (External Review ...

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of chloroprene that will appear on the Integrated Risk Information System (IRIS) database. Chloroprene (CASRN 126-99-8) or 2-chloro-1,3-butadiene is a volatile liquid monomer used exclusively in the manufacture of polychloroprene (neoprene) elastomer.

  20. The Road to IRIS data products

    Science.gov (United States)

    Hurlburt, N. E.; Title, A. M.; De Pontieu, B.; Lemen, J. R.; Wuelser, J.; Tarbell, T. D.; Wolfson, C. J.; Schrijver, C. J.; Golub, L.; DeLuca, E. E.; Kankelborg, C. C.; Hansteen, V. H.; Carlsson, M.; Bush, R. I.

    2013-12-01

    The Interface Region Imaging Spectrograph generates a complex set of data products that the IRIS team has strived to deliver to the community in forms that are easy to find and use. We review the results of these efforts and invite the community to explore the data and tools. All standard IRIS data products are based on calibrated images are corrected for a variety of instrumental effects. The resulting products are incorporated into the Heliophysics Event Knowledgebase (HEK) as annotated data sets accessible through the HEK Coverage Registry (HCR). Annotations include descriptions of the data products themselves (pointing, field of view, cadence...) as well as references to coordinated observations from the Hinode mission and other observatories, and to solar events identified in the HEK Event Registry (HER). IRIS data products are available at the LMSAL and Stanford (JSOC) data centers in Palo Alto and the Hinode Data Center in Oslo. Portals that can help users to select data products include the LMSAL iSolsearch, the Virtual Solar Observatory and Helioviewer. Supporting analysis software is available in the IRIS branch of SolarSoft.

  1. Disseminated Penicillium marneffei infection with IRIS

    Directory of Open Access Journals (Sweden)

    Xinchao Liu

    2015-01-01

    Full Text Available Penicillium marneffei infection is an endemic opportunistic infection for AIDS patients that can be found in south Asia. Fever and typical skin lesions are the most commonly seen symptoms. Our case describes an AIDS patient with Immune Reconstitution Inflammatory Syndrome (IRIS presented with liver masses and skin lesions whose blood, bone marrow and ascites culture were all identified with P. marneffei.

  2. IRIS Public Science Meeting (June 2016)

    Science.gov (United States)

    This June 2016 public meeting is made available to solicit comments on the public comment draft of the IRIS Assessment of tert-Butanol. The draft document was re-opened in the docket for a 60-day public comment period closing on July 16, 2016.

  3. Enrollment Time as a Requirement for Biometric Hand Recognition Systems

    OpenAIRE

    Carvalho, João; Sá, Vítor; Tenreiro de Magalhães, Sérgio; Santos, Henrique

    2015-01-01

    Biometric systems are increasingly being used as a means for authentication to provide system security in modern technologies. The performance of a biometric system depends on the accuracy, the processing speed, the template size, and the time necessary for enrollment. While much research has focused on the first three factors, enrollment time has not received as much attention. In this work, we present the findings of our research focused upon studying user’s behavior when enrolling in...

  4. Biometrics and smart card based applications for nuclear industry

    International Nuclear Information System (INIS)

    Nishanth Reddy, J.; Dheeraj Reddy, J.; Narender Reddy, J.

    2004-01-01

    Biometrics has emerged as a convenient, foolproof and well-accepted technology for identification around the globe. Nucleonix has developed innovative solutions based on finger scan biometrics for various industries. This paper closely looks into the application areas for the nuclear industry and how it will benefit this industry, in terms of identification, access control, security of PCs and applications, attendance, machinery usage control and other custom applications. (author)

  5. Current federal identity management and the dynamic signature biometrics option

    OpenAIRE

    Zanger, Michael S.

    2009-01-01

    Approved for public release, distribution unlimited Although Identity Management (IdM) and biometrics have been engrained in the business practices of private and commercial organizations for decades, the United States Government (USG) and the Department of Defense (DoD) have only truly started to institute a holistic IdM Enterprise within the last decade. More specifically, the DoD has really sharpened the focus on leveraging biometrics since the beginning of the War on Terror. The o...

  6. Bilateral acute depigmentation of the iris: a case report.

    Science.gov (United States)

    Fachin, Débora Raquel Rigon Narciso; Prestes, Maria Fernanda de Paula; Cariello, Angelino Julio; Nóbrega, Mário Junqueira

    2016-04-01

    Bilateral acute depigmentation of the iris (BADI) is a new clinical entity of unknown etiology and is characterized by bilateral, symmetrical, and simultaneous depigmentation of the iris with focal or diffuse stromal atrophy; this condition generally has a good prognosis. We present a case of a 26-year-old woman who noted a spontaneous change in the iris color in both eyes in the last 2 months. The ophthalmological findings were atrophy of the iris stroma and pigmentation of the trabecular meshwork, without affecting the pigmented epithelium of the iris. Her intraocular pressure was normal and the visual acuity was 20/20 in both eyes.

  7. [Intraoperative floppy iris syndrome--a prospective study].

    Science.gov (United States)

    Nicula, Cristina; Nicula, D; Popescu, Raluca

    2013-01-01

    is to evaluate the incidence and typical signs of floppy iris syndrome intraoperatory revealed in patients diagnosed with cataracts. We studied a total of 15 eyes diagnosed with cataracts, belonging to 14 patients who had been treated chronically with Tamsulosin for benign prostatic hyperplasia. In 80% of cases we have seen a preoperative semimidriasis which required iris hooks in 5 eyeballs. On 1 eye preoperative semimidriasis was sufficient for capsulorhexis, but later pupil became miotic, requiring iris hooks. On 4 eye flaccid iris was noticed, that prolabated in corneal incision. floppy iris syndrome occurs in patients treated with Tamsulosin for benign prostatic hyperplasia, generating a series of difficulties during cataract surgery.

  8. Acute endothelial failure after cosmetic iris implants (NewIris®

    Directory of Open Access Journals (Sweden)

    Garcia-Pous M

    2011-05-01

    Full Text Available Maria Garcia-Pous1, Patricia Udaondo2, Salvador Garcia-Delpech2, David Salom1, Manuel Díaz-Llopis21Faculty of Medicine, University of Valencia, Valencia, Spain; 2Ophthalmology Department, Hospital Universitario La Fe, Valencia, SpainAbstract: We report a case of an acute endothelial failure after the implantation of a new cosmetic, colored, artificial iris diaphragm implant called NewIris®. A 21-year-old woman came to us complaining of progressive loss of vision and pain after NewIris lenses had been implanted. Decreased visual acuity, corneal edema, and increased intraocular pressure in both eyes appeared only 3 weeks after the surgery. The lenses were removed as soon as possible but had already severely affected the endothelial cell count. NewIris implants are an alternative to cosmetic contact lenses, but they are not as safe as other phakic anterior chamber intraocular lenses, nor are they a good option for the patient.Keywords: NewIris, endothelial failure, cosmetic iris implants

  9. Biometric Attendance and Big Data Analysis for Optimizing Work Processes.

    Science.gov (United States)

    Verma, Neetu; Xavier, Teenu; Agrawal, Deepak

    2016-01-01

    Although biometric attendance management is available, large healthcare organizations have difficulty in big data analysis for optimization of work processes. The aim of this project was to assess the implementation of a biometric attendance system and its utility following big data analysis. In this prospective study the implementation of biometric system was evaluated over 3 month period at our institution. Software integration with other existing systems for data analysis was also evaluated. Implementation of the biometric system could be successfully done over a two month period with enrollment of 10,000 employees into the system. However generating reports and taking action this large number of staff was a challenge. For this purpose software was made for capturing the duty roster of each employee and integrating it with the biometric system and adding an SMS gateway. This helped in automating the process of sending SMSs to each employee who had not signed in. Standalone biometric systems have limited functionality in large organizations unless it is meshed with employee duty roster.

