ABSTRACT:- The iris is a stable biometric trait that has been widely used for human recognition in various applications. However, deployment of iris recognition in forensic applications has not been reported. A primary reason is the lack of human friendly techniques for iris comparison. To further promote the use of iris recognition in forensics, the similarity between irises should be made visualizable and interpretable. Recently, a human-in-the-loop iris recognition system was developed, based on detecting and matching iris crypts. Building on this framework, we propose a new approach for detecting and matching iris crypts automatically. Our detection method is able to capture iris crypts of various sizes. Our matching scheme is designed to handle potential topological changes in the detection of the same crypt in different images. Our approach outperforms the known visible-feature-based iris recognition method on three different data sets. After iris Crypts detection, Iris images were taken before and after the treatment of eye disease and the output shows the mathematical difference obtained from treatment. Gabor filter is used to extract the features. This iris recognition was effectively withstood with most ophthalmic disease like corneal oedema, iridotomies and conjunctivitis. This proposed iris recognition should be used to solve the potential problems that could cause in key biometric technology and medical diagnosis
The document proposes a unified framework for iris recognition that addresses challenges in unconstrained acquisition, robust matching, and privacy. It uses random projections and sparse representations to select good quality iris images, recognize iris patterns in a single step, and introduce cancelable templates for enhanced privacy without compromising security or recognition performance. Experimental results on public datasets demonstrate benefits of the proposed approach for robust and accurate iris recognition.
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
This document proposes a new iris recognition method called IRDO that fuses Dual Tree Complex Wavelet Transform (DTCWT) and Overlapping Local Binary Pattern (OLBP) features. DTCWT is used to extract micro-texture features from the iris, while OLBP enhances the extraction of edge features. Fusing these two methods results in improved matching performance and classification accuracy compared to state-of-the-the-art techniques. The proposed IRDO method achieves higher iris recognition rates as measured by Total Success Rate and Equal Error Rate.
This document presents a new iris segmentation method for iris recognition systems. The proposed method uses Canny edge detection and Hough transform to locate the iris boundary after finding the pupil boundary using image gray levels. Experiments on the CASIA iris image database of 756 images show the method can accurately detect the iris boundary in 99.2% of images. This is an improvement over other existing segmentation techniques. The key steps of the proposed method are preprocessing, segmentation using Canny edge detection and Hough transform, normalization using the rubber sheet model, feature encoding with Gabor wavelets, and matching with Hamming distance.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
The document compares multiple wavelet algorithms for iris recognition, including complex wavelet transform, Gabor wavelets, and discrete wavelet transform. It first provides background on iris recognition and wavelets. It then describes typical iris recognition systems which involve image acquisition, segmentation, normalization, feature extraction, and matching. Next, it discusses complex wavelets, Gabor wavelets, and discrete wavelet transform for feature extraction in iris recognition. Complex wavelets extract phase and amplitude information to accurately describe oscillating functions. Gabor filters model human visual processing and generate phase-coded bit strings for matching. Discrete wavelet transform uses dyadic wavelet scales and positions for efficient analysis. The paper compares these wavelet algorithms for iris image enhancement,
Biometric Iris Recognition Based on Hybrid Techniqueijsc
This document presents a study on implementing an iris recognition system using a hybrid technique. The system utilizes several image processing and machine learning techniques. It begins with preprocessing the iris image, including capturing, resizing and converting to grayscale. Histogram equalization is then used for enhancement. Two-dimensional discrete wavelet transform (2D DWT) is applied for feature extraction. Various edge detection algorithms including Canny, Prewitt, Roberts and Sobel are used to detect iris boundaries. The features are then stored in a vector for classification. The system is tested on different iris images and analysis shows 2D DWT and Canny edge detection provide adequate results for feature extraction and iris recognition.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes a proposed algorithm called Fusion of Hybrid Domain features for Iris Recognition (FHDIR).
The algorithm pre-processes iris images by resizing, binarization, cropping and splitting them. It then applies Fast Fourier Transform (FFT) to the left half of the iris image to extract features and applies Principal Component Analysis (PCA) to the right half to extract features. These feature sets are then fused using arithmetic addition to generate a final feature vector. Test iris features are compared to the database using Euclidean Distance for identification.
The proposed algorithm is evaluated on the CASIA iris database and is found to have better performance than existing algorithms in terms of false rejection rate, false acceptance rate, and true
Eye tracking system has played a significant role in many of today’s applications ranging from military
applications to automotive industries and healthcare sectors. In this paper, a novel system for eye tracking and
estimation of its direction of movement is performed. The proposed system is implemented in real time using an
arduino uno microcontroller and a zigbee wireless device. Experimental results show a successful eye tracking and
movement estimation in real time scenario using the proposed hardware interface.
The document proposes a unified framework for iris recognition that addresses challenges in unconstrained acquisition, robust matching, and privacy. It uses random projections and sparse representations to select good quality iris images, recognize iris patterns in a single step, and introduce cancelable templates for enhanced privacy without compromising security or recognition performance. Experimental results on public datasets demonstrate benefits of the proposed approach for robust and accurate iris recognition.
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
This document proposes a new iris recognition method called IRDO that fuses Dual Tree Complex Wavelet Transform (DTCWT) and Overlapping Local Binary Pattern (OLBP) features. DTCWT is used to extract micro-texture features from the iris, while OLBP enhances the extraction of edge features. Fusing these two methods results in improved matching performance and classification accuracy compared to state-of-the-the-art techniques. The proposed IRDO method achieves higher iris recognition rates as measured by Total Success Rate and Equal Error Rate.
This document presents a new iris segmentation method for iris recognition systems. The proposed method uses Canny edge detection and Hough transform to locate the iris boundary after finding the pupil boundary using image gray levels. Experiments on the CASIA iris image database of 756 images show the method can accurately detect the iris boundary in 99.2% of images. This is an improvement over other existing segmentation techniques. The key steps of the proposed method are preprocessing, segmentation using Canny edge detection and Hough transform, normalization using the rubber sheet model, feature encoding with Gabor wavelets, and matching with Hamming distance.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
The document compares multiple wavelet algorithms for iris recognition, including complex wavelet transform, Gabor wavelets, and discrete wavelet transform. It first provides background on iris recognition and wavelets. It then describes typical iris recognition systems which involve image acquisition, segmentation, normalization, feature extraction, and matching. Next, it discusses complex wavelets, Gabor wavelets, and discrete wavelet transform for feature extraction in iris recognition. Complex wavelets extract phase and amplitude information to accurately describe oscillating functions. Gabor filters model human visual processing and generate phase-coded bit strings for matching. Discrete wavelet transform uses dyadic wavelet scales and positions for efficient analysis. The paper compares these wavelet algorithms for iris image enhancement,
Biometric Iris Recognition Based on Hybrid Techniqueijsc
This document presents a study on implementing an iris recognition system using a hybrid technique. The system utilizes several image processing and machine learning techniques. It begins with preprocessing the iris image, including capturing, resizing and converting to grayscale. Histogram equalization is then used for enhancement. Two-dimensional discrete wavelet transform (2D DWT) is applied for feature extraction. Various edge detection algorithms including Canny, Prewitt, Roberts and Sobel are used to detect iris boundaries. The features are then stored in a vector for classification. The system is tested on different iris images and analysis shows 2D DWT and Canny edge detection provide adequate results for feature extraction and iris recognition.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes a proposed algorithm called Fusion of Hybrid Domain features for Iris Recognition (FHDIR).
The algorithm pre-processes iris images by resizing, binarization, cropping and splitting them. It then applies Fast Fourier Transform (FFT) to the left half of the iris image to extract features and applies Principal Component Analysis (PCA) to the right half to extract features. These feature sets are then fused using arithmetic addition to generate a final feature vector. Test iris features are compared to the database using Euclidean Distance for identification.
The proposed algorithm is evaluated on the CASIA iris database and is found to have better performance than existing algorithms in terms of false rejection rate, false acceptance rate, and true
Eye tracking system has played a significant role in many of today’s applications ranging from military
applications to automotive industries and healthcare sectors. In this paper, a novel system for eye tracking and
estimation of its direction of movement is performed. The proposed system is implemented in real time using an
arduino uno microcontroller and a zigbee wireless device. Experimental results show a successful eye tracking and
movement estimation in real time scenario using the proposed hardware interface.
Evaluation of Iris Recognition System on Multiple Feature Extraction Algorith...Editor IJCATR
Multi-algorithmic approach to enhancing the accuracy of iris recognition system is proposed and
investigated. In this system, features are extracted from the iris using various feature extraction algorithms,
namely LPQ, LBP, Gabor Filter, Haar, Db8 and Db16. Based on the experimental results, it is demonstrated
that Mutli-algorithms Iris Recognition System is performing better than the unimodal system. The accuracy
improvement offered by the proposed approach also showed that using more than two feature extraction
algorithms in extracting the iris system might decrease the system performance. This is due to redundant
features. The paper presents a detailed description of the experiments and provides an analysis of the
performance of the proposed method.
Evaluation of Iris Recognition System on Multiple Feature Extraction Algorith...Editor IJCATR
Multi-algorithmic approach to enhancing the accuracy of iris recognition system is proposed and investigated. In this system, features are extracted from the iris using various feature extraction algorithms, namely LPQ, LBP, Gabor Filter, Haar, Db8 and Db16. Based on the experimental results, it is demonstrated that Mutli-algorithms Iris Recognition System is performing better than the unimodal system. The accuracy improvement offered by the proposed approach also showed that using more than two feature extraction algorithms in extracting the iris system might decrease the system performance. This is due to redundant features. The paper presents a detailed description of the experiments and provides an analysis of the performance of the proposed method.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A robust iris recognition method on adverse conditionsijcseit
As a stable biometric system, iris has recently attracted great attention among the researchers. However,
research is still needed to provide appropriate solutions to ensure the resistance of the system against error
factors. The present study has tried to apply a mask to the image so that the unexpected factors affecting
the location of the iris can be removed. So, pupil localization will be faster and robust. Then to locate the
exact location of the iris, a simple stage of boundary displacement due to the Canny edge detector has been
applied. Then, with searching left and right IRIS edge point, outer radios of IRIS will be detect. Through
the process of extracting the iris features, it has been sought to obtain the distinctive iris texture features by
using a discrete stationary wavelets transform 2-D (DSWT2). Using DSWT2 tool and symlet 4 wavelet,
distinctive features are extracted. To reduce the computational cost, the features obtained from the
application of the wavelet have been investigated and a feature selection procedure, using similarity
criteria, has been implemented. Finally, the iris matching has been performed using a semi-correlation
criterion. The accuracy of the proposed method for localization on CASIA-v1, CASIA-v3 is 99.73%,
98.24% and 97.04%, respectively. The accuracy of the feature extraction proposed method for CASIA3 iris
images database is 97.82%, which confirms the efficiency of the proposed method.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
Iris is a physiological biometric trait, which is unique among all biometric traits to recognize person
effectively. In this paper we propose Multi-scale Independent Component Analysis (ICA) based Iris
Recognition using Binarized Statistical Image Features (BSIF) and Histogram of Gradient orientation
(HOG). The Left and Right portion is extracted from eye images of CASIA V 1.0 database leaving top and
bottom portion of iris. The multi-scale ICA filter sizes of 5X5, 7X7 and 17X17 are used to correlate with
iris template to obtain BSIF. The HOGs are applied on BSIFs to extract initial features. The final feature is
obtained by fusing three HOGs. The Euclidian Distance is used to compare the final feature of database
image with test image final features to compute performance parameters. It is observed that the
performance of the proposed method is better compared to existing methods.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document discusses biometric identification methods using retinal scans and iris recognition. Retinal scans map the unique blood vessel patterns of the retina, which differ between individuals and remain stable over a person's lifetime. Iris recognition systems use active or passive methods to identify patterns in the iris and convert them to a mathematical code for identification. These biometric methods provide accurate, reliable identification and are used for security applications like prisons, ATMs, and verifying the identities of athletes. However, retinal scans have limitations like being invasive, affected by eye disease or trauma, and requiring user cooperation.
