Abstract

This paper proposes a laser speckle recognition system for authenticity verification. Because of the unique imperfection surfaces of objects, laser speckle provides identifiable features for authentication. A Gabor filter, SIFT (Scale-Invariant Feature Transform), and projection were used to extract the features of laser speckle images. To accelerate the matching process, the extracted Gabor features were organized into an indexing structure using the K-means algorithm. Plastic cards were used as the target objects in the proposed system and the hardware of the speckle capturing system was built. The experimental results showed that the retrieval performance of the proposed method is accurate when the database contains 516 laser speckle images. The proposed system is robust and feasible for authenticity verification.

© 2012 OSA

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. S. E. Sarma, S. A. Weis, and D. W. Engels, “RFID systems and security and privacy implications,” in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, B. S. Kaliski Jr, Ç. K. Koç and C. Paar, eds. (Springer, 2002), 454–469.
  2. A. Juels, “RFID security and privacy: A research survey,” IEEE J. Sel. Areas Comm.24(2), 381–394 (2006).
    [CrossRef]
  3. T. Phillips, T. Karygiannis, and R. Huhn, “Security standards for the RFID market,” IEEE Security Privacy.3(6), 85–89 (2005).
    [CrossRef]
  4. M. Shridhar, J. W. V. Miller, G. Houle, and L. Bijnagte, “Recognition of license plate images: issues and perspectives,” in Proceedings of the Fifth International Conference on Document Analysis and Recognition, (Academic, Bangalore, 1999), 17–20.
  5. C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, “Design of cascaded phase keys for a hierarchical security system,” Appl. Opt.41(29), 6128–6134 (2002).
    [CrossRef] [PubMed]
  6. A. K. Ghosh, P. Verma, S. Cheng, and A. Venugopalan, “A free space optics based identification and interrogation system,” in Proceedings of IEEE International Conference on Technologies for Homeland Security (Institute of Electrical and Electronics Engineers, Woburn, 2007), 25–27.
  7. A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circ. Syst. Video Tech.14(1), 4–20 (2004).
    [CrossRef]
  8. A. K. Jain, S. Lin Hong, Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,” Proc. IEEE85(9), 1365–1388 (1997).
    [CrossRef]
  9. J. Leon, G. Sanchez, G. Aguilar, L. Toscano, H. Perez, and J. M. Ramirez, “Fingerprint verification applying invariant moments,” in Proceedings of IEEE International Midwest Symposium on Circuits and Systems (Institute of Electrical and Electronics Engineers, Cancun, 2009), 751–757.
  10. R. Zhou, S. W. Sin, D. Li, T. Isshiki, and H. Kunieda, “Adaptive SIFT based algorithm for specific fingerprint verification,” in Proceedings of IEEE International Conference on Hand-based Biometrics (Institute of Electrical and Electronics Engineers, Hong Kong, 2011), 1–6.
  11. R. Brunelli and T. Poggio, “Face recognition: features versus templates,” IEEE Trans. Pattern Anal. Mach. Intell.15(10), 1042–1052 (1993).
    [CrossRef]
  12. M. H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting faces in images: a survey,” IEEE Trans. Pattern Anal. Mach. Intell.24(1), 34–58 (2002).
    [CrossRef]
  13. C. Liu, “Gabor-based kernel PCA with fractional power polynomial models for face recognition,” IEEE Trans. Pattern Anal. Mach. Intell.26(5), 572–581 (2004).
    [CrossRef] [PubMed]
  14. R. P. Wildes, “Iris recognition: an emerging biometric technology,” Proc. IEEE85(9), 1348–1363 (1997).
    [CrossRef]
  15. L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Pattern Anal. Mach. Intell.25(12), 1519–1533 (2003).
    [CrossRef]
  16. J. G. Daugman, “How iris recognition works,” IEEE Trans. Circ. Syst. Video Tech.14(1), 21–30 (2004).
    [CrossRef]
  17. J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
    [CrossRef] [PubMed]
  18. J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Pattern Anal. Mach. Intell.15(11), 1148–1161 (1993).
    [CrossRef]
  19. J. G. Daugman, “Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression,” IEEE Trans. Acoust. Speech Signal Process.36(7), 1169–1179 (1988).
    [CrossRef]
  20. Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007).
    [CrossRef]
  21. W. P. Choi, S. H. Tse, K. W. Wong, and K. M. Lam, “Simplified Gabor wavelets for human face recognition,” J. Pattern Recogn.41(3), 1186–1199 (2008).
    [CrossRef]
  22. R. J. Nemati and M. Y. Javed, “Fingerprint verification using filter-bank of Gabor and Log Gabor filters,” in Proceedings of the 15th International Conference on Systems, Signals and Image Processing (Institute of Electrical and Electronics Engineers, Bratislava, 2008), 363–366.
  23. M. L. Wen, Y. Liang, Q. Pan, and H. C. Zhang, “A Gabor filter based fingerprint enhancement algorithm in wavelet domain,” in Proceedings of IEEE International Symposium on Communications and Information Technology (Institute of Electrical and Electronics Engineers, Beijing, 2005), 1468–1471.
  24. D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” J. Comp. Vis.60(2), 91–110 (2004).
    [CrossRef]
  25. R. Song and J. Szymanski, “Well-distributed SIFT features,” J. Electron Lett.45(6), 308–310 (2009).
    [CrossRef]
  26. H. Yuning, L. Jing, and L. Chao, “An improved SIFT feature matching algorithm,” in Proceedings of the 8th World Congress on Intelligent Control and Automation (Institute of Electrical and Electronics Engineers, Jinan, 2010), 6109–6113.
  27. F. Alonso-Fernandez, P. Tome-Gonzalez, V. Ruiz-Albacete, and J. Ortega-Garcia, “Iris recognition based on SIFT features,” in Proceedings of IEEE International Conference on Biometrics, Identity and Security (Institute of Electrical and Electronics Engineers, Tampa, 2009), 1–8.
  28. Y. Wang, C. Huang, and X. Qiu, “Multiple facial instance for face recognition based on SIFT features,” in Proceedings of IEEE International Conference on Mechatronics and Automation (Institute of Electrical and Electronics Engineers, Changchun, 2009), 2442–2446.

