Abstract

Biometrics refer to identity verification of individuals based on some physiologic or behavioural characteristics. The typical authentication process of a person consists in extracting a biometric pattern of him/her and matching it with the stored pattern for the authorised user obtaining a similarity value between patterns. In this work an efficient method for persons authentication is showed. The biometric pattern of the system is a set of feature points representing landmarks in the retinal vessel tree. The pattern extraction and matching is described. Also, a deep analysis of similarity metrics performance is presented for the biometric system. A database with samples of retina images from users on different moments of time is used, thus simulating a hard and real environment of verification. Even in this scenario, the system allows to establish a wide confidence band for the metric threshold where no errors are obtained for training and test sets.

Highlights

  • Reliable authentication of persons is a growing demanding service in many fields, in police or military environments and in civilian applications, such as access control or financial transactions

  • This paper proposes a biometric system for authentication that uses the retina blood vessel pattern

  • The results showed a high confidence band in the authentication process but the database included only 6 individuals with 2 images for each of them

Read more

Summary

Introduction

Reliable authentication of persons is a growing demanding service in many fields, in police or military environments and in civilian applications, such as access control or financial transactions. Based on the idea of fingerprint minutiae [4, 16], a robust pattern was first introduced in [17] where a set of landmarks (bifurcations and crossovers of retinal vessel tree) were extracted and used as feature points. In this scenario, the pattern matching problem is reduced to a point pattern matching problem and the similarity metric has to be defined in terms of matched points.

Authentication System Process
Similarity Metrics Analysis
Results
Conclusions and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.