An empirical study on iris recognition in a mobile phone

Address issues from the implementing iris recognition system on mobile phone.Propose optimal wavelength and installation position of illuminators for the system.An optimal user's gazing point is proposed to minimize occlusion and off-angle.Eye detection algorithm can detect an eye in real time on mobile phone.BERC mobile-iris database is constructed autonomously by using a proposed system. The iris recognition on a mobile phone is different from the conventional iris recognition implemented on a dedicated device in that the computational power of a mobile phone and the space for placing NIR (near infrared) LED (light emitting diode) illuminators and iris camera are limited. This paper raises these issues in detail based on real implementation of an iris recognition system in a mobile phone and proposes some solutions to these issues. An experimental study was conducted to search for the relevant power and wavelength of NIR LED illuminators with their positioning on a phone for capturing a good quality iris image. Subsequently, in view of the disparity between the user's gazing point and the center of the iris camera which causes degradation of acquired iris images, an experiment was performed to locate the appropriate gazing point for good iris image capture. A fast eye detection algorithm was proposed for implementation under the mobile platform with low computational facility. The experiments were conducted on a currently released mobile phone and the results showed promising potential for adoption of iris recognition as a reliable authentication means. As a result, two 850nm LEDs were selected for iris illumination at 1.1cm away from the iris camera for the size of a 7cm ? 13.7cm phone. In the performance, the recognition accuracy was 0.1% EER (equal error rate) and the eye detection rate with the speed of 17.64ms on a mobile phone was 99.4%.

[1]  N. L. Clarke,et al.  Biometric Authentication for Mobile Devices , 2002 .

[2]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[3]  John Daugman,et al.  10.7 – How Iris Recognition Works , 2005 .

[4]  Hyun Lee,et al.  Rapid eye detection method for non-glasses type 3D display on portable devices , 2010, IEEE Transactions on Consumer Electronics.

[5]  Thuc Dinh Nguyen,et al.  Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.

[6]  Kang Ryoung Park,et al.  A new multi-unit iris authentication based on quality assessment and score level fusion for mobile phones , 2010, Machine Vision and Applications.

[7]  Pei-Lee Teh,et al.  Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system , 2014, Expert Syst. Appl..

[8]  John Daugman How iris recognition works , 2004 .

[9]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[10]  Rupert Young,et al.  Iris Recognition on Low Computational Power Mobile Devices , 2011 .

[11]  Juliane Krämer,et al.  “My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[12]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[13]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[14]  Shuo Wang,et al.  Biometrics on mobile phone , 2011 .

[15]  S. R. Mahadeva Prasanna,et al.  Multimodal Biometric Person Authentication : A Review , 2012 .

[16]  Maria Papadaki,et al.  Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.

[17]  Gonzalo Bailador,et al.  Authentication in mobile devices through hand gesture recognition , 2012, International Journal of Information Security.

[18]  John D. Fernandez,et al.  Facial feature detection using Haar classifiers , 2006 .

[19]  John Daugman,et al.  New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[20]  Kang Ryoung Park,et al.  Multifeature-based fake iris detection method , 2007 .

[21]  Jerry Gao,et al.  Emerging Security Technologies for Mobile User Accesses , 2008 .

[22]  Fengling Han,et al.  Mobile Fingerprint for Identity Authentication in Mobile Commerce Applications , 2014, MoMM.

[23]  John J. Howard,et al.  Enhancing the Usability of Human Machine Interface on the Handheld Interagency Identification Detection Equipment (HIIDE) , 2011, 2011 21st International Conference on Systems Engineering.

[24]  Konstantinos G. Derpanis,et al.  Integral image-based representations , 2007 .

[25]  Kang Ryoung Park,et al.  Enhanced iris recognition method based on multi-unit iris images , 2013 .

[26]  Orcan Alpar Intelligent biometric pattern password authentication systems for touchscreens , 2015, Expert Syst. Appl..

[27]  Arto Meriläinen Adapting a Gaze Tracking System to Mobile Environments , 2012 .