SlideShare a Scribd company logo
1 of 6
Download to read offline
The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 6 || Pages || 01-06 || 2014 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 1
An Analysis on Iris Segmentation Method for Non Ideal Iris
Images like off-axis angle and distance acquired
1,
Ibrahim Khaleelulla Khan , 2,
M.J Yogesh
1,
M.Tech Student Department of Computer Science, NIE Mysore
2,
Assistant Professor Department of Computer Science, NIE Mysore
Member, IEEE
-----------------------------------------------------ABSTRACT---------------------------------------------------
ABSTRACT: Iris segmentation is initial and crucial operation performed in iris recognition. The precise iris
segmentation is essential for the success of the iris recognition, and therefore the high performance for iris
recognition system. Most iris segmentation approaches proposed in the existing literature require iris images
taken in ideal conditions, which prevents their effective real-time applications and makes the system highly
sensitive to noise. This paper presents a fast and efficient iris segmentation methodology for iris images taken
in non-ideal conditions especially for off-axis iris images and distantly acquired images. First we describe the
procedure for segmenting off axis iris images next for distantly acquired images. Three major procedures
involved in the proposed iris segmentation approach, namely iris/pupil detection, boundary localization, and
Unwrapping, were carefully designed in order to avoid redundant and unnecessary image processing, and most
importantly, to protect the integrity of iris quality information. The iris images are taken from CASIA V4
database. As a consequence, the iris recognition system that incorporates the proposed iris segmentation
algorithm is capable of offering recognition performances comparable with those reported by other state-of-the-
art methods.
KEYWORDS: Iris segmentation, Off-axis, Non-ideal, distance, CASIA 4
--------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 03 June 2014 Date of Publication: 20 June 2014
--------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Human identification based on iris is becoming a famous tool rapidly as compared to other biometric
recognition techniques due to its unique epigenetic pattern remains stable [1]. The fast growth in the field of
image processing makes it very affordable and automated for digitized iris images. Evenly, the characterization
and classification spatial iris patterns help to recognize the individual comfortably. The cornea and the eyelid
act as a shield for the iris and protect it from adverse environmental effects. These in all inherent properties
makes iris recognition as the most suitably security solution [2]. The very first automated iris recognition
concept was given by Flom and Safir [3] in the year 1987 based on the fact that varying the illumination to
force pupil to a predetermined size to overcome with the problem of contraction and expansion of pupil. But
the imaging conditions they addressed were not that practical. Then the most widely used methodology was
developed by Daugman [4], has used multi-scale quadrature wavelets to extract texture phase features of the
iris to generate iris templates and compared the difference between a pair of those by computing their
Hamming distance (HD). Another popular iris recognition system developed in the same year was Wildes'
system [5] which also provides high accuracy. Wildes et al. have represented the iris pattern with a Laplacian
pyramid constructed with four different resolution levels and has used the normalized correlation to determine
whether the input image and the test image are from the same class. Later, Boles and Boashash [6] have used
1-D wavelet transform for calculating zero-crossing representation at various resolution levels of a virtual
circle on an iris image to characterize the texture of the iris. The current iris recognition techniques basically
comprise four main stages: segmentation, normalization, feature extraction and matching.The distance image
is an advantage in the identification of a human being over single eye images taken purposefully for iris
recognition based security systems. Distance iris recognition facilitates quicker and easily adoptable
recognition method. The advantages of employing recognition on the basis of two eyes are: (1) If the
recognition fails with one eye, then the recognition with the other eye can provide correct result. (2) The
An Analysis On Iris Segmentation Method…
www.theijes.com The IJES Page 2
recognition of a single person is done twice which provides the system an automatic verification for its output.
(3) It is especially advantageous in case when a single eye of a person becomes defective. The major problem
that is encountered while recognizing the iris images at distance is feature extraction. The features are not
extracted properly that may reflect to poor recognition. An Iris On The Move System [6] is described which
enables to capture iris images of sufficient quality for iris recognition while the subject is moving at a normal
walking pace through minimally confining portal. Similar attempts for iris recognition of distance image are
depicted in [8, 9]. In [8], the user can be identified from 10 metres if the head of the user stays fixed. In [9], a
multi biometric system is presented, designed to identify users at a distance of 6 metres. It is very well known
fact that the right and left irises of an individual are different and unique. It has been calculated that the
chance of finding two randomly formed identical irises is on an almost astronomical order of 1 in 1078. The
difference between the left and the right irises of the same person may be similar to the difference between the
irises captured from different persons. Both the irises have similar genetic relationship but textual details for
both the left and right iris are uncorrelated and independent. For example, an Afghan girl Sharbat Gula was
first photographed in 1984 and then in 2002. Iris codes were computed and matched for both the photographs
and it was observed that HD for left eye was 0.24 and for right eye was 0.31. It confirms that by the aging
effect too, the resemblance between both irises remains same and unique. In view to further strengthening of
