Professional Documents
Culture Documents
This system is known as Vernam’s cryptographic system, also called a one-time pad. The
authenticator locks the iris biometric templates it stores with keys that are only known to the
owner of the data. In this case, private information is protected even if the database is
compromised.
Main Idea:
A key is created using a pseudo-random number generator, and bit values depending on
the key bits are then randomly inverted using the XOR function.
The key concept behind the privacy-preserving iris-based verification is that unencrypted
and one-time pad-encrypted iris codes can both be matched. As long as the encryption
keys are the same, the Hamming distance between two iris codes after and before
encryption stays the same.
Enrollment:
Each eligible user who has access to a secure resource will have their eye image taken by the
administrator. Processing of the enrolled eye image is necessary in order to obtain characteristic
iris features.
This is done in three steps [2]:
a. Segmentation:
It is required to extract the iris from the images of the eye.
b. Normalization:
Daugman's rubber sheet model is used for this. Each pixel in the iris region is remapped by this
model to a pair of polar coordinates. The radial vectors loop through the iris region, with the
center of the pupil serving as the reference point.
c. Feature Extraction:
The procedure involves the convolution of the normalized iris pattern into one-dimensional Log
Gabor wavelets. Consequently, a bitwise template of size 20*480 is generated.
This template is stored in a database.
Authentication:
The user provides the share allocated to him on his ID card.
The system searches the database for the matching share.
The first iris template image I1 is produced by stacking two shares. This image is used to
generate an iris feature template.
A new eye image is provided by the user. It is processed using prior mentioned three
steps. It produces an iris feature template.
The next step is to compare the two templates.
Access is granted if features match; otherwise, the verification fails.
Effectiveness of Technique:
The iris template in the database is protected using visual cryptography techniques. It also adds
an additional layer of authentication to the current iris authentication system. Because there is
only one share in the database, no information can be acquired for the enrolled eye image, thus
iris template security is guaranteed.