SlideShare a Scribd company logo
1 of 13
Download to read offline
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3

                           Iris Recognition For Authentication
                                                   Pradeep Kumar
                                  ECE Deptt. Vidya Vihar Institute of Technology
                                        Maranga, Purnea, Bihar-854301, India
                                Tel:+91-787408311 Email:pra_deep_jec@yahoo.co.in


Abstract

Iris recognition, the ability to recognize and distinguish individuals by their pattern, is the most reliable biometric in
terms of recognition and identification performance. Uni-model biometric systems have to contend with a variety of
problems such as noisy data, intra class variations, restricted degrees of freedom, non-universality, spoof attacks,
and unacceptable error rates. This paper presents a novel iris coding method based on differences of discrete cosine
transform (DCT) coefficients of overlapped angular patches from normalized iris images. The feature extraction
capabilities of the DCT are optimized on the two largest publicly available iris image data sets, images of eyes from
the CASIA database and from the Bath database. Segmentation and Normalization of Iris images are done by
considering noise too. And finally individual feature bit and patch position parameters are optimized for matching
through a product-of-sum approach to Hamming distance calculation.
Keywords: Authentification, Biometric, Discrete cosine transform, Image preprocessing, Iris Recognition.

1. Introduction

Biometric products provide improved security over traditional electronic access control methods such as RFID tags,
electronic keypads and some mechanical locks. They ensure that the authorized user is present in order for access to
take place. The user’s authorized card or password pin cannot be stolen or lost to gain access. Common physical
biometrics includes fingerprints, hand or palm geometry, retina, iris, or facial characteristics, whereas behavioral
characteristics include signature, voice (which also has a physical component), keystroke pattern, and gait. The use
of biometric systems has been increasingly encouraged by both governments and private entities in order to replace
or increase traditional security systems. Biometric is based on a physiological or behavioural characteristic of the
person. A biometric system provides automatic recognition of an individual based on some sort of unique feature or
characteristic possessed by the individual.

Apart from general textural appearance and color [Ahmed 1974], the finely detailed structure of an iris is not
genetically determined but develops by a random process. The iris patterns of the two eyes of an individual or those
of identical twins are completely independent and uncorrelated (Daugman 2001). Additionally, the iris is highly
stable over a person’s lifetime and lends itself to noninvasive identification because it is an externally visible


                                                          137
Computer Engineering and Intelligent Systems                                                       www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
internal organ. Pioneering work on iris recognition was done by Daugman using Gabor wavelets(Daugman 1993),
(Daugman 2003), (Daugman 2001). That system has since been widely implemented and tested.




                                   Fig:1. Eye image and Location of Iris

This paper contributes a realizable solution to some of these problems. Here, we investigate a novel method for iris
matching using zero crossings of a one dimensional Discrete Cosine Transform (DCT) as a means of feature
extraction for later classification. The DCT of a series of averaged overlapping angular patches are taken from
normalized iris images and a small subset of coefficients is used to form sub-feature vectors. Iris codes are generated
as a sequence of many such sub-features, and classification is carried out using a weighted Hamming distance
metric. System parameters are optimized to give lowest equal error rates (EER) on two data sets.

In this paper section 2 gives details about DCT and section 3 deals with image pre-processing, which include
normalization. In section 4 explanation of proposed Iris coding method is given and finally in section 5 conclusion is
given .

2. The discrete cosine transform

The DCT is a real valued transform, which calculates a truncated Chebyshev series possessing well-known mini-
max properties and can be implemented using the Discrete Fourier Transform (DFT) (Fukunaga 1990). There are
several variants but the one most commonly used operates on a real sequence xn of length N to produce coefficients
Ck, following Ahmed et al.(Hafed 2001):




and




                                                         138
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
where



Due to its strong energy compaction property, the DCT is widely used for data compression. In addition, the feature
extraction capabilities of the DCT coupled with well-known fast computation techniques (Kronfeld 1962), (Ma
2004),(Monro 2005) have made it a candidate for pattern recognition problems such as the one addressed here. In
particular, the DCT has been shown to produce good results on face recognition(Newsome 1971), (Pratt 1991),
where it has been used as a less computationally intensive replacement for the Karhunen-Loeve transform (KLT),
which is an optimal technique according to the least squares metric for projecting a large amount of data onto a
small dimensional subspace (Rao 1990), (Travieso 2004). The KLT decomposes an image into principal
components ordered on the basis of spatial correlation and is statistically optimal in the sense that it minimizes the
mean square error between a truncated representation and the actual data (Fukunaga 1990). The DCT, with its
variance distribution closely resembling that of the KLT, has been shown to approach its optimality with much
lower computational complexity (Travieso 2004). Additionally, its variance distribution decreases more rapidly
compared to other deterministic transforms (Fukunaga 1990). Although no transform can be said to be optimal for
recognition, these well-known properties motivated us to investigate the DCT for effective non-semantic feature
extraction from human iris images.

