Have a personal or library account? Click to login

Iris-Face Fusion and Security Analysis Based on Fisher Discriminant

By:
Open Access
|Mar 2015

References

  1. M. Siponen, S. Pahnila, M. A. Mahmood. “Compliance with Information Security Policies: An Empirical Investigation,” Computer, 2010, 64 – 71, doi: 10.1109/MC.2010.35.10.1109/MC.2010.35
  2. F. Farahmand, M. J. Atallah, and E. H. Spafford. “Incentive Alignment and Risk Perception: An Information Security Application,” IEEE Transactions on Engineering Management, 2013, 60(2): 238 – 246, doi: 10.1109/TEM.2012.2185801.10.1109/TEM.2012.2185801
  3. M. Dejun, H. Wei, M. Baolei, and M. Bo. “A bottom-up approach to verifiable embedded system information flow security,” IET Information Security, 2014: 12 – 17, doi: 10.1049/iet- ifs.2012.0342.
  4. Achieving a hands-free computer interface using voice recognition and speech synthesis,” IEEE Aerospace and Electronic Systems Magazine, 2000, 15(1): 14 – 16, doi: 10.1109/62.821658.10.1109/62.821658
  5. D. Zhang, L. Feng, Z. Qijun, L. Guangming, and L. Nan. “Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores,” IEEE Transactions on Instrumentation, 2010, 60(3): 863 – 871, doi: 10.1109/TIM.2010.2062610.10.1109/TIM.2010.2062610
  6. Z. Wei Zhou, H. Jiankun Hu, I. Petersen, W. Song, and M. Bennamoun. “Performance evaluation of 2D to 3D fingerprint recognition”, 2013 6th International Congress on Image and Signal Processing, 2013: 1736 – 1741, doi: 10.1109/CISP.2013.6743956.10.1109/CISP.2013.6743956
  7. A. Mori, H. Takano, and K. Nakamura. “Rotation immunity characteristics of non-contact fingerprint recognition using local luminance variation”, 2012 Proceedings of SICE Annual Conference (SICE), 2012, 1791 – 1794.
  8. A. K. Jain, B. Klare, and P. Unsang. “Face recognition: Some challenges in forensics,” 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011, 726 – 733, doi: 10.1109/FG.2011.5771338.10.1109/FG.2011.5771338
  9. B. F. Klare, M. J. Burge, J.C. Klontz, R. W. Vorder, and A. K. Jain. “Face Recognition Performance: Role of Demographic Information”, IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1789 – 1801, doi: 10.1109/TIFS.2012.2214212.10.1109/TIFS.2012.2214212
  10. H. S. Yavuz, H. Cevikalp, and R. Edizkan. “Automatic face recognition from frontal images,” 2013 21st Signal Processing and Communications Applications Conference (SIU), 2013: 1 – 4: doi: 10.1109/SIU.2013.6531215.10.1109/SIU.2013.6531215
  11. L. Zhonghua. “A novel iris recognition method based on the natural-open eyes,” 2010 IEEE 10th International Conference on Signal Processing (ICSP), 2010: 1090 – 1093, doi: 10.1109/ICOSP.2010.5655882.10.1109/ICOSP.2010.5655882
  12. T. Chun-Wei and A. Kumar. “Accurate Iris Recognition at a Distance Using Stabilized Iris Encoding and Zernike Moments Phase Features”, IEEE Transactions on Image Processing, 2014, 23(9): 3962 – 3974, doi: 10.1109/TIP.2014.2337714.10.1109/TIP.2014.233771425029459
  13. P. Thumwarin, N. Chitanont, and T. Matsuura. “Iris recognition based on dynamic radius matching of iris image”, 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2012: 1 – 4, doi: 10.1109/ECTICon.2012.6254351.10.1109/ECTICon.2012.6254351
  14. A. Ross, and A. K. Jain. “Multimodal Biometric: an overview,” Proceedings of 12th European Signal Processing Conference, 2004, 1221 – 1224.
  15. W. Zhifang, W. Erfu, W. Shuangshuang, and D. Qun. “Multimodal Biometric System Using Face-Iris Fusion Feature,” Journal of Computational Physics, 2011, 6(5): 931 – 938.
  16. W. Zhifafng, Q. Han, and B. Christoph. “A Novel Iris Location Algorithm,” International Journal of Pattern Recognition and Artificial Intelligence, 2009, 23(1): 59 – 70.
  17. M. Li, T. Tieniu, W. Yunhong, and Z. Dexin. “Personal Identification Based on Iris Texture Analysis,” IEEE Transaction on Pattern Analysis and Machine Interlligence, 2003, 25(12): 1519 – 1533, doi: 10.1109/TPAMI.2003.1251145.10.1109/TPAMI.2003.1251145
  18. J. Daugman. “High Confidence Recognition of Persons by Iris Patterns,” 2011 IEEE 35th International Carnahan Conference on Security Technology, 2001, 10, 254 – 263.10.1109/CCST.2001.962841
  19. J. Daugman. “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Transaction on Pattern Analysis and Machine Intelligence, 1993, 15(11): 1148 – 1161, doi: 10.1109/34.244676.10.1109/34.244676
  20. R. P. Wildes. “Iris Recognition: An Emerging Biometric Technology,” Proceeding of the IEEE, 1997, 85(9): 1348 – 1363, doi: 10.1109/5.628669.10.1109/5.628669
  21. ISO/IEC 19795-1: 2006 Information Technology Biometric Performance Testing and Reporting – Pan 1: Principles and Framework, http://www.iso.org/iso/catalogue_detail.htm?csnumber=41447
  22. Y. He, L. Zhao, and C. Zou. “Face Recognition Using Common Faces Method,” Pattern Recognition Letters, 2006, 39(11): 2218 – 2222.
  23. SYRIS Technology Corp. Technical Document About FAR, FRR, and EER Version 1.0, 2004, 1 – 4.
  24. T. F. Karim, M. S. H. Rahman, and M. L. Sultana. “Face Recognition Using PCA-based Method,” 2010 IEEE International Conference on Advanced Management Science (ICAMS), 2010: 158 – 162, doi: 10.1109/ICAMS.2010.5553266.10.1109/ICAMS.2010.5553266
  25. Yongqing Wang and Xiling Liu, Face recognition based on improved support vector clustering, International Journal on Smart Sensing and Intelligent Systems, vol. 7, no.4, pp. 1807 – 1829, 2014.
  26. Yang Yongjin, Zhou Xinmei and Xiang Zhongfan,research of image pre-processing algorithm based on fpga, International Journal on Smart Sensing and Intelligent Systems, vol 6, no.4, pp.1499 – 1515, 2013.
Language: English
Page range: 387 - 407
Submitted on: Nov 2, 2014
Accepted on: Jan 17, 2015
Published on: Mar 1, 2015
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2015 Qihui Wang, Bo Zhu, Yu Liu, Lijun Xie, Yao Zheng, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.