US20100281043A1 - Fuzzy Database Matching - Google Patents
Fuzzy Database Matching Download PDFInfo
- Publication number
- US20100281043A1 US20100281043A1 US12/838,109 US83810910A US2010281043A1 US 20100281043 A1 US20100281043 A1 US 20100281043A1 US 83810910 A US83810910 A US 83810910A US 2010281043 A1 US2010281043 A1 US 2010281043A1
- Authority
- US
- United States
- Prior art keywords
- record
- sample
- index
- stored
- index characteristics
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/583—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
- G06V40/197—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/50—Maintenance of biometric data or enrolment thereof
Definitions
- the invention relates to the field of database systems.
- it relates to a method and system for improving the speed with which a candidate record may reliably be fuzzily matched against a record within the database.
- biometrics in which the requirement is to determine whether or not the individual who has provided a particular biometric sample is already in the database.
- Databases of the type described can be extremely large, and it may be impractical to attempt a full match analysis between the sample record and every one of the records within the database.
- a variety of pre-screening processes are in use, but many of these have very restricted fields of application since they often rely upon specific peculiarities of the matching algorithm or of the data that are to be matched.
- biometric matching normally relies upon the concept of an approximate or “fuzzy” match, rather than on an exact match.
- a typical scenario is the need to determine whether a particular individual exists within a large database of individuals. For example, we may have an iris scan of an individual and want to know whether a national security database already contains one or more iris scans of the same individual. Because the sample iris scan and the stored iris scans are unlikely to be identical in all respects, one way of achieving the necessary “fuzzy” match is to search over a region. Having converted both the sample and the stored records into codes, according to some predefined protocol, we can attempt to find a match between a stored record and any code within a region which we consider to be sufficiently close to the sample code. Alternatively, we may attempt a match between the sample code and any code within a search region which is sufficiently close to one of the stored codes. In either case, the need to search over a region of codes when doing the fuzzy match may significantly slow down the matching process.
- a method of identifying possible matches between a sample record and a plurality of stored records comprising:
- a system for identifying possible matches between a sample record and a plurality of stored records using a plurality of characteristics within a characteristic space comprising:
- Such a method provides very fast candidate-matching at the expense of some additional effort when registering a new record within the database.
- the trade-off is well worth while when matching is done frequently in comparison with the frequency of registration of new records.
- separate processors may be used for matching characteristics against sample records, and for identifying stored records as possible matches. These processors may be on separate computers, and may be remote from each other.
- the main data list including the full collection of stored records may be held separately from the characteristic list. That allows a local processor, to carry out the initial analysis on a sample record such as a locally—obtained iris scan. Once a list of possible matches has been identified, that list can then be passed to a remote server, where a more detailed analysis can be carried out by comparing the sample with the full encoded iris scans of each of the possible matches.
- This approach has the further advantage that the designer of the system does not need to distribute to a large number of users full copies of the entire database of encoded iris scans. Instead, each user simply receives a list of characteristics, which is enough for the initial analysis to be carried locally. Where one or more possible matches are found, the system may then be automatically report to a central location where further analysis can be carried out against the full records.
- FIG. 1 shows the database structure according to an embodiment of the invention
- FIG. 2 is a histogram exemplifying the matching process
- FIG. 3 is another exemplary histogram
- FIG. 4 shows some exemplary hardware.
- an iris scan has been taken of a particular individual, and the need is to determine whether another iris scan of the same individual already exists within a large database such as a national security database.
- FIG. 1 The database structure of the exemplary embodiment is shown schematically in FIG. 1 . Details of particular individuals are held within a case list or table 16 , each row 17 of which represents a specific iris scan of a specific individual. Ideally, each individual will be represented by a single iris scan, but of course in a typical national security database, there will in practice be multiple scans of at least some individuals.
- Each row or iris scan record include columns 18 , 20 , 22 , which respectively hold a unique iris scan reference number for use within the system, the name of the individual, where known, and an external identifier such as a national security or social security code.
- the full iris scan for each record is held within a separate data list or table 10 , each row 11 of which represents an individual scan.
- This table consists of two columns, the first 12 being the unique reference number, mentioned above, and the second 14 holding the complete scan in some suitable encoded form. Where necessary, the original raw scan, as imaged, may also be stored as well. More generally, the column 14 may be considered to hold some encoded representation which uniquely identifies a specific scan or other biometric record of a particular individual.
- Each registered case (iris scan) is classified according to a plurality of attributes, characteristics or codes, these being extracted or derived either from the raw iris scans or more typically from the encoded scan data 14 .
- the codes may, but need not, be representative of human-identifiable characteristics of the scan. For example, some of the codes could be representative of eye color, with others being representative of such characteristics as the amount of color and intensity variation within the iris.
- the encoded scans 14 may be treated as a pure data stream, with the codes simply resulting from some function or functions applied to the data stream. Apart from the hash function already mentioned, a further possibility would be to search for the presence or absence of specific groups of bits within the data stream. In any event, it will be understood that multiple codes will typically be extracted from each individual record 11 .
- the codes are typically constrained to be numeric, and to lie within a particular predefined range.
- the codes might for example be defined by 16 binary bits, allowing 65536 possible codes to occur.
- the functions or operations which generate these codes from the raw or encoded data are limited in their possible range of outputs so that only the desired codes are possible.
- the actual range of outputs is remapped to a list of numeric codes within the desired range.
- a mapping table (not shown) may be used if required.
- P n are integers, in the range 0 to 65535, with each being stored as a 16-bit code.
- a plurality of lists or tables 28 is maintained, one for each of the possible 65536 codes. For simplicity, only five of these lists are shown in FIG. 1 .
- the list 40 for the code value 1 contains just a single row, indicating that only name A generates this code.
- the list 41 representing code value 2 , contains no data since in the present example none of the registered iris scans generates that code.
- the lists 42 , 43 representing respectively code values 3 and 4 , each relate just to a single scan.
- the table 44 indicates that iris scans for names A and B each generate code value 5 .
- each of the tables or lists 28 contains in each row 29 simply the unique reference 18 to a single record which corresponds to the relevant code.
- each of these lists relating not simply to an individual code but rather to those codes which are a given distance from the corresponding base code, according to some desired metric such as the Hamming distance.
- the Hamming distances between the codes 1 to 5 are given in Table 1.
- the Hamming distance is the number of bits that are different between two codes. For example the Hamming distance between codes 1 and 2 is 2, because 2 bits are changed between the code for 1 (001) and the code for 2 (010).
- the tables 30 contain data relating to those cases which resolve to a code having a Hamming distance of exactly 1 from the corresponding base code of the tables 28 .
- the name D from the base list for 3 qualifies, and the names A and B from the base list for 5 qualify. However, name A has already occurred in the base list for code 1 , so only names D and B are included in table 51 .
- the Hamming distance has been used to illustrate the embodiment and that any other convenient metric may be used.
- the required metric eg Hamming distance
- the codes may be multidimensional, with the required metric being measured within a corresponding multidimensional space.
- a new iris scan is to be registered within the database, its details are added to the case and data lists 16 , 10 and the corresponding codes for the new scan are calculated and/or determined.
- the scan's unique reference number 18 is then added, as appropriate, to one or more of the individual lists 28 , 30 , 32 .
- one or more new codes may be added to the code list 24 , in which case the individual tables 28 are automatically created, and each iris scan within the database is checked to determine whether its reference number needs to be added to one or more of the newly created tables.