  10. Soft biometrics in conjunction with optics based biohashing

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2011-02-01

    Biometric systems are gaining importance because of increased reliability for authentication and identification. A biometric recognition technique has been proposed earlier, in which biohashing code has been generated by using a joint transform correlator. The main drawback of the base biohashing method is the low performance of the technique when an "impostor" steals the pseudo-random numbers of the genuine and tries to authenticate as genuine. In the proposed technique, soft biometrics of the same person has been used to improve the discrimination between the genuine and the impostor populations. The soft biometrics are those characteristics that provide some information about the individual, but lack the distinctiveness and permanence to sufficiently differentiate between any two individuals. In the enrolment process, biohash code of the target face images has been integrated with the different soft biometrics of the same person. The obtained code has been stored for verification. In the verification process, biohash code of the face image to be verified is again diffused with the soft biometric of the person. The obtained code is matched with the stored code of the target. The receiving operating characteristic (ROC) curve and the equal error rate (EER) have been used to evaluate the performance of the technique. A detailed study has been carried out to find out the optimum values of the weighting factor for the diffusion process.

  11. Multimodal biometric approach for cancelable face template generation

    Science.gov (United States)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  12. IRIS. Progress in licensing and toward deployment

    International Nuclear Information System (INIS)

    Petrovic, B.; Carelli, M.D.; Kling, C.L.; Cavlina, N.; Grgic, D.

    2006-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, light water cooled, pressurized reactor of smaller generating capacity (1000 MWt, or 335 MWe). It is being developed through a strong international partnership by a team lead by Westinghouse and including organizations from 10 countries. The main objective of the project is to offer a simple nuclear power plant with outstanding safety, attractive economics and enhanced proliferation resistance characteristics ready for deployment within the next decade. IRIS embodies the requirements set forth by the recently announced US DOE Global Nuclear Energy Partnership (GNEP) program for worldwide deployment of a smaller-scale reactors and provides a viable bridge to Generation IV reactors. IRIS is designed to address the needs of both developed and emerging markets. Its smaller power level provides deployment flexibility in larger developed markets, and makes it in particular well suited for markets with limited grids or where the annual energy demand growth is moderate. Due to its short construction time and the staggered build option, IRIS significantly reduces the required financing, improves cash flow, and provides a viable solution for economies with limited resources. While based on proven and worldwide accepted LWR technology, IRIS introduces a number of innovative solutions to simplify its design and improve safety and operational characteristics, including the integral primary system and its components, as well as the safety-by-design approach. These features will be tested and demonstrated in a testing program that has been initiated. As its centerpiece, the program will include the integral test facility. Results of this program will support licensing with the US NRC. A multinational licensing is considered to facilitate worldwide deployment. (author)

  13. Combining GPS measurements and IRI model predictions

    International Nuclear Information System (INIS)

    Hernandez-Pajares, M.; Juan, J.M.; Sanz, J.; Bilitza, D.

    2002-01-01

    The free electrons distributed in the ionosphere (between one hundred and thousands of km in height) produce a frequency-dependent effect on Global Positioning System (GPS) signals: a delay in the pseudo-orange and an advance in the carrier phase. These effects are proportional to the columnar electron density between the satellite and receiver, i.e. the integrated electron density along the ray path. Global ionospheric TEC (total electron content) maps can be obtained with GPS data from a network of ground IGS (international GPS service) reference stations with an accuracy of few TEC units. The comparison with the TOPEX TEC, mainly measured over the oceans far from the IGS stations, shows a mean bias and standard deviation of about 2 and 5 TECUs respectively. The discrepancies between the STEC predictions and the observed values show an RMS typically below 5 TECUs (which also includes the alignment code noise). he existence of a growing database 2-hourly global TEC maps and with resolution of 5x2.5 degrees in longitude and latitude can be used to improve the IRI prediction capability of the TEC. When the IRI predictions and the GPS estimations are compared for a three month period around the Solar Maximum, they are in good agreement for middle latitudes. An over-determination of IRI TEC has been found at the extreme latitudes, the IRI predictions being, typically two times higher than the GPS estimations. Finally, local fits of the IRI model can be done by tuning the SSN from STEC GPS observations

  14. Checking the new IRI model The bottomside B parameters

    CERN Document Server

    Mosert, M; Ezquer, R; Lazo, B; Miro, G

    2002-01-01

    Electron density profiles obtained at Pruhonice (50.0, 15.0), El Arenosillo (37.1, 353.2) and Havana (23, 278) were used to check the bottom-side B parameters BO (thickness parameter) and B1 (shape parameter) predicted by the new IRI - 2000 version. The electron density profiles were derived from ionograms using the ARP technique. The data base includes daytime and nighttime ionograms recorded under different seasonal and solar activity conditions. Comparisons with IRI predictions were also done. The analysis shows that: a) The parameter B1 given by IRI 2000 reproduces better the observed ARP values than the IRI-90 version and b) The observed BO values are in general well reproduced by both IRI versions: IRI-90 and IRI-2000.

  15. Beat-ID: Towards a computationally low-cost single heartbeat biometric identity check system based on electrocardiogram wave morphology.

    Science.gov (United States)

    Paiva, Joana S; Dias, Duarte; Cunha, João P S

    2017-01-01

    In recent years, safer and more reliable biometric methods have been developed. Apart from the need for enhanced security, the media and entertainment sectors have also been applying biometrics in the emerging market of user-adaptable objects/systems to make these systems more user-friendly. However, the complexity of some state-of-the-art biometric systems (e.g., iris recognition) or their high false rejection rate (e.g., fingerprint recognition) is neither compatible with the simple hardware architecture required by reduced-size devices nor the new trend of implementing smart objects within the dynamic market of the Internet of Things (IoT). It was recently shown that an individual can be recognized by extracting features from their electrocardiogram (ECG). However, most current ECG-based biometric algorithms are computationally demanding and/or rely on relatively large (several seconds) ECG samples, which are incompatible with the aforementioned application fields. Here, we present a computationally low-cost method (patent pending), including simple mathematical operations, for identifying a person using only three ECG morphology-based characteristics from a single heartbeat. The algorithm was trained/tested using ECG signals of different duration from the Physionet database on more than 60 different training/test datasets. The proposed method achieved maximal averaged accuracy of 97.450% in distinguishing each subject from a ten-subject set and false acceptance and rejection rates (FAR and FRR) of 5.710±1.900% and 3.440±1.980%, respectively, placing Beat-ID in a very competitive position in terms of the FRR/FAR among state-of-the-art methods. Furthermore, the proposed method can identify a person using an average of 1.020 heartbeats. It therefore has FRR/FAR behavior similar to obtaining a fingerprint, yet it is simpler and requires less expensive hardware. This method targets low-computational/energy-cost scenarios, such as tiny wearable devices (e.g., a

  16. IRIS design overview and status update

    International Nuclear Information System (INIS)

    Carelli, M.D.; Petrovic, B.; Conway, L.E.; Oriani, L.; Kling, C.L.; Miller, K.; Lombardi, C.V.; Ricotti, M.E.; Barroso, A.C.O.; Collado, J.M.; Cinotti, L.; Storai, S.; Berra, F.; Todreas, N.E.; Ninokata, H.; Cavlina, N.; Grgic, D.; Oriolo, F.; Moraes, M.M.; Frederico, C.; Henning, F.; Griffith, W.; Love, J.; Ingersoll, D.T.; Wood, R.; Alonso, G.; Kodochigov, N.; Polunichev, V.; Augutis, J.; Alzbutas, R.; Boroughs, R.D.; Naviglio, A.; Panella, B.

