Personal verification based on extraction and characterisation of retinal feature points

This paper describes a methodology of verification of individuals based on a retinal biometric pattern. The pattern consists in feature points of the retinal vessel tree, namely bifurcations and crossovers. These landmarks are detected and characterised adding semantic information to the biometric pattern. The typical authentication process of a person once extracted the biometric pattern includes matching it with the stored pattern for the authorised user obtaining a similarity value between them. A matching algorithm and a deep analysis of similarity metrics performance is presented. The semantic information added for the feature points allows to reduce the computation load in the matching process as only points classified equally can be matched. The system is capable of establishing a safe confidence band in the similarity measure space between scores for patterns of the same individual and between different individuals.

[1]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  Anil K. Jain,et al.  Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Andrea F. Abate,et al.  2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..

[4]  Manuel G. Penedo,et al.  Personal authentication using digital retinal images , 2006, Pattern Analysis and Applications.

[5]  H. G. Rylander,et al.  Real-time algorithm for retinal tracking , 1993, IEEE Transactions on Biomedical Engineering.

[6]  Jan Flusser,et al.  Image registration methods: a survey , 2003, Image Vis. Comput..

[7]  Pauli Kuosmanen,et al.  Fingerprint Matching Using an Orientation-Based Minutia Descriptor , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[8]  Conor Heneghan,et al.  Registration of digital retinal images using landmark correspondence by expectation maximization , 2004, Image Vis. Comput..

[9]  Gérard Chollet,et al.  Audio- and Video-based Biometric Person Authentication: First International Conference, AVBPA '97, Crans-Montana, Switzerland, March 12 - 14, 1997, Proceedings , 1997 .

[10]  Bir Bhanu,et al.  A robust two step approach for fingerprint identification , 2003, Pattern Recognit. Lett..

[11]  Sharath Pankanti,et al.  An identity-authentication system using fingerprints , 1997, Proc. IEEE.

[12]  Joan Serrat,et al.  Multilocal Creaseness Based on the Level-Set Extrinsic Curvature , 2000, Comput. Vis. Image Underst..

[13]  Manuel G. Penedo,et al.  Retinal Angiography Based Authentication , 2003, CIARP.

[14]  Daniel P. Lopresti,et al.  Forgery Quality and Its Implications for Behavioral Biometric Security , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[15]  Joan Serrat,et al.  Evaluation of Methods for Ridge and Valley Detection , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[16]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[17]  Anil K. Jain,et al.  Validating a Biometric Authentication System: Sample Size Requirements , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[18]  Lisa M. Brown,et al.  A survey of image registration techniques , 1992, CSUR.