OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 20, Iss. 22 — Oct. 22, 2012
  • pp: 24382–24393

Robust laser speckle recognition system for
authenticity identification

Chia-Hung Yeh, Po-Yi Sung, Chih-Hung Kuo, and Ruey-Nan Yeh  »View Author Affiliations


Optics Express, Vol. 20, Issue 22, pp. 24382-24393 (2012)
http://dx.doi.org/10.1364/OE.20.024382


View Full Text Article

Enhanced HTML    Acrobat PDF (2823 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

This paper proposes a laser speckle recognition system for authenticity verification. Because of the unique imperfection surfaces of objects, laser speckle provides identifiable features for authentication. A Gabor filter, SIFT (Scale-Invariant Feature Transform), and projection were used to extract the features of laser speckle images. To accelerate the matching process, the extracted Gabor features were organized into an indexing structure using the K-means algorithm. Plastic cards were used as the target objects in the proposed system and the hardware of the speckle capturing system was built. The experimental results showed that the retrieval performance of the proposed method is accurate when the database contains 516 laser speckle images. The proposed system is robust and feasible for authenticity verification.

© 2012 OSA

OCIS Codes
(100.5010) Image processing : Pattern recognition
(110.6150) Imaging systems : Speckle imaging

ToC Category:
Image Processing

History
Original Manuscript: August 20, 2012
Revised Manuscript: September 25, 2012
Manuscript Accepted: October 2, 2012
Published: October 10, 2012

Citation
Chia-Hung Yeh, Po-Yi Sung, Chih-Hung Kuo, and Ruey-Nan Yeh, "Robust laser speckle recognition system for
authenticity identification," Opt. Express 20, 24382-24393 (2012)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-20-22-24382


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. S. E. Sarma, S. A. Weis, and D. W. Engels, “RFID systems and security and privacy implications,” in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, B. S. Kaliski Jr, Ç. K. Koç and C. Paar, eds. (Springer, 2002), 454–469.
  2. A. Juels, “RFID security and privacy: A research survey,” IEEE J. Sel. Areas Comm.24(2), 381–394 (2006). [CrossRef]
  3. T. Phillips, T. Karygiannis, and R. Huhn, “Security standards for the RFID market,” IEEE Security Privacy.3(6), 85–89 (2005). [CrossRef]
  4. M. Shridhar, J. W. V. Miller, G. Houle, and L. Bijnagte, “Recognition of license plate images: issues and perspectives,” in Proceedings of the Fifth International Conference on Document Analysis and Recognition, (Academic, Bangalore, 1999), 17–20.
  5. C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, “Design of cascaded phase keys for a hierarchical security system,” Appl. Opt.41(29), 6128–6134 (2002). [CrossRef] [PubMed]
  6. A. K. Ghosh, P. Verma, S. Cheng, and A. Venugopalan, “A free space optics based identification and interrogation system,” in Proceedings of IEEE International Conference on Technologies for Homeland Security (Institute of Electrical and Electronics Engineers, Woburn, 2007), 25–27.
  7. A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circ. Syst. Video Tech.14(1), 4–20 (2004). [CrossRef]
  8. A. K. Jain, S. Lin Hong, Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,” Proc. IEEE85(9), 1365–1388 (1997). [CrossRef]
  9. J. Leon, G. Sanchez, G. Aguilar, L. Toscano, H. Perez, and J. M. Ramirez, “Fingerprint verification applying invariant moments,” in Proceedings of IEEE International Midwest Symposium on Circuits and Systems (Institute of Electrical and Electronics Engineers, Cancun, 2009), 751–757.
  10. R. Zhou, S. W. Sin, D. Li, T. Isshiki, and H. Kunieda, “Adaptive SIFT based algorithm for specific fingerprint verification,” in Proceedings of IEEE International Conference on Hand-based Biometrics (Institute of Electrical and Electronics Engineers, Hong Kong, 2011), 1–6.
  11. R. Brunelli and T. Poggio, “Face recognition: features versus templates,” IEEE Trans. Pattern Anal. Mach. Intell.15(10), 1042–1052 (1993). [CrossRef]
  12. M. H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting faces in images: a survey,” IEEE Trans. Pattern Anal. Mach. Intell.24(1), 34–58 (2002). [CrossRef]
  13. C. Liu, “Gabor-based kernel PCA with fractional power polynomial models for face recognition,” IEEE Trans. Pattern Anal. Mach. Intell.26(5), 572–581 (2004). [CrossRef] [PubMed]
  14. R. P. Wildes, “Iris recognition: an emerging biometric technology,” Proc. IEEE85(9), 1348–1363 (1997). [CrossRef]
  15. L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Pattern Anal. Mach. Intell.25(12), 1519–1533 (2003). [CrossRef]
  16. J. G. Daugman, “How iris recognition works,” IEEE Trans. Circ. Syst. Video Tech.14(1), 21–30 (2004). [CrossRef]
  17. J. D. R. Buchanan, R. P. Cowburn, A. V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood, and M. T. Bryan, “Forgery: ‘fingerprinting’ documents and packaging,” Nature436(7050), 475 (2005). [CrossRef] [PubMed]
  18. J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Pattern Anal. Mach. Intell.15(11), 1148–1161 (1993). [CrossRef]
  19. J. G. Daugman, “Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression,” IEEE Trans. Acoust. Speech Signal Process.36(7), 1169–1179 (1988). [CrossRef]
  20. Z. Zheng, F. Yang, W. Tan, J. Jia, and J. Yang, “Gabor feature-based face recognition using supervised locality preserving projection,” J. Signal Proc.87(10), 2473–2483 (2007). [CrossRef]
  21. W. P. Choi, S. H. Tse, K. W. Wong, and K. M. Lam, “Simplified Gabor wavelets for human face recognition,” J. Pattern Recogn.41(3), 1186–1199 (2008). [CrossRef]
  22. R. J. Nemati and M. Y. Javed, “Fingerprint verification using filter-bank of Gabor and Log Gabor filters,” in Proceedings of the 15th International Conference on Systems, Signals and Image Processing (Institute of Electrical and Electronics Engineers, Bratislava, 2008), 363–366.
  23. M. L. Wen, Y. Liang, Q. Pan, and H. C. Zhang, “A Gabor filter based fingerprint enhancement algorithm in wavelet domain,” in Proceedings of IEEE International Symposium on Communications and Information Technology (Institute of Electrical and Electronics Engineers, Beijing, 2005), 1468–1471.
  24. D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” J. Comp. Vis.60(2), 91–110 (2004). [CrossRef]
  25. R. Song and J. Szymanski, “Well-distributed SIFT features,” J. Electron Lett.45(6), 308–310 (2009). [CrossRef]
  26. H. Yuning, L. Jing, and L. Chao, “An improved SIFT feature matching algorithm,” in Proceedings of the 8th World Congress on Intelligent Control and Automation (Institute of Electrical and Electronics Engineers, Jinan, 2010), 6109–6113.
  27. F. Alonso-Fernandez, P. Tome-Gonzalez, V. Ruiz-Albacete, and J. Ortega-Garcia, “Iris recognition based on SIFT features,” in Proceedings of IEEE International Conference on Biometrics, Identity and Security (Institute of Electrical and Electronics Engineers, Tampa, 2009), 1–8.
  28. Y. Wang, C. Huang, and X. Qiu, “Multiple facial instance for face recognition based on SIFT features,” in Proceedings of IEEE International Conference on Mechatronics and Automation (Institute of Electrical and Electronics Engineers, Changchun, 2009), 2442–2446.

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited