Security Documents: Facial Periocular Region-based Unique Id Generation and One-to-one Verification
P. Suhail
G. Kokila
Keywords: Security, Biometric, Fingerprint Technology
Abstract
Recently, robust and dependable security procedures have become crucial, especially for sensitive documents. Passwords, PINs, and tokens can be stolen. Security and convenience make biometric technologies a good choice. Facial periocular biometrics are promise for identity verification and unique ID production. A novel security document identification and verification method uses the periocular region, the area around the eyes. The periocular region is chosen for its rich texture and less-aging appearance. The proposed system takes high-resolution periocular images using specialist imaging methods. These photographs are manipulated with powerful algorithms to extract unique traits. These features form a unique biometric blueprint for each person. The method accurately distinguishes individuals, making it ideal for one-on-one verification. The proposed methodology is evaluated utilising a wide range of periocular images from various demographic groups. Safeguard sensitive documents, such as certificates, hall tickets, passports, and licenses, from fraudulent imitation. Despite the inclusion of important information such as a person's name, address, and frequently a photograph for personal identification, criminal impersonation is a simple and direct act. Therefore, it is imperative to implement a biometric authentication system in order to authenticate the identity of the document owner. Although fingerprint technology is considered the most cost-effective method for personal identification, its reliability has been called into question due to vulnerabilities to easily replicated attacks. This research introduces a novel and economical approach for generating a distinct identification using facial periocular feature points. The generated distinct identifier is converted into a QR code and imprinted on security documents for individual authentication. An analysis is conducted on the effectiveness of the suggested methodology.