3. Image preprocessing

For coding, irises are extracted from the eye images and normalized to a standard format for feature extraction in
order to remove variability introduced by pupil dilation, camera-to-eye distance, head tilt, and torsional eye rotation
within its socket (Daugman. 1993), (Daugman. 2003). Moreover, images acquired by different cameras under
different environmental conditions have different resolution and illumination distributions(Uenohara 1997), (Vetterli
1985). All these factors need to be taken into consideration and compensated for in order to generate a final
normalized version compliant with the feature extraction input format. Iris images already normalized to a resolution
of 512 _ 80 pixels.




                                                         139
Computer Engineering and Intelligent Systems                                                       www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3




                                        Fig:2. Sample Eye Images

3.1 Localization

Location of the pupil and outer iris boundaries starts with the removal of the bright spot in the pupil caused by the
reflection of the infrared light source. This reduces the influence of high gray-level values on the gray-scale
distribution. Then, the image is scanned to isolate a region containing the pupil and iris. This is done by a heuristic
method based on the assumption that the majority of image rows and columns passing through the pupil will have




                                                         140
Computer Engineering and Intelligent Systems                                                       www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3




                                        Fig:4. Various steps in Enhancement

larger gray-level variance than those not passing through the pupil. It is assumed that the pupil is circular and,
because the pupil boundary is a distinct edge feature, a Hough transform is used to find the center and radius of the
pupil. To locate the outer boundary of the iris (limbus), a horizontal line through the pupil center is scanned for the
jumps in gray level on either side of the pupil. The limbus is normally circular but its center does not necessarily
coincide with that of the pupil.
3.2 Normalization and enhancement


                                                         141
Computer Engineering and Intelligent Systems                                                       www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
Due to the dilation and constriction of the human pupil, the radial size of the iris varies under different illumination
conditions and in response to physiological factors. The resulting deformation of the iris texture can be
approximated as a linear deformation (Wyatt 2000), (Yonghong 2001). Since we know the iris boundaries, we can
map a rectangular image




                                               Fig:4. Segmented template



array back to an angular and radial position in the iris. This position will not in general, map exactly onto a pixel in
the source image, so the normalized gray value is obtained by bilinear interpolation from its four nearest neighbors.
Finally, the gray levels are adjusted by removing the peak illumination caused by light sources reflecting from the
eye, estimating and subtracting the slowly varying background illumination, and equalizing the gray-level histogram
of the iris image. The final normalized image is of resolution 512 _ 80, from which I code only the 48 rows nearest
the pupil to mitigate the effect of eyelids.

4. Proposed iris coding method

The human iris, being highly specific to an individual, needs to be coded to exploit the local textural variations
while keeping complexity to a minimum. The primary objective behind any good iris coding method is to obtain
good interclass separation in minimum time. As explained earlier, the DCT, being an approximation to the KLT, is a
good candidate for feature extraction and is thus used here as a means of representing the intricate and detailed
variations in the human iris texture. In our earlier work, based on Fourier domain methods (Wildes 1997), good

                                                         142
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
results were obtained. Here, we discuss the use of the new method in generating an iris-code with various parameter
optimizations and weightings to give further improved performance.




4.1 FEATURE EXTRACTION

As in our Fourier-based iris coding work (Wildes 1997), we start from a general paradigm whereby the feature
vectors will be derived from the zero crossings of the differences between 1D DCT coefficients calculated in
rectangular image patches, as illustrated by Fig. 4. Averaging across the width of these patches with appropriate
windowing helps to smooth the data and mitigate the effects of noise and other image artifacts. This then enables us
to use a 1D DCT to code each patch along its length, giving low-computational cost. The selection of the values for
the various parameters was done by extensive experimentation over the CASIA and Bath databases to obtain the
best predicted Equal Error Rate (EER). The two data sets were used in their entirety to optimize the parameters of
the method.
Experimentally, overlapping patches gave the best EER in combination with the other parameters. It was also found
that horizontally aligned patches worked best, and a rotation of 45 degrees was better than 0 degrees or 90 degrees.
This distinctive feature of our code introduces a blend of radial and circumferential texture allowing variations in
either or both directions to contribute to the iris code.
To form image patches, we select bands of pixels along 45 degree lines through the image. A practical way of doing
this is to slew each successive row of the image by one pixel compared to its predecessor. Patches are then selected
in 11 overlapping horizontal bands as in Fig. 5. Each patch has eight pixels vertically (overlapping by four) and 12
horizontally (overlapping six). In the horizontal direction, a weighted average under a 1/4 Hanning window is
formed. In effect, the resolution in the horizontal (iris circumferential) direction is   reduced by this step.