the human identification, the new methodology is proposed in this manuscript for distance images and off axis
angle iris images.
II. EXISTING SYSTEM
Iris recognition has some advantages over other biometric modalities. For example, most iris patterns
are reported to remain unchanged over a life time, and they cannot be easily forged or modified. In addition,
every person has his/her own unique iris pattern with high degrees of freedom. Therefore, many biometric
researchers have used iris recognition for high confidence identification and this has led to extensive studies in
developing iris recognition techniques in unconstrained environments, where the probability of acquiring non-
ideal iris images is very high due to off-angles, noise, blurring and occlusion by eyelashes, eyelids, glasses, and
hair. Fig. 1 shows some examples of non-ideal iris images [1] but most of the previous research on iris
segmentation has focused on accurate detection with iris images which are captured in closely controlled
conditions. Thus, applying these methods to non-ideal iris images often yields incorrect segmentation results,
which deteriorates the recognition accuracy.
Figure 1: Non- ideal iris images.
The modern world has increasing demand for identification of human beings in widespread areas.
The biometrics can provide a natural and convenient means for individual identification by examining the
physical or behavioral traits of human beings(Jain, 2007). Among various biometrics identification
technologies, iris recognition has been of particular research interest because of the characteristics of
uniqueness, stability and non-invasiveness of iris(Daugman, 1993).In the past years, great advances have been
made in constrained environments where the users are closely cooperative. The state of the art iris recognition
techniques are reviewed by Bowyer et al. (2008). Recent research interest in the field has focused on
recognition in less constrained imaging conditions. In such circumstances the iris images captured may be
degraded due to off-axis imaging, image blurring, illumination variations, occlusion, specular highlights and
noise(Proenc¸a et al., 2010).Robust iris recognition in such degraded images pose a grand challenge. Daugman
(2007) reported some advances including accurate iris boundaries localization with active contour and image
registration through Fourier-based trigonometry, among others. Proenca and Alexandre (2007) investigated a
classification method which combines multiple signatures for noncooperative iris recognition.(Sun and
Tan,2009) presented a general framework for iris feature representation based on ordinal measure.
III. PROPOSED SYSTEM
The proposed model described below introduces iris segmentation for two different cases of iris in
non-ideal conditions. First, we give iris segmentation for Off-axis iris images. Second, for iris images acquired
in distance. As per our convenient the maximum distance considered here is dual Segmentation Technique
An Analysis On Iris Segmentation Method…
www.theijes.com The IJES Page 3
where the iris patterns of both left and right eye are used for better recognition performance, since both the
eyes carries distinguishable features which signifies its uniqueness. The most distinctive feature of this model
which makes it different from the existing model is that recognition doesn’t rely purely on one eye. Therefore,
if a person’s one eye fails to match, there is another opportunity through which person can be recognized. An
individual is recognized even if any of the two eyes matches. Since, recognition is performed for both the eyes,
the verification becomes undisputable. Both the eyes undergoes with the basic steps of an IRS(Iris Recognition
System) which is implemented using John Daugman’s and Libor masek’s iris recognition method [10] and
extends the study of eyes pattern for distance images. Matching is performed against the optimized HD value
computed. Optimized HD value is decided on the basis of various parameters that monitors recognition rate.
Figure 2: Proposed Architecture
An Iris Segmentation System for distant images and for off axis angle images comprises mainly five
stages- (1) Pre-Processing (2) Detect Eye Center (3) Segment Pupil(4) Segment Iris (5) Unwrap iris. The
processing for both left and right eye in case of distant images is similar which undergoes through stages 2 to5.
These stages are discussed in detail below:
3.1 Preprocessing
It is initial stage in iris segmentation which can lead to iris recognition. In this stage, an input eye
image of an individual is taken. As we concentrating on two subjects that is off-axis angle and distant iris
images. The Off axis iris images are those whose pupil is turned to some angle from axis. For our convenient
we are considering the off axis angle as less than 30 degrees. For second subject that is distant iris, the image
should provide an explicit view of left and right eye. The primary motive is to extract the left and right eye
from the input image. This can be performed through automatic cropping based on the manual distances
calculated from localized pupil. Figure 3 shows input (a) Off axis (b) distance image obtained from CASIA IV
database. Figure 4 shows the separated right and left eye from the input image for distant iris image.
Figure 3: (a) Off axis angle (b) Iris at distance
Figure 4: Cropped Left and Right eye from sample images
An Analysis On Iris Segmentation Method…
www.theijes.com The IJES Page 4
3.2 Detect Eye Center
The next step is to detect the eye center. To detect Eye Center we apply Active Contour model .The
basic idea of active contour models relies on detecting salient objects by evolving a curve or a surface subject to
image based constraints. Let 2 Rd be the image domain and I : ! R be a given image function. In [9], Mumford
and Shah proposed an energy functional to be minimized by a suitable contour C in for image segmentation.
𝐸 (1)
(2)
where Г (C) is a regularization function for the contour C andλ is a non-negative constant weight. Minimizing
the above energy function E results in an optimal contour that segments the image into a piecewise smooth
image I that approximates the original image I0. In [6] Chan and Vese proposed an active contour model for
