Preview

Iris Recognition System

Best Essays
Open Document
Open Document
3730 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Iris Recognition System
Enhancement Segmentation Technique for Iris Recognition System Based on Daugman’s Integro-Differential Operator
Asama Kuder Nsaef
Institute of Visual Informatics (IVI) Universiti Kebangsaan Malaysia Bangi, Selangor, Malaysia osama_ftsm@yahoo.com

Azizah Jaafar
Institute of Visual Informatics (IVI) Universiti Kebangsaan Malaysia Bangi, Selangor, Malaysia aj@ftsm.ukm.my

Khider Nassif Jassim Faculty of Management and Economics Department of Statistics University of Wasit Al-Kut, Iraq khider_st@yahoo.com

Abstract—In spite of having been highly recognized as one of the critical steps in recognizing and determining the accuracy of iris matching, segmentation process of Iris is still encountered with few problematic challenges, especially in the process of separating the iris from the eye image and eyelids and eyelashes as it leads to reduction of the accuracy. To enhance the accuracy of iris segmentation, therefore, this study was carried-out using Integro-differential Operator approach in the segmentation process with the aim of locating the iris region of eye image, by employing one centre of the iris and pupil. This approach is found more effective in emphasizing the accuracy of iris segmentation. The evaluation was carried-out at the end of the study using CASIA-IrisV3-Intervals Database. The results of the experimental evaluation showed that the accuracy of the iris recognition increased, and the speed was acceptable. Keywords-Enhancement Segmentation; Iris Recognition; Integro-differential

I.

INTRODUCTION

Due to the increasingly demanded security in reality, technologies have offered several systems for Pearson recognition which mainly depend on biometric features, and which posses wide commercial and security applications. Biometric systems exploit biological/behavior characteristics as means of identification [1], and such biological characteristics are more efficient and reliable for person recognition. Being mainly dependent on the



References: [1] [2] E. WOLFF, Anatomy of the Eye and Orbit. H.K. Lewis & Co. LTD,, 1976. R. P. Wildes, J. C. Asmuth, G. L. Green, S. C. Hsu, R. J. Kolczynski, J. R. Matey, and S. E. McBride, "A system for automated iris recognition," in Applications of Computer Vision, 1994., Proceedings of the Second IEEE Workshop on, 1994, pp. 121-128. R. P. Wildes, "Iris recognition: an emerging biometric technology," Proceedings of the IEEE, vol. 85, pp. 13481363, 1997. C. Sreecholpech and S. Thainimit, "A robust model-based iris segmentation," in Intelligent Signal Processing and Communication Systems, 2009. ISPACS 2009. International Symposium on, 2009, pp. 599-602. H. Proença, L. Alexandre, G. Bebis, R. Boyle, B. Parvin, D. Koracin, N. Paragios, S.-M. Tanveer, T. Ju, Z. Liu, S. Coquillart, C. Cruz-Neira, T. Müller, and T. Malzbender, "Iris Recognition: An Entropy-Based Coding Strategy Robust to Noisy Imaging Environments Advances in Visual Computing." vol. 4841: Springer Berlin / Heidelberg, 2007, pp. 621-632. L. Masek, "Recognition of Human Iris Patterns for Biometric Identification," in School of Computer Science and Software Engineering. vol. Bachelor of Engineering degree: University of Western Australia, 2003. W. K. Kong and D. Zhang, "Accurate iris segmentation based on novel reflection and eyelash detection model," in Intelligent Multimedia, Video and Speech Processing, 2001. Proceedings of 2001 International Symposium on, 2001, pp. 263-266. S. R. Kodituwakku, M. I. M. Fazeen, and K. Elleithy, "An Offline Fuzzy Based Approach for Iris Recognition with Enhanced Feature Detection Advanced Techniques in Computing Sciences and Software Engineering," Springer Netherlands, 2010, pp. 39-44. A. Gupta, A. Kumari, B. Kundu, I. Agarwal, S. Ranka, S. Aluru, R. Buyya, Y.-C. Chung, S. Dua, A. Grama, S. K. S. Gupta, R. Kumar, and V. V. Phoha, "CDIS: Circle Density Based Iris Segmentation Contemporary Computing." vol. 40: Springer Berlin Heidelberg, 2009, pp. 295-306. L. Ghouti and F. S. Al-Qunaieer, "Color Iris Recognition Using Quaternion Phase Correlation," in Bio-inspired Learning and Intelligent Systems for Security, 2009. BLISS '09. Symposium on, 2009, pp. 20-25. J. G. Daugman, "High confidence visual recognition of persons by a test of statistical independence," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 15, pp. 1148-1161, 1993. J. Daugman, "New Methods in Iris Recognition," Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 37, pp. 1167-1175, 2007. J. Daugman, "How iris recognition works," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 14, pp. 21-30, 2004. J. Daugman, "How iris recognition works," in Image Processing. 2002. Proceedings. 2002 International Conference on, 2002, pp. I-33-I-36 vol.1. K. W. Bowyer, K. Hollingsworth, and P. J. Flynn, "Image understanding for iris biometrics: A survey," Computer Vision and Image Understanding, vol. 110, pp. 281-307, 2008. W. W. Boles and B. Boashash, "A human identification technique using images of the iris and wavelet transform," Signal Processing, IEEE Transactions on, vol. 46, pp. 11851188, 1998. Chinese Academy of Sciences – Institute of Automation. 2006.Database of 2655 Greyscale Eye Images. http://www.sinobiometrics.com Version 3.0. [3] [4] [5] [6]

