Abstract
Traditional authentication systems, employed to gain access to a private area in a building or to data stored in a computer, are based on something the user has (an authentication card, a magnetic key) or something the user knows (a password, an identification code). But emerging technologies allow for more reliable and comfortable for the user, authentication methods, most of them based on biometric parameters. Much work could be found in literature about biometric based authentication, using parameters like iris, voice, fingerprints, face characteristics, and others. We have developed a new methodology for personal authentication, where the biometric parameter employed for the authentication is the retinal vessel tree, acquired through a retinal angiography. It has already been asserted by expert clinicians that the configuration of the retinal vessels is unique for each individual and that it does not vary in his life, so it is a very well suited identification characteristic. In this work we will present the design and implementation stages of an application which allows for a reliable personal authentication in high security environments based on the retinal authentication method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Daugman, J.G.: Biometric personal identification system based on iris analysis. United States Patent No. 5,291.560 (1994)
Bigüin, J., Chollet, C., Borgefors, G.: Proceedings of the 1st International Conference on Audio- and Video-Based Biometric Person Authentication, Crans-Montana, Switzerland (March 1997)
Zunkel, R.: Hand geometry based verification. In: BIOMETRICS: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)
Mariño, C., Penedo, M.G., González, F.: Retinal angiographies based authentication. In: Sanfeliu, A., Ruiz-Shulcloper, J. (eds.) CIARP 2003. LNCS, vol. 2905, pp. 306–313. Springer, Heidelberg (2003)
Brown, L.G.: A survey of image registration techniques. ACM Computer Surveys 24(4), 325–376 (1992)
López, A., Lloret, D., Serrat, J., Villanueva, J.J.: Multilocal creasness based on the level set extrinsic curvature. Computer Vision and Image Understanding 77, 111–144 (2000)
Mariño, C., Penas, M., Penedo, M.G., Lloret, D., Carreira, M.J.: Integration of mutual information and creaseness based methods for the automatic registration of slo sequences. In: Proceedings of the SIARP 2001, VI Simpósio Ibero-Americano de Reconhecimento de Padrões, vol. I (2001)
Lewis, J.P.: Fast template matching. Vision Interface, 120–123 (1995)
Orfali, R., Harkey, D., Edwards, J.: Client/Server Survival Guide, 3rd edn. John Wiley & Sons, Chichester (1999)
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns, Elements of Reusable Object-Oriented Software. Professional Computing Series. Addison-Wesley, Reading (1995)
Grand, M.: Patterns in Java: a catalog of reusable design patterns illustrated with UML, vol. 1. John Wiley & sons, New York (1998-1999)
Grand, M.: Patterns in Java: a catalog of reusable design patterns illustrated with UML, vol. 1. John Wiley & sons, New York (1998-1999)
Hickman, K.E.B.: The SSL protocol (December 1995), http://www.netscape.com/newsref/ssl.html
Laurent, S.S., Johnston, J., Dumbill, E.: Programming Web Services with XML-RPC. O’Reilly, Sebastopol (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mariño, C., Penedo, M.G., Penas, M. (2005). Retinal Based Authentication via Distributed Web Application. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2005. EUROCAST 2005. Lecture Notes in Computer Science, vol 3643. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556985_50
Download citation
DOI: https://doi.org/10.1007/11556985_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29002-5
Online ISBN: 978-3-540-31829-3
eBook Packages: Computer ScienceComputer Science (R0)