SlideShare a Scribd company logo
1 of 9
Download to read offline
Computer Science and Information Technologies
Vol. 1, No. 3, November 2020, pp. 126~134
ISSN: 2722-3221, DOI: 10.11591/csit.v1i3.p126-134  126
Journal homepage: http://iaesprime.com/index.php/csit
An optimized rubber sheet model for normalization phase of
iris recognition
Selvamuthukumaran.S1
, Ramkumar.T2
, Shantharajah SP3
1
Faculty of Computer Applications, AVC College of Engineering, India
2,3
School of Information Technology and Engineering, VIT University, India
Article Info ABSTRACT
Article history:
Received Jan 23, 2020
Revised May 27, 2020
Accepted Jun 16, 2020
Iris recognition is a promising biometric authentication approach and it is a
very active topic in both research and realistic applications because the pattern
of the human iris differs from person to person, even between twins. In this
paper, an optimized iris normalization method for the conversion of segmented
image into normalized form has been proposed. The existing methods are
converting the Cartesian coordinates of the segmented image into polar
coordinates. To get more accuracy, the proposed method is using an optimized
rubber sheet model which converts the polar coordinates into spherical
coordinates followed by localized histogram equalization. The experimental
result shows the proposed method scores an encouraging performance with
respect to accuracy.
Keywords:
Biometrics
Histogram equalization
Iris normalization
Iris recognition
Spherical coordinates This is an open access article under the CC BY-SA license.
Corresponding Author:
Selvamuthukumaran.S,
Faculty of Computer Applications,
AVC College of Engineering, India.
Email: smksmk@gmail.com
1. INTRODUCTION
The progressive digital society demands secure identification techniques for the development of
biometric system in diverse fields [1]. The iris biometric systems are becoming commonly implemented as one
of the best ways to certainly identify people [2]. The iris is an outwardly and colourful organ close the pupil of
the eye [3]. Figure 1 shown the structure of the eye, which demonstrates the exact position of the iris and its
surrounding things. The property of the iris guarantees that even equal twins have uncorrelated iris details.
Thus, the exclusivity of every iris, including the couple possessed by single individual, parallels the exclusivity
of every fingerprint regardless of whether there is a common genome [4, 5]. The iris involves of several
irregular small blocks similar to freckles, stripes, furrows, coronas, etc. In addition, the texture divisions in the
iris are arbitrary. The separate merits of the iris cause its high consistency for individual identification [6].
Hence the method of iris identification becomes an exciting research point in current years [7]. The first step
in iris recognition is the process of capturing the image of an eye [8]. During stage of the image acquisition, a
camera is used to record iris textures. The captured image is further processed for the localization stage, where
the location of the iris is carried out, followed by the segmentation phase. In segmentation, irises are separated
from the eye [6]. Next to this, a normalization of the iris image is done using various noise removal techniques,
and the images are stored in the binary format [9]. The process of the iris recognition system continues with
the feature extraction stage, where the extractions of various features of irises are identified [10]. In verification
process, matching will be done where the acquired image is compared with the images stored in the database
[11]. A typical iris recognition system which includes above stages is shown in the Figure 2.
Comput. Sci. Inf. Technol. 
An optimized rubber sheet model for normalization phase of iris recognition… (Selvamuthukumaran.S)
127
Figure 1. Structure of an eye
Figure 2. Iris recognition system
In the phase of normalization, segmented iris image has been prepared for the feature extraction
process. Though, several of algorithms [1, 5, 11] are available for the normalization phase of the iris
recognition, Daugman [12] and Wildes [13] algorithms are significant. To compensate the differences in the
magnitude of the pupil, Daugman [12] proposed a rubber sheet model for normalization. In this way, some of
the irises still may be sealed by eyelids or eyelashes, even when the inner and outer boundaries of the iris are
reached. Wildes’ system is a patent of the iris recognition system which employes the gradient-based Hough
transform to choose the two circular boundaries of an iris. It has big computational charge, since it examinates
among all of the possible candidates. Besides, the algorithm’s accuracy significantly deteriorates while dealing
with the noisy data. The above two normalization techniques transform Cartesian coordinates in to polar
coordinates for un-wrapping the iris texture into a fixed size rectangular block. In polar coordinates, the
distance and angular position have extremely affected iris images with respect to the camera. Additionally,
illumination has a direct influence on the pupil size and sources non-linear distinctions of the iris patterns [14].
Moreover, the pupil boundary and limbus boundary are usually two non-concentric contours. The
non-concentric condition leads to different choices of reference points for transforming an iris into polar
coordinates, which is not suitable for iris images with more noise. Hence, it is necessary to adopt an
optimization technique for transforming the iris image to compensate these variations. In this paper, we have
proposed an optimized normalization technique based on rubber sheet model which converts Cartesian
coordinates into spherical coordinates instead of polar coordinates and perform localized histogram
equalization for further accuracy. The rest of the paper has been organized as follows; in section 2, the
improvised model for iris normalization has been illustrated with the inclusive steps. The experimental
investigations of the proposed work with the help of CASIA database [15] is explained in section 3, where
concluding remarks and feature research directions are summarized in section 4.
2. AN OPTIMIZED RUBBER SHEET MODEL FOR IRIS NORMALIZATION
The normalization stage aims to gain invariance to size, position and pupil dilatation in the segmented
iris region. Most of the methods use Daugman [12] rubber sheet model considers the possibility of pupil dilation
and the appearance of different sizes in different images. For this purpose, the coordinate system is altered by
un-wrapping the iris and plotting all the points within the edge of the iris into their polar coordinates. The
Cartesian to polar transformation is defined for the continuous form of images. However, in the discrete form,
 ISSN: 2722-3221
Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 126 – 134
128
the transformation encounters problems in which the polar samples do not entirely match the Cartesian samples
which results in excessive interpolation and in some cases loss of information would be the result. The proposed
method is the improvised method of Daugman’s rubber sheet model and it improves the accuracy by advocating
a two-step process. At First, the coordinate system of the iris region is converted from Cartesian into the