segmenting images containing objects that have poor boundaries by proposing to minimize the following
piecewise constant approximation to the Mumford and Shah energy function, where in and out represents the
region inside and outside the contour C and λ1 and λ2 are two scalar constants that approximate the image
intensities inside and outside the contour respectively. The first two terms seek to separate an image into two
regions of constant image intensities. This minimization problem is converted into a level-set evolution
equation by using a level set formulation. Due to its lack of explicit dependence on gradient or edge
information, this model is very well suited to detect objects whose boundaries are not necessarily defined by
gradients or with very smooth boundaries. We aim to leverage this property of the Chan-Vese technique to
segment blurred out and low-contrast iris images.
Figure 5: Detected eye center.
3.3 Segmentation of pupil/Iris
The segmentation stage detects the pupillary and limbus boundaries to isolate the iris region from an
input eye image. It also identifies regions where the eyelids and eyelashes interrupt the limbus boundary’s
contour. It is implemented using circular Hough Transform. Hough transform for limbus boundary was
performed first then for pupillary boundary to reduce the search area.
Step 1: Apply Canny edge detection to the input image resulting in an edge map.
Step 2: Vertical gradient is taken for iris/sclera boundary.
Step 3: Compute horizontal as well as vertical gradient for iris/pupil boundary.
Step 4: Choose in the Hough space using the resultant edge map, the radius and centre coordinates of the circle
which is the corresponding to the maximum point in the Hough space. Circle parameters define the circle as
follows:
xc + yc - r2
= 0 (5)
Steps taken For Eyelid Isolation:
1. A line is fitted to the upper and lower eye lid using linear Hough transform.
2. The second horizontal line is drawn in such a way that intersects the first line at the iris edges which is
closest to the pupil. For eyelashes isolation, thresholding technique was adopted from the perception that the
eye lashes are the darkest region of an eye. Different thresholding values were chosen for left and right eye.
Figure 6: Segmented Left and Right eye from sample images
An Analysis On Iris Segmentation Method…
www.theijes.com The IJES Page 5
IV. UNWRAPPING
Once the iris region is segmented, the next stage is to Unwrap, to enable generation of the iris code
and their comparisons. Since there is always variations in the eye, like change in optical size of the iris,
position of pupil in the iris, and the iris orientation change to individual person, it is required to normalize the
iris image, so that the representation is common to all, with related dimensions. Normalization process
involves unwrapping the iris and converting it into its polar equivalent. It is done using Daugman’s Rubber
sheet model [10]. The center of the pupil is considered as the reference point and a remapping formula is used
to convert the points on the Cartesian scale to the polar scale. The Normalization algorithm remaps each point
within the iris region to a pair of polar coordinates (r, θ) where r is on the interval [0,1] and θ is angle [0,2π].
Figure 7: Normalization process
The radial resolution was set to 100 and the angular resolution to 2400 pixels. For every pixel in the iris, an
equivalent position is found out on polar axes. The normalized image was then interpolated into the size of the
original image, by using the interp2 function. The parts in the normalized image which yield a NaN, are
divided by the sum to get a normalized value.
Figure 8: Unwrapping the iris
V. CONCLUSION
Recognition of humans from their iris patterns under very harsh imaging conditions is a challenging
task. Accurate iris segmentation is the main bottleneck to improved iris recognition under these conditions. In
this paper we proposed a region based active contour segmentation algorithm which is more suited to segment
iris regions under difficult imaging scenarios. A new iris segmentation method for non-ideal iris images has
been proposed, especially for off-axis iris images and distantly acquired images. A unified method is proposed
for step by step to recognition of iris images taken in for non-ideal environment. We introduce a robust
algorithm for localizing the outer iris boundary, This solves the non-circular boundary localization problem
induced by the off-axis imaging or pose variation. Iris images taken from a distance of 6 meters are recognized
which can be implemented in real time applications where objects are far from the camera.
REFERENCES
[1] R. Wildes. Iris recognition: an emerging biometric technology. Proceedings IEEE, Vol. 85, No. 9, 1997.
[2] Y. Zhu, T. Tan, Y. Wang. Biometric personal identification based on iris patterns. Proceedings of the 15th International Conference on
Pattern Recognition, Spain, Vol. 2, 2000.
[3] L. Flom and A. Safir: Iris Recognition System. U.S. Patent No.4641394 (1987)
[4] J. Daugman. Biometric personal identification system based on iris analysis. United States Patent, Patent Number: 5,291,560, 1994.
[5] R. Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride. A system for automated iris recognition. Proceedings
IEEE Workshop on Applications of Computer Vision, Sarasota, FL, pp. 121-128, 1994.
[6] W.W. Boles, B. Boashah: A Human Identification Technique Using Images of the Iris and Wavelet Transform. IEEE Transaction on
Signal Processing Vol. 46, 1185-1188, 1998.
An Analysis On Iris Segmentation Method…
www.theijes.com The IJES Page 6
[7] J. R. Matey, et al., "Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments," Proceedings of the
IEEE, vol. 94, pp. 1936-1947, 2006.
[8] C. Fancourt, et al., "Iris recognition at a distance," in Audio and Video Based Biometric Person Authentication, Proceedings. vol. 3546,
T. Kanade, et al., Eds., ed Berlin: Springer-Verlag Berlin, 2005, pp. 1-13.
[9] F. Bashir, et al., "Eagle-Eyes: A System for Iris Recognition at a Distance," in Technologies for Homeland Security, 2008 IEEE
Conference on, 2008, pp. 426-431.
[10] Libor Masek. Recognition of human iris patterns for biometric identification. Master’s thesis, University of Western Australia, 2003.
Available from: http://www.csse.uwa.edu.au/$pk/studentprojects/libor/.

