Abstract
Biometric information can be easily leaked and/or copied. Therefore, the biometric information used for biometric authentication should be kept secure. To cope with this issue, we have proposed a user authentication system using a human reflex response. It is assumed that even if people know someone’s reflex characteristics, it is difficult to impersonate that individual, as anyone cannot control his/her reflexes. In this study, we discuss a biometric authentication system using eye-head coordination as a particular instance of reflex-based authentication. The availability of the proposed authentication system is evaluated through fundamental experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Matsumoto, T.: Gummy and conductive silicone rubber fingers importance of vulnerability analysis. In: Zheng, Y. (ed.) Advances in Cryptology–ASIACRYPT 2002, pp. 574–575. Springer, Berlin (2002)
Daugman, J.: Recognizing persons by their iris patterns. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Advances in Biometric Person Authentication, pp. 5–25. Springer, Boston (2004)
Watanabe, M.: Palm vein authentication. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics, pp. 75–88. Springer, London (2008)
Mulyono, D., Jinn, H.S.: A study of finger vein biometric for personal identification. In: Proceedings of the International Symposium on Biometrics and Security Technologies, ISBAST 2008. Islamabad, pp. 1–8 (2008)
Jain, A.K., et al.: On-line signature verification. Pattern Recogn. 35(12), 2963–2972 (2002)
Nishigaki, M., Arai, D.: A user authentication based on human reflexes using blind spot and saccade response. Int. J. Biom. 1(2), 173–190 (2008)
Nishigaki, M., Ozawa, Y.: A user authentication using blind and papillary light reflex. Inf. Process. Soc. Jpn. J. 48(9), 3039–3050 (2007). (in Japanese)
Leis, A.A., et al.: Behavior of the H-reflex in humans following mechanical perturbation or injury to rostral spinal cord. J. Muscle Nerve 19(11), 1373–1382 (1996)
Young, R.S., et al.: Transient and sustained components of the pupillary responses evoked by luminance and color. J. Vis. Res. 33, 437–446 (1993)
Daugman, J.: Demodulation by complex-valued wavelets for stochastic pattern recognition. Int. J. Wavelets Multiresolut. Inf. Process. 1(1), 1–17 (2003)
Sabarigiri, B., Suganyadevi, D.: Counter measures against iris direct attacks using fake images and liveness detection based on electroencephalogram (EEG). World Appl. Sci. J. 29, 93–98 (2014)
Jomier, J. et al.: Automatic quantification of pupil dilation under stress. In: Proceedings of the IEEE International Symposium on Biomedical Imaging: Macro to Nano, pp. 249–252 (2004)
Gresty, M.A.: Coordination of head and eye movements to fixate continuous and intermittent targets. Vis. Res. 14(6), 395–403 (1974)
Barns, G.R.: Vestibulo-ocular function during co-ordinated head and eye movements to acquire visual targets. J. Physiol. 287(1), 121–147 (1979)
Sakoe, H., Chiba, S.: Dynamic programing algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 26(1), 43–49 (1978)
Vercher, J.L., et al.: Eye-head movement coordination: vestibulo-ocular reflex suppression with head-fixed target fixation. J. Vestib. Res. 1, 161–170 (1991)
Acknowledgments
We, the authors of this study, are grateful to Prof. Atsushi Nakazawa of Kyoto University, Japan for his advice on the authentication method and provision of experimental equipment in progressing this research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Takahashi, Y., Endo, M., Matsuno, H., Muramatsu, H., Ohki, T., Nishigaki, M. (2019). A Study on Human Reflex-Based Biometric Authentication Using Eye-Head Coordination. In: Barolli, L., Kryvinska, N., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 22. Springer, Cham. https://doi.org/10.1007/978-3-319-98530-5_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-98530-5_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98529-9
Online ISBN: 978-3-319-98530-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)