    2005-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, light-water cooled reactor of medium generating capacity (1000 MWt, or ∼335 MWe), geared at near term deployment (2012- 2015). It has been under development since the turn of the century by an international consortium--led by Westinghouse--that includes 21 organizations from 10 countries, and it is currently in the pre-application licensing process with the U.S. Nuclear Regulatory Commission (NRC). This paper describes its integral design (i.e., steam generators, pumps, pressurizer and control rod drive mechanisms are all included inside the reactor vessel, together with the core, control rods, and neutron reflector/shield) and discusses the unique ('safety-by-design') TM IRIS philosophy. This approach, by eliminating accidents at the design stage, or decreasing their consequences and probabilities when outright elimination is not possible, provides a very powerful first level of defense in depth. The ('safety by- design') TM allows a significant reduction and simplification of the passive safety systems, which not only improves safety but simultaneously reduces the overall cost. Moreover, it supports licensing the power plant without the need for off-site emergency response planning--an objective which is part of the pre-application with NRC and is also pursued within an international research project coordinated by the International Atomic Energy Agency (IAEA). This would allow IRIS to be treated as any other industrial facility, located closer to population centers, and enable its effective dual-purpose use for electricity production and co-generation (district heating, desalination, industrial steam). The modular IRIS--with each module rated at ∼335 MWe--is an ideal size for developing countries as it allows to easily introducing single modules in regions only requiring a few hundred MWs, or a moderate amount of power on limited electric grids. IRIS can be also deployed in

  17. Optical Coherence Tomography Angiography Characteristics of Iris Melanocytic Tumors.

    Science.gov (United States)

    Skalet, Alison H; Li, Yan; Lu, Chen D; Jia, Yali; Lee, ByungKun; Husvogt, Lennart; Maier, Andreas; Fujimoto, James G; Thomas, Charles R; Huang, David

    2017-02-01

    To evaluate tumor vasculature with optical coherence tomography angiography (OCTA) in malignant iris melanomas and benign iris lesions. Cross-sectional observational clinical study. Patients with iris lesions and healthy volunteers. Eyes were imaged using OCTA systems operating at 1050- and 840-nm wavelengths. Three-dimensional OCTA scans were acquired. Iris melanoma patients treated with radiation therapy were imaged again after I-125 plaque brachytherapy at 6 and 18 months. OCT and OCTA images, qualitative evaluation of iris and tumor vasculature, and quantitative vessel density. One eye each of 8 normal volunteers and 9 patients with iris melanomas or benign iris lesions, including freckles, nevi, and an iris pigment epithelial (IPE) cyst, were imaged. The normal iris has radially oriented vessels within the stroma on OCTA. Penetration of flow signal in normal iris depended on iris color, with best penetration seen in light to moderately pigmented irides. Iris melanomas demonstrated tortuous and disorganized intratumoral vasculature. In 2 eyes with nevi there was no increased vascularity; in another, fine vascular loops were noted near an area of ectropion uveae. Iris freckles and the IPE cyst did not have intrinsic vascularity. The vessel density was significantly higher within iris melanomas (34.5%±9.8%, P iris nevi (8.0%±1.4%) or normal irides (8.0%±1.2%). Tumor regression after radiation therapy for melanomas was associated with decreased vessel density. OCTA at 1050 nm provided better visualization of tumor vasculature and penetration through thicker tumors than at 840 nm. But in very thick tumors and highly pigmented lesions even 1050-nm OCTA could not visualize their full thickness. Interpretable OCTA images were obtained in 82% of participants in whom imaging was attempted. This is the first demonstration of OCTA in iris tumors. OCTA may provide a dye-free, no-injection, cost-effective method for monitoring a variety of tumors, including iris

  18. Iris Freckles a Potential Biomarker for Chronic Sun Damage.

    Science.gov (United States)

    Schwab, Christoph; Mayer, Christoph; Zalaudek, Iris; Riedl, Regina; Richtig, Markus; Wackernagel, Werner; Hofmann-Wellenhof, Rainer; Richtig, Georg; Langmann, Gerald; Tarmann, Lisa; Wedrich, Andreas; Richtig, Erika

    2017-05-01

    To investigate the role of sunlight exposure in iris freckles formation. We prospectively examined volunteers attending a skin cancer screening program conducted by ophthalmologists and dermatologists. Frequency and topographical variability of iris freckles were noted and associated with behavioral and dermatologic characteristics indicating high sun exposure. Six hundred thirty-two participants (n = 360; 57% female) were examined. Mean age of all participants was 38.4 ± 18.4 years (range, 4-84 years). Of all individuals, 76.1% (n = 481) exhibited at least one iris freckle. Most freckles were observed in the inferior temporal quadrant. The presence of iris freckles was associated with higher age (participants with iris freckles: 41.8 ± 16.8 years versus participants without iris freckles: 27.6 ± 19.2 years), a high number of sunburns during lifetime (>10: 31% vs. 19%), sunlight-damaged skin (26% vs. 11%), presence of actinic lentigines (72% vs. 45%), and a high total nevus body count (>10; 78% vs. 67%). The association of iris freckles, behavioral factors, and dermatologic findings, as well as the topographical distribution, indicate that sunlight exposure may trigger the formation of iris freckles. The evaluation of iris freckles offers an easily accessible potential biomarker, which might be helpful in indicating sun damage on the skin associated with cutaneous malignancies. Furthermore, the evaluation of iris freckles could also be helpful in understanding the role of sunlight in several ophthalmologic diseases.

  19. ECG biometric identification: A compression based approach.

    Science.gov (United States)

    Bras, Susana; Pinho, Armando J

    2015-08-01

    Using the electrocardiogram signal (ECG) to identify and/or authenticate persons are problems still lacking satisfactory solutions. Yet, ECG possesses characteristics that are unique or difficult to get from other signals used in biometrics: (1) it requires contact and liveliness for acquisition (2) it changes under stress, rendering it potentially useless if acquired under threatening. Our main objective is to present an innovative and robust solution to the above-mentioned problem. To successfully conduct this goal, we rely on information-theoretic data models for data compression and on similarity metrics related to the approximation of the Kolmogorov complexity. The proposed measure allows the comparison of two (or more) ECG segments, without having to follow traditional approaches that require heartbeat segmentation (described as highly influenced by external or internal interferences). As a first approach, the method was able to cluster the data in three groups: identical record, same participant, different participant, by the stratification of the proposed measure with values near 0 for the same participant and closer to 1 for different participants. A leave-one-out strategy was implemented in order to identify the participant in the database based on his/her ECG. A 1NN classifier was implemented, using as distance measure the method proposed in this work. The classifier was able to identify correctly almost all participants, with an accuracy of 99% in the database used.