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Olzak, T. (2010, July 5). The future of iris scanning. Retrieved November 2013, 2013, from A Tech Republic Website: http://www.techrepublic.com/blog/it-security/the-future-of-iris-scanning/…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Good Essays

    IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Facial Recognition software has been used in many atmospheres to assist in security. There has been controversy as to wither or not facial recognition is an accurate tool. The software has been in existence for many years but still can be defeated by criminals, terrorists, and even by citizens in general without malice.…

    • 3118 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Abstract: Nowadays almost everyone is using smart phones. They are becoming an essential tool in human being’s everyday life. They are not only used for mere communication such as calling or sending text messages; however, they are also used in applications such as for accessing internet, receiving and sending emails and storing documents. As a result of this, not only phone numbers and addresses are stored in the mobile device but also financial information and business details which definitely should be kept private. And if the device is being stolen, each and every information is in the hands of the new owner. That’s why; the biggest challenge is the security. When it is necessary to confirm the user identity on systems to perform a given operation, the term User Authentication is used. Traditionally, people prove their identity by providing passwords. The average person today has about 25 password protected accounts (according to Microsoft study), more passwords than they can reasonably be expected to remember. People compensate by using the same password for multiple accounts, and by choosing passwords that are easy to remember. But, unfortunately easy to remember means easy to guess. Other user select difficult passwords but then write them down where unauthorized eyes can find them. That’s why, identity based on what you know (login and password) and what you have (ID cards) can be easily stolen. As we want trust (security), the notion what you are is a new opportunity to user authentication. Biometric Authentication is answer for that. Biometric is a characteristic of human being that distinguishes one person from another. For example, finger prints, retina, face recognition, etc. This can be used for identification or verification of identity. Keywords: FAR, FRR, ROC, EER, FTE, FTC. B.…

    • 2535 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Engineering drawing

    • 8849 Words
    • 30 Pages

    4. R. C. Fang, 2D free hand recognition system. Master 's Report, Oregon State University, Corvallis, OR (April, 1988).…

    • 8849 Words
    • 30 Pages
    Better Essays
  • Good Essays

    SVM achieved better detection rate and fewer false alarms. SVM can improve the accuracy and reduce the computation. SVMs treat every (m_n)-pixel image as a point in a mn-dimensional space. Secondly, SVMs compare a candidate point to successive pairs of known classes to determine its experimental class, rather than comparing the distances between the candidate and a series of single points in a high-dimensional space. For a forty-class training set containing ten images of each subject, an SVM facial recognition implementation achieved an average minimum mis classication rate of 3:0%…

    • 803 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    DIGITAL IMAGE PROCESSING

    • 1391 Words
    • 6 Pages

    Tinku Acharya and Ajoy K. Ray (2006). Image Processing - Principles and Applications. Wiley InterScience.…

    • 1391 Words
    • 6 Pages
    Powerful Essays