SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Biometric Identification via an Oculomotor Plant Mathematical Model
                    Oleg V. Komogortsev1, Sampath Jayarathna1, Cecilia R. Aragon2, Mechehoul Mahmoud1
          1
            Department of Computer Science, Texas State University-San Marcos {ok11, sampath, mm2026@txstate.edu}
                 2
                  Computational Research Division, Lawrence Berkeley National Laboratory, CRAragon@lbl.gov

Abstract                                                                                          potential for advancement in biometric identification methods is
                                                                                                  substantial due to recent improvements in computer processing
There has been increased interest in reliable, non-intrusive                                      power, database size, and sensor technologies.
methods of biometric identification due to the growing emphasis
on security and increasing prevalence of identity theft. This paper                               There are a number of methods employed today for biometric
presents a new biometric approach that involves an estimation of                                  purposes. Some examples include the use of fingerprints, iris and
the unique oculomotor plant (OP) or eye globe muscle parameters                                   retina scans, face recognition, hand/finger geometry, voice
from an eye movement trace. These parameters model individual                                     recognition and eye movements [Bednarik et al. 2005; Daugman
properties of the human eye, including neuronal control signal,                                   2002; Jain et al. 1999; Josephson and Holmes 2002; Kasprowski
series elasticity, length tension, force velocity, and active tension.                            2004] .
These properties can be estimated for each extraocular muscle, and                                Current biometric identification technologies are somewhat fraud
have been shown to differ between individuals. We describe the                                    resistant, but they are not completely foolproof and may be
algorithms used in our approach and the results of an experiment                                  compromised with available technologies. Even though fingerprint
with 41 human subjects tracking a jumping dot on a screen. Our                                    identification is a popular methodology, such systems have been
results show improvement over existing eye movement biometric                                     demonstrated to be insufficiently invulnerable in high security
identification methods. The technique of using Oculomotor Plant                                   environments. Several recent studies have shown that it is possible
Mathematical Model (OPMM) parameters to model the individual                                      to fool fingerprinting systems with common household articles
eye provides a number of advantages for biometric identification:                                 such as gelatin [Williams 2002].
it includes both behavioral and physiological human attributes, is                                Face recognition systems are still undergoing research to improve
difficult to counterfeit, non-intrusive, and could easily be                                      their precision and recall [Jain et al. 1999; Zhao et al. 2003].
incorporated into existing biometric systems to provide an extra                                  Additionally, identical twins (1:10,000 probability), and related
layer of security.                                                                                issues such as family resemblance may bring the reliability of such
CR Categories: I.6.4 [Simulation and Modeling]: Model                                             systems into question. It is also possible to use still images and
Validation and Analysis; J.7 [Computers in Other Systems]:                                        video footage of a person to bypass a face recognition system.
Process control, Real time.                                                                       Further disadvantages of many of these methods involve the ability
Keywords: biometrics, oculomotor plant, eye tracking.
1       Introduction
Accurate, non-intrusive, and unforgeable identity recognition is an
area of increasing concern to just about everyone in today’s
networked world, with the need for security set against the goals of
easy access. The majority of the world’s population would like
secure access to their assets without risk of identity theft, yet do
not want to be subjected to inconvenient or intrusive detection
systems. Many of the most-commonly utilized methods for
identity determination have known problems. For example,                                          Figure 1. Biometric Identification Model.
password verification has demonstrated many weaknesses in areas
of accuracy (there is no way to verify that the individual typing the                             to forge replicas – in some cases even causing injury to the owner
password is actually its owner, unless a temporal pattern                                         of the body part used for biometric identification. Eye movements,
recognition system is employed [Joyce and Gupta 1990]), usability                                 in contrast, constitute a behavioral characteristic which is
(people forget passwords [Wiedenbecka et al.]), and security                                      extremely difficult to forge, and which cannot be stolen from an
(people write them down or create easy-to-hack passwords                                          individual.
[Schneier 2005]) .                                                                                 The challenge lies in classifying eye movements in such a manner
As a result, techniques of biometric identification, defined as                                   that the differences between individuals are more significant than
methods for identifying persons based on uniquely identifying                                     changes in a single human’s behavior over time. In order to do this,
physical or behavioral traits, have been garnering significant recent                             we turn to physical and behavioral characteristics that are
interest [Daugman 2002; Jain et al. 1999; Kasprowski 2004]. The                                   relatively constant in an individual human over their lifetime: the
                                                                                                  physical structure and behavior of the muscles that move the eye.
                                                                                                  We propose a person identification method based on the
Copyright © 2010 by the Association for Computing Machinery, Inc.
                                                                                                  Oculomotor Plant Mathematical Model (OPMM) developed by
Permission to make digital or hard copies of part or all of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed             [Komogortsev and Khan 2008]), derived from earlier work by
for commercial advantage and that copies bear this notice and the full citation on the            Bahill [Bahill 1980]. The OPMM models a human eye as a system
first page. Copyrights for components of this work owned by others than ACM must be               that consists of an eye globe driven by a set of extraocular muscles.
honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on
servers, or to redistribute to lists, requires prior specific permission and/or a fee.
                                                                                                  This system models the anatomical structure of the human eye,
Request permissions from Permissions Dept, ACM Inc., fax +1 (212) 869-0481 or e-mail              where each extraocular muscle is driven by a uniquely defined
permissions@acm.org.
ETRA 2010, Austin, TX, March 22 – 24, 2010.
© 2010 ACM 978-1-60558-994-7/10/0003 $10.00

                                                                                             57
neuronal control signal and consists of series elasticity, length           Error (RMSE) is computed between the detected x(t) and the
tension, force velocity, and active tension components. However,            simulated by the OPMM ∆         eye position signal.
the specific values for the previously determined OPMM                      When multiple saccades are detected for an individual by the eye
parameters were obtained from studies that examined a single                movement classification algorithm, the average of the RMSEs
individual. In this paper, we analyze eye movement traces and               from the detected and simulated trajectories is presented as a final
derive a unique vector of values corresponding to each person over          e(t). Note that a good approximate solution of the OPMM
a sample set of 41 individuals. We report our results and discuss           equations creates an eye movement trajectory with a sampling rate
the challenges and advantages provided by biometric identification          of 1000Hz [Komogortsev and Khan 2008]; in the case where the
via an OPMM.                                                                eye tracking frequency is lower, the signal ∆     is down-sampled
2     Biometric Identification by Oculomotor Plant                          to match the eye tracking frequency.
      Mathematical Model                                                    6   Optimization Algorithm
An overview of our method for biometric identification is depicted          6.1 Oculomotor Plant Parameters Vector
in Figure 1. The recorded eye movement signal u(t) from a single            The goal of the Optimization Algorithm module is to provide a set
individual is supplied to the “Eye Movement Classification”                 of better values for the OPMM parameters by minimizing error
module that classifies eye position signal into fixations and               e(t). The OPMM’s parameters, such as passive elasticity, viscosity,
saccades. We focus on the detected saccade trajectories,                    series elasticity, length tension, force velocity relationship, height
represented by Θ(t) in the diagram. The detected saccade                    and width on the neuronal control signal, are unique for each
parameters, the onset and offset coordinates and amplitudes of the          individual. Some of these parameter values were previously
detected saccades, depicted by h(t), are sent to the second module          estimated from a record of just one subject [Bahill 1980].
labeled OPMM, which generates simulated saccade trajectories                Moreover, some of the parameters such as length tension and
represented by the signal x(t). The difference between detected             series elasticity were derived by manual data fitting and hand-
saccade trajectories Θ(t) and simulated saccade trajectories x(t) is        drawn straight line approximations [Bahill 1980]. The values of the
computed by the “Error Function” module and the resulting error             OPMM parameters derived in this way can be improved to provide
e(t) is produced. The e(t) signal serves as an input to the                 a much better fit for a specific individual.
“Optimization Algorithm” module that provides feedback to the
OPMM module with the goal of minimizing the error e(t). After               One way to derive more accurate values for the OPMM parameters
several iterations, the optimum OPMM parameters in the form of              is to employ an optimization algorithm that selects new values for
an “Oculomotor Coefficients Vector” module are supplied to the              the parameters with an objective of minimizing the error e(t). It is
“Person Identification” module which performs the actual                    important to note that some parameters provide higher impact than
identification. Detailed descriptions of each module are provided           others on the simulated eye movement trajectory [Bahill 1980].
in the sections to follow.                                                  The ranking of the parameters starting with those providing the
                                                                            highest influence on the simulated saccade trajectory is as follows:
3     Eye Movement Classification                                           the width of the pulse of the neuronal control signal for the agonist
We employed the Velocity-Threshold (I-VT) algorithm [Salvucci               muscle ( ), pulse height of the neuronal control signal for the
and Goldberg 2000] with threshold of 55º/s in the Eye Movement              agonist muscle ( ), length tension           , series elasticity     ,
Classification module to split an eye movement recording into               passive viscosity of the eye globe ( ) and force velocity
fixations and saccades. The original I-VT algorithm was modified            relationship in the agonist muscle represented by the damping
to output such characteristics of an individual saccade as onset            component          , combined passive elasticity of the eye globe and
    _    , offset _       coordinates, amplitude ( _ ) and the              all extraocular muscles ( ), eye globe inertia           . All these
coordinates of all eye position points between the onset and the            parameters are selected for actual person identification.
offset. The outputs of this module are the detected saccade                 6.2 Optimization Algorithms & Strategies
trajectories Θ(t) and the onset and offset coordinates and the
amplitude of the detected saccades, h(t). Θ(t) is passed as input to        Optimization Algorithms: We employed two optimization
the Error Function module described in Section 5, and h(t) is used          algorithms to determine optimized values for the OPMM
as input to the OPMM module described in the following section.             parameter vectors ( ,        ,   ,     ,    ,  , ) with an objective
                                                                            of minimizing the error e(t).
4     Oculomotor Plant Mathematical Model                                   First, the Trust-Region (TR) algorithm that uses the interior-
Six extraocular muscles rotate the eye globe in its socket. The             reflective Newton method was applied [Coleman and Li 1996].
muscles are innervated by a neuronal control signal generated by            The TR algorithm is an optimization method that searches for a
the brain. During saccades this signal is a pulse step, where pulse         better value in an area called the trusted region around the initial
characteristics are encoded by the velocity command and step                parameter value. At the start, the region of search is close to the
characteristics are encoded by the positional command [Leigh and            initial parameter value and if a better value is found the trusted
Zee 2006]. The horizontal OPMM described in [Komogortsev and                region size is increased, otherwise the size of the search region is
Khan 2008] models all of the described properties of the                    reduced.
Oculomotor Plant as linear springs or damping components,                   Additionally, the Nelder-Mead (NM) simplex algorithm was
providing approximate values for the parameters describing these            applied [Lagarias et al. 1998]. This algorithm employs a simplex of
components.                                                                 n+1 points for a vector y with n dimensions. At the beginning the
5     Error Function                                                        algorithm builds a simplex around the initial value i by adding a
                                                                            percentage value of each component of the vector y. Resulting
Saccade trajectories generated by the Eye Movement Classification           values are employed as elements of the simplex in addition to
module and the OPMM module are supplied to the Error Function
module, where the error e(t) in a form of the Root Mean Squared