Retinal pattern recognition uses the unique pattern of veins beneath the retina to identify individuals. Researchers take digital images of the retina by projecting light into the eye and scanning the retina. While retinal scanning provides reliable identification, it requires a high level of user cooperation and the equipment is expensive, making it best suited to highly secure environments like prisons.
Software Implementation of Iris Recognition System using MATLABijtsrd
The software implementation of iris recognition system introduces in this paper. This system intends to apply for high security required areas. The demand on security is increasing greatly in these years and biometric recognition gradually becomes a hot field of research. Iris recognition is a branch of biometric recognition method. In thesis, Iris recognition system consists of localization of the iris region and generation of data set of iris images followed by iris pattern recognition. In thesis, a fast algorithm is proposed for the localization of the inner and outer boundaries of the iris region. Located iris is extracted from an eye image, and, after normalization and enhancement, it is represented by a data set. Using this data set a Neural Network NN is used for the classification of iris patterns. The adaptive learning strategy is applied for training of the NN. The implementation of the system is developed with MATLAB. The results of simulations illustrate the effectiveness of the neural system in personal identification. Finally, the accuracy of iris recognition system is tested and evaluated with different iris images. Mo Mo Myint Wai | Nyan Phyo Aung | Lwin Lwin Htay "Software Implementation of Iris Recognition System using MATLAB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25258.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25258/software-implementation-of-iris-recognition-system-using-matlab/mo-mo-myint-wai
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
The interest in Biometrics from both governments and industry has lead to the emergence of multiple Biometric technologies all with their own strengths and flaws. One currently at the forefront of Biometrics is iris scanning.
The process involved in the identification and verification of people using iris scanning is examined in this paper. The advantages and disadvantages associated with the utilisation of such a technology are also explored. A number of legal and ethical issues are highlighted. Iris scanning is looked at in comparison to other forms of Biometric technologies. Future work in the area of Biometrics is also considered in light of current developments.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
This document summarizes several techniques for iris recognition. It begins with an abstract describing iris recognition and its accuracy compared to other biometric traits. It then reviews four iris recognition techniques in the literature:
1. A technique using moment invariants and Euclidean or Mahalanobis distance classifiers that achieved 100% recognition rates.
2. A segmentation algorithm using Daugman's integro differential operator that improved discrimination capabilities over other methods.
3. A pupil localization technique using negative thresholds and neighbors, and iris boundary detection using contrast enhancement and thresholding, achieving accurate segmentation.
4. A technique using Gaussian mixture models, Gabor filter banks, and simulated annealing to generate iris masks and increase recognition rates
This document describes a human identification system using retinal biometrics. It begins with an introduction to biometrics and why retinal biometrics are useful for identification. It then describes what the retina is and how retinal images are processed. The proposed system uses a three stage process of preprocessing, feature extraction, and matching. It highlights advantages like high accuracy and disadvantages like being intrusive. Applications include computer and physical access systems. Future work could improve user acceptance and accuracy. In conclusion, the presented system aims to use vascular patterns and a three stage matching algorithm for personal identification based on retina biometrics.
This document discusses iris and retinal scanning as biometric identification technologies. Retinal scanning analyzes the blood vessels at the back of the eye, while iris scanning reads patterns in the iris. Both are highly accurate, with almost zero false positive rates. However, retinal scanning requires more user skill and can be affected by eye conditions. Now widely used, iris scanning was developed in 1994 and has advantages over fingerprints in identifying individuals.
This document presents a new approach for human identification using sclera recognition. It begins with background on sclera and challenges with sclera recognition. It then describes the proposed methodology which includes sclera segmentation, feature extraction using Gabor filtering, and recognition using Bayesian classification. Experimental results show the false accept and reject rates for the approach. It concludes that sclera recognition is promising for human identification and can achieve accuracy comparable to iris recognition in visible light. The proposed approach uses Bayesian classification for recognition, which is more effective than previous matching score methods.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
This document proposes fusing eye vein and finger vein biometrics for multimodal authentication. It extracts features from eye vein and finger vein images separately, then concatenates the feature vectors. Experimental results on public databases show this technique achieves more accurate identity verification than single biometrics, with lower false rejection and acceptance rates. The fused template provides better discrimination than individual features.
Biometric Iris Recognition Based on Hybrid Technique ijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
Evaluation of Iris Recognition System on Multiple Feature Extraction Algorith...Editor IJCATR
Multi-algorithmic approach to enhancing the accuracy of iris recognition system is proposed and
investigated. In this system, features are extracted from the iris using various feature extraction algorithms,
namely LPQ, LBP, Gabor Filter, Haar, Db8 and Db16. Based on the experimental results, it is demonstrated
that Mutli-algorithms Iris Recognition System is performing better than the unimodal system. The accuracy
improvement offered by the proposed approach also showed that using more than two feature extraction
algorithms in extracting the iris system might decrease the system performance. This is due to redundant
features. The paper presents a detailed description of the experiments and provides an analysis of the
performance of the proposed method.
Evaluation of Iris Recognition System on Multiple Feature Extraction Algorith...Editor IJCATR
Multi-algorithmic approach to enhancing the accuracy of iris recognition system is proposed and investigated. In this system, features are extracted from the iris using various feature extraction algorithms, namely LPQ, LBP, Gabor Filter, Haar, Db8 and Db16. Based on the experimental results, it is demonstrated that Mutli-algorithms Iris Recognition System is performing better than the unimodal system. The accuracy improvement offered by the proposed approach also showed that using more than two feature extraction algorithms in extracting the iris system might decrease the system performance. This is due to redundant features. The paper presents a detailed description of the experiments and provides an analysis of the performance of the proposed method.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A robust iris recognition method on adverse conditionsijcseit
As a stable biometric system, iris has recently attracted great attention among the researchers. However,
research is still needed to provide appropriate solutions to ensure the resistance of the system against error
factors. The present study has tried to apply a mask to the image so that the unexpected factors affecting
the location of the iris can be removed. So, pupil localization will be faster and robust. Then to locate the
exact location of the iris, a simple stage of boundary displacement due to the Canny edge detector has been
applied. Then, with searching left and right IRIS edge point, outer radios of IRIS will be detect. Through
the process of extracting the iris features, it has been sought to obtain the distinctive iris texture features by
using a discrete stationary wavelets transform 2-D (DSWT2). Using DSWT2 tool and symlet 4 wavelet,
distinctive features are extracted. To reduce the computational cost, the features obtained from the
application of the wavelet have been investigated and a feature selection procedure, using similarity
criteria, has been implemented. Finally, the iris matching has been performed using a semi-correlation
criterion. The accuracy of the proposed method for localization on CASIA-v1, CASIA-v3 is 99.73%,
98.24% and 97.04%, respectively. The accuracy of the feature extraction proposed method for CASIA3 iris
images database is 97.82%, which confirms the efficiency of the proposed method.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
Iris is a physiological biometric trait, which is unique among all biometric traits to recognize person
effectively. In this paper we propose Multi-scale Independent Component Analysis (ICA) based Iris
Recognition using Binarized Statistical Image Features (BSIF) and Histogram of Gradient orientation
(HOG). The Left and Right portion is extracted from eye images of CASIA V 1.0 database leaving top and
bottom portion of iris. The multi-scale ICA filter sizes of 5X5, 7X7 and 17X17 are used to correlate with
iris template to obtain BSIF. The HOGs are applied on BSIFs to extract initial features. The final feature is
obtained by fusing three HOGs. The Euclidian Distance is used to compare the final feature of database
image with test image final features to compute performance parameters. It is observed that the
performance of the proposed method is better compared to existing methods.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document discusses biometric identification methods using retinal scans and iris recognition. Retinal scans map the unique blood vessel patterns of the retina, which differ between individuals and remain stable over a person's lifetime. Iris recognition systems use active or passive methods to identify patterns in the iris and convert them to a mathematical code for identification. These biometric methods provide accurate, reliable identification and are used for security applications like prisons, ATMs, and verifying the identities of athletes. However, retinal scans have limitations like being invasive, affected by eye disease or trauma, and requiring user cooperation.
Retinal pattern recognition uses the unique pattern of veins beneath the retina to identify individuals. Researchers take digital images of the retina by projecting light into the eye and scanning the retina. While retinal scanning provides reliable identification, it requires a high level of user cooperation and the equipment is expensive, making it best suited to highly secure environments like prisons.
Software Implementation of Iris Recognition System using MATLABijtsrd
The software implementation of iris recognition system introduces in this paper. This system intends to apply for high security required areas. The demand on security is increasing greatly in these years and biometric recognition gradually becomes a hot field of research. Iris recognition is a branch of biometric recognition method. In thesis, Iris recognition system consists of localization of the iris region and generation of data set of iris images followed by iris pattern recognition. In thesis, a fast algorithm is proposed for the localization of the inner and outer boundaries of the iris region. Located iris is extracted from an eye image, and, after normalization and enhancement, it is represented by a data set. Using this data set a Neural Network NN is used for the classification of iris patterns. The adaptive learning strategy is applied for training of the NN. The implementation of the system is developed with MATLAB. The results of simulations illustrate the effectiveness of the neural system in personal identification. Finally, the accuracy of iris recognition system is tested and evaluated with different iris images. Mo Mo Myint Wai | Nyan Phyo Aung | Lwin Lwin Htay "Software Implementation of Iris Recognition System using MATLAB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25258.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25258/software-implementation-of-iris-recognition-system-using-matlab/mo-mo-myint-wai
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
The interest in Biometrics from both governments and industry has lead to the emergence of multiple Biometric technologies all with their own strengths and flaws. One currently at the forefront of Biometrics is iris scanning.
The process involved in the identification and verification of people using iris scanning is examined in this paper. The advantages and disadvantages associated with the utilisation of such a technology are also explored. A number of legal and ethical issues are highlighted. Iris scanning is looked at in comparison to other forms of Biometric technologies. Future work in the area of Biometrics is also considered in light of current developments.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
This document summarizes several techniques for iris recognition. It begins with an abstract describing iris recognition and its accuracy compared to other biometric traits. It then reviews four iris recognition techniques in the literature:
1. A technique using moment invariants and Euclidean or Mahalanobis distance classifiers that achieved 100% recognition rates.
2. A segmentation algorithm using Daugman's integro differential operator that improved discrimination capabilities over other methods.
3. A pupil localization technique using negative thresholds and neighbors, and iris boundary detection using contrast enhancement and thresholding, achieving accurate segmentation.
4. A technique using Gaussian mixture models, Gabor filter banks, and simulated annealing to generate iris masks and increase recognition rates
This document describes a human identification system using retinal biometrics. It begins with an introduction to biometrics and why retinal biometrics are useful for identification. It then describes what the retina is and how retinal images are processed. The proposed system uses a three stage process of preprocessing, feature extraction, and matching. It highlights advantages like high accuracy and disadvantages like being intrusive. Applications include computer and physical access systems. Future work could improve user acceptance and accuracy. In conclusion, the presented system aims to use vascular patterns and a three stage matching algorithm for personal identification based on retina biometrics.
This document discusses iris and retinal scanning as biometric identification technologies. Retinal scanning analyzes the blood vessels at the back of the eye, while iris scanning reads patterns in the iris. Both are highly accurate, with almost zero false positive rates. However, retinal scanning requires more user skill and can be affected by eye conditions. Now widely used, iris scanning was developed in 1994 and has advantages over fingerprints in identifying individuals.
This document presents a new approach for human identification using sclera recognition. It begins with background on sclera and challenges with sclera recognition. It then describes the proposed methodology which includes sclera segmentation, feature extraction using Gabor filtering, and recognition using Bayesian classification. Experimental results show the false accept and reject rates for the approach. It concludes that sclera recognition is promising for human identification and can achieve accuracy comparable to iris recognition in visible light. The proposed approach uses Bayesian classification for recognition, which is more effective than previous matching score methods.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
This document proposes fusing eye vein and finger vein biometrics for multimodal authentication. It extracts features from eye vein and finger vein images separately, then concatenates the feature vectors. Experimental results on public databases show this technique achieves more accurate identity verification than single biometrics, with lower false rejection and acceptance rates. The fused template provides better discrimination than individual features.
Biometric Iris Recognition Based on Hybrid Technique ijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
This document discusses using watermarking and visual cryptography for secure identity-based authentication. It proposes embedding an iris image using a watermarking algorithm and visual cryptography techniques for protection. Feature extraction and binomial distribution analysis are used to evaluate false acceptance and rejection rates to validate two algorithms, MASEK and Ma, for iris recognition on noisy images. The document also discusses discrete cosine transform (DCT) and discrete wavelet transform (DWT) techniques for image processing and compression in iris recognition systems.
This document is a technical seminar report on touch accessors and eye scanners presented by Avinash Vemulapalli at Sri Vasavi Engineering College. It discusses the working of touch accessors which use finger ridges for authorization and eye scanners which use the iris for recognition. Eye scanners were developed by Denis-Alfred and their main advantages include easy user access and high security. Pattern matching is one algorithm used. Eye scanners are now used in mobile devices developed by Apple.
Diabetic Retinopathy detection using Machine learningIRJET Journal
This document summarizes a research paper that aims to detect diabetic retinopathy using machine learning. It begins with an introduction to diabetic retinopathy and the need for early detection. It then discusses existing methods for detection that use features like SURF, MSER and morphological operations. The paper proposes a methodology using deep learning techniques like convolutional neural networks to classify retinal images as healthy or indicating diabetic retinopathy. This involves collecting and preprocessing images, training and evaluating a model, and potentially optimizing the model for accurate detection of the condition.
A Robust Approach in Iris Recognition for Person AuthenticationIOSR Journals
The document describes a robust approach for iris recognition used for person authentication. It proposes using eight main stages: 1) scanning the iris image, 2) converting it to grayscale, 3) applying median filters to reduce noise, 4) detecting the pupil center, 5) using canny edge detection to identify iris and pupil edges, 6) determining the iris and pupil radii, 7) localizing the iris, and 8) unrolling the iris texture. It then uses k-means clustering to compare images and match them to authenticate individuals in a database. The approach aims to improve on previous iris recognition methods by more accurately detecting non-circular iris and pupil shapes.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our
surrounding environment has gained more interest
in recent days. Along with contemporary technology
comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of
compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed
for identification should be robust and dynamic. In
this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and retinal scanning algorithms have been discussed whi
ch promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...aciijournal
This document summarizes a research paper on using ocular biometrics for authentication in pervasive computing environments. It discusses using iris recognition and retinal scanning algorithms. Iris recognition uses patterns in the iris to identify individuals accurately. Retinal scanning analyzes blood vessel patterns in the retina, which are unique to each person. The document outlines Daughman's iris recognition algorithm and discusses enhanced versions. It addresses the performance and applications of these biometric techniques on pervasive devices, noting they can identify users accurately and securely.
Advanced Computational Intelligence: An International Journal (ACII)aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
This document summarizes a study on iris recognition. It discusses how iris recognition works by capturing high-resolution images of a person's iris and extracting distinguishing features to create biometric templates for identification. The key steps described are iris localization to isolate the iris region, feature extraction using filters to encode patterns into binary codes, and template matching using Hamming distance to compare templates and identify matches. Advantages of iris recognition include very high accuracy and verification time under 5 seconds. Disadvantages include its intrusive nature and high memory requirements. Applications discussed include security for ATMs, computers, buildings, and airports.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Journal looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the Journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
A survey paper on various biometric security system methodsIRJET Journal
This document summarizes various biometric security systems for identification. It discusses fingerprint recognition, iris recognition, and face recognition methods. It provides an overview of different approaches that have been proposed, including using watermarking, edge detection techniques, adaptive boosting algorithms, and fuzzy logic. The document also analyzes the drawbacks of previous methods and proposes using a multimodal biometric system that fuses fingerprints, iris, and face for more secure identification. Overall, the document surveys different biometric identification techniques and highlights that a multimodal approach can help overcome limitations of individual methods.
This document describes an iris recognition system implemented using National Instruments LabVIEW for secure voting. The system has four main stages: 1) image acquisition using an infrared camera, 2) iris localization by detecting circles in the iris image, 3) pattern matching to extract an iris code, and 4) authentication by matching the iris code to a database. The database stores voter information and iris codes in an encrypted format. On voting day, the system matches the voter's ID and captured iris image to the database to verify their identity before allowing them to vote. The system aims to provide more secure identity verification than traditional password or ID systems.
This document discusses enhancing biometric authentication for network security using iris recognition. It proposes using iris biometrics to generate secure authentication keys. The methodology involves preprocessing iris images, extracting minutiae feature points from the iris, generating a secret key from the minutiae, and using the key to encrypt and authenticate network access. Experimental results on two iris image datasets show the method effectively provides network security through iris-based encryption and authentication.
This document discusses various soft computing techniques for iris recognition, specifically focusing on two neural network approaches: Competitive neural network Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM). It provides an overview of iris recognition as a biometric method, summarizes preprocessing steps like localization, segmentation, and normalization of iris images. It also describes feature extraction and matching steps. Finally, it defines artificial neural networks and discusses how LVQ and ARAM can be used for pattern matching in iris recognition applications.
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
1. Iris recognition is a reliable biometric authentication method that uses the unique patterns in the iris to identify individuals.
2. Previous work has focused on detecting fake irises using techniques like analyzing image quality features, extracting texture features from the iris, and applying weighted local binary patterns.
3. Detecting fake irises using printed contact lenses is challenging but important for security. Methods have analyzed features like iris edge sharpness, iris-texton histograms, and gray-level co-occurrence matrices to differentiate real and fake irises.
4. Combining local descriptors like SIFT with local binary patterns can improve fake iris detection performance by making the approach
Protection has become one of the biggest fields of study for several years, however the demand for this is
growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from
any workstation to cloud, and though protection must be incredibly important all over. Throughout the past
two decades, sufficient focus has been given to substantiation along with validation in the technology
model. Identifying a legal person is increasingly become the difficult activity with the progression of time.
Some attempts are introduced in that same respect, in particular by utilizing human movements such as
fingerprints, facial recognition, palm scanning, retinal identification, DNA checking
Similar to A Novel Approach for Detecting the IRIS Crypts (20)
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...IJERDJOURNAL
Abstract:- Predictive data mining is an upcoming and fast-growing field and offers a competitive edge for the benefit of organization. In recent decades, researchers have developed new techniques and intelligent algorithms for predictive data mining. In this research paper, we have proposed a novel training algorithm for optimizing neural networks for prediction purpose and to utilize it for the development of prediction models. Models developed in MATLAB Neural Network Toolbox have been tested for insurance datasets taken from a live data warehouse. A comparative study of the proposed algorithm with other popular first and second order algorithms has been presented to judge the predictive accuracy of the suggested technique. Various graphs have been presented to analyse the convergence behaviour of different algorithms towards point of minimum error.
The development of the Islamic Heritage in Southeast Asia tradition and futur...IJERDJOURNAL
ABSTRACT: This research explores the historical development of Islamic architecture in Southeast Asia from the first idea to design a mosque by the Prophet Mohammad until the development at these days with the various purism passages And as developed up these days with the passages of the development of the traditional type to the postmodern, finally to modern Southeast Asia. The Islamic architecture has been developed in six traditional typologies of types of mosques is renowned throughout the world. Southeast Asia mosques are divided into various types according to the regional culture as Arabic type, Turkish type, the Iranian type, the Indian type, the Chinese type and South East Asian type. This research describes the main characteristics of these types. The main purpose of this research is to draw a correlation between the descriptions of the mosques in Malaysia as presented in the traditional typology that contains in its features in main types, relations in common throughout the Islamic world, however, distinguishes itself with the architectural form according to the local tradition.
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed / scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that means employing passive attendance, where at a time, the attendance of multiple people can get captured. We have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed system, creation of database and face detection is done by using the concepts of bounding box, whereas for face recognition we employ histogram equalization and matching technique.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
Human Resource Competencies: An Empirical AssessmentIJERDJOURNAL
ABSTRACT: Human beings are the essential part of the process. Today, technology and machines are taking over the human resource, as claimed by many people; but technology and machines can never replace human resource entirely. Humans are required for operating and maintaining these machines. Human resource is extremely important for developing or bringing about new and required changes to these machines and technologies. The study of the history and the current Human Resource Management trends points out some important facts
Prospects and Problems of Non-Governmental Organizations in Poverty Alleviati...IJERDJOURNAL
ABSTRACT: The World Bank sponsored Millennium Development Goals (MDGs), launched in 1990 envisaged a world free of poverty by the year 2015. The North-East (where Gombe State is centrally located) is experiencing significantly higher poverty and lack of progress in poverty reduction efforts. With coming to end of 2015, much still need to be done to attain the MDGs. With over 62.6% Nigerian population still very poor, there is need for a continuous search for alternative planning & development options that would help ameliorate poverty and sustained our dream for a world free of poverty and wants. This study examines the prospects and investigates the constraints of Non-Governmental Organizations (NGOs) in poverty alleviation and community development. Literature review, questionnaire and interview methods were used for the study. The findings revealed that: finance, continuity of projects/programmes, conflicts and insecurity were the major problems confronting the NGOs. An interesting revelation is that majority of the respondents indicated that they wait for the NGOs or Government to initiate poverty alleviation programmes/projects. The implication is that the community dwellers need attitudinal change necessary for self reliance. The prospect of NGOs in poverty alleviation and community development in the study area is very bright due to rapid population growth & increasing poverty levels with the attendant positive effects on urban planning and regional development. The study recommends that NGOs should (1) form an association to enable them work together, and utilize social capital in their operation/services. (2) seek to explore avenues for funding from donor agencies. Finally, the Government needs to address some of its short comings.
Development of Regression Model Using Lasso And Optimisation of Process Param...IJERDJOURNAL
ABSTRACT:- Metal Spinning is a concept of describing the forming of metal into seamless, axisymmetric shapes by a combination of rotational motion and force. Sheet metal spinning is one of the metal forming processes, which a flat metal blank is rotated at a high speed and formed into an axisymmetric part by a roller which gradually forces the blank on to a mandrel, bearing the final shape of the spun part. Over the last few decades, sheet metal spinning has developed significantly and spun products have been used in various industries. Nowadays the process has been expanded to new horizons in industries, since tendency to use minimum tool and equipment costs and also using lower forces with the output of excellent surface quality and good mechanical properties. The automation of the process is of greater importance, due to its wider applications like decorative household‟s goods, rocket nose cones, gas cylinders etc. The objective of the current work is to develop the mathematical model for the spinning process with surface roughness as response and the input parameters as Mandrel speed (rpm), geometry of the Roller and Thickness of sheet (mm). Type of mandrel (EN8 Material) considered in the spinning process has the geometrical profile of parabola and single roller and double roller tools (EN8 Material) are used to deform the Al2024-T3 sheet metal paper aims to understand the process parameters that affect the surface finish of the spun component. Full factorial Design of Experiments technique is used to find the minimum number of experimental trials that are required to develop the regression model. A regression model using Least Absolute Shrinkage and Selection Operator (Lasso) is developed to further deepen the understanding between the input parameters and the surface roughness. The model was optimised using Sequential Quadratic Programming.
Use of Satellite Data for Feasibility Study And Preliminary Design Project Re...IJERDJOURNAL
ABSTRACT: In the developing countries like India, need of infrastructure is very high as compared to the available resources. The various organizations put their demands to state and center government for sanction of their project, government depends upon its various department to provide an approximate cost so that priorities can be assigned. The conventional procedure depends upon the land surveying, collection of data from various departments resulting in delay in necessary decision making or some time shelving due to unreasonable cost estimate due to field data being very old. Survey of India, The National Survey and Mapping Organization single handily taking this responsibility thus up gradation of data is far behind the actual development. From the satellite data, which is available in the form of images and terrains (even in 3d LiDAR points for some areas) is very useful for Feasibility Study, and Preliminary Project Report. In the present study natural drain named „Chai Nala‟ meanders through the prime property of Greater Mohali Area Development Authority (GMADA) thus making a big chunk of commercial land inoperative. It was proposed to straighten and channelize to reclaim the land from drain regime. Being the precious land department wanted the most economical and technically sound design without taking any risk. It was decided to counter check the hydraulic data, ground profile, acquired from the Punjab Irrigation Department with the satellite data and Differential Global Positioning System (DGPS). The data from the Google Earth was acquired using Cad Earth software and water shed analysis was carried out using Autodesk Civil 3D software. Comparison of results shows that this technique is quite useful and can be for preliminary feasibility and project preparation. Thus saving huge money and time.
Microwave Assisted Sol Gel Synthesis of Magnesium Oxide(Mgo)IJERDJOURNAL
ABSTRACT: Magnesium oxide (MgO) nanoparticles have been synthesized by Microwave assisted Sol gel synthesis method by using the precursors citric acid (C2O4H2) and magnesium chloride (Mgcl2.6H2O). It is a simple, novel and cost effective method. The structure, morphology and crystalline phase of the magnesium oxide nanocrystals have been investigated by scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray diffraction (XRD).Presence of functional groups and optical characters are analyzed by using FTIR and UV- visible techniques
Development of Enhanced Frequency Drive for 3-Phase Induction Motors Submitte...IJERDJOURNAL
ABSTRACT: Three-phase induction motors produce mechanical power by electromagnetic induction and run on a 3-phase ac supply. They require efficient speed control, to enable them do variable speed operations, save power consumption and reduce machine noise. In this dissertation, a new switching device called MosControlled Thyristor (MCT) for frequency drive is introduced. Based on the new switching device and AT89C52 microcontroller, an enhanced frequency drive for controlling the speed and torque of 3-phase 15kW squirrel cage induction motor is modeled. Different voltages ranging from 342V to 415V and frequencies ranging from 50Hz to 60Hz are used in a systematic manner to simulate the system based on the new switching device. The simulation program is written in C language and tested with Proteus 7.6 simulation software. Voltage and frequency have significant impact on the actual speed and torque of the motor. Simulation results show that with the new model, the torque (56.66Nm) developed by the motor which is constant throughout each speed range is directly proportional to the ratio (6.7:1) of the applied voltage and the frequency of the supply and the selected speeds (1450, 1510, 1570, 1630, 1690 and 1750 rpm) are locked irrespective of change in load. This is unlike other models where magnetic saturation and conduction drop of IGBT lead to voltage/frequency imbalance resulting in excessive drawing of current by the motor and overheating. This new control method has a speed regulation of ±2 to 3% of maximum frequency, speed response of 3Hz, speed control range of 1: 40 and efficiency of 88%, as further advantages. Comparison of the system with other speed control techniques shows improved energy-saving, cost effectiveness and safety in operation. The contributions of this research aim to make Volts per Hertz speed control method based on MCT a reliable better alternative to other well known methods in speed control of three-phase induction motors
Short-Term Load Forecasting Using ARIMA Model For Karnataka State Electrical ...IJERDJOURNAL
ABSTRACT: Short-term load forecasting is a key issue for reliable and economic operation of power systems. This paper aims to develop short-term electric load forecasting ARIMA Model for Karnataka Electrical Load pattern based on Stochastic Time Series Analysis. The logical and organised procedures for model development using Autocorrelation Function and Partial Autocorrelation Function make ARIMA Model particularly attractive. The methodology involves Initial Model Development Phase, Parameter Estimation Phase and Forecasting Phase. To confirm the effectiveness, the proposed model is developed and tested using the historical data of Karnataka Electrical Load pattern (2016). The forecasting error of ARIMA Model is computed and results have shown favourable forecasting accuracy.
Optimal Pricing Policy for a Manufacturing Inventory Model with Two Productio...IJERDJOURNAL
ABSTRACT: When a new product is launched, a manufacturer applies the strategy of offering a quantity incentive initially for some time to boost up the demand of the product. The present paper describes a manufacturing inventory model with price sensitive demand enhanced by a quantity incentive. Later on demand becomes time increasing also. Inventory cycle starts with low production rate which is followed by higher production rate when demand is boosted up. Shortages are not allowed in this model. Presentation of numerical examples, tables, graphs and sensitivity analysis describes the model very well. Lastly case without incentive illustrates that usually the quantity incentive offered initially is beneficial.
Analysis of failure behavior of shear connection in push-out specimen by thre...IJERDJOURNAL
ABSTRACT:- This study analyzes the failure mechanism of shear connection by three-dimensional finite element analysis (FEA) of push-out specimens that was practically unaffordable experimentally or by twodimensional FEA. For the analysis of the failure behavior of the compression strut formed in the loaded concrete member, the three-dimensional principal stress space is transformed into two-dimensional space by means of the relation between the hydrostatic stress and the deviatoric stress. The analysis of the stress state in the compression strut revealed that the deviatoric stress increases with larger load particularly in the concrete surrounding the lower part of the shear stud. Accordingly, bearing failure of concrete occurred locally within a limited region in the slab. The steep increase of the deviatoric stress accompanying the increase of the load resulted in the failure of concrete around the lower part of the shear stud, which in turn provoked the deformation and the development of bending moment of the shear stud. Finally, plastic hinge formed in the shear stud leading it to reach its limit state. The proposed finite element model can also be used to model the shear connection of the composite beam and, the proposed stress analysis method can be applied to analyze its composite action behavior.
Discrete Time Batch Arrival Queue with Multiple VacationsIJERDJOURNAL
ABSTRACT:- In this paper we consider a discrete time batch arrival queueing system with multiple vacations. It is assume that the service of customers arrived in the system between a fixed intervals of time after which the service goes on vacations after completion of one service of cycle is taken up at the boundaries of the fixed duration of time. This is the case of late arrival. In case of early arrival i.e. arrival before the start of next cycles of service. If the customer finds the system empty, it is served immediately. We prove the Stochastic decomposition property for queue length and waiting time distribution for both the models.
Regional Rainfall Frequency Analysis By L-Moments Approach For Madina Region,...IJERDJOURNAL
ABSTRACT:- In arid regions, extreme rainfall event frequency predictions are still a challenging problem, because of the rain gauge stations scarcity and the record length limitation, which are usually short to insure reliable quantile estimates. Regional frequency analysis is one of the popular approaches used to compensate the data limitation. In this paper, regional frequency analysis of maximum daily rainfall is investigated for Madinah province in the Western Kingdom of Saudi Arabia (KSA). The observed maximum daily rainfall records of 20 rainfall stations are selected from 1968 to 2015. The rainfall data is evaluated using four tests, namely, Discordance test (Di), Homogeneity test (H), Goodness of fit test (Zdist) and L-moment ratios diagram (LMRD). The Di of L-moments shows that all the sites belong to one group (Di <3.0).><1). Finally, the Zdist is used to evaluate five probability distribution functions (PDFs) including generalized logistic (GLO), generalized extreme value (GEV), generalized normal (GNO), generalized Pareto (GPA), and Pearson Type III (PE3). Zdist and LMRD both showed that PE3 distribution is the best among the other PDFs. The regional parameters of the candidate PDF are computed using L-moments approach and accordingly the regional dimensionless growth curve is developed. The results enhance the accuracy of extreme rainfall prediction at-sites and also they can be used for ungauged catchment in the region.