spherical. Then, the remapping process is done for the normalization. Localized histogram equalization is
applied on the iris region for further normalization. The various inclusive stages of the proposed work are
illustrated in the Figure 3.
Figure 3. Flowchart of proposed work
2.1. Conversion of cartesian coordinates into spherical coordinates
In the spherical coordinate system, the position of a point is specified by three coordinates; (𝑟𝑟, 𝜃𝜃, 𝜑𝜑)
where ‘𝑟𝑟’ is the radial distance from a fixed origin, ‘𝜃𝜃’ is the elevation angle of that point from a plane, and
‘𝜑𝜑’ is the azimuth angle of its orthogonal projection on that plane from a fixed direction. The elevation angle
is often replaced by the inclination angle measured from the azimuth; the direction perpendicular to the
reference plane. The radial distance is also named the radius or radial coordinate and the inclination is named
as colatitude. The coordinate conversion is represented in Figure 4. During co-ordinate conversion, the centre
of the pupil is considered as location point and the radial vector circle has been considered in the iris region.
The coordinate conversion is performed to obtain the invariance of iris size, position and different degrees of
pupil dilation. It produces the iris regions, which have the same constant dimensions, with the intention that
two images of the same iris should have characteristic features under different conditions at the same spatial
place. The proposed technique is useful in bringing iris images into a standard fixed resolution, which simplifies
the feature extraction process. In the adjusted rubber sheet model, the centre of the pupil is used as the reference
point; and the radial and azimuth vectors cross the iris region. The spherical coordinates, (𝑟𝑟, 𝜃𝜃, 𝜑𝜑) of a point
can be obtained from its Cartesian coordinates, (𝑥𝑥, 𝑦𝑦, 𝑧𝑧) by the following equations.
Comput. Sci. Inf. Technol. 
An optimized rubber sheet model for normalization phase of iris recognition… (Selvamuthukumaran.S)
129
Figure 4. Coordinate conversion
𝑟𝑟 = �𝑥𝑥2 + 𝑦𝑦2 + 𝑧𝑧2 (1)
𝜑𝜑 = 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 (𝑦𝑦, 𝑥𝑥) (2)
𝜃𝜃 = 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 �
𝑥𝑥
�𝑥𝑥2+𝑦𝑦2
� (3)
Where 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 (𝑦𝑦, 𝑥𝑥) is a variant of the arctangent function that returns the angle from the 𝑥𝑥-axis to the
vector (𝑥𝑥, 𝑦𝑦) in the full range(−𝜋𝜋, 𝜋𝜋). The formulas assume that the two systems have the origin, then the
spherical reference plane is the Cartesian ′𝑥𝑥 − 𝑦𝑦′ plan ‘𝜃𝜃’ is the inclination from the ′𝑧𝑧′
direction and the
azimuth angles are measured using the coordinates. After converting the data points of the iris region into
spherical coordinates, remapping has been done to rescale the points on the angle around the inner and outer
boundaries. The remapping of the iris region from ′(𝑥𝑥, 𝑦𝑦, 𝑧𝑧)′, the Cartesian coordinates to the normalised
spherical representation can be modelled as in the following equation.
𝐼𝐼(𝑥𝑥(𝑟𝑟, 𝜃𝜃, 𝜑𝜑),𝑦𝑦(𝑟𝑟, 𝜃𝜃, 𝜑𝜑), 𝑧𝑧(𝑟𝑟, 𝜃𝜃, 𝜑𝜑)) = 𝐼𝐼(𝑟𝑟, 𝜃𝜃, 𝜑𝜑) (4)
Where ′𝐼𝐼(𝑥𝑥, 𝑦𝑦, 𝑧𝑧)′ is the iris region image, ‘(x,y,z)’ are the original Cartesian coordinates, and
‘(𝑟𝑟, 𝜃𝜃, 𝜑𝜑)′ are the corresponding normalized spherical coordinates. It also represents the coordinates of the pupil
and iris boundaries along the ‘θ’ direction and furnished in the following equations.
𝐼𝐼𝑛𝑛(𝑥𝑥, 𝑦𝑦, 𝑧𝑧) = 𝐼𝐼𝑂𝑂(𝑥𝑥, 𝑦𝑦, 𝑧𝑧) (5)
𝑥𝑥 = 𝑥𝑥𝑝𝑝(𝜃𝜃, 𝜑𝜑) + (𝑥𝑥𝑖𝑖(𝜃𝜃, 𝜑𝜑)- 𝑥𝑥𝑝𝑝(𝜃𝜃, 𝜑𝜑))
1
𝑚𝑚
(6)
𝑦𝑦 = 𝑦𝑦𝑝𝑝(𝜃𝜃, 𝜑𝜑) + (𝑦𝑦𝑖𝑖(𝜃𝜃, 𝜑𝜑)- 𝑦𝑦𝑝𝑝(𝜃𝜃, 𝜑𝜑))
1
𝑚𝑚
(7)
𝑧𝑧 = 𝑧𝑧𝑝𝑝(𝜃𝜃, 𝜑𝜑) + (𝑧𝑧𝑖𝑖(𝜃𝜃, 𝜑𝜑)- 𝑧𝑧𝑝𝑝(𝜃𝜃, 𝜑𝜑))
1
𝑚𝑚
(8)
Where θ = 2𝜋𝜋
𝑥𝑥
𝑁𝑁
.
Here ′𝐼𝐼𝑛𝑛′ is the ′𝑀𝑀 × 𝑁𝑁′ normalized image and ′𝑥𝑥𝑝𝑝(𝜃𝜃, 𝜑𝜑), 𝑦𝑦𝑝𝑝(𝜃𝜃, 𝜑𝜑), 𝑧𝑧𝑝𝑝(𝜃𝜃, 𝜑𝜑)′ and
′𝑥𝑥𝑖𝑖(𝜃𝜃, 𝜑𝜑), 𝑦𝑦𝑖𝑖(𝜃𝜃, 𝜑𝜑), 𝑧𝑧𝑖𝑖(𝜃𝜃, 𝜑𝜑)′ are the coordinates of the inner and outer boundary points. 𝜃𝜃
′ ′
is the inclination
from the ‘Z’ direction in the original image, ‘𝐼𝐼𝑂𝑂’. This process ends with the normalised iris image, which is
further forwarded for histogram equalization with the view of getting better accuracy.
2.2. Localized histogram equalization
The normalized image, resultant of the previous phase may have low intensity contrast and improper
brightness due to the position of the light sources and other issues. In such situations, to achieve more accurate
results, histogram equalization has been chosen. This method is a contrast enhancement technique with the
objective to obtain a new enhanced iris image with a uniform histogram. It distributes the histogram of the
pixel levels in a uniform manner without any loss. It has been implemented for improving the look of a noisy
image by amplifies the global contrast of the iris image. The histogram, ‘𝐻𝐻[𝑥𝑥]’ contains pixels with the value,
 ISSN: 2722-3221
Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 126 – 134
130
′𝑥𝑥′. The cumulative density function of the histogram ‘𝑐𝑐𝑐𝑐𝑐𝑐[𝑥𝑥]’ contains the number of pixels with the value,
′𝑥𝑥′ or less is given by the following equation.
(𝑐𝑐𝑐𝑐𝑐𝑐[𝑥𝑥]) = 𝐻𝐻[0] + 𝐻𝐻[1] + 𝐻𝐻[2] + ⋯ + 𝐻𝐻[𝑥𝑥] (9)
It should be applied to each pixel in the iris image and replace the existing value with the calculated
value. The histogram of a digital image in the range of [0, 𝐾𝐾 − 1] is a discrete function as given in
the following equation.
𝑝𝑝(𝑟𝑟𝑘𝑘) =
𝑛𝑛𝑘𝑘
𝑛𝑛
(10)
Where ‘ 𝑟𝑟𝑘𝑘 ’ is the kth
gray level, is the number of pixel in the image with that gram level, ‘n’ is the total number
of pixels in the image, and k = 0,1,2,…,K-1. 𝑝𝑝(𝑟𝑟𝑘𝑘) Gives the probability of occurrence level, 𝑟𝑟𝑘𝑘.
Consider the following sample original entire eye shown in the following Figure 5. The contrast of
the iris image is amplified, mainly when the used data of the iris image is represented by near contrast values.
The intensity would be better spread on the histogram, through this fine-tuning. It changes the areas of lower
contrast to rise a higher contrast without distressing the overall precision of the irises. The feature of interest
in the image may require enrichment locally. Histogram equalization reaches this by efficiently spreading out
the most frequent intensity values. By using this method, the histogram of the resultant image is as flat as
possible. The resultant histogram equalized image is shown in the Figure 6.
Figure 5. Original image before localized histogram equalization
Figure 6. Image after the localized histogram equalization
It consists of applying localized histogram equalization independently to capture the iris region in the
eye image since most small regions are very self-similar. If the image is made up of discrete regions, most
small regions lie entirely within one or the other region. This method attempts to equalize the number of pixels
which tend to flatten and raise an image’s histogram. Vertical equalization uses only a single column of pixels
Comput. Sci. Inf. Technol. 
An optimized rubber sheet model for normalization phase of iris recognition… (Selvamuthukumaran.S)
131
into the equalization process, whereas horizontal equalization uses a single row of pixels. It modifies the pixel
intensities for a better appearance of the irises. The proposed method improves the visual appearance [16] of
an image.
3. EXPERIMENTAL STUDY
To achieve a size-invariant sampling of the valid iris pixel points, we have applied the optimized