                                                            143
Computer Engineering and Intelligent Systems                                                       www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
                   Fig:5. The various steps in forming feature vectors from normalized iris images

Averaging across the width of the patch helps to reduce the degrading effects of noise and the use of broad patches
makes for easier iris registration. In the vertical direction (45 degrees from the iris radial), eight pixels from each
patch form a 1D patch vector, which is then windowed using a similar Hanning window prior to application of the
DCT in order to reduce spectral leakage during the transform. The differences between the DCT coefficients of
adjacent patch vectors are then calculated and a binary code is generated from their zero crossings. These 8-bit code
fragments (codelets) are the basis of our matching process, but are further trimmed as described below.


4.2 MATCHING

For comparing two iris codes, a nearest-neighbor approach is taken, where the distance between two feature vectors
is measured using the product-of-sum (POS) of individual subfeature Hamming distances (HD). This can be defined
as follows:




Here, i consider the iris code as a rectangular block of Size M_ N,M being the number of bits per sub feature and N
the total number of sub features in a feature vector.




                                        Fig:6. Normalized template iris image




                                                         144
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3




                                          Fig:7. Encoded template iris image

Corresponding sub feature bits are XORed and the resultant N-length vector is summed and normalized by dividing
by N. This is done for all M sub feature bits and the geometric mean of these M sums give the normalized HD lying
in the range of 0 to 1. For a perfect match, where every bit from Feature 1 matches with every corresponding bit of
Feature 2, all M sums are 0 and so is the HD, while, for a total opposite, where every bit from the first Feature is
reversed in the second, M N/Ns are obtained with a final HD of 1. Since a total bit reversal is highly unlikely, it is
expected that a random pattern difference should produce an HD of around 0.5.


While our previous approach [18] based the HD calculation on a weighted sum of EXOR-ed bits, the new POS
method provides for better separation by skewing the matching distribution toward 0 and the non matching one
toward 0.5.A side-effect of taking the geometric mean is that an identical match between any two corresponding sets
of N sub feature bits will give an overall HD of 0 and, thus, a perfect match. Although this might seem radical, it is
highly unlikely that all N bits, 713 in this case, will match identically for any two iris templates. Even if such a
situation were to occur, it is very likely that both templates originated from the same class.


Rotation invariance is achieved by storing six additional iris codes for three rotations on either side by horizontal
(iris circumferential) shifts of 4, 8, and 12 pixels each way in the normalized images. During verification, the test iris
code is compared against all seven stored ones and the minimum distance is chosen for each of the three separately
enrolled images. These three minima are then averaged to give the matching HD.




                                                          145
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3




                                   Fig:8. False Accept and Reject distributions.




                                         Fig:9. Encoded Query iris image

Same steps are applied on the query image as template iris image to get the encoded image of query iris image.
After that matching is performed. If both iris images are same then it will show identical else non-identical. Both
cases are shown in figure below.




                                                       146
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3




                               Fig:10. Template and Query images both are same




                              Fig:11.Template and Query images both are not same




5. Conclusion

In this paper, I have described an approach to human iris recognition based on the 1D Discrete Cosine Transform
(DCT), which supersedes our earlier work in this field (Wildes 1997). The work was motivated by the near-optimal
de-correlating properties of the DCT compared to the Karhunen-Loeve transform, and the results achieved indicate



                                                      147
Computer Engineering and Intelligent Systems                                                    www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
the good performance of the approach in which there are no False Accepts/Rejects. The method as implemented also
has low complexity, making it superior to the other methods evaluated in terms of both speed and accuracy.



Acknowlegment

The author would like to thank Dr.Abhay Kumar , Dr. Chanda Jha, Mr.Pranav Shankar, Mr. Deepak Kumar and
Miss K.Jayanthi for their insightful advice and guidance, and unknown reviewers for their useful remarks and
suggestions.

References

Ahmed.N, Natarajan.T, and Rao.K, “Discrete Cosine Transform,” IEEE Trans. Computers, vol. 23, pp. 90-93,
1974.

Daugman.J      and Downing.C “Epigenetic Randomness, Complexity, and Singularity of Human Iris
Patterns,”      Proc. Royal Soc. (London) B: Biological Sciences, vol. 268, pp. 1737-1740, 2001.

 Daugman.J, “High       Confidence Visual Recognition of       Persons by a Test of Statistical
Independence,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, pp. 1148-1161, 1993.

Daugman.J, “The Importance of Being Random: Statistical      Principles of Iris Recognition,” Pattern Recognition,
vol. 36, pp. 279-291, 2003.

 Daugman.J, “Statistical Richness of Visual Phase Information: Update on Recognizing Persons by Iris Patterns,”
Int’l J. Computer Vision, vol. 45, pp. 25-38, 2001.

