SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Research in advance Engineering,
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
21
A Study of Iris Recognition
Jaydeep Chhatbar
Information Technology department,
Gujarat Technological University,
chhatbarjaydeep123@gmail.com
Gujarat
India.
Abstract: Iris recognition is considered to be the most reliable and accurate biometric identification system
available. Iris recognition system captures an image of an individual person’s eye, than the image of iris is meant
for the further segmentation and normalization for extracting its feature.Segmentation is used for the localization
of the correct iris region in the particular portion of an eye and it should be done accurately and correctly to
remove the eyelids, eyelashes, reflection and pupil noises present in iris region. The features of the iris were
encoded by convolving the normalize iris region with 1D Log-Gabor filters and phase quantizing the output in
order to produce a bit-wise biometric template. The Hamming distance was chosen as a matching metric, which
gave the measure of how many bits disagreed between the templates of the iris.
Keywords: Iris Recognition, Image Capturing, Localization, Feature Extraction, Template Matching
I. INTRODUCTION
Iris recognition is a method of biometric recognition which use pattern recognition techniques based on high-
resolution image of iris of individual person’s. Iris scans process start with the capture of image of iris with high quality
camera. The camera closes to the subject, not more than three feet. This process takes 0 to 1 second for scanning process.
II. IRIS SYSTEM CONFIGURATION
In system configuration normally camera takes high resolution image of iris in 2D image form. Then image goes
for image processing which remove the extra part of the image else of iris. Feature extraction process converts the image
of iris in to the binary data and store in the templates. This process is for enrolment of person’s iris data in to the device.
Next process is comparison between the stored data and currently scanned data, if it matches then than device gives
permission to access the machine or device, if it does not match then it rejects the scan and asks for scan.
It
deals
with
captu
International Journal of Research in advance Engineering,
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
22
ring of high quality image of the iris.Concerns on the image achievement rigs, find images with enough resolution and
sharpness. Good difference in the iris pattern with proper clarification.[1]When iris is put 3 meter distance near infrared
camera, it takes the high quality image.
Iris Localization
This is the process to remove the extra part of the image. Iris can be divided in to two circles one is iris boundary
and second is pupil boundary. For iris localization we use the Dugman’s algorithm [1].
Feature Extraction
Feature encoding was implemented by convolving the normalized iris prototype with 1D Log-Gaberwavelet.This
process converts the 2D image in to the 1D image. 2D patterns are broken in to a number of 1D signals. Each row
corresponds to a circular ring on the iris region. The angular direction is taken rather than the radial one, which
corresponds to columns of normalized pattern [3].The features are extracted in codes of 0 and 1.
International Journal of Research in advance Engineering,
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
23
[1]
Template Matching
In template matching process, the hamming distance was chosen for recognition. The result of this computation is
then used as the goodness of match, with smaller values indicating better matches.[8]The result of hamming distance is
used as the good match. If the hamming distance are very close to 0 then matching of two patterns are better.
III. ADVANTAGES
 Very high accuracy.
 Verification time is generally less than 5 seconds.
 The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken
with retinal scans to be sure the user is a living human being.[13]
IV. DISADVANTAGES
 Intrusive.
 A lot of memory for the data to be stored.
 Very expensive[13]
V. APPLICATIONS
 ATMs
 Computer login: The iris as a living password.
 Premises access control (home, office, laboratory etc.).
 Internet security, control of access to privileged information
 Automobile ignition and unlocking; anti-theft devices.
 Anti-terrorism (e.g.:— suspect Screening at airports)[7]
VI. CONCLUSION
From the above result we can conclude that iris recognition is used for high-security. Iris recognition uses
hamming distance concept and for image it uses high resolution camera. The hamming distance is close to zero, it means
the patterns are match completely.
REFERENCES
[1]. PrateekVerma, MaheedharDubey, Praveen Verma , ―Comparison of Various Segmentation Techniques in Iris Recognition‖
LAMBERT ACADEMIC PUBLISHING (LAP), GmbH & co. KG, DudweilerLandstrabe, SaarbrĂŒcken, ISBN 13: 978-3-6 59-
13597-2, Germany, MAY-2012.
[2]. Segmentation Techniques for Iris Recognition System, Iinternational Journal of Scientific & Engineering Res V volvolume 2,
Issue 4, April-2011 , ISSN 2229-5518 IJSER © @ 2011 BY Surjeet Singh, Kulbir Singh.
[3]. J. Daugman. How iris recognition works. Proceedings of 2002 International Conference on Image Processing, Vol. 1, 2002.
[4]. Chinese Academy of Sciences – Institute of Automation.Database of 756 Greyscale Eye Images. http://www.sinobiometrics.com
Version 1.0, 2003
[5]. ―Recognition of Human Iris Patterns for Biometrics Identification‖-This project is submitted for the Bachelor of Engineering
degree of the School of Computer Science and Software Engineering, The University of Western Australia, 2003 BY LIBOR
MASEK
[6]. ―An Segmentation Method for Iris Recognition System‖, Computer Vision and Intelligent Systems (CVIS) Group University
Tunku Abdul Rahman, Malaysia,2006 BY RICHARD YEW FATT NG,KAI MING MOK
[7]. ―Iris Biometric Recognition for Person Identification in Security System‖-International Journal of Computer Applications (0975
– 8887) Volume24–No.9, June2011 BY Dr.L.M.WAGHMARE, VanajaRoselin.E.Chirchi ,E.R.Chirchi
International Journal of Research in advance Engineering,
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
24
[8]. ―Accurate and Fast Iris Segmentation‖-International Journal of Engineering Science and Technology Vol. 2(6), 2010, 1492-1499
BY G. ANNAPOORANI, R. KRISHNAMOORTHI, P. GIFTY JEYA
[9]. Daugman, John (January 2004). "How iris recognition works" (PDF). IEEE Transactions on Circuits and Systems for Video
Technology 14 (1): 21–30. doi:10.1109/TCSVT.2003.818350. http://www.cl.cam.ac.uk/users/jgd1000/irisrecog.pdf.
[10].Daugman, John (2003). "The importance of being random: statistical principles of iris recognition" (PDF). Pattern Recognition 36
(2): 279–291. doi:10.1016/S0031-3203(02)00030-4. http://www.cl.cam.ac.uk/~jgd1000/patrec.pdf.
[11].Daugman, John (June 2005). "Results from 200 billion iris cross-comparisons".Technical Report UCAM-CL-TR-635.University
of Cambridge Computer Laboratory. http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-635.html.
[12].Zhaofeng He, Tieniu Tan, Zhenan Sun and XianchaoQiu (15 July 2008). "Towards Accurate and Fast Iris Segmentation for Iris
Biometrics". IEEE Trans Pattern Anal Mach Intell 31 (9): 1670–84. doi:10.1109/TPAMI.2008.183. PMID 19574626.
http://www.cbsr.ia.ac.cn/users/zfhe/publications.html

More Related Content

What's hot

Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABijtsrd
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extractionAlexander Decker
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation SystemMohamed Refaei
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_systemsukanya thatamsetty
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 
Graduation Project - Face Login : A Robust Face Identification System for Sec...
Graduation Project - Face Login : A Robust Face Identification System for Sec...Graduation Project - Face Login : A Robust Face Identification System for Sec...
Graduation Project - Face Login : A Robust Face Identification System for Sec...Ahmed Gad
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 

What's hot (19)

Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation System
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
E0364024030
E0364024030E0364024030
E0364024030
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Graduation Project - Face Login : A Robust Face Identification System for Sec...
Graduation Project - Face Login : A Robust Face Identification System for Sec...Graduation Project - Face Login : A Robust Face Identification System for Sec...
Graduation Project - Face Login : A Robust Face Identification System for Sec...
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 

Viewers also liked

Delany & Co EUCoLab Round Table 3_v2
Delany & Co EUCoLab Round Table 3_v2Delany & Co EUCoLab Round Table 3_v2
Delany & Co EUCoLab Round Table 3_v2Harrison Woods
 
The respiratory system
The respiratory systemThe respiratory system
The respiratory systemMrsMendoza
 
Solar basics for clean future
Solar basics for clean futureSolar basics for clean future
Solar basics for clean futuresolarpanelcompany
 
Verena_Eckloff_Portfolio
Verena_Eckloff_PortfolioVerena_Eckloff_Portfolio
Verena_Eckloff_PortfolioVerena Eckloff
 
Endocarditis2 copy
Endocarditis2 copyEndocarditis2 copy
Endocarditis2 copylorena diaz
 
INDEVA-Range Liftdevices
INDEVA-Range LiftdevicesINDEVA-Range Liftdevices
INDEVA-Range LiftdevicesChristian
 
Bodylanguage
BodylanguageBodylanguage
BodylanguageBRYAN SON
 
Study of Java Card and its Application
Study of Java Card and its ApplicationStudy of Java Card and its Application
Study of Java Card and its Applicationeditor1knowledgecuddle
 
Lightning talk what i learned from interviewing
Lightning talk   what i learned from interviewingLightning talk   what i learned from interviewing
Lightning talk what i learned from interviewingwelshboy2008
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationpradeep singh
 
Halicephalobus gingivalis
Halicephalobus gingivalisHalicephalobus gingivalis
Halicephalobus gingivalisBeccy Elizabeth
 
Shenbei PCB Presentation
Shenbei PCB PresentationShenbei PCB Presentation
Shenbei PCB PresentationStacey Zhao
 

Viewers also liked (16)

Delany & Co EUCoLab Round Table 3_v2
Delany & Co EUCoLab Round Table 3_v2Delany & Co EUCoLab Round Table 3_v2
Delany & Co EUCoLab Round Table 3_v2
 
Esu machine
Esu machineEsu machine
Esu machine
 
The respiratory system
The respiratory systemThe respiratory system
The respiratory system
 
RESUME_Nashine_-LINK
RESUME_Nashine_-LINKRESUME_Nashine_-LINK
RESUME_Nashine_-LINK
 
Solar basics for clean future
Solar basics for clean futureSolar basics for clean future
Solar basics for clean future
 
Verena_Eckloff_Portfolio
Verena_Eckloff_PortfolioVerena_Eckloff_Portfolio
Verena_Eckloff_Portfolio
 
Endocarditis2 copy
Endocarditis2 copyEndocarditis2 copy
Endocarditis2 copy
 
INDEVA-Range Liftdevices
INDEVA-Range LiftdevicesINDEVA-Range Liftdevices
INDEVA-Range Liftdevices
 
Tipos de robots
Tipos de robotsTipos de robots
Tipos de robots
 
Bodylanguage
BodylanguageBodylanguage
Bodylanguage
 
Study of Java Card and its Application
Study of Java Card and its ApplicationStudy of Java Card and its Application
Study of Java Card and its Application
 
las vegas
las vegaslas vegas
las vegas
 
Lightning talk what i learned from interviewing
Lightning talk   what i learned from interviewingLightning talk   what i learned from interviewing
Lightning talk what i learned from interviewing
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Halicephalobus gingivalis
Halicephalobus gingivalisHalicephalobus gingivalis
Halicephalobus gingivalis
 
Shenbei PCB Presentation
Shenbei PCB PresentationShenbei PCB Presentation
Shenbei PCB Presentation
 

Similar to A Study of Iris Recognition

A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...aciijournal
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)aciijournal
 
Iris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIRJET Journal
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Techniqueijsc
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique ijsc
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 
Iris ppt
Iris ppt Iris ppt
Iris ppt AmbikaM8
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemIRJET Journal
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIJECEIAES
 
Face Mask and Social Distance Detection
Face Mask and Social Distance DetectionFace Mask and Social Distance Detection
Face Mask and Social Distance DetectionIRJET Journal
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNIRJET Journal
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVIRJET Journal
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 

Similar to A Study of Iris Recognition (20)

A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning Technique
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
K0966468
K0966468K0966468
K0966468
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
I017335457
I017335457I017335457
I017335457
 
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filter
 
Face Mask and Social Distance Detection
Face Mask and Social Distance DetectionFace Mask and Social Distance Detection
Face Mask and Social Distance Detection
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 

A Study of Iris Recognition

  • 1. International Journal of Research in advance Engineering, Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 21 A Study of Iris Recognition Jaydeep Chhatbar Information Technology department, Gujarat Technological University, chhatbarjaydeep123@gmail.com Gujarat India. Abstract: Iris recognition is considered to be the most reliable and accurate biometric identification system available. Iris recognition system captures an image of an individual person’s eye, than the image of iris is meant for the further segmentation and normalization for extracting its feature.Segmentation is used for the localization of the correct iris region in the particular portion of an eye and it should be done accurately and correctly to remove the eyelids, eyelashes, reflection and pupil noises present in iris region. The features of the iris were encoded by convolving the normalize iris region with 1D Log-Gabor filters and phase quantizing the output in order to produce a bit-wise biometric template. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris. Keywords: Iris Recognition, Image Capturing, Localization, Feature Extraction, Template Matching I. INTRODUCTION Iris recognition is a method of biometric recognition which use pattern recognition techniques based on high- resolution image of iris of individual person’s. Iris scans process start with the capture of image of iris with high quality camera. The camera closes to the subject, not more than three feet. This process takes 0 to 1 second for scanning process. II. IRIS SYSTEM CONFIGURATION In system configuration normally camera takes high resolution image of iris in 2D image form. Then image goes for image processing which remove the extra part of the image else of iris. Feature extraction process converts the image of iris in to the binary data and store in the templates. This process is for enrolment of person’s iris data in to the device. Next process is comparison between the stored data and currently scanned data, if it matches then than device gives permission to access the machine or device, if it does not match then it rejects the scan and asks for scan. It deals with captu
  • 2. International Journal of Research in advance Engineering, Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 22 ring of high quality image of the iris.Concerns on the image achievement rigs, find images with enough resolution and sharpness. Good difference in the iris pattern with proper clarification.[1]When iris is put 3 meter distance near infrared camera, it takes the high quality image. Iris Localization This is the process to remove the extra part of the image. Iris can be divided in to two circles one is iris boundary and second is pupil boundary. For iris localization we use the Dugman’s algorithm [1]. Feature Extraction Feature encoding was implemented by convolving the normalized iris prototype with 1D Log-Gaberwavelet.This process converts the 2D image in to the 1D image. 2D patterns are broken in to a number of 1D signals. Each row corresponds to a circular ring on the iris region. The angular direction is taken rather than the radial one, which corresponds to columns of normalized pattern [3].The features are extracted in codes of 0 and 1.
  • 3. International Journal of Research in advance Engineering, Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 23 [1] Template Matching In template matching process, the hamming distance was chosen for recognition. The result of this computation is then used as the goodness of match, with smaller values indicating better matches.[8]The result of hamming distance is used as the good match. If the hamming distance are very close to 0 then matching of two patterns are better. III. ADVANTAGES  Very high accuracy.  Verification time is generally less than 5 seconds.  The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being.[13] IV. DISADVANTAGES  Intrusive.  A lot of memory for the data to be stored.  Very expensive[13] V. APPLICATIONS  ATMs  Computer login: The iris as a living password.  Premises access control (home, office, laboratory etc.).  Internet security, control of access to privileged information  Automobile ignition and unlocking; anti-theft devices.  Anti-terrorism (e.g.:— suspect Screening at airports)[7] VI. CONCLUSION From the above result we can conclude that iris recognition is used for high-security. Iris recognition uses hamming distance concept and for image it uses high resolution camera. The hamming distance is close to zero, it means the patterns are match completely. REFERENCES [1]. PrateekVerma, MaheedharDubey, Praveen Verma , ―Comparison of Various Segmentation Techniques in Iris Recognition‖ LAMBERT ACADEMIC PUBLISHING (LAP), GmbH & co. KG, DudweilerLandstrabe, SaarbrĂŒcken, ISBN 13: 978-3-6 59- 13597-2, Germany, MAY-2012. [2]. Segmentation Techniques for Iris Recognition System, Iinternational Journal of Scientific & Engineering Res V volvolume 2, Issue 4, April-2011 , ISSN 2229-5518 IJSER © @ 2011 BY Surjeet Singh, Kulbir Singh. [3]. J. Daugman. How iris recognition works. Proceedings of 2002 International Conference on Image Processing, Vol. 1, 2002. [4]. Chinese Academy of Sciences – Institute of Automation.Database of 756 Greyscale Eye Images. http://www.sinobiometrics.com Version 1.0, 2003 [5]. ―Recognition of Human Iris Patterns for Biometrics Identification‖-This project is submitted for the Bachelor of Engineering degree of the School of Computer Science and Software Engineering, The University of Western Australia, 2003 BY LIBOR MASEK [6]. ―An Segmentation Method for Iris Recognition System‖, Computer Vision and Intelligent Systems (CVIS) Group University Tunku Abdul Rahman, Malaysia,2006 BY RICHARD YEW FATT NG,KAI MING MOK [7]. ―Iris Biometric Recognition for Person Identification in Security System‖-International Journal of Computer Applications (0975 – 8887) Volume24–No.9, June2011 BY Dr.L.M.WAGHMARE, VanajaRoselin.E.Chirchi ,E.R.Chirchi
  • 4. International Journal of Research in advance Engineering, Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 24 [8]. ―Accurate and Fast Iris Segmentation‖-International Journal of Engineering Science and Technology Vol. 2(6), 2010, 1492-1499 BY G. ANNAPOORANI, R. KRISHNAMOORTHI, P. GIFTY JEYA [9]. Daugman, John (January 2004). "How iris recognition works" (PDF). IEEE Transactions on Circuits and Systems for Video Technology 14 (1): 21–30. doi:10.1109/TCSVT.2003.818350. http://www.cl.cam.ac.uk/users/jgd1000/irisrecog.pdf. [10].Daugman, John (2003). "The importance of being random: statistical principles of iris recognition" (PDF). Pattern Recognition 36 (2): 279–291. doi:10.1016/S0031-3203(02)00030-4. http://www.cl.cam.ac.uk/~jgd1000/patrec.pdf. [11].Daugman, John (June 2005). "Results from 200 billion iris cross-comparisons".Technical Report UCAM-CL-TR-635.University of Cambridge Computer Laboratory. http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-635.html. [12].Zhaofeng He, Tieniu Tan, Zhenan Sun and XianchaoQiu (15 July 2008). "Towards Accurate and Fast Iris Segmentation for Iris Biometrics". IEEE Trans Pattern Anal Mach Intell 31 (9): 1670–84. doi:10.1109/TPAMI.2008.183. PMID 19574626. http://www.cbsr.ia.ac.cn/users/zfhe/publications.html