  20. Compressed sensing approach for wrist vein biometrics.

    Science.gov (United States)

    Lantsov, Aleksey; Ryabko, Maxim; Shchekin, Aleksey

    2017-10-13

    The work describes features of the compressed sensing (CS) approach utilized for development of a wearable system for wrist vein recognition with single-pixel detection; we consider this system useful for biometrics authentication purposes. The CS approach implies use of a spatial light modulation (SLM) which, in our case, can be performed differently-with a liquid crystal display or diffusely scattering medium. We show that compressed sensing combined with above-mentioned means of SLM allows us to avoid using an optical system-a limiting factor for wearable devices. The trade-off between the 2 different SLM approaches regarding issues of practical implementation of CS approach for wrist vein recognition purposes is discussed. A possible solution of a misalignment problem-a typical issue for imaging systems based upon 2D arrays of photodiodes-is also proposed. Proposed design of the wearable device for wrist vein recognition is based upon single-pixel detection. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Fuel management approach in IRIS Reactor

    International Nuclear Information System (INIS)

    Petrovic, B.; Franceschini, F.

    2004-01-01

    This paper provides an overview of fuel management approach employed in IRIS (International Reactor Innovative and Secure). It introduces the initial, rather ambitious, fuel management goals and discusses their evolution that reflected the fast pace of progress of the overall project. The updated objectives rely on using currently licensed fuel technology, thus enabling near-term deployment of IRIS, while still providing improved fuel utilization. The paper focuses on the reference core design and fuel management strategy that is considered in pre-application licensing, which enables extended cycle of three to four years. The extended cycle reduces maintenance outage time and increases capacity factor, thus reducing the cost of electricity. Approaches to achieving this goal are discussed, including use of different reloading strategies. Additional fuel management options, which are not part of the licensing process, but are pursued as long-term research for possible future implementation, are presented as well. (Author)

  2. Sequences associated with human iris pigmentation.

    OpenAIRE

    Frudakis, Tony; Thomas, Matthew; Gaskin, Zach; Venkateswarlu, K; Chandra, K Suresh; Ginjupalli, Siva; Gunturi, Sitaram; Natrajan, Sivamani; Ponnuswamy, Viswanathan K; Ponnuswamy, K N

    2003-01-01

    To determine whether and how common polymorphisms are associated with natural distributions of iris colors, we surveyed 851 individuals of mainly European descent at 335 SNP loci in 13 pigmentation genes and 419 other SNPs distributed throughout the genome and known or thought to be informative for certain elements of population structure. We identified numerous SNPs, haplotypes, and diplotypes (diploid pairs of haplotypes) within the OCA2, MYO5A, TYRP1, AIM, DCT, and TYR genes and the CYP1A2...

  3. IRIS Toxicological Review of Trichloroacetic Acid (TCA) ...

    Science.gov (United States)

    EPA is conducting a peer review and public comment of the scientific basis supporting the human health hazard and dose-response assessment of Trichloroacetic acid (TCA) that when finalized will appear on the Integrated Risk Information System (IRIS) database. The draft Toxicological Review of trichloroacetic acid provides scientific support and rationale for the hazard and dose-response assessment pertaining to chronic exposure to trichloroacetic acid.

  4. Unsupervised detection of non-iris occlusions

    Czech Academy of Sciences Publication Activity Database

    Haindl, Michal; Krupička, Mikuláš

    2015-01-01

    Roč. 57, č. 5 (2015), s. 60-65 ISSN 0167-8655 R&D Projects: GA ČR(CZ) GA14-10911S Institutional support: RVO:67985556 Keywords : Iris recognition * Color * Markov random field * Texture Subject RIV: BD - Theory of Information Impact factor: 1.586, year: 2015 http://library.utia.cas.cz/separaty/2015/RO/haindl-0444723.pdf

  5. Plateau iris configuration in eyes with narrow-angle: an ultrasound biomicroscopic study Configuração da íris em platô em olhos com seio camerular estreito: um estudo ultrabiomicroscópico

    Directory of Open Access Journals (Sweden)

    Alberto Diniz Filho

    2010-04-01

    Full Text Available PURPOSE: To investigate, through ultrasound biomicroscopy images, the presence of plateau iris configuration in eyes with narrow-angle from patients with open-angle glaucoma and in eyes with previous acute primary angle-closure and compare the biometric features of eyes with plateau iris configuration with those of normal eyes. METHODS: Ultrasound biomicroscopic images from 196 patients with open-angle glaucoma and narrow-angle and 32 patients with acute primary angle-closure were retrospectively analyzed. The inclusion and specific criteria for the diagnosis of plateau iris configuration was the presence of an anterior positioning of the ciliary processes, supporting the peripheral iris so that it was parallel to the trabecular meshwork; the iris root had a steep rise from its insertion point, followed by a downward angulation from the corneoscleral wall; presence of a central flat iris plane; an absent (complete plateau iris configuration or partially absent (incomplete plateau iris configuration ciliary sulcus. The ultrasound biomicroscopic parameters were compared between complete and incomplete plateau iris configuration. The same parameters of both groups were compared with those of normal eyes. The following measurements were performed: anterior chamber depth; angle opening distance at 500 µm from the scleral spur; peripheral iris thickness at 500 µm from the scleral spur; iris-ciliary process distance; trabecular-ciliary process distance and angle recess area. RESULTS: Plateau iris configuration was found in 33 eyes of 20 (10.2% out of 196 patients with open-angle glaucoma and narrow-angle and in 4 eyes of 2 (6.3% out of 32 patients with acute primary angleclosure. Seventeen (77.3% patients with plateau iris configuration were female and 5 (22.7% male. Twenty-three (62.2% out of 37 eyes had complete plateau iris configuration, and 14 (37.8% had incomplete plateau iris configuration. Complete and incomplete plateau iris configuration

  6. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  7. Hyperspectral imaging of the human iris

    Science.gov (United States)

    Di Cecilia, Luca; Marazzi, Francesco; Rovati, Luigi

    2017-07-01

    We describe an optical system and a method for measuring the human iris spectral reflectance in vivo by hyperspectral imaging analysis. It is important to monitor age-related changes in the reflectance properties of the iris as they are a prognostic factor for several eye pathologies. In this paper, we report the outcomes of our most recent research, resulting from the improvement of our imaging system. In particular, a custom tunable light source was developed: the images are now acquired in the spectral range 440 - 900 nm. With this system, we are able to obtain a spectral resolution of 20nm, while each image of 2048 x 1536 pixels has a spatial resolution of 10.7 μm. The results suggest that the instrument could be exploited for measuring iris pigmentation changes over time. These measurements could provide new diagnostic capabilities in ophthalmology. Further studies are required to determine the measurements' repeatability and to develop a spectral library for results evaluation and to detect differences among subsequent screenings of the same subject.