Fukunaga.A.K, Introduction to Statistical Pattern Recognition, second ed. Academic Press Professional, Inc., 1990.

 Hafed.Z.H and Levine.M.D, “Face Recognition Using the Discrete Cosine Transform,” Int’l J. Computer Vision,
vol. 43, pp. 167-188, 2001.

Kronfeld.P, Gross Anatomy and Embryology of the Eye. Academic Press, 1962.

Ma.L, Tan.T, Wang.Y, and Zhang.D, “Efficient Iris Recognition by Characterizing Key Local Variations,” IEEE
Trans. Image Processing, vol. 13, pp. 739-750, 2004.

Monro.D.M and Zhang.D, “An Effective Human Iris Code with Low Complexity,” Proc. IEEE Int’l Conf. Image
Processing, vol. 3, no. 3, pp. 277-280, 2005.

Newsome.D.A and Loewenfeld.I.E, “Iris Mechanics II: Influence of Pupil Size on Details of Iris Structure,” Am. J.
Ophthalmology, vol. 71, pp. 553-573, 1971.

Pratt.W.K, Digital Image Processing, second ed. John Wiley and Sons, 1991.

Rao.K.R and Yip.P, Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic, 1990.

Travieso.C.M, Alonso.J.B, and Ferrer.M.A, “Facial Identification Using Transformed Domain by SVM,” Proc. 38th
Ann. Int’l Carnahan Conf. Security Technology, pp. 321-324, 2004.


                                                       148
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
Uenohara.U and Kanade.T, “Use of Fourier and Karhunen- Loeve Decomposition for Fast Pattern Matching with a
Large Set of Templates,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, pp. 891-898, 1997.

Vetterli.V, “Fast 2-D Discrete Cosine Transform,” Proc. IEEE Int’l Conf. Acoustics, Speech, and Signal
Processing, pp. 1538-1541, 1985.

Wildes.R.P, “Iris Recognition: An Emerging Biometric Technology,” Proc. IEEE, vol. 85, pp. 1348-1363, 1997.

Wyatt.H.J, “A ‘Minimum-Wear-and-Tear’ Meshwork for the Iris,” Vision Research, vol. 40, pp. 2167-2176, 2000.
Yonghong.Z, Lizhi.C, Guoan.B, and Kot.A.C, “Integer DCTs and Fast Algorithms,” IEEE Trans. Signal
Processing, vol. 49, pp. 2774- 2782, 2001.




                                                      149

More Related Content

What's hot

AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...IJEEE
 
IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...
IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...
IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...IRJET Journal
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 
Automated Diagnosis of Glaucoma using Haralick Texture Features
Automated Diagnosis of Glaucoma using Haralick Texture FeaturesAutomated Diagnosis of Glaucoma using Haralick Texture Features
Automated Diagnosis of Glaucoma using Haralick Texture FeaturesIOSR Journals
 
System to convert 2 d x-ray image into 3-d x-ray image in dentistry
System to convert 2 d x-ray image into 3-d x-ray image in dentistrySystem to convert 2 d x-ray image into 3-d x-ray image in dentistry
System to convert 2 d x-ray image into 3-d x-ray image in dentistryeSAT Publishing House
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET Journal
 
Virtual viewpoint three dimensional panorama
Virtual viewpoint three dimensional panoramaVirtual viewpoint three dimensional panorama
Virtual viewpoint three dimensional panoramaijcseit
 
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...csandit
 
Microscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural networkMicroscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural networkjournalBEEI
 
Brain Tumor Segmentation and Extraction of MR Images Based on Improved Waters...
Brain Tumor Segmentation and Extraction of MR Images Based on Improved Waters...Brain Tumor Segmentation and Extraction of MR Images Based on Improved Waters...
Brain Tumor Segmentation and Extraction of MR Images Based on Improved Waters...IOSR Journals
 
MRI Brain Image Segmentation using Fuzzy Clustering Algorithms
MRI Brain Image Segmentation using Fuzzy Clustering AlgorithmsMRI Brain Image Segmentation using Fuzzy Clustering Algorithms
MRI Brain Image Segmentation using Fuzzy Clustering Algorithmsijtsrd
 
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONIMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONijma
 
Recent developments in iris based biometric
Recent developments in iris based biometricRecent developments in iris based biometric
Recent developments in iris based biometriceSAT Publishing House
 

What's hot (15)

AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
 
IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...
IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...
IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 
Automated Diagnosis of Glaucoma using Haralick Texture Features
Automated Diagnosis of Glaucoma using Haralick Texture FeaturesAutomated Diagnosis of Glaucoma using Haralick Texture Features
Automated Diagnosis of Glaucoma using Haralick Texture Features
 
