This document summarizes research on improving iris recognition performance. It discusses using image acquisition, segmentation, and filtering of iris images. The proposed method detects the pupil and iris center accurately, localizes the iris and pupil regions, and uses 1D Gabor filtering for feature extraction. Experimental results show the method segments the iris region well from input eye images and increases recognition accuracy compared to previous work. The goal is to develop an efficient iris recognition system with consistent matching scores.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
IRIS Recognition is Fast Developing to be a Fool Proof And Fast Identification Technique. It is a classic Biometrics Application that is in an Advanced stage of Research all Over the world.
Software Implementation of Iris Recognition System using MATLABijtsrd
The software implementation of iris recognition system introduces in this paper. This system intends to apply for high security required areas. The demand on security is increasing greatly in these years and biometric recognition gradually becomes a hot field of research. Iris recognition is a branch of biometric recognition method. In thesis, Iris recognition system consists of localization of the iris region and generation of data set of iris images followed by iris pattern recognition. In thesis, a fast algorithm is proposed for the localization of the inner and outer boundaries of the iris region. Located iris is extracted from an eye image, and, after normalization and enhancement, it is represented by a data set. Using this data set a Neural Network NN is used for the classification of iris patterns. The adaptive learning strategy is applied for training of the NN. The implementation of the system is developed with MATLAB. The results of simulations illustrate the effectiveness of the neural system in personal identification. Finally, the accuracy of iris recognition system is tested and evaluated with different iris images. Mo Mo Myint Wai | Nyan Phyo Aung | Lwin Lwin Htay "Software Implementation of Iris Recognition System using MATLAB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25258.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25258/software-implementation-of-iris-recognition-system-using-matlab/mo-mo-myint-wai
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
The interest in Biometrics from both governments and industry has lead to the emergence of multiple Biometric technologies all with their own strengths and flaws. One currently at the forefront of Biometrics is iris scanning.
The process involved in the identification and verification of people using iris scanning is examined in this paper. The advantages and disadvantages associated with the utilisation of such a technology are also explored. A number of legal and ethical issues are highlighted. Iris scanning is looked at in comparison to other forms of Biometric technologies. Future work in the area of Biometrics is also considered in light of current developments.
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRIS Recognition Based Authentication System In ATMIJTET Journal
Security and Authentication of individuals is necessary for our daily lives especially in ATMs. It has been improved by using biometric verification techniques like face recognition, fingerprints, voice and other traits, comparing these existing traits, there is still need for considerable computer vision. Iris recognition is a particular type of biometric system that can be used to reliably identify a person uniquely by analyzing the patterns found in the iris. Initially Iris images are collected as datasets and maintained in agent memory. Then the Iris and pupil are detected from the image, removing noises. The features of the iris were encoded by convolving the normalized iris region with 2DGabor filter. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
in terms of Forensic Science, how iris recognition is done and what are the key factors that should be kept in mind. It can be its Advantages, Disadvantages, Approaches and very importantly the working process.
A Novel Approach for Detecting the IRIS CryptsIJERDJOURNAL
ABSTRACT:- The iris is a stable biometric trait that has been widely used for human recognition in various applications. However, deployment of iris recognition in forensic applications has not been reported. A primary reason is the lack of human friendly techniques for iris comparison. To further promote the use of iris recognition in forensics, the similarity between irises should be made visualizable and interpretable. Recently, a human-in-the-loop iris recognition system was developed, based on detecting and matching iris crypts. Building on this framework, we propose a new approach for detecting and matching iris crypts automatically. Our detection method is able to capture iris crypts of various sizes. Our matching scheme is designed to handle potential topological changes in the detection of the same crypt in different images. Our approach outperforms the known visible-feature-based iris recognition method on three different data sets. After iris Crypts detection, Iris images were taken before and after the treatment of eye disease and the output shows the mathematical difference obtained from treatment. Gabor filter is used to extract the features. This iris recognition was effectively withstood with most ophthalmic disease like corneal oedema, iridotomies and conjunctivitis. This proposed iris recognition should be used to solve the potential problems that could cause in key biometric technology and medical diagnosis
A study of Iris Recognition technology over the in use biometric technologies these days. These Study shows how beneficial the iris technology can be to the Human in future.