More Related Content

What's hot

IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 
A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaDrishty Sharma
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Retinal Pattern Recognition
Retinal Pattern RecognitionRetinal Pattern Recognition
Retinal Pattern Recognitionhiratufail
 
3D Facial Imagining /certified fixed orthodontic courses by Indian dental aca...
3D Facial Imagining /certified fixed orthodontic courses by Indian dental aca...3D Facial Imagining /certified fixed orthodontic courses by Indian dental aca...
3D Facial Imagining /certified fixed orthodontic courses by Indian dental aca...Indian dental academy
 
Three-dimensional imaging techniques: A literature review By; Orhan Hakki Ka...
Three-dimensional imaging techniques: A literature review  By; Orhan Hakki Ka...Three-dimensional imaging techniques: A literature review  By; Orhan Hakki Ka...
Three-dimensional imaging techniques: A literature review By; Orhan Hakki Ka...Dr. Yahya Alogaibi
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...IRJET Journal
 

What's hot (20)

IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Retinal Pattern Recognition
Retinal Pattern RecognitionRetinal Pattern Recognition
Retinal Pattern Recognition
 
G01114650
G01114650G01114650
G01114650
 
3D Facial Imagining /certified fixed orthodontic courses by Indian dental aca...
3D Facial Imagining /certified fixed orthodontic courses by Indian dental aca...3D Facial Imagining /certified fixed orthodontic courses by Indian dental aca...
3D Facial Imagining /certified fixed orthodontic courses by Indian dental aca...
 
Three-dimensional imaging techniques: A literature review By; Orhan Hakki Ka...
Three-dimensional imaging techniques: A literature review  By; Orhan Hakki Ka...Three-dimensional imaging techniques: A literature review  By; Orhan Hakki Ka...
Three-dimensional imaging techniques: A literature review By; Orhan Hakki Ka...
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
IJET-V2I6P21
IJET-V2I6P21IJET-V2I6P21
IJET-V2I6P21
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
PAPER2
PAPER2PAPER2
PAPER2
 
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Ijetcas14 523
Ijetcas14 523Ijetcas14 523
Ijetcas14 523
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 