- each code n is used as an index 70 to a look-up table 25 , this table containing pointers P 1 , P 2 , P 3 . . . which point to the respective areas in memory which hold the code value 1 , 2 and 3 lists. If each of the lists centered on a particular nominal code value follow one another in memory, only a single pointer (plus an offset) will be required. Alternatively, separate pointers could be provided for the respective lists within the series 28 , the series 30 and the series 32 . Another possibility would be for each of the lists 28 to have a pointer which looks to the corresponding list in 30 , and so on.
- a threshold is applied to the count, and any record which scores at least the threshold value is considered to be a candidate match.
- the threshold is taken as 1
- the candidate matches are scans A, B and D.
- the candidates are A and D.
- FIG. 3 shows the histogram for the same sample, generating codes 1 and 3 , but this time tested against a Hamming distance of up to 2
- the hits from the base tables 40 , 42 are A and D
- Applying a threshold of 1 gives us A, B, C and D as candidate matches, whereas applying a higher threshold of 2 returns A, B, and D as candidates.
- the output response of the system may be tuned, according to the application, by selecting suitable values for the threshold and/or Hamming distance. Either or both of these values could be fixed, programmatically varied, or user varied. In some applications it may be convenient for the user to be able to select appropriate values of either or both of these parameters at run time.
- more complex matching algorithms may be envisaged. For example, different threshold values may be used for different Hamming distances.
- the system could also automatically select candidates at a variety of Hamming distances, and compare or combine the respective selections at different distances to generate an improved composite list of candidate matches.
- the threshold and/or Hamming distance selections may be determined, where necessary according to the extent to which the pre-selection process needs to remove a large number of cases from consideration in order to speed up the overall matching process.
- a simple count and a fixed threshold is a convenient way of dividing possible matches from non-matches, other algorithms could equally well be used.
- a more detailed match may then be carried out against each of the possibilities, using any convenient matching algorithm.
- the sample scan may be compared against the candidates within the database using some more sophisticated but slower algorithm.
- the database itself may be held on the same computer or at the same location where the preliminary and/or the final matching takes place.
- the process may be distributed, with the preliminary matching being carried out according to a code list held at a local computer, and the preliminary matches being passed on to a remote computer for the detailed matching to take place.
- the primary data list 10 (which includes the full data representing all the stored scans) to be held at a central location, with a local machine needing to hold just the individual case occurrence lists 28 , 30 , 32 .
- the process of the present invention may further be speeded up by using multiple computers or processors operating in parallel.
- a user computer 32 forwards a matching task to a controller 34 which splits it up and distributes it between a plurality of computers or processors 36 .
- Each processor 36 may be instructed to handle a particular code or group of codes; alternatively, the controller 34 may split up the work in some other way.
- the processors 36 pass their results onto a consolidator 38 , which finalizes the selection of possible matches (for example using the procedure illustrated in FIGS. 2 and 3 ).
- the list of possibilities is then forwarded as required, either to a computer or processor 42 which carries out the detailed matching or as shown by reference numeral 40 back to the user 32 for further analysis.
- one embodiment may be in hardware, such as implemented to operate on a device or combination of devices, for example, whereas another embodiment may be in software.
- an embodiment may be implemented in firmware, or as any combination of hardware, software, and/or firmware, for example.
- one embodiment may comprise one or more articles, such as a storage medium or storage media.
- This storage media such as, one or more CD-ROMs and/or disks, for example, may have stored thereon instructions, that when executed by a system, such as a computer system, computing platform, or other system, for example, may result in an embodiment of a method in accordance with claimed subject matter being executed, such as one of the embodiments previously described, for example.
- a computing platform may include one or more processing units or processors, one or more input/output devices, such as a display, a keyboard and/or a mouse, and/or one or more memories, such as static random access memory, dynamic random access memory, flash memory, and/or a hard drive.
Abstract
A method of improving the speed with which a sample such as a biometric sample can be fuzzily matched against records in a database, comprises extracting characteristics from the sample, and using those extracted characteristics as indexes (70) to address a lookup table (25). Each row within the lookup table points to an individual record occurrence list (28, 30, 32) which contain details of not only the stored records from which the given characteristic can be extracted, but also those records having an extracted characteristic which are within a defined proximity to the said characteristic. Characteristics are extracted from the sample record, and a given stored record is identified as being a possible match with the sample if it appears in a required number of record occurrence lists.
Description
- This application is a continuation of U.S. application Ser. No. 11/585,358 filed Oct. 23, 2006, the contents of which are hereby incorporated by reference. Furthermore, U.S. application Ser. No. 11/585,358 was filed concurrently with U.S. application Ser. No. 11/585,365 entitled “Fast Database Matching”, the contents of which is hereby incorporated by reference.
- None.
- The invention relates to the field of database systems. In particular, it relates to a method and system for improving the speed with which a candidate record may reliably be fuzzily matched against a record within the database.
- There is increasing need within a variety of fields to be able to determine very rapidly whether or not a particular sample record already exists within a large database, and if so to identify one or more matches. One particular field is biometrics, in which the requirement is to determine whether or not the individual who has provided a particular biometric sample is already in the database.
- Databases of the type described can be extremely large, and it may be impractical to attempt a full match analysis between the sample record and every one of the records within the database. In order to reduce the computational workload, a variety of pre-screening processes are in use, but many of these have very restricted fields of application since they often rely upon specific peculiarities of the matching algorithm or of the data that are to be matched.
- An issue that arises particularly with the matching of biometric data, although it occurs in other applications as well, is that by their nature biometric measurements are often not precisely reproducible. For example, repeated biometric measurements derived from the iris of a particular individual are likely to vary somewhat, not least because the extent of iris occlusion by the eyelid and eyelashes will vary between images. As a result, biometric matching normally relies upon the concept of an approximate or “fuzzy” match, rather than on an exact match.
- A typical scenario is the need to determine whether a particular individual exists within a large database of individuals. For example, we may have an iris scan of an individual and want to know whether a national security database already contains one or more iris scans of the same individual. Because the sample iris scan and the stored iris scans are unlikely to be identical in all respects, one way of achieving the necessary “fuzzy” match is to search over a region. Having converted both the sample and the stored records into codes, according to some predefined protocol, we can attempt to find a match between a stored record and any code within a region which we consider to be sufficiently close to the sample code. Alternatively, we may attempt a match between the sample code and any code within a search region which is sufficiently close to one of the stored codes. In either case, the need to search over a region of codes when doing the fuzzy match may significantly slow down the matching process.
- The present invention is provided to solve the problems discussed above and other problems, and to provide advantages and aspects not provided by prior database systems of this type. A full discussion of the features and advantages of the present invention is deferred to the following detailed description, which proceeds with reference to the accompanying drawings.
- According to a first aspect of the present invention there is provided a method of identifying possible matches between a sample record and a plurality of stored records, the method comprising:
-
- (a) Extracting from the stored records a plurality of characteristics, said characteristics falling within a characteristic space;
- (b) For each said characteristic, maintaining a record occurrence list of stored records from which said characteristic and characteristics within a defined proximity to said characteristic within said characteristic space have been extracted;
- (c) Extracting characteristics from a sample record; and
- (d) Identifying a given stored record as being a possible match with the sample if it appears in a required number of record occurrence lists.
- According to a further aspect of the invention there is provided a system for identifying possible matches between a sample record and a plurality of stored records using a plurality of characteristics within a characteristic space, the system comprising:
-
- (a) For each characteristic, a record occurrence list of stored records from which said characteristic and characteristics within a defined proximity to said characteristic within said characteristic space have been extracted;
- (b) A processor for extracting characteristics from the sample record; and
- (c) A processor for identifying a given stored record as being a possible match with the sample if it appears in a required number of record occurrence lists.
- Such a method provides very fast candidate-matching at the expense of some additional effort when registering a new record within the database. The trade-off is well worth while when matching is done frequently in comparison with the frequency of registration of new records.
- In some embodiments, separate processors may be used for matching characteristics against sample records, and for identifying stored records as possible matches. These processors may be on separate computers, and may be remote from each other.
- In one particular embodiment, the main data list including the full collection of stored records may be held separately from the characteristic list. That allows a local processor, to carry out the initial analysis on a sample record such as a locally—obtained iris scan. Once a list of possible matches has been identified, that list can then be passed to a remote server, where a more detailed analysis can be carried out by comparing the sample with the full encoded iris scans of each of the possible matches.
- This approach has the further advantage that the designer of the system does not need to distribute to a large number of users full copies of the entire database of encoded iris scans. Instead, each user simply receives a list of characteristics, which is enough for the initial analysis to be carried locally. Where one or more possible matches are found, the system may then be automatically report to a central location where further analysis can be carried out against the full records.
- Other features and advantages of the invention will be apparent from the following specification taken in conjunction with the following drawings.
- The invention may be carried in practice in a number of ways and some specific embodiments will now be described, by way of example, with reference to the accompanying drawings, in which:
-
FIG. 1 shows the database structure according to an embodiment of the invention; -
FIG. 2 is a histogram exemplifying the matching process; -
FIG. 3 is another exemplary histogram; and -
FIG. 4 shows some exemplary hardware. - In the following detailed description, numerous specific details are set forth to provide a thorough understanding of claimed subject matter. However, it will be understood by those skilled in the art that claimed subject matter may be practiced without these specific details. In other instances, well-known methods, procedures, components and/or circuits have not been described in detail.
- Some portions of the detailed description which follow are presented in terms of algorithms and/or symbolic representations of operations on data bits and/or binary digital signals stored within a computing system, such as within a computer and/or computing system memory. These algorithmic descriptions and/or representations are the techniques used by those of ordinary skill in the data processing arts to convey the substance of their work to others skilled in the art. An algorithm is here, and generally, considered to be a self-consistent sequence of operations and/or similar processing leading to a desired result. The operations and/or processing may involve physical manipulations of physical quantities. Typically, although not necessarily, these quantities may take the form of electrical and/or magnetic signals capable of being stored, transferred, combined, compared and/or otherwise manipulated. It has proven convenient, at times, principally for reasons of common usage, to refer to these signals as bits, data, values, elements, symbols, characters, terms, numbers, numerals and/or the like. It should be understood, however, that all of these and similar terms are to be associated with appropriate physical quantities and are merely convenient labels. Unless specifically stated otherwise, as apparent from the following discussion, it is appreciated that throughout this specification discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining” and/or the like refer to the actions and/or processes of a computing platform, such as a computer or a similar electronic computing device, that manipulates and/or transforms data represented as physical electronic and/or magnetic quantities and/or other physical quantities within the computing platform's processors, memories, registers, and/or other information storage, transmission, and/or display devices.
- For the sake of clarity the description below will be directed toward an exemplary embodiment in the biometric field. In the embodiment to be described, an iris scan has been taken of a particular individual, and the need is to determine whether another iris scan of the same individual already exists within a large database such as a national security database.
- It will of course be understood that this particular example is simply used to illustrate the general principles behind the invention, and that the same techniques will be equally applicable in other fields. The invention in its broadest form is not restricted to any particular class or type of data held within the database, nor to the details of the matching algorithms that are used.
- While this invention is susceptible of embodiments in many different forms, there is shown in the drawings and will herein be described in detail preferred embodiments of the invention with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention and is not intended to limit the broad aspect of the invention to the embodiments illustrated.
- The database structure of the exemplary embodiment is shown schematically in
FIG. 1 . Details of particular individuals are held within a case list or table 16, eachrow 17 of which represents a specific iris scan of a specific individual. Ideally, each individual will be represented by a single iris scan, but of course in a typical national security database, there will in practice be multiple scans of at least some individuals. Each row or iris scan record includecolumns - The full iris scan for each record is held within a separate data list or table 10, each row 11 of which represents an individual scan. This table consists of two columns, the first 12 being the unique reference number, mentioned above, and the second 14 holding the complete scan in some suitable encoded form. Where necessary, the original raw scan, as imaged, may also be stored as well. More generally, the
column 14 may be considered to hold some encoded representation which uniquely identifies a specific scan or other biometric record of a particular individual. - Each registered case (iris scan) is classified according to a plurality of attributes, characteristics or codes, these being extracted or derived either from the raw iris scans or more typically from the encoded
scan data 14. - The codes may, but need not, be representative of human-identifiable characteristics of the scan. For example, some of the codes could be representative of eye color, with others being representative of such characteristics as the amount of color and intensity variation within the iris. Alternatively, the encoded scans 14 may be treated as a pure data stream, with the codes simply resulting from some function or functions applied to the data stream. Apart from the hash function already mentioned, a further possibility would be to search for the presence or absence of specific groups of bits within the data stream. In any event, it will be understood that multiple codes will typically be extracted from each individual record 11.
- To facilitate the use of these codes as indexes (as will be described in more detail below) the codes are typically constrained to be numeric, and to lie within a particular predefined range. In a biometric application, for example, the codes might for example be defined by 16 binary bits, allowing 65536 possible codes to occur. Preferably, the functions or operations which generate these codes from the raw or encoded data are limited in their possible range of outputs so that only the desired codes are possible. Alternatively, the actual range of outputs is remapped to a list of numeric codes within the desired range. A mapping table (not shown) may be used if required. In the example being described, it will be assumed that the available codes Pnare integers, in the range 0 to 65535, with each being stored as a 16-bit code. Thus, P1=001, P2=010, P3=011, P4=100, P5=101 and so on, up to the full 16 bits.
- To categorize the codes according to the cases (iris scans) in which they appear, a plurality of lists or tables 28 is maintained, one for each of the possible 65536 codes. For simplicity, only five of these lists are shown in
FIG. 1 . As may be seen, thelist 40 for thecode value 1 contains just a single row, indicating that only name A generates this code. Thelist 41, representingcode value 2, contains no data since in the present example none of the registered iris scans generates that code. Thelists code values code value 5. - Although not essential, it is generally preferred that each of the tables or lists 28 contains in each
row 29 simply theunique reference 18 to a single record which corresponds to the relevant code. - In addition to the
lists 28, a second series oflists 30 is maintained, each of these lists relating not simply to an individual code but rather to those codes which are a given distance from the corresponding base code, according to some desired metric such as the Hamming distance. - For reference in the example given by
FIG. 1 , the Hamming distances between thecodes 1 to 5 are given in Table 1. The Hamming distance is the number of bits that are different between two codes. For example the Hamming distance betweencodes -
1 2 3 4 5 Codes (001) (010) (011) (100) (101) 1 0 2 1 2 1 2 2 0 1 2 3 3 1 1 0 3 2 4 2 2 3 0 1 5 1 3 2 1 0 - In the example shown, the tables 30 contain data relating to those cases which resolve to a code having a Hamming distance of exactly 1 from the corresponding base code of the tables 28. Thus, for example, the table 51 includes data for all of those codes which are exactly H=1 distant from P1 (0001). If, however codes at H=1 already occur in table 40 they may be omitted from table 51 for efficiency. In the example of
FIG. 1 ,code 1 is H=1 distant fromcodes code 1, so only names D and B are included in table 51. Likewise, the table 52 includes data for all of those codes which are exactly H=1 distant from P2 (0010), and so on. However, if codes at H=1 already occur in table 41, they may be omitted from table 52 for efficiency. In the example,code 3 is H=1 distant fromcode 2, so that name D is added to table 52 from the base list for 3. Because table 41 is empty, there are no codes at H=1 fromcode 2 to omit from table 52. - A third series of table 32 contain details of cases which resolve to codes which are H=2 distant from the corresponding bases codes. Further series of tables (not shown) for H=3, H=4 and so on may also be provided, if required.