2009 (1)

R. Song and J. Szymanski, “Well-distributed SIFT features,” J. Electron Lett.45(6), 308–310 (2009).
[CrossRef]

2008 (1)

W. P. Choi, S. H. Tse, K. W. Wong, and K. M. Lam, “Simplified Gabor wavelets for human face recognition,” J. Pattern Recogn.41(3), 1186–1199 (2008).
[CrossRef]

2007 (1)

Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007).
[CrossRef]

2006 (1)

A. Juels, “RFID security and privacy: A research survey,” IEEE J. Sel. Areas Comm.24(2), 381–394 (2006).
[CrossRef]

2005 (2)

T. Phillips, T. Karygiannis, and R. Huhn, “Security standards for the RFID market,” IEEE Security Privacy.3(6), 85–89 (2005).
[CrossRef]

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

2004 (4)

A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circ. Syst. Video Tech.14(1), 4–20 (2004).
[CrossRef]

C. Liu, “Gabor-based kernel PCA with fractional power polynomial models for face recognition,” IEEE Trans. Pattern Anal. Mach. Intell.26(5), 572–581 (2004).
[CrossRef] [PubMed]

J. G. Daugman, “How iris recognition works,” IEEE Trans. Circ. Syst. Video Tech.14(1), 21–30 (2004).
[CrossRef]

D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” J. Comp. Vis.60(2), 91–110 (2004).
[CrossRef]

2003 (1)

L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Pattern Anal. Mach. Intell.25(12), 1519–1533 (2003).
[CrossRef]