                                                                       58
initial value i. As a result new points of the simplex are generated           recorded into a distance vector. The pseudocode for the algorithm
until the simplex diameter reaches a specified threshold.                      can be found in [Komogortsev et al. 2009].
Optimization Strategies: Two strategies are employed to                        C4.5 Classification Algorithm: C4.5 is a classification algorithm
optimize OPMM parameters with the TR and NM algorithms.                        which builds a decision tree from a training set of data, where the
Strategy 1: the OPMM parameters are optimized sequentially. An                 split at each node maximizes the information gain which represents
already optimized parameter remains in the parameter vector. The               the difference in entropy in the set after and before the split. We
subsequent parameters are optimized based on the newly optimized               selected a decision tree classifier because they are robust to noisy
value of the previous parameter. For example, the value of the Klt             data and C4.5 because it is widely used and easy to implement.
(after optimization) is employed for subsequent optimization of                The pseudocode for the algorithm can be found in [Komogortsev et
Kse, and the values of both Klt, Kse (after optimization) are                  al. 2009].
employed for subsequent optimization Bp, etc.                                  7.1 Methodology
Strategy 2: the OPMM parameters are optimized sequentially. An                 Apparatus: The experiments were conducted with a Tobii x120
already optimized parameter is saved in the temporal parameter                 eye tracker [Tobii 2009], 24-inch flat panel screen with resolution
vector and the value of this parameter in the original vector is               of 1980x1200 pix. Subjects were seated approximately 710 mm
restored to the original value. The subsequent parameters are                  from the eye tracker. Sampling of eye position coordinates was
optimized based on the original values of the remaining                        done at 120Hz.
parameters. For example, the value of the Klt (after optimization) is
stored in a temporal vector and the estimation of the Kse occurs               Accuracy test: An accuracy test was employed prior to the
with the initial value of the Klt. The Kse is stored in the temporal           experiment providing us with average calibration error and invalid
vector. The optimization of the Bp is based on the initial values of           data percentage for each subject. The accuracy test is described in
Klt, Kse, etc. When all OPMM parameters are estimated the                      more detail in [Koh et al. 2009].
temporal vector holds the data for person identification.                      Eye Movement Invocation Task: The stimulus was presented as
7     Person Identification                                                    a ‘jumping point’ with vertical coordinate fixed to the middle of
                                                                               the screen. The first point was presented at the middle of the
The input to the Person Identification module consists of a set of             screen; the subsequent points moved horizontally to the left and to
OPMM parameter vectors estimated for each qualifying saccade.
                                                                               the right of the center of the screen with a spatial amplitude of 20,
The output is an authorization score classifying each saccade as
                                                                               providing average stimuli amplitude of approximately 19.3. The
belonging to an authorized user or an imposter. In order to
                                                                               jumping sequence consisted of 15 points including the original
perform the classification, we evaluated two different statistical
                                                                               point in the center, yielding 14 saccades for each participant. After
algorithms, the K-nearest neighbor (KNN) algorithm, and C4.5.
                                                                               each jump, the point remained stationary for 1.5s before the next
KNN is a very simple instance-based learning algorithm, and C4.5
is a freely-available classifier that builds a decision tree based on          jump was initiated. The size of the point was approximately 1 of
the concept of information entropy [Shakhnarovich et al. 2005].                the visual angle with the center marked as a black dot. Each point
The eye movement record for an individual consists of multiple                 consisted of white pixels (except for the central black dot), with the
saccades, and as a result the biometric identification record for              remainder of the screen left black.
each individual will consist of a set of OPMM parameter vectors.               Participants: The test data consisted of 68 student volunteers ages
We work with the complete set of per-saccade parameter vectors,                18-25 with an average age of 21.2 and standard deviation of 3.2,
and split them into a training and a testing set to perform                    24 males and 44 females, with normal or corrected-to-normal
identification.                                                                vision. None of the participants had prior experience with eye
The following methodology is used to partition each participant’s              tracking. The data collection was verified to be accurate by
data into training and testing sets. Each participant data set                 employing two parameters, the average calibration error of the
containing exactly two records is arbitrarily declared to be an                right eye and the invalid data percentage of the right eye. The data
imposter, and included only with the testing set. For each                     analyzer was instructed to discard recordings from subjects with a
participant data set containing three records or more, the parameter           calibration error of > 3.0 , with mean of 1.25, standard deviation
vectors are inserted into both testing and training sets as authorized         of 0.77 and invalid data percentage of >50%. Only 41 subject
users; the first record is inserted into the testing set and subsequent        records passed these criteria, resulting in mean accuracy of 1.25º
samples are inserted into the training set. We decided to split the            (SD=0.77) and a mean invalid data percentage of 12.43%
sets in this way because of the relatively small amount of test data;          (SD=17.22%). Only saccades with amplitudes of 17-22º were
however, it is possible that we have thereby introduced a                      employed for biometric identification.
systematic bias into the training set, and we plan further                     Performance evaluation metrics: Performance evaluation of a
experiments to eliminate this possibility. We also note that samples           biometric system is measured with the following two parameters.
identified as imposters, although not included in the training set,
                                                                               False Acceptance Rate (FAR) – The ratio of the number of
are still tracked in order to obtain the correct false acceptance rate
                                                                               imposter samples classified as authentic to the total number of all
(FAR) value for available imposters.
                                                                               the imposter samples. This metric measures the probability that the
KNN Classification Algorithm: The k-nearest neighbor (KNN)                     system incorrectly matches the input pattern of the testing set to a
algorithm [Shakhnarovich et al. 2005] (in our implementation,                  non-matching template in the training set. It measures the percent
k=5) is one of the simplest classification algorithms, but is accurate         of invalid inputs which are incorrectly accepted. False Rejection
and powerful when samples with similar classification tend to                  Rate (FRR) – The ratio of the number of authentic samples
appear nearby. ‘Nearby’ means that the distance between similar                classified as imposters to the number of all the authentic samples.
classifications is generally closer than the distance between                  This metric calculates the probability that the system fails to detect
samples with different classification [Kasprowski 2004]. For each              a match between the input pattern of the testing set and a matching
oculomotor parameter coefficient, a distance value is obtained and