System to convert 2 d x-ray image into 3-d x-ray image in dentistry
System to convert 2 d x-ray image into 3-d x-ray image in dentistrySystem to convert 2 d x-ray image into 3-d x-ray image in dentistry
System to convert 2 d x-ray image into 3-d x-ray image in dentistry
 
Kc3118711875
Kc3118711875Kc3118711875
Kc3118711875
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode Decomposition
 
Virtual viewpoint three dimensional panorama
Virtual viewpoint three dimensional panoramaVirtual viewpoint three dimensional panorama
Virtual viewpoint three dimensional panorama
 
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
 
Microscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural networkMicroscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural network
 
Brain Tumor Segmentation and Extraction of MR Images Based on Improved Waters...
Brain Tumor Segmentation and Extraction of MR Images Based on Improved Waters...Brain Tumor Segmentation and Extraction of MR Images Based on Improved Waters...
Brain Tumor Segmentation and Extraction of MR Images Based on Improved Waters...
 
MRI Brain Image Segmentation using Fuzzy Clustering Algorithms
MRI Brain Image Segmentation using Fuzzy Clustering AlgorithmsMRI Brain Image Segmentation using Fuzzy Clustering Algorithms
MRI Brain Image Segmentation using Fuzzy Clustering Algorithms
 
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONIMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
 
Recent developments in iris based biometric
Recent developments in iris based biometricRecent developments in iris based biometric
Recent developments in iris based biometric
 
G01114650
G01114650G01114650
G01114650
 

Viewers also liked

Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Dr. Vinayak Bharadi
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION Ankit Kumar
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 

Viewers also liked (6)

Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 

Similar to Iris Recognition Using DCT Coefficients

IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmEditor IJCATR
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
Artificial neural network based cancer cell classification
Artificial neural network based cancer cell classificationArtificial neural network based cancer cell classification
Artificial neural network based cancer cell classificationAlexander Decker
 
11.artificial neural network based cancer cell classification
11.artificial neural network based cancer cell classification11.artificial neural network based cancer cell classification
11.artificial neural network based cancer cell classificationAlexander Decker
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classificationijeei-iaes
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkijcsit
 
A new gridding technique for high density microarray
A new gridding technique for high density microarrayA new gridding technique for high density microarray
A new gridding technique for high density microarrayAlexander Decker
 
Infrared image enhancement using wavelet transform
Infrared image enhancement using wavelet transformInfrared image enhancement using wavelet transform
Infrared image enhancement using wavelet transformAlexander Decker
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKijaia
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONsipij
 

Similar to Iris Recognition Using DCT Coefficients (20)

Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris RecognitionComparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFT
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
366 369
366 369366 369
366 369
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
07515971
0751597107515971
07515971
 
Artificial neural network based cancer cell classification
Artificial neural network based cancer cell classificationArtificial neural network based cancer cell classification
Artificial neural network based cancer cell classification
 
11.artificial neural network based cancer cell classification
11.artificial neural network based cancer cell classification11.artificial neural network based cancer cell classification
11.artificial neural network based cancer cell classification
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
E017443136
E017443136E017443136
E017443136
 
A new gridding technique for high density microarray
A new gridding technique for high density microarrayA new gridding technique for high density microarray
A new gridding technique for high density microarray
 
Infrared image enhancement using wavelet transform
Infrared image enhancement using wavelet transformInfrared image enhancement using wavelet transform
Infrared image enhancement using wavelet transform
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Iris Recognition Using DCT Coefficients