- It will be appreciated that the Hamming distance has been used to illustrate the embodiment and that any other convenient metric may be used. The required metric (eg Hamming distance) may be chosen according to the particular application in hand, and may either be fixed or may be user selectable. In more sophisticated embodiments (not shown) the codes may be multidimensional, with the required metric being measured within a corresponding multidimensional space.
- Whenever a new iris scan is to be registered within the database, its details are added to the case and data lists 16, 10 and the corresponding codes for the new scan are calculated and/or determined. The scan's
unique reference number 18 is then added, as appropriate, to one or more of the individual lists 28, 30, 32. If desired, one or more new codes may be added to the code list 24, in which case the individual tables 28 are automatically created, and each iris scan within the database is checked to determine whether its reference number needs to be added to one or more of the newly created tables. - We now turn to the task of matching, or in other words determining whether an unknown iris scan matches one of the
scans 14 within the database. Rather than matching the scan against the encoded data, which would be computationally lengthy, instead the sample is processed to extract from it one or more code values. By applying the same function or functions that were originally applied to the registered scans, one or more sample codes are generated (those codes of course in the present example all being integral and lying within the range 0 to 65535). - To find which scans correspond with each sample code, each code n is used as an
index 70 to a look-up table 25, this table containing pointers P1, P2, P3 . . . which point to the respective areas in memory which hold thecode value series 28, theseries 30 and theseries 32. Another possibility would be for each of thelists 28 to have a pointer which looks to the corresponding list in 30, and so on. - Once the appropriate tables have been identified, the system then proceeds to identify candidate matches by building up a histogram of the number of occurrences of each case across all of the tables of a particular Hamming distance.
FIG. 2 illustrates an example in which a sample scan has generatedcode values codes - A threshold is applied to the count, and any record which scores at least the threshold value is considered to be a candidate match. Here, if the threshold is taken as 1, the candidate matches are scans A, B and D. At a threshold of 2, the candidates are A and D.
-
FIG. 3 shows the histogram for the same sample, generatingcodes - Although the counts are shown in
FIGS. 2 and 3 as histograms, it will be understood that other counting methods could equally well be used, and that in any event the actual histograms would typically not be plotted. - In alternative embodiments (not shown) the second series of tables 30 could include data not only from codes which are exactly H=1 distant from the corresponding base code, but instead all codes which are up to that distance. In such an arrangement, each H=1 table would include all the data of the corresponding base table, each H=2 table would include all the data of the corresponding H=1 table, and so on.
- The output response of the system may be tuned, according to the application, by selecting suitable values for the threshold and/or Hamming distance. Either or both of these values could be fixed, programmatically varied, or user varied. In some applications it may be convenient for the user to be able to select appropriate values of either or both of these parameters at run time.
- In some applications, more complex matching algorithms may be envisaged. For example, different threshold values may be used for different Hamming distances. The system could also automatically select candidates at a variety of Hamming distances, and compare or combine the respective selections at different distances to generate an improved composite list of candidate matches.
- The threshold and/or Hamming distance selections may be determined, where necessary according to the extent to which the pre-selection process needs to remove a large number of cases from consideration in order to speed up the overall matching process. Although the use of a simple count and a fixed threshold is a convenient way of dividing possible matches from non-matches, other algorithms could equally well be used. One possible approach, for example, would be to select as a possible match all of those cases having a characteristic count which is more than a fixed percentage higher than the average characteristic count taken across all cases.
- Depending upon the size of the sample to be evaluated, it may not be necessary to use the sample in its entirety: a sub-section of the data be all that is necessary.
- The selection of codes, the matching criteria and the size of sample to be analyzed will in most applications be chosen so that there is an acceptably low risk of a false rejection.
- Once a list of candidate matches has been selected, using one of the procedures described above, a more detailed match may then be carried out against each of the possibilities, using any convenient matching algorithm. In the example described, the sample scan may be compared against the candidates within the database using some more sophisticated but slower algorithm.
- In one embodiment, the database itself may be held on the same computer or at the same location where the preliminary and/or the final matching takes place. Alternatively, the process may be distributed, with the preliminary matching being carried out according to a code list held at a local computer, and the preliminary matches being passed on to a remote computer for the detailed matching to take place. Such an arrangement allows the primary data list 10 (which includes the full data representing all the stored scans) to be held at a central location, with a local machine needing to hold just the individual case occurrence lists 28, 30, 32.
- In another embodiment, shown in
FIG. 4 , the process of the present invention may further be speeded up by using multiple computers or processors operating in parallel. Auser computer 32 forwards a matching task to acontroller 34 which splits it up and distributes it between a plurality of computers orprocessors 36. Eachprocessor 36 may be instructed to handle a particular code or group of codes; alternatively, thecontroller 34 may split up the work in some other way. Theprocessors 36 pass their results onto a consolidator 38, which finalizes the selection of possible matches (for example using the procedure illustrated inFIGS. 2 and 3 ). The list of possibilities is then forwarded as required, either to a computer orprocessor 42 which carries out the detailed matching or as shown byreference numeral 40 back to theuser 32 for further analysis. - It will, of course, be understood that, although particular embodiments have just been described, the claimed subject matter is not limited in scope to a particular embodiment or implementation. For example, one embodiment may be in hardware, such as implemented to operate on a device or combination of devices, for example, whereas another embodiment may be in software. Likewise, an embodiment may be implemented in firmware, or as any combination of hardware, software, and/or firmware, for example. Likewise, although claimed subject matter is not limited in scope in this respect, one embodiment may comprise one or more articles, such as a storage medium or storage media. This storage media, such as, one or more CD-ROMs and/or disks, for example, may have stored thereon instructions, that when executed by a system, such as a computer system, computing platform, or other system, for example, may result in an embodiment of a method in accordance with claimed subject matter being executed, such as one of the embodiments previously described, for example. As one potential example, a computing platform may include one or more processing units or processors, one or more input/output devices, such as a display, a keyboard and/or a mouse, and/or one or more memories, such as static random access memory, dynamic random access memory, flash memory, and/or a hard drive.
- In the preceding description, various aspects of claimed subject matter have been described. For purposes of explanation, specific numbers, systems and/or configurations were set forth to provide a thorough understanding of claimed subject matter. However, it should be apparent to one skilled in the art having the benefit of this disclosure that claimed subject matter may be practiced without the specific details. In other instances, well known features were omitted and/or simplified so as not to obscure the claimed subject matter. While certain features have been illustrated and/or described herein, many modifications, substitutions, changes and/or equivalents will now occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and/or changes as fall within the true spirit of claimed subject matter.