Viewers also liked

O03640900101
O03640900101O03640900101
O03640900101theijes
 
G0373049057
G0373049057G0373049057
G0373049057theijes
 
A0363001009
A0363001009A0363001009
A0363001009theijes
 
F0363046051
F0363046051F0363046051
F0363046051theijes
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
H0362053057
H0362053057H0362053057
H0362053057theijes
 
F0366041045
F0366041045F0366041045
F0366041045theijes
 
J0371055062
J0371055062J0371055062
J0371055062theijes
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Sciencetheijes
 
I0373072083
I0373072083I0373072083
I0373072083theijes
 
D0363022039
D0363022039D0363022039
D0363022039theijes
 
P036401020107
P036401020107P036401020107
P036401020107theijes
 
C0373013023
C0373013023C0373013023
C0373013023theijes
 
J0364057060
J0364057060J0364057060
J0364057060theijes
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Sciencetheijes
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Sciencetheijes
 

Viewers also liked (18)

O03640900101
O03640900101O03640900101
O03640900101
 
G0373049057
G0373049057G0373049057
G0373049057
 
A0363001009
A0363001009A0363001009
A0363001009
 
F0363046051
F0363046051F0363046051
F0363046051
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
H0362053057
H0362053057H0362053057
H0362053057
 
F0366041045
F0366041045F0366041045
F0366041045
 
J0371055062
J0371055062J0371055062
J0371055062
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Science
 
I0373072083
I0373072083I0373072083
I0373072083
 
D0363022039
D0363022039D0363022039
D0363022039
 
P036401020107
P036401020107P036401020107
P036401020107
 
C0373013023
C0373013023C0373013023
C0373013023
 
J0364057060
J0364057060J0364057060
J0364057060
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Science
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Science
 

Similar to A03640106

EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsijcseit
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a surveyIJMER
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsEditor IJMTER
 
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
 
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET Journal
 
Enhance iris segmentation method for person recognition based on image proces...
Enhance iris segmentation method for person recognition based on image proces...Enhance iris segmentation method for person recognition based on image proces...
Enhance iris segmentation method for person recognition based on image proces...TELKOMNIKA JOURNAL
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkijcsit
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique ijsc
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Techniqueijsc
 

Similar to A03640106 (20)

EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditions
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a survey
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition Systems
 
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
 
Enhance iris segmentation method for person recognition based on image proces...
Enhance iris segmentation method for person recognition based on image proces...Enhance iris segmentation method for person recognition based on image proces...
Enhance iris segmentation method for person recognition based on image proces...
 
K0966468
K0966468K0966468
K0966468
 
237 240
237 240237 240
237 240
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Ijetcas14 315
Ijetcas14 315Ijetcas14 315
Ijetcas14 315
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
A045010107
A045010107A045010107
A045010107
 

Recently uploaded

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 

Recently uploaded (20)