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Iris Recognition For Authentication Pradeep Kumar ECE Deptt. Vidya Vihar Institute of Technology Maranga, Purnea, Bihar-854301, India Tel:+91-787408311 Email:pra_deep_jec@yahoo.co.in Abstract Iris recognition, the ability to recognize and distinguish individuals by their pattern, is the most reliable biometric in terms of recognition and identification performance. Uni-model biometric systems have to contend with a variety of problems such as noisy data, intra class variations, restricted degrees of freedom, non-universality, spoof attacks, and unacceptable error rates. This paper presents a novel iris coding method based on differences of discrete cosine transform (DCT) coefficients of overlapped angular patches from normalized iris images. The feature extraction capabilities of the DCT are optimized on the two largest publicly available iris image data sets, images of eyes from the CASIA database and from the Bath database. Segmentation and Normalization of Iris images are done by considering noise too. And finally individual feature bit and patch position parameters are optimized for matching through a product-of-sum approach to Hamming distance calculation. Keywords: Authentification, Biometric, Discrete cosine transform, Image preprocessing, Iris Recognition. 1. Introduction Biometric products provide improved security over traditional electronic access control methods such as RFID tags, electronic keypads and some mechanical locks. They ensure that the authorized user is present in order for access to take place. The user’s authorized card or password pin cannot be stolen or lost to gain access. Common physical biometrics includes fingerprints, hand or palm geometry, retina, iris, or facial characteristics, whereas behavioral characteristics include signature, voice (which also has a physical component), keystroke pattern, and gait. The use of biometric systems has been increasingly encouraged by both governments and private entities in order to replace or increase traditional security systems. Biometric is based on a physiological or behavioural characteristic of the person. A biometric system provides automatic recognition of an individual based on some sort of unique feature or characteristic possessed by the individual. Apart from general textural appearance and color [Ahmed 1974], the finely detailed structure of an iris is not genetically determined but develops by a random process. The iris patterns of the two eyes of an individual or those of identical twins are completely independent and uncorrelated (Daugman 2001). Additionally, the iris is highly stable over a person’s lifetime and lends itself to noninvasive identification because it is an externally visible 137
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 internal organ. Pioneering work on iris recognition was done by Daugman using Gabor wavelets(Daugman 1993), (Daugman 2003), (Daugman 2001). That system has since been widely implemented and tested. Fig:1. Eye image and Location of Iris This paper contributes a realizable solution to some of these problems. Here, we investigate a novel method for iris matching using zero crossings of a one dimensional Discrete Cosine Transform (DCT) as a means of feature extraction for later classification. The DCT of a series of averaged overlapping angular patches are taken from normalized iris images and a small subset of coefficients is used to form sub-feature vectors. Iris codes are generated as a sequence of many such sub-features, and classification is carried out using a weighted Hamming distance metric. System parameters are optimized to give lowest equal error rates (EER) on two data sets. In this paper section 2 gives details about DCT and section 3 deals with image pre-processing, which include normalization. In section 4 explanation of proposed Iris coding method is given and finally in section 5 conclusion is given . 2. The discrete cosine transform The DCT is a real valued transform, which calculates a truncated Chebyshev series possessing well-known mini- max properties and can be implemented using the Discrete Fourier Transform (DFT) (Fukunaga 1990). There are several variants but the one most commonly used operates on a real sequence xn of length N to produce coefficients Ck, following Ahmed et al.(Hafed 2001): and 138
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 where Due to its strong energy compaction property, the DCT is widely used for data compression. In addition, the feature extraction capabilities of the DCT coupled with well-known fast computation techniques (Kronfeld 1962), (Ma 2004),(Monro 2005) have made it a candidate for pattern recognition problems such as the one addressed here. In particular, the DCT has been shown to produce good results on face recognition(Newsome 1971), (Pratt 1991), where it has been used as a less computationally intensive replacement for the Karhunen-Loeve transform (KLT), which is an optimal technique according to the least squares metric for projecting a large amount of data onto a small dimensional subspace (Rao 1990), (Travieso 2004). The KLT decomposes an image into principal components ordered on the basis of spatial correlation and is statistically optimal in the sense that it minimizes the mean square error between a truncated representation and the actual data (Fukunaga 1990). The DCT, with its variance distribution closely resembling that of the KLT, has been shown to approach its optimality with much lower computational complexity (Travieso 2004). Additionally, its variance distribution decreases more rapidly compared to other deterministic transforms (Fukunaga 1990). Although no transform can be said to be optimal for recognition, these well-known properties motivated us to investigate the DCT for effective non-semantic feature extraction from human iris images. 3. Image preprocessing For coding, irises are extracted from the eye images and normalized to a standard format for feature extraction in order to remove variability introduced by pupil dilation, camera-to-eye distance, head tilt, and torsional eye rotation within its socket (Daugman. 1993), (Daugman. 2003). Moreover, images acquired by different cameras under different environmental conditions have different resolution and illumination distributions(Uenohara 1997), (Vetterli 1985). All these factors need to be taken into consideration and compensated for in order to generate a final normalized version compliant with the feature extraction input format. Iris images already normalized to a resolution of 512 _ 80 pixels. 139
