The document describes a proposed algorithm called Fusion of Hybrid Domain features for Iris Recognition (FHDIR).
The algorithm pre-processes iris images by resizing, binarization, cropping and splitting them. It then applies Fast Fourier Transform (FFT) to the left half of the iris image to extract features and applies Principal Component Analysis (PCA) to the right half to extract features. These feature sets are then fused using arithmetic addition to generate a final feature vector. Test iris features are compared to the database using Euclidean Distance for identification.
The proposed algorithm is evaluated on the CASIA iris database and is found to have better performance than existing algorithms in terms of false rejection rate, false acceptance rate, and true
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
Iris Biometric is a physiological trait of human beings. In this paper, we propose Iris an Recognition using
Fusion of Dual Tree Complex Wavelet Transform (DTCWT) and Over Lapping Local Binary Pattern (OLBP)
Features. An eye is preprocessed to extract the iris part and obtain the Region of Interest (ROI) area from an iris.
The complex wavelet features are extracted for region from the Iris DTCWT. OLBP is further applied on ROI to
generate features of magnitude coefficients. The resultant features are generated by fusing DTCWT and OLBP
using arithmetic addition. The Euclidean Distance (ED) is used to compare test iris with database iris features to
identify a person. It is observed that the values of Total Success Rate (TSR) and Equal Error Rate (EER) are
better in the case of proposed IRDO compared to the state-of-the art techniques.
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
Iris Biometric is a physiological trait of human beings. In this paper, we propose Iris an Recognition using
Fusion of Dual Tree Complex Wavelet Transform (DTCWT) and Over Lapping Local Binary Pattern (OLBP)
Features. An eye is preprocessed to extract the iris part and obtain the Region of Interest (ROI) area from an iris.
The complex wavelet features are extracted for region from the Iris DTCWT. OLBP is further applied on ROI to
generate features of magnitude coefficients. The resultant features are generated by fusing DTCWT and OLBP
using arithmetic addition. The Euclidean Distance (ED) is used to compare test iris with database iris features to
identify a person. It is observed that the values of Total Success Rate (TSR) and Equal Error Rate (EER) are
better in the case of proposed IRDO compared to the state-of-the art techniques.
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Biometric Iris Recognition Based on Hybrid Techniqueijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
The biometrics are used to authenticate a person effectively compared to conventional methods of identification. In this paper we propose the biometric algorithm based on fusion of Discrete Wavelet Transform(DWT) frequency components of enhanced iris image.The iris template is extracted from an eye image by considering horizontal pixels in an iris part.The iris template contrast is enhanced using Adaptive Histogram Equalization (AHE) and Histogram Equalization (HE).The DWT is applied on enhanced iris template.The features are formed by straight line fusion of low and high frequency coefficients of DWT.The Euclidian distance is used to compare final test features with database features. It is observed that the performance parameters are better in the case of proposed algorithm compared to existing algorithms.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
Iris recognition is considered to be the most reliable and accurate biometric identification system available. Iris recognition system captures an image of an individual person’s eye, than the image of iris is meant for the further segmentation and normalization for extracting its feature.Segmentation is used for the localization of the correct iris region in the particular portion of an eye and it should be done accurately and correctly to remove the eyelids, eyelashes, reflection and pupil noises present in iris region. The features of the iris were encoded by convolving the normalize iris region with 1D Log-Gabor filters and phase quantizing the output in order to produce a bit-wise biometric template. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
The biometric technology is used to identify
individuals effectively compared to existing traditional
methods. In this paper we propose Bimodal Biometric System
using Multiple Transformation features of Fingerprint and
Iris (BBMFI). The iris image is preprocessed to generate iris
template. The two level Discrete Wavelet Transformation
(DWT) is applied on iris template and Discrete Cosine
Transformation (DCT) is performed on second level low
frequency band to generate DCT coefficients which results in
features of iris. The fingerprint is preprocessed to obtain
Region of Interest (ROI) and segmented into four cells. Then
the DWT is applied on each cell to derive approximation band
and detailed bands. The Fast Fourier Transformation (FFT)
is applied on approximation band to compute absolute values
that results in features of fingerprint. The iris features and
fingerprint features are fused by concatenation to obtain final
set of features. The final feature vector of test and database
are compared using Euclidean distance matching. It is observed
that the values of Total Success Rate (TSR), False Rejection
Rate (FRR) and False Acceptance Rate (FAR) are improved in
the proposed system compared to existing algorithm.
