Nothing Special   »   [go: up one dir, main page]

Skip to main content

Retinal Based Authentication via Distributed Web Application

  • Conference paper
Computer Aided Systems Theory – EUROCAST 2005 (EUROCAST 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3643))

Included in the following conference series:

Abstract

Traditional authentication systems, employed to gain access to a private area in a building or to data stored in a computer, are based on something the user has (an authentication card, a magnetic key) or something the user knows (a password, an identification code). But emerging technologies allow for more reliable and comfortable for the user, authentication methods, most of them based on biometric parameters. Much work could be found in literature about biometric based authentication, using parameters like iris, voice, fingerprints, face characteristics, and others. We have developed a new methodology for personal authentication, where the biometric parameter employed for the authentication is the retinal vessel tree, acquired through a retinal angiography. It has already been asserted by expert clinicians that the configuration of the retinal vessels is unique for each individual and that it does not vary in his life, so it is a very well suited identification characteristic. In this work we will present the design and implementation stages of an application which allows for a reliable personal authentication in high security environments based on the retinal authentication method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Daugman, J.G.: Biometric personal identification system based on iris analysis. United States Patent No. 5,291.560 (1994)

    Google Scholar 

  2. Bigüin, J., Chollet, C., Borgefors, G.: Proceedings of the 1st International Conference on Audio- and Video-Based Biometric Person Authentication, Crans-Montana, Switzerland (March 1997)

    Google Scholar 

  3. Zunkel, R.: Hand geometry based verification. In: BIOMETRICS: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)

    Google Scholar 

  4. Mariño, C., Penedo, M.G., González, F.: Retinal angiographies based authentication. In: Sanfeliu, A., Ruiz-Shulcloper, J. (eds.) CIARP 2003. LNCS, vol. 2905, pp. 306–313. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Brown, L.G.: A survey of image registration techniques. ACM Computer Surveys 24(4), 325–376 (1992)

    Article  Google Scholar 

  6. López, A., Lloret, D., Serrat, J., Villanueva, J.J.: Multilocal creasness based on the level set extrinsic curvature. Computer Vision and Image Understanding 77, 111–144 (2000)

    Article  Google Scholar 

  7. Mariño, C., Penas, M., Penedo, M.G., Lloret, D., Carreira, M.J.: Integration of mutual information and creaseness based methods for the automatic registration of slo sequences. In: Proceedings of the SIARP 2001, VI Simpósio Ibero-Americano de Reconhecimento de Padrões, vol. I (2001)

    Google Scholar 

  8. Lewis, J.P.: Fast template matching. Vision Interface, 120–123 (1995)

    Google Scholar 

  9. Orfali, R., Harkey, D., Edwards, J.: Client/Server Survival Guide, 3rd edn. John Wiley & Sons, Chichester (1999)

    Google Scholar 

  10. Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns, Elements of Reusable Object-Oriented Software. Professional Computing Series. Addison-Wesley, Reading (1995)

    Google Scholar 

  11. Grand, M.: Patterns in Java: a catalog of reusable design patterns illustrated with UML, vol. 1. John Wiley & sons, New York (1998-1999)

    Google Scholar 

  12. Grand, M.: Patterns in Java: a catalog of reusable design patterns illustrated with UML, vol. 1. John Wiley & sons, New York (1998-1999)

    Google Scholar 

  13. Hickman, K.E.B.: The SSL protocol (December 1995), http://www.netscape.com/newsref/ssl.html

  14. Laurent, S.S., Johnston, J., Dumbill, E.: Programming Web Services with XML-RPC. O’Reilly, Sebastopol (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mariño, C., Penedo, M.G., Penas, M. (2005). Retinal Based Authentication via Distributed Web Application. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2005. EUROCAST 2005. Lecture Notes in Computer Science, vol 3643. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556985_50

Download citation

  • DOI: https://doi.org/10.1007/11556985_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29002-5

  • Online ISBN: 978-3-540-31829-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics