SlideShare a Scribd company logo
1 of 5
Himanshu Srivastava / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.449-453
449 | P a g e
Personal Identification Using Iris Recognition System, a Review
Himanshu Srivastava
Department of Computer Science & Engineering, Roorkee Institute of Technology, Roorkee (U.K.), India
himanshu.shree@gmail.com
Abstract
A biometric system provides automatic identification
of an individual based on a unique feature or
characteristic possessed by the individual. Unlike other
biometric such as fingerprints and face recognition,
the distinct aspect of iris comes from randomly
distributed features. Iris recognition is regarded as the
most reliable and accurate biometric identification
system available. In this paper, I describe the novel
techniques developed to create an Iris Recognition
System available. This paper proposes a personal
identification using iris recognition system with the
help of six major steps i.e. image acquisition,
localization, Isolation, normalization, feature
extraction and matching and also these six steps
consists a numbers of minor steps to complete each
step. The boundaries of the iris, as papillary and
limbic boundary, are detected by using Canny Edge
Detector & Circular Hough Transformation. We can
use masking technique to isolate the iris image form
the given eye image, this isolated iris image is
transformed from Cartesian to polar co-ordinate. Now
finally extract the unique features (feature vector) of
the iris after enhancing the iris image and then
perform matching process on iris code using Hamming
Distance for acceptance and rejectance process. Her I
am giving my review after studying a number of
research papers and my proposed technique works
very well and can be easily implemented.
Keywords: Biometrics, Iris Code, Edge Detection,
Transformation, Masking, Feature Vector,
Hamming Distance.
I. Introduction
Now a days, one of the main threats that IT system
and security environment can have, is the possibility
of intruders in the system. This is normally solved
by user authentication schemes based on passwords,
secret codes and identification cards or tokens.
Schemes based only on passwords or secret codes
can be cracked by intercepting the presentation of
such a password or by brute force attacks. On the
other hand, an intruder can attack systems based on
identification card or token by robbing, copying or
simulating them. As it is a well-known, biometric
deal with identification of individuals based on their
physical and behavioral features.
Biometric solutions, such as identification systems
using fingerprint, iris, face, and palm print, hand
geometry, signature, etc; have many advantages
over the traditional authentication techniques based
on what you know or what you possess. Instead of
carrying bunk of keys, all those access cards or
passwords you carry around with you, your body
can be used to uniquely identify you. Among them,
iris recognition is tested as the most accurate
manner of personal identification. Therefore
nowadays many automatic security systems based
on iris recognition have been deployed worldwide
for border control, restricted access and so on.
Figure 1: Texture rich iris image [1]
This technique performs better identification than
other biometric identification because I am using an
iris which has an extraordinary structure and
provides many interlacing minute characteristics
such as freckles, coronas, strips, furrow, and crypts
and so on [2]. These visible characteristics,
generally called the texture of the iris, are unique to
each subject. The iris patterns of the two eyes of an
individual or those of identical twins babies are
completely independent and uncorrelated [3]. All
biometric systems are suffered from two types of
errors as false acceptance and false rejectance. But
iris recognition system gives us lesser false
acceptance and false rejectance rate than any other
personal recognition system because iris is protected
behind the eyelid, cornea and aqueous means that,
unlike other biometrics such as fingerprints, the
likelihood of damage is minimal also the iris is not
subject to the effect of aging which means it remains
in a stable from about the age of one until death [4]
[5] so we do not need to update database again and
again over passes time. Thus the entire system is
giving us maximum accuracy and less error rate for
personal identification in biometric analysis.
Some current and future Applications: There is
world wide applications area of iris recognition
system. National border controls as living passport,
computer login: a password, secure access to bank
