Advertisment

Biometrics: Eyes Don't Lie

author-image
DQI Bureau
New Update

Privacy of personal data is an illusion in today's complex society. With
only passwords, or Social Security Numbers as identity or security measures
every one is vulnerable to invasion of privacy or breach of security.
Traditional means of identification are easily compromised and anyone can use
this information to assume another's identity.
Sensitive personal and corporate information can be assessed and even
criminal activities can be performed using another name.

Advertisment

India's civil aviation ministry is planning high tech methods such as
biometric identification and iris testing at airports, as part of identity
authentication measures. The ministry believes these measures would be more
accurate and less time-consuming.

Eye pattern recognition system provides a barrier to and virtually eliminates
fraudulent authentication and identity privacy and safety controls privileged
access or authorized entry to sensitive sites, data or material. In addition to
privacy protection, there are myriad of applications were iris recognition
technology can provide protection and security. This technology offers the
potential to unlock major business opportunities by providing high confidence
customer validation.

Of all the available biometric techniques, fingerprint identification has
been used the most. Common applications for fingerprint identification include
access control (buildings, ATMs, and computers are examples), forensics, and
driver-license registration. Systems using fingerprint ID systems usually employ
fast processing engines (RISC or DSP) and often, large databases (the FBI's
database contains over 70 mn fingerprints). To prevent someone from using a
fingerprint on a passive surface, such as a piece of sticky tape, newer systems
employ criteria beyond fingerprint matching.

Advertisment

Organizations use voice recognition for access to private areas such as
company intranets, computer networks, and financial databases. Unlike a
fingerprint ID system, which needs a special sensor, voice-recognition equipment
uses standard electronics components. A drawback of voice-recognition systems is
that they are of limited use in a noisy environment.

Pattern recognition is a widely used term for all kind of processes where
specific information is extracted from a large set of individual measurements.

Facial Recognition System

A facial recognition system is a computer-driven application for
automatically identifying a person from a digital image. It does that by
comparing selected facial features in the live image and a facial database.

Advertisment

Among the popular recognition algorithms are eigenface, fisherface, the
Hidden Markov model, and the neuronal motivated Dynamic Link Matching. A newly
emerging trend, claimed to achieve previously unseen accuracies, is
three-dimensional face recognition.

In order to verify the identity of an individual, a facial recognition system
goes through various steps. The first step involves capturing an image of the
individual's face with the use of a video camera. An algorithm called local
feature analysis (LFA) is then used to match distinctive features of the
individual's face to images contained in the system

These distinctive features are called nodal points. There are approximately
80 nodal points on the human face, such as the distance between the eyes, the
shape of jaw line, and the shape of the chin.

Advertisment

Generally, facial recognition systems account for slight variations in these
nodal points that may occur due to changes in facial expressions. After scanning
a database of images and finding a match, the facial recognition system rates
the possibility of the correct match, relying on the information it has
processed. Since many systems have the ability to recognize an individual's
face within seconds, a correct match may be determined while the individual is
still within a specific area.

Iris
Recognition Preferred Over Retinal

Retinal scanners are
accurate, but require close contact to the scanner and focusing on a
point. This leads to problems for people who find scanner contact
objectionable or who wear eyeglasses. Iris scanning is less obtrusive than
retinal scanning, since it does not require close scanner contact-it
also works well with eyeglass wearers.

Iris recognition
Iris-pattern recognition also has an advantage over facial-pattern
recognition in that the appearance of the iris, unlike the face, is
generally stable over time. Faces have a variety of expressions and
“looks”, depending on factors such as a person's weight, skin tone,
facial and scalp hair, age, and mood.

In addition,
facial-pattern recognition is a difficult 3D pattern-recognition problem
that must deal with differences in illumination, distance from a camera,
viewing angle, and facial makeup and apparel. In contrast, viewing the eye
can be done in a small, controlled environment with constant lighting and
fixed viewing angle and distance. Invariance of an iris recognition system
to non-essential eye variations and ambient conditions is much easier to
achieve than it is for a full-facial recognition system.

The US Department of
Homeland Security (DHS) and the Intelligence Technology Innovation Center
(ITIC) co-sponsored a test of iris recognition accuracy, usability, and
interoperability referred to as the Independent Testing of Iris
Recognition

Technology (ITIRT), the
results of which were released in May 2005. The scenario test evaluated
enrollment and matching software, and acquisition devices. The ITIRT's
primary objective was to evaluate iris recognition performance in terms of
match rates, enrollment and acquisition rates, and level of effort
required from the user.

In 2003, Identix Inc was named as one of the most reliable facial recognition
software companies. Since then, the company has further developed its product,
FaceIt®ARGUS. FaceIt® can provide face finding, face recognition, liveness and
image quality services.

Advertisment

Many facial recognition systems take advantage of Local Feature Analysis (LFA);
however, FaceIt is the only technology to utilize both LFA and skin biometrics,
uniqueness of skin texture.