Claims (18)
1. A method of identifying possible matches between a sample record and a plurality of stored records, the method comprising:
extracting from each of the stored records a plurality of index characteristics, said index characteristics falling within an index characteristic space;
maintaining a look-up table defining said index characteristic space, said look-up table having a plurality of rows, each row corresponding to a unique index characteristic within said index characteristic space;
maintaining a plurality of record occurrence lists, each said list being linked from a specific row in said look-up table corresponding to a specific index characteristic, and each said list identifying those stored records from which said specific index characteristic and index characteristics within a defined proximity to said specific index characteristics within said index characteristic space have been extracted;
extracting sample index characteristics from a sample record;
using said sample index characteristics as indexes to address said look-up table to look up a corresponding plurality of record occurrence lists which are associated with said sample index characteristics;
counting the number of occurrences of respective stored records identified within said record occurrence lists; and
identifying a given stored record as being a possible match with the sample if said count for said given stored record exceeds a required threshold.
2. A method as claimed in claim 1 in which the defined proximity is a defined Hamming distance.
3. A method as claimed in claim 2 in which the defined Hamming distance is user-selectable.
4. A method as claimed in claim 1 in which the required number is a numerical threshold.
5. A method as claimed in claim 1 in which the required number is a function of the average number of record occurrence lists per stored record.
6. A method as claimed in claim 1 in which said plurality of index characteristics defines all index characteristics within the index characteristic space that are extracted from said plurality of stored records.
7. A method as claimed in claim 1 in which said plurality of index characteristics defines all possible index characteristics within the index characteristic space that could be displayed by a sample record.
8. A method as claimed in claim 1 in which the said plurality of index characteristics is generated by applying an operation, such as a hash, to the stored records.
9. A method as claimed in claim 1 , including applying an operation to the sample record to generate one or more sample outputs, and using the sample outputs to address a lookup table, each row in said lookup table pointing to a record occurrence list.
10. A method as claimed in claim 1 in which as index characteristics are extracted a histogram is built up recording matches by stored record; and identifying records as possible matches from the histogram.
11. A method as claimed in claim 1 including establishing a plurality of defined proximities, and maintaining a separate record occurrence list for each index characteristic and proximity combination.
12. A method as claimed in claim 11 in which the identifying step uses those lists which relate to a user-selected defined proximity.
13. A method as claimed in claim 1 including the additional step of further analyzing the relationship between the sample record and each of the said possible matches.
14. A method as claimed in claim 1 in which the said identifying step is divided between a plurality of parallel processors, each forwarding an association result to a consolidator, said consolidator identifying stored records as possible matches in dependence upon said association results.
15. A system for identifying possible matches between a sample record and a plurality of stored records, the system comprising:
a computer processor coupled to a database containing a plurality of index characteristics extracted from said stored records, said index characteristics falling within an index characteristic space;
a look-up table defining said characteristic space, said look-up table having a plurality of rows, each row corresponding to a unique index characteristic within said index characteristic space;
a plurality of record occurrence lists, each said list being linked from a specific row in said look-up table corresponding to a specific index characteristic, and each said list identifying those stored records from which said specific index characteristic and index characteristics within a defined proximity to said specific index characteristics within said index characteristic space have been extracted;
and whereby the system is configured to:
extract sample index characteristics from a sample record, and use said sample index characteristics as indexes to address said look-up table to look up a corresponding plurality of record occurrence lists which are associated with said sample index characteristics;
count the number of occurrences of respective stored records identified by said record occurrence lists; and
identify a given stored record as being a possible match with the sample record if said count for said given stored record exceeds a required threshold.
16. A system as claimed in claim 15 in which the computer processor includes a first processor for extracting sample index characteristics from a sample record and a second processor for identifying a given stored record as being a possible match with the sample record.
17. A system as claimed in claim 16 in which the first processor is remote from the second processor.
18. A system as claimed in claim 15 in which the first processor comprises a plurality of parallel processors, each forwarding an association result to a consolidator, said consolidator identifying stored records as possible matches in dependence upon said associated results.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/838,109 US20100281043A1 (en) | 2006-10-23 | 2010-07-16 | Fuzzy Database Matching |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/585,358 US7809747B2 (en) | 2006-10-23 | 2006-10-23 | Fuzzy database matching |
US12/838,109 US20100281043A1 (en) | 2006-10-23 | 2010-07-16 | Fuzzy Database Matching |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/585,358 Continuation US7809747B2 (en) | 2006-10-23 | 2006-10-23 | Fuzzy database matching |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100281043A1 true US20100281043A1 (en) | 2010-11-04 |
Family
ID=38895629
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/585,358 Active US7809747B2 (en) | 2006-10-23 | 2006-10-23 | Fuzzy database matching |
US12/838,109 Abandoned US20100281043A1 (en) | 2006-10-23 | 2010-07-16 | Fuzzy Database Matching |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/585,358 Active US7809747B2 (en) | 2006-10-23 | 2006-10-23 | Fuzzy database matching |
Country Status (4)
Country | Link |
---|---|
US (2) | US7809747B2 (en) |
EP (1) | EP2095277B1 (en) |
JP (1) | JP5394245B2 (en) |
WO (1) | WO2008050107A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102016004426A1 (en) * | 2016-04-12 | 2017-10-12 | Giesecke+Devrient Mobile Security Gmbh | Identify an identity bearer |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9846739B2 (en) | 2006-10-23 | 2017-12-19 | Fotonation Limited | Fast database matching |
US7809747B2 (en) * | 2006-10-23 | 2010-10-05 | Donald Martin Monro | Fuzzy database matching |
US20100278394A1 (en) * | 2008-10-29 | 2010-11-04 | Raguin Daniel H | Apparatus for Iris Capture |
US8317325B2 (en) | 2008-10-31 | 2012-11-27 | Cross Match Technologies, Inc. | Apparatus and method for two eye imaging for iris identification |