account at ATM machine, ticketless travel,
authentication in networking, permission access
control to home, office, laboratory etc, driving
licenses, and other personal certificates, tracing
missing or wanted persons, anti-terrorism, security
at airports, using as any type of password[6].
Figure 2: Traveler using iris scans security system [7]
Himanshu Srivastava / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.449-452
450 | P a g e
Figure 3: Mobile Security [8]
Figure 4: Security checking at border [9]
This paper represents the review about identification
of a person using iris recognition, after study a
number of papers, articles. My paper is organized as
follows: background work by a number of authors,
researcher are given as related work in section II, in
my system, how it works, all the major and minor
steps as image capturing, edge detection, finding
inner and outer boundary, isolation, Cartesian to
Polar Transformation, enhancing the image,
extracting features and matching, the entire my
system approaches are given as iris recognition
system in section III, the entire theme and future
work is given as conclusion in section IV, in the last
all the papers and websites which I have used to
provide this review is given under the heading
references in section V.
II. Related work
Related to this system so many authors present their
techniques, in this system I studied most of the good
papers in sequence.
Flom and Safir first proposed the concept of
automated iris recognition [10]. A report was
published by Johansson in 1992 without any
experimental results. Since then, iris recognition has
been receiving many researchers attention and a
great deal of progress has been achieved in the last
decade. For instance, Daugman realized an iris
recognition system and the identification accuracy is
up to 98.9%. Daugman proposed Integro-
Differentiation method to find the pupil and iris
boundary [11] he assumes pupil and iris boundary to
be circular [12]. Daugman’s iris recognition
algorithm is based on the principle of the failure of a
test of statistical independence on iris phase
structure encoded by Quadrature Wavelets. Boles
and Boas hash [13] calculated Zero-Crossing
representation of 1-D Wavelet Transform at various
resolution levels of a virtual circle on an iris image
to characterize the texture of the iris. Iris matching
was based on two dissimilarity functions. Wildes et
al. [4] represented the iris texture with a Laplacian
Pyramid constructed with four different resolution
levels.
III. Iris Recognition System
When a subject wishes to be identified by iris
recognition system, his/her eye is first photographed
and then a template (iris code) created for his/her
iris region. This template is then compared with the
other templates stored in a database until either a
matching template is found and the subject is
identified or no match is found and the subject
remains unidentified. There are several method for
accomplishing single task as edge detection I have
Sobel Operator, Prewitt Operator, Canny Edge
Detection, Roberts method and so on, for boundary
detection as Hough Transformation, Circular Hough
Transformation, Integro-Differential Operator,
Gradient based approach, Clustering algorithms and
so on, for feature extraction I have phase based
methods, zero crossing and texture analysis based
methods.
As per studied by various papers a well defined
steps have come in my mind which can be disclose
for various readers, researchers and dictated in the
form of diagram as shown in figure:5 given below.
Figure 5: My System
Image acquisition: This is our very first step of the
entire process. When a person wishes to be
identified by iris recognition system, his/her eye is
first photographed. The camera can be positioned
between three and a half inches and one meter to
Himanshu Srivastava / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.449-452
451 | P a g e
capture the image. In the manual procedure, the user
needs to adjust the camera to get the iris in focus
and needs to be within six to twelve inches of the
camera. This process is much more manually
intensive and requires proper user training to be
successful. We must consider that the occlusion,
lighting, number of pixels on the iris are factors that
affect the image quality [14]. A number of
researchers have been used Chinese Academy of
Sciences' Institute of Automation (CASIA) [15] and
Malaysia Multimedia University (MMU) [16]
database to perform their research.
Figure 6: Sample iris images [17]
Localization: The acquired iris image has to be
preprocessed to detect the iris, which is an annular
portion between the pupil (inner boundary) and the
sclera (outer boundary). The first step in iris
localization is to detect pupil which is the black
circular part surrounded by iris tissues. The center of
pupil can be used to detect the outer radius of iris
patterns. The important steps involved are:
1. Pupil detection
2. Outer iris localization
Well-known methods such as the Integro-
Differential Operator, Hough Transform and Active
Contour models have been successful techniques in
detecting the boundaries. The iris localization
proposed by Tisse et al. is a combination of the
Integro-Differential Operator and the Hough
Transform. The Hough Transform is used for a
quick guess of the pupil center and then the Integro-
Differential Operator is used to accurately locate
pupil and limbus using a smaller search space [18].
But in this paper I am using Canny Edge Detection
for detecting edges in the entire eye image after that
applying Circular Hough Transformation for
detecting outer boundary of iris by using pupil
center and inner boundary of iris.
Figure 7: localized iris image [15]
Isolation: Now the task is to isolate the iris. In the
images used, there is some presence of the white of
the eye. This was done by using a masking
technique as here I am choosing best technique
among other so I will use Gaussian Mask and then
cropping the image to minimize the area that does
not contain any edge data. The mask is a circular
one which has the same radius as the iris. It thus
passes all pixels that are contained in the circle
which are all the pixels forming the iris. By making
use of the center and the radius which are calculated
in advanced step, we set the polar coordinate
system. In this coordinate system, the feature of the
iris is extracted.
Figure 8: Isolated iris image [17]
Normalization: For the purpose of accurate texture
analysis, it is necessary to compensate this
deformation. Since both the inner and outer
boundaries of the iris have been detected so it is
easy to map the iris ring to a rectangular block of
texture of a fixed size. The Cartesian to polar
reference transform suggested by Daugman [12]
authorizes equivalent rectangular representation of
the zone of interest as shown figure. In this way I
compensate the stretching of the iris texture as the
pupil changes in size, and unfold the frequency
information contained in the circular texture in order
to facilitate next feature extraction. Also this process
is very necessary because feature extraction and
matching process becomes easy.
Figure 9: Depicted how iris image is converted to Polar
Coordinate
Thus the following set of equations [4] is used to
transform the annular region of iris into polar
equivalent.
I(x(ρ, θ), y(ρ, θ)=>I(ρ,θ)
With
xp(ρ,θ)=xp0(θ)+rp*cos(θ)
yp(ρ,θ)=yp0(θ)+rp*sin(θ)
xi(ρ,θ)=xi0(θ)+ri*cos(θ)
yi(ρ,θ)=yi0(θ)+ri*sin(θ)
Where, rp and ri are respectively the radius of pupil
and the iris, while (xp(θ), yp(θ)) and (xi(θ), yi(θ)) are
the coordinates of the pupillary and limbic
boundaries in the direction θ. The value of θ belongs
to [0; 2], ρ belongs to [0; 1].
Figure 10: Unwrapped image [17]
Enhancement and denoising: The normalized iris
image still has low contrast and may have non-
uniform illumination caused by the position of light
sources. In order to obtain more well-distributed
Himanshu Srivastava / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.449-452
452 | P a g e
texture image, we enhance iris image by means of
local histogram equalization and remove high
frequency noises by filtering the image with an
appropriate filter.
Figure 11: Iris image after enhancement and denoising [17]
Feature Extraction: Lim et al. [19] also use the
Wavelet Transform to extract features from the iris
region. Both the Gabor Transform and the Haar
Wavelet are considered as the Mother Wavelet.
Laplacian of Gaussian (LoG) is also used in
previous papers. In my paper, using Haar Wavelet,
decomposing upto 4th
level a feature vector with 87
dimensions is computed. Since each dimension has
a real value ranging from -1.0 to +1.0, the feature
vector is sign quantized so that any positive value is
represented by 1 and negative value as 0. This
results in a compact biometric template consisting of
only 87 bits.
Storing and Matching: Now this is our final phase
for completing our system. Here we will store the 87
bit iris code or template in our database for future
matching and this matching is done with the help of
an efficient matching algorithm here we are using
Hamming Distance algorithm for the recognition of
two samples that is reference template and