I have put all my efforts in this study and have made an simple easy to understand ppt.
iris recognition system as means of unique identification Being Topper
Project Done and submitted by Students Of final year CBP Government Engineering College
student name : vipin kumar khutail , Krishnanad Mishra , Jaswant kumar, Rahul Vashisht
Project Description :
Iris recognition is an automated method of bio-metric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex random patterns are unique, stable, and can be seen from some distance
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A biometric ,system has been the important affordable and more reliable system .A biometrics identification system is refers to the automatic recognition of individual person based on their characteristics. Early authentication method like which can be stolen or shared by with other person . Biometric has two modals ,unimodals and multimodals .Inunimodol system , it has disadvantages due to lack of its non –versality and unacuptable error rate .To overcome these unimodal issues multimodals is better approach for combining two or more features of person like for sirisdetetmines a authentication (i.e. identification and verification ) this paper that characterstics ,types and biometrics ,fusion levels and research areas etc.
IRIS Recognition is Fast Developing to be a Fool Proof And Fast Identification Technique. It is a classic Biometrics Application that is in an Advanced stage of Research all Over the world.
Software Implementation of Iris Recognition System using MATLABijtsrd
The software implementation of iris recognition system introduces in this paper. This system intends to apply for high security required areas. The demand on security is increasing greatly in these years and biometric recognition gradually becomes a hot field of research. Iris recognition is a branch of biometric recognition method. In thesis, Iris recognition system consists of localization of the iris region and generation of data set of iris images followed by iris pattern recognition. In thesis, a fast algorithm is proposed for the localization of the inner and outer boundaries of the iris region. Located iris is extracted from an eye image, and, after normalization and enhancement, it is represented by a data set. Using this data set a Neural Network NN is used for the classification of iris patterns. The adaptive learning strategy is applied for training of the NN. The implementation of the system is developed with MATLAB. The results of simulations illustrate the effectiveness of the neural system in personal identification. Finally, the accuracy of iris recognition system is tested and evaluated with different iris images. Mo Mo Myint Wai | Nyan Phyo Aung | Lwin Lwin Htay "Software Implementation of Iris Recognition System using MATLAB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25258.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25258/software-implementation-of-iris-recognition-system-using-matlab/mo-mo-myint-wai
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
The interest in Biometrics from both governments and industry has lead to the emergence of multiple Biometric technologies all with their own strengths and flaws. One currently at the forefront of Biometrics is iris scanning.
The process involved in the identification and verification of people using iris scanning is examined in this paper. The advantages and disadvantages associated with the utilisation of such a technology are also explored. A number of legal and ethical issues are highlighted. Iris scanning is looked at in comparison to other forms of Biometric technologies. Future work in the area of Biometrics is also considered in light of current developments.
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRIS Recognition Based Authentication System In ATMIJTET Journal
Security and Authentication of individuals is necessary for our daily lives especially in ATMs. It has been improved by using biometric verification techniques like face recognition, fingerprints, voice and other traits, comparing these existing traits, there is still need for considerable computer vision. Iris recognition is a particular type of biometric system that can be used to reliably identify a person uniquely by analyzing the patterns found in the iris. Initially Iris images are collected as datasets and maintained in agent memory. Then the Iris and pupil are detected from the image, removing noises. The features of the iris were encoded by convolving the normalized iris region with 2DGabor filter. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
in terms of Forensic Science, how iris recognition is done and what are the key factors that should be kept in mind. It can be its Advantages, Disadvantages, Approaches and very importantly the working process.
A Novel Approach for Detecting the IRIS CryptsIJERDJOURNAL
ABSTRACT:- The iris is a stable biometric trait that has been widely used for human recognition in various applications. However, deployment of iris recognition in forensic applications has not been reported. A primary reason is the lack of human friendly techniques for iris comparison. To further promote the use of iris recognition in forensics, the similarity between irises should be made visualizable and interpretable. Recently, a human-in-the-loop iris recognition system was developed, based on detecting and matching iris crypts. Building on this framework, we propose a new approach for detecting and matching iris crypts automatically. Our detection method is able to capture iris crypts of various sizes. Our matching scheme is designed to handle potential topological changes in the detection of the same crypt in different images. Our approach outperforms the known visible-feature-based iris recognition method on three different data sets. After iris Crypts detection, Iris images were taken before and after the treatment of eye disease and the output shows the mathematical difference obtained from treatment. Gabor filter is used to extract the features. This iris recognition was effectively withstood with most ophthalmic disease like corneal oedema, iridotomies and conjunctivitis. This proposed iris recognition should be used to solve the potential problems that could cause in key biometric technology and medical diagnosis
A study of Iris Recognition technology over the in use biometric technologies these days. These Study shows how beneficial the iris technology can be to the Human in future.
