A fuzzy DNA-based algorithm for identification and authentication in an Iris Detection System
Several algorithms have been proposed in order to identify or authenticate a certain user in an iris detection system. These previous algorithms are based on different transforms applied to a certain features extracted from the iris, known as iris template. However, this new approach aims to identif...
Saved in:
| Published in | 2008 42nd Annual IEEE International Carnahan Conference on Security Technology pp. 226 - 232 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.10.2008
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 142441816X 9781424418169 |
| ISSN | 1071-6572 |
| DOI | 10.1109/CCST.2008.4751306 |
Cover
| Abstract | Several algorithms have been proposed in order to identify or authenticate a certain user in an iris detection system. These previous algorithms are based on different transforms applied to a certain features extracted from the iris, known as iris template. However, this new approach aims to identify and/or authenticate a user avoiding transforms, comparing directly the Iris templates instead. Based on ideas inherited from DNA alignment algorithms and fuzzy logic, this new algorithm attains a better result in deciding whether two templates belong to the same user, when being compared to previous algorithms. Furthermore, this new algorithm allows a partial comparison between the whole template stored in a database, and a portion of template, decreasing the accessing time. As a result, not only false acceptance rate (FAR) and false rejection rate (FRR) but also time in identifying and authenticating are highly decreased compared to current algorithms and furthermore its flexibility in a local comparison makes of it a promising algorithm in not only an iris detection system, but in any biometric system. |
|---|---|
| AbstractList | Several algorithms have been proposed in order to identify or authenticate a certain user in an iris detection system. These previous algorithms are based on different transforms applied to a certain features extracted from the iris, known as iris template. However, this new approach aims to identify and/or authenticate a user avoiding transforms, comparing directly the Iris templates instead. Based on ideas inherited from DNA alignment algorithms and fuzzy logic, this new algorithm attains a better result in deciding whether two templates belong to the same user, when being compared to previous algorithms. Furthermore, this new algorithm allows a partial comparison between the whole template stored in a database, and a portion of template, decreasing the accessing time. As a result, not only false acceptance rate (FAR) and false rejection rate (FRR) but also time in identifying and authenticating are highly decreased compared to current algorithms and furthermore its flexibility in a local comparison makes of it a promising algorithm in not only an iris detection system, but in any biometric system. |
| Author | Vera, V.J. Avila, C.S. de Santos Sierra, A. |