                                                                          59
template in the training set. It measures the percent of valid inputs        methods will become increasingly critical across a wide range of
which are incorrectly rejected.                                              commercial and government applications.
8     Results                                                                10    References
We conducted the classification with both the KNN and C4.5                   BAHILL, A. T., 1980. Development, validation and sensitivity
algorithms on each of the OPMM parameters, and determined that                   analyses of human eye movement models, CRC Critical
the best results were obtained with KNN utilizing the TR algorithm               Reviews in Bioengineering 4, 311-355.
with optimization strategy 1 for the length tension coefficient.             BEDNARIK, R., KINNUNEN, T., MIHAILA, A., AND FRÄNTI, P., 2005.
These results improve on previous work in the field by Kasprowski                Eye-Movements as a Biometric.
[Kasprowski 2004] and Bednarik et al [Bednarik et al. 2005]. C4.5            COLEMAN, T. F., AND LI, Y., 1996. An interior trust region
did not produce acceptable results with the tested algorithm                     approach for nonlinear minimization subject to bounds, SIAM
parameters.                                                                      Journal on Optimization 6, pp. 418–445.
                                                                             DAUGMAN, J., 2002. How iris recognition works, Image
KNN: The smallest FAR and FRR values were achieved with the                      Processing. 2002. Proceedings. 2002 International Conference
Trust-Region algorithm using optimization strategy 1 for the length              1, I-33- I-36.
tension coefficient (KLT). The two next best results were provided           JAIN, A., HONG, L., AND KULKARNI, Y., 1999. A Multimodal
by the Nelder-Mead algorithm using optimization strategy 1 for the               Biometric System Using Fingerprint, Face, and Speech, In
passive elasticity coefficient (Kp) and the distance created by all              International Conference on AVBPA, 182-187.
parameters (D). The FAR=5.4% and FRR=56.6% results improve                   JOSEPHSON, S., AND HOLMES, M. E., 2002. Visual attention to
on the previously reported results of FAR=9.4% and FRR=63.4%                     repeated internet images: testing the scanpath theory on the
given by Kasprowski in 2004 using the KNN algorithm                              world wide web, In ETRA 02: Proceedings of the 2002
[Kasprowski 2004].                                                               symposium on Eye tracking research & applications, 43-49.
C4.5: Unfortunately, we did not obtain good FAR rates with the               JOYCE, R., AND GUPTA, G., 1990. Identity authentication based on
C4.5 algorithm, even if we accepted an increase in FRR. We                       keystroke latencies, ACM Communications 33, 168--176.
believe the FAR can be improved by further tuning of the                     KASPROWSKI, P., 2004. Human identification using eye
algorithm parameters. The best FAR=80% and FRR=0% values                         movements(Silesian University of Technology, Gliwice).
were achieved by Nelder-Mead with optimization strategy 2. For               KOH, D. H., GOWDA, S. A. M., AND KOMOGORTSEV, O. V., 2009.
comparison, Kasprowski obtained an FAR of 45.8% and an FRR                       Input evaluation of an eye-gaze-guided interface: kalman filter
of 12.4% using C4.5 in 2004 [Kasprowski 2004].                                   vs. velocity threshold eye movement identification,
                                                                                 Proceedings of the 1st ACM SIGCHI symposium on
9     Discussion, Conclusions and Further Work                                   Engineering interactive computing systems, 197-202.
We have introduced a novel method of biometric identification                KOMOGORTSEV, O., V., AND KHAN, J., 2008. Eye Movement
based on the utilization of Oculomotor Plant Mathematical Model                  Prediction by Kalman Filter with Integrated Linear Horizontal
parameters from horizontal positive saccadic eye movements. We                   Oculomotor Plant Mechanical Model, ETRA Symposium 2008,
evaluated the effectiveness of this method via two different                     229-236.
statistical classification techniques on a data set of horizontal            KOMOGORTSEV, O. V., JAYARATHNA, U. K. S., ARAGON, C. R.,
saccadic eye trajectories collected from 41 human participants, and              AND MECHEHOUL, M., 2009. Biometric Identification via an
achieved promising results using the k-nearest neighbor                          Oculomotor           Plant        Mathematical          Model.
classification algorithm. Our results improve on previous biometric              http://ecommons.txstate.edu/cscitrep/16/.
methods involving eye movements.                                             LAGARIAS, J. C., REEDS, J. A., WRIGHT, M. H., AND WRIGHT, P.
The OPMM method of biometric identification leverages                            E., 1998. Convergence Properties of the Nelder--Mead
physiological and behavioral characteristics that are unique to each             Simplex Method in Low Dimensions, SIAM J. on Optimization
individual – the mechanical properties of the eye globe and its                  9, 112-147.
musculature – rather than simply looking at unprocessed saccadic             LEIGH, R. J., AND ZEE, D. S., 2006. The Neurology of Eye
trajectories. The resulting additional information provides further              Movements(Oxford University Press).
structure to the eye movement data and perhaps this is what leads            SALVUCCI, D. D., AND GOLDBERG, J. H., 2000. Identifying
to the improved performance of our method over previous work. A                  fixations and saccades in eye tracking protocols, ETRA
further advantage of the proposed method is its use of a dynamic                 Symposium, 71-78.
oculomotor plant model consisting of the eye globe and                       SCHNEIER, B., 2005. Two-factor authentication: too little, too late,
extraocular muscles that is extremely difficult to counterfeit.                  ACM Communications 48, 136.
Via our tests, we demonstrated the potential to distinguish                  SHAKHNAROVICH, G., DARRELL, T., AND INDYK, P., 2005.
authorized users from imposters with this technique. However,                    Nearest-Neighbor Methods in Learning and Vision(MIT
further testing with larger subject pools and different statistical              Press).
classification algorithms is needed to improve on the accuracy               TOBII, 2009. http://www.tobii.com.
rates of our method. Nevertheless, this technique shows promise              WIEDENBECKA, S., WATERS, J., BIRGET, J.-C., BRODSKIY, A., AND
for improving the state of biometric identification. This new                    MEMON, N. PassPoints: Design and longitudinal evaluation of
method could also be easily combined with existing biometric                     a graphical password system, International Journal of Human-
identification systems that incorporate digital cameras to scan the              Computer Studies 63, 102-127.
face or iris, to provide an additional layer of security. In an ever-        WILLIAMS, J. M., 2002. Biometrics or ... biohazards?, Proceedings
more security-conscious and highly networked world, non-                         of the 2002 workshop on New security paradigms, 97-107.
intrusive and unforgeable personal identity-based authorization              ZHAO, W., CHELLAPPA, R., AND PHILLIPS, P. J., 2003. Face
                                                                                 recognition: A literature survey, ACM Computing Surveys
                                                                                 (CSUR) 35, 399-458.



                                                                        60

Weitere ähnliche Inhalte

Was ist angesagt?

A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...IRJET Journal
 
IRJET- Dental Biometric Analysis of Human Identification
IRJET- Dental Biometric Analysis of Human IdentificationIRJET- Dental Biometric Analysis of Human Identification
IRJET- Dental Biometric Analysis of Human IdentificationIRJET Journal
 
Human gait recognition using preprocessing and classification techniques
Human gait recognition using preprocessing and classification techniques Human gait recognition using preprocessing and classification techniques
Human gait recognition using preprocessing and classification techniques IJECEIAES
 
A fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties methodA fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties methodjournalBEEI
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 
Icetet 2010 id 94 fkp segmentation
Icetet 2010   id 94 fkp segmentationIcetet 2010   id 94 fkp segmentation
Icetet 2010 id 94 fkp segmentationDr. Vinayak Bharadi
 
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABijtsrd
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
 
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...IOSR Journals
 
A03640106
A03640106A03640106
A03640106theijes
 
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural TasksRyan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural TasksKalle
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Adopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human earAdopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human earIJCI JOURNAL
 

Was ist angesagt? (20)

A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
 
IRJET- Dental Biometric Analysis of Human Identification
IRJET- Dental Biometric Analysis of Human IdentificationIRJET- Dental Biometric Analysis of Human Identification
IRJET- Dental Biometric Analysis of Human Identification
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Human gait recognition using preprocessing and classification techniques
Human gait recognition using preprocessing and classification techniques Human gait recognition using preprocessing and classification techniques
Human gait recognition using preprocessing and classification techniques
 
A fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties methodA fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties method
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
Icetet 2010 id 94 fkp segmentation
Icetet 2010   id 94 fkp segmentationIcetet 2010   id 94 fkp segmentation
Icetet 2010 id 94 fkp segmentation
 
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
 
[IJET-V1I3P22] Authors :Dipali D. Deokar, Chandrasekhar G. Patil.
[IJET-V1I3P22] Authors :Dipali D. Deokar, Chandrasekhar G. Patil.[IJET-V1I3P22] Authors :Dipali D. Deokar, Chandrasekhar G. Patil.
[IJET-V1I3P22] Authors :Dipali D. Deokar, Chandrasekhar G. Patil.
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
A03640106
A03640106A03640106
A03640106
 