2002 (2)

M. H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting faces in images: a survey,” IEEE Trans. Pattern Anal. Mach. Intell.24(1), 34–58 (2002).
[CrossRef]

C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, “Design of cascaded phase keys for a hierarchical security system,” Appl. Opt.41(29), 6128–6134 (2002).
[CrossRef] [PubMed]

1997 (2)

R. P. Wildes, “Iris recognition: an emerging biometric technology,” Proc. IEEE85(9), 1348–1363 (1997).
[CrossRef]

A. K. Jain, S. Lin Hong, Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,” Proc. IEEE85(9), 1365–1388 (1997).
[CrossRef]

1993 (2)

R. Brunelli and T. Poggio, “Face recognition: features versus templates,” IEEE Trans. Pattern Anal. Mach. Intell.15(10), 1042–1052 (1993).
[CrossRef]

J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Pattern Anal. Mach. Intell.15(11), 1148–1161 (1993).
[CrossRef]

1988 (1)

J. G. Daugman, “Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression,” IEEE Trans. Acoust. Speech Signal Process.36(7), 1169–1179 (1988).
[CrossRef]

Ahuja, N.

M. H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting faces in images: a survey,” IEEE Trans. Pattern Anal. Mach. Intell.24(1), 34–58 (2002).
[CrossRef]

Allwood, D. A.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Atkinson, D.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Bolle, R.

A. K. Jain, S. Lin Hong, Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,” Proc. IEEE85(9), 1365–1388 (1997).
[CrossRef]

Brunelli, R.

R. Brunelli and T. Poggio, “Face recognition: features versus templates,” IEEE Trans. Pattern Anal. Mach. Intell.15(10), 1042–1052 (1993).
[CrossRef]

Bryan, M. T.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Buchanan, J. D. R.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Chang, H. T.

Chien, H. C.

Choi, W. P.

W. P. Choi, S. H. Tse, K. W. Wong, and K. M. Lam, “Simplified Gabor wavelets for human face recognition,” J. Pattern Recogn.41(3), 1186–1199 (2008).
[CrossRef]

Cowburn, R. P.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Daugman, J. G.

J. G. Daugman, “How iris recognition works,” IEEE Trans. Circ. Syst. Video Tech.14(1), 21–30 (2004).
[CrossRef]

J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Pattern Anal. Mach. Intell.15(11), 1148–1161 (1993).
[CrossRef]

J. G. Daugman, “Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression,” IEEE Trans. Acoust. Speech Signal Process.36(7), 1169–1179 (1988).
[CrossRef]

Fenton, K.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Huhn, R.

T. Phillips, T. Karygiannis, and R. Huhn, “Security standards for the RFID market,” IEEE Security Privacy.3(6), 85–89 (2005).
[CrossRef]

Jain, A. K.

A. K. Jain, S. Lin Hong, Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,” Proc. IEEE85(9), 1365–1388 (1997).
[CrossRef]

Jain, A. K.

A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circ. Syst. Video Tech.14(1), 4–20 (2004).
[CrossRef]

Jausovec, A. V.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Jia, J.

Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007).
[CrossRef]

Juels, A.

A. Juels, “RFID security and privacy: A research survey,” IEEE J. Sel. Areas Comm.24(2), 381–394 (2006).
[CrossRef]

Karygiannis, T.

T. Phillips, T. Karygiannis, and R. Huhn, “Security standards for the RFID market,” IEEE Security Privacy.3(6), 85–89 (2005).
[CrossRef]

Kriegman, D. J.

M. H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting faces in images: a survey,” IEEE Trans. Pattern Anal. Mach. Intell.24(1), 34–58 (2002).
[CrossRef]

Kuo, C. J.

Lam, K. M.

W. P. Choi, S. H. Tse, K. W. Wong, and K. M. Lam, “Simplified Gabor wavelets for human face recognition,” J. Pattern Recogn.41(3), 1186–1199 (2008).
[CrossRef]

Lin Hong, S.