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 

A03640106

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 3 || Issue || 6 || Pages || 01-06 || 2014 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 1 An Analysis on Iris Segmentation Method for Non Ideal Iris Images like off-axis angle and distance acquired 1, Ibrahim Khaleelulla Khan , 2, M.J Yogesh 1, M.Tech Student Department of Computer Science, NIE Mysore 2, Assistant Professor Department of Computer Science, NIE Mysore Member, IEEE -----------------------------------------------------ABSTRACT--------------------------------------------------- ABSTRACT: Iris segmentation is initial and crucial operation performed in iris recognition. The precise iris segmentation is essential for the success of the iris recognition, and therefore the high performance for iris recognition system. Most iris segmentation approaches proposed in the existing literature require iris images taken in ideal conditions, which prevents their effective real-time applications and makes the system highly sensitive to noise. This paper presents a fast and efficient iris segmentation methodology for iris images taken in non-ideal conditions especially for off-axis iris images and distantly acquired images. First we describe the procedure for segmenting off axis iris images next for distantly acquired images. Three major procedures involved in the proposed iris segmentation approach, namely iris/pupil detection, boundary localization, and Unwrapping, were carefully designed in order to avoid redundant and unnecessary image processing, and most importantly, to protect the integrity of iris quality information. The iris images are taken from CASIA V4 database. As a consequence, the iris recognition system that incorporates the proposed iris segmentation algorithm is capable of offering recognition performances comparable with those reported by other state-of-the- art methods. KEYWORDS: Iris segmentation, Off-axis, Non-ideal, distance, CASIA 4 -------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 03 June 2014 Date of Publication: 20 June 2014 -------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Human identification based on iris is becoming a famous tool rapidly as compared to other biometric recognition techniques due to its unique epigenetic pattern remains stable [1]. The fast growth in the field of image processing makes it very affordable and automated for digitized iris images. Evenly, the characterization and classification spatial iris patterns help to recognize the individual comfortably. The cornea and the eyelid act as a shield for the iris and protect it from adverse environmental effects. These in all inherent properties makes iris recognition as the most suitably security solution [2]. The very first automated iris recognition concept was given by Flom and Safir [3] in the year 1987 based on the fact that varying the illumination to force pupil to a predetermined size to overcome with the problem of contraction and expansion of pupil. But the imaging conditions they addressed were not that practical. Then the most widely used methodology was developed by Daugman [4], has used multi-scale quadrature wavelets to extract texture phase features of the iris to generate iris templates and compared the difference between a pair of those by computing their Hamming distance (HD). Another popular iris recognition system developed in the same year was Wildes' system [5] which also provides high accuracy. Wildes et al. have represented the iris pattern with a Laplacian pyramid constructed with four different resolution levels and has used the normalized correlation to determine whether the input image and the test image are from the same class. Later, Boles and Boashash [6] have used 1-D wavelet transform for calculating zero-crossing representation at various resolution levels of a virtual circle on an iris image to characterize the texture of the iris. The current iris recognition techniques basically comprise four main stages: segmentation, normalization, feature extraction and matching.The distance image is an advantage in the identification of a human being over single eye images taken purposefully for iris recognition based security systems. Distance iris recognition facilitates quicker and easily adoptable recognition method. The advantages of employing recognition on the basis of two eyes are: (1) If the recognition fails with one eye, then the recognition with the other eye can provide correct result. (2) The
  • 2. An Analysis On Iris Segmentation Method… www.theijes.com The IJES Page 2 recognition of a single person is done twice which provides the system an automatic verification for its output. (3) It is especially advantageous in case when a single eye of a person becomes defective. The major problem that is encountered while recognizing the iris images at distance is feature extraction. The features are not extracted properly that may reflect to poor recognition. An Iris On The Move System [6] is described which enables to capture iris images of sufficient quality for iris recognition while the subject is moving at a normal walking pace through minimally confining portal. Similar attempts for iris recognition of distance image are depicted in [8, 9]. In [8], the user can be identified from 10 metres if the head of the user stays fixed. In [9], a multi biometric system is presented, designed to identify users at a distance of 6 metres. It is very well known fact that the right and left irises of an individual are different and unique. It has been calculated that the chance of finding two randomly formed identical irises is on an almost astronomical order of 1 in 1078. The difference between the left and the right irises of the same person may be similar to the difference between the irises captured from different persons. Both the irises have similar genetic relationship but textual details for both the left and right iris are uncorrelated and independent. For example, an Afghan girl Sharbat Gula was first photographed in 1984 and then in 2002. Iris codes were computed and matched for both the photographs and it was observed that HD for left eye was 0.24 and for right eye was 0.31. It confirms that by the aging effect too, the resemblance between both irises remains same and unique. In view