  8. A standardized approach for iris color determination.

    Science.gov (United States)

    Niggemann, Birgit; Weinbauer, Gerhard; Vogel, Friedhelm; Korte, Rainhart

    2003-01-01

    Latanoprost, the phenyl-substituted prostaglandin F2alpha, has been found to be an effective agent for glaucoma therapy. This prostaglandin derivative exerts ocular hypotensive activity but is also associated with an untoward side effect, namely iris color changes. Latanoprost provoked iris color changes in cynomolgus monkeys and in multicenter clinical trials. Until now photographs were taken and compared with color plates to document these changes. The disadvantage of this method is obvious, i.e., the color luminance varies between measurements due to changes in the developer. Furthermore, subjective comparison of color changes relative to color plates rendered judgment subject to impression and opinion rather than to objective data. Therefore, a computerized method using a 3-CCD video camera attached to a slit lamp was developed. The signals were transferred to a computer and a single frame, which was "frozen" by means of a "grabber card." Camera and the computer had previously been calibrated and color plates were measured to check the standard conditions. They were evaluated by a software program displaying average color (as red, green, and blue values) of the selected area. This method provides a fast and accurate way to quantify color changes in the iris of both experimental animals and clinical trials.

  9. Infrasound product resources at the IRIS DMC

    Science.gov (United States)

    Bahavar, M.; Trabant, C.; Hutko, A. R.; Karstens, R.

    2012-12-01

    In 2011 infrasound sensors were installed at some existing USArray Transportable Array (TA) sites and became a standard component of all new sites. Currently there are over 400 sites with infrasound sensors with an average spacing of 70 kilometers. To promote and facilitate the use of these data the IRIS Data Management Center has developed two new data products: an infrasound reference event database and an infrasound signal detector. The TA Infrasound Reference Event Database (TAIRED) is a user-supported database that contains information on events of interest for which there are associated USArray microbarograph recordings. This database is initially populated with a few events from observations on the USArray infrasound data, event bulletins, news on explosions, meteorological events and rocket launches. As a user-supported resource, we ask users to submit events of interest to be included in the database or submit their alternate solutions to the existing events. The second data product is an infrasound signal detector that regularly scans the USArray broadband infrasound data (BDF channel sampled at 40 Hz) and produces detections that highlight time intervals containing potential signals of interest. The detection product includes two components, standard signal-to-noise ratio based detections and spectral power based detections. No attempt is made to categorize detections or associate them to events. These data products join the growing collection of products produced and managed at the IRIS DMC, for the complete list please visit http://www.iris.edu/dms/products/.

  10. Iris melanoma invading the camerular angle

    International Nuclear Information System (INIS)

    Verona Ugando, Leticia; Landrian Iglesias, Beatriz; Padierne Gonzalez, Naysa

    2011-01-01

    Uveal melanomas are the most frequent primary uveal tumors, having an incidence of 8/1 000 000 a year in Caucasian people. Specifically, iris Melanoma represents 5 to 7 % of the uveal malignant melanomas and they may be amelanic or pigmented, generally very vascularized. An eighteen years old male patient with a history of health problems was presented, who had been seen at the Ophthalmological Emergency Service because of eye pain and sudden visual reduction in his right eye. In the physical exam, a marked ocular hypertension was confirmed as well as a 2 mm hyphema and corneal edema. These conditions were overcome with treatment and afterwards, there was observed iris tumoration invading the iridocorneal angle. Some complementary studies were carried out to search further tumors at other levels and finally a fine needle aspiration biopsy was performed. The diagnosis was amelanic Iris Melanoma invading the ciliary body. The patient was referred for surgical treatment at the National Institute of Oncology and Radiology

  11. Biometric security and privacy opportunities & challenges in the big data era

    CERN Document Server

    Al-maadeed, Somaya; Bouridane, Ahmed; Crookes, Prof; Beghdadi, Azeddine

    2017-01-01

    This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template protection, and anti-spoofing. The book also focuses on several emerging topics such as big data issues, mobile biometrics and multispectral biometrics, and includes a number of new biometrics such as vein pattern, acoustic biometrics, eye-blinking EOG, ECG, gait and handwriting. Authors also show how to use biometrics in cyber security applications and its relevant legal matters under EU legislation. The contributors cover the topics, their methods, and their applications in depth.

  12. Review analysis of properties for an ideal secure biometric template scheme

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-02-01

    Full Text Available With new advances in technologies, biometrics is becoming emerging technology for verification and authentication of individuals. However, the storage of biometric templates still needs necessary attention since it poses major threats to user...

  13. 78 FR 22274 - Agency Information Collection Activities: Office of Biometric Identity Management (OBIM...

    Science.gov (United States)

    2013-04-15

    ... Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of Biometric Identity... Security, National Protection and Programs Directorate, Office of Biometric Identity Management. Title... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0016] Agency Information Collection...

  14. Chaotic secure content-based hidden transmission of biometric templates

    International Nuclear Information System (INIS)

    Khan, Muhammad Khurram; Zhang Jiashu; Tian Lei

    2007-01-01

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature

  15. Selectively Encrypted Pull-Up Based Watermarking of Biometric data

    Science.gov (United States)

    Shinde, S. A.; Patel, Kushal S.

    2012-10-01

    Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.

  16. Iris image recognition wavelet filter-banks based iris feature extraction schemes

    CERN Document Server

    Rahulkar, Amol D

    2014-01-01

    This book provides the new results in wavelet filter banks based feature extraction, and the classifier in the field of iris image recognition. It provides the broad treatment on the design of separable, non-separable wavelets filter banks, and the classifier. The design techniques presented in the book are applied on iris image analysis for person authentication. This book also brings together the three strands of research (wavelets, iris image analysis, and classifier). It compares the performance of the presented techniques with state-of-the-art available schemes. This book contains the compilation of basic material on the design of wavelets that avoids reading many different books. Therefore, it provide an easier path for the new-comers, researchers to master the contents. In addition, the designed filter banks and classifier can also be effectively used than existing filter-banks in many signal processing applications like pattern classification, data-compression, watermarking, denoising etc.  that will...

  17. Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction

    OpenAIRE

    Kümmel, Karl; Vielhauer, Claus; Scheidat, Tobias; Franke, Dirk; Dittmann, Jana

    2010-01-01

    International audience; Biometric Hash algorithms, also called BioHash, are mainly designed to ensure template protection to its biometric raw data. To assure reproducibility, BioHash algorithms provide a certain level of robustness against input variability to ensure high reproduction rates by compensating for intra-class variation of the biometric raw data. This concept can be a potential vulnerability. In this paper, we want to reflect such vulnerability of a specific Biometric Hash algori...

  18. Behavioral and physical biometric characteristics modeling used for ITS security improvement

    Directory of Open Access Journals (Sweden)

    Miroslav BAČA

    2009-01-01

    Full Text Available Biometric technologies rely on specific biometric characteristics that are used for recognition. The particular characteristic for a given situation can be described through a serious of descriptive parameters including ease of collecting, permanence, measurably, acceptability, deceptiveness, universality, uniqueness, sample cost, system cost, database size, as well as environmental factors. By using our ontology-based framework for adequacy of biometric systems, we introduce a model for using biometric technologies in ITS. Such technologies increase security, safety and protection of ITS.

  19. 62129 - HyspIRI and ECOSTRESS

    Science.gov (United States)

    Hook, S. J.; Fisher, J. B.; Hulley, G. C.; Anderson, M. C.; French, A. N.; Hain, C.; Allen, R. G.