A. K. Jain, S. Lin Hong, Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,” Proc. IEEE85(9), 1365–1388 (1997).
[CrossRef]

Liu, C.

C. Liu, “Gabor-based kernel PCA with fractional power polynomial models for face recognition,” IEEE Trans. Pattern Anal. Mach. Intell.26(5), 572–581 (2004).
[CrossRef] [PubMed]

Lowe, D. G.

D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” J. Comp. Vis.60(2), 91–110 (2004).
[CrossRef]

Ma, L.

L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Pattern Anal. Mach. Intell.25(12), 1519–1533 (2003).
[CrossRef]

Pankanti,

A. K. Jain, S. Lin Hong, Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,” Proc. IEEE85(9), 1365–1388 (1997).
[CrossRef]

Petit, D.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Phillips, T.

T. Phillips, T. Karygiannis, and R. Huhn, “Security standards for the RFID market,” IEEE Security Privacy.3(6), 85–89 (2005).
[CrossRef]

Poggio, T.

R. Brunelli and T. Poggio, “Face recognition: features versus templates,” IEEE Trans. Pattern Anal. Mach. Intell.15(10), 1042–1052 (1993).
[CrossRef]

Prabhakar, S.

A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circ. Syst. Video Tech.14(1), 4–20 (2004).
[CrossRef]

Ross, A.

A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circ. Syst. Video Tech.14(1), 4–20 (2004).
[CrossRef]

Seem, P.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Song, R.

R. Song and J. Szymanski, “Well-distributed SIFT features,” J. Electron Lett.45(6), 308–310 (2009).
[CrossRef]

Szymanski, J.

R. Song and J. Szymanski, “Well-distributed SIFT features,” J. Electron Lett.45(6), 308–310 (2009).
[CrossRef]

Tan, T.

L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Pattern Anal. Mach. Intell.25(12), 1519–1533 (2003).
[CrossRef]

Tan, W.

Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007).
[CrossRef]

Tse, S. H.

W. P. Choi, S. H. Tse, K. W. Wong, and K. M. Lam, “Simplified Gabor wavelets for human face recognition,” J. Pattern Recogn.41(3), 1186–1199 (2008).
[CrossRef]

Wang, Y.

L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Pattern Anal. Mach. Intell.25(12), 1519–1533 (2003).
[CrossRef]

Wildes, R. P.

R. P. Wildes, “Iris recognition: an emerging biometric technology,” Proc. IEEE85(9), 1348–1363 (1997).
[CrossRef]

Wong, K. W.

W. P. Choi, S. H. Tse, K. W. Wong, and K. M. Lam, “Simplified Gabor wavelets for human face recognition,” J. Pattern Recogn.41(3), 1186–1199 (2008).
[CrossRef]

Xiong, G.

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Yang, F.

Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007).
[CrossRef]

Yang, J.

Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007).
[CrossRef]

Yang, M. H.

M. H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting faces in images: a survey,” IEEE Trans. Pattern Anal. Mach. Intell.24(1), 34–58 (2002).
[CrossRef]

Yeh, C. H.

Zhang, D.

L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Pattern Anal. Mach. Intell.25(12), 1519–1533 (2003).
[CrossRef]

Zheng, Z.

Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007).
[CrossRef]

Appl. Opt. (1)

IEEE J. Sel. Areas Comm. (1)

A. Juels, “RFID security and privacy: A research survey,” IEEE J. Sel. Areas Comm.24(2), 381–394 (2006).
[CrossRef]

IEEE Security Privacy. (1)

T. Phillips, T. Karygiannis, and R. Huhn, “Security standards for the RFID market,” IEEE Security Privacy.3(6), 85–89 (2005).
[CrossRef]

IEEE Trans. Acoust. Speech Signal Process. (1)

J. G. Daugman, “Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression,” IEEE Trans. Acoust. Speech Signal Process.36(7), 1169–1179 (1988).
[CrossRef]

IEEE Trans. Circ. Syst. Video Tech. (2)

J. G. Daugman, “How iris recognition works,” IEEE Trans. Circ. Syst. Video Tech.14(1), 21–30 (2004).
[CrossRef]

A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circ. Syst. Video Tech.14(1), 4–20 (2004).
[CrossRef]

IEEE Trans. Pattern Anal. Mach. Intell. (5)

R. Brunelli and T. Poggio, “Face recognition: features versus templates,” IEEE Trans. Pattern Anal. Mach. Intell.15(10), 1042–1052 (1993).
[CrossRef]

M. H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting faces in images: a survey,” IEEE Trans. Pattern Anal. Mach. Intell.24(1), 34–58 (2002).
[CrossRef]

C. Liu, “Gabor-based kernel PCA with fractional power polynomial models for face recognition,” IEEE Trans. Pattern Anal. Mach. Intell.26(5), 572–581 (2004).
[CrossRef] [PubMed]

L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Pattern Anal. Mach. Intell.25(12), 1519–1533 (2003).
[CrossRef]

J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Pattern Anal. Mach. Intell.15(11), 1148–1161 (1993).
[CrossRef]

J. Comp. Vis. (1)

D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” J. Comp. Vis.60(2), 91–110 (2004).
[CrossRef]

J. Electron Lett. (1)

R. Song and J. Szymanski, “Well-distributed SIFT features,” J. Electron Lett.45(6), 308–310 (2009).
[CrossRef]

J. Pattern Recogn. (1)

W. P. Choi, S. H. Tse, K. W. Wong, and K. M. Lam, “Simplified Gabor wavelets for human face recognition,” J. Pattern Recogn.41(3), 1186–1199 (2008).
[CrossRef]

J. Signal Proc. (1)

Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007).
[CrossRef]

Nature (1)

J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005).
[CrossRef] [PubMed]

Proc. IEEE (2)

R. P. Wildes, “Iris recognition: an emerging biometric technology,” Proc. IEEE85(9), 1348–1363 (1997).
[CrossRef]

A. K. Jain, S. Lin Hong, Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,” Proc. IEEE85(9), 1365–1388 (1997).
[CrossRef]

Other (10)

J. Leon, G. Sanchez, G. Aguilar, L. Toscano, H. Perez, and J. M. Ramirez, “Fingerprint verification applying invariant moments,” in Proceedings of IEEE International Midwest Symposium on Circuits and Systems (Institute of Electrical and Electronics Engineers, Cancun, 2009), 751–757.

R. Zhou, S. W. Sin, D. Li, T. Isshiki, and H. Kunieda, “Adaptive SIFT based algorithm for specific fingerprint verification,” in Proceedings of IEEE International Conference on Hand-based Biometrics (Institute of Electrical and Electronics Engineers, Hong Kong, 2011), 1–6.

A. K. Ghosh, P. Verma, S. Cheng, and A. Venugopalan, “A free space optics based identification and interrogation system,” in Proceedings of IEEE International Conference on Technologies for Homeland Security (Institute of Electrical and Electronics Engineers, Woburn, 2007), 25–27.

R. J. Nemati and M. Y. Javed, “Fingerprint verification using filter-bank of Gabor and Log Gabor filters,” in Proceedings of the 15th International Conference on Systems, Signals and Image Processing (Institute of Electrical and Electronics Engineers, Bratislava, 2008), 363–366.

M. L. Wen, Y. Liang, Q. Pan, and H. C. Zhang, “A Gabor filter based fingerprint enhancement algorithm in wavelet domain,” in Proceedings of IEEE International Symposium on Communications and Information Technology (Institute of Electrical and Electronics Engineers, Beijing, 2005), 1468–1471.