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig:2. Sample Eye Images 3.1 Localization Location of the pupil and outer iris boundaries starts with the removal of the bright spot in the pupil caused by the reflection of the infrared light source. This reduces the influence of high gray-level values on the gray-scale distribution. Then, the image is scanned to isolate a region containing the pupil and iris. This is done by a heuristic method based on the assumption that the majority of image rows and columns passing through the pupil will have 140
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig:4. Various steps in Enhancement larger gray-level variance than those not passing through the pupil. It is assumed that the pupil is circular and, because the pupil boundary is a distinct edge feature, a Hough transform is used to find the center and radius of the pupil. To locate the outer boundary of the iris (limbus), a horizontal line through the pupil center is scanned for the jumps in gray level on either side of the pupil. The limbus is normally circular but its center does not necessarily coincide with that of the pupil. 3.2 Normalization and enhancement 141
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Due to the dilation and constriction of the human pupil, the radial size of the iris varies under different illumination conditions and in response to physiological factors. The resulting deformation of the iris texture can be approximated as a linear deformation (Wyatt 2000), (Yonghong 2001). Since we know the iris boundaries, we can map a rectangular image Fig:4. Segmented template array back to an angular and radial position in the iris. This position will not in general, map exactly onto a pixel in the source image, so the normalized gray value is obtained by bilinear interpolation from its four nearest neighbors. Finally, the gray levels are adjusted by removing the peak illumination caused by light sources reflecting from the eye, estimating and subtracting the slowly varying background illumination, and equalizing the gray-level histogram of the iris image. The final normalized image is of resolution 512 _ 80, from which I code only the 48 rows nearest the pupil to mitigate the effect of eyelids. 4. Proposed iris coding method The human iris, being highly specific to an individual, needs to be coded to exploit the local textural variations while keeping complexity to a minimum. The primary objective behind any good iris coding method is to obtain good interclass separation in minimum time. As explained earlier, the DCT, being an approximation to the KLT, is a good candidate for feature extraction and is thus used here as a means of representing the intricate and detailed variations in the human iris texture. In our earlier work, based on Fourier domain methods (Wildes 1997), good 142
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 results were obtained. Here, we discuss the use of the new method in generating an iris-code with various parameter optimizations and weightings to give further improved performance. 4.1 FEATURE EXTRACTION As in our Fourier-based iris coding work (Wildes 1997), we start from a general paradigm whereby the feature vectors will be derived from the zero crossings of the differences between 1D DCT coefficients calculated in rectangular image patches, as illustrated by Fig. 4. Averaging across the width of these patches with appropriate windowing helps to smooth the data and mitigate the effects of noise and other image artifacts. This then enables us to use a 1D DCT to code each patch along its length, giving low-computational cost. The selection of the values for the various parameters was done by extensive experimentation over the CASIA and Bath databases to obtain the best predicted Equal Error Rate (EER). The two data sets were used in their entirety to optimize the parameters of the method. Experimentally, overlapping patches gave the best EER in combination with the other parameters. It was also found that horizontally aligned patches worked best, and a rotation of 45 degrees was better than 0 degrees or 90 degrees. This distinctive feature of our code introduces a blend of radial and circumferential texture allowing variations in either or both directions to contribute to the iris code. To form image patches, we select bands of pixels along 45 degree lines through the image. A practical way of doing this is to slew each successive row of the image by one pixel compared to its predecessor. Patches are then selected in 11 overlapping horizontal bands as in Fig. 5. Each patch has eight pixels vertically (overlapping by four) and 12 horizontally (overlapping six). In the horizontal direction, a weighted average under a 1/4 Hanning window is formed. In effect, the resolution in the horizontal (iris circumferential) direction is reduced by this step. 143
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig:5. The various steps in forming feature vectors from normalized iris images Averaging across the width of the patch helps to reduce the degrading effects of noise and the use of broad patches makes for easier iris registration. In the vertical direction (45 degrees from the iris radial), eight pixels from each patch form a 1D patch vector, which is then windowed using a similar Hanning window prior to application of the DCT in order to reduce spectral leakage during the transform. The differences between the DCT coefficients of adjacent patch vectors are then calculated and a binary code is generated from their zero crossings. These 8-bit code fragments (codelets) are the basis of our matching process, but are further trimmed as described below. 4.2 MATCHING For comparing two iris codes, a nearest-neighbor approach is taken, where the distance between two feature vectors is measured using the product-of-sum (POS) of individual subfeature Hamming distances (HD). This can be defined as follows: Here, i consider the iris code as a rectangular block of Size M_ N,M being the number of bits per sub feature and N the total number of sub features in a feature vector. Fig:6. Normalized template iris image 144