US9721266B2 (en) * | 2008-11-12 | 2017-08-01 | Reachforce Inc. | System and method for capturing information for conversion into actionable sales leads |
US20100131836A1 (en) * | 2008-11-24 | 2010-05-27 | Microsoft Corporation | User-authored notes on shared documents |
FR2951842B1 (en) * | 2009-10-28 | 2011-12-30 | Sagem Securite | IDENTIFICATION BY CONTROLLING USER DATA |
US8577094B2 (en) | 2010-04-09 | 2013-11-05 | Donald Martin Monro | Image template masking |
BR112014011646A2 (en) * | 2011-11-14 | 2017-05-02 | Brainstorm Int Services Ltd | method of identifying matches between a sample data record and a plurality of registrant data records; and identification system of possible correspondences |
US10275648B2 (en) | 2017-02-08 | 2019-04-30 | Fotonation Limited | Image processing method and system for iris recognition |
JP7007076B1 (en) | 2021-02-24 | 2022-02-10 | 元吾 藤森 | Three-dimensional cloth mask hanger |
Citations (65)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3845466A (en) * | 1970-11-18 | 1974-10-29 | California Inst Of Techn | System and method for character recognition |
US4641349A (en) * | 1985-02-20 | 1987-02-03 | Leonard Flom | Iris recognition system |
US4817183A (en) * | 1986-06-16 | 1989-03-28 | Sparrow Malcolm K | Fingerprint recognition and retrieval system |
US4896363A (en) * | 1987-05-28 | 1990-01-23 | Thumbscan, Inc. | Apparatus and method for matching image characteristics such as fingerprint minutiae |
US5251131A (en) * | 1991-07-31 | 1993-10-05 | Thinking Machines Corporation | Classification of data records by comparison of records to a training database using probability weights |
US5291560A (en) * | 1991-07-15 | 1994-03-01 | Iri Scan Incorporated | Biometric personal identification system based on iris analysis |
US5572596A (en) * | 1994-09-02 | 1996-11-05 | David Sarnoff Research Center, Inc. | Automated, non-invasive iris recognition system and method |
US5631971A (en) * | 1994-05-24 | 1997-05-20 | Sparrow; Malcolm K. | Vector based topological fingerprint matching |
US5841888A (en) * | 1996-01-23 | 1998-11-24 | Harris Corporation | Method for fingerprint indexing and searching |
US5901238A (en) * | 1996-02-07 | 1999-05-04 | Oki Electric Industry Co., Ltd. | Iris identification system and iris identification method |
US5924094A (en) * | 1996-11-01 | 1999-07-13 | Current Network Technologies Corporation | Independent distributed database system |
US5956122A (en) * | 1998-06-26 | 1999-09-21 | Litton Systems, Inc | Iris recognition apparatus and method |
US5978793A (en) * | 1997-04-18 | 1999-11-02 | Informix Software, Inc. | Processing records from a database |
US6018739A (en) * | 1997-05-15 | 2000-01-25 | Raytheon Company | Biometric personnel identification system |
US6067369A (en) * | 1996-12-16 | 2000-05-23 | Nec Corporation | Image feature extractor and an image feature analyzer |
US6081620A (en) * | 1997-02-11 | 2000-06-27 | Silicon Biology, Inc. | System and method for pattern recognition |
US6144754A (en) * | 1997-03-28 | 2000-11-07 | Oki Electric Industry Co., Ltd. | Method and apparatus for identifying individuals |
US6229906B1 (en) * | 1996-07-25 | 2001-05-08 | California Institute Of Technology | Biometric sequence codes |
US6247813B1 (en) * | 1999-04-09 | 2001-06-19 | Iritech, Inc. | Iris identification system and method of identifying a person through iris recognition |
US6301376B1 (en) * | 1997-05-07 | 2001-10-09 | Georgi H. Draganoff | Segmented sliding yardsticks error tolerant fingerprint enrollment and verification system and method |
US20010056485A1 (en) * | 2000-03-28 | 2001-12-27 | Barrett Thomas H. | Methods, systems and computer program products for dynamic scheduling and matrix collecting of data about samples |
US6360021B1 (en) * | 1998-07-30 | 2002-03-19 | The Regents Of The University Of California | Apparatus and methods of image and signal processing |
US20020070844A1 (en) * | 1999-12-14 | 2002-06-13 | Davida George I. | Perfectly secure authorization and passive identification with an error tolerant biometric system |
US6424727B1 (en) * | 1998-11-25 | 2002-07-23 | Iridian Technologies, Inc. | System and method of animal identification and animal transaction authorization using iris patterns |
US20020129012A1 (en) * | 2001-03-12 | 2002-09-12 | International Business Machines Corporation | Document retrieval system and search method using word set and character look-up tables |
US20020163506A1 (en) * | 2001-03-21 | 2002-11-07 | Alec Matusis | System and method for selecting functions based on a finger-type-mechanism feature such as a fingerprint |
US6505193B1 (en) * | 1999-12-01 | 2003-01-07 | Iridian Technologies, Inc. | System and method of fast biometric database searching using digital certificates |
US6526160B1 (en) * | 1998-07-17 | 2003-02-25 | Media Technology Corporation | Iris information acquisition apparatus and iris identification apparatus |
US20030061233A1 (en) * | 2001-09-21 | 2003-03-27 | Manasse Mark S. | System and method for determining likely identity in a biometric database |
US6556710B2 (en) * | 2000-12-15 | 2003-04-29 | America Online, Inc. | Image searching techniques |
US20030086617A1 (en) * | 2001-10-25 | 2003-05-08 | Jer-Chuan Huang | Triangle automatic matching method |
US6614919B1 (en) * | 1998-12-25 | 2003-09-02 | Oki Electric Industry Co., Ltd. | Method of extracting iris region and individual identification device |
US6697949B1 (en) * | 1998-09-11 | 2004-02-24 | L.V. Partner, L.P. | Method and apparatus for controlling a user's pc through an audio-visual broadcast to archive information in the users pc |
US6701313B1 (en) * | 2000-04-19 | 2004-03-02 | Glenn Courtney Smith | Method, apparatus and computer readable storage medium for data object matching using a classification index |
US6714665B1 (en) * | 1994-09-02 | 2004-03-30 | Sarnoff Corporation | Fully automated iris recognition system utilizing wide and narrow fields of view |
US6757411B2 (en) * | 2001-08-16 | 2004-06-29 | Liska Biometry Inc. | Method and system for fingerprint encoding and authentication |
US20040165755A1 (en) * | 2003-02-25 | 2004-08-26 | Hillhouse Robert D. | Method and apparatus for biometric verification with data packet transmission prioritization |
US6801661B1 (en) * | 2001-02-15 | 2004-10-05 | Eastman Kodak Company | Method and system for archival and retrieval of images based on the shape properties of identified segments |
US20040202355A1 (en) * | 2003-04-14 | 2004-10-14 | Hillhouse Robert D. | Method and apparatus for searching biometric image data |
US6879718B2 (en) * | 2001-11-06 | 2005-04-12 | Microsoft Corp. | Efficient method and system for determining parameters in computerized recognition |
US20050097131A1 (en) * | 2003-10-30 | 2005-05-05 | Lucent Technologies Inc. | Network support for caller identification based on biometric measurement |
US20050102325A1 (en) * | 2003-09-15 | 2005-05-12 | Joel Gould | Functional dependency data profiling |
US6909808B2 (en) * | 2002-03-08 | 2005-06-21 | Anzus, Inc. | Image compression to enhance optical correlation |
US20050175225A1 (en) * | 2004-02-06 | 2005-08-11 | Fujitsu Limited | Biometric information verifying apparatus |
US20050193016A1 (en) * | 2004-02-17 | 2005-09-01 | Nicholas Seet | Generation of a media content database by correlating repeating media content in media streams |
US20050234901A1 (en) * | 2004-04-15 | 2005-10-20 | Caruso Jeffrey L | Database with efficient fuzzy matching |
US20060026128A1 (en) * | 2004-06-29 | 2006-02-02 | Xerox Corporation | Expanding a partially-correct list of category elements using an indexed document collection |
