Abstract
The experiences with the eye tracker have highlighted new issues for further investigation and developing solution. On our ongoing research we are trying to combine two different biometric user authentication methods relying on gaze pattern recognition while face features matching. This article presents methodology of using the mobile eye tracking system for user authentication. The project is mostly aimed in to the elderly and disabled computer users and includes supporting authentication procedure that gives access to the classified data with gaze pattern lock. The experiment is to use the eye movement tracking system to collect the data while the eyes of the person who is being identified follow the point on the computer screen. Whole experiment relays on the Yarbus’s experiment who showed that the viewers’ eye movements differ according to the viewer’s task. This article also presents a results of gaze pattern matching as the authentication procedure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones - A survey of attitudes and practices. Computers & Security 24, 519–527 (2005)
Miyazawa, K., Ito, K., Aoki, T., Kobayashi, K., Katsumata, A.: An Iris Recognition System Using PhaseBased Image Matching. In: IEEE International Conference on Image Processing, Atlanta, GA, October 8-11, pp. 325–328 (2006)
Lee, J.-C., Huang, P.S., Chiang, C.-S., Tu, T.-M., Chang, C.-P.: An Empirical Mode Decomposition Approach for Iris Recognition. In: IEEE International Conference on Image Processing, Atlanta, GA, October 8-11, pp. 289–292 (2006)
Fons, M., Fons, F., Canto, E., Lopez, M.: Design of a Hardware Accelerator for Fingerprint Alignment. In: International Conference on Field Programmable Logic and Applications, Amsterdam, Netherlands, August 27-29, pp. 485–488 (2007)
Wang, L., Leedham, G.: A Thermal Hand Vein Pattern Verification System. In: Singh, S., Singh, M., Apte, C., Perner, P. (eds.) ICAPR 2005. LNCS, vol. 3687, pp. 58–65. Springer, Heidelberg (2005)
Kumar, A., Prathyusha, K.V.: Personal authentication using hand vein triangulation. In: Proceedings of the SPIE, Biometric technology for Human Identification V, pp. 69440E-69440-13
Ma, S., Zanma, T., Ishida, M.: Human Identification Based on Human Skill Models. In: WRI Global Congress on Intelligent Systems, GCIS 2009, Xiamen, May 19-21, pp. 273–277 (2009)
Kasprowski, P., Ober, J.: With the flick of an eye. Biometric Technology Today 12, 7–8 (2004)
Dempere-Marco, L., Hu, X.-P., Ellis, S.M., Hansell, D.M., Yang, G.-Z.: Analysis of Visual Search Patterns with EMD Metric in Normalized Anatomical Space. IEEE Transactions on Medical Imaging, 1011–1021
Mohanty, P., Sarkar, S., Kasturi, R.: From Scores to Face Templates: A Model-BasedApproach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2065–2078 (2007)
Kocejko, T., Bujnowski, A., Wtorek, J.: Eye Mouse For Disabled. In: IEEE Conference on Human System Interactions, Krakow, Poland, May 25-27, pp. 199–202 (2008)
Kocejko, T., Bujnowski, A., Wtorek, J.: Eye-Mouse for Disabled. In: Hippe, Z.S., Kulikowski, J.L. (eds.) Human-Computer Systems Interaction. AISC, vol. 60, pp. 109–122. Springer, Heidelberg (2009)
Itti, L.: Models of bottom-up and top-down visual attention, Dissertation (Ph.D.), California Institute of Technology (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kocejko, T., Wtorek, J. (2012). Gaze Pattern Lock for Elders and Disabled. In: Piętka, E., Kawa, J. (eds) Information Technologies in Biomedicine. Lecture Notes in Computer Science(), vol 7339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31196-3_59
Download citation
DOI: https://doi.org/10.1007/978-3-642-31196-3_59
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31195-6
Online ISBN: 978-3-642-31196-3
eBook Packages: Computer ScienceComputer Science (R0)