Paper
26 October 2007 Optical coherence tomography used for internal biometrics
Author Affiliations +
Proceedings Volume 6796, Photonics North 2007; 67962C (2007) https://doi.org/10.1117/12.778910
Event: Photonics North 2007, 2007, Ottawa, Canada
Abstract
Traditional biometric technologies used for security and person identification essentially deal with fingerprints, hand geometry and face images. However, because all these technologies use external features of human body, they can be easily fooled and tampered with by distorting, modifying or counterfeiting these features. Nowadays, internal biometrics which detects the internal ID features of an object is becoming increasingly important. Being capable of exploring under-skin structure, optical coherence tomography (OCT) system can be used as a powerful tool for internal biometrics. We have applied fiber-optic and full-field OCT systems to detect the multiple-layer 2D images and 3D profile of the fingerprints, which eventually result in a higher discrimination than the traditional 2D recognition methods. More importantly, the OCT based fingerprint recognition has the ability to easily distinguish artificial fingerprint dummies by analyzing the extracted layered surfaces. Experiments show that our OCT systems successfully detected the dummy, which was made of plasticene and was used to bypass the commercially available fingerprint scanning system with a false accept rate (FAR) of 100%.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Shoude Chang, Sherif Sherif, Youxin Mao, and Costel Flueraru "Optical coherence tomography used for internal biometrics", Proc. SPIE 6796, Photonics North 2007, 67962C (26 October 2007); https://doi.org/10.1117/12.778910
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Optical coherence tomography

Biometrics

Iris recognition

Skin

Fingerprint recognition

3D image processing

Security technologies

Back to Top