to further strengthening of the human identification, the new methodology is proposed in this manuscript for distance images and off axis angle iris images. II. EXISTING SYSTEM Iris recognition has some advantages over other biometric modalities. For example, most iris patterns are reported to remain unchanged over a life time, and they cannot be easily forged or modified. In addition, every person has his/her own unique iris pattern with high degrees of freedom. Therefore, many biometric researchers have used iris recognition for high confidence identification and this has led to extensive studies in developing iris recognition techniques in unconstrained environments, where the probability of acquiring non- ideal iris images is very high due to off-angles, noise, blurring and occlusion by eyelashes, eyelids, glasses, and hair. Fig. 1 shows some examples of non-ideal iris images [1] but most of the previous research on iris segmentation has focused on accurate detection with iris images which are captured in closely controlled conditions. Thus, applying these methods to non-ideal iris images often yields incorrect segmentation results, which deteriorates the recognition accuracy. Figure 1: Non- ideal iris images. The modern world has increasing demand for identification of human beings in widespread areas. The biometrics can provide a natural and convenient means for individual identification by examining the physical or behavioral traits of human beings(Jain, 2007). Among various biometrics identification technologies, iris recognition has been of particular research interest because of the characteristics of uniqueness, stability and non-invasiveness of iris(Daugman, 1993).In the past years, great advances have been made in constrained environments where the users are closely cooperative. The state of the art iris recognition techniques are reviewed by Bowyer et al. (2008). Recent research interest in the field has focused on recognition in less constrained imaging conditions. In such circumstances the iris images captured may be degraded due to off-axis imaging, image blurring, illumination variations, occlusion, specular highlights and noise(Proenc¸a et al., 2010).Robust iris recognition in such degraded images pose a grand challenge. Daugman (2007) reported some advances including accurate iris boundaries localization with active contour and image registration through Fourier-based trigonometry, among others. Proenca and Alexandre (2007) investigated a classification method which combines multiple signatures for noncooperative iris recognition.(Sun and Tan,2009) presented a general framework for iris feature representation based on ordinal measure. III. PROPOSED SYSTEM The proposed model described below introduces iris segmentation for two different cases of iris in non-ideal conditions. First, we give iris segmentation for Off-axis iris images. Second, for iris images acquired in distance. As per our convenient the maximum distance considered here is dual Segmentation Technique
  • 3. An Analysis On Iris Segmentation Method… www.theijes.com The IJES Page 3 where the iris patterns of both left and right eye are used for better recognition performance, since both the eyes carries distinguishable features which signifies its uniqueness. The most distinctive feature of this model which makes it different from the existing model is that recognition doesn’t rely purely on one eye. Therefore, if a person’s one eye fails to match, there is another opportunity through which person can be recognized. An individual is recognized even if any of the two eyes matches. Since, recognition is performed for both the eyes, the verification becomes undisputable. Both the eyes undergoes with the basic steps of an IRS(Iris Recognition System) which is implemented using John Daugman’s and Libor masek’s iris recognition method [10] and extends the study of eyes pattern for distance images. Matching is performed against the optimized HD value computed. Optimized HD value is decided on the basis of various parameters that monitors recognition rate. Figure 2: Proposed Architecture An Iris Segmentation System for distant images and for off axis angle images comprises mainly five stages- (1) Pre-Processing (2) Detect Eye Center (3) Segment Pupil(4) Segment Iris (5) Unwrap iris. The processing for both left and right eye in case of distant images is similar which undergoes through stages 2 to5. These stages are discussed in detail below: 3.1 Preprocessing It is initial stage in iris segmentation which can lead to iris recognition. In this stage, an input eye image of an individual is taken. As we concentrating on two subjects that is off-axis angle and distant iris images. The Off axis iris images are those whose pupil is turned to some angle from axis. For our convenient we are considering the off axis angle as less than 30 degrees. For second subject that is distant iris, the image should provide an explicit view of left and right eye. The primary motive is to extract the left and right eye from the input image. This can be performed through automatic cropping based on the manual distances calculated from localized pupil. Figure 3 shows input (a) Off axis (b) distance image obtained from CASIA IV database. Figure 4 shows the separated right and left eye from the input image for distant iris image. Figure 3: (a) Off axis angle (b) Iris at distance Figure 4: Cropped Left and Right eye from sample images