rubber sheet model to map the sampled iris pixels from the Cartesian coordinates into the normalized spherical
coordinates. To effectively implement our proposal, the iris image database CASIA Database Version 3.0
(CASIA-IrisV3) released by the Centre for Biometrics and Security Research of National Laboratory of Pattern
Recognition, Chinese Academy of Sciences has been used [15]. The pupil is smaller in the image; however,
the normalisation process can able to rescale the iris region, so that it has a constant dimension. In our
experimental study, the rectangular representation is constructed from 12,000 data points in the iris region. The
remapping is done using the spherical coordinates. The iris shown in Figure 7 is the segmented image of
S1046R04.
Figure 7. Segmented iris image of S1046R04
After the successful conversion of the Cartesian coordinate into the spherical coordinate system, the
normalised iris is shown in the following figure. Comparing the results from Figure 8 and Figure 9, it has been
observed that the distribution is shifted towards the higher values, while the peak at the minimum intensity
remains after the localized histogram equalisation. It recovered some of the apparently lost contrast in an image,
by remapping the brightness values in such a way as to equalize, or more evenly distribute its brightness values.
The histogram of the normalised iris of Figure 8 is shown in Figure 10. The unwrapped flat iris has a low
contrast. This iris is enhanced by applying localized histogram equalization. The resultant image is shown in
the following figure. The histogram of the normalised iris of Figure 9 after the localized histogram equalization
is shown in Figure 11.
Figure 8. Normalized iris
 ISSN: 2722-3221
Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 126 – 134
132
Figure 9. Normalized iris after histogram equalization
Figure 10. Histogram of normalized iris after conversion into spherical coordinates
Figure 11. Histogram of the normalized iris after applying the localized histogram equalization
Comput. Sci. Inf. Technol. 
An optimized rubber sheet model for normalization phase of iris recognition… (Selvamuthukumaran.S)
133
By comparing the histograms in Figure 10 and Figure 11, it has been observed that the intensity
variations are equally normalised after the localized histogram equalisation. Also output of the proposed
method for some of the CASIA images are shown in the Table 1. As a result, noises in the flat regions and ring
artefacts at the edges are normalised, and now the irises are ready for further processing.
Table 1. Result of the proposed method for some of the CASIA images
S.No CASIA Image
1 S1013L02
2 S1022L04
3 S3041L04
4 S3312R02
The proposed segmentation method normalized the iris region in 658 images out of 670 images, which
corresponds to a success rate of 98%. The success rate of the proposed method is compared with those of the
previous methods Daugman’s Rubber sheet model and Wild’s Image registration. The success rate of the
different normalization methods is shown in Table 2. Table 2 shows the strength of the proposed method which
works better than the existing methods since 98% of accuracy for the irises and the graphical representation of
comparison is also provided in the Figure 12.
Table 2. Success rate of the normalization methods
Normalization Method No of irises (out of 670) Success Rate percentage
Optimized rubber sheet model using spherical coordinates 658 98
Rubber sheet model 638 95
Wild’s Image registration 597 89
 ISSN: 2722-3221
Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 126 – 134
134
Figure 12. Results of various normalization methods
4. CONCLUSION
In a progressively digital society, the role played by the iris recognition system is a vital one. The
trends and traits made in security-based technologies demand various new algorithms for quality images. In
this paper, an optimization technique for the normalization phase has been implemented which performs the
conversion of the Cartesian coordinates into spherical coordinates and uses localized histogram equalization.
The results obtained reveal the exact normalization of irises for the noisy images. As a future work, we put
forth certain improvements in noise removal methods, iris region resize methods towards the better feature
extraction of iris images,
REFERENCES
[1] N. Mojtaba and G. Sedigheh, “IRIS recognition based on using ridgelet and curvelet transform,” International
Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 4, no. 2, pp. 7-18, 2011.
[2] R. M. Da Costaand A. Gonzaga, “Dynamic features for Iris recognition,” IEEE Transactions on Systems, Man and
Cybernetics, vol. 42, no. 4, pp. 1072-1082, 2012.
[3] A. D. Rahulkar and R. S. Holambe, “Half-Iris feature extraction and recognition using a new class of biorthogonal
Triplet Half-band filter bank and flexible k-out-of-n: A Postclassifier,” IEEE Transactions on Information Forensics
and Security, vol. 7, no. 1, pp. 230-240, 2012.
[4] G. Yang, S. Pang, Y. Yin, Y. Li, and X. Li, “SIFT based iris recognition with normalization and enhancement,”
International Journal of Machine Learning and Cybernetics, vol. 4, no. 4, pp. 401-407, 2012.
[5] H. Proença, “IRIS Biometrics: indexing and retrieving heavily degraded data,” IEEE Transactions on Information
Forensics and Security, vol. 8, no. 12, pp. 1975-1985, 2013.
[6] F. A. Santos, F.A. Faria, and L.A. Villas, “IRIS recognition based on local binary descriptors,” IEEE Latin America
Transactions, vol. 13, no. 8, pp. 2770-2775, 2015.
[7] S. Selvamuthukumaran, S. Hariharan, and T. Ramkumar, “Investigation on Iris recognition system adopting
cryptographic techniques,” The International Arab Journal of Information Technology, vol. 12, no. 1, pp. 1-8, 2015.
[8] R. Himanshu and Y. Anamika, “Iris recognition using combined support vector machine and hamming distance
approach,” Expert Systems with Applications, vol. 41, no. 2, pp. 588-593, 2014.
[9] Z. Peng, H. Wang, J. Wu, and J. Li, “An improved Daugman method for Iris recognition,” Wuhan University Journal
of Natural Sciences, vol. 20, no. 3, pp. 229-234, 2015.
[10] A. Bansal, R. Agarwal, and R. K. Sharma, “Statistical feature extraction-based iris recognition system,” Sadhana,
Indian Academy of Sciences, vol. 41, no. 5, pp. 507-518, 2016.
[11] I. Hamouchene and S. Aouat, “Efficient approach for Iris recognition,” Signal Image and Video Processing, vol. 10,
no. 7, pp. 1361-1367, 2016.
[12] J. Daugman, "How iris recognition works," in IEEE Transactions on Circuits and Systems for Video Technology, vol.
14, no. 1, pp. 21-30, 2004.
[13] R. P. Wildes et al., “A machine vision system for Iris recognition,” Machine Vision and Applications, vol. 9, pp.1-8,
1996.
[14] H. S. Ali, A. I. Ismail, F. A. Farag, and F. E. Abd El-Samie, “Speeded up robust features for efficient Iris recognition,”
Signal Image and Video Processing. vol. 10, no. 8, pp. 1385-1391, 2016.
[15] CASIA iris image database, The National Laboratory of Pattern Recognition (NLPR), Institute of Automation,
Chinese Academy of Sciences (CASIA-IrisV1).
[16] Y. Chen, J. Yang, C. Wang, and N. Liu, “Multimodal biometrics recognition based on local fusion visual features
and variational bayesian extreme learning machine,” Expert Systems with Applications, vol. 64, pp. 93-103, 2016.

More Related Content

Similar to An optimized rubber sheet model for normalization phase of iris recognition

WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONsipij
 
Research on Iris Region Localization Algorithms
Research on Iris Region Localization AlgorithmsResearch on Iris Region Localization Algorithms
Research on Iris Region Localization AlgorithmsIJERA Editor
 
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkijcsit
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
ModelingOfUnsegmentedCloudPointData-RP-SanjayShukla
ModelingOfUnsegmentedCloudPointData-RP-SanjayShuklaModelingOfUnsegmentedCloudPointData-RP-SanjayShukla
ModelingOfUnsegmentedCloudPointData-RP-SanjayShuklaSanjay Shukla
 
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...cscpconf
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Efficient 3D stereo vision stabilization for multi-camera viewpoints
Efficient 3D stereo vision stabilization for multi-camera viewpointsEfficient 3D stereo vision stabilization for multi-camera viewpoints
Efficient 3D stereo vision stabilization for multi-camera viewpointsjournalBEEI
 
VISUAL TRACKING USING PARTICLE SWARM OPTIMIZATION
VISUAL TRACKING USING PARTICLE SWARM OPTIMIZATIONVISUAL TRACKING USING PARTICLE SWARM OPTIMIZATION
VISUAL TRACKING USING PARTICLE SWARM OPTIMIZATIONcscpconf
 
Pearling stroke segmentation with crusted pearl strings
Pearling stroke segmentation with crusted pearl stringsPearling stroke segmentation with crusted pearl strings
Pearling stroke segmentation with crusted pearl stringsSalman Rashid
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment University of Moratuwa
 

Similar to An optimized rubber sheet model for normalization phase of iris recognition (20)

WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
 
Research on Iris Region Localization Algorithms
Research on Iris Region Localization AlgorithmsResearch on Iris Region Localization Algorithms
Research on Iris Region Localization Algorithms
 
Ijetcas14 315
Ijetcas14 315Ijetcas14 315
Ijetcas14 315
 
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
 
E017443136
E017443136E017443136
E017443136
 
366 369
366 369366 369
366 369
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris RecognitionComparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
ModelingOfUnsegmentedCloudPointData-RP-SanjayShukla
ModelingOfUnsegmentedCloudPointData-RP-SanjayShuklaModelingOfUnsegmentedCloudPointData-RP-SanjayShukla
ModelingOfUnsegmentedCloudPointData-RP-SanjayShukla
 
23-02-03[1]
23-02-03[1]23-02-03[1]
23-02-03[1]
 
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
 
G01114650
G01114650G01114650
G01114650
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Efficient 3D stereo vision stabilization for multi-camera viewpoints
Efficient 3D stereo vision stabilization for multi-camera viewpointsEfficient 3D stereo vision stabilization for multi-camera viewpoints
Efficient 3D stereo vision stabilization for multi-camera viewpoints
 
VISUAL TRACKING USING PARTICLE SWARM OPTIMIZATION
VISUAL TRACKING USING PARTICLE SWARM OPTIMIZATIONVISUAL TRACKING USING PARTICLE SWARM OPTIMIZATION
VISUAL TRACKING USING PARTICLE SWARM OPTIMIZATION
 
Pearling stroke segmentation with crusted pearl strings
Pearling stroke segmentation with crusted pearl stringsPearling stroke segmentation with crusted pearl strings
Pearling stroke segmentation with crusted pearl strings
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment
 

More from CSITiaesprime

Hybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksHybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksCSITiaesprime
 
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceImplementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceCSITiaesprime
 
Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...CSITiaesprime
 
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...CSITiaesprime
 
The impact of usability in information technology projects
The impact of usability in information technology projectsThe impact of usability in information technology projects
The impact of usability in information technology projectsCSITiaesprime
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...CSITiaesprime
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
 
An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...CSITiaesprime
 
Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...CSITiaesprime
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaCSITiaesprime
 
Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...CSITiaesprime
 
Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...CSITiaesprime
 
Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...CSITiaesprime
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...CSITiaesprime
 
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...CSITiaesprime
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...CSITiaesprime
 
National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...CSITiaesprime
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
 
The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...CSITiaesprime
 

More from CSITiaesprime (20)

Hybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksHybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networks
 
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceImplementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
 
Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...
 
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
 
The impact of usability in information technology projects
The impact of usability in information technology projectsThe impact of usability in information technology projects
The impact of usability in information technology projects
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...
 
Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for Libya
 
Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...
 
Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...
 
Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...
 
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...
 
National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...
 
The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

An optimized rubber sheet model for normalization phase of iris recognition

  • 1. Computer Science and Information Technologies Vol. 1, No. 3, November 2020, pp. 126~134 ISSN: 2722-3221, DOI: 10.11591/csit.v1i3.p126-134  126 Journal homepage: http://iaesprime.com/index.php/csit An optimized rubber sheet model for normalization phase of iris recognition Selvamuthukumaran.S1 , Ramkumar.T2 , Shantharajah SP3 1 Faculty of Computer Applications, AVC College of Engineering, India 2,3 School of Information Technology and Engineering, VIT University, India Article Info ABSTRACT Article history: Received Jan 23, 2020 Revised May 27, 2020 Accepted Jun 16, 2020 Iris recognition is a promising biometric authentication approach and it is a very active topic in both research and realistic applications because the pattern of the human iris differs from person to person, even between twins. In this paper, an optimized iris normalization method for the conversion of segmented image into normalized form has been proposed. The existing methods are converting the Cartesian coordinates of the segmented image into polar coordinates. To get more accuracy, the proposed method is using an optimized rubber sheet model which converts the polar coordinates into spherical coordinates followed by localized histogram equalization. The experimental result shows the proposed method scores an encouraging performance with respect to accuracy. Keywords: Biometrics Histogram equalization Iris normalization Iris recognition Spherical coordinates This is an open access article under the CC BY-SA license. Corresponding Author: Selvamuthukumaran.S, Faculty of Computer Applications, AVC College of Engineering, India. Email: smksmk@gmail.com 1. INTRODUCTION The progressive digital society demands secure identification techniques for the development of biometric system in diverse fields [1]. The iris biometric systems are becoming commonly implemented as one of the best ways to certainly identify people [2]. The iris is an outwardly and colourful organ close the pupil of the eye [3]. Figure 1 shown the structure of the eye, which demonstrates the exact position of the iris and its surrounding things. The property of the iris guarantees that even equal twins have uncorrelated iris details. Thus, the exclusivity of every iris, including the couple possessed by single individual, parallels the exclusivity of every fingerprint regardless of whether there is a common genome [4, 5]. The iris involves of several irregular small blocks similar to freckles, stripes, furrows, coronas, etc. In addition, the texture divisions in the iris are arbitrary. The separate merits of the iris cause its high consistency for individual identification [6]. Hence the method of iris identification becomes an exciting research point in current years [7]. The first step in iris recognition is the process of capturing the image of an eye [8]. During stage of the image acquisition, a camera is used to record iris textures. The captured image is further processed for the localization stage, where the location of the iris is carried out, followed by the segmentation phase. In segmentation, irises are separated from the eye [6]. Next to this, a normalization of the iris image is done using various noise removal techniques, and the images are stored in the binary format [9]. The process of the iris recognition system continues with the feature extraction stage, where the extractions of various features of irises are identified [10]. In verification process, matching will be done where the acquired image is compared with the images stored in the database [11]. A typical iris recognition system which includes above stages is shown in the Figure 2.
  • 2. Comput. Sci. Inf. Technol.  An optimized rubber sheet model for normalization phase of iris recognition… (Selvamuthukumaran.S) 127 Figure 1. Structure of an eye Figure 2. Iris recognition system In the phase of normalization, segmented iris image has been prepared for the feature extraction process. Though, several of algorithms [1, 5, 11] are available for the normalization phase of the iris recognition, Daugman [12] and Wildes [13] algorithms are significant. To compensate the differences in the magnitude of the pupil, Daugman [12] proposed a rubber sheet model for normalization. In this way, some of the irises still may be sealed by eyelids or eyelashes, even when the inner and outer boundaries of the iris are reached. Wildes’ system is a patent of the iris recognition system which employes the gradient-based Hough transform to choose the two circular boundaries of an iris. It has big computational charge, since it examinates among all of the possible candidates. Besides, the algorithm’s accuracy significantly deteriorates while dealing with the noisy data. The above two normalization techniques transform Cartesian coordinates in to polar coordinates for un-wrapping the iris texture into a fixed size rectangular block. In polar coordinates, the distance and angular position have extremely affected iris images with respect to the camera. Additionally, illumination has a direct influence on the pupil size and sources non-linear distinctions of the iris patterns [14]. Moreover, the pupil boundary and limbus boundary are usually two non-concentric contours. The non-concentric condition leads to different choices of reference points for transforming an iris into polar coordinates, which is not suitable for iris images with more noise. Hence, it is necessary to adopt an optimization technique for transforming the iris image to compensate these variations. In this paper, we have proposed an optimized normalization technique based on rubber sheet model which converts Cartesian coordinates into spherical coordinates instead of polar coordinates and perform localized histogram equalization for further accuracy. The rest of the paper has been organized as follows; in section 2, the improvised model for iris normalization has been illustrated with the inclusive steps. The experimental investigations of the proposed work with the help of CASIA database [15] is explained in section 3, where concluding remarks and feature research directions are summarized in section 4. 2. AN OPTIMIZED RUBBER SHEET MODEL FOR IRIS NORMALIZATION The normalization stage aims to gain invariance to size, position and pupil dilatation in the segmented iris region. Most of the methods use Daugman [12] rubber sheet model considers the possibility of pupil dilation and the appearance of different sizes in different images. For this purpose, the coordinate system is altered by un-wrapping the iris and plotting all the points within the edge of the iris into their polar coordinates. The Cartesian to polar transformation is defined for the continuous form of images. However, in the discrete form,
  • 3.  ISSN: 2722-3221 Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 126 – 134 128 the transformation encounters problems in which the polar samples do not entirely match the Cartesian samples which results in excessive interpolation and in some cases loss of information would be the result. The proposed method is the improvised method of Daugman’s rubber sheet model and it improves the accuracy by advocating a two-step process. At First, the coordinate system of the iris region is converted from Cartesian into the spherical. Then, the remapping process is done for the normalization. Localized histogram equalization is applied on the iris region for further normalization. The various inclusive stages of the proposed work are illustrated in the Figure 3. Figure 3. Flowchart of proposed work 2.1. Conversion of cartesian coordinates into spherical coordinates In the spherical coordinate system, the position of a point is specified by three coordinates; (𝑟𝑟, 𝜃𝜃, 𝜑𝜑) where ‘𝑟𝑟’ is the radial distance from a fixed origin, ‘𝜃𝜃’ is the elevation angle of that point from a plane, and ‘𝜑𝜑’ is the azimuth angle of its orthogonal projection on that plane from a fixed direction. The elevation angle is often replaced by the inclination angle measured from the azimuth; the direction perpendicular to the reference plane. The radial distance is also named the radius or radial coordinate and the inclination is named as colatitude. The coordinate conversion is represented in Figure 4. During co-ordinate conversion, the centre of the pupil is considered as location point and the radial vector circle has been considered in the iris region. The coordinate conversion is performed to obtain the invariance of iris size, position and different degrees of pupil dilation. It produces the iris regions, which have the same constant dimensions, with the intention that two images of the same iris should have characteristic features under different conditions at the same spatial place. The proposed technique is useful in bringing iris images into a standard fixed resolution, which simplifies the feature extraction process. In the adjusted rubber sheet model, the centre of the pupil is used as the reference point; and the radial and azimuth vectors cross the iris region. The spherical coordinates, (𝑟𝑟, 𝜃𝜃, 𝜑𝜑) of a point can be obtained from its Cartesian coordinates, (𝑥𝑥, 𝑦𝑦, 𝑧𝑧) by the following equations.
  • 4. Comput. Sci. Inf. Technol.  An optimized rubber sheet model for normalization phase of iris recognition… (Selvamuthukumaran.S) 129 Figure 4. Coordinate conversion 𝑟𝑟 = �𝑥𝑥2 + 𝑦𝑦2 + 𝑧𝑧2 (1) 𝜑𝜑 = 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 (𝑦𝑦, 𝑥𝑥) (2) 𝜃𝜃 = 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 � 𝑥𝑥 �𝑥𝑥2+𝑦𝑦2 � (3) Where 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 (𝑦𝑦, 𝑥𝑥) is a variant of the arctangent function that returns the angle from the 𝑥𝑥-axis to the vector (𝑥𝑥, 𝑦𝑦) in the full range(−𝜋𝜋, 𝜋𝜋). The formulas assume that the two systems have the origin, then the spherical reference plane is the Cartesian ′𝑥𝑥 − 𝑦𝑦′ plan ‘𝜃𝜃’ is the inclination from the ′𝑧𝑧′ direction and the azimuth angles are measured using the coordinates. After converting the data points of the iris region into spherical coordinates, remapping has been done to rescale the points on the angle around the inner and outer boundaries. The remapping of the iris region from ′(𝑥𝑥, 𝑦𝑦, 𝑧𝑧)′, the Cartesian coordinates to the normalised spherical representation can be modelled as in the following equation. 𝐼𝐼(𝑥𝑥(𝑟𝑟, 𝜃𝜃, 𝜑𝜑),𝑦𝑦(𝑟𝑟, 𝜃𝜃, 𝜑𝜑), 𝑧𝑧(𝑟𝑟, 𝜃𝜃, 𝜑𝜑)) = 𝐼𝐼(𝑟𝑟, 𝜃𝜃, 𝜑𝜑) (4) Where ′𝐼𝐼(𝑥𝑥, 𝑦𝑦, 𝑧𝑧)′ is the iris region image, ‘(x,y,z)’ are the original Cartesian coordinates, and ‘(𝑟𝑟, 𝜃𝜃, 𝜑𝜑)′ are the corresponding normalized spherical coordinates. It also represents the coordinates of the pupil and iris boundaries along the ‘θ’ direction and furnished in the following equations. 𝐼𝐼𝑛𝑛(𝑥𝑥, 𝑦𝑦, 𝑧𝑧) = 𝐼𝐼𝑂𝑂(𝑥𝑥, 𝑦𝑦, 𝑧𝑧) (5) 𝑥𝑥 = 𝑥𝑥𝑝𝑝(𝜃𝜃, 𝜑𝜑) + (𝑥𝑥𝑖𝑖(𝜃𝜃, 𝜑𝜑)- 𝑥𝑥𝑝𝑝(𝜃𝜃, 𝜑𝜑)) 1 𝑚𝑚 (6) 𝑦𝑦 = 𝑦𝑦𝑝𝑝(𝜃𝜃, 𝜑𝜑) + (𝑦𝑦𝑖𝑖(𝜃𝜃, 𝜑𝜑)- 𝑦𝑦𝑝𝑝(𝜃𝜃, 𝜑𝜑)) 1 𝑚𝑚 (7) 𝑧𝑧 = 𝑧𝑧𝑝𝑝(𝜃𝜃, 𝜑𝜑) + (𝑧𝑧𝑖𝑖(𝜃𝜃, 𝜑𝜑)- 𝑧𝑧𝑝𝑝(𝜃𝜃, 𝜑𝜑)) 1 𝑚𝑚 (8) Where θ = 2𝜋𝜋 𝑥𝑥 𝑁𝑁 . Here ′𝐼𝐼𝑛𝑛′ is the ′𝑀𝑀 × 𝑁𝑁′ normalized image and ′𝑥𝑥𝑝𝑝(𝜃𝜃, 𝜑𝜑), 𝑦𝑦𝑝𝑝(𝜃𝜃, 𝜑𝜑), 𝑧𝑧𝑝𝑝(𝜃𝜃, 𝜑𝜑)′ and ′𝑥𝑥𝑖𝑖(𝜃𝜃, 𝜑𝜑), 𝑦𝑦𝑖𝑖(𝜃𝜃, 𝜑𝜑), 𝑧𝑧𝑖𝑖(𝜃𝜃, 𝜑𝜑)′ are the coordinates of the inner and outer boundary points. 𝜃𝜃 ′ ′ is the inclination from the ‘Z’ direction in the original image, ‘𝐼𝐼𝑂𝑂’. This process ends with the normalised iris image, which is further forwarded for histogram equalization with the view of getting better accuracy. 2.2. Localized histogram equalization The normalized image, resultant of the previous phase may have low intensity contrast and improper brightness due to the position of the light sources and other issues. In such situations, to achieve more accurate results, histogram equalization has been chosen. This method is a contrast enhancement technique with the objective to obtain a new enhanced iris image with a uniform histogram. It distributes the histogram of the pixel levels in a uniform manner without any loss. It has been implemented for improving the look of a noisy image by amplifies the global contrast of the iris image. The histogram, ‘𝐻𝐻[𝑥𝑥]’ contains pixels with the value,
  • 5.  ISSN: 2722-3221 Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 126 – 134 130 ′𝑥𝑥′. The cumulative density function of the histogram ‘𝑐𝑐𝑐𝑐𝑐𝑐[𝑥𝑥]’ contains the number of pixels with the value, ′𝑥𝑥′ or less is given by the following equation. (𝑐𝑐𝑐𝑐𝑐𝑐[𝑥𝑥]) = 𝐻𝐻[0] + 𝐻𝐻[1] + 𝐻𝐻[2] + ⋯ + 𝐻𝐻[𝑥𝑥] (9) It should be applied to each pixel in the iris image and replace the existing value with the calculated value. The histogram of a digital image in the range of [0, 𝐾𝐾 − 1] is a discrete function as given in the following equation. 𝑝𝑝(𝑟𝑟𝑘𝑘) = 𝑛𝑛𝑘𝑘 𝑛𝑛 (10) Where ‘ 𝑟𝑟𝑘𝑘 ’ is the kth gray level, is the number of pixel in the image with that gram level, ‘n’ is the total number of pixels in the image, and k = 0,1,2,…,K-1. 𝑝𝑝(𝑟𝑟𝑘𝑘) Gives the probability of occurrence level, 𝑟𝑟𝑘𝑘. Consider the following sample original entire eye shown in the following Figure 5. The contrast of the iris image is amplified, mainly when the used data of the iris image is represented by near contrast values. The intensity would be better spread on the histogram, through this fine-tuning. It changes the areas of lower contrast to rise a higher contrast without distressing the overall precision of the irises. The feature of interest in the image may require enrichment locally. Histogram equalization reaches this by efficiently spreading out the most frequent intensity values. By using this method, the histogram of the resultant image is as flat as possible. The resultant histogram equalized image is shown in the Figure 6. Figure 5. Original image before localized histogram equalization Figure 6. Image after the localized histogram equalization It consists of applying localized histogram equalization independently to capture the iris region in the eye image since most small regions are very self-similar. If the image is made up of discrete regions, most small regions lie entirely within one or the other region. This method attempts to equalize the number of pixels which tend to flatten and raise an image’s histogram. Vertical equalization uses only a single column of pixels
  • 6. Comput. Sci. Inf. Technol.  An optimized rubber sheet model for normalization phase of iris recognition… (Selvamuthukumaran.S) 131 into the equalization process, whereas horizontal equalization uses a single row of pixels. It modifies the pixel intensities for a better appearance of the irises. The proposed method improves the visual appearance [16] of an image. 3. EXPERIMENTAL STUDY To achieve a size-invariant sampling of the valid iris pixel points, we have applied the optimized rubber sheet model to map the sampled iris pixels from the Cartesian coordinates into the normalized spherical coordinates. To effectively implement our proposal, the iris image database CASIA Database Version 3.0 (CASIA-IrisV3) released by the Centre for Biometrics and Security Research of National Laboratory of Pattern Recognition, Chinese Academy of Sciences has been used [15]. The pupil is smaller in the image; however, the normalisation process can able to rescale the iris region, so that it has a constant dimension. In our experimental study, the rectangular representation is constructed from 12,000 data points in the iris region. The remapping is done using the spherical coordinates. The iris shown in Figure 7 is the segmented image of S1046R04. Figure 7. Segmented iris image of S1046R04 After the successful conversion of the Cartesian coordinate into the spherical coordinate system, the normalised iris is shown in the following figure. Comparing the results from Figure 8 and Figure 9, it has been observed that the distribution is shifted towards the higher values, while the peak at the minimum intensity remains after the localized histogram equalisation. It recovered some of the apparently lost contrast in an image, by remapping the brightness values in such a way as to equalize, or more evenly distribute its brightness values. The histogram of the normalised iris of Figure 8 is shown in Figure 10. The unwrapped flat iris has a low contrast. This iris is enhanced by applying localized histogram equalization. The resultant image is shown in the following figure. The histogram of the normalised iris of Figure 9 after the localized histogram equalization is shown in Figure 11. Figure 8. Normalized iris
  • 7.  ISSN: 2722-3221 Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 126 – 134 132 Figure 9. Normalized iris after histogram equalization Figure 10. Histogram of normalized iris after conversion into spherical coordinates Figure 11. Histogram of the normalized iris after applying the localized histogram equalization
  • 8. Comput. Sci. Inf. Technol.  An optimized rubber sheet model for normalization phase of iris recognition… (Selvamuthukumaran.S) 133 By comparing the histograms in Figure 10 and Figure 11, it has been observed that the intensity variations are equally normalised after the localized histogram equalisation. Also output of the proposed method for some of the CASIA images are shown in the Table 1. As a result, noises in the flat regions and ring artefacts at the edges are normalised, and now the irises are ready for further processing. Table 1. Result of the proposed method for some of the CASIA images S.No CASIA Image 1 S1013L02 2 S1022L04 3 S3041L04 4 S3312R02 The proposed segmentation method normalized the iris region in 658 images out of 670 images, which corresponds to a success rate of 98%. The success rate of the proposed method is compared with those of the previous methods Daugman’s Rubber sheet model and Wild’s Image registration. The success rate of the different normalization methods is shown in Table 2. Table 2 shows the strength of the proposed method which works better than the existing methods since 98% of accuracy for the irises and the graphical representation of comparison is also provided in the Figure 12. Table 2. Success rate of the normalization methods Normalization Method No of irises (out of 670) Success Rate percentage Optimized rubber sheet model using spherical coordinates 658 98 Rubber sheet model 638 95 Wild’s Image registration 597 89
  • 9.  ISSN: 2722-3221 Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 126 – 134 134 Figure 12. Results of various normalization methods 4. CONCLUSION In a progressively digital society, the role played by the iris recognition system is a vital one. The trends and traits made in security-based technologies demand various new algorithms for quality images. In this paper, an optimization technique for the normalization phase has been implemented which performs the conversion of the Cartesian coordinates into spherical coordinates and uses localized histogram equalization. The results obtained reveal the exact normalization of irises for the noisy images. As a future work, we put forth certain improvements in noise removal methods, iris region resize methods towards the better feature extraction of iris images, REFERENCES [1] N. Mojtaba and G. Sedigheh, “IRIS recognition based on using ridgelet and curvelet transform,” International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 4, no. 2, pp. 7-18, 2011. [2] R. M. Da Costaand A. Gonzaga, “Dynamic features for Iris recognition,” IEEE Transactions on Systems, Man and Cybernetics, vol. 42, no. 4, pp. 1072-1082, 2012. [3] A. D. Rahulkar and R. S. Holambe, “Half-Iris feature extraction and recognition using a new class of biorthogonal Triplet Half-band filter bank and flexible k-out-of-n: A Postclassifier,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 230-240, 2012. [4] G. Yang, S. Pang, Y. Yin, Y. Li, and X. Li, “SIFT based iris recognition with normalization and enhancement,” International Journal of Machine Learning and Cybernetics, vol. 4, no. 4, pp. 401-407, 2012. [5] H. Proença, “IRIS Biometrics: indexing and retrieving heavily degraded data,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1975-1985, 2013. [6] F. A. Santos, F.A. Faria, and L.A. Villas, “IRIS recognition based on local binary descriptors,” IEEE Latin America Transactions, vol. 13, no. 8, pp. 2770-2775, 2015. [7] S. Selvamuthukumaran, S. Hariharan, and T. Ramkumar, “Investigation on Iris recognition system adopting cryptographic techniques,” The International Arab Journal of Information Technology, vol. 12, no. 1, pp. 1-8, 2015. [8] R. Himanshu and Y. Anamika, “Iris recognition using combined support vector machine and hamming distance approach,” Expert Systems with Applications, vol. 41, no. 2, pp. 588-593, 2014. [9] Z. Peng, H. Wang, J. Wu, and J. Li, “An improved Daugman method for Iris recognition,” Wuhan University Journal of Natural Sciences, vol. 20, no. 3, pp. 229-234, 2015. [10] A. Bansal, R. Agarwal, and R. K. Sharma, “Statistical feature extraction-based iris recognition system,” Sadhana, Indian Academy of Sciences, vol. 41, no. 5, pp. 507-518, 2016. [11] I. Hamouchene and S. Aouat, “Efficient approach for Iris recognition,” Signal Image and Video Processing, vol. 10, no. 7, pp. 1361-1367, 2016. [12] J. Daugman, "How iris recognition works," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, 2004. [13] R. P. Wildes et al., “A machine vision system for Iris recognition,” Machine Vision and Applications, vol. 9, pp.1-8, 1996. [14] H. S. Ali, A. I. Ismail, F. A. Farag, and F. E. Abd El-Samie, “Speeded up robust features for efficient Iris recognition,” Signal Image and Video Processing. vol. 10, no. 8, pp. 1385-1391, 2016. [15] CASIA iris image database, The National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences (CASIA-IrisV1). [16] Y. Chen, J. Yang, C. Wang, and N. Liu, “Multimodal biometrics recognition based on local fusion visual features and variational bayesian extreme learning machine,” Expert Systems with Applications, vol. 64, pp. 93-103, 2016.