    2015-12-01

    In 2007 the National Research Council (NRC) released the results from the first Earth Science Decadal Survey (DS) in a report titled Earth Science and Applications from Space: National Imperatives for the next Decade and Beyond [NRC 2007]. The purpose of DS study was to provide NASA with a mission roadmap for the subsequent 10 years together with the high priority science and societal questions that needed to be addressed. One of the missions recommended was The Hyperspectral and Infrared Imager (HyspIRI). The HyspIRI mission includes a visible-shortwave infrared (VSWIR) imaging spectrometer and a multispectral thermal infrared (TIR) scanner together with an onboard data processing/downlink system referred to as the Intelligent Payload Module (IPM). The TIR instrument will acquire data in 8 discrete spectral bands between 4 and 12 μm for each pixel, have a revisit of 5 days and a spatial resolution of 60 m. Both instruments will provide global observations over the land surface and surrounding shallow waters. Over the deeper oceans the data will be resampled to 1 km spatial resolution. The HyspIRI-TIR instrument is a multispectral TIR scanner with 8 spectral bands. Seven of the eight bands are between 7.5 and 12 um and the remaining band is at 4 μm and designed specifically for the detection of hot targets. As part of the TIR risk reduction studies the NASA Earth Science Technology Office (ESTO) supported the development of the Prototype HyspIRI Thermal Infrared Radiometer (PHyTIR) for engineering risk reduction. The PHyTIR instrument was developed to demonstrate that the HyspIRI-TIR hardware would perform correctly in a space environment. PHyTIR was a space-flight ready laboratory engineering model. In 2014 PHyTIR was selected for deployment to the International Space Station (ISS) as part of the ECOsystem Spaceborne Thermal Radiometer Experiment on the Space Station (ECOSTRESS) mission. ECOSTRESS will use 6 of the 8 available bands from PHyTIR. It will have a

  20. Real time biometric surveillance with gait recognition

    Science.gov (United States)

    Mohapatra, Subasish; Swain, Anisha; Das, Manaswini; Mohanty, Subhadarshini

    2018-04-01

    Bio metric surveillance has become indispensable for every system in the recent years. The contribution of bio metric authentication, identification, and screening purposes are widely used in various domains for preventing unauthorized access. A large amount of data needs to be updated, segregated and safeguarded from malicious software and misuse. Bio metrics is the intrinsic characteristics of each individual. Recently fingerprints, iris, passwords, unique keys, and cards are commonly used for authentication purposes. These methods have various issues related to security and confidentiality. These systems are not yet automated to provide the safety and security. The gait recognition system is the alternative for overcoming the drawbacks of the recent bio metric based authentication systems. Gait recognition is newer as it hasn't been implemented in the real-world scenario so far. This is an un-intrusive system that requires no knowledge or co-operation of the subject. Gait is a unique behavioral characteristic of every human being which is hard to imitate. The walking style of an individual teamed with the orientation of joints in the skeletal structure and inclinations between them imparts the unique characteristic. A person can alter one's own external appearance but not skeletal structure. These are real-time, automatic systems that can even process low-resolution images and video frames. In this paper, we have proposed a gait recognition system and compared the performance with conventional bio metric identification systems.

  1. Protection of personal information in South Africa: a framework for biometric data collection security

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-11-01

    Full Text Available be replaced like passwords and tokens. In this paper we proposed a framework for biometric data collection security using South Africa as our case study. The framework aims to bridge the gap between the collectors of biometric data, biometric security experts...

  2. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Breebaart, Jeroen; Buhan, I.R.; Veldhuis, Raymond N.J.; Vijaya Kumar, B.V.K.; Prabhakar, Salil; Ross, Arun A.

    2010-01-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved

  3. Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Garcia Molina, Gary; Breebaart, Jeroen; Veldhuis, Raymond N.J.; Kevenaar, Tom A.M.; Jonker, Willem

    In recent years, the protection of biometric data has gained increased interest from the scientific community. Methods such as the fuzzy commitment scheme, helper-data system, fuzzy extractors, fuzzy vault, and cancelable biometrics have been proposed for protecting biometric data. Most of these

  4. Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Molina, G.; Kevenaar, T.A.M.; Veldhuis, Raymond N.J.; Jonker, Willem

    2008-01-01

    In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the helper data system, fuzzy extractors, fuzzy vault and cancellable biometrics have been proposed for protecting biometric data. Most of these methods use cryptographic

  5. Impact of environmental factors on biometric matching during human decomposition

    Energy Technology Data Exchange (ETDEWEB)

    Bolme, David S [ORNL; Tokola, Ryan A [ORNL; Boehnen, Chris Bensing [ORNL; Saul, Tiffany B [ORNL; Sauerwein, Kelly A [ORNL; Steadman, Dawnie W [ORNL

    2016-01-01

    Automatic recognition systems are a valuable tool for identifying unknown deceased individuals. Immediately af- ter death fingerprint and face biometric samples are easy to collect using standard sensors and cameras and can be easily matched to anti-mortem biometric samples. Even though post-mortem fingerprints and faces have been used for decades, there are no studies that track these biomet- rics through the later stages of decomposition to determine the length of time the biometrics remain viable. This paper discusses a multimodal dataset of fingerprints, faces, and irises from 14 human cadavers that decomposed outdoors under natural conditions. Results include predictive models relating time and temperature, measured as Accumulated Degree Days (ADD), and season (winter, spring, summer) to the predicted probably of automatic verification using a commercial algorithm.

  6. European securitization and biometric identification: the uses of genetic profiling.

    Science.gov (United States)

    Johnson, Paul; Williams, Robin

    2007-01-01

    The recent loss of confidence in textual and verbal methods for validating the identity claims of individual subjects has resulted in growing interest in the use of biometric technologies to establish corporeal uniqueness. Once established, this foundational certainty allows changing biographies and shifting category memberships to be anchored to unchanging bodily surfaces, forms or features. One significant source for this growth has been the "securitization" agendas of nation states that attempt the greater control and monitoring of population movement across geographical borders. Among the wide variety of available biometric schemes, DNA profiling is regarded as a key method for discerning and recording embodied individuality. This paper discusses the current limitations on the use of DNA profiling in civil identification practices and speculates on future uses of the technology with regard to its interoperability with other biometric databasing systems.

  7. Biometric feature extraction using local fractal auto-correlation

    International Nuclear Information System (INIS)

    Chen Xi; Zhang Jia-Shu

    2014-01-01

    Image texture feature extraction is a classical means for biometric recognition. To extract effective texture feature for matching, we utilize local fractal auto-correlation to construct an effective image texture descriptor. Three main steps are involved in the proposed scheme: (i) using two-dimensional Gabor filter to extract the texture features of biometric images; (ii) calculating the local fractal dimension of Gabor feature under different orientations and scales using fractal auto-correlation algorithm; and (iii) linking the local fractal dimension of Gabor feature under different orientations and scales into a big vector for matching. Experiments and analyses show our proposed scheme is an efficient biometric feature extraction approach. (condensed matter: structural, mechanical, and thermal properties)

  8. Multiple-stage pure phase encoding with biometric information

    Science.gov (United States)

    Chen, Wen

    2018-01-01

    In recent years, many optical systems have been developed for securing information, and optical encryption/encoding has attracted more and more attention due to the marked advantages, such as parallel processing and multiple-dimensional characteristics. In this paper, an optical security method is presented based on pure phase encoding with biometric information. Biometric information (such as fingerprint) is employed as security keys rather than plaintext used in conventional optical security systems, and multiple-stage phase-encoding-based optical systems are designed for generating several phase-only masks with biometric information. Subsequently, the extracted phase-only masks are further used in an optical setup for encoding an input image (i.e., plaintext). Numerical simulations are conducted to illustrate the validity, and the results demonstrate that high flexibility and high security can be achieved.