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural TasksRyan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
Ryan Match Moving For Area Based Analysis Of Eye Movements In Natural Tasks
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Adopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human earAdopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human ear
 

Andere mochten auch

Muhammad yustan Curriculum Vitae
Muhammad yustan Curriculum VitaeMuhammad yustan Curriculum Vitae
Muhammad yustan Curriculum VitaeMuhammad Yustan
 
Ujian koko 2013
Ujian koko 2013Ujian koko 2013
Ujian koko 2013SMK BAKAI
 
Edfn 302 Tech Tool Jenny Martinez
Edfn 302   Tech Tool   Jenny MartinezEdfn 302   Tech Tool   Jenny Martinez
Edfn 302 Tech Tool Jenny Martinezjam86tvl
 
Guestrin Listings And Donders Laws And The Estimation Of The Point Of Gaze
Guestrin Listings And Donders Laws And The Estimation Of The Point Of GazeGuestrin Listings And Donders Laws And The Estimation Of The Point Of Gaze
Guestrin Listings And Donders Laws And The Estimation Of The Point Of GazeKalle
 
20090326 Presentatie Erik Rickelman Bestuur Pkd 26 Maart 2009 V0 3(2)
20090326 Presentatie Erik Rickelman Bestuur Pkd 26 Maart 2009 V0 3(2)20090326 Presentatie Erik Rickelman Bestuur Pkd 26 Maart 2009 V0 3(2)
20090326 Presentatie Erik Rickelman Bestuur Pkd 26 Maart 2009 V0 3(2)guest2f17d3
 
To Brooklyn and Back Viewer Discussion Guide
To Brooklyn and Back Viewer Discussion GuideTo Brooklyn and Back Viewer Discussion Guide
To Brooklyn and Back Viewer Discussion Guideimroselle
 
Rembugan (digital campaign)
Rembugan (digital campaign)Rembugan (digital campaign)
Rembugan (digital campaign)Muhammad Yustan
 
Software Packet Manager
Software Packet ManagerSoftware Packet Manager
Software Packet Managergaetanmorice
 
Prk acta intercentos_13062012
Prk acta intercentos_13062012Prk acta intercentos_13062012
Prk acta intercentos_13062012oscargaliza
 
Székelyföldi nyomtatott kulturális értékek digitalizálása
Székelyföldi nyomtatott kulturális értékek digitalizálásaSzékelyföldi nyomtatott kulturális értékek digitalizálása
Székelyföldi nyomtatott kulturális értékek digitalizálásaBakai Magdolna
 
Acta%20 comision%20mixta%202011
Acta%20 comision%20mixta%202011Acta%20 comision%20mixta%202011
Acta%20 comision%20mixta%202011oscargaliza
 
Major persuasive speech
Major persuasive speechMajor persuasive speech
Major persuasive speechNikola Kordic
 
84780 recurso inconstitucionalidade contra reais decretos
84780 recurso inconstitucionalidade contra reais decretos84780 recurso inconstitucionalidade contra reais decretos
84780 recurso inconstitucionalidade contra reais decretososcargaliza
 
Zena cta _ci_30092011
Zena cta _ci_30092011Zena cta _ci_30092011
Zena cta _ci_30092011oscargaliza
 
Movie it process
Movie it processMovie it process
Movie it processSana Samad
 

Andere mochten auch (20)

Muhammad yustan Curriculum Vitae
Muhammad yustan Curriculum VitaeMuhammad yustan Curriculum Vitae
Muhammad yustan Curriculum Vitae
 
Ujian koko 2013
Ujian koko 2013Ujian koko 2013
Ujian koko 2013
 
Edfn 302 Tech Tool Jenny Martinez
Edfn 302   Tech Tool   Jenny MartinezEdfn 302   Tech Tool   Jenny Martinez
Edfn 302 Tech Tool Jenny Martinez
 
Guestrin Listings And Donders Laws And The Estimation Of The Point Of Gaze
Guestrin Listings And Donders Laws And The Estimation Of The Point Of GazeGuestrin Listings And Donders Laws And The Estimation Of The Point Of Gaze
Guestrin Listings And Donders Laws And The Estimation Of The Point Of Gaze
 
20090326 Presentatie Erik Rickelman Bestuur Pkd 26 Maart 2009 V0 3(2)
20090326 Presentatie Erik Rickelman Bestuur Pkd 26 Maart 2009 V0 3(2)20090326 Presentatie Erik Rickelman Bestuur Pkd 26 Maart 2009 V0 3(2)
20090326 Presentatie Erik Rickelman Bestuur Pkd 26 Maart 2009 V0 3(2)
 
To Brooklyn and Back Viewer Discussion Guide
To Brooklyn and Back Viewer Discussion GuideTo Brooklyn and Back Viewer Discussion Guide
To Brooklyn and Back Viewer Discussion Guide
 
วินาศกรรม11กันยา
วินาศกรรม11กันยาวินาศกรรม11กันยา
วินาศกรรม11กันยา
 
Rembugan (digital campaign)
Rembugan (digital campaign)Rembugan (digital campaign)
Rembugan (digital campaign)
 
Software Packet Manager
Software Packet ManagerSoftware Packet Manager
Software Packet Manager
 
มนุษย์ สังคม วัฒนธรรม
มนุษย์ สังคม วัฒนธรรมมนุษย์ สังคม วัฒนธรรม
มนุษย์ สังคม วัฒนธรรม
 
Prk acta intercentos_13062012
Prk acta intercentos_13062012Prk acta intercentos_13062012
Prk acta intercentos_13062012
 
Székelyföldi nyomtatott kulturális értékek digitalizálása
Székelyföldi nyomtatott kulturális értékek digitalizálásaSzékelyföldi nyomtatott kulturális értékek digitalizálása
Székelyföldi nyomtatott kulturális értékek digitalizálása
 
Acta%20 comision%20mixta%202011
Acta%20 comision%20mixta%202011Acta%20 comision%20mixta%202011
Acta%20 comision%20mixta%202011
 
Major persuasive speech
Major persuasive speechMajor persuasive speech
Major persuasive speech
 
TEMA 3B Vocabulario
TEMA 3B VocabularioTEMA 3B Vocabulario
TEMA 3B Vocabulario
 
84780 recurso inconstitucionalidade contra reais decretos
84780 recurso inconstitucionalidade contra reais decretos84780 recurso inconstitucionalidade contra reais decretos
84780 recurso inconstitucionalidade contra reais decretos
 
เมียนม่าร์
เมียนม่าร์เมียนม่าร์
เมียนม่าร์
 
Zena cta _ci_30092011
Zena cta _ci_30092011Zena cta _ci_30092011
Zena cta _ci_30092011
 
ลักษณะสภาพสังคมและวัฒนธรรม 2.4
ลักษณะสภาพสังคมและวัฒนธรรม 2.4ลักษณะสภาพสังคมและวัฒนธรรม 2.4
ลักษณะสภาพสังคมและวัฒนธรรม 2.4
 
Movie it process
Movie it processMovie it process
Movie it process
 

Ähnlich wie Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model

Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...
Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...
Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...Kalle
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique ijsc
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...IJECEIAES
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...nooriasukmaningtyas
 
Survey on Human Behavior Recognition using CNN
Survey on Human Behavior Recognition using CNNSurvey on Human Behavior Recognition using CNN
Survey on Human Behavior Recognition using CNNIRJET Journal
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...IOSR Journals
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET Journal
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...International Center for Biometric Research
 
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...International Center for Biometric Research
 
An Eye State Recognition System using Transfer Learning: Inception‑Based Deep...
An Eye State Recognition System using Transfer Learning: Inception‑Based Deep...An Eye State Recognition System using Transfer Learning: Inception‑Based Deep...
An Eye State Recognition System using Transfer Learning: Inception‑Based Deep...IRJET Journal
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...CSCJournals
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSOVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSAM Publications
 
Deep learning based biometric authentication using electrocardiogram and iris
Deep learning based biometric authentication using electrocardiogram and irisDeep learning based biometric authentication using electrocardiogram and iris
Deep learning based biometric authentication using electrocardiogram and irisIAESIJAI
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Ähnlich wie Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model (20)

Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...
Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...
Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
 
Survey on Human Behavior Recognition using CNN
Survey on Human Behavior Recognition using CNNSurvey on Human Behavior Recognition using CNN
Survey on Human Behavior Recognition using CNN
 
699 703
699 703699 703
699 703
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of Fingerprint
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
 
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
 
An Eye State Recognition System using Transfer Learning: Inception‑Based Deep...
An Eye State Recognition System using Transfer Learning: Inception‑Based Deep...An Eye State Recognition System using Transfer Learning: Inception‑Based Deep...
An Eye State Recognition System using Transfer Learning: Inception‑Based Deep...
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSOVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
 