  • 4. An Analysis On Iris Segmentation Method… www.theijes.com The IJES Page 4 3.2 Detect Eye Center The next step is to detect the eye center. To detect Eye Center we apply Active Contour model .The basic idea of active contour models relies on detecting salient objects by evolving a curve or a surface subject to image based constraints. Let 2 Rd be the image domain and I : ! R be a given image function. In [9], Mumford and Shah proposed an energy functional to be minimized by a suitable contour C in for image segmentation. 𝐸 (1) (2) where Г (C) is a regularization function for the contour C andλ is a non-negative constant weight. Minimizing the above energy function E results in an optimal contour that segments the image into a piecewise smooth image I that approximates the original image I0. In [6] Chan and Vese proposed an active contour model for segmenting images containing objects that have poor boundaries by proposing to minimize the following piecewise constant approximation to the Mumford and Shah energy function, where in and out represents the region inside and outside the contour C and λ1 and λ2 are two scalar constants that approximate the image intensities inside and outside the contour respectively. The first two terms seek to separate an image into two regions of constant image intensities. This minimization problem is converted into a level-set evolution equation by using a level set formulation. Due to its lack of explicit dependence on gradient or edge information, this model is very well suited to detect objects whose boundaries are not necessarily defined by gradients or with very smooth boundaries. We aim to leverage this property of the Chan-Vese technique to segment blurred out and low-contrast iris images. Figure 5: Detected eye center. 3.3 Segmentation of pupil/Iris The segmentation stage detects the pupillary and limbus boundaries to isolate the iris region from an input eye image. It also identifies regions where the eyelids and eyelashes interrupt the limbus boundary’s contour. It is implemented using circular Hough Transform. Hough transform for limbus boundary was performed first then for pupillary boundary to reduce the search area. Step 1: Apply Canny edge detection to the input image resulting in an edge map. Step 2: Vertical gradient is taken for iris/sclera boundary. Step 3: Compute horizontal as well as vertical gradient for iris/pupil boundary. Step 4: Choose in the Hough space using the resultant edge map, the radius and centre coordinates of the circle which is the corresponding to the maximum point in the Hough space. Circle parameters define the circle as follows: xc + yc - r2 = 0 (5) Steps taken For Eyelid Isolation: 1. A line is fitted to the upper and lower eye lid using linear Hough transform. 2. The second horizontal line is drawn in such a way that intersects the first line at the iris edges which is closest to the pupil. For eyelashes isolation, thresholding technique was adopted from the perception that the eye lashes are the darkest region of an eye. Different thresholding values were chosen for left and right eye. Figure 6: Segmented Left and Right eye from sample images
  • 5. An Analysis On Iris Segmentation Method… www.theijes.com The IJES Page 5 IV. UNWRAPPING Once the iris region is segmented, the next stage is to Unwrap, to enable generation of the iris code and their comparisons. Since there is always variations in the eye, like change in optical size of the iris, position of pupil in the iris, and the iris orientation change to individual person, it is required to normalize the iris image, so that the representation is common to all, with related dimensions. Normalization process involves unwrapping the iris and converting it into its polar equivalent. It is done using Daugman’s Rubber sheet model [10]. The center of the pupil is considered as the reference point and a remapping formula is used to convert the points on the Cartesian scale to the polar scale. The Normalization algorithm remaps each point within the iris region to a pair of polar coordinates (r, θ) where r is on the interval [0,1] and θ is angle [0,2π]. Figure 7: Normalization process The radial resolution was set to 100 and the angular resolution to 2400 pixels. For every pixel in the iris, an equivalent position is found out on polar axes. The normalized image was then interpolated into the size of the original image, by using the interp2 function. The parts in the normalized image which yield a NaN, are divided by the sum to get a normalized value. Figure 8: Unwrapping the iris V. CONCLUSION Recognition of humans from their iris patterns under very harsh imaging conditions is a challenging task. Accurate iris segmentation is the main bottleneck to improved iris recognition under these conditions. In this paper we proposed a region based active contour segmentation algorithm which is more suited to segment iris regions under difficult imaging scenarios. A new iris segmentation method for non-ideal iris images has been proposed, especially for off-axis iris images and distantly acquired images. A unified method is proposed for step by step to recognition of iris images taken in for non-ideal environment. We introduce a robust algorithm for localizing the outer iris boundary, This solves the non-circular boundary localization problem induced by the off-axis imaging or pose variation. Iris images taken from a distance of 6 meters are recognized which can be implemented in real time applications where objects are far from the camera. REFERENCES [1] R. Wildes. Iris recognition: an emerging biometric technology. Proceedings IEEE, Vol. 85, No. 9, 1997. [2] Y. Zhu, T. Tan, Y. Wang. Biometric personal identification based on iris patterns. Proceedings of the 15th International Conference on Pattern Recognition, Spain, Vol. 2, 2000. [3] L. Flom and A. Safir: Iris Recognition System. U.S. Patent No.4641394 (1987) [4] J. Daugman. Biometric personal identification system based on iris analysis. United States Patent, Patent Number: 5,291,560, 1994. [5] R. Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride. A system for automated iris recognition. Proceedings IEEE Workshop on Applications of Computer Vision, Sarasota, FL, pp. 121-128, 1994. [6] W.W. Boles, B. Boashah: A Human Identification Technique Using Images of the Iris and Wavelet Transform. IEEE Transaction on Signal Processing Vol. 46, 1185-1188, 1998.
  • 6. An Analysis On Iris Segmentation Method… www.theijes.com The IJES Page 6 [7] J. R. Matey, et al., "Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments," Proceedings of the IEEE, vol. 94, pp. 1936-1947, 2006. [8] C. Fancourt, et al., "Iris recognition at a distance," in Audio and Video Based Biometric Person Authentication, Proceedings. vol. 3546, T. Kanade, et al., Eds., ed Berlin: Springer-Verlag Berlin, 2005, pp. 1-13. [9] F. Bashir, et al., "Eagle-Eyes: A System for Iris Recognition at a Distance," in Technologies for Homeland Security, 2008 IEEE Conference on, 2008, pp. 426-431. [10] Libor Masek. Recognition of human iris patterns for biometric identification. Master’s thesis, University of Western Australia, 2003. Available from: http://www.csse.uwa.edu.au/$pk/studentprojects/libor/.