H. Yuning, L. Jing, and L. Chao, “An improved SIFT feature matching algorithm,” in Proceedings of the 8th World Congress on Intelligent Control and Automation (Institute of Electrical and Electronics Engineers, Jinan, 2010), 6109–6113.

F. Alonso-Fernandez, P. Tome-Gonzalez, V. Ruiz-Albacete, and J. Ortega-Garcia, “Iris recognition based on SIFT features,” in Proceedings of IEEE International Conference on Biometrics, Identity and Security (Institute of Electrical and Electronics Engineers, Tampa, 2009), 1–8.

Y. Wang, C. Huang, and X. Qiu, “Multiple facial instance for face recognition based on SIFT features,” in Proceedings of IEEE International Conference on Mechatronics and Automation (Institute of Electrical and Electronics Engineers, Changchun, 2009), 2442–2446.

S. E. Sarma, S. A. Weis, and D. W. Engels, “RFID systems and security and privacy implications,” in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, B. S. Kaliski Jr, Ç. K. Koç and C. Paar, eds. (Springer, 2002), 454–469.

M. Shridhar, J. W. V. Miller, G. Houle, and L. Bijnagte, “Recognition of license plate images: issues and perspectives,” in Proceedings of the Fifth International Conference on Document Analysis and Recognition, (Academic, Bangalore, 1999), 17–20.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (13)

Fig. 1
Fig. 1

Microscopic patterns on the surface of paper [17].

Fig. 2
Fig. 2

Plastic cards and their laser speckles.

Fig. 3
Fig. 3

The prototype of the proposed laser speckle capturing device (a) appearance, (b) interior, and (c) bird’s eye view with blue plastic card.

Fig. 4
Fig. 4

Components of the capturing device (a) digital camera, and (b) laser source.

Fig. 5
Fig. 5

Optical configuration of the laser speckle capturing device.

Fig. 6
Fig. 6

Real part of the Gabor wavelets with five scales and eight orientations.

Fig. 7
Fig. 7

Illustration of the computation of the key-point descriptor.

Fig. 8
Fig. 8

SIFT key-points of the laser speckle images.

Fig. 9
Fig. 9

Projection features (a) original speckle image (b) projection along x-axis, and (c) projection along y-axis.

Fig. 10
Fig. 10

Projection feature correlation of the same card in (a) x, and (b) y directions.

Fig. 11
Fig. 11

Projection feature correlation of the different cards in (a) x, and (b) y directions.

Fig. 12
Fig. 12

Flowchart of the proposed identification system.

Fig. 13
Fig. 13

Similarity versification between the target speckle and the correct match speckle in the database.

Tables (3)

Tables Icon

Table 1 Laser speckle acquiring device specification

Tables Icon

Table 2 Accuracy identification comparisons of the proposed method and Buchanan et al.’s method

Tables Icon

Table 3 Average recognition time of the proposed method and Buchanan et al.’s method

Equations (9)

Equations on this page are rendered with MathJax. Learn more.

ψ μ,v (z)= k μ,v 2 σ 2 e k μ,v 2 z 2 2 σ 2 [ e i k μ,v z e σ 2 2 ],
k μ,v = k v e i φ μ ,
φ μ = μπ / 8, for μ{ 0,1,2,3,4,5,6,7 },
k v = k max / f v , for v{ 0,1,2,3,4 }.
D( x,y,σ )=( G( x,y,kσ )G( x,y,σ ) )I( x,y )=L( x,y,kσ )L( x,y,σ )
m( x,y )= ( L( x+1,y )L( x1,y ) ) 2 + ( L( x,y+1 )L( x,y1 ) ) 2
θ( x,y )= tan 1 ( L( x,y+1 )L( x,y1 ) L( x+1,y )L( x1,y ) ).
r= i ( A i A ¯ )( B i B ¯ ) i ( A i A ¯ ) 2 ( B i B ¯ ) 2
cosine similarity( X,Y )= XY | X || Y | ,

Metrics