SlideShare a Scribd company logo
1 of 5
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1088
Abstract-- Basically, the idea behind this system is
improvement in cybernetics, the biometric person
identification technique based on the pattern of the human
iris is well suited to be applied to access control. The human
eye is sensitive to visible light. Security systems having
realized the value of biometrics for two basic purposes: to
verify or identify users. In this busy world, identification
should be fast and efficient. In this paper I focus on an
efficient methodology for identification and verification for
iris detection using Haar transform and Minimum hamming
distance. I use canny operator for the edge detection. This
biological phenomenon contracts and dilates the two pupils
synchronously when illuminating one of the eyes by visible
light .I applied the Haar wavelet compressing the data. By
comparing the quantized vectors using the Hamming
Distance operator, we determine finally whether two irises
are similar. The result shows that system is quite effective.
Keywords: Iris recognition, Edge detection, Feature
extraction, Haar transform, Biometrics iris recognition.
I. INTRODUCTION
The purpose of Jris Recognition', a biometrical based
technology for personal identification and verification, is to
recognize a person from his/her iris prints. In fact, iris
patterns are characterized by high level of stability and
distinctiveness. Each individual has a unique iris.
I implemented Jris Recognition' using Matlab for
its ease in image manipulation and wavelet applications. The
first step of my project consists of images acquisition. Then,
I changed the pictures' size and types are manipulated in
order to be able subsequently to process them. Once the pre-
processing step is achieved, it is necessary to localize the iris
and unwrap it. At this stage, we can extract the texture of the
iris using Haar Wavelets. Finally, we compare the coded
image with the already coded iris in order to find a match or
detect an imposter.
A. ACQUISITION
Image acquisition is considered the most critical step in my
project since all subsequent stages depend highly on the
image quality. I downloaded the iris images from internet. I
set the resolution to 640x480, the type of the image to jpeg,
and the mode to white and black for greater details.
B. Image Manipulation
In the pre-processing stage, we transformed the images from
RGB to gray level and from eight-bit to double precision
thus facilitating the manipulation of the images in
subsequent steps.
C. Location of the Iris Boundaries
I implemented Jris Recognition' using Matlab for its ease in
image manipulation and wavelet applications. The first step
of my project consists of images acquisition. Then, I
changed the pictures' size and types are manipulated in order
to be able subsequently to process them. Once the
preprocessing step is achieved, it is necessary to localize the
iris and unwrap it. At this stage, we can extract the texture
of the iris using Haar Wavelets. Finally, we compare the
coded image with the already coded iris in order to find a
match or detect an imposter.
Before performing iris pattern matching, the
boundaries of the iris should be located. So, we are
supposed to detect the part of the image that extends from
inside the limbus (the border between the sclera and the iris)
to the outside of the pupil.
I start by determining the outer edge by first down
sampling the images by a factor of 4, to enable a faster
processing delay, using a Gaussian Pyramid. Then I use the
canny operator with the default threshold value given by
Matlab, to obtain the gradient image. Next, I apply a circular
summation which consists of summing the intensities over
all circles, by using three nested loops to pass over all
possible radiuses and Centre coordinates.
The circle with the biggest radius and highest
summation corresponds to the outer boundary. The Centre
and radius of the iris in the original image are determined by
rescaling the obtained results of localized iris shown in
figure 1.
Fig. 2: Localized Iris
Secure System based on Dynamic Features of IRIS Recognition
Shreyas A. Pathak1
1
Patel Institutes of Engineering and Science – RGPV University
Secure System based on Dynamic Features of IRIS Recognition
(IJSRD/Vol. 1/Issue 5/2013/0013)
All rights reserved by www.ijsrd.com 1089
After having located the outer edge, we next need to find the
inner one which is difficult because it is not quite
discernable by the canny operator especially for dark eyed
people. Therefore, after detecting the outer boundary, we
test the intensity of the pixels within the iris.
Depending on this intensity, the threshold of the
canny is chosen. If the iris is dark, a low threshold is used to
enable the canny operator to mark out the inner circle
separating the iris from the pupil. If the iris is light colored,
such as blue or green, then a higher threshold is utilized.
The pupil Centre is shifted by up to 15% from the
center of the iris and its radius is not greater than 0.8 neither
lowers than 0.1 of the radius of the iris.
This means that processing time, dedicated to the
search of the center of the pupil of this part is relatively
small. Hence, instead of searching a down sample version of
the iris, we searched the original one to gain maximum
accuracy.
D. Converting to the Stretched Polar coordinates System
After determining the limits of the iris in the previous phase,
the iris should be isolated and stored in a separate image.
The factors that we should watch out for are the possibility
of the pupil dilating and appearing of different size in
different images. For this purpose, we begin by changing
our coordinate system by un-wrapping the lower part of the
iris (lower 180 degrees) and mapping all the points within
the boundary of the iris into their polar equivalent.
The size of the mapped image is fixed (100x402
pixels) which means that we are taking an equal amount of
points at every angle. Therefore, if the pupil dilates the same
points will be picked up and mapped again which makes our
mapping process stretch invariant.
When un-wrapping the image, I make use of the
bilinear transformation to obtain the intensities of the points
in the new image. The intensities at each pixel in the new
image are the result of the interpolation of the gray scales in
the old image.
Fig. 2 Original Image
E. Extracting the Iris code
The picture of an eye is first processed by software that
localizes the inner and outer boundaries of the iris, and the
eyelid contours, in order to extract just the iris portion.
Eyelashes and reflections that may cover parts of the iris are
detected and discounted. Sophisticated mathematical
software code for the texture sequence in the iris, similar to
a DNA sequence code. Then it encodes the iris pattern by a
process called Demodulation. This creates a phase process
uses functions called 2-D wavelets that make a very
compact yet complete description of the iris pattern,
regardless of its size and pupil dilation, in just 512 bytes.
The phase sequence is called an Iris code template, and it
captures the unique features of an iris in a robust way that
allows easy and very rapid comparisons against large
databases of other templates. The Iris code template is
immediately encrypted to eliminate the possibility of
identity theft and to maximize security.
Fig. 4: Coded Strip
In an Iris code, each phasor angle shown fig above is
quantized in to just the complex quadrant in which it lies for
each local patch of the iris, and this operation is repeated all
across the iris, at many different scales of analysis.
Basically wavelet transforms allow the
interpretation of signals (in this case an image) as a linear
combination of a self-similar, though linearly
independent, family of signals. These signals (or
wavelets) can be chosen so that they respond best to
important features in an image, in this case bringing out
the details, which discriminate two different irises
F. Image Analysis
The features of the iris are then analyzed and
digitized into a 512 byte (4096 bit) Iris Code record,
half of which describes the features, half of which
controls the comparison process. During enrolment, this
Iris Code record is stored in the database for future
comparison. During a recognition attempt, when an
iris is presented at a recognition point, the same
process is repeated; however the resulting Iris Code
record is not stored, but is compared to ever y file in the
database
Fig. 5: J NIK illumination eye image
Secure System based on Dynamic Features of IRIS Recognition
(IJSRD/Vol. 1/Issue 5/2013/0013)
All rights reserved by www.ijsrd.com 1090
G. Hamming Distance Calculation
Comparison of Iris Code records includes calculation of
a Hamming Distance (HD), as a measure of variation
between the Iris Code record from the presented iris and
each Iris Code record in the database. Each useable pair
of the 2048 available pairs of bits is compared and a
value assigned using exclusive-OR logic. (The total
2048 pairs are seldom compared in their entirety ,
because of the field optimization process described
above.) Bit #1 from the presented Iris Code record is
compared to bit#1 from the reference Iris Code record,
bit #2 from the presented Iris Code record is compared
to bit #2 from the reference Iris Code record, and so on
Fig. 4: Hamming Distance Calculation
If two bits are alike, the system assigns a value of zero
to that pair comparison. If two bits are different, the
system assigns a value of one to that pair comparison.
After all pairs are compared, the number of disagreeing
bit-pairs is divided by the total number of bit-pair
comparisons resulting in a two digit quantitative
expression of how different the two Iris Code records
are. A Hamming Distance of 10 means that two Iris Code
records differed by 10%.
II. RESULT AND PERFORMANCE
I tested my project on many pictures, using a Pentium
dual core processor, and I obtained an average
of correct recognition of above 95%, with an average
computing time of 15s. The main reason of the failures
we encountered is due to the quality of the pictures.
Some of these problems are less brightness, occlusion
by eyelids, noises or inappropriate eye positioning.
To easily manipulate the images in our database we
built an interface that allows the user to choose
between different options. A graphical user interface
(GUI) is a graphical display in one or more windows
containing controls, called components, which enable a
user to perform interactive tasks. Like the first one is to
select two images from the data base. The second
allows the verification of the correspondence bet ween
the data base image and a selected eye image. The iris
recognition software that I implemented (Figure 7) is
used to run the Iris Recognition System.
III. PROPOSED WORK
I have successfully developed a Iris Recognition
system capable of comparing two digital eye-images.
This identification system is quite simple requiring
Secure System based on Dynamic Features of IRIS Recognition
(IJSRD/Vol. 1/Issue 5/2013/0013)
All rights reserved by www.ijsrd.com 1091
few components and is effective enough to be integrated
within security systems that require an identity check.
IV. CONCLUSION
I have successfully developed a Iris Recognition i capable of
comparing two digital eye-images. Identification system is
quite simple requiring few components and is effective
enough to be integrated within security systems that require
an identity check. I found that HD value must be 0.32.
Judging by the clear distinctiveness of the iris patterns we
can expect iris recognition systems to become the leading
technology in identity verification.
REFERENCES
[1] Makram Nabti,Ahmed Bouridane, -An Effective Iris
Recognition System Based On Wavelet Maxima and
Gabor Filter Bank|| Institute of Electronics,
Communications and Information Technology (ECIT)
School of Electronics, Electrical Engineering and
Computer Science, Queen's University Belfast, Belfast
BT7 1NN.
[2] Byung Jun Kang and Kang Ryoung Park, -Real Time
Image restoration for Iris Recognition System! IEEE
TRANSACTIONS ON SYSTEMS, MAN, AND
CYBERNETICS—PART B: CYBERNETICS, VOL.
37, NO. 6, DECEMBER 2007
[3] Qichuan Tian and Zhengguang Liu -A Practical Iris
Recognition Algorithm!, Proceedings of the 2006
IEEE International Conference on Robotics and
Biomimetics December 17 - 20, 2006, Kunming,
China
[4] Md. Anwar Hussain, -Eigenspace Based Accurate Iris
Recognition System!, #Department of ECE, NERIST
(Deemed University) Arunachal Pradesh, India. 2010
Annual IEEE India Conference (INDICON)
[5] M. Turk, and A. Pentland, -Eigen faces for
Recognition,! Journal of Cognitive Neroscience, Vo. 3,
no. 1, pages 71-86.
[6] Juwei Lu, Kostantinos N. Plataniotis, and Anasios N.
Venetsanopoulos, - Face Recognition Using LDA-
Based Algorithms!, IEEE Trans. Neural Networks,
vol.14, no.1, Jan 2003.
[7] Chia Te CHU and Ching-Han CHEN - High
Performance Iris Recognition Based on LDA and
LPCC || Institute of Electrical Engineering,I-Shou
University, Proceedings of the 17th IEEE International
Conference on Tools with Artificial Intelligence
(ICTAI'05)
[8] Shashi Kumar D R1, K B Raja2, R. K Chhootaray3,
Sabyasachi Pattnaik, -PCA based Iris Recognition
using DWT ||, IJCTA | JULY-AUGUST 2011
[9] Kazuyuki Miyazawa, Koichi Ito, Takafumi Aoki, Koji
Kobayashi, Atsushi Katsumata || AN IRIS
RECOGNITION SYSTEM USING PHASE-BASED
IMAGE MATCHING!, 1-4244-0481-9/06/ C2006
IEEE
[10] Guangzhu Xu, Zaifeng Zhang , Yide Ma School of
Information Science&Engineering -IMPROVING
THE PERFORMANCE OF IRIS RECOGNITON
SYSTEM USING EYELIDS AND EYELASHES
DETECTION AND IRIS IMAGE
ENHANCEMENT||,Proc 5th IEEE Int.Conf on
cognitive Informatics(ICI/'06)
[11] N. Popescu-Bodorin*, V.E. Balas, | Exploratory
Simulation of an Intelligent Iris Verifier Distributed
System!, 6th IEEE International Symposium on
Applied Computational Intelligence and Informatics •
May 19-21, 2011.
[12] Inmaculada Tomeo-Reyes, Judith Liu-Jimenez, Ivan
Rubio-Polo, Jorge Redondo-Justo, Raul Sanchez-
Reillo,|| Input Images in Iris Recognition Systems: A
Case Study!, 978-1-4244-9493-4/11/©2011 IEEE
[13] Nitin Bhatia and Megha Chhabra, -Improved Hough
Transform for Fast Iris Detection,! Second IEEE
International Conference on Signal Processing
systems, vol VI, pp. 172 - 176, 2010.
[14] W Boles and Boashashash, -A Human Identification
Technique Using Images of the Iris and Wavelet
Secure System based on Dynamic Features of IRIS Recognition
(IJSRD/Vol. 1/Issue 5/2013/0013)
All rights reserved by www.ijsrd.com 1092
Transform,! IEEE Transaction on Signal Processing,
vol 46, pp. 1185¬1188, April 1998.
[15] Yingzi Du, Emrah Arslanturk, Zhi Zhou, and Craig
Belcher, -Video-Based Noncooperative Iris
Image Segmentation! , IEEE TRANSACTIONS ON
SYSTEMS, MAN, AND CYBERNETICS—PART B:
CYBERNETICS, VOL. 41, NO. 1, FEBRUARY 2011
[16] Libor Masek, Peter Kovesi. MATLAB Source Code
for a Biometric Identification System Based on Iris
Patterns. The School of Computer Science and
Software Engineering, The University of Western
Australia. 2003.

More Related Content

What's hot

Sensors optimized for 3 d digitization
Sensors optimized for 3 d digitizationSensors optimized for 3 d digitization
Sensors optimized for 3 d digitizationBasavaraj Patted
 
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...ijtsrd
 
Sensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar reportSensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar reportVishnu Prasad
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumarshritosh kumar
 
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageEncrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageDhirendraKumar170
 
Tracking Chessboard Corners Using Projective Transformation for Augmented Rea...
Tracking Chessboard Corners Using Projective Transformation for Augmented Rea...Tracking Chessboard Corners Using Projective Transformation for Augmented Rea...
Tracking Chessboard Corners Using Projective Transformation for Augmented Rea...CSCJournals
 
Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...eSAT Publishing House
 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup tableeSAT Journals
 
An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.
An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.
An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.IJERA Editor
 

What's hot (20)

Iw3515281533
Iw3515281533Iw3515281533
Iw3515281533
 
Sensors optimized for 3 d digitization
Sensors optimized for 3 d digitizationSensors optimized for 3 d digitization
Sensors optimized for 3 d digitization
 
BAXTER PLAYING POOL
BAXTER PLAYING POOLBAXTER PLAYING POOL
BAXTER PLAYING POOL
 
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
 
Sensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar reportSensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar report
 
N010226872
N010226872N010226872
N010226872
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFT
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
 
Iq3116211626
Iq3116211626Iq3116211626
Iq3116211626
 
Gaze detection
Gaze detectionGaze detection
Gaze detection
 
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageEncrypted sensing of fingerprint image
Encrypted sensing of fingerprint image
 
Independent Research
Independent ResearchIndependent Research
Independent Research
 
Tracking Chessboard Corners Using Projective Transformation for Augmented Rea...
Tracking Chessboard Corners Using Projective Transformation for Augmented Rea...Tracking Chessboard Corners Using Projective Transformation for Augmented Rea...
Tracking Chessboard Corners Using Projective Transformation for Augmented Rea...
 
E010222124
E010222124E010222124
E010222124
 
Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...
 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup table
 
An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.
An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.
An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.
 
final ppt
final pptfinal ppt
final ppt
 
L010427275
L010427275L010427275
L010427275
 

Viewers also liked

Turning fixtures
Turning  fixturesTurning  fixtures
Turning fixturesGuhan M
 
Jigs & fixtures by LeLogix CAD Training Center
Jigs & fixtures  by LeLogix CAD Training CenterJigs & fixtures  by LeLogix CAD Training Center
Jigs & fixtures by LeLogix CAD Training Centerlelogixdesign
 
design and fabrication ofGear cutting attachment in lathe machine
design and fabrication ofGear cutting attachment in lathe machinedesign and fabrication ofGear cutting attachment in lathe machine
design and fabrication ofGear cutting attachment in lathe machineabes ec
 
CNC Machines
CNC MachinesCNC Machines
CNC Machinespratik207
 

Viewers also liked (7)

Mini cutoff machine
Mini cutoff machineMini cutoff machine
Mini cutoff machine
 
Turning fixtures
Turning  fixturesTurning  fixtures
Turning fixtures
 
Jigs & fixtures by LeLogix CAD Training Center
Jigs & fixtures  by LeLogix CAD Training CenterJigs & fixtures  by LeLogix CAD Training Center
Jigs & fixtures by LeLogix CAD Training Center
 
M010629597
M010629597M010629597
M010629597
 
design and fabrication ofGear cutting attachment in lathe machine
design and fabrication ofGear cutting attachment in lathe machinedesign and fabrication ofGear cutting attachment in lathe machine
design and fabrication ofGear cutting attachment in lathe machine
 
CNC Machines
CNC MachinesCNC Machines
CNC Machines
 
Types of jigs and fixtures
Types of jigs and fixtures Types of jigs and fixtures
Types of jigs and fixtures
 

Similar to Secure System based on Dynamic Features of IRIS Recognition

A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionIJECEIAES
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkijcsit
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsEditor IJMTER
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001vital vital
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001vital vital
 
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...IJEEE
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...IRJET Journal
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdfmokamojah
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

Similar to Secure System based on Dynamic Features of IRIS Recognition (20)

A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and Recognition
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition Systems
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
E017443136
E017443136E017443136
E017443136
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001
 
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
366 369
366 369366 369
366 369
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Recently uploaded (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Secure System based on Dynamic Features of IRIS Recognition

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1088 Abstract-- Basically, the idea behind this system is improvement in cybernetics, the biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control. The human eye is sensitive to visible light. Security systems having realized the value of biometrics for two basic purposes: to verify or identify users. In this busy world, identification should be fast and efficient. In this paper I focus on an efficient methodology for identification and verification for iris detection using Haar transform and Minimum hamming distance. I use canny operator for the edge detection. This biological phenomenon contracts and dilates the two pupils synchronously when illuminating one of the eyes by visible light .I applied the Haar wavelet compressing the data. By comparing the quantized vectors using the Hamming Distance operator, we determine finally whether two irises are similar. The result shows that system is quite effective. Keywords: Iris recognition, Edge detection, Feature extraction, Haar transform, Biometrics iris recognition. I. INTRODUCTION The purpose of Jris Recognition', a biometrical based technology for personal identification and verification, is to recognize a person from his/her iris prints. In fact, iris patterns are characterized by high level of stability and distinctiveness. Each individual has a unique iris. I implemented Jris Recognition' using Matlab for its ease in image manipulation and wavelet applications. The first step of my project consists of images acquisition. Then, I changed the pictures' size and types are manipulated in order to be able subsequently to process them. Once the pre- processing step is achieved, it is necessary to localize the iris and unwrap it. At this stage, we can extract the texture of the iris using Haar Wavelets. Finally, we compare the coded image with the already coded iris in order to find a match or detect an imposter. A. ACQUISITION Image acquisition is considered the most critical step in my project since all subsequent stages depend highly on the image quality. I downloaded the iris images from internet. I set the resolution to 640x480, the type of the image to jpeg, and the mode to white and black for greater details. B. Image Manipulation In the pre-processing stage, we transformed the images from RGB to gray level and from eight-bit to double precision thus facilitating the manipulation of the images in subsequent steps. C. Location of the Iris Boundaries I implemented Jris Recognition' using Matlab for its ease in image manipulation and wavelet applications. The first step of my project consists of images acquisition. Then, I changed the pictures' size and types are manipulated in order to be able subsequently to process them. Once the preprocessing step is achieved, it is necessary to localize the iris and unwrap it. At this stage, we can extract the texture of the iris using Haar Wavelets. Finally, we compare the coded image with the already coded iris in order to find a match or detect an imposter. Before performing iris pattern matching, the boundaries of the iris should be located. So, we are supposed to detect the part of the image that extends from inside the limbus (the border between the sclera and the iris) to the outside of the pupil. I start by determining the outer edge by first down sampling the images by a factor of 4, to enable a faster processing delay, using a Gaussian Pyramid. Then I use the canny operator with the default threshold value given by Matlab, to obtain the gradient image. Next, I apply a circular summation which consists of summing the intensities over all circles, by using three nested loops to pass over all possible radiuses and Centre coordinates. The circle with the biggest radius and highest summation corresponds to the outer boundary. The Centre and radius of the iris in the original image are determined by rescaling the obtained results of localized iris shown in figure 1. Fig. 2: Localized Iris Secure System based on Dynamic Features of IRIS Recognition Shreyas A. Pathak1 1 Patel Institutes of Engineering and Science – RGPV University
  • 2. Secure System based on Dynamic Features of IRIS Recognition (IJSRD/Vol. 1/Issue 5/2013/0013) All rights reserved by www.ijsrd.com 1089 After having located the outer edge, we next need to find the inner one which is difficult because it is not quite discernable by the canny operator especially for dark eyed people. Therefore, after detecting the outer boundary, we test the intensity of the pixels within the iris. Depending on this intensity, the threshold of the canny is chosen. If the iris is dark, a low threshold is used to enable the canny operator to mark out the inner circle separating the iris from the pupil. If the iris is light colored, such as blue or green, then a higher threshold is utilized. The pupil Centre is shifted by up to 15% from the center of the iris and its radius is not greater than 0.8 neither lowers than 0.1 of the radius of the iris. This means that processing time, dedicated to the search of the center of the pupil of this part is relatively small. Hence, instead of searching a down sample version of the iris, we searched the original one to gain maximum accuracy. D. Converting to the Stretched Polar coordinates System After determining the limits of the iris in the previous phase, the iris should be isolated and stored in a separate image. The factors that we should watch out for are the possibility of the pupil dilating and appearing of different size in different images. For this purpose, we begin by changing our coordinate system by un-wrapping the lower part of the iris (lower 180 degrees) and mapping all the points within the boundary of the iris into their polar equivalent. The size of the mapped image is fixed (100x402 pixels) which means that we are taking an equal amount of points at every angle. Therefore, if the pupil dilates the same points will be picked up and mapped again which makes our mapping process stretch invariant. When un-wrapping the image, I make use of the bilinear transformation to obtain the intensities of the points in the new image. The intensities at each pixel in the new image are the result of the interpolation of the gray scales in the old image. Fig. 2 Original Image E. Extracting the Iris code The picture of an eye is first processed by software that localizes the inner and outer boundaries of the iris, and the eyelid contours, in order to extract just the iris portion. Eyelashes and reflections that may cover parts of the iris are detected and discounted. Sophisticated mathematical software code for the texture sequence in the iris, similar to a DNA sequence code. Then it encodes the iris pattern by a process called Demodulation. This creates a phase process uses functions called 2-D wavelets that make a very compact yet complete description of the iris pattern, regardless of its size and pupil dilation, in just 512 bytes. The phase sequence is called an Iris code template, and it captures the unique features of an iris in a robust way that allows easy and very rapid comparisons against large databases of other templates. The Iris code template is immediately encrypted to eliminate the possibility of identity theft and to maximize security. Fig. 4: Coded Strip In an Iris code, each phasor angle shown fig above is quantized in to just the complex quadrant in which it lies for each local patch of the iris, and this operation is repeated all across the iris, at many different scales of analysis. Basically wavelet transforms allow the interpretation of signals (in this case an image) as a linear combination of a self-similar, though linearly independent, family of signals. These signals (or wavelets) can be chosen so that they respond best to important features in an image, in this case bringing out the details, which discriminate two different irises F. Image Analysis The features of the iris are then analyzed and digitized into a 512 byte (4096 bit) Iris Code record, half of which describes the features, half of which controls the comparison process. During enrolment, this Iris Code record is stored in the database for future comparison. During a recognition attempt, when an iris is presented at a recognition point, the same process is repeated; however the resulting Iris Code record is not stored, but is compared to ever y file in the database Fig. 5: J NIK illumination eye image
  • 3. Secure System based on Dynamic Features of IRIS Recognition (IJSRD/Vol. 1/Issue 5/2013/0013) All rights reserved by www.ijsrd.com 1090 G. Hamming Distance Calculation Comparison of Iris Code records includes calculation of a Hamming Distance (HD), as a measure of variation between the Iris Code record from the presented iris and each Iris Code record in the database. Each useable pair of the 2048 available pairs of bits is compared and a value assigned using exclusive-OR logic. (The total 2048 pairs are seldom compared in their entirety , because of the field optimization process described above.) Bit #1 from the presented Iris Code record is compared to bit#1 from the reference Iris Code record, bit #2 from the presented Iris Code record is compared to bit #2 from the reference Iris Code record, and so on Fig. 4: Hamming Distance Calculation If two bits are alike, the system assigns a value of zero to that pair comparison. If two bits are different, the system assigns a value of one to that pair comparison. After all pairs are compared, the number of disagreeing bit-pairs is divided by the total number of bit-pair comparisons resulting in a two digit quantitative expression of how different the two Iris Code records are. A Hamming Distance of 10 means that two Iris Code records differed by 10%. II. RESULT AND PERFORMANCE I tested my project on many pictures, using a Pentium dual core processor, and I obtained an average of correct recognition of above 95%, with an average computing time of 15s. The main reason of the failures we encountered is due to the quality of the pictures. Some of these problems are less brightness, occlusion by eyelids, noises or inappropriate eye positioning. To easily manipulate the images in our database we built an interface that allows the user to choose between different options. A graphical user interface (GUI) is a graphical display in one or more windows containing controls, called components, which enable a user to perform interactive tasks. Like the first one is to select two images from the data base. The second allows the verification of the correspondence bet ween the data base image and a selected eye image. The iris recognition software that I implemented (Figure 7) is used to run the Iris Recognition System. III. PROPOSED WORK I have successfully developed a Iris Recognition system capable of comparing two digital eye-images. This identification system is quite simple requiring
  • 4. Secure System based on Dynamic Features of IRIS Recognition (IJSRD/Vol. 1/Issue 5/2013/0013) All rights reserved by www.ijsrd.com 1091 few components and is effective enough to be integrated within security systems that require an identity check. IV. CONCLUSION I have successfully developed a Iris Recognition i capable of comparing two digital eye-images. Identification system is quite simple requiring few components and is effective enough to be integrated within security systems that require an identity check. I found that HD value must be 0.32. Judging by the clear distinctiveness of the iris patterns we can expect iris recognition systems to become the leading technology in identity verification. REFERENCES [1] Makram Nabti,Ahmed Bouridane, -An Effective Iris Recognition System Based On Wavelet Maxima and Gabor Filter Bank|| Institute of Electronics, Communications and Information Technology (ECIT) School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast, Belfast BT7 1NN. [2] Byung Jun Kang and Kang Ryoung Park, -Real Time Image restoration for Iris Recognition System! IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 37, NO. 6, DECEMBER 2007 [3] Qichuan Tian and Zhengguang Liu -A Practical Iris Recognition Algorithm!, Proceedings of the 2006 IEEE International Conference on Robotics and Biomimetics December 17 - 20, 2006, Kunming, China [4] Md. Anwar Hussain, -Eigenspace Based Accurate Iris Recognition System!, #Department of ECE, NERIST (Deemed University) Arunachal Pradesh, India. 2010 Annual IEEE India Conference (INDICON) [5] M. Turk, and A. Pentland, -Eigen faces for Recognition,! Journal of Cognitive Neroscience, Vo. 3, no. 1, pages 71-86. [6] Juwei Lu, Kostantinos N. Plataniotis, and Anasios N. Venetsanopoulos, - Face Recognition Using LDA- Based Algorithms!, IEEE Trans. Neural Networks, vol.14, no.1, Jan 2003. [7] Chia Te CHU and Ching-Han CHEN - High Performance Iris Recognition Based on LDA and LPCC || Institute of Electrical Engineering,I-Shou University, Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05) [8] Shashi Kumar D R1, K B Raja2, R. K Chhootaray3, Sabyasachi Pattnaik, -PCA based Iris Recognition using DWT ||, IJCTA | JULY-AUGUST 2011 [9] Kazuyuki Miyazawa, Koichi Ito, Takafumi Aoki, Koji Kobayashi, Atsushi Katsumata || AN IRIS RECOGNITION SYSTEM USING PHASE-BASED IMAGE MATCHING!, 1-4244-0481-9/06/ C2006 IEEE [10] Guangzhu Xu, Zaifeng Zhang , Yide Ma School of Information Science&Engineering -IMPROVING THE PERFORMANCE OF IRIS RECOGNITON SYSTEM USING EYELIDS AND EYELASHES DETECTION AND IRIS IMAGE ENHANCEMENT||,Proc 5th IEEE Int.Conf on cognitive Informatics(ICI/'06) [11] N. Popescu-Bodorin*, V.E. Balas, | Exploratory Simulation of an Intelligent Iris Verifier Distributed System!, 6th IEEE International Symposium on Applied Computational Intelligence and Informatics • May 19-21, 2011. [12] Inmaculada Tomeo-Reyes, Judith Liu-Jimenez, Ivan Rubio-Polo, Jorge Redondo-Justo, Raul Sanchez- Reillo,|| Input Images in Iris Recognition Systems: A Case Study!, 978-1-4244-9493-4/11/©2011 IEEE [13] Nitin Bhatia and Megha Chhabra, -Improved Hough Transform for Fast Iris Detection,! Second IEEE International Conference on Signal Processing systems, vol VI, pp. 172 - 176, 2010. [14] W Boles and Boashashash, -A Human Identification Technique Using Images of the Iris and Wavelet
  • 5. Secure System based on Dynamic Features of IRIS Recognition (IJSRD/Vol. 1/Issue 5/2013/0013) All rights reserved by www.ijsrd.com 1092 Transform,! IEEE Transaction on Signal Processing, vol 46, pp. 1185¬1188, April 1998. [15] Yingzi Du, Emrah Arslanturk, Zhi Zhou, and Craig Belcher, -Video-Based Noncooperative Iris Image Segmentation! , IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 41, NO. 1, FEBRUARY 2011 [16] Libor Masek, Peter Kovesi. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. The School of Computer Science and Software Engineering, The University of Western Australia. 2003.