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig:7. Encoded template iris image Corresponding sub feature bits are XORed and the resultant N-length vector is summed and normalized by dividing by N. This is done for all M sub feature bits and the geometric mean of these M sums give the normalized HD lying in the range of 0 to 1. For a perfect match, where every bit from Feature 1 matches with every corresponding bit of Feature 2, all M sums are 0 and so is the HD, while, for a total opposite, where every bit from the first Feature is reversed in the second, M N/Ns are obtained with a final HD of 1. Since a total bit reversal is highly unlikely, it is expected that a random pattern difference should produce an HD of around 0.5. While our previous approach [18] based the HD calculation on a weighted sum of EXOR-ed bits, the new POS method provides for better separation by skewing the matching distribution toward 0 and the non matching one toward 0.5.A side-effect of taking the geometric mean is that an identical match between any two corresponding sets of N sub feature bits will give an overall HD of 0 and, thus, a perfect match. Although this might seem radical, it is highly unlikely that all N bits, 713 in this case, will match identically for any two iris templates. Even if such a situation were to occur, it is very likely that both templates originated from the same class. Rotation invariance is achieved by storing six additional iris codes for three rotations on either side by horizontal (iris circumferential) shifts of 4, 8, and 12 pixels each way in the normalized images. During verification, the test iris code is compared against all seven stored ones and the minimum distance is chosen for each of the three separately enrolled images. These three minima are then averaged to give the matching HD. 145
  • 10. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig:8. False Accept and Reject distributions. Fig:9. Encoded Query iris image Same steps are applied on the query image as template iris image to get the encoded image of query iris image. After that matching is performed. If both iris images are same then it will show identical else non-identical. Both cases are shown in figure below. 146
  • 11. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig:10. Template and Query images both are same Fig:11.Template and Query images both are not same 5. Conclusion In this paper, I have described an approach to human iris recognition based on the 1D Discrete Cosine Transform (DCT), which supersedes our earlier work in this field (Wildes 1997). The work was motivated by the near-optimal de-correlating properties of the DCT compared to the Karhunen-Loeve transform, and the results achieved indicate 147
  • 12. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 the good performance of the approach in which there are no False Accepts/Rejects. The method as implemented also has low complexity, making it superior to the other methods evaluated in terms of both speed and accuracy. Acknowlegment The author would like to thank Dr.Abhay Kumar , Dr. Chanda Jha, Mr.Pranav Shankar, Mr. Deepak Kumar and Miss K.Jayanthi for their insightful advice and guidance, and unknown reviewers for their useful remarks and suggestions. References Ahmed.N, Natarajan.T, and Rao.K, “Discrete Cosine Transform,” IEEE Trans. Computers, vol. 23, pp. 90-93, 1974. Daugman.J and Downing.C “Epigenetic Randomness, Complexity, and Singularity of Human Iris Patterns,” Proc. Royal Soc. (London) B: Biological Sciences, vol. 268, pp. 1737-1740, 2001. Daugman.J, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, pp. 1148-1161, 1993. Daugman.J, “The Importance of Being Random: Statistical Principles of Iris Recognition,” Pattern Recognition, vol. 36, pp. 279-291, 2003. Daugman.J, “Statistical Richness of Visual Phase Information: Update on Recognizing Persons by Iris Patterns,” Int’l J. Computer Vision, vol. 45, pp. 25-38, 2001. Fukunaga.A.K, Introduction to Statistical Pattern Recognition, second ed. Academic Press Professional, Inc., 1990. Hafed.Z.H and Levine.M.D, “Face Recognition Using the Discrete Cosine Transform,” Int’l J. Computer Vision, vol. 43, pp. 167-188, 2001. Kronfeld.P, Gross Anatomy and Embryology of the Eye. Academic Press, 1962. Ma.L, Tan.T, Wang.Y, and Zhang.D, “Efficient Iris Recognition by Characterizing Key Local Variations,” IEEE Trans. Image Processing, vol. 13, pp. 739-750, 2004. Monro.D.M and Zhang.D, “An Effective Human Iris Code with Low Complexity,” Proc. IEEE Int’l Conf. Image Processing, vol. 3, no. 3, pp. 277-280, 2005. Newsome.D.A and Loewenfeld.I.E, “Iris Mechanics II: Influence of Pupil Size on Details of Iris Structure,” Am. J. Ophthalmology, vol. 71, pp. 553-573, 1971. Pratt.W.K, Digital Image Processing, second ed. John Wiley and Sons, 1991. Rao.K.R and Yip.P, Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic, 1990. Travieso.C.M, Alonso.J.B, and Ferrer.M.A, “Facial Identification Using Transformed Domain by SVM,” Proc. 38th Ann. Int’l Carnahan Conf. Security Technology, pp. 321-324, 2004. 148
  • 13. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Uenohara.U and Kanade.T, “Use of Fourier and Karhunen- Loeve Decomposition for Fast Pattern Matching with a Large Set of Templates,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, pp. 891-898, 1997. Vetterli.V, “Fast 2-D Discrete Cosine Transform,” Proc. IEEE Int’l Conf. Acoustics, Speech, and Signal Processing, pp. 1538-1541, 1985. Wildes.R.P, “Iris Recognition: An Emerging Biometric Technology,” Proc. IEEE, vol. 85, pp. 1348-1363, 1997. Wyatt.H.J, “A ‘Minimum-Wear-and-Tear’ Meshwork for the Iris,” Vision Research, vol. 40, pp. 2167-2176, 2000. Yonghong.Z, Lizhi.C, Guoan.B, and Kot.A.C, “Integer DCTs and Fast Algorithms,” IEEE Trans. Signal Processing, vol. 49, pp. 2774- 2782, 2001. 149