  9. Iris double recognition based on modified evolutionary neural network

    Science.gov (United States)

    Liu, Shuai; Liu, Yuan-Ning; Zhu, Xiao-Dong; Huo, Guang; Liu, Wen-Tao; Feng, Jia-Kai

    2017-11-01

    Aiming at multicategory iris recognition under illumination and noise interference, this paper proposes a method of iris double recognition based on a modified evolutionary neural network. An equalization histogram and Laplace of Gaussian operator are used to process the iris to suppress illumination and noise interference and Haar wavelet to convert the iris feature to binary feature encoding. Calculate the Hamming distance for the test iris and template iris , and compare with classification threshold, determine the type of iris. If the iris cannot be identified as a different type, there needs to be a secondary recognition. The connection weights in back-propagation (BP) neural network use modified evolutionary neural network to adaptively train. The modified neural network is composed of particle swarm optimization with mutation operator and BP neural network. According to different iris libraries in different circumstances of experimental results, under illumination and noise interference, the correct recognition rate of this algorithm is higher, the ROC curve is closer to the coordinate axis, the training and recognition time is shorter, and the stability and the robustness are better.

  10. A gallery approach for off-angle iris recognition

    Science.gov (United States)

    Karakaya, Mahmut; Yoldash, Rashiduddin; Boehnen, Christopher

    2015-05-01

    It has been proven that hamming distance score between frontal and off-angle iris images of same eye differs in iris recognition system. The distinction of hamming distance score is caused by many factors such as image acquisition angle, occlusion, pupil dilation, and limbus effect. In this paper, we first study the effect of the angle variations between iris plane and the image acquisition systems. We present how hamming distance changes for different off-angle iris images even if they are coming from the same iris. We observe that increment in acquisition angle of compared iris images causes the increment in hamming distance. Second, we propose a new technique in off-angle iris recognition system that includes creating a gallery of different off-angle iris images (such as, 0, 10, 20, 30, 40, and 50 degrees) and comparing each probe image with these gallery images. We will show the accuracy of the gallery approach for off-angle iris recognition.

  11. Horner's syndrome: an electron microscopic study of a human iris.

    Science.gov (United States)

    McCartney, A. C.; Riordan-Eva, P.; Howes, R. C.; Spalton, D. J.

    1992-01-01

    Electron microscopy was performed on the irides of a man with a history of a long standing Horner's syndrome which resulted in iris heterochromia. Comparison of his normal brown iris with the depigmented blue iris showed depletion of anterior border cells and absence of sympathetic nerve fibres. Stromal melanocyte numbers were also diminished but melanosome numbers within the residual cells were not significantly different. Postnatal maintenance of stromal and anterior border zone pigmentation, derived from the neural crest, would appear to be dependent on an intact sympathetic nerve supply in contrast to the iris pigment epithelium which remains normally unaffected in Horner's syndrome. Images PMID:1486079

  12. A Case of Iris Mammillation Associated with Nevus of Ota

    Directory of Open Access Journals (Sweden)

    Onur Polat

    2013-10-01

    Full Text Available Nevus of Ota is characterized by the presence of hyperpigmentation in the skin areas innervated by the first or the second branches of the trigeminal nerve. Women are affected three times as often as men. Although nevus of Ota is a congenital disorder, it can be seen in puberty or adulthood. Herein a case of nevus of Ota was reported accompanying iris heterochromia and rare iris mammillation. Because of the relationship between iris heterochromia and iris mammillation with glaucoma and especially uveal melanoma, all the patients with nevus of Ota should be monitored closely with regular ophthalmologic examination.

  13. Biometric Differences between Unilateral Chronic Primary Angle Closure Glaucoma and Fellow Non-Glaucomatous Eyes.

    Science.gov (United States)

    Wang, Wei; Li, Xinyi; Chen, Shida; Huang, Wenbin; Zhang, Xiulan

    2017-11-29

    To compare biometric differences between eyes with unilateral chronic primary angle-closure glaucoma (PACG) and fellow non-glaucomatous eyes in the same patient. Clinical data and imaging records of 17 patients with unilateral PACG were retrospectively reviewed. The fellow eyes with primary angle-closure (PAC) or primary angle-closure suspected (PACS) were grouped in Group 1. The PACG eyes were set as Group 2. The biometric parameters of both eyes were measured by IOL-Master, anterior segment optical coherence tomography (AS-OCT), and swept source OCT. The iris area in Group 1 was significantly thicker than that in Group 2 (1.590 ± 0.267 versus 1.365 ± 0.352, P = 0.016). Choroidal thickness in the macular region was thicker in Group 1 than in Group 2, with statistical significance at inner temporal grid (282.7 ± 121.1 versus 191.6 ± 90.3, P = 0.036), central field (297.4 ± 130.6 versus 200.1 ± 96.3, P = 0.029), inner nasal grid (283.1 ± 128.3 versus 194.8 ± 91.8, P = 0.040), and average value (265.3 ± 105.6 versus 191.1 ± 87.0, P = 0.049). Group 1 also had thicker peripapillary choroidal thickness at 1 o'clock (141.4 ± 68.4 versus 101.8 ± 39.0, P = 0.025) and 12 o'clock (141.5 ± 82.3 versus 104.5 ± 44.6, P = 0.037) compared to Group 2. The multivariate logistic regression analyses showed that only intraocular pressure was independently associated with PACG and explained 58.3% variance of PACG. In unilateral PACG, there was significant inter-eye difference in anterior and posterior segment parameters. Longitudinal comparisons are required to further understand the differences in pathology of angle closures.

  14. Attacks on biometric systems: a case study in fingerprints

    Science.gov (United States)

    Uludag, Umut; Jain, Anil K.

    2004-06-01

    In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, we analyze these attacks in the realm of a fingerprint biometric system. We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint database. Several measures that can be utilized to decrease the probability of such attacks and their ramifications are also presented.

  15. Effect of tamsulosin on iris vasculature and morphology.

    Science.gov (United States)

    Shtein, Roni M; Hussain, Munira T; Cooney, Theresa M; Elner, Victor M; Hood, Christopher T

    2014-05-01

    To determine whether preoperative iris vasculature and morphology are altered in patients who have taken tamsulosin (Flomax). Academic multispecialty practice. Case series. Patients with current or past tamsulosin use and age- and sex-matched control patients were included. Anterior segment optical coherence tomography (AS-OCT) and iris fluorescein angiography were performed to measure iris vasculature and thickness before cataract surgery. Data collected at surgery included pupil diameter, clinical signs of intraoperative floppy-iris syndrome, and surgical complications. Tamsulosin was currently used by 16 patients and in the past by 4 patients; the control group comprised 10 patients. Pharmacologically dilated pupil diameter was statistically significantly smaller preoperatively and immediately postoperatively in the tamsulosin group than in the control group (P=.009 and P=.003, respectively). There was a statistically significant decrease in pupil size intraoperatively in the tamsulosin group (P=.05) but not in the control group (P=.3). Iris-vasculature parameters, specifically time to first vessel fill and percentage of vessel fill on iris fluorescein angiography, were not significantly different between the 2 groups. The AS-OCT measurements of iris morphology were not statistically significantly different between the groups. No surgical complications occurred. No fluorescein dye leakage, staining, or other vascular anomalies were observed. Although there were differences in pupil measurements and intraoperative iris behavior between patients who had been on tamsulosin and control patients, there were no significant differences in iris vasculature on iris fluorescein angiography or in iris morphology on AS-OCT. Copyright © 2014 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  16. Effect of tamsulosin on iris vasculature and morphology

    Science.gov (United States)

    Shtein, Roni M.; Hussain, Munira T.; Cooney, Theresa M.; Elner, Victor M.; Hood, Christopher T.