Implementing Oracle Utility-Meter Data Management For Power ConsumptionIJERDJOURNAL
ABSTRACT: In this digital mobile world, it‟s need of time to streamline and increase efficiency in business processes like effective data collection, measurement, automatic validation, editing and estimation of measurement data, analysis and dashboard for forecasting and ease in end user accessibility with Just in Time. This paper is following two methodology in this process. CEMLI is an extensive framework for developing and implementing for Oracle whereas OUM is business process and use case driven process which supports products, tool, technologies and documentation. This paper have focused on analytical data, system automation functionality along with prototype designing. For this, analysts and administrators will collect and define calculation rule for data collection and measurement, deployment methods, dashboards and security features. This paper gives measure understanding of cloud technologies and their features like services (SaaS), deployment methods, security and ability to reduce overhead cost, downtime, and automate business processes with 360 degree review and analysis. It consolidates data in one system with volumes of analog and interval data which facilitates new customer with offering and effective program. Also it maximizes return on investments and protects revenue through comprehensive exception management.
Business Intelligence - A Gift for Decision Maker for the Effective Decision ...IJERDJOURNAL
ABSTRACT: Business Intelligence is a socio-technical concept emerged to help managers especially in their decision making tasks. A manager with different decision making styles has been started to make use of business intelligence in their own ways. Are the all managers taking benefits of Business intelligence in the same way? Does Business intelligence give each category what they want in the decision making process? If the answer to these questions is – No, then what is the expectation of managers from BI having different decision making style? Will BI could satisfy their needs? If yes, then how? By using well-formed theory in different styles of decision making and taking BI capabilities into consideration this paper highlights the framework which defines appropriate BI capabilities with each decision making style. Study shows in order to serve each style of decision in which BI capabilities changes with respect to style. It is believed that by making BI customized based on decision making styles; BI would be the much more successful in serving all the categories of managers
Effect of Water And Ethyl Alcohol Mixed Solvent System on the Stability of Be...IJERDJOURNAL
This document discusses the effect of water and ethyl alcohol mixed solvent systems on the stability of metal complexes formed between beta-hydroxy ketone and benzotriazole ligands. The study examines ternary complexes of copper, nickel, zinc, and cobalt ions with different beta-hydroxy ketone and benzotriazole derivatives. The stabilities of the complexes were determined using pH metric titration and found to vary with the solvent composition. Intramolecular interactions between the ligands were found to contribute significantly to complex stability. Copper formed the most stable complexes while cobalt formed the least stable.
Design of Synthesizable Asynchronous FIFO And Implementation on FPGAIJERDJOURNAL
ABSTRACT: This paper presents a design of asynchronous FIFO which, along with the regular status signals, consists of some extra status signals for more user-friendly design and added safety. Gray code pointers are used in the design. For synchronisation purpose, two synchroniser modules are used which contain two D-flip-flops each. The design is implemented and synthesised at register transfer level (RTL) using Verilog HDL. Simulation and implementation is done using Xilinx ISE Design Suite. Further, the design is implemented on Basys 2 Spartan-3E FPGA Board. Asynchronous FIFO is used to carry out steady data transmission at high speeds between two asynchronous clock domains.
Prospect and Challenges of Renewable Energy Resources Exploration, Exploitati...IJERDJOURNAL
ABSTRACT: This paper enumerates the status and challenges of exploration, exploitation and development of renewable energy resources and its roles in sustainable development in Africa. A brief review of energy and renewable energy resources in Africa was succinctly done. The concept of sustainable development as it borders on the Renewable Energy Technologies and their roles were also discussed. The challenges facing the acceptance, deployment and promotion of Renewable Energy Technologies in Africa were also highlighted. The barriers were classified as; policy, regulation and institutional; information and technical capacity and financial. Recommendations were made towards solving problems peculiar to exploration, exploitation and development of Renewable Energy in entirety in Africa.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 13, Issue 6 (June 2017), PP.01-12
1
A Novel Approach for Detecting the IRIS Crypts
Neelima Chintala1
, D. Ravi Krishna Reddy2
, M. Nagaraju3
1
M.Tech Research Scholar, ECE, Gudlavalleru Engineering College, Gudlavalleru, Krishna(Dt), A.P
2
Associate Professor, ECE, Gudlavalleru Engineering College, Gudlavalleru, Krishna(Dt), A.P
3
Assistant Professor, IT, Gudlavalleru Engineering College, Gudlavalleru, Krishna(Dt), A.P
ABSTRACT:- The iris is a stable biometric trait that has been widely used for human recognition in various
applications. However, deployment of iris recognition in forensic applications has not been reported. A primary
reason is the lack of human friendly techniques for iris comparison. To further promote the use of iris
recognition in forensics, the similarity between irises should be made visualizable and interpretable. Recently, a
human-in-the-loop iris recognition system was developed, based on detecting and matching iris crypts. Building
on this framework, we propose a new approach for detecting and matching iris crypts automatically. Our
detection method is able to capture iris crypts of various sizes. Our matching scheme is designed to handle
potential topological changes in the detection of the same crypt in different images. Our approach outperforms
the known visible-feature-based iris recognition method on three different data sets. After iris Crypts detection,
Iris images were taken before and after the treatment of eye disease and the output shows the mathematical
difference obtained from treatment. Gabor filter is used to extract the features. This iris recognition was
effectively withstood with most ophthalmic disease like corneal oedema, iridotomies and conjunctivitis. This
proposed iris recognition should be used to solve the potential problems that could cause in key biometric
technology and medical diagnosis
Keywords:- Iris recognition, forensics, visible feature, human-in-the-loop, eye pathology, ophthalmic disease,
corneal Oedema, iridotomies, conjunctivitis
I. INTRODUCTION
IRIS recognition is one of the most reliable techniques in biometrics for human identification. The
Daugman algorithm [1] can achieve a false match rate of less than 1in 200 billions [2]. Iris recognition
techniques have been used widely by governments, such as the Aadhaar project in INDIA[3]. However, the iris
is still under assessment as a biometric trait in law enforcement applications. One reason that hinders the
forensic deployment of iris is that iris recognition results are not easily interpretable to examiners. As discussed
in [4], ―Iris Examiner Workstation‖ may be built analogously to the ―Tenprint Examiner Workstation‖, which
has been used in forensics [5]. In fingerprint recognition, a human examiner bases a decision on the number of
matched minutiae on two fingerprints [6]. In contrast, common iris recognition techniques, such as Daugman‘s
framework [1], perform matching on an iris code, which is the result of applying a band-pass filter and quantizer
to grayscale images. In this scenario, the whole procedure appears as a black-box to an examiner without the
knowledge of image processing. Experiments have shown that human examiners can perform well in identity
verification using iris images [7]. In [7], the certainty was rated from 1 to 5. The decision was made based on
human perception of the overall texture. Analogous to fingerprints, one way to further promote the
development of iris recognition in law enforcement applications is to make the similarity between irises
interpretable so that the whole process can be supervised and verified by human experts. Namely, the judgement
should be made based on quantitative matching of visible features in iris images. In the literature, the study of
iris recognition relevant to forensics includes the recognition of iris captured in visible wavelength [8] or non-
ideal conditions, such as on the move or at a distance [9]. There are very few results on investigating iris
recognition using human-friendly features. Known feature based iris recognition methods, such as ordinal
features [10], SIFT descriptors [11], and pseudo-structures [12], are neither easily interpretable nor
corresponding to any physically visible features.
In this paper, we seek to improve the performance of the automated iris recognition process, i.e., the
first three steps of the ACE-V framework. Specifically, we propose a new fully automated approach to: (1)
extract human-interpretable features in iris images, and (2) match the features with the images in the database to
determine the identity. Our proposed approach can provide reliable aid to human evaluation in a human-in-the-
loop iris recognition system. Our new approach employs the following observations. In theory, iris crypts may
appear in various sizes and shapes in images. In practice, it is sometimes uncertain whether multiple proximal
crypts are connected. Furthermore, slight differences in the acquired images of the same iris may alter the
topology of the detection of the same crypts from image to image. An example is shown in Figure 2. The two
images in Figure 2 are from the same eye, but acquired at different times. Examples of the same crypts with
2. A Novel Approach for Detecting the IRIS Crypts
2
different topologies are labeled in the red boxes. Yet, even though the topology of particular crypts may vary,
the overall similarity can still be determined quite easily by a human examiner. There are two main tasks in our
approach: crypt detection and crypt matching. Our detection (or segmentation) algorithm is designed to handle
multi-scale crypts. It applies a key morphological operation in a hierarchical manner. Human annotated training
data is used to determine the major parameters, so that the detected crypts are similar to those obtained by
human inspection. In our matching algorithm, we adopt a matching model based on the Earth Mover‘s Distance
(EMD) [18]. This matching model is quite general. Specifically, to handle possible differences in crypt
topology, our matching algorithm is able to establish correspondences between the detected crypts in two
images, which can be one-to-one, one-to-multiple, multiple-to-one, or even multiple-to-multiple matching.
Additionally, due to different lighting conditions, there may be some false alarms or missing detections. Not all
crypts can be captured in every image, subject to different physical conditions. Our matching algorithm is
carefully designed so that it performs robustly to segmentation errors and potential appearance/disappearance of
small crypts. The segmentation algorithm may detect some blob-like regions not physically corresponding to
iris crypts. As long as such regions are stable, they will be accepted as human interpretable features, and can
contribute to discriminating different irises. Our matching algorithm (Section II-B) is designed to be robust to
such false positive errors. Therefore, we use the term ―crypts‖ and ―human interpretable features‖
interchangeably in the remainder of the paper. A preliminary version of the algorithm proposed herein was
presented in [19]. Comparing to the prior work, the feature detection approach has been modified here to reduce
some false positive errors. In addition, we conducted more extensive evaluation in this paper comparing to [19].
Besides our in-house dataset and ICE2005 [20], our approach was evaluated on the CASIA-Iris-Interval
(Version 4.0) dataset [21]. Consistent results were obtained on three different datasets with fairly large number
of subjects and variety. In addition, the benefits of multiple enrollment is demonstrated experimentally for the
human-in-the-loop iris recognition system.
Iris recognition is a biometric technology for identifying humans by capturing and analyzing the unique
patterns of the iris in the human eye. Iris recognition can be used in a wide range of applications in which a
person‘s identity must be established or confirmed. passport control, border control, frequent flyer service,
premises entry, access to privileged information, computer login and r transaction in which personal
identification and authentication are the key elements. Most dangerous security threats in today‘s world are
impersonation, in which somebody claims to be someone else. Through impersonation, a high-risk security area
can be vulnerable. An unauthorized person may get access to confidential data or important documents can be
stolen. Normally, impersonation is tackled by identification and secure authentication. Traditional knowledge-
based (password) or possession-based (ID, Smart card) methods are not sufficient since they can be easily
hacked or compromised. Hence, there is an essential need for personal characteristics-based (biometric)
identification due to the fact that it can provide the highest protection against impersonation. Among other
biometric approaches, the new Iris recognition technology promises higher prospects of security. Due to eye
diseases Iris recognition sometimes failed. In this proposed method diseases affected parts of the iris are
identified and remedial actions are taken. So this method used for medical diagnosis and person identification.
Commonly occurring diseases are Burning Eye, Bloody Eye (Subconjunctival Hemorrhage), Contact Lens
Problem, Cataract, Discharge eye drainage, Eyelid twitching, Glaucoma. Eye burning is mainly induced due to
eye strain, eye allergies and strain. Blood eye is caused when the blood vessels get broken in the sclera part. A
very small blood vessel gets rupture from the eye surface. Contact lens problem is created when wearing the
poor contact lens, in taking bad hygiene. There are many types in contact lens problem which consists of
burning sensation, dry eyes, blurred vision, photophobia and redness. It will be easily cured when wearing fresh
contact lens, washing hands before wearing the contact lens. Cataract problem was mostly found at the age of 80
in the United States or they had a cataract surgery over that period. Double vision, glare, faded colours and
double vision are symptoms for cataract problem. Eye drainage is the moisture that leaks out from the eye.
Discharge eye drainage is mainly caused by bacteria or virus, parasites and other organisms. Eyelid twitching is
the nerve problem and it persists for a weeks or months. It usually caused because of eye stress or fatigue.
II. RELATED WORK
A. Iris Crypts and the Human-in-the-Loop System Overview
Recently, Shen [13] developed a new human-in-the-loop iris biometric system which performs iris recognition
by detecting and matching crypts in iris images. Iris crypts are certain relatively thin areas of iris tissue, which
may appear near the collarette or in the periphery of the iris. The visibility of iris crypts stems from their
relationship with the pigmentation and structure of the iris. In iris images captured under near infrared (NIR)
illumination, the appearance of iris crypts has the following characteristics:
1. The interior has a relatively homogeneous intensity that is lower than that of the neighboring pixels in the
exterior.
2. The boundary exhibits stronger edge evidence than either the interior or the exterior.
3. A Novel Approach for Detecting the IRIS Crypts
3
Comparing to fingerprint recognition, iris crypts may serve as the ―minutiae of the iris‖ [14]. Thus, iris
recognition was formulated as the problem of detecting and matching iris crypts [15]. Following the ACE-V
methodology (Analysis, Comparison, Evaluation, and Verification) commonly used in fingerprint recognition
[5], a notional human-in-the-loop iris recognition system would employ the following steps as a scientific
method [13]:
1) Analysis (A): Features (iris crypts) are detected on the iris image under investigation, by a computer program
or by trained examiners.
2) Comparison (C): A similarity (or dissimilarity) score is computed by comparing detected features with the
feature patterns in the database using a rigorous process.
3) Evaluation (E): Preliminary conclusion is formed according to the score(s).
4) Verification (V): Different trained examiners do independent manual inspections of the preliminary
conclusion, in order to make creditable decisions.
Previous experiments [16] have demonstrated that human perception of iris crypts is consistent across different
examiners, even without full training. A recent approach [17] aimed to automate the A, C, and E steps. As a
consequence, an integrated human-in-the-loop iris recognition system was established [13]. Below, we briefly
summarize how the system works in the identification and verification scenarios. For a completed description of
the system and graphical interfaces for human inspection and annotation, we refer readers to [13].
For identification, the probe image under investigation is first processed by the system to detect visible
features automatically (the Analysis step). A dissimilarity score between the probe image and each gallery
image is computed (the Comparison step). The system will retrieve m candidate images from the gallery whose
features have the most similar patterns to the probe image, i.e., the smallest dissimilarity score (the Evaluation
step). In practice, m is a small integer, such as 10 or 20. Finally, human examiners will manually compare the
candidate images against the probe image with the human-interpretable features labeled and the
similaritybetween the features in the probe image and different candidate images presented, so as to make the
conclusion on the identity of the probe image (the Verification step).
In verification applications, the system processes the probe image to detect features first (Analysis).
The dissimilarity score between the probe image and the gallery image(s) of the identity that the probe image
claims to be is computed (Comparison). The system will present the results to human examiners, only if the
dissimilarity score is lower than a threshold (Evaluation). The human examiners will inspect the results, with the
aid of detected features and similarity between corresponding features, to accept or reject that the probe image
has the claimed identity.
B. Our Contributions:
In this paper, we seek to improve the performance of the automated iris recognition process, i.e., the
first three steps of the ACE-V framework. Specifically, we propose a new fully automated approach to: (1)
extract human-interpretable features in iris images, and (2) match the features with the images in the database to
determine the identity. Our proposed approach can provide reliable aid to human evaluation in a human-in-the-
loop iris recognition system.
Our new approach employs the following observations. In theory, iris crypts may appear in various
sizes and shapes in images. In practice, it is sometimes uncertain whether multiple proximal crypts are
connected. Furthermore, slight differences in the acquired images of the same iris may alter the topology of the
detection of the same crypts from image to image. Our new approach employs the following observations. In
theory, iris crypts may appear in various sizes and shapes in images. In practice, it is sometimes uncertain
whether multiple proximal crypts are connected. Furthermore, slight differences in the acquired images of the
same iris may alter the topology of the detection of the same crypts from image to image.
There are two main tasks in our approach: crypt detection and crypt matching. Our detection (or
segmentation) algorithm is designed to handle multi-scale crypts. It applies a key morphological operation in a
hierarchical manner. Human annotated training data is used to determine the major parameters, so that the
detected crypts are similar to those obtained by human inspection.
In our matching algorithm, we adopt a matching model based on the Earth Mover‘s Distance (EMD)
[18]. This matching model is quite general. Specifically, to handle possible differences in crypt topology, our
matching algorithm is able to establish correspondences between the detected crypts in two images, which can
be one-to-one, one-to-multiple, multiple-to-one, or even multiple-to-multiple matching. Additionally, due to
different lighting conditions, there may be some false alarms or missing detections. Not all crypts can be
captured in every image, subject to different physical conditions. Our matching algorithm is carefully designed
so that it performs robustly to segmentation errors and potential appearance/disappearance of small crypts.
The segmentation algorithm may detect some blob-like regions not physically corresponding to iris crypts. As
long as such regions are stable, they will be accepted as human interpretable features, and can contribute to
discriminating different irises. Our matching algorithm is designed to be robust to such false positive errors.
4. A Novel Approach for Detecting the IRIS Crypts
4
Therefore, we use the term ―crypts‖ and ―human interpretable features‖ interchangeably in the remainder of the
paper. A preliminary version of the algorithm proposed herein was presented in [19]. Comparing to the prior
work, the feature detection approach has been modified here to reduce some false positive errors. In addition,
we conducted more extensive evaluation in this paper comparing to [19]. Besides our in-house dataset and
ICE2005 [20], our approach was evaluated on the CASIA-Iris-Interval (Version 4.0) dataset [21]. Consistent
results were obtained on three different datasets with fairly large number of subjects and variety. In addition, the
benefits of multiple enrollment is demonstrated experimentally for the human-in-the-loop iris recognition
system.
III. METHODOLOGY
Our approach consists of three main steps: (a) detecting crypts, (b) matching crypts and (c) disease
identification. The input is normalized iris images (of 64 × 512 pixels). Many algorithms and software packages
can be used for this purpose; we use the system in [20]. A dissimilarity score will be output for each pair of iris
images under comparison.
A. Feature Detection:
We employ a hierarchical segmentation algorithm based on morphological reconstruction to detect crypts of
different scales. The core operation, denoted by f , is a closing-by reconstruction top-hat transformation [17]. On
a grayscale image I , f has the following formulation:
(1)
Here, RA(B) is the morphological reconstruction of mask A from marker B. (⊕) is the dilation operation,
while the structuring element is a disk of radius r , denoted by Dr . I c is the complement of image I .
The major steps of the segmentation algorithm are depicted in Figure 3. First, the intensity of the image is
rescaled to [0, 1]. The image background is estimated (by convolution with a Gaussian kernel) and subtracted
from the grayscale image. Then the image is smoothed by a Gaussian filter. The resulting image is denoted by
Ip. Next, f is applied in a hierarchical fashion. In level 0, f (Ip, R0) is applied (for a chosen value R0, as shown
below). After that, a binary image BW0 is obtained by thresholding the output of f (Ip, R0) (with threshold = 0),
removing small regions, and filling holes inside each connected component.
Suppose C = {cci , i = 1, . . . , k} is the collection of all connected components in BW0, which will be classified
into two groups: acceptable features (AF0) and under-segmented features (UF0). For each connected component
cci ∈ C, we put cci into AF0 if
si ze(cci) < Sz1, or
Sz1 ≤ si ze(cci) < Sz2 and std(cci) < δ
where si ze(cci ) is the number of pixels in cci , Sz1 and Sz2 are two size parameters, std(cci ) is the
standard deviation of the intensity of cci ‘s corresponding region in Ip, and δ is the trained threshold for the
standard deviation of the region intensity. Thresholding the standard deviation of the intensity of segmented
regions is meant to include only those regions with relatively homogenous intensity among all midsize features,
considering the characteristics of iris crypts (see Section I). AF0 directly constitutes S0, i.e., the selected features
in level 0. On the other hand, UF0 = C AF0. A binary mask, M0, is built using all connected components in
UF0.
In level k (k > 0), f (Ip, R0 − k) is applied. BWk , AFk , UFk, and Mk are obtained similarly as in level 0. But, Sk
is
the intersection of AFk and Mk−1. In other words, all selected features in level k must reside within the region
defined by Mk−1. The hierarchical segmentation will terminate if UFk = ∅ or k reaches the smallest scale T (T is
pre-selected). At the end, the final segmentation BW will be
The parameters Sz1, Sz2, and δ were determined by the training data, a small in-house image dataset
that was manually annotated by human examiners. In this dataset, there are 188 images from 94 eyes, two
images for each eye. Each image was annotated by two different persons. The statistical result of the crypt sizes
is summarized in Figure 4(a). We select the 75th percentile as Sz1, i.e., 148, and the upper adjacent value as Sz2,
i.e., 314. Then, for those crypts larger than Sz1 but smaller than Sz2, the region contrast is calculated (i.e., the
standard deviation of the grayscale values of the pixels within the region). The result is presented in Figure 4(b).