| Author_xml | – sequence: 1 givenname: A. surname: de Santos Sierra fullname: de Santos Sierra, A. organization: Centro de Domotica Integral, Univ. Politec. de Madrid, Madrid – sequence: 2 givenname: C.S. surname: Avila fullname: Avila, C.S. organization: Centro de Domotica Integral, Univ. Politec. de Madrid, Madrid – sequence: 3 givenname: V.J. surname: Vera fullname: Vera, V.J. organization: Appl. Math. Dept., ETSI de Telecomun., Madrid |
| BookMark | eNpFkM1uwjAQhF0VpALlAape_AKhXttx4iOC_iCh9gCVeqkixz_FVUhQYlSFpy8ptN3Lar-dmcMMUa-sSovQDZAJAJF3s9lqPaGEpBOexMCIuEBD4JRzSCFJL_8P8dZDAyAJRCJOaB8NEhEJzgUjV2jcNJ_kOJzHTCYD9D7Fbn84tHj-PI1y1ViDVfFR1T5stthVNfbGlsE7r1XwVYlVeRTsw6aDZ-Q7ihe1b_DcBqt_4Kptgt1eo75TRWPH5z1Crw_369lTtHx5XMymy8hTSEPEUppyp7lkJgFjOGEGmNXSGQkQ5zTNc85yLZyMgXJJmXJxboxwTOeSgGMjRE-5-3Kn2i9VFNmu9ltVtxmQrGsv07oJWddedm7vaLo9mby19k__-_0GqD1qAg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO ADTOC UNPAY |
| DOI | 10.1109/CCST.2008.4751306 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 1424418178 9781424418176 |
| EndPage | 232 |
| ExternalDocumentID | oai:oa.upm.es:4462 4751306 |
| Genre | orig-research |
| GroupedDBID | 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS ~02 ADTOC UNPAY |
| ID | FETCH-LOGICAL-i218t-38284fc493d71dd403d13ec9fd9115b28bb43bc6f95124923af5bdd6f3cb901f3 |
| IEDL.DBID | UNPAY |
| ISBN | 142441816X 9781424418169 |
| ISSN | 1071-6572 |
| IngestDate | Sun Oct 26 04:06:43 EDT 2025 Wed Aug 27 02:18:22 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| LCCN | 76-644630 |
| Language | English |
| License | cc-by-nc-nd |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i218t-38284fc493d71dd403d13ec9fd9115b28bb43bc6f95124923af5bdd6f3cb901f3 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://oa.upm.es/4462/ |
| PageCount | 7 |
| ParticipantIDs | unpaywall_primary_10_1109_ccst_2008_4751306 ieee_primary_4751306 |
| PublicationCentury | 2000 |
| PublicationDate | 2008-Oct. |
| PublicationDateYYYYMMDD | 2008-10-01 |
| PublicationDate_xml | – month: 10 year: 2008 text: 2008-Oct. |
| PublicationDecade | 2000 |
| PublicationTitle | 2008 42nd Annual IEEE International Carnahan Conference on Security Technology |
| PublicationTitleAbbrev | CCST |
| PublicationYear | 2008 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000445397 ssj0023718 |
| Score | 1.7138411 |
| Snippet | Several algorithms have been proposed in order to identify or authenticate a certain user in an iris detection system. These previous algorithms are based on... |
| SourceID | unpaywall ieee |
| SourceType | Open Access Repository Publisher |
| StartPage | 226 |
| SubjectTerms | Authentication Biometrics Biometry Data mining DNA DNA Global and Local Alignment Feature extraction Fuzzy logic Fuzzy systems Identification Iris Iris Detection System Iris Template Sequences |
| SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JS8NAFH5UL-rFpRXrxhy8aWrSWdIcpbWI0CLYQi9SZtViTYsmiP31zmSziAdvyWRIJvOGt8x873sAF5Qyzu068mTIjEcMCb2oo4inNMEyMtLoDDw-GLK7Mbmf0EkNrqpcGK11Bj7TLXeZneWrhUzdVtk1CalVuWwDNsIOy3O1qv0UnxCKo59gC4dBngYXBg7e0S6TuqxFY5OS66m4j4rjzsCPrrvdx1EOsSy-VpRd2YGtNF7yr08-n69ZoP4uDMqx58CT11aaiJZc_aJ1_O_P7UHjJ9cPPVRWbB9qOj6AnTWawjo83SCTrlZfqDe88ZzZU4jPnxfvs-TlDVmnF81UgTnKxIx4bDs45HyclE0z14pcOXvU00kG_4pRzpbegHH_dtS984qyDN7M-gOJh22QRowkEVZhoBTxsQqwtoJVVnFS0e4IQbCQzFjnzfERYm6oUIoZLIX1Pgw-hM14EesjQAGmMuxwQfOcV8WNVb3KqjwrFaV91oS6m6jpMmfemBZz1ITLShbVsyya8aOplB9JXlyz6H3890tOYLtdctsGp7CZvKf6zDoYiTjPVtY3HqrHmw priority: 102 providerName: IEEE |
| Title | A fuzzy DNA-based algorithm for identification and authentication in an Iris Detection System |
| URI | https://ieeexplore.ieee.org/document/4751306 https://oa.upm.es/4462/ |
| UnpaywallVersion | submittedVersion |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEN4gHIwXNaBilOzBm2lp2UfbIxEJMZFwkAQPhuxTiVCItDHw650-QGO8eN2dZDdfN_PNpN_MIHTDGBcC3pGjAm4damngRKGmjjaUqMgqa3Lx-OOQD8b0YcImFXS-q4VZCjddLVyzbkOe0mkfoBpnEGRXUW08HHWfy_-Svhe1lVqXWkgaMPDEvJyPcoQO03glNp9iPv9BFf1jFO4OKRQi726aSFdtf_Vf_OMWJ6jxXX-HR3tmOUUVE9fRSxfbdLvd4N6w62Tko7GYvy4huX9bYAg98UyXyp8cbCxiMMj063GyW5plqzgbKo97JslFWDEuepY30Lh__3Q3cMrhCM4MWDlxCKRK1CoaER34WlOPaJ8YgFeD-2KyE0pJiVTcQgiVdQUkwjKpNbdESYgBLDlD1XgZmwuEfcJUEArJispTLSw4QA2OB9hfG483UT0Ddroq-l9MS7yb6HYP9H4vzym8aJp9nWLEZWl9-S_rK1RNPlJzDYSfyFZeldcqn8AXhbuugQ |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwEB2xHKAXdrHjAzdISWo7aY5VS1WgrZAoUi-o8goVJUWQCLVfj52tCHHgljhW4nisWew3bwDOKfUZM-vIEYGvHaJJ4IR1SRypCBahFlql4PFe3-88ktshHS7BZZkLo5RKwWeqai_Ts3w5FYndKrsiATUq11-GVUoIoVm2Vrmj4pomHC7CLRx4WSJc4FmAR61I6zI2zR8WbE_5fZgfeHpueNVsPgwykGX-vbzwSgXWkuidzb7YZPLDBrU3oFeMPoOevFaTmFfF_Bex439_bxN2F9l-6L60Y1uwpKJtqPwgKtyBpwbSyXw-Q61-w7GGTyI2eZ5-jOOXN2TcXjSWOeooFTRikelgsfNRXDSNbSuyBe1RS8UpACxCGV_6Ljy2rwfNjpMXZnDGxiOIHWzCNKIFCbEMPCmJi6WHlRGtNKqT8lqdc4K58LVx3ywjIWaacil9jQU3_ofGe7ASTSO1D8jDVAR1xmmW9SqZNspXGqVnpCKV6x_Ajp2o0XvGvTHK5-gALkpZlM_SeMYNR0J8xll5zbz34d8vOYO1zqDXHXVv-ndHsF4rmG69Y1iJPxJ1YtyNmJ-mq-wbxYXK6A |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NSwJBFB9MD9GlQiujYg7dYtbV-djdo2QSQeIhwQ4h81mSrpK7hP71vf3QIrp0nXmwy2-G93uP-b33ELrmXEgJ94joQDjCHAtIFBpGjGVUR047m4vHHwfifsQexnxcQafbWpiF9NLl3LOrFuQpndYeqgkOQXYV1UaDYfe5fJds-1FL61WphWQBB08syvkoB2g_jZdy_Slnsx9U0T9E4fYjhULk3UsT5enNr_6Lf_zFEWp819_h4Y5ZjlHFxnX00sUu3WzWuDfokox8DJaz1wUk929zDKEnnppS-ZODjWUMBpl-PU62S9NsFWdD5XHPJrkIK8ZFz_IGGvXvnm7vSTkcgUyBlRNCIVViTrOImqBtDPOpaVML8BpwX1x1QqUYVVo4CKGyroBUOq6MEY5qBTGAoyeoGi9ie4Zwm3IdhFLxovLUSAcO0IDjAfY31hdNVM-AnSyL_heTEu8mutkBvdvLcwo_mmSnU4y4LK3P_2V9garJR2ovgfATdVUe_hd0Cq2A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2008+42nd+Annual+IEEE+International+Carnahan+Conference+on+Security+Technology&rft.atitle=A+fuzzy+DNA-based+algorithm+for+identification+and+authentication+in+an+Iris+Detection+System&rft.au=de+Santos+Sierra%2C+A.&rft.au=Avila%2C+C.S.&rft.au=Vera%2C+V.J.&rft.date=2008-10-01&rft.pub=IEEE&rft.isbn=9781424418169&rft.issn=1071-6572&rft.spage=226&rft.epage=232&rft_id=info:doi/10.1109%2FCCST.2008.4751306&rft.externalDocID=4751306 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1071-6572&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1071-6572&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1071-6572&client=summon |