US7009495B2 (en) * | 2002-10-02 | 2006-03-07 | Battelle Memorial Institute | System and method to identify multiple RFID tags |
US20060104493A1 (en) * | 2004-11-12 | 2006-05-18 | Ming Hsieh | System and method for fast biometric pattern matching |
US20060147094A1 (en) * | 2003-09-08 | 2006-07-06 | Woong-Tuk Yoo | Pupil detection method and shape descriptor extraction method for a iris recognition, iris feature extraction apparatus and method, and iris recognition system and method using its |
US20060222212A1 (en) * | 2005-04-05 | 2006-10-05 | Yingzi Du | One-dimensional iris signature generation system and method |
US7136514B1 (en) * | 2002-02-14 | 2006-11-14 | Wong Jacob Y | Method for authenticating an individual by use of fingerprint data |
US20070036397A1 (en) * | 2005-01-26 | 2007-02-15 | Honeywell International Inc. | A distance iris recognition |
US7197166B2 (en) * | 2003-01-23 | 2007-03-27 | Industrial Technology Research Institute | Iris extraction method capable of precisely determining positions and sizes of irises in a digital face image |
US20070201728A1 (en) * | 2006-02-27 | 2007-08-30 | Monro Donald M | Rotation compensated iris comparison |
US7302087B2 (en) * | 2001-03-06 | 2007-11-27 | Senga Advisors, Llc | Daubechies wavelet transform of iris image data for use with iris recognition system |
US20080097992A1 (en) * | 2006-10-23 | 2008-04-24 | Donald Martin Monro | Fast database matching |
US7379567B2 (en) * | 2003-07-17 | 2008-05-27 | Matsushita Electric Industrial Co., Ltd. | Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program |
US20080170759A1 (en) * | 2007-01-17 | 2008-07-17 | Donald Martin Monro | Shape representation using Cosine Transforms |
US20080170760A1 (en) * | 2007-01-17 | 2008-07-17 | Donald Martin Monro | Shape representation using fourier transforms |
US7483569B2 (en) * | 2003-05-29 | 2009-01-27 | Carnegie Mellon University | Reduced complexity correlation filters |
US20090060348A1 (en) * | 2007-08-28 | 2009-03-05 | Donald Martin Monro | Determination of Image Similarity |
US7650020B2 (en) * | 2004-06-01 | 2010-01-19 | Donald Martin Monro | Identification of image characteristics |
US20100166265A1 (en) * | 2006-08-15 | 2010-07-01 | Donald Martin Monro | Method of Eyelash Removal for Human Iris Recognition |
US7809747B2 (en) * | 2006-10-23 | 2010-10-05 | Donald Martin Monro | Fuzzy database matching |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR950007490B1 (en) | 1991-12-28 | 1995-07-11 | 엘지전자주식회사 | Semiconductor laser |
-
2006
- 2006-10-23 US US11/585,358 patent/US7809747B2/en active Active
-
2007
- 2007-10-23 JP JP2009533936A patent/JP5394245B2/en active Active
- 2007-10-23 WO PCT/GB2007/004035 patent/WO2008050107A1/en active Application Filing
- 2007-10-23 EP EP07824283.1A patent/EP2095277B1/en active Active
-
2010
- 2010-07-16 US US12/838,109 patent/US20100281043A1/en not_active Abandoned
Patent Citations (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3845466A (en) * | 1970-11-18 | 1974-10-29 | California Inst Of Techn | System and method for character recognition |
US4641349A (en) * | 1985-02-20 | 1987-02-03 | Leonard Flom | Iris recognition system |
US4817183A (en) * | 1986-06-16 | 1989-03-28 | Sparrow Malcolm K | Fingerprint recognition and retrieval system |
US4896363A (en) * | 1987-05-28 | 1990-01-23 | Thumbscan, Inc. | Apparatus and method for matching image characteristics such as fingerprint minutiae |
US5291560A (en) * | 1991-07-15 | 1994-03-01 | Iri Scan Incorporated | Biometric personal identification system based on iris analysis |
US5251131A (en) * | 1991-07-31 | 1993-10-05 | Thinking Machines Corporation | Classification of data records by comparison of records to a training database using probability weights |
US5631971A (en) * | 1994-05-24 | 1997-05-20 | Sparrow; Malcolm K. | Vector based topological fingerprint matching |
US5572596A (en) * | 1994-09-02 | 1996-11-05 | David Sarnoff Research Center, Inc. | Automated, non-invasive iris recognition system and method |
US5751836A (en) * | 1994-09-02 | 1998-05-12 | David Sarnoff Research Center Inc. | Automated, non-invasive iris recognition system and method |
US6714665B1 (en) * | 1994-09-02 | 2004-03-30 | Sarnoff Corporation | Fully automated iris recognition system utilizing wide and narrow fields of view |
US5841888A (en) * | 1996-01-23 | 1998-11-24 | Harris Corporation | Method for fingerprint indexing and searching |
US5901238A (en) * | 1996-02-07 | 1999-05-04 | Oki Electric Industry Co., Ltd. | Iris identification system and iris identification method |
US6229906B1 (en) * | 1996-07-25 | 2001-05-08 | California Institute Of Technology | Biometric sequence codes |
US5924094A (en) * | 1996-11-01 | 1999-07-13 | Current Network Technologies Corporation | Independent distributed database system |
US6243492B1 (en) * | 1996-12-16 | 2001-06-05 | Nec Corporation | Image feature extractor, an image feature analyzer and an image matching system |
US6067369A (en) * | 1996-12-16 | 2000-05-23 | Nec Corporation | Image feature extractor and an image feature analyzer |
US6081620A (en) * | 1997-02-11 | 2000-06-27 | Silicon Biology, Inc. | System and method for pattern recognition |
US6144754A (en) * | 1997-03-28 | 2000-11-07 | Oki Electric Industry Co., Ltd. | Method and apparatus for identifying individuals |
US5978793A (en) * | 1997-04-18 | 1999-11-02 | Informix Software, Inc. | Processing records from a database |
US6301376B1 (en) * | 1997-05-07 | 2001-10-09 | Georgi H. Draganoff | Segmented sliding yardsticks error tolerant fingerprint enrollment and verification system and method |
US6018739A (en) * | 1997-05-15 | 2000-01-25 | Raytheon Company | Biometric personnel identification system |
US5956122A (en) * | 1998-06-26 | 1999-09-21 | Litton Systems, Inc | Iris recognition apparatus and method |
US6526160B1 (en) * | 1998-07-17 | 2003-02-25 | Media Technology Corporation | Iris information acquisition apparatus and iris identification apparatus |
US6360021B1 (en) * | 1998-07-30 | 2002-03-19 | The Regents Of The University Of California | Apparatus and methods of image and signal processing |
US6697949B1 (en) * | 1998-09-11 | 2004-02-24 | L.V. Partner, L.P. | Method and apparatus for controlling a user's pc through an audio-visual broadcast to archive information in the users pc |
US6424727B1 (en) * | 1998-11-25 | 2002-07-23 | Iridian Technologies, Inc. | System and method of animal identification and animal transaction authorization using iris patterns |
US6614919B1 (en) * | 1998-12-25 | 2003-09-02 | Oki Electric Industry Co., Ltd. | Method of extracting iris region and individual identification device |
US6247813B1 (en) * | 1999-04-09 | 2001-06-19 | Iritech, Inc. | Iris identification system and method of identifying a person through iris recognition |
US6505193B1 (en) * | 1999-12-01 | 2003-01-07 | Iridian Technologies, Inc. | System and method of fast biometric database searching using digital certificates |
US20020070844A1 (en) * | 1999-12-14 | 2002-06-13 | Davida George I. | Perfectly secure authorization and passive identification with an error tolerant biometric system |
US20010056485A1 (en) * | 2000-03-28 | 2001-12-27 | Barrett Thomas H. | Methods, systems and computer program products for dynamic scheduling and matrix collecting of data about samples |
US6701313B1 (en) * | 2000-04-19 | 2004-03-02 | Glenn Courtney Smith | Method, apparatus and computer readable storage medium for data object matching using a classification index |