Sam.S.L HETTIARACHCHI1, Saman. P SAMARAWICKRAMA1, Harsha RATNASOORIYA1, Joe FERNANDO2
1University of Moratuwa, Sri Lanka, Democratic Socialist Republic of; 2Universiy of Notre Dam, USA
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Biometric Iris Recognition Based on Hybrid Techniqueijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
The biometrics are used to authenticate a person effectively compared to conventional methods of identification. In this paper we propose the biometric algorithm based on fusion of Discrete Wavelet Transform(DWT) frequency components of enhanced iris image.The iris template is extracted from an eye image by considering horizontal pixels in an iris part.The iris template contrast is enhanced using Adaptive Histogram Equalization (AHE) and Histogram Equalization (HE).The DWT is applied on enhanced iris template.The features are formed by straight line fusion of low and high frequency coefficients of DWT.The Euclidian distance is used to compare final test features with database features. It is observed that the performance parameters are better in the case of proposed algorithm compared to existing algorithms.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
Iris recognition is considered to be the most reliable and accurate biometric identification system available. Iris recognition system captures an image of an individual person’s eye, than the image of iris is meant for the further segmentation and normalization for extracting its feature.Segmentation is used for the localization of the correct iris region in the particular portion of an eye and it should be done accurately and correctly to remove the eyelids, eyelashes, reflection and pupil noises present in iris region. The features of the iris were encoded by convolving the normalize iris region with 1D Log-Gabor filters and phase quantizing the output in order to produce a bit-wise biometric template. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
The biometric technology is used to identify
individuals effectively compared to existing traditional
methods. In this paper we propose Bimodal Biometric System
using Multiple Transformation features of Fingerprint and
Iris (BBMFI). The iris image is preprocessed to generate iris
template. The two level Discrete Wavelet Transformation
(DWT) is applied on iris template and Discrete Cosine
Transformation (DCT) is performed on second level low
frequency band to generate DCT coefficients which results in
features of iris. The fingerprint is preprocessed to obtain
Region of Interest (ROI) and segmented into four cells. Then
the DWT is applied on each cell to derive approximation band
and detailed bands. The Fast Fourier Transformation (FFT)
is applied on approximation band to compute absolute values
that results in features of fingerprint. The iris features and
fingerprint features are fused by concatenation to obtain final
set of features. The final feature vector of test and database
are compared using Euclidean distance matching. It is observed
that the values of Total Success Rate (TSR), False Rejection
Rate (FRR) and False Acceptance Rate (FAR) are improved in
the proposed system compared to existing algorithm.
Sam.S.L HETTIARACHCHI1, Saman. P SAMARAWICKRAMA1, Harsha RATNASOORIYA1, Joe FERNANDO2
1University of Moratuwa, Sri Lanka, Democratic Socialist Republic of; 2Universiy of Notre Dam, USA
Living Longer, Living Better: Reform Report #2 - GT review AustraliaGrant Thornton
This is our second report in response to the Government's Living Longer, Living Better package.
In this document, we discuss the implications of, and industry reaction to, the initiatives recently announced by the Government as more detail of their response to the Productivity Commission's report emerges.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed systems, make it a good candidate to replace most of thesecurity systems around. By making use of the distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person. Identification of this person is possible by applying appropriate matching algorithm.In this paper, Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical analysis of different feature detection operators is performed, features extracted is encoded using Haar wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and False Reject Rate is 10%.