Application Galore

Face recognition has a wide range of applications such as face-based video
indexing and browsing engines, multimedia management, human-computer
interaction, biometric identity authentication, and surveillance. Interest and
research activities in face recognition have increased significantly in the past
years. This is partly due to recent technology advances initially made by work
on eigenfaces and partly due to increased concerns in security. However, the
problem of face recognition remains a great challenge after several decades of
research.

Problems in Face Recognition

It is difficult for conventional methods to achieve high accuracy. The
appearance of a face is affected by extrinsic factors, including illumination,
pose and expression, as well as inaccuracies made in pre-processing stages such
as face alignment. Variations brought about by extrinsic factors make individual
face manifolds highly complex.

Advertisment

Speed is also an important issue for many applications. To achieve high
accuracy, the recognition should be performed based on intrinsic properties, and
the algorithms should be able to deal with unfavorable influences due to
extrinsic factors and mis-alignment.

Iris Recognition

The iris is the pigmented tissue in the eyeball that surrounds the pupil,
and consists of the muscles that adjust the size of the pupil. This pattern is
unique to each individual, is fixed about two years after birth, and remains
unchanged for the rest of one's life.

Iris recognition is a promising approach for confirming identity on a network
In contrast to systems up to now that used ID cards and passwords, systems that
use iris recognition reference each individual's unique iris code, so it is
possible to maintain an extremely high level of security. Since it is also
possible to basically check one's identity without making contact, there are
no unpleasant feelings like there are when giving fingerprints.

Advertisment
Iris-recognition
technology is one of the more popular options because of its accuracy and
convenience

Two types of eye scanning technologies are in use-retinal and iris. No
other biometric offers as much information as our eyes. The potential of
eye-scan identification has been known for decades. Both the iris and the retina
are distinctive, and remain stable over time. Retinal scanning was first
conceived in the 1970s, but the invasiveness and costs associated with imaging
the retina prohibited widespread market acceptance. The concept of iris
recognition was patented in 1986, and the software algorithms to realize the
technology emerged in the mid nineties. Iris recognition is less invasive, less
expensive, and highly accurate.

How It Works: An iris-recognition
algorithm first has to identify the approximately concentric circular outer
boundaries of the iris and the pupil in a photo of an eye. The set of pixels
covering only the iris is then transformed into a bit pattern that preserves the
information that is essential for a statistically meaningful comparison between
two iris images.

The mathematical methods used resemble those of modern lossy compression
algorithms for photographic images. In the case of general
IrisCode, a Garbor wavelet transform is used in order to extract the
spatial frequency range that contains a good best signal-to-noise ratio
considering the focus quality of available cameras. The results are a set of
complex numbers that carry local amplitude and phase information for the iris
image. In IrisCode, all amplitude information is discarded, and the resulting
2,048 bits that represent an iris consist only of the complex sign bits of the
representation of the iris image. Discarding the amplitude information ensures
that the IrisCode remains largely unaffected by changes in illumination and iris
color, which contributes significantly to the long-term stability of the code.
To verify an IrisCode, its Hamming distance to a previously recorded IrisCode
has to be below a suitable selected threshold.

The Challenges: A practical
problem of iris recognition is that the iris is usually partially covered by
eyelids and eyelashes. In order to reduce the false-reject risk in such cases,
additional algorithms are needed to identify the locations of eye lids and eye
lashes, and exclude the bits in the resulting code from the comparison
operation.

By 2008,
sales of biometric technologies are expected to reach $4.6 bn, up from $1
bn last year

Like with most other biometric identification technology, a still not
satisfactorily solved problem with iris recognition is the problem of “live
tissue verification”. The reliability of any biometric identification depends
on ensuring that the signal acquired and compared has actually been recorded
from a live body part of the person to be identified, and is not a manufactured
template. Many commercially available iris recognition systems are easily fooled
by presenting a high-quality photograph of a face instead of a real face, which
makes such devices unsuitable for unsupervised applications, such as door
access-control systems. The problems of live tissue verification is less of a
concern in supervised applications (eg immigration control), where a human
operator supervises the process of taking the picture.

The Road Ahead

Biometric technologies are becoming a part of everyday life as an innovative
way to control access to buildings and information. Researchers are developing
devices that will recognize a person's smell, walk and even DNA.

Iris-recognition technology is one of the more popular options because of its
accuracy and convenience. LG Electronics has installed the iris devices in
banks, airports and other high-security areas. Last summer, the Nine Zero hotel
in Boston became the first hotel to use it. By 2008, sales of biometric
technologies are expected to reach $4.6 bn, up from $1 bn last year. Without a
doubt, they will become a part of everyday life in the near future.

Amardeep Gupta


maildqindia@cybermedia.co.in


The author is head, Department of Computer Science, DAV College, Amritsar

Advertisment