I have put all my efforts in this study and have made an simple easy to understand ppt.
iris recognition system as means of unique identification Being Topper
Project Done and submitted by Students Of final year CBP Government Engineering College
student name : vipin kumar khutail , Krishnanad Mishra , Jaswant kumar, Rahul Vashisht
Project Description :
Iris recognition is an automated method of bio-metric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex random patterns are unique, stable, and can be seen from some distance
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A biometric ,system has been the important affordable and more reliable system .A biometrics identification system is refers to the automatic recognition of individual person based on their characteristics. Early authentication method like which can be stolen or shared by with other person . Biometric has two modals ,unimodals and multimodals .Inunimodol system , it has disadvantages due to lack of its non –versality and unacuptable error rate .To overcome these unimodal issues multimodals is better approach for combining two or more features of person like for sirisdetetmines a authentication (i.e. identification and verification ) this paper that characterstics ,types and biometrics ,fusion levels and research areas etc.
Advanced Audio Aid for Visually Impaired using Raspberry PiAM Publications
This work focuses on the obstacle detection and face detection which helps for blind person in day-to-day activities. Raspberry pi is used for interface powered by MATLAB. It helps in recognizing usual objects around the person. Addition to that, it also helps in finding the known person approaching the user. Portable power supply keeps the hardware running throughout the day and the power bank can be recharged. Hence the power consumption is low.
To Study Iris Recognition Systems, Databases, Complex Patterns and Segmentati...IJESM JOURNAL
Biometric authentication has been receiving extensive attention over the past decade with increasing demands in automated personal identification. Among many biometrics techniques, iris recognition is one of the most promising approaches due to its high reliability for personal identification. This paper presents the literature survey of Iris Recognition Systems, different types of databases and complex patterns of the iris texture. Conventional Iris Recognition System follows six steps, Image Acquisition, Preprocessing, Feature Extraction, Iris Coding, Matching and Result Generation. Matching will be done by using various databases like UBIRIS, CASIA , MMU2 etc. Also this paper will mention some methods of Iris Recognition.
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
Automatic attendance system is one of the significant issues of today’s research. Among other methods, human face recognition is highly used technique for attendance automation. Many systems have been proposed in literature using face recognition. Most of the systems are using fixed camera and desktop computers. We propose a system using mobile phones where an image is captured of group of peoples and face detection is done automatically. While considering computational and storage power of mobile devices, extracted local binary features for detected faces are then transferred to server machine using firebase database. Matching is done on server side, if face recognized than attendance is marked and feedback is sent back to client side. Experiments show effectiveness of proposed techniques with 95% correct recognition rate.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
A Review on Feature Extraction Techniques and General Approach for Face Recog...Editor IJCATR
In recent time, alongwith the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. Several feature extraction techniques are available such as template based, appearancebased,
geometry based, color segmentation based, etc. This paper presents an overview of various feature extraction techniques
followed in different reasearches for face recognition in the field of digital image processing and gives an approach for using these
feature extraction techniques for efficient face recognition
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
6th International Conference on Machine Learning & Applications (CMLA 2024)
1464426255 28 05-2016
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 5 129 - 131
_______________________________________________________________________________________________
129
IJRITCC | May 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Improving Iris Recognition Performance using Acquisition, Segmentation and
Filter
Miss. Priti V. Dable1
(PG Scholar)
Comm (Electronics)
S.D.C.E. Selukate
Wardha, India
dable.priti@gmail.com
Prof. P .R. Lakhe2
Assistant Professor,
Department of E&C
S.D.C.E. Selukate
Wardha,
pravinlakhe@rediffmail.com
Mr. S. S. Kemekar3
Inox Air Product Ltd,
Instrumentation Engineer
Wardha
Abstract:- Biometric recognition became a vital part of our living. Human Iris has very unique pattern so we can used it for highly security
purpose such as biometrics recognition. In this paper we are working on the parameter as image acquisition, image segmentation, feature
extraction and prototype forming based on the Human Iris image for biometrics recognition. Proposed method not only removes noise but also
detects the pupil and iris center accurately and localizes the iris and pupil region. For iris feature extraction purpose, 1D Gabor filter has been
used. With this proposed detection model we can have a constant matching score which is our desired objective.
