Retinal vessel tree as biometric pattern

In current society, reliable authentication and authorization of individuals are becoming more and more necessary tasks for everyday activities or applications. Just for instance, common situations such as accessing to a building restricted to authorized people (members, workers,...), taking a flight or performing a money transfer require the verification of the identity of the individual trying to perform these tasks. When considering automation of the identity verification, the most challenging aspect is the need of high accuracy, in terms of avoiding incorrect authorizations or rejections. While the user should not be denied to perform a task if authorized, he/she should be also ideally inconvenienced to a minimum which further complicates the whole verification process Siguenza Pizarro & Tapiador Mateos (2005). With this scope in mind, the term biometrics refers to identifying an individual based on his/her distinguished intrinsic characteristics. Particularly, this characteristics usually consist of physiological or behavioral features. Physiological features, such as fingerprints, are physical characteristics usually measured at a particular point of time. Behavioral characteristics, such as speech or handwriting, make reference to the way some action is performed by every individual. As they characterize a particular activity, behavioral biometrics are usually measured over time and are more dependant on the individual’s state of mind or deliberated alteration. To reinforce the active versus passive idea of both paradigms, physiological biometrics are also usually referred to as static biometrics while behavioral ones are referred to as dynamic biometrics. The traditional authentication systems based on possessions or knowledge are widely spread in the society but they have many drawbacks that biometrics try to overcome. For instance, in the scope of the knowledge-based authentication, it is well known that password systems are vulnerable mainly due to the wrong use of users and administrators. It is not rare to find some administrators sharing the same password, or users giving away their own to other people. One of the most common problems is the use of easily discovered passwords (child names, birth dates, car plate,...). On the other hand, the use of sophisticated passwords consisting of numbers, upper and lower case letters and even punctuation marks makes it harder to remember them for an user. Nevertheless, the password systems are easily broken by the use of brute forcewhere powerful computers generate all the possible combinations and test it against the authentication system. In the scope of the possession-based authentication, it is obvious that the main concerns are 6

[1]  Lisa M. Brown,et al.  A survey of image registration techniques , 1992, CSUR.

[2]  Sheng-Wen Shih,et al.  Design of Gabor Filter Banks for Iris Recognition , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[3]  Dario Maio,et al.  Direct Gray-Scale Minutiae Detection In Fingerprints , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Hamid Abrishami Moghaddam,et al.  A Novel Retinal Identification System , 2008, EURASIP J. Adv. Signal Process..

[5]  Manuel G. Penedo,et al.  Retinal Angiography Based Authentication , 2003, CIARP.

[6]  Sharath Pankanti,et al.  Fingerprint Minutiae: A Constructive Definition , 2002, Biometric Authentication.

[7]  Hyun-Chul Kim,et al.  Face recognition using the second-order mixture-of-eigenfaces method , 2004, Pattern Recognit..

[8]  P. Tower The fundus oculi in monozygotic twins; report of six pairs of identical twins. , 1955, A.M.A. archives of ophthalmology.

[9]  Alex Pentland,et al.  Probabilistic Visual Learning for Object Representation , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  H. G. Rylander,et al.  Real-time algorithm for retinal tracking , 1993, IEEE Transactions on Biomedical Engineering.

[11]  Jan Flusser,et al.  Image registration methods: a survey , 2003, Image Vis. Comput..

[12]  P Simoens,et al.  Retinal vascular patterns in domestic animals. , 1989, Research in veterinary science.

[13]  Tieniu Tan,et al.  Boosting ordinal features for accurate and fast iris recognition , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[14]  Manuel G. Penedo,et al.  Automatic Extraction of the Retina AV Index , 2004, ICIAR.

[15]  Massimo Tistarelli,et al.  Graph application on face for personal authentication and recognition , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.

[16]  Joan Serrat,et al.  Creaseness-based computer tomography and magnetic resonance registration: Comparison with the mutual information method , 1999, J. Electronic Imaging.

[17]  Mohammed Bennamoun,et al.  Keypoint Detection and Local Feature Matching for Textured 3D Face Recognition , 2007, International Journal of Computer Vision.

[18]  Tieniu Tan,et al.  Iris recognition using circular symmetric filters , 2002, Object recognition supported by user interaction for service robots.

[19]  Conor Heneghan,et al.  Registration of digital retinal images using landmark correspondence by expectation maximization , 2004, Image Vis. Comput..

[20]  Joan Serrat,et al.  Creaseness from Level Set Extrinsic Curvature , 1998, ECCV.

[21]  Joan Serrat,et al.  Multilocal Creaseness Based on the Level-Set Extrinsic Curvature , 2000, Comput. Vis. Image Underst..

[22]  Manuel G. Penedo,et al.  Personal authentication using digital retinal images , 2006, Pattern Analysis and Applications.

[23]  D. Noden Embryonic origins and assembly of blood vessels. , 1989, The American review of respiratory disease.

[24]  Joan Serrat,et al.  Evaluation of Methods for Ridge and Valley Detection , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[25]  Seongwon Cho,et al.  Iris Recognition Using Wavelet Features , 2004, J. VLSI Signal Process..

[26]  Seung-Hyun Lee,et al.  Fingerprint identification by use of a volume holographic optical correlator , 1999, Defense, Security, and Sensing.

[27]  Narendra Ahuja,et al.  Face recognition using kernel eigenfaces , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[28]  B. V. K. Vijaya Kumar,et al.  Fingerprint Verification Using Correlation Filters , 2003, AVBPA.

[29]  Sharath Pankanti,et al.  A Prototype Hand Geometry-based Verication System , 1999 .

[30]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[31]  Ahmed Bouridane,et al.  An Improved Iris Recognition System Using Feature Extraction Based on Wavelet Maxima Moment Invariants , 2007, ICB.