F0932733
F0932733F0932733
F0932733
 
Deep learning based biometric authentication using electrocardiogram and iris
Deep learning based biometric authentication using electrocardiogram and irisDeep learning based biometric authentication using electrocardiogram and iris
Deep learning based biometric authentication using electrocardiogram and iris
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Mehr von Kalle

Blignaut Visual Span And Other Parameters For The Generation Of Heatmaps
Blignaut Visual Span And Other Parameters For The Generation Of HeatmapsBlignaut Visual Span And Other Parameters For The Generation Of Heatmaps
Blignaut Visual Span And Other Parameters For The Generation Of HeatmapsKalle
 
Zhang Eye Movement As An Interaction Mechanism For Relevance Feedback In A Co...
Zhang Eye Movement As An Interaction Mechanism For Relevance Feedback In A Co...Zhang Eye Movement As An Interaction Mechanism For Relevance Feedback In A Co...
Zhang Eye Movement As An Interaction Mechanism For Relevance Feedback In A Co...Kalle
 
Yamamoto Development Of Eye Tracking Pen Display Based On Stereo Bright Pupil...
Yamamoto Development Of Eye Tracking Pen Display Based On Stereo Bright Pupil...Yamamoto Development Of Eye Tracking Pen Display Based On Stereo Bright Pupil...
Yamamoto Development Of Eye Tracking Pen Display Based On Stereo Bright Pupil...Kalle
 
Wastlund What You See Is Where You Go Testing A Gaze Driven Power Wheelchair ...
Wastlund What You See Is Where You Go Testing A Gaze Driven Power Wheelchair ...Wastlund What You See Is Where You Go Testing A Gaze Driven Power Wheelchair ...
Wastlund What You See Is Where You Go Testing A Gaze Driven Power Wheelchair ...Kalle
 
Vinnikov Contingency Evaluation Of Gaze Contingent Displays For Real Time Vis...
Vinnikov Contingency Evaluation Of Gaze Contingent Displays For Real Time Vis...Vinnikov Contingency Evaluation Of Gaze Contingent Displays For Real Time Vis...
Vinnikov Contingency Evaluation Of Gaze Contingent Displays For Real Time Vis...Kalle
 
Urbina Pies With Ey Es The Limits Of Hierarchical Pie Menus In Gaze Control
Urbina Pies With Ey Es The Limits Of Hierarchical Pie Menus In Gaze ControlUrbina Pies With Ey Es The Limits Of Hierarchical Pie Menus In Gaze Control
Urbina Pies With Ey Es The Limits Of Hierarchical Pie Menus In Gaze ControlKalle
 
Urbina Alternatives To Single Character Entry And Dwell Time Selection On Eye...
Urbina Alternatives To Single Character Entry And Dwell Time Selection On Eye...Urbina Alternatives To Single Character Entry And Dwell Time Selection On Eye...
Urbina Alternatives To Single Character Entry And Dwell Time Selection On Eye...Kalle
 
Tien Measuring Situation Awareness Of Surgeons In Laparoscopic Training
Tien Measuring Situation Awareness Of Surgeons In Laparoscopic TrainingTien Measuring Situation Awareness Of Surgeons In Laparoscopic Training
Tien Measuring Situation Awareness Of Surgeons In Laparoscopic TrainingKalle
 
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...Kalle
 
Stevenson Eye Tracking With The Adaptive Optics Scanning Laser Ophthalmoscope
Stevenson Eye Tracking With The Adaptive Optics Scanning Laser OphthalmoscopeStevenson Eye Tracking With The Adaptive Optics Scanning Laser Ophthalmoscope
Stevenson Eye Tracking With The Adaptive Optics Scanning Laser OphthalmoscopeKalle
 
Stellmach Advanced Gaze Visualizations For Three Dimensional Virtual Environm...
Stellmach Advanced Gaze Visualizations For Three Dimensional Virtual Environm...Stellmach Advanced Gaze Visualizations For Three Dimensional Virtual Environm...
Stellmach Advanced Gaze Visualizations For Three Dimensional Virtual Environm...Kalle
 
Skovsgaard Small Target Selection With Gaze Alone
Skovsgaard Small Target Selection With Gaze AloneSkovsgaard Small Target Selection With Gaze Alone
Skovsgaard Small Target Selection With Gaze AloneKalle
 
San Agustin Evaluation Of A Low Cost Open Source Gaze Tracker
San Agustin Evaluation Of A Low Cost Open Source Gaze TrackerSan Agustin Evaluation Of A Low Cost Open Source Gaze Tracker
San Agustin Evaluation Of A Low Cost Open Source Gaze TrackerKalle
 
Rosengrant Gaze Scribing In Physics Problem Solving
Rosengrant Gaze Scribing In Physics Problem SolvingRosengrant Gaze Scribing In Physics Problem Solving
Rosengrant Gaze Scribing In Physics Problem SolvingKalle
 
Qvarfordt Understanding The Benefits Of Gaze Enhanced Visual Search
Qvarfordt Understanding The Benefits Of Gaze Enhanced Visual SearchQvarfordt Understanding The Benefits Of Gaze Enhanced Visual Search
Qvarfordt Understanding The Benefits Of Gaze Enhanced Visual SearchKalle
 
Prats Interpretation Of Geometric Shapes An Eye Movement Study
Prats Interpretation Of Geometric Shapes An Eye Movement StudyPrats Interpretation Of Geometric Shapes An Eye Movement Study
Prats Interpretation Of Geometric Shapes An Eye Movement StudyKalle
 
Porta Ce Cursor A Contextual Eye Cursor For General Pointing In Windows Envir...
Porta Ce Cursor A Contextual Eye Cursor For General Pointing In Windows Envir...Porta Ce Cursor A Contextual Eye Cursor For General Pointing In Windows Envir...
Porta Ce Cursor A Contextual Eye Cursor For General Pointing In Windows Envir...Kalle
 
Pontillo Semanti Code Using Content Similarity And Database Driven Matching T...
Pontillo Semanti Code Using Content Similarity And Database Driven Matching T...Pontillo Semanti Code Using Content Similarity And Database Driven Matching T...
Pontillo Semanti Code Using Content Similarity And Database Driven Matching T...Kalle
 
Park Quantification Of Aesthetic Viewing Using Eye Tracking Technology The In...
Park Quantification Of Aesthetic Viewing Using Eye Tracking Technology The In...Park Quantification Of Aesthetic Viewing Using Eye Tracking Technology The In...
Park Quantification Of Aesthetic Viewing Using Eye Tracking Technology The In...Kalle
 
Palinko Estimating Cognitive Load Using Remote Eye Tracking In A Driving Simu...
Palinko Estimating Cognitive Load Using Remote Eye Tracking In A Driving Simu...Palinko Estimating Cognitive Load Using Remote Eye Tracking In A Driving Simu...
Palinko Estimating Cognitive Load Using Remote Eye Tracking In A Driving Simu...Kalle
 

Mehr von Kalle (20)

Blignaut Visual Span And Other Parameters For The Generation Of Heatmaps
Blignaut Visual Span And Other Parameters For The Generation Of HeatmapsBlignaut Visual Span And Other Parameters For The Generation Of Heatmaps
Blignaut Visual Span And Other Parameters For The Generation Of Heatmaps
 
Zhang Eye Movement As An Interaction Mechanism For Relevance Feedback In A Co...
Zhang Eye Movement As An Interaction Mechanism For Relevance Feedback In A Co...Zhang Eye Movement As An Interaction Mechanism For Relevance Feedback In A Co...
Zhang Eye Movement As An Interaction Mechanism For Relevance Feedback In A Co...
 
Yamamoto Development Of Eye Tracking Pen Display Based On Stereo Bright Pupil...
Yamamoto Development Of Eye Tracking Pen Display Based On Stereo Bright Pupil...Yamamoto Development Of Eye Tracking Pen Display Based On Stereo Bright Pupil...
Yamamoto Development Of Eye Tracking Pen Display Based On Stereo Bright Pupil...
 
Wastlund What You See Is Where You Go Testing A Gaze Driven Power Wheelchair ...
Wastlund What You See Is Where You Go Testing A Gaze Driven Power Wheelchair ...Wastlund What You See Is Where You Go Testing A Gaze Driven Power Wheelchair ...
Wastlund What You See Is Where You Go Testing A Gaze Driven Power Wheelchair ...
 
Vinnikov Contingency Evaluation Of Gaze Contingent Displays For Real Time Vis...
Vinnikov Contingency Evaluation Of Gaze Contingent Displays For Real Time Vis...Vinnikov Contingency Evaluation Of Gaze Contingent Displays For Real Time Vis...
Vinnikov Contingency Evaluation Of Gaze Contingent Displays For Real Time Vis...
 