US6556710B2 (en) * | 2000-12-15 | 2003-04-29 | America Online, Inc. | Image searching techniques |
US6801661B1 (en) * | 2001-02-15 | 2004-10-05 | Eastman Kodak Company | Method and system for archival and retrieval of images based on the shape properties of identified segments |
US7302087B2 (en) * | 2001-03-06 | 2007-11-27 | Senga Advisors, Llc | Daubechies wavelet transform of iris image data for use with iris recognition system |
US20020129012A1 (en) * | 2001-03-12 | 2002-09-12 | International Business Machines Corporation | Document retrieval system and search method using word set and character look-up tables |
US20020163506A1 (en) * | 2001-03-21 | 2002-11-07 | Alec Matusis | System and method for selecting functions based on a finger-type-mechanism feature such as a fingerprint |
US6757411B2 (en) * | 2001-08-16 | 2004-06-29 | Liska Biometry Inc. | Method and system for fingerprint encoding and authentication |
US20030061233A1 (en) * | 2001-09-21 | 2003-03-27 | Manasse Mark S. | System and method for determining likely identity in a biometric database |
US20030086617A1 (en) * | 2001-10-25 | 2003-05-08 | Jer-Chuan Huang | Triangle automatic matching method |
US6879718B2 (en) * | 2001-11-06 | 2005-04-12 | Microsoft Corp. | Efficient method and system for determining parameters in computerized recognition |
US7136514B1 (en) * | 2002-02-14 | 2006-11-14 | Wong Jacob Y | Method for authenticating an individual by use of fingerprint data |
US6909808B2 (en) * | 2002-03-08 | 2005-06-21 | Anzus, Inc. | Image compression to enhance optical correlation |
US7009495B2 (en) * | 2002-10-02 | 2006-03-07 | Battelle Memorial Institute | System and method to identify multiple RFID tags |
US7197166B2 (en) * | 2003-01-23 | 2007-03-27 | Industrial Technology Research Institute | Iris extraction method capable of precisely determining positions and sizes of irises in a digital face image |
US20040165755A1 (en) * | 2003-02-25 | 2004-08-26 | Hillhouse Robert D. | Method and apparatus for biometric verification with data packet transmission prioritization |
US20040202355A1 (en) * | 2003-04-14 | 2004-10-14 | Hillhouse Robert D. | Method and apparatus for searching biometric image data |
US7483569B2 (en) * | 2003-05-29 | 2009-01-27 | Carnegie Mellon University | Reduced complexity correlation filters |
US7379567B2 (en) * | 2003-07-17 | 2008-05-27 | Matsushita Electric Industrial Co., Ltd. | Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program |
US20060147094A1 (en) * | 2003-09-08 | 2006-07-06 | Woong-Tuk Yoo | Pupil detection method and shape descriptor extraction method for a iris recognition, iris feature extraction apparatus and method, and iris recognition system and method using its |
US20050102325A1 (en) * | 2003-09-15 | 2005-05-12 | Joel Gould | Functional dependency data profiling |
US20050097131A1 (en) * | 2003-10-30 | 2005-05-05 | Lucent Technologies Inc. | Network support for caller identification based on biometric measurement |
US20050175225A1 (en) * | 2004-02-06 | 2005-08-11 | Fujitsu Limited | Biometric information verifying apparatus |
US20050193016A1 (en) * | 2004-02-17 | 2005-09-01 | Nicholas Seet | Generation of a media content database by correlating repeating media content in media streams |
US20050234901A1 (en) * | 2004-04-15 | 2005-10-20 | Caruso Jeffrey L | Database with efficient fuzzy matching |
US7650020B2 (en) * | 2004-06-01 | 2010-01-19 | Donald Martin Monro | Identification of image characteristics |
US20060026128A1 (en) * | 2004-06-29 | 2006-02-02 | Xerox Corporation | Expanding a partially-correct list of category elements using an indexed document collection |
US20060104493A1 (en) * | 2004-11-12 | 2006-05-18 | Ming Hsieh | System and method for fast biometric pattern matching |
US20070036397A1 (en) * | 2005-01-26 | 2007-02-15 | Honeywell International Inc. | A distance iris recognition |
US20060222212A1 (en) * | 2005-04-05 | 2006-10-05 | Yingzi Du | One-dimensional iris signature generation system and method |
US20070201728A1 (en) * | 2006-02-27 | 2007-08-30 | Monro Donald M | Rotation compensated iris comparison |
US20100166265A1 (en) * | 2006-08-15 | 2010-07-01 | Donald Martin Monro | Method of Eyelash Removal for Human Iris Recognition |
US20080097992A1 (en) * | 2006-10-23 | 2008-04-24 | Donald Martin Monro | Fast database matching |
US7809747B2 (en) * | 2006-10-23 | 2010-10-05 | Donald Martin Monro | Fuzzy database matching |
US20080170759A1 (en) * | 2007-01-17 | 2008-07-17 | Donald Martin Monro | Shape representation using Cosine Transforms |
US20080170760A1 (en) * | 2007-01-17 | 2008-07-17 | Donald Martin Monro | Shape representation using fourier transforms |
US20090060348A1 (en) * | 2007-08-28 | 2009-03-05 | Donald Martin Monro | Determination of Image Similarity |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102016004426A1 (en) * | 2016-04-12 | 2017-10-12 | Giesecke+Devrient Mobile Security Gmbh | Identify an identity bearer |
Also Published As
Publication number | Publication date |
---|---|
JP5394245B2 (en) | 2014-01-22 |
EP2095277B1 (en) | 2017-08-23 |
JP2010507856A (en) | 2010-03-11 |
US7809747B2 (en) | 2010-10-05 |
WO2008050107A1 (en) | 2008-05-02 |
EP2095277A1 (en) | 2009-09-02 |
US20080097983A1 (en) | 2008-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7809747B2 (en) | Fuzzy database matching | |
US11620397B2 (en) | Methods and apparatus to provide group-based row-level security for big data platforms | |
US8335786B2 (en) | Multi-media content identification using multi-level content signature correlation and fast similarity search | |
US7203343B2 (en) | System and method for determining likely identity in a biometric database | |
JP5328808B2 (en) | Data clustering method, system, apparatus, and computer program for applying the method | |
US6507669B1 (en) | Method of selecting clusters of items using a fuzzy histogram analysis | |
US8069176B1 (en) | LSH-based retrieval using sub-sampling | |
US9756063B1 (en) | Identification of host names generated by a domain generation algorithm | |
US20220012231A1 (en) | Automatic content-based append detection | |
CN110362829B (en) | Quality evaluation method, device and equipment for structured medical record data | |
CN111159413A (en) | Log clustering method, device, equipment and storage medium | |
US20110082862A1 (en) | Identification Disambiguation in Databases | |
US20080097992A1 (en) | Fast database matching | |
TWI714321B (en) | Method, apparatus and electronic device for database updating and computer storage medium thereof | |
CN114021116B (en) | Construction method of homologous analysis knowledge base, homologous analysis method and device | |
US20180276294A1 (en) | Information processing apparatus, information processing system, and information processing method | |
CN114706899A (en) | Express delivery data sensitivity calculation method and device, storage medium and equipment | |
WO2013071953A1 (en) | Fast database matching | |
US9846739B2 (en) | Fast database matching | |
Kumar et al. | An efficient space partitioning tree approach for indexing and retrieving fingerprint databases | |
JP6485072B2 (en) | Image search apparatus, image search method, and image search program | |
CN115048543B (en) | Image similarity judgment method, image searching method and device | |
CN117112846B (en) | Multi-information source license information management method, system and medium | |
CN116244457A (en) | Image retrieval method, terminal and computer readable storage medium | |
CN117240548A (en) | Information tracing method, device, equipment and storage medium for network identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |