SlideShare a Scribd company logo
1 of 3
Download to read offline
ICRTEDC-2014 32
Vol. 1, Spl. Issue 2 (May, 2014) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
GV/ICRTEDC/08
AN IMPROVED IRIS RECOGNITION
SYSTEM BASED ON 2-D DCT AND
HAMMING DISTANCE TECHNIQUE
Sakshi Sharma
Electronics & Communication Engineering Department, Chandigarh Engineering College, Mohali, Punjab
cecm.ece.ssh@gmail.com
Abstract—The biometric person authentication technique
based onthe pattern of the human iris is well suited to be
applied to any access control system requiring a high level
ofsecurity. This paper proposes a new iris recognition
system that implements Integro-Differential, Daugman
Rubber Sheet Model, 2-D DCT, Hamming Distance to
exact features from the iris and matching it with the sotred
database.All these image-processing algorithms have been
validated on noised real iris images & UBIRISdatabase.
The proposed innovative technique is computationally
effective as well as reliable in terms of recognition rates.
1. INTRODUCTION
Biometrics refers to the quantifiable data (or metrics)
related to human characteristics and traits. Biometrics
identification (or biometric authentication) is used in
computer science as a form of identification and access
control. It is also used to identify individuals in groups that
are under surveillance.
Biometric identifiers are the distinctive, measurable
characteristics used to label and describe individuals.
Biometric identifiers are often categorized as
physiological versus behavioral characteristics.
Physiological characteristics are related to the shape of the
body. Examples include, but are not limited to fingerprint,
face recognition, DNA, palm print, hand geometry, iris
recognition, retina and odour/scent. Behavioral
characteristics are related to the pattern of behavior of a
person, including but not limited to typing rhythm, gait,
and voice. Some researchers have coined the term
behaviometrics to describe the latter class of biometrics.
Types of Biometrics
Biometric system is broadly categorized in two types:
Physiological and behavioral.
Figure 1: Types of biometrics
I. Working principle of biometrics
Biometrics device consists of a scanning device and
software, that converts the gathered information into
digital form, and a database or memory that stores the
biometric data for comparison with previous records saved
in the system. After converting the biometric input into
digital form, the software identifies the match points in the
data values. The match points are processed using
algorithm into a value that can be compared with
biometric data already stored in the data base. All
biometric systems require comparing a registered
biometric sample against a newly captured biometric
sample.
Advantages of Using Biometrics:
Easier fraud detection.
Better than password/PIN or smart cards.
No need to memorize passwords.
Require physical presence of the person to be identified.
Physical characteristics are unique.
It providesaccurate results.
2. BACKGROUND
The below table shows the related research work:
RESEARCHE
R NAME
YEA
R
ALGORITH
M USED
DRAWBACK
S
John G.
Daugman
1994 Integro-
Differential,
Daugman
Rubber Sheet
Model, 2-D
Gabor Filter,
XOR
operator
Hamming
Distance.
Integro-
differential
operator fails
in case of
noise and total
execution time
is also very
high.
W. W. Boles
and B.
Boashash
1998 1-D wavelet
transforms,
Edge
detection
technique,
Zero crossing
representation
.
Algorithms are
tested on few
number of Iris
images,
Correct
recognition
rate is 92%,
Equal Error
rate is 8.13%.
33 ICRTEDC -2014
Zhonghua Lin
and Bibo Lu
2010 Morlet
wavelet
transforms
Polar co-
ordinate
transform.
Recognition
rate is low of
the system.
Bimi Jain, Dr.
M.K. Gupta
and Prof. Jyoti
Bharti
2012 Fast Fourier
transform,
Euclidean
distance for
matching.
Algorithm
tested only on
10 images,
FAR and FRR
are also not
declared and
Euclidean
distance
technique
make
computational
slow.
Mohd. T.
Khan
2013 1-D Log
Gabor filter,
K-
dimensional
tree technique
for matching.
Search
efficiency is
decreased by
large tree size
and FAR,
FRR, ERR are
not mentioned
in results.
3. PROPOSED APPROACH
Figure 2: Proposed approach
SEGMENTATION
The color image is firstly converted into gray scale image;
it means that the luminance of colored image is converted
into gray shade. The first stage of iris recognition is to
isolate the actual iris region in a digital eye image. The iris
region, shown in Figure 4, can be approximated by two
circles, first one is for the iris boundary region and second
one is for the pupil boundary region. The eyelids and
eyelashes cover the upper and lower parts of the iris
region. Specular reflections can also occur within the iris
region resulting into corrupting the iris pattern.
Figure 3:Grayscale iris image
NORMALIZATION
Once the segmentation module has estimated the iris’s
boundary, the normalization process will transform the
circular iris region into another shape which will have the
same constant dimensions [8]. We can be using
Daugman’s Rubber Sheet Model for normalization. This
model transforms the iris texture from Cartesian to polar
coordinates. This process is called as iris unwrapping,
which have a rectangular entity that is used for further
subsequent processing. The transformation of normal
Cartesian to polar coordinates is recommended which
maps the entire pixels in the iris area into a pair of polar
coordinates (r, θ), where r and θ represents the intervals of
[0 1] and[0 2π] as shown in figure 5.
Daugman’s Rubber Sheet Model:
For normalization Daugman has invented the Rubber
Sheet Model in which he remaps each point within the iris
region to a pair of polar coordinates (r,θ) where r is on the
interval [0,1] and θ is angle [0,2π]. Normalisation accounts
for variations in pupil size due to changes in external
illumination that might influence iris size, it also ensures
that the irises of different individuals are mapped onto a
common image domain in spite of the variations in pupil
size across subjects etc.
Figure 4: Normalized Iris
FEATURE EXTRACTION
After the iris is normalized, it is compressed by using
mathematical functions and converted in to binary forms.
Each isolated iris pattern is then encoded using DCT
method to extract its binary information.
Discrete Cosine Transform: A discrete cosine transform
(DCT) expresses a finite sequence of data points in terms
of a sum of cosine functions oscillating at different
frequencies. DCT algorithm is very efficient in image
compression applications which makes further
computational easy in the system. Discrete cosine
transform provides the output in the form of matrix.
33 ICRTEDC -2014
Zhonghua Lin
and Bibo Lu
2010 Morlet
wavelet
transforms
Polar co-
ordinate
transform.
Recognition
rate is low of
the system.
Bimi Jain, Dr.
M.K. Gupta
and Prof. Jyoti
Bharti
2012 Fast Fourier
transform,
Euclidean
distance for
matching.
Algorithm
tested only on
10 images,
FAR and FRR
are also not
declared and
Euclidean
distance
technique
make
computational
slow.
Mohd. T.
Khan
2013 1-D Log
Gabor filter,
K-
dimensional
tree technique
for matching.
Search
efficiency is
decreased by
large tree size
and FAR,
FRR, ERR are
not mentioned
in results.
3. PROPOSED APPROACH
Figure 2: Proposed approach
SEGMENTATION
The color image is firstly converted into gray scale image;
it means that the luminance of colored image is converted
into gray shade. The first stage of iris recognition is to
isolate the actual iris region in a digital eye image. The iris
region, shown in Figure 4, can be approximated by two
circles, first one is for the iris boundary region and second
one is for the pupil boundary region. The eyelids and
eyelashes cover the upper and lower parts of the iris
region. Specular reflections can also occur within the iris
region resulting into corrupting the iris pattern.
Figure 3:Grayscale iris image
NORMALIZATION
Once the segmentation module has estimated the iris’s
boundary, the normalization process will transform the
circular iris region into another shape which will have the
same constant dimensions [8]. We can be using
Daugman’s Rubber Sheet Model for normalization. This
model transforms the iris texture from Cartesian to polar
coordinates. This process is called as iris unwrapping,
which have a rectangular entity that is used for further
subsequent processing. The transformation of normal
Cartesian to polar coordinates is recommended which
maps the entire pixels in the iris area into a pair of polar
coordinates (r, θ), where r and θ represents the intervals of
[0 1] and[0 2π] as shown in figure 5.
Daugman’s Rubber Sheet Model:
For normalization Daugman has invented the Rubber
Sheet Model in which he remaps each point within the iris
region to a pair of polar coordinates (r,θ) where r is on the
interval [0,1] and θ is angle [0,2π]. Normalisation accounts
for variations in pupil size due to changes in external
illumination that might influence iris size, it also ensures
that the irises of different individuals are mapped onto a
common image domain in spite of the variations in pupil
size across subjects etc.
Figure 4: Normalized Iris
FEATURE EXTRACTION
After the iris is normalized, it is compressed by using
mathematical functions and converted in to binary forms.
Each isolated iris pattern is then encoded using DCT
method to extract its binary information.
Discrete Cosine Transform: A discrete cosine transform
(DCT) expresses a finite sequence of data points in terms
of a sum of cosine functions oscillating at different
frequencies. DCT algorithm is very efficient in image
compression applications which makes further
computational easy in the system. Discrete cosine
transform provides the output in the form of matrix.
33 ICRTEDC -2014
Zhonghua Lin
and Bibo Lu
2010 Morlet
wavelet
transforms
Polar co-
ordinate
transform.
Recognition
rate is low of
the system.
Bimi Jain, Dr.
M.K. Gupta
and Prof. Jyoti
Bharti
2012 Fast Fourier
transform,
Euclidean
distance for
matching.
Algorithm
tested only on
10 images,
FAR and FRR
are also not
declared and
Euclidean
distance
technique
make
computational
slow.
Mohd. T.
Khan
2013 1-D Log
Gabor filter,
K-
dimensional
tree technique
for matching.
Search
efficiency is
decreased by
large tree size
and FAR,
FRR, ERR are
not mentioned
in results.
3. PROPOSED APPROACH
Figure 2: Proposed approach
SEGMENTATION
The color image is firstly converted into gray scale image;
it means that the luminance of colored image is converted
into gray shade. The first stage of iris recognition is to
isolate the actual iris region in a digital eye image. The iris
region, shown in Figure 4, can be approximated by two
circles, first one is for the iris boundary region and second
one is for the pupil boundary region. The eyelids and
eyelashes cover the upper and lower parts of the iris
region. Specular reflections can also occur within the iris
region resulting into corrupting the iris pattern.
Figure 3:Grayscale iris image
NORMALIZATION
Once the segmentation module has estimated the iris’s
boundary, the normalization process will transform the
circular iris region into another shape which will have the
same constant dimensions [8]. We can be using
Daugman’s Rubber Sheet Model for normalization. This
model transforms the iris texture from Cartesian to polar
coordinates. This process is called as iris unwrapping,
which have a rectangular entity that is used for further
subsequent processing. The transformation of normal
Cartesian to polar coordinates is recommended which
maps the entire pixels in the iris area into a pair of polar
coordinates (r, θ), where r and θ represents the intervals of
[0 1] and[0 2π] as shown in figure 5.
Daugman’s Rubber Sheet Model:
For normalization Daugman has invented the Rubber
Sheet Model in which he remaps each point within the iris
region to a pair of polar coordinates (r,θ) where r is on the
interval [0,1] and θ is angle [0,2π]. Normalisation accounts
for variations in pupil size due to changes in external
illumination that might influence iris size, it also ensures
that the irises of different individuals are mapped onto a
common image domain in spite of the variations in pupil
size across subjects etc.
Figure 4: Normalized Iris
FEATURE EXTRACTION
After the iris is normalized, it is compressed by using
mathematical functions and converted in to binary forms.
Each isolated iris pattern is then encoded using DCT
method to extract its binary information.
Discrete Cosine Transform: A discrete cosine transform
(DCT) expresses a finite sequence of data points in terms
of a sum of cosine functions oscillating at different
frequencies. DCT algorithm is very efficient in image
compression applications which makes further
computational easy in the system. Discrete cosine
transform provides the output in the form of matrix.
ICRTEDC-2014 34
MATCHING
The matching algorithm consists of all the image
processing steps that are carried out at the time of
enrolling the encoded iris template in database. Once the
bit encrypted bit pattern B’ corresponding to binary image
formed is extracted, it is tried to match with all stored
encrypted bit patterns B using simple Boolean XOR
operation[2]. The dissimilarity measure between any two
iris bit patterns is computed using Hamming Distance
(HD) which is given as,
Where, N=total number of bits in each bit pattern. As HD
is a fractional measure of dissimilarity with 0 representing
A perfect match, a low normalized HD implies strong
similarity of iris codes.
FIGURE 5: IRIS RECOGNITION TECHNOLOGY[21]
4. RESULTS & CONCLUSIONS
This work proposes a modified iris recognition system
based on 2D DCT and Daughman rubber sheet is used for
normalization is based on minimizing the effect of the
eyelids and eyelashes by trimming the iris area above the
upper and the area below the lower boundaries of the
pupil. The Experimental results also indicate that the
performance of the proposed technique is computationally
effective as well as reliable in terms of recognition rate of
93.2%. The combination of Daughman rubber sheet and
2D DCT is promising.
REFERENCES
[1] G K. Jain, L. Hong and S. Pankanti, Biometrics: Promising
Frontiers for Emerging Identification Market, Comm. ACM
,pp. 91-98, Feb. 2000.
[2] A. Ross, D. Nandakumar, A.K. Jain, Handbook of
Multibiometrics, . Springer, Heidelberg (2006).
[3] J. Daugman , How iris recognition works, IEEE Trans.
onCircuits and Systems for Video Technology., Vol. 14,
No. 1,pp. 21-30, January 2004.
[4] L. Flom, A. Safir, Iris recognition system, US Patent
4641394, 1987.
[5] K.W. Bowyer, K. Hollingsworth, P. J. Flynn, Image
Understanding for Iris Biometrics: A Survey, Computer
vision and Image Understanding, Vol. 110, Issue 2, pp. 281-
307, 2008. [
6] J. Daugman, High Confidence Visual Recognition of Persons
by a Test of Statistical Independence, IEEE Trans.on Pattern
Analysis and Machine Intelligence, Vol. 15, No.11,
pp.1148-1161, 1993.
[7] J. Daugman, C.Downing, Epigenetic randomness,
complexityand singularity of human iris patterns, Proc. R.
Soc. Lond. B268, pp. 1737–1740, 2001.
[8] J. Daugman , How iris recognition works, IEEE Trans.
onCircuits and Systems for Video Technology., Vol. 14,
No. 1,pp. 21-30, January 2004.
[9] Center for Biometrics and Security Research, CASIA Iris
ImageA. K Jain, P. Flynn, and A. Ross, Handbook of
Biometrics, New York: Springer, 2008.
[10] Sunita V. Dhavale ”DWT and DCT based Robust Iris
Feature Extraction and Recognition Algorithm for
Biometric Personal Identification”, International Journal of
Computer Applications (0975 – 8887), Volume 40– No.7,
February 2012.
[11] J. Daugman “How iris recognition works”, Proceedings of
2002 International Conference on Image Processing, Vol.1,
2002.
[12] J. Daugman. “Biometric personal identification system
based on iris analysis” United States International Journal of
Advanced Trends in Computer Science and Engineering,
Vol.2, No.1, Pages : 93-97 (2013) Special Issue of ICACSE
2013 - Held on 7-8 January, 2013 in Lords Institute of
Engineering and Technology, Hyderabad.
[13] Human eye. “Encyclopedia Britannica” from Encyclopedia
Britannica Ultimate Reference Suite DVD, 2006.
[14] Libor Masek, “Recognition of Human Iris Patterns for
Biometric Identification”, The University of Western
Australia, 2003.
[15] Bowyer K.W., Kranenburg C., Dougherty S. “Edge Detector
Evaluation using Empirical ROC Curves”, IEEE
Conference on Computer Vision and Pattern
Recognition(CVPR), pp. 354-359,1999.
[16]B.Sabarigiri1, T.Karthikeyan2, “Acquisition of Iris Images,
Iris Localization, Normalization and Quality Enhancement
for Personal Identification”, International Journal of
Emerging Trends &Technology in Computer Science
(IJETTCS),Volume 1, Issue 2, July – August 2012.
[17] Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric
Identification". Communications of the ACM,43(2), p. 91-
98. DOI 10.1145/328236.328110.
[18] Mayuri Memane, Sanjay Ganorkar, “DWT Based Iris
Recognition”, International Journal of Engineering Science
and Technology (IJEST),Vol. 4 No.08 August 2012.
[19] John G. Daugman, (1994), “Biometric Personal
Identification System based on Iris Analysis”, U.S. Patent
no. 5291560 A, publish date 1 march, 1994.
[20] Boles and Boashash, (1998), “A Human Identification
Technique Using Images of the Iris and Wavelet
Transform”, IEEE Transactions on Signal Processing, vol.
46, no. 4, pp. 1185-1188.
[21] www.google.com

More Related Content

What's hot

3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris Recognition3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris RecognitionIJMER
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestYoussef Rachidi
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestIJERA Editor
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
New approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmNew approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmeSAT Publishing House
 
El4301832837
El4301832837El4301832837
El4301832837IJERA Editor
 
Performance Evaluation of 2D Adaptive Bilateral Filter For Removal of Noise F...
Performance Evaluation of 2D Adaptive Bilateral Filter For Removal of Noise F...Performance Evaluation of 2D Adaptive Bilateral Filter For Removal of Noise F...
Performance Evaluation of 2D Adaptive Bilateral Filter For Removal of Noise F...CSCJournals
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET Journal
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Editor IJCATR
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)IAESIJEECS
 
Quality assessment for online iris
Quality assessment for online irisQuality assessment for online iris
Quality assessment for online iriscsandit
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...csandit
 
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET Journal
 
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...IRJET Journal
 

What's hot (20)

3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris Recognition3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris Recognition
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forest
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random Forest
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
New approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmNew approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithm
 
El4301832837
El4301832837El4301832837
El4301832837
 
Performance Evaluation of 2D Adaptive Bilateral Filter For Removal of Noise F...
Performance Evaluation of 2D Adaptive Bilateral Filter For Removal of Noise F...Performance Evaluation of 2D Adaptive Bilateral Filter For Removal of Noise F...
Performance Evaluation of 2D Adaptive Bilateral Filter For Removal of Noise F...
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode Decomposition
 
Ed34785790
Ed34785790Ed34785790
Ed34785790
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
By33458461
By33458461By33458461
By33458461
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)
 
Quality assessment for online iris
Quality assessment for online irisQuality assessment for online iris
Quality assessment for online iris
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
 
F045033337
F045033337F045033337
F045033337
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
 
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
 
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
 
23-02-03[1]
23-02-03[1]23-02-03[1]
23-02-03[1]
 

Viewers also liked

8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_systemsukanya thatamsetty
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 

Viewers also liked (6)

8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 

Similar to AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TECHNIQUE

Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdfmokamojah
 
Ijarcet vol-2-issue-3-920-924
Ijarcet vol-2-issue-3-920-924Ijarcet vol-2-issue-3-920-924
Ijarcet vol-2-issue-3-920-924Editor IJARCET
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...TELKOMNIKA JOURNAL
 
Secure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognitionijsrd.com
 
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...MDABDULMANNANMONDAL
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
Application of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewApplication of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewIRJET Journal
 
13 pradeep kumar_137-149
13 pradeep kumar_137-14913 pradeep kumar_137-149
13 pradeep kumar_137-149Alexander Decker
 
A Novel Undistorted Image Fusion and DWT Based Compression Model with FPGA Im...
A Novel Undistorted Image Fusion and DWT Based Compression Model with FPGA Im...A Novel Undistorted Image Fusion and DWT Based Compression Model with FPGA Im...
A Novel Undistorted Image Fusion and DWT Based Compression Model with FPGA Im...Associate Professor in VSB Coimbatore
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment University of Moratuwa
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
 
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...cscpconf
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System OperationsIRJET Journal
 

Similar to AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TECHNIQUE (20)

E017443136
E017443136E017443136
E017443136
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
 
366 369
366 369366 369
366 369
 
Ijarcet vol-2-issue-3-920-924
Ijarcet vol-2-issue-3-920-924Ijarcet vol-2-issue-3-920-924
Ijarcet vol-2-issue-3-920-924
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...
 
Secure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognition
 
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris RecognitionComparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
 
Iris sem
Iris semIris sem
Iris sem
 
Application of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewApplication of Digital Image Correlation: A Review
Application of Digital Image Correlation: A Review
 
13 pradeep kumar_137-149
13 pradeep kumar_137-14913 pradeep kumar_137-149
13 pradeep kumar_137-149
 
A Novel Undistorted Image Fusion and DWT Based Compression Model with FPGA Im...
A Novel Undistorted Image Fusion and DWT Based Compression Model with FPGA Im...A Novel Undistorted Image Fusion and DWT Based Compression Model with FPGA Im...
A Novel Undistorted Image Fusion and DWT Based Compression Model with FPGA Im...
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
 
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System Operations
 

More from IJEEE

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoIJEEE
 
Id136
Id136Id136
Id136IJEEE
 
Id135
Id135Id135
Id135IJEEE
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemIJEEE
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierIJEEE
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...IJEEE
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...IJEEE
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas IJEEE
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyIJEEE
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewIJEEE
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyIJEEE
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsIJEEE
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications IJEEE
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsIJEEE
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyIJEEE
 

More from IJEEE (20)

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using Arduino
 
Id136
Id136Id136
Id136
 
Id135
Id135Id135
Id135
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric System
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A Survey
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS Technology
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI Interconnects
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm Technology
 

Recently uploaded

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube ExchangerAnamika Sarkar
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 

Recently uploaded (20)

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 

AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TECHNIQUE

  • 1. ICRTEDC-2014 32 Vol. 1, Spl. Issue 2 (May, 2014) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 GV/ICRTEDC/08 AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TECHNIQUE Sakshi Sharma Electronics & Communication Engineering Department, Chandigarh Engineering College, Mohali, Punjab cecm.ece.ssh@gmail.com Abstract—The biometric person authentication technique based onthe pattern of the human iris is well suited to be applied to any access control system requiring a high level ofsecurity. This paper proposes a new iris recognition system that implements Integro-Differential, Daugman Rubber Sheet Model, 2-D DCT, Hamming Distance to exact features from the iris and matching it with the sotred database.All these image-processing algorithms have been validated on noised real iris images & UBIRISdatabase. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates. 1. INTRODUCTION Biometrics refers to the quantifiable data (or metrics) related to human characteristics and traits. Biometrics identification (or biometric authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics. Types of Biometrics Biometric system is broadly categorized in two types: Physiological and behavioral. Figure 1: Types of biometrics I. Working principle of biometrics Biometrics device consists of a scanning device and software, that converts the gathered information into digital form, and a database or memory that stores the biometric data for comparison with previous records saved in the system. After converting the biometric input into digital form, the software identifies the match points in the data values. The match points are processed using algorithm into a value that can be compared with biometric data already stored in the data base. All biometric systems require comparing a registered biometric sample against a newly captured biometric sample. Advantages of Using Biometrics: Easier fraud detection. Better than password/PIN or smart cards. No need to memorize passwords. Require physical presence of the person to be identified. Physical characteristics are unique. It providesaccurate results. 2. BACKGROUND The below table shows the related research work: RESEARCHE R NAME YEA R ALGORITH M USED DRAWBACK S John G. Daugman 1994 Integro- Differential, Daugman Rubber Sheet Model, 2-D Gabor Filter, XOR operator Hamming Distance. Integro- differential operator fails in case of noise and total execution time is also very high. W. W. Boles and B. Boashash 1998 1-D wavelet transforms, Edge detection technique, Zero crossing representation . Algorithms are tested on few number of Iris images, Correct recognition rate is 92%, Equal Error rate is 8.13%.
  • 2. 33 ICRTEDC -2014 Zhonghua Lin and Bibo Lu 2010 Morlet wavelet transforms Polar co- ordinate transform. Recognition rate is low of the system. Bimi Jain, Dr. M.K. Gupta and Prof. Jyoti Bharti 2012 Fast Fourier transform, Euclidean distance for matching. Algorithm tested only on 10 images, FAR and FRR are also not declared and Euclidean distance technique make computational slow. Mohd. T. Khan 2013 1-D Log Gabor filter, K- dimensional tree technique for matching. Search efficiency is decreased by large tree size and FAR, FRR, ERR are not mentioned in results. 3. PROPOSED APPROACH Figure 2: Proposed approach SEGMENTATION The color image is firstly converted into gray scale image; it means that the luminance of colored image is converted into gray shade. The first stage of iris recognition is to isolate the actual iris region in a digital eye image. The iris region, shown in Figure 4, can be approximated by two circles, first one is for the iris boundary region and second one is for the pupil boundary region. The eyelids and eyelashes cover the upper and lower parts of the iris region. Specular reflections can also occur within the iris region resulting into corrupting the iris pattern. Figure 3:Grayscale iris image NORMALIZATION Once the segmentation module has estimated the iris’s boundary, the normalization process will transform the circular iris region into another shape which will have the same constant dimensions [8]. We can be using Daugman’s Rubber Sheet Model for normalization. This model transforms the iris texture from Cartesian to polar coordinates. This process is called as iris unwrapping, which have a rectangular entity that is used for further subsequent processing. The transformation of normal Cartesian to polar coordinates is recommended which maps the entire pixels in the iris area into a pair of polar coordinates (r, θ), where r and θ represents the intervals of [0 1] and[0 2π] as shown in figure 5. Daugman’s Rubber Sheet Model: For normalization Daugman has invented the Rubber Sheet Model in which he remaps each point within the iris region to a pair of polar coordinates (r,θ) where r is on the interval [0,1] and θ is angle [0,2π]. Normalisation accounts for variations in pupil size due to changes in external illumination that might influence iris size, it also ensures that the irises of different individuals are mapped onto a common image domain in spite of the variations in pupil size across subjects etc. Figure 4: Normalized Iris FEATURE EXTRACTION After the iris is normalized, it is compressed by using mathematical functions and converted in to binary forms. Each isolated iris pattern is then encoded using DCT method to extract its binary information. Discrete Cosine Transform: A discrete cosine transform (DCT) expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies. DCT algorithm is very efficient in image compression applications which makes further computational easy in the system. Discrete cosine transform provides the output in the form of matrix. 33 ICRTEDC -2014 Zhonghua Lin and Bibo Lu 2010 Morlet wavelet transforms Polar co- ordinate transform. Recognition rate is low of the system. Bimi Jain, Dr. M.K. Gupta and Prof. Jyoti Bharti 2012 Fast Fourier transform, Euclidean distance for matching. Algorithm tested only on 10 images, FAR and FRR are also not declared and Euclidean distance technique make computational slow. Mohd. T. Khan 2013 1-D Log Gabor filter, K- dimensional tree technique for matching. Search efficiency is decreased by large tree size and FAR, FRR, ERR are not mentioned in results. 3. PROPOSED APPROACH Figure 2: Proposed approach SEGMENTATION The color image is firstly converted into gray scale image; it means that the luminance of colored image is converted into gray shade. The first stage of iris recognition is to isolate the actual iris region in a digital eye image. The iris region, shown in Figure 4, can be approximated by two circles, first one is for the iris boundary region and second one is for the pupil boundary region. The eyelids and eyelashes cover the upper and lower parts of the iris region. Specular reflections can also occur within the iris region resulting into corrupting the iris pattern. Figure 3:Grayscale iris image NORMALIZATION Once the segmentation module has estimated the iris’s boundary, the normalization process will transform the circular iris region into another shape which will have the same constant dimensions [8]. We can be using Daugman’s Rubber Sheet Model for normalization. This model transforms the iris texture from Cartesian to polar coordinates. This process is called as iris unwrapping, which have a rectangular entity that is used for further subsequent processing. The transformation of normal Cartesian to polar coordinates is recommended which maps the entire pixels in the iris area into a pair of polar coordinates (r, θ), where r and θ represents the intervals of [0 1] and[0 2π] as shown in figure 5. Daugman’s Rubber Sheet Model: For normalization Daugman has invented the Rubber Sheet Model in which he remaps each point within the iris region to a pair of polar coordinates (r,θ) where r is on the interval [0,1] and θ is angle [0,2π]. Normalisation accounts for variations in pupil size due to changes in external illumination that might influence iris size, it also ensures that the irises of different individuals are mapped onto a common image domain in spite of the variations in pupil size across subjects etc. Figure 4: Normalized Iris FEATURE EXTRACTION After the iris is normalized, it is compressed by using mathematical functions and converted in to binary forms. Each isolated iris pattern is then encoded using DCT method to extract its binary information. Discrete Cosine Transform: A discrete cosine transform (DCT) expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies. DCT algorithm is very efficient in image compression applications which makes further computational easy in the system. Discrete cosine transform provides the output in the form of matrix. 33 ICRTEDC -2014 Zhonghua Lin and Bibo Lu 2010 Morlet wavelet transforms Polar co- ordinate transform. Recognition rate is low of the system. Bimi Jain, Dr. M.K. Gupta and Prof. Jyoti Bharti 2012 Fast Fourier transform, Euclidean distance for matching. Algorithm tested only on 10 images, FAR and FRR are also not declared and Euclidean distance technique make computational slow. Mohd. T. Khan 2013 1-D Log Gabor filter, K- dimensional tree technique for matching. Search efficiency is decreased by large tree size and FAR, FRR, ERR are not mentioned in results. 3. PROPOSED APPROACH Figure 2: Proposed approach SEGMENTATION The color image is firstly converted into gray scale image; it means that the luminance of colored image is converted into gray shade. The first stage of iris recognition is to isolate the actual iris region in a digital eye image. The iris region, shown in Figure 4, can be approximated by two circles, first one is for the iris boundary region and second one is for the pupil boundary region. The eyelids and eyelashes cover the upper and lower parts of the iris region. Specular reflections can also occur within the iris region resulting into corrupting the iris pattern. Figure 3:Grayscale iris image NORMALIZATION Once the segmentation module has estimated the iris’s boundary, the normalization process will transform the circular iris region into another shape which will have the same constant dimensions [8]. We can be using Daugman’s Rubber Sheet Model for normalization. This model transforms the iris texture from Cartesian to polar coordinates. This process is called as iris unwrapping, which have a rectangular entity that is used for further subsequent processing. The transformation of normal Cartesian to polar coordinates is recommended which maps the entire pixels in the iris area into a pair of polar coordinates (r, θ), where r and θ represents the intervals of [0 1] and[0 2π] as shown in figure 5. Daugman’s Rubber Sheet Model: For normalization Daugman has invented the Rubber Sheet Model in which he remaps each point within the iris region to a pair of polar coordinates (r,θ) where r is on the interval [0,1] and θ is angle [0,2π]. Normalisation accounts for variations in pupil size due to changes in external illumination that might influence iris size, it also ensures that the irises of different individuals are mapped onto a common image domain in spite of the variations in pupil size across subjects etc. Figure 4: Normalized Iris FEATURE EXTRACTION After the iris is normalized, it is compressed by using mathematical functions and converted in to binary forms. Each isolated iris pattern is then encoded using DCT method to extract its binary information. Discrete Cosine Transform: A discrete cosine transform (DCT) expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies. DCT algorithm is very efficient in image compression applications which makes further computational easy in the system. Discrete cosine transform provides the output in the form of matrix.
  • 3. ICRTEDC-2014 34 MATCHING The matching algorithm consists of all the image processing steps that are carried out at the time of enrolling the encoded iris template in database. Once the bit encrypted bit pattern B’ corresponding to binary image formed is extracted, it is tried to match with all stored encrypted bit patterns B using simple Boolean XOR operation[2]. The dissimilarity measure between any two iris bit patterns is computed using Hamming Distance (HD) which is given as, Where, N=total number of bits in each bit pattern. As HD is a fractional measure of dissimilarity with 0 representing A perfect match, a low normalized HD implies strong similarity of iris codes. FIGURE 5: IRIS RECOGNITION TECHNOLOGY[21] 4. RESULTS & CONCLUSIONS This work proposes a modified iris recognition system based on 2D DCT and Daughman rubber sheet is used for normalization is based on minimizing the effect of the eyelids and eyelashes by trimming the iris area above the upper and the area below the lower boundaries of the pupil. The Experimental results also indicate that the performance of the proposed technique is computationally effective as well as reliable in terms of recognition rate of 93.2%. The combination of Daughman rubber sheet and 2D DCT is promising. REFERENCES [1] G K. Jain, L. Hong and S. Pankanti, Biometrics: Promising Frontiers for Emerging Identification Market, Comm. ACM ,pp. 91-98, Feb. 2000. [2] A. Ross, D. Nandakumar, A.K. Jain, Handbook of Multibiometrics, . Springer, Heidelberg (2006). [3] J. Daugman , How iris recognition works, IEEE Trans. onCircuits and Systems for Video Technology., Vol. 14, No. 1,pp. 21-30, January 2004. [4] L. Flom, A. Safir, Iris recognition system, US Patent 4641394, 1987. [5] K.W. Bowyer, K. Hollingsworth, P. J. Flynn, Image Understanding for Iris Biometrics: A Survey, Computer vision and Image Understanding, Vol. 110, Issue 2, pp. 281- 307, 2008. [ 6] J. Daugman, High Confidence Visual Recognition of Persons by a Test of Statistical Independence, IEEE Trans.on Pattern Analysis and Machine Intelligence, Vol. 15, No.11, pp.1148-1161, 1993. [7] J. Daugman, C.Downing, Epigenetic randomness, complexityand singularity of human iris patterns, Proc. R. Soc. Lond. B268, pp. 1737–1740, 2001. [8] J. Daugman , How iris recognition works, IEEE Trans. onCircuits and Systems for Video Technology., Vol. 14, No. 1,pp. 21-30, January 2004. [9] Center for Biometrics and Security Research, CASIA Iris ImageA. K Jain, P. Flynn, and A. Ross, Handbook of Biometrics, New York: Springer, 2008. [10] Sunita V. Dhavale ”DWT and DCT based Robust Iris Feature Extraction and Recognition Algorithm for Biometric Personal Identification”, International Journal of Computer Applications (0975 – 8887), Volume 40– No.7, February 2012. [11] J. Daugman “How iris recognition works”, Proceedings of 2002 International Conference on Image Processing, Vol.1, 2002. [12] J. Daugman. “Biometric personal identification system based on iris analysis” United States International Journal of Advanced Trends in Computer Science and Engineering, Vol.2, No.1, Pages : 93-97 (2013) Special Issue of ICACSE 2013 - Held on 7-8 January, 2013 in Lords Institute of Engineering and Technology, Hyderabad. [13] Human eye. “Encyclopedia Britannica” from Encyclopedia Britannica Ultimate Reference Suite DVD, 2006. [14] Libor Masek, “Recognition of Human Iris Patterns for Biometric Identification”, The University of Western Australia, 2003. [15] Bowyer K.W., Kranenburg C., Dougherty S. “Edge Detector Evaluation using Empirical ROC Curves”, IEEE Conference on Computer Vision and Pattern Recognition(CVPR), pp. 354-359,1999. [16]B.Sabarigiri1, T.Karthikeyan2, “Acquisition of Iris Images, Iris Localization, Normalization and Quality Enhancement for Personal Identification”, International Journal of Emerging Trends &Technology in Computer Science (IJETTCS),Volume 1, Issue 2, July – August 2012. [17] Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric Identification". Communications of the ACM,43(2), p. 91- 98. DOI 10.1145/328236.328110. [18] Mayuri Memane, Sanjay Ganorkar, “DWT Based Iris Recognition”, International Journal of Engineering Science and Technology (IJEST),Vol. 4 No.08 August 2012. [19] John G. Daugman, (1994), “Biometric Personal Identification System based on Iris Analysis”, U.S. Patent no. 5291560 A, publish date 1 march, 1994. [20] Boles and Boashash, (1998), “A Human Identification Technique Using Images of the Iris and Wavelet Transform”, IEEE Transactions on Signal Processing, vol. 46, no. 4, pp. 1185-1188. [21] www.google.com