Urbina Pies With Ey Es The Limits Of Hierarchical Pie Menus In Gaze Control
Urbina Pies With Ey Es The Limits Of Hierarchical Pie Menus In Gaze ControlUrbina Pies With Ey Es The Limits Of Hierarchical Pie Menus In Gaze Control
Urbina Pies With Ey Es The Limits Of Hierarchical Pie Menus In Gaze Control
 
Urbina Alternatives To Single Character Entry And Dwell Time Selection On Eye...
Urbina Alternatives To Single Character Entry And Dwell Time Selection On Eye...Urbina Alternatives To Single Character Entry And Dwell Time Selection On Eye...
Urbina Alternatives To Single Character Entry And Dwell Time Selection On Eye...
 
Tien Measuring Situation Awareness Of Surgeons In Laparoscopic Training
Tien Measuring Situation Awareness Of Surgeons In Laparoscopic TrainingTien Measuring Situation Awareness Of Surgeons In Laparoscopic Training
Tien Measuring Situation Awareness Of Surgeons In Laparoscopic Training
 
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
 
Stevenson Eye Tracking With The Adaptive Optics Scanning Laser Ophthalmoscope
Stevenson Eye Tracking With The Adaptive Optics Scanning Laser OphthalmoscopeStevenson Eye Tracking With The Adaptive Optics Scanning Laser Ophthalmoscope
Stevenson Eye Tracking With The Adaptive Optics Scanning Laser Ophthalmoscope
 
Stellmach Advanced Gaze Visualizations For Three Dimensional Virtual Environm...
Stellmach Advanced Gaze Visualizations For Three Dimensional Virtual Environm...Stellmach Advanced Gaze Visualizations For Three Dimensional Virtual Environm...
Stellmach Advanced Gaze Visualizations For Three Dimensional Virtual Environm...
 
Skovsgaard Small Target Selection With Gaze Alone
Skovsgaard Small Target Selection With Gaze AloneSkovsgaard Small Target Selection With Gaze Alone
Skovsgaard Small Target Selection With Gaze Alone
 
San Agustin Evaluation Of A Low Cost Open Source Gaze Tracker
San Agustin Evaluation Of A Low Cost Open Source Gaze TrackerSan Agustin Evaluation Of A Low Cost Open Source Gaze Tracker
San Agustin Evaluation Of A Low Cost Open Source Gaze Tracker
 
Rosengrant Gaze Scribing In Physics Problem Solving
Rosengrant Gaze Scribing In Physics Problem SolvingRosengrant Gaze Scribing In Physics Problem Solving
Rosengrant Gaze Scribing In Physics Problem Solving
 
Qvarfordt Understanding The Benefits Of Gaze Enhanced Visual Search
Qvarfordt Understanding The Benefits Of Gaze Enhanced Visual SearchQvarfordt Understanding The Benefits Of Gaze Enhanced Visual Search
Qvarfordt Understanding The Benefits Of Gaze Enhanced Visual Search
 
Prats Interpretation Of Geometric Shapes An Eye Movement Study
Prats Interpretation Of Geometric Shapes An Eye Movement StudyPrats Interpretation Of Geometric Shapes An Eye Movement Study
Prats Interpretation Of Geometric Shapes An Eye Movement Study
 
Porta Ce Cursor A Contextual Eye Cursor For General Pointing In Windows Envir...
Porta Ce Cursor A Contextual Eye Cursor For General Pointing In Windows Envir...Porta Ce Cursor A Contextual Eye Cursor For General Pointing In Windows Envir...
Porta Ce Cursor A Contextual Eye Cursor For General Pointing In Windows Envir...
 
Pontillo Semanti Code Using Content Similarity And Database Driven Matching T...
Pontillo Semanti Code Using Content Similarity And Database Driven Matching T...Pontillo Semanti Code Using Content Similarity And Database Driven Matching T...
Pontillo Semanti Code Using Content Similarity And Database Driven Matching T...
 
Park Quantification Of Aesthetic Viewing Using Eye Tracking Technology The In...
Park Quantification Of Aesthetic Viewing Using Eye Tracking Technology The In...Park Quantification Of Aesthetic Viewing Using Eye Tracking Technology The In...
Park Quantification Of Aesthetic Viewing Using Eye Tracking Technology The In...
 
Palinko Estimating Cognitive Load Using Remote Eye Tracking In A Driving Simu...
Palinko Estimating Cognitive Load Using Remote Eye Tracking In A Driving Simu...Palinko Estimating Cognitive Load Using Remote Eye Tracking In A Driving Simu...
Palinko Estimating Cognitive Load Using Remote Eye Tracking In A Driving Simu...
 

Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model

  • 1. Biometric Identification via an Oculomotor Plant Mathematical Model Oleg V. Komogortsev1, Sampath Jayarathna1, Cecilia R. Aragon2, Mechehoul Mahmoud1 1 Department of Computer Science, Texas State University-San Marcos {ok11, sampath, mm2026@txstate.edu} 2 Computational Research Division, Lawrence Berkeley National Laboratory, CRAragon@lbl.gov Abstract potential for advancement in biometric identification methods is substantial due to recent improvements in computer processing There has been increased interest in reliable, non-intrusive power, database size, and sensor technologies. methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity theft. This paper There are a number of methods employed today for biometric presents a new biometric approach that involves an estimation of purposes. Some examples include the use of fingerprints, iris and the unique oculomotor plant (OP) or eye globe muscle parameters retina scans, face recognition, hand/finger geometry, voice from an eye movement trace. These parameters model individual recognition and eye movements [Bednarik et al. 2005; Daugman properties of the human eye, including neuronal control signal, 2002; Jain et al. 1999; Josephson and Holmes 2002; Kasprowski series elasticity, length tension, force velocity, and active tension. 2004] . These properties can be estimated for each extraocular muscle, and Current biometric identification technologies are somewhat fraud have been shown to differ between individuals. We describe the resistant, but they are not completely foolproof and may be algorithms used in our approach and the results of an experiment compromised with available technologies. Even though fingerprint with 41 human subjects tracking a jumping dot on a screen. Our identification is a popular methodology, such systems have been results show improvement over existing eye movement biometric demonstrated to be insufficiently invulnerable in high security identification methods. The technique of using Oculomotor Plant environments. Several recent studies have shown that it is possible Mathematical Model (OPMM) parameters to model the individual to fool fingerprinting systems with common household articles eye provides a number of advantages for biometric identification: such as gelatin [Williams 2002]. it includes both behavioral and physiological human attributes, is Face recognition systems are still undergoing research to improve difficult to counterfeit, non-intrusive, and could easily be their precision and recall [Jain et al. 1999; Zhao et al. 2003]. incorporated into existing biometric systems to provide an extra Additionally, identical twins (1:10,000 probability), and related layer of security. issues such as family resemblance may bring the reliability of such CR Categories: I.6.4 [Simulation and Modeling]: Model systems into question. It is also possible to use still images and Validation and Analysis; J.7 [Computers in Other Systems]: video footage of a person to bypass a face recognition system. Process control, Real time. Further disadvantages of many of these methods involve the ability Keywords: biometrics, oculomotor plant, eye tracking. 1 Introduction Accurate, non-intrusive, and unforgeable identity recognition is an area of increasing concern to just about everyone in today’s networked world, with the need for security set against the goals of easy access. The majority of the world’s population would like secure access to their assets without risk of identity theft, yet do not want to be subjected to inconvenient or intrusive detection systems. Many of the most-commonly utilized methods for identity determination have known problems. For example, Figure 1. Biometric Identification Model. password verification has demonstrated many weaknesses in areas of accuracy (there is no way to verify that the individual typing the to forge replicas – in some cases even causing injury to the owner password is actually its owner, unless a temporal pattern of the body part used for biometric identification. Eye movements, recognition system is employed [Joyce and Gupta 1990]), usability in contrast, constitute a behavioral characteristic which is (people forget passwords [Wiedenbecka et al.]), and security extremely difficult to forge, and which cannot be stolen from an (people write them down or create easy-to-hack passwords individual. [Schneier 2005]) . The challenge lies in classifying eye movements in such a manner As a result, techniques of biometric identification, defined as that the differences between individuals are more significant than methods for identifying persons based on uniquely identifying changes in a single human’s behavior over time. In order to do this, physical or behavioral traits, have been garnering significant recent we turn to physical and behavioral characteristics that are interest [Daugman 2002; Jain et al. 1999; Kasprowski 2004]. The relatively constant in an individual human over their lifetime: the physical structure and behavior of the muscles that move the eye. We propose a person identification method based on the Copyright © 2010 by the Association for Computing Machinery, Inc. Oculomotor Plant Mathematical Model (OPMM) developed by Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed [Komogortsev and Khan 2008]), derived from earlier work by for commercial advantage and that copies bear this notice and the full citation on the Bahill [Bahill 1980]. The OPMM models a human eye as a system first page. Copyrights for components of this work owned by others than ACM must be that consists of an eye globe driven by a set of extraocular muscles. honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. This system models the anatomical structure of the human eye, Request permissions from Permissions Dept, ACM Inc., fax +1 (212) 869-0481 or e-mail where each extraocular muscle is driven by a uniquely defined permissions@acm.org. ETRA 2010, Austin, TX, March 22 – 24, 2010. © 2010 ACM 978-1-60558-994-7/10/0003 $10.00 57
  • 2. neuronal control signal and consists of series elasticity, length Error (RMSE) is computed between the detected x(t) and the tension, force velocity, and active tension components. However, simulated by the OPMM ∆ eye position signal. the specific values for the previously determined OPMM When multiple saccades are detected for an individual by the eye parameters were obtained from studies that examined a single movement classification algorithm, the average of the RMSEs individual. In this paper, we analyze eye movement traces and from the detected and simulated trajectories is presented as a final derive a unique vector of values corresponding to each person over e(t). Note that a good approximate solution of the OPMM a sample set of 41 individuals. We report our results and discuss equations creates an eye movement trajectory with a sampling rate the challenges and advantages provided by biometric identification of 1000Hz [Komogortsev and Khan 2008]; in the case where the via an OPMM. eye tracking frequency is lower, the signal ∆ is down-sampled 2 Biometric Identification by Oculomotor Plant to match the eye tracking frequency. Mathematical Model 6 Optimization Algorithm An overview of our method for biometric identification is depicted 6.1 Oculomotor Plant Parameters Vector in Figure 1. The recorded eye movement signal u(t) from a single The goal of the Optimization Algorithm module is to provide a set individual is supplied to the “Eye Movement Classification” of better values for the OPMM parameters by minimizing error module that classifies eye position signal into fixations and e(t). The OPMM’s parameters, such as passive elasticity, viscosity, saccades. We focus on the detected saccade trajectories, series elasticity, length tension, force velocity relationship, height represented by Θ(t) in the diagram. The detected saccade and width on the neuronal control signal, are unique for each parameters, the onset and offset coordinates and amplitudes of the individual. Some of these parameter values were previously detected saccades, depicted by h(t), are sent to the second module estimated from a record of just one subject [Bahill 1980]. labeled OPMM, which generates simulated saccade trajectories Moreover, some of the parameters such as length tension and represented by the signal x(t). The difference between detected series elasticity were derived by manual data fitting and hand- saccade trajectories Θ(t) and simulated saccade trajectories x(t) is drawn straight line approximations [Bahill 1980]. The values of the computed by the “Error Function” module and the resulting error OPMM parameters derived in this way can be improved to provide e(t) is produced. The e(t) signal serves as an input to the a much better fit for a specific individual. “Optimization Algorithm” module that provides feedback to the OPMM module with the goal of minimizing the error e(t). After One way to derive more accurate values for the OPMM parameters several iterations, the optimum OPMM parameters in the form of is to employ an optimization algorithm that selects new values for an “Oculomotor Coefficients Vector” module are supplied to the the parameters with an objective of minimizing the error e(t). It is “Person Identification” module which performs the actual important to note that some parameters provide higher impact than identification. Detailed descriptions of each module are provided others on the simulated eye movement trajectory [Bahill 1980]. in the sections to follow. The ranking of the parameters starting with those providing the highest influence on the simulated saccade trajectory is as follows: 3 Eye Movement Classification the width of the pulse of the neuronal control signal for the agonist We employed the Velocity-Threshold (I-VT) algorithm [Salvucci muscle ( ), pulse height of the neuronal control signal for the and Goldberg 2000] with threshold of 55º/s in the Eye Movement agonist muscle ( ), length tension , series elasticity , Classification module to split an eye movement recording into passive viscosity of the eye globe ( ) and force velocity fixations and saccades. The original I-VT algorithm was modified relationship in the agonist muscle represented by the damping to output such characteristics of an individual saccade as onset component , combined passive elasticity of the eye globe and _ , offset _ coordinates, amplitude ( _ ) and the all extraocular muscles ( ), eye globe inertia . All these coordinates of all eye position points between the onset and the parameters are selected for actual person identification. offset. The outputs of this module are the detected saccade 6.2 Optimization Algorithms & Strategies trajectories Θ(t) and the onset and offset coordinates and the amplitude of the detected saccades, h(t). Θ(t) is passed as input to Optimization Algorithms: We employed two optimization the Error Function module described in Section 5, and h(t) is used algorithms to determine optimized values for the OPMM as input to the OPMM module described in the following section. parameter vectors ( , , , , , , ) with an objective of minimizing the error e(t). 4 Oculomotor Plant Mathematical Model First, the Trust-Region (TR) algorithm that uses the interior- Six extraocular muscles rotate the eye globe in its socket. The reflective Newton method was applied [Coleman and Li 1996]. muscles are innervated by a neuronal control signal generated by The TR algorithm is an optimization method that searches for a the brain. During saccades this signal is a pulse step, where pulse better value in an area called the trusted region around the initial characteristics are encoded by the velocity command and step parameter value. At the start, the region of search is close to the characteristics are encoded by the positional command [Leigh and initial parameter value and if a better value is found the trusted Zee 2006]. The horizontal OPMM described in [Komogortsev and region size is increased, otherwise the size of the search region is Khan 2008] models all of the described properties of the reduced. Oculomotor Plant as linear springs or damping components, Additionally, the Nelder-Mead (NM) simplex algorithm was providing approximate values for the parameters describing these applied [Lagarias et al. 1998]. This algorithm employs a simplex of components. n+1 points for a vector y with n dimensions. At the beginning the 5 Error Function algorithm builds a simplex around the initial value i by adding a percentage value of each component of the vector y. Resulting Saccade trajectories generated by the Eye Movement Classification values are employed as elements of the simplex in addition to module and the OPMM module are supplied to the Error Function module, where the error e(t) in a form of the Root Mean Squared 58