Keyword- Image acquisition, iris normalization, iris sample, Hough transform, 1DGabor filter.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
In the modern age, security is always an important
issue in any sectors like bank, international airport, internet
based marketing accurate and reliable personal identification
arrangement and biometrics have become an important
technology for the security in the modern advanced world.
Humans as individuals, have unique characteristics,
these characteristics can be used to identify persons. This is
known as biometric detection. Iris is the part of the circle
around eye pupil. Although iris has a relatively contracted
region compared with entire area of the human body, iris has
a very unique prototype, different in each individual and the
prototype will remain stable.
In today's networked world, the need to keep the security
of information is becoming both ever more important and
ever more difficult. From time to time we hear about the
crimes of computer break by hackers, credit card racket,
government building. In most of these crimes, the criminals
were taking benefit of a primary mistake in the straight
access control systems: such as ID cards, keys, passwords,
and PIN numbers. None of these means are really defining
us. It goes without saying that if someone duplicates steals.
Newly technology became available to allow verification of
"true" individual identity.
This technology is based in a field called biometrics.
Biometric make contact with controls are automatic methods
of verifying the identity of a living person on the basis of
several physiological characteristics, such as. Voice
recognition, fingerprints, face recognition, handwriting,
hand geometry the retina and the iris. Most of the presented
methods have limited capabilities in recognizing quite
complex features in realistic real world situations. Iris
recognition has been contemplated as one of the most
constant biometrics technologies in recent years.
II. BASIS OF THEORY
Iris Eyes
Iris can provide as the basis for biometric systems.
Each iris has a texture that is very unique and detailed to
each person and remains stable for decades. The eye can
not be changed through surgery without causing any
damage to eyesight.
Fig 1. Anatomy of an eye and example of iris region
The advantages of using the iris for reliable
identification system are as follows.
1. Iris patterns do not change with age.
2. Iris is insulated and shielded from the outside
environment.
3. Simplicity and ease of implementation.
4. Speed- the process of matching the iris patterns is
very fast.
III. RELATE WORK
Many researchers used various method for iris
encoding and some of them reported that it has excellent
performance of a diverse database of many images. All
these algorithms are based on grey images, and color images
was not used. A new algorithm has been proposed for
locating the iris inner boundary and outer boundary by
modifying the accessible algorithm so that the iris area can
be segmented very easily with less detection of eyelids and
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 5 129 - 131
_______________________________________________________________________________________________
130
IJRITCC | May 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
eyelash. Then for feature extraction 1D Gabor filter have
been applied. But the encoded binary iris template that has
been obtained gives better result than the previous research
work.
Fig 2. Iris recognition system
IV. PROPOSED METHODOLOGY
The proposed methodology to design an efficient iris
reorganization system is as follows:
Selecting the input image in the form of eye image
Segmenting the iris for separating iris image
from its eye image.
.
Normalizing the iris for getting iris image which
is easier to be manipulated.
Extracting the features using Gabor transform.
Recognizing using Hamming distance
calculation.
A. Image acquisition
In an image acquisition process taking a good and clear
image with the help of digital camera with good resolution.
Here the CASIA iris image database of different versions
have been used for performing our tasks because images of
this database do not contain specular reflections.
B. Iris localization
The reason of iris localization is to localize the eye
image that corresponds to an iris. In iris region, there are
two boundary i.e. outer and inner boundary. Circular Hough
Transform is used to detect the inner and outer iris
boundary. Firstly, an edge map is generated using Canny
edge detector.
C. Iris normalization
After successfully segmenting the iris region, the
normalization process will produce iris regions with
constant dimensions. The irises captured from the different
people have different sizes. The volume of the irises from
the same eye may change due to clarification variations,
distance from the camera, in normalization process avoid
these factor.
V. EXPERIMENTAL RESULT
Fig 4(a) shows the input eye images that are taken from the
iris CASIA database. After taking the eye image (normally
Gray level image can be used) it is necessary to find out the
appropriate centre of that eye. Fig 4(b) indicates the inner
boundary collarette region detection and circular Hough
transform operation to find out the centre coordinates of iris
as well as pupil regions respectively. Fig 4(c) shows the Iris
segmentation process and gives the exact iris region in input
eye image.
(a) Input image
(b) Iris boundary
LocalizationFig 3: Flowchart of iris recognition system