Digital identities are becoming increasingly popular. Professional implementation relies upon a secure embedded system and two-factor authentication for managing the important credentials. Although biometric user authentication is sometimes employed, it is still costly and difficult for the average user. The hardware currently available does not always use embedded processing or include a certified controller. We designed a system that allows digital identity management using two-factor authentication. This system considers typically existing IT infrastructure, relies upon on-card-biometric-comparison and operates from a portable device transparent to the host system.
In this work, a new biometric identification approach based on the human iris pattern is proposed. The main idea of this technique is to represent features of the iris by multiscale analysis of the corresponding discrete dyadic wavelet transform zero-crossing representation. In this study we consider the iris signature as the mean of the gray values of different contours of virtual circles in a determined ring-shaped iris region. The resulting one-dimensional signals are compared with model features using different distances. Results show 98.7% classification success, achieving an equal error rate below 0.2% using Hamming distance, and the possibility of having null false acceptance, rates with low false rejection rates.
In this demonstration, we showcase BrightMarker, a fabrication method that uses fluorescent filaments to embed easily trackable markers in 3D printed color objects. By employing an infrared-fluorescent filament that emits light at a wavelength higher than the incident light, our optical detection setup filters out all the noise to only have the markers present in the infrared camera image. The high contrast of the markers allows us to robustly track them when objects are in motion.
Handwritten signature recognition is a biometric mode that has started to be deployed. Therefore, it is necessary to analyze the robustness of the recognition process against presentation attacks, to find its vulnerabilities. Using the results of a previous work, the vulnerabilities are detected and two presentation attack detection techniques have been implemented. With such implementations, a new evaluation has been performed, showing an improvement in the performance. Error rates have been lowered from about 20% to below 3% under operational conditions.
When considering biometrics for a Personal Identification System, different modalities can be considered. The final selection will depend on specific application requirements. From the several modalities existing nowadays, vascular systems have appeared on the scene lately. Vein-based identification is claimed to be as reliable as fingerprint or iris identification, but with the usability of hand geometry or even the face. As with any other biometric modalities, vascular solutions have to be deeply analyzed for all relevant factors that could affect their performance or the security level achieved. This will show the analysis of the performance and security achieved by a commercial vascular biometric system, when being applied in several real-world scenarios. These scenarios will cover typical office environments to the more extreme environments, such as extreme light and temperatures, as those suffered in a banking ATM, or with high humidity such as in a gym. The results will show the strengths of this modality, as well as those points where further improvements are needed.
Embedded systems are becoming widespread nowadays. We can find these systems in many applications, as part of bigger systems but as well as standalone systems. Designed for the increasing necessity of access control, many implementations of iris biometrics systems are being carried out in embedded systems. This chapter is focused on such developments, and therefore is structured as follows: first an introduction to embedded systems is made, to later describe some of the most common architectures of these systems and the design alternatives. After that, considering the particular case of an iris biometric system, detailed requirements are described. These requirements are divided into functionality and security requirements. Later on, state-of-the-art implementations according to different design alternatives are presented.