  • 3. initial value i. As a result new points of the simplex are generated recorded into a distance vector. The pseudocode for the algorithm until the simplex diameter reaches a specified threshold. can be found in [Komogortsev et al. 2009]. Optimization Strategies: Two strategies are employed to C4.5 Classification Algorithm: C4.5 is a classification algorithm optimize OPMM parameters with the TR and NM algorithms. which builds a decision tree from a training set of data, where the Strategy 1: the OPMM parameters are optimized sequentially. An split at each node maximizes the information gain which represents already optimized parameter remains in the parameter vector. The the difference in entropy in the set after and before the split. We subsequent parameters are optimized based on the newly optimized selected a decision tree classifier because they are robust to noisy value of the previous parameter. For example, the value of the Klt data and C4.5 because it is widely used and easy to implement. (after optimization) is employed for subsequent optimization of The pseudocode for the algorithm can be found in [Komogortsev et Kse, and the values of both Klt, Kse (after optimization) are al. 2009]. employed for subsequent optimization Bp, etc. 7.1 Methodology Strategy 2: the OPMM parameters are optimized sequentially. An Apparatus: The experiments were conducted with a Tobii x120 already optimized parameter is saved in the temporal parameter eye tracker [Tobii 2009], 24-inch flat panel screen with resolution vector and the value of this parameter in the original vector is of 1980x1200 pix. Subjects were seated approximately 710 mm restored to the original value. The subsequent parameters are from the eye tracker. Sampling of eye position coordinates was optimized based on the original values of the remaining done at 120Hz. parameters. For example, the value of the Klt (after optimization) is stored in a temporal vector and the estimation of the Kse occurs Accuracy test: An accuracy test was employed prior to the with the initial value of the Klt. The Kse is stored in the temporal experiment providing us with average calibration error and invalid vector. The optimization of the Bp is based on the initial values of data percentage for each subject. The accuracy test is described in Klt, Kse, etc. When all OPMM parameters are estimated the more detail in [Koh et al. 2009]. temporal vector holds the data for person identification. Eye Movement Invocation Task: The stimulus was presented as 7 Person Identification a ‘jumping point’ with vertical coordinate fixed to the middle of the screen. The first point was presented at the middle of the The input to the Person Identification module consists of a set of screen; the subsequent points moved horizontally to the left and to OPMM parameter vectors estimated for each qualifying saccade. the right of the center of the screen with a spatial amplitude of 20, The output is an authorization score classifying each saccade as providing average stimuli amplitude of approximately 19.3. The belonging to an authorized user or an imposter. In order to jumping sequence consisted of 15 points including the original perform the classification, we evaluated two different statistical point in the center, yielding 14 saccades for each participant. After algorithms, the K-nearest neighbor (KNN) algorithm, and C4.5. each jump, the point remained stationary for 1.5s before the next KNN is a very simple instance-based learning algorithm, and C4.5 is a freely-available classifier that builds a decision tree based on jump was initiated. The size of the point was approximately 1 of the concept of information entropy [Shakhnarovich et al. 2005]. the visual angle with the center marked as a black dot. Each point The eye movement record for an individual consists of multiple consisted of white pixels (except for the central black dot), with the saccades, and as a result the biometric identification record for remainder of the screen left black. each individual will consist of a set of OPMM parameter vectors. Participants: The test data consisted of 68 student volunteers ages We work with the complete set of per-saccade parameter vectors, 18-25 with an average age of 21.2 and standard deviation of 3.2, and split them into a training and a testing set to perform 24 males and 44 females, with normal or corrected-to-normal identification. vision. None of the participants had prior experience with eye The following methodology is used to partition each participant’s tracking. The data collection was verified to be accurate by data into training and testing sets. Each participant data set employing two parameters, the average calibration error of the containing exactly two records is arbitrarily declared to be an right eye and the invalid data percentage of the right eye. The data imposter, and included only with the testing set. For each analyzer was instructed to discard recordings from subjects with a participant data set containing three records or more, the parameter calibration error of > 3.0 , with mean of 1.25, standard deviation vectors are inserted into both testing and training sets as authorized of 0.77 and invalid data percentage of >50%. Only 41 subject users; the first record is inserted into the testing set and subsequent records passed these criteria, resulting in mean accuracy of 1.25º samples are inserted into the training set. We decided to split the (SD=0.77) and a mean invalid data percentage of 12.43% sets in this way because of the relatively small amount of test data; (SD=17.22%). Only saccades with amplitudes of 17-22º were however, it is possible that we have thereby introduced a employed for biometric identification. systematic bias into the training set, and we plan further Performance evaluation metrics: Performance evaluation of a experiments to eliminate this possibility. We also note that samples biometric system is measured with the following two parameters. identified as imposters, although not included in the training set, False Acceptance Rate (FAR) – The ratio of the number of are still tracked in order to obtain the correct false acceptance rate imposter samples classified as authentic to the total number of all (FAR) value for available imposters. the imposter samples. This metric measures the probability that the KNN Classification Algorithm: The k-nearest neighbor (KNN) system incorrectly matches the input pattern of the testing set to a algorithm [Shakhnarovich et al. 2005] (in our implementation, non-matching template in the training set. It measures the percent k=5) is one of the simplest classification algorithms, but is accurate of invalid inputs which are incorrectly accepted. False Rejection and powerful when samples with similar classification tend to Rate (FRR) – The ratio of the number of authentic samples appear nearby. ‘Nearby’ means that the distance between similar classified as imposters to the number of all the authentic samples. classifications is generally closer than the distance between This metric calculates the probability that the system fails to detect samples with different classification [Kasprowski 2004]. For each a match between the input pattern of the testing set and a matching oculomotor parameter coefficient, a distance value is obtained and 59
  • 4. template in the training set. It measures the percent of valid inputs methods will become increasingly critical across a wide range of which are incorrectly rejected. commercial and government applications. 8 Results 10 References We conducted the classification with both the KNN and C4.5 BAHILL, A. T., 1980. Development, validation and sensitivity algorithms on each of the OPMM parameters, and determined that analyses of human eye movement models, CRC Critical the best results were obtained with KNN utilizing the TR algorithm Reviews in Bioengineering 4, 311-355. with optimization strategy 1 for the length tension coefficient. BEDNARIK, R., KINNUNEN, T., MIHAILA, A., AND FRÄNTI, P., 2005. These results improve on previous work in the field by Kasprowski Eye-Movements as a Biometric. [Kasprowski 2004] and Bednarik et al [Bednarik et al. 2005]. C4.5 COLEMAN, T. F., AND LI, Y., 1996. An interior trust region did not produce acceptable results with the tested algorithm approach for nonlinear minimization subject to bounds, SIAM parameters. Journal on Optimization 6, pp. 418–445. DAUGMAN, J., 2002. How iris recognition works, Image KNN: The smallest FAR and FRR values were achieved with the Processing. 2002. Proceedings. 2002 International Conference Trust-Region algorithm using optimization strategy 1 for the length 1, I-33- I-36. tension coefficient (KLT). The two next best results were provided JAIN, A., HONG, L., AND KULKARNI, Y., 1999. A Multimodal by the Nelder-Mead algorithm using optimization strategy 1 for the Biometric System Using Fingerprint, Face, and Speech, In passive elasticity coefficient (Kp) and the distance created by all International Conference on AVBPA, 182-187. parameters (D). The FAR=5.4% and FRR=56.6% results improve JOSEPHSON, S., AND HOLMES, M. E., 2002. Visual attention to on the previously reported results of FAR=9.4% and FRR=63.4% repeated internet images: testing the scanpath theory on the given by Kasprowski in 2004 using the KNN algorithm world wide web, In ETRA 02: Proceedings of the 2002 [Kasprowski 2004]. symposium on Eye tracking research & applications, 43-49. C4.5: Unfortunately, we did not obtain good FAR rates with the JOYCE, R., AND GUPTA, G., 1990. Identity authentication based on C4.5 algorithm, even if we accepted an increase in FRR. We keystroke latencies, ACM Communications 33, 168--176. believe the FAR can be improved by further tuning of the KASPROWSKI, P., 2004. Human identification using eye algorithm parameters. The best FAR=80% and FRR=0% values movements(Silesian University of Technology, Gliwice). were achieved by Nelder-Mead with optimization strategy 2. For KOH, D. H., GOWDA, S. A. M., AND KOMOGORTSEV, O. V., 2009. comparison, Kasprowski obtained an FAR of 45.8% and an FRR Input evaluation of an eye-gaze-guided interface: kalman filter of 12.4% using C4.5 in 2004 [Kasprowski 2004]. vs. velocity threshold eye movement identification, Proceedings of the 1st ACM SIGCHI symposium on 9 Discussion, Conclusions and Further Work Engineering interactive computing systems, 197-202. We have introduced a novel method of biometric identification KOMOGORTSEV, O., V., AND KHAN, J., 2008. Eye Movement based on the utilization of Oculomotor Plant Mathematical Model Prediction by Kalman Filter with Integrated Linear Horizontal parameters from horizontal positive saccadic eye movements. We Oculomotor Plant Mechanical Model, ETRA Symposium 2008, evaluated the effectiveness of this method via two different 229-236. statistical classification techniques on a data set of horizontal KOMOGORTSEV, O. V., JAYARATHNA, U. K. S., ARAGON, C. R., saccadic eye trajectories collected from 41 human participants, and AND MECHEHOUL, M., 2009. Biometric Identification via an achieved promising results using the k-nearest neighbor Oculomotor Plant Mathematical Model. classification algorithm. Our results improve on previous biometric http://ecommons.txstate.edu/cscitrep/16/. methods involving eye movements. LAGARIAS, J. C., REEDS, J. A., WRIGHT, M. H., AND WRIGHT, P. The OPMM method of biometric identification leverages E., 1998. Convergence Properties of the Nelder--Mead physiological and behavioral characteristics that are unique to each Simplex Method in Low Dimensions, SIAM J. on Optimization individual – the mechanical properties of the eye globe and its 9, 112-147. musculature – rather than simply looking at unprocessed saccadic LEIGH, R. J., AND ZEE, D. S., 2006. The Neurology of Eye trajectories. The resulting additional information provides further Movements(Oxford University Press). structure to the eye movement data and perhaps this is what leads SALVUCCI, D. D., AND GOLDBERG, J. H., 2000. Identifying to the improved performance of our method over previous work. A fixations and saccades in eye tracking protocols, ETRA further advantage of the proposed method is its use of a dynamic Symposium, 71-78. oculomotor plant model consisting of the eye globe and SCHNEIER, B., 2005. Two-factor authentication: too little, too late, extraocular muscles that is extremely difficult to counterfeit. ACM Communications 48, 136. Via our tests, we demonstrated the potential to distinguish SHAKHNAROVICH, G., DARRELL, T., AND INDYK, P., 2005. authorized users from imposters with this technique. However, Nearest-Neighbor Methods in Learning and Vision(MIT further testing with larger subject pools and different statistical Press). classification algorithms is needed to improve on the accuracy TOBII, 2009. http://www.tobii.com. rates of our method. Nevertheless, this technique shows promise WIEDENBECKA, S., WATERS, J., BIRGET, J.-C., BRODSKIY, A., AND for improving the state of biometric identification. This new MEMON, N. PassPoints: Design and longitudinal evaluation of method could also be easily combined with existing biometric a graphical password system, International Journal of Human- identification systems that incorporate digital cameras to scan the Computer Studies 63, 102-127. face or iris, to provide an additional layer of security. In an ever- WILLIAMS, J. M., 2002. Biometrics or ... biohazards?, Proceedings more security-conscious and highly networked world, non- of the 2002 workshop on New security paradigms, 97-107. intrusive and unforgeable personal identity-based authorization ZHAO, W., CHELLAPPA, R., AND PHILLIPS, P. J., 2003. Face recognition: A literature survey, ACM Computing Surveys (CSUR) 35, 399-458. 60