enrollment template. It is basically uses an exclusive
OR (XOR) function between two bit patterns.
Hamming Distance is a measure, which delineate
the differences, of iris codes. Every bit of presented
iris code is compared to the every bit of referenced
iris code, if the two bits are the same, e.g. two 1‟s or
two 0‟s, the system assigns a value „0‟ to that
comparison and if the two bits are different, the
system assigns a value „1‟ to that comparison. The
formula for iris matching is
shown as follows:
HD =1/N∑ (Pi ⊕ Ri) [13]
where N is the dimension of feature vector, Pi is the
ith component of the presented feature vector while
Ri is the ith component of the referenced feature
vector.
Here we can set the threshold value if the resultant
value is greater than threshold value, then reject the
iris else accepted the user iris.
As per review I am giving my thought in matching
process which can be represented by a diagram
named storing and matching process in figure: 12.
Figure 12: Storing and matching process
IV. Conclusion
In this review paper I show how a person can be
identified by a number of ways but instead of
carrying bunk of keys or remembering things as
passwords we can use us as living password, which
is called biometric recognition technology it uses
physical characteristics or habits of any person for
identification. In biometrics we have a number of
characteristics which we are using in our recognition
technology as fingerprint, palm print, signature,
face, iris recognition, thumb impression and so on
but among these irises recognition is best
technology for identification of a person. I can say
that this technology is not completely developed and
we need a number of scientists, researchers and
developer who can work on this technology and can
complete the dream of Mr. Daugman by applying
the uses of iris recognition in each and every field
where security is needed by the human being.
References
[1] http://www.amazingincredible.com/show/8
2-the-incredible-human-eye (last referred
on 26 April 2013)
[2] P.W. Hallinan, “Recognizing Human
Eyes,” Geomtric Methods Comput.
Vision,vol. 1570, pp.214-226, 1991.
[3] J. Daugman and C. Downing, “Epigenetic
Randomness, Complexity, and Singularity
of Human Iris Patterns,” Proc. Royal Soc.
(London) B: Biological Sciences, vol. 268,
pp. 1737-1740, 2001.
[4] R. Wildes, J. Asmuth, G. Green, S. Hsu, R.
Kolczynski, J. Matey, S. McBride, “A
Machine-vision System for Iris
Recognition,” vol. 9, pp.1-8, 1996.
[5] R.P. Wildes, “Iris Recognition: An
Emerging Biometric Technology,”
Proceedings of the IEEE, Sept. vol.85,
pp.1348-1363, 1997.
[6] http://www.cl.cam.ac.uk/~jgd1000/applics.
html (last referred on 26 April 2013)
Himanshu Srivastava / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.449-452
453 | P a g e
[7] http://www.forbes.com/global/2010/0412/e
ntrepreneurs-hector-hoyos-iris-scanners-
identity-we-see-you.html (last referred on
26 April 2013)
[8] http://pinktentacle.com/2006/11/iris-
recognition-technology-for-mobile-phones/
(last referred on 26 April 2013)
[9] http://www.freedomsphoenix.com/News/0
81163-2010-12-31-were-next-napolitano-
in-afghanistan-to-see-iris-scanning-at.htm
[10] L. Flom and A. Safir, “Iris Recognition
System,” U.S. Patent, No. 4641394, 1987.
[11] A. Bertillon. La couleur de Piris. “Revue
scientifique,” vol. 36, no. 3, pp. 65-73,
1885.
[12] J.G. Daugman, “High Confidence Visual
Recognition of Persons by a Test of
Statistical Independence,” IEEE Trans.
Pattern Anal. Mach. Intelligence, vol. 15,
no.11, pp.1148-1161, 1993.
[13] W. Boles and B. Boas hash, “A Human
Identification Technique Using Images of
the Iris and Wavelet Transform,” IEEE
Trans. on Signal Processing, vol. 46, no. 4,
pp.1185-1188, 1998.
[14] Kevin W. Bowyer, Karen Hollingsworth,
Patrick J. Flynn, “Image Understanding for
Iris Biometrics: A Survey, Computer
Vision and Image Understanding,” Vol.
110, Issue 2, pp. 281-307, 2008.
[15] http://www.idealtest.org/dbDetailForUser.d
o?id=4 (last referred on 26 April 2013)
[16] http://pesona.mmu.edu.my/~ccteo/ (last
referred on 26 April 2013)
[17] Li Ma, Yunhong Wang, Tieniu Tan, “Iris
Recognition Using Circular Symmetric
Filters,” National Laboratory of Pattern
Recognition, Institute of Automation,
Chinese Academy of Sciences, P.R.China.
[18] C.Tisse L. Martin L. Torres and M. Robert,
“Person Identification Technique Using
Human Iris Recognition," Proc. Vision
Interface, pp. 294-299, 2002.
[19] S. Lim, K. Lee, O. Byeon, T. Kim,
“Efficient iris recognition through
improvement of feature vector and
classifier,” ETRI Journal, Korea, vol.
23, no. 2, 2001.

More Related Content

What's hot

“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation SystemMohamed Refaei
 
RETINA IDENTIFICATION
RETINA IDENTIFICATIONRETINA IDENTIFICATION
RETINA IDENTIFICATIONislam_injamul
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Techniqueijsc
 

What's hot (19)

“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation System
 
RETINA IDENTIFICATION
RETINA IDENTIFICATIONRETINA IDENTIFICATION
RETINA IDENTIFICATION
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
E0364024030
E0364024030E0364024030
E0364024030
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 

Viewers also liked (20)

Co33548550
Co33548550Co33548550
Co33548550
 
Cm33537542
Cm33537542Cm33537542
Cm33537542
 
Bb33307314
Bb33307314Bb33307314
Bb33307314
 
Bc33315326
Bc33315326Bc33315326
Bc33315326
 
Ci33514517
Ci33514517Ci33514517
Ci33514517
 
Bv33439448
Bv33439448Bv33439448
Bv33439448
 
Fp3410401046
Fp3410401046Fp3410401046
Fp3410401046
 
Hd3413181323
Hd3413181323Hd3413181323
Hd3413181323
 
Fm3410261031
Fm3410261031Fm3410261031
Fm3410261031
 
Ck35487490
Ck35487490Ck35487490
Ck35487490
 
Cr35524530
Cr35524530Cr35524530
Cr35524530
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Dl35622627
Dl35622627Dl35622627
Dl35622627
 
Dd35584588
Dd35584588Dd35584588
Dd35584588
 
Ch35473477
Ch35473477Ch35473477
Ch35473477
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
Df35592595
Df35592595Df35592595
Df35592595
 
Dh35601604
Dh35601604Dh35601604
Dh35601604
 
Cf33497503
Cf33497503Cf33497503
Cf33497503
 
Glaerur+ii+hluti+1300 1800
Glaerur+ii+hluti+1300 1800Glaerur+ii+hluti+1300 1800
Glaerur+ii+hluti+1300 1800
 

Similar to Bw33449453

Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique ijsc
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationIOSR Journals
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceIOSR Journals
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
A Novel Approach for Detecting the IRIS Crypts
A Novel Approach for Detecting the IRIS CryptsA Novel Approach for Detecting the IRIS Crypts
A Novel Approach for Detecting the IRIS CryptsIJERDJOURNAL
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...nooriasukmaningtyas
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABijtsrd
 

Similar to Bw33449453 (20)

L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
50120130406045
5012013040604550120130406045
50120130406045
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
I017335457
I017335457I017335457
I017335457
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person Authentication
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
A Novel Approach for Detecting the IRIS Crypts
A Novel Approach for Detecting the IRIS CryptsA Novel Approach for Detecting the IRIS Crypts
A Novel Approach for Detecting the IRIS Crypts
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Bw33449453

  • 1. Himanshu Srivastava / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.449-453 449 | P a g e Personal Identification Using Iris Recognition System, a Review Himanshu Srivastava Department of Computer Science & Engineering, Roorkee Institute of Technology, Roorkee (U.K.), India himanshu.shree@gmail.com Abstract A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Unlike other biometric such as fingerprints and face recognition, the distinct aspect of iris comes from randomly distributed features. Iris recognition is regarded as the most reliable and accurate biometric identification system available. In this paper, I describe the novel techniques developed to create an Iris Recognition System available. This paper proposes a personal identification using iris recognition system with the help of six major steps i.e. image acquisition, localization, Isolation, normalization, feature extraction and matching and also these six steps consists a numbers of minor steps to complete each step. The boundaries of the iris, as papillary and limbic boundary, are detected by using Canny Edge Detector & Circular Hough Transformation. We can use masking technique to isolate the iris image form the given eye image, this isolated iris image is transformed from Cartesian to polar co-ordinate. Now finally extract the unique features (feature vector) of the iris after enhancing the iris image and then perform matching process on iris code using Hamming Distance for acceptance and rejectance process. Her I am giving my review after studying a number of research papers and my proposed technique works very well and can be easily implemented. Keywords: Biometrics, Iris Code, Edge Detection, Transformation, Masking, Feature Vector, Hamming Distance. I. Introduction Now a days, one of the main threats that IT system and security environment can have, is the possibility of intruders in the system. This is normally solved by user authentication schemes based on passwords, secret codes and identification cards or tokens. Schemes based only on passwords or secret codes can be cracked by intercepting the presentation of such a password or by brute force attacks. On the other hand, an intruder can attack systems based on identification card or token by robbing, copying or simulating them. As it is a well-known, biometric deal with identification of individuals based on their physical and behavioral features. Biometric solutions, such as identification systems using fingerprint, iris, face, and palm print, hand geometry, signature, etc; have many advantages over the traditional authentication techniques based on what you know or what you possess. Instead of carrying bunk of keys, all those access cards or passwords you carry around with you, your body can be used to uniquely identify you. Among them, iris recognition is tested as the most accurate manner of personal identification. Therefore nowadays many automatic security systems based on iris recognition have been deployed worldwide for border control, restricted access and so on. Figure 1: Texture rich iris image [1] This technique performs better identification than other biometric identification because I am using an iris which has an extraordinary structure and provides many interlacing minute characteristics such as freckles, coronas, strips, furrow, and crypts and so on [2]. These visible characteristics, generally called the texture of the iris, are unique to each subject. The iris patterns of the two eyes of an individual or those of identical twins babies are completely independent and uncorrelated [3]. All biometric systems are suffered from two types of errors as false acceptance and false rejectance. But iris recognition system gives us lesser false acceptance and false rejectance rate than any other personal recognition system because iris is protected behind the eyelid, cornea and aqueous means that, unlike other biometrics such as fingerprints, the likelihood of damage is minimal also the iris is not subject to the effect of aging which means it remains in a stable from about the age of one until death [4] [5] so we do not need to update database again and again over passes time. Thus the entire system is giving us maximum accuracy and less error rate for personal identification in biometric analysis. Some current and future Applications: There is world wide applications area of iris recognition system. National border controls as living passport, computer login: a password, secure access to bank account at ATM machine, ticketless travel, authentication in networking, permission access control to home, office, laboratory etc, driving licenses, and other personal certificates, tracing missing or wanted persons, anti-terrorism, security at airports, using as any type of password[6]. Figure 2: Traveler using iris scans security system [7]
  • 2. Himanshu Srivastava / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.449-452 450 | P a g e Figure 3: Mobile Security [8] Figure 4: Security checking at border [9] This paper represents the review about identification of a person using iris recognition, after study a number of papers, articles. My paper is organized as follows: background work by a number of authors, researcher are given as related work in section II, in my system, how it works, all the major and minor steps as image capturing, edge detection, finding inner and outer boundary, isolation, Cartesian to Polar Transformation, enhancing the image, extracting features and matching, the entire my system approaches are given as iris recognition system in section III, the entire theme and future work is given as conclusion in section IV, in the last all the papers and websites which I have used to provide this review is given under the heading references in section V. II. Related work Related to this system so many authors present their techniques, in this system I studied most of the good papers in sequence. Flom and Safir first proposed the concept of automated iris recognition [10]. A report was published by Johansson in 1992 without any experimental results. Since then, iris recognition has been receiving many researchers attention and a great deal of progress has been achieved in the last decade. For instance, Daugman realized an iris recognition system and the identification accuracy is up to 98.9%. Daugman proposed Integro- Differentiation method to find the pupil and iris boundary [11] he assumes pupil and iris boundary to be circular [12]. Daugman’s iris recognition algorithm is based on the principle of the failure of a test of statistical independence on iris phase structure encoded by Quadrature Wavelets. Boles and Boas hash [13] calculated Zero-Crossing representation of 1-D Wavelet Transform at various resolution levels of a virtual circle on an iris image to characterize the texture of the iris. Iris matching was based on two dissimilarity functions. Wildes et al. [4] represented the iris texture with a Laplacian Pyramid constructed with four different resolution levels. III. Iris Recognition System When a subject wishes to be identified by iris recognition system, his/her eye is first photographed and then a template (iris code) created for his/her iris region. This template is then compared with the other templates stored in a database until either a matching template is found and the subject is identified or no match is found and the subject remains unidentified. There are several method for accomplishing single task as edge detection I have Sobel Operator, Prewitt Operator, Canny Edge Detection, Roberts method and so on, for boundary detection as Hough Transformation, Circular Hough Transformation, Integro-Differential Operator, Gradient based approach, Clustering algorithms and so on, for feature extraction I have phase based methods, zero crossing and texture analysis based methods. As per studied by various papers a well defined steps have come in my mind which can be disclose for various readers, researchers and dictated in the form of diagram as shown in figure:5 given below. Figure 5: My System Image acquisition: This is our very first step of the entire process. When a person wishes to be identified by iris recognition system, his/her eye is first photographed. The camera can be positioned between three and a half inches and one meter to
  • 3. Himanshu Srivastava / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.449-452 451 | P a g e capture the image. In the manual procedure, the user needs to adjust the camera to get the iris in focus and needs to be within six to twelve inches of the camera. This process is much more manually intensive and requires proper user training to be successful. We must consider that the occlusion, lighting, number of pixels on the iris are factors that affect the image quality [14]. A number of researchers have been used Chinese Academy of Sciences' Institute of Automation (CASIA) [15] and Malaysia Multimedia University (MMU) [16] database to perform their research. Figure 6: Sample iris images [17] Localization: The acquired iris image has to be preprocessed to detect the iris, which is an annular portion between the pupil (inner boundary) and the sclera (outer boundary). The first step in iris localization is to detect pupil which is the black circular part surrounded by iris tissues. The center of pupil can be used to detect the outer radius of iris patterns. The important steps involved are: 1. Pupil detection 2. Outer iris localization Well-known methods such as the Integro- Differential Operator, Hough Transform and Active Contour models have been successful techniques in detecting the boundaries. The iris localization proposed by Tisse et al. is a combination of the Integro-Differential Operator and the Hough Transform. The Hough Transform is used for a quick guess of the pupil center and then the Integro- Differential Operator is used to accurately locate pupil and limbus using a smaller search space [18]. But in this paper I am using Canny Edge Detection for detecting edges in the entire eye image after that applying Circular Hough Transformation for detecting outer boundary of iris by using pupil center and inner boundary of iris. Figure 7: localized iris image [15] Isolation: Now the task is to isolate the iris. In the images used, there is some presence of the white of the eye. This was done by using a masking technique as here I am choosing best technique among other so I will use Gaussian Mask and then cropping the image to minimize the area that does not contain any edge data. The mask is a circular one which has the same radius as the iris. It thus passes all pixels that are contained in the circle which are all the pixels forming the iris. By making use of the center and the radius which are calculated in advanced step, we set the polar coordinate system. In this coordinate system, the feature of the iris is extracted. Figure 8: Isolated iris image [17] Normalization: For the purpose of accurate texture analysis, it is necessary to compensate this deformation. Since both the inner and outer boundaries of the iris have been detected so it is easy to map the iris ring to a rectangular block of texture of a fixed size. The Cartesian to polar reference transform suggested by Daugman [12] authorizes equivalent rectangular representation of the zone of interest as shown figure. In this way I compensate the stretching of the iris texture as the pupil changes in size, and unfold the frequency information contained in the circular texture in order to facilitate next feature extraction. Also this process is very necessary because feature extraction and matching process becomes easy. Figure 9: Depicted how iris image is converted to Polar Coordinate Thus the following set of equations [4] is used to transform the annular region of iris into polar equivalent. I(x(ρ, θ), y(ρ, θ)=>I(ρ,θ) With xp(ρ,θ)=xp0(θ)+rp*cos(θ) yp(ρ,θ)=yp0(θ)+rp*sin(θ) xi(ρ,θ)=xi0(θ)+ri*cos(θ) yi(ρ,θ)=yi0(θ)+ri*sin(θ) Where, rp and ri are respectively the radius of pupil and the iris, while (xp(θ), yp(θ)) and (xi(θ), yi(θ)) are the coordinates of the pupillary and limbic boundaries in the direction θ. The value of θ belongs to [0; 2], ρ belongs to [0; 1]. Figure 10: Unwrapped image [17] Enhancement and denoising: The normalized iris image still has low contrast and may have non- uniform illumination caused by the position of light sources. In order to obtain more well-distributed
  • 4. Himanshu Srivastava / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.449-452 452 | P a g e texture image, we enhance iris image by means of local histogram equalization and remove high frequency noises by filtering the image with an appropriate filter. Figure 11: Iris image after enhancement and denoising [17] Feature Extraction: Lim et al. [19] also use the Wavelet Transform to extract features from the iris region. Both the Gabor Transform and the Haar Wavelet are considered as the Mother Wavelet. Laplacian of Gaussian (LoG) is also used in previous papers. In my paper, using Haar Wavelet, decomposing upto 4th level a feature vector with 87 dimensions is computed. Since each dimension has a real value ranging from -1.0 to +1.0, the feature vector is sign quantized so that any positive value is represented by 1 and negative value as 0. This results in a compact biometric template consisting of only 87 bits. Storing and Matching: Now this is our final phase for completing our system. Here we will store the 87 bit iris code or template in our database for future matching and this matching is done with the help of an efficient matching algorithm here we are using Hamming Distance algorithm for the recognition of two samples that is reference template and enrollment template. It is basically uses an exclusive OR (XOR) function between two bit patterns. Hamming Distance is a measure, which delineate the differences, of iris codes. Every bit of presented iris code is compared to the every bit of referenced iris code, if the two bits are the same, e.g. two 1‟s or two 0‟s, the system assigns a value „0‟ to that comparison and if the two bits are different, the system assigns a value „1‟ to that comparison. The formula for iris matching is shown as follows: HD =1/N∑ (Pi ⊕ Ri) [13] where N is the dimension of feature vector, Pi is the ith component of the presented feature vector while Ri is the ith component of the referenced feature vector. Here we can set the threshold value if the resultant value is greater than threshold value, then reject the iris else accepted the user iris. As per review I am giving my thought in matching process which can be represented by a diagram named storing and matching process in figure: 12. Figure 12: Storing and matching process IV. Conclusion In this review paper I show how a person can be identified by a number of ways but instead of carrying bunk of keys or remembering things as passwords we can use us as living password, which is called biometric recognition technology it uses physical characteristics or habits of any person for identification. In biometrics we have a number of characteristics which we are using in our recognition technology as fingerprint, palm print, signature, face, iris recognition, thumb impression and so on but among these irises recognition is best technology for identification of a person. I can say that this technology is not completely developed and we need a number of scientists, researchers and developer who can work on this technology and can complete the dream of Mr. Daugman by applying the uses of iris recognition in each and every field where security is needed by the human being. References [1] http://www.amazingincredible.com/show/8 2-the-incredible-human-eye (last referred on 26 April 2013) [2] P.W. Hallinan, “Recognizing Human Eyes,” Geomtric Methods Comput. Vision,vol. 1570, pp.214-226, 1991. [3] J. Daugman and C. Downing, “Epigenetic Randomness, Complexity, and Singularity of Human Iris Patterns,” Proc. Royal Soc. (London) B: Biological Sciences, vol. 268, pp. 1737-1740, 2001. [4] R. Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride, “A Machine-vision System for Iris Recognition,” vol. 9, pp.1-8, 1996. [5] R.P. Wildes, “Iris Recognition: An Emerging Biometric Technology,” Proceedings of the IEEE, Sept. vol.85, pp.1348-1363, 1997. [6] http://www.cl.cam.ac.uk/~jgd1000/applics. html (last referred on 26 April 2013)
  • 5. Himanshu Srivastava / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.449-452 453 | P a g e [7] http://www.forbes.com/global/2010/0412/e ntrepreneurs-hector-hoyos-iris-scanners- identity-we-see-you.html (last referred on 26 April 2013) [8] http://pinktentacle.com/2006/11/iris- recognition-technology-for-mobile-phones/ (last referred on 26 April 2013) [9] http://www.freedomsphoenix.com/News/0 81163-2010-12-31-were-next-napolitano- in-afghanistan-to-see-iris-scanning-at.htm [10] L. Flom and A. Safir, “Iris Recognition System,” U.S. Patent, No. 4641394, 1987. [11] A. Bertillon. La couleur de Piris. “Revue scientifique,” vol. 36, no. 3, pp. 65-73, 1885. [12] J.G. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Trans. Pattern Anal. Mach. Intelligence, vol. 15, no.11, pp.1148-1161, 1993. [13] W. Boles and B. Boas hash, “A Human Identification Technique Using Images of the Iris and Wavelet Transform,” IEEE Trans. on Signal Processing, vol. 46, no. 4, pp.1185-1188, 1998. [14] Kevin W. Bowyer, Karen Hollingsworth, Patrick J. Flynn, “Image Understanding for Iris Biometrics: A Survey, Computer Vision and Image Understanding,” Vol. 110, Issue 2, pp. 281-307, 2008. [15] http://www.idealtest.org/dbDetailForUser.d o?id=4 (last referred on 26 April 2013) [16] http://pesona.mmu.edu.my/~ccteo/ (last referred on 26 April 2013) [17] Li Ma, Yunhong Wang, Tieniu Tan, “Iris Recognition Using Circular Symmetric Filters,” National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, P.R.China. [18] C.Tisse L. Martin L. Torres and M. Robert, “Person Identification Technique Using Human Iris Recognition," Proc. Vision Interface, pp. 294-299, 2002. [19] S. Lim, K. Lee, O. Byeon, T. Kim, “Efficient iris recognition through improvement of feature vector and classifier,” ETRI Journal, Korea, vol. 23, no. 2, 2001.