    2015-01-01

    PURPOSE To determine whether preoperative iris vasculature and morphology are altered in patients who have taken tamsulosin (Flomax). SETTING Academic multispecialty practice. DESIGN Case series. METHODS Patients with current or past tamsulosin use and age- and sex-matched control patients were included. Anterior segment optical coherence tomography (AS-OCT) and iris fluorescein angiography were performed to measure iris vasculature and thickness before cataract surgery. Data collected at surgery included pupil diameter, clinical signs of intraoperative floppy-iris syndrome, and surgical complications. RESULTS Tamsulosin was currently used by 16 patients and in the past by 4 patients; the control group comprised 10 patients. Pharmacologically dilated pupil diameter was significantly smaller preoperatively and immediately postoperatively in the tamsulosin group than in the control group (P = .009 and P = .003, respectively). There was a statistically significant decrease in pupil size intraoperatively in the tamsulosin group (P = .05) but not in the control group (P = .3). Iris-vasculature parameters, specifically time to first vessel fill and percentage of vessel fill on iris fluorescein angiography, were not significantly different between the 2 groups. The AS-OCT measurements of iris morphology were not statistically significantly different between the groups. No surgical complications occurred. No fluorescein dye leakage, staining, or other vascular anomalies were observed. CONCLUSIONS Although there were differences in pupil measurements and intraoperative iris behavior between patients who had been on tamsulosin and control patients, there were no significant differences in iris vasculature on iris fluorescein angiography or in iris morphology on AS-OCT. PMID:24631201

  17. Evaluation of Genetic Diversity of Iris Genotypes (Iris spp Using ISSR

    Directory of Open Access Journals (Sweden)

    seyedeh zeinab attari

    2017-02-01

    Full Text Available Introduction: Some of Iris species are growing in different parts of the Iran as wild species. Iris species have important medicinal and horticultural properties. Understanding of the genetic variation within and between populations is essential for the establishment of effective and efficient methods for conservation of the plants. Genetic variation studies are fundamental for the management and conservation of this species. The use of molecular markers is a powerful tool in the genetic study of populations. The use of DNA marker, such as AFLP, SSR, RAPD and ISSR represents an alternative method in detection of polymorphism. ISSRs are highly variable, require less investment in time, money and labor than other methods. ISSR can generate higher percentages of polymorphic loci than other PCR methods. These can serve as an efficient tool for phylogenetic studies. ISSRs had reported that used in studies of cultivated species to produce genetic linkage maps and to determine the relatedness of lines of agriculturally important species. ISSR analysis involves the PCR amplification of regions between adjacent, inversely oriented microsatellites, using a single simple sequence repeat (SSR motifs (dinucleotide, trinucleotide, tetranucleotide or penta nucleotides. Therefore, little is known about the genetic variability of the Iranian Iris ssp .The objectives of this study were to evaluate genetic diversity among genotypes using ISSR markers and the degree of polymorphism generated from ISSR technique as a pre-requisite for their applicability to population genetics studies in Iris ssp. Materials and Methods: To evaluate genetic variations in some wild Iris genotypes, Iris kopetdaghensis ،Iris songarica and Iris fosteriana were collected from some parts of Khorasan province. Genomic DNA was extracted from young leaves following the cetyltrimethylammonium bromide (CTAB procedure. Extracted DNA concentration was quantified by using the spectrophotometer

  18. CFD modeling of the IRIS pressurizer dynamic

    Energy Technology Data Exchange (ETDEWEB)

    Sanz, Ronny R.; Montesinos, Maria E.; Garcia, Carlos; Bueno, Elizabeth D.; Mazaira, Leorlen R., E-mail: rsanz@instec.cu, E-mail: mmontesi@instec.cu, E-mail: cgh@instec.cu, E-mail: leored1984@gmail.com [Instituto Superior de Tecnologias y Ciencias Aplicadas (InSTEC), La Habana (Cuba); Bezerra, Jair L.; Lira, Carlos A.B. Oliveira, E-mail: jair.lima@ufpe.br, E-mail: cabol@ufpe.br [Universida Federal de Pernambuco (UFPE), Recife, PE (Brazil). Dept. de Energia Nuclear

    2015-07-01

    Integral layout of nuclear reactor IRIS makes possible the elimination of the spray system, which is usually used to mitigate in-surge transient and also help to Boron homogenization. The study of transients with deficiencies in the Boron homogenization in this technology is very important, because they can cause disturbances in the reactor power and insert a strong reactivity in the core. The detailed knowledge of the behavior of multiphase multicomponent flows is challenging due to the complex phenomena and interactions at the interface. In this context, the CFD modeling is employed in the design of equipment in the nuclear industry as it allows predicting accidents or predicting their performance in dissimilar applications. The aim of the present research is to model the IRIS pressurizer's dynamic using the commercial CFD code CFX. A symmetric tri dimensional model equivalent to 1/8 of the total geometry was adopted to reduce mesh size and minimize processing time. The model considers the coexistence of four phases and also takes into account the heat losses. The relationships for interfacial mass, energy, and momentum transport are programmed and incorporated into CFX. Moreover, two subdomains and several additional variables are defined to monitoring the boron dilution sequences and condensation-evaporation rates in different control volumes. For transient states a non - equilibrium stratification in the pressurizer is considered. This paper discusses the model developed and the behavior of the system for representative transients sequences. The results of analyzed transients of IRIS can be applied to the design of pressurizer internal structures and components. (author)

  19. IRIS Toxicological Review of Bromobenzene (External Review ...

    Science.gov (United States)

    EPA has conducted a peer review of the scientific basis supporting the human health hazard and dose-response assessment of Bromobenzene that will appear on the Integrated Risk Information System (IRIS) database. Peer review is meant to ensure that science is used credibly and appropriately in derivation of the dose-response assessments and toxicological characterization. The draft Toxicological Review of Bromobenzene provides scientific support and rationale for the hazard and dose-response assessment pertaining to subchronic and chronic exposure to bromobenzene.

  20. IRIS Toxicological Review of Acrylamide (External Review ...

    Science.gov (United States)

    EPA has conducted a peer review by EPA’s Science Advisory Board (SAB) of the scientific basis supporting the human health hazard and dose-response assessment of acrylamide that once finalized will appear on the Integrated Risk Information System (IRIS) database. Peer review is meant to ensure that the science is used credibly and appropriately in derivation of the dose-response assessments and toxicological characterization. The draft Toxicological Review of Acrylamide provides scientific support and rationale for the hazard identification and dose-response assessment pertaining to a chronic exposure to acrylamide.