δ is set as the median value, namely, 0.06.
5. A Novel Approach for Detecting the IRIS Crypts
5
In addition, RT and R0 were determined by experiments on the training dataset. (Note: T is the index of the
scale. R0 and RT are the radii of the structuring elements at scale 0 and scale T , respectively.) R0 is the scale
that is able to capture the largest crypts in the samples. Any scale smaller than RT will be able to detect only tiny
features, which are usually not crypts. (We use RT = 3 and R0 = 8.)
B. Feature Matching:
The objective of this step is to measure the similarity/ dissimilarity between two iris images based on
the detected features. Suppose P = {p1, p2, . . . , pn} and Q = {q1, q2, . . . , qm} are the detected visible features
(i.e., connected regions) in two images under comparison. A score ranging from 0 to 1 will be computed to
determine the dissimilarity between P and Q (a lower score means a higher similarity).
First, a simple registration [17] is applied to compensate for the possible shift between the two images when
unwrapping the iris annulus. Then, to reduce the computation overhead, a pre-check is performed so that
obviously unmatched iris images can be discarded. P and Q are considered as a non-match, i.e., the dissimilarity
score is equal to 1, if
where σ1 and σ2 are pre-determined thresholds. We use σ1 = 0.25 and σ2 = 0.5 in our approach.
Intuitively, it means that P and Q have to overlap more than 25% or their sizes differ less than 50%. Next, the
correspondence between the features in P and in Q is computed using the Earth Mover‘s Distance (EMD)
matching model [18] (see the details in Section II-B2 for this). The output of the EMD matching model is a
collection of pairs of matched regions. Each match pair may correspond to a match between two features, or two
sets of multiple features. Suppose k matched pairs are found between P and Q, namely,
To take the potential iris deformation and movement into account, the dissimilarity between each pair of ¯Pi and
¯Q i is computed as the minimum of is transformed from  ̄Pi by shifting up to
•±h pixels in the horizontal direction or vertical direction}, where Sim(∗, ∗) is the feature dissimilarity. Next,
the k matched pairs are ranked. The final dissimilarity score is the weighted arithmetic mean of the top r% pairs,
while the weight of the i -th rank pair is computed by the following formula:
(2)
where spi (resp., sqi ) is the size of ¯Pi (resp., ¯Qi ). Basically, if a match pair is more reliable, then it will have a
larger contribution (i.e., a larger weight) in the final score. Here, the reliability of a match pair is evaluated in
two aspects. The first term in Formula (2) measures the average size of the matched pair. The second term in
Formula (2) is to assess the size difference between the matched pair (rescaled to (0, 1)). Finally, the smaller the
final dissimilarity score is, the more similar the two images are.
1) Feature Dissimilarity: To measure the dissimilarity between two features or two sets of features, A and B, the
following equation is used.
(3)
Sym(A, B) is the symmetric difference between A and B. Haus(A, B) is the Hausdorff distance between A and B.
α is a weight parameter (α = 0.5 in our implementation). F1(∗) and F2(∗) are two sigmoid functions to rescale
the symmetric difference and the Hausdorff distance:
The proposed dissimilarity measure is designed to evaluate the shape similarity in terms of two
different aspects. In general, the systemic difference is to evaluate how much two regions overlap. On the other
hand, the Hausdorff distance tends to focus on how far each point in one region locates away from the other
region, no matter how much the two regions overlap. To combine these two shape similarity measures together,
sigmoid functions are used to rescale them into the same range, i.e., (0, 1). Another advantage of the sigmoid
functions is to emphasize the similarity difference in a particular range. After computing the first and second
6. A Novel Approach for Detecting the IRIS Crypts
6
order derivatives, we know that F1(t) amplifies the discriminability of the symmetric difference in the range of
[0.5−h, 0.5+h], and weakens the discriminability in the range of [0, 0.5 − h) and (0.5 + h, 1], where h = 0.2063.
F2(t) has a similar property.
2) EMD Matching Model: EMD is a similarity measure for comparing multi-dimensional distributions. In
computer vision, EMD was first introduced in [22] for image retrieval. In [18], an EMD based matching model
was proposed for establishing correspondence between bacteria in consecutive image frames of time-lapse
videos. Some major advantages of this EMD matching model include the capability of multipleto- multiple
matching of objects and the robustness to dealing with various segmentation errors [18].
Below, we briefly summarize the EMD based matching model [18]. The input consists of two signatures, P =
{(p0,wp0 ), (p1,wp1), . . . , (pn,wpn )} and Q = {(q0,wq0 ), (q1,wq1), . . . , (qm,wqm )}. In the context of visible
feature matching here, pi (1 ≤ i ≤ n) and q j (1 ≤ j ≤ m) are detected features in two iris images, while wpi and
wq j are the sizes of the features pi and q j , respectively; p0 and q0 are auxiliary variables, both of size infinity
(needed by the processing of the model).
A key component of EMD is the ground distance between pi and q j , denoted by Di j . Intuitively, if
one views each pi as a pile of dirt (of an amount wpi ) and each q j as a hole (of a volume wq j ), then Di j
represents the cost for moving one unit of dirt from pi to q j. Let fi j denote the mass of flow from pi to q j .
Then, EMD measures the smallest average cost for mass distribution from P to Q under certain linear
constraints. Precisely, it has the following definition.
Minimize the objective function
(4)
subject to
(5a)
(5b)
(5c)
(5d)
In our problem, Di j (with both i > 0 and j > 0) is the dissimilarity between the features pi and q j ,
namely, Sim(pi , q j ), as described in Section II-B1. For either i > 0 or j > 0 but not both, Di j = 1, which is an
upper bound of the function Sim(∗, ∗). This is the cost for a special ―feature‖ that matches to nothing. D00 is set
as +∞ in order to avoid correspondence between the two auxiliary variables p0 and q0. In essence, EMD can be
solved as a transportation problem in polynomial time [23]. From the perspective of a transportation problem, pi
is a source and q j is a destination, and their weights are respectively the amount available at a source and the
amount demanded by a destination. Then, constraint (5a) (resp., (5b)) restricts that each source (resp.,
destination) can only send (resp., receive) no more than the available amount (resp., the demanding amount);
constraint (5c) means that we have to either empty all available supplies at the sources or satisfy all demands at
the destinations; constraint (5d) ensures that the flows can only move from the sources to the destinations.
By solving the above optimization problem, it is easy to interpret the resulted correspondence between the
features in P and in Q when { fi j } achieving optimality. Specifically, a large amount of flow between pi and q j
indicates a strong correspondence between two crypts pi and q j . Finally, the output is a collection of matched
features. A matching example is shown in Figure1
Figure1: Illustrating the EMD based matching model: Given P = {p1, . . . , p5} and Q = {q1, . . . , q6} as the
features detected in two iris images, a bipartite graph is built in the EMD matching model (some of the edges are
omitted for clear visualization). p0 and q0 are auxiliary variables. Three matched pairs are obtained by solving
the model. Here, q3 is a false positive detection that matches to nothing.
7. A Novel Approach for Detecting the IRIS Crypts
7
3) System Design:
System design gives the details of the over all design of the proposed work. Figure 2 shows the block diagram of
the proposed work.
Figure 2: Block Diagram Of Proposed System
C. Disease Identification:
Here Gabor Filter is used for feature extraction. Before and after the treatment the iris can be
compared. Gabor filter is used to extract the features and it can be matched to find the disease affected area of
the iris. The input date is passed into two directional filters to determine the existence of ridges and their
orientation. The RED iris recognition algorithm uses directional filtering to generate the iris template, a set of
bits that meaningfully represents a person‘s iris. Feature Extraction [24] takes the input data will be transformed
into reduced representation set of features (also named feature vector). Transforming the input data into the set
of features is called feature extraction. [25] Matching between the newly acquired and database representations
is pattern matching. To calculate the similarity of two iris codes, Hamming Distance (HD) method is used.
Lower Hamming Distance means the higher similarity Disease Identification is performed after pattern
matching in both irises. Iris features are matched then there is no disease, otherwise disease can be identified
from the features.
IV. EXPERIMENTAL RESULTS
This work has been implemented using Matlab R2012b.Before and after the treatment the iris can be
compared. Gabor filter is used to extract the features and it can be matched to find the disease affected area of
the iris. Figure3(a) shows the results obtained from the two iris images can be matched and Figure 3(b) shows
Not matched..
Figure3: (a) shows the two iris images can be matched. Figure 3(b) shows two iris can not be matched
Normalization
Input ImageData base
Localization
Segmentation using
morphological
Template Generate
Pre processing
operation
Pattern matching using
distance
Result
Crypts detection
Gabor Filter
Support Vector Machine
(SVM)
8. A Novel Approach for Detecting the IRIS Crypts
8
Figure (a) Figure (b)
Figure4 (a): Results obtained from the given input iris image (b): shows the results obtained from the given iris
image can be matched.
Figure 5: shows the patient details of the corresponding matched iris image
Figure 6: shows the corresponding eye disease of the given iris image.
9. A Novel Approach for Detecting the IRIS Crypts
9
Figure 7: shows the Eye disease patient details of the corresponding matched iris image
V. RESULTS ANALYSIS
A. Datasets and Software:
We conducted experiments on three datasets, our in-house dataset [17], ICE2005 [20], and CASIA-Iris-
Interval (v4) [21], in order to evaluate our proposed iris recognition approach in both the identification and
verification scenarios. Our in-house dataset [17] contained 3505 images from 701 eyes, five images for each
eye. In the experiments, one image of each eye was randomly selected as the gallery image, while the other four
images of the same eye were used as probe images. Thus, the probe set contained 2804 images, and there were
701 images in the gallery set. The in-house dataset will be released at http://www.nd.edu/~cvrl.
In ICE2005 [20], there were 2953 images. Two images were rejected by irisBEE in the pre-processing
stage due to off-angle iris. ICE2005 contained images from 244 different eyes, 175 eyes with multiple images
and 69 eyes with only one image enrolled. Thus, the gallery dataset consisted of 244 images, each randomly
selected for a unique eye. The remaining 2707 images formed the probe set.
The CASIA-Iris-Interval dataset (Version 4.0) [21] was collected by the Chinese Academy of Sciences‘
Institute of Automation (CASIA), and captured by a novel self-developed camera. The images presented very
detailed textures, which were good for visible feature detection. In this dataset, there were 2639 images from
395 eyes, each with multiple images enrolled. 395 images were randomly selected, each from a unique eye, to
form the gallery dataset. The probe dataset consisted of the remaining 2244 images. Due to the randomness of
the gallery set and probe set partition, the experiments in all the three datasets were repeated ten times in order
to obtain statistically valid results.
The performance of our method on the dataset mixing all the three datasets (i.e., with 7775 probe
images and 1340 gallery images/subjects) will also be reported. All original NIR images were pre-processed and
unwrapped into images of 64 × 512 pixels by the irisBEE software [20]. Our proposed automated approach was
implemented and tested in Matlab, with the unwrapped images as input. Our approach was compared with the
method of Shen and Flynn [17].
B. Identification:
In the experiments of human identification, each probe image was compared against all gallery images
to determine the identity of the probe image. The top m (say 10) candidates with the smallest dissimilarity scores
were presented to human examiners for further inspection. This was a closed set comparison. Namely, it was
known that at least one image from the same subject had been enrolled in the gallery set. Before selecting the
candidates, a pre-check was imposed. Suppose the k-th gallery image has nk matched features with the probe
image. Then, any gallery image with less than 0.5 × Max{nk, for all k} matched features will be considere as
non-match. Among the remaining gallery images, the m gallery images with the smallest dissimilarity scores
were output as candidates.
10. A Novel Approach for Detecting the IRIS Crypts
10
The cumulative match characteristics (CMC) was adopted as the metric. Generally, the accuracy at
rank m represents the probability that the correct subject is in the top m candidates. In forensic applications, we
hope to return a small set of candidates to professional examiners for further inspection, while the correct
subject has a high probability to be within the selected candidates.
For the in-house dataset, the results of our proposed approach and the method of Shen and Flynn [17]
were plotted. It was demonstrated that our approach achieved at least 22% higher rank one hit rate than [17]. For
ICE2005, the comparison was that the rank one hit rate of our approach was at least 58% higher than that of
[17]. The performance on the CASIA-Iris-Interval dataset; our approach has 56% higher rank one hit rate than
[17]. Furthermore, the 95% confidence intervals of the results on the dataset mixing all the three datasets and on
each individual dataset. In the results of our approach, on all datasets if we select the top 10 candidates for
further inspection, the probability that the true image is returned was higher than 95%. The errors incurred by
our approach were mainly due to blurry images, high occlusion by eyelids or eyelashes, and large deformation
caused by off-angle iris. Thus, additional pre-check at image acquisition to remove low quality images or
advanced algorithms to enhance image quality will be helpful for further improvement.
C. Verification:
In the human verification experiments, our objective was to determine whether two images were from
the same subject, based barely on the dissimilarity score. First, the impostor (non-match) distribution and the
authentic (match) distribution of the results were analyzed. The comparisons between our proposed approach
and the method of Shen and Flynn [17] on the three datasets were plotted in Figures 12, 13, and 14, respectively.
It was evident that our approach showed significant improvement in terms of discrimination over [17]. It is
worth mentioning that there are sudden hikes (near x = 1) in the non-match distribution of our method. This is
due to assigning the dissimilarity as one if two images under comparison cannot pass the pre-check.
Figure 3: The ROC curves of the verification results of our proposed approach and the method of Shen and
Flynn
Moreover, the Receiver Operating Characteristic (ROC) curve was used for further evaluation on the
datasets (see Figure3). Also, the 95% confidence intervals of the results on the dataset mixing all the three
datasets. Meanwhile, we calculated the Equal Error Rate (EER), which is defined as the common value when
the false acceptance rate is the same as the false rejection rate. In general, the smaller the EER is, the more
accurate the method is. The results are summarized in Table I. In short, our approach reduced the EER over [17]
by almost 51% on the in-house dataset, by 84% on ICE2005, and by 91% on CASIA-Iris-Interval.
Methods In-House ICE2005 CASIA
Proposed Method 0.02 0.035 0.0139
Flyn & Shen 0.041 0.223 0.153
TABLE I : The Equal Error Rates Of The Verification Experiments
11. A Novel Approach for Detecting the IRIS Crypts
11
0
0.05
0.1
0.15
0.2
0.25
In-House ICE2005 CASIA
Proposed Method
FLYN & SHEN
Figure 4: The Equal Error Rates Of The Verification Experiments
VI.CONCLUSION
We present a new approach for detecting and matching iris crypts for the human-in-the-loop iris
biometric system. Our proposed approach produces promising results on all the three tested datasets, in-house
dataset, ICE2005, and CASIA-Iris-Interval. Comparing to the known method, our approach improves the iris
recognition performance by at least 22% on the rank one hit rate in the context of human identification and by at
least 51% on the equal error rate in terms of subject verification. It increases the reliability of the human-in-the
loop iris biometric system, incorporating a quality measure for images enrolled in the system would be
beneficial. This would allow evaluating whether the quality of each acquired image is good enough for visual
feature matching. This approach under the human in-the-loop iris recognition framework exhibits a promising
application of the iris as a biometric trait in forensics. In this, by using the gabor filter we are detecting the
disease in the eye. After that by providing the authentication the disease will be identified by using support
vector machine (SVM) and the patient details will be displayed. Based on our observations and trial studies, our
approach is robust with respect to certain common factors, such as interlacing or moderate blurring.
REFERENCES
[1]. J. Daugman, ―How iris recognition works,‖ IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp.
21–30, Jan. 2004.
[2]. J. Daugman, ―Probing the uniqueness and randomness of IrisCodes: Results from 200 billion iris pair
comparisons,‖ Proc. IEEE, vol. 94, no. 11, pp. 1927–1935, Nov. 2006.
[3]. Unique Identification Authority of India. [Online]. Available: http://uidai.gov.in, accessed Nov. 1, 2015.
[4]. K. R. Nobel, ―The state of the art in algorithms, fast identification solutions and forensic applications,‖
MorphoTrust USA, Billerica, MA, USA, Tech. Rep., Jan. 2013. [Online]. Available:
http://www.planetbiometrics.com/article-details/i/1446/.
[5]. P. E. Peterson et al., ―Latent prints: A perspective on the state of the science,‖ Forensic Sci. Commun.,
vol. 11, no. 4, pp. 1–9, 2009.
[6]. C. Champod, ―Edmond Locard—Numerical standards and ‗probable‘ identifications,‖ J. Forensic
Identificat., vol. 45, no. 2, pp. 136–163, 1995.
[7]. K. McGinn, S. Tarin, and K. W. Bowyer, ―Identity verification using iris images: Performance of human
examiners,‖ in Proc. IEEE 6th
Int. Conf. Biometrics, Theory, Appl., Syst. (BTAS), Sep./Oct. 2013, pp. 1–6.
[8]. H. Proenca, ―Iris recognition: On the segmentation of degraded images acquired in the visible
wavelength,‖ IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 8, pp. 1502–1516, Aug. 2010.
[9]. H. Proenca, S. Filipe, R. Santos, J. Oliveira, and L. A. Alexandre, ―The UBIRIS.v2: A database of visible
wavelength iris images captured onthe- move and at-a-distance,‖ IEEE Trans. Pattern Anal. Mach.
Intell., vol. 32, no. 8, pp. 1529–1535, Aug. 2010.
[10]. Z. Sun, L. Wang, and T. Tan, ―Ordinal feature selection for iris and palmprint recognition,‖ IEEE Trans.
Image Process., vol. 23, no. 9, pp. 3922–3934, Sep. 2014.
[11]. M. S. Sunder and A. Ross, ―Iris image retrieval based on macro-features,‖ in Proc. 20th Int. Conf.
Pattern Recognit., 2010, pp. 1318–1321.
[12]. J. De Mira and J. Mayer, ―Image feature extraction for application of biometric identification of iris—A
morphological approach,‖ in Proc. Brazilian Symp. Comput. Graph. Image Process., 2003, pp.
391–398.
[13]. F. Shen, ―A visually interpretable iris recognition system with crypt features,‖ Ph.D. dissertation, Dept.
Comput. Sci. Eng., Univ. Notre Dame, Notre Dame, IN, USA, 2014.
[14]. F. Shen and P. J. Flynn, ―Using crypts as iris minutiae,‖ Proc. SPIE, vol. 8712, p. 87120B, May 2013.
12. A Novel Approach for Detecting the IRIS Crypts
12
[15]. F. Shen and P. J. Flynn, ―Iris matching by crypts and anti-crypts,‖ in Proc. IEEE Conf. Technol.
Homeland Secur., Nov. 2012, pp. 208–213.
[16]. F. Shen and P. J. Flynn, ―Are iris crypts useful in identity recognition?‖ in Proc. IEEE 6th Int. Conf.
Biometrics, Theory, Appl., Syst., Sep./Oct. 2013, pp. 1–6.
[17]. F. Shen and P. J. Flynn, ―Iris crypts: Multi-scale detection and shapebased matching,‖ in Proc. IEEE
Winter Conf. Appl. Comput. Vis., Mar. 2014, pp. 977–983.
[18]. J. Chen, C. W. Harvey, M. S. Alber, and D. Z. Chen, ―A matchingmodel based on earth mover‘s distance
for tracking Myxococcus xanthus,‖ in Proc. Med. Image Comput. Comput.-Assist. Intervent., 2014, pp.
113–120.
[19]. J. Chen, F. Shen, D. Z. Chen, and P. J. Flynn, ―Iris recognition based on human-interpretable features,‖ in
Proc. IEEE Int. Conf. Identity, Secur. Behavior Anal. (ISBA), Mar. 2015, pp. 1–6.
[20]. P. J. Phillips, K. W. Bowyer, P. J. Flynn, X. Liu, and W. T. Scruggs, ―The iris challenge evaluation
2005,‖ in Proc. 2nd IEEE Int. Conf. Biometrics, Theory, Appl., Syst., Sep./Oct. 2008, pp. 1–8.
[21]. CASIA Iris Image Database. [Online]. Available: http://biometrics. idealtest.org/, accessed Nov. 14,
2015.
[22]. Y. Rubner, C. Tomasi, and L. J. Guibas, ―A metric for distributions with applications to image
databases,‖ in Proc. IEEE 6th Int. Conf. Comput. Vis., Jan. 1998, pp. 59–66.
[23]. F. S. Hillier and G. J. Lieberman, Introduction to Operations Research, 7th ed. New York, NY, USA:
McGraw-Hill, 2001.
[24]. N Singh, D Gandhi, K. P. Singh, ―Iris recognition using Canny edge detection and circular Hough
transform,‖ International Journal of Advances in Engineering & Technology, May 2011.
[25]. L. Ma, Y. Wang, T. Tan, ―Iris recognition using circular symmetric Filter,‖ National Laboratory of
Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002.