Biometric Iris Recognition Based on Hybrid Technique ijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
Iris is a physiological biometric trait, which is unique among all biometric traits to recognize person
effectively. In this paper we propose Multi-scale Independent Component Analysis (ICA) based Iris
Recognition using Binarized Statistical Image Features (BSIF) and Histogram of Gradient orientation
(HOG). The Left and Right portion is extracted from eye images of CASIA V 1.0 database leaving top and
bottom portion of iris. The multi-scale ICA filter sizes of 5X5, 7X7 and 17X17 are used to correlate with
iris template to obtain BSIF. The HOGs are applied on BSIFs to extract initial features. The final feature is
obtained by fusing three HOGs. The Euclidian Distance is used to compare the final feature of database
image with test image final features to compute performance parameters. It is observed that the
performance of the proposed method is better compared to existing methods.
A study of Iris Recognition technology over the in use biometric technologies these days. These Study shows how beneficial the iris technology can be to the Human in future.
I have put all my efforts in this study and have made an simple easy to understand ppt.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Iris recognition based on 2D Gabor filterIJECEIAES
Iris recognition is a type of biometrics technology that is based on physiological features of the human body. The objective of this research is to recognize and identify iris among many irises that are stored in a visual database. This study employed a left and right iris biometric framework for inclusion decision processing by combining image processing and artificial bee colony. The proposed approach was evaluated on a visual database of 280 colored iris pictures. The database was then divided into 28 clusters. Images were preprocessed and texture features were extracted based Gabor filters to capture both local and global details within an iris. The technique begins by comparing the attributes of the online-obtained iris picture with those of the visual database. This technique either generates a reject or approve message. The consequences of the intended work reflect the output’s accuracy and integrity. This is due to the careful selection of attributes, besides the deployment of an artificial bee colony and data clustering, which decreased complexity and eventually increased identification rate to 100%. We demonstrate that the proposed method achieves state-of-the-art performance and that our recommended procedures outperform existing iris recognition systems.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our
surrounding environment has gained more interest
in recent days. Along with contemporary technology
comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of
compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed
for identification should be robust and dynamic. In
this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and retinal scanning algorithms have been discussed whi
ch promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
Advanced Computational Intelligence: An International Journal (ACII)aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A Survey : Iris Based Recognition SystemsEditor IJMTER
The security is one of the important aspect of today's life. Iris recognization is one of the leading
research of security which is used to identify the individual person. Usually iris based biometric is more better
than other biometric in terms of accuracy, fast, stability, uniqueness. The iris recognition system works by
capturing and storing biometric information and then compare scanned copy of iris biometric with the stored iris
images in the database. There are several Iris Based Recognition Systems are developed so far. In this paper we
presented several iris techniques and create a base for our future roadmap.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
IJERD (www.ijerd.com) International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
eISSN : 2278-067X, pISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 2 (July 2012), PP. 16-23
Fusion of Hybrid Domain features for Iris Recognition
Prashanth C R1, Sateesh Kumar H C2, Raja K B3, Venugopal K R3 and L M
Patnaik4
1
Department of Electronics and Communication Engineering, Vemana Institute of Technology, Bangalore, India
2
Department of Telecommunication, Dayananda Sagar College of Engineering, Bangalore, India
3
Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore, India
4
Honorary Professor, Indian Institute of Science, Bangalore, India
Abstract— The Biometric systems are used for personal authentication. Iris based Biometric systems are more efficient
compared to the systems based on other Biometric traits. In this paper, Fusion of Hybrid Domain features for Iris
Recognition (FHDIR) is proposed. The CASIA Iris database is considered for the performance analysis. The pre-
processing step includes resizing, binarization, cropping and splitting the Iris image into left half and right half. The Fast
Fourier Transform (FFT) is applied on the left portion of the Iris to generate absolute value of FFT coefficients. The
Principal Component Analysis (PCA) is applied on right portion of Iris to generate Eigen vectors. The FFT and PCA
coefficients are fused using arithmetic addition to generate final feature vector set. The test Iris features are compared
with the database feature set using Euclidean Distance to identify persons. It is observed that the performance parameters
such as FRR, FAR and TSR values are better in the case of proposed algorithm compared to the existing algorithms.
Keywords— Iris Recognition; PCA; FFT; TSR; Euclidean Distance;
I. INTRODUCTION
Authentication of an individual is an important aspect in security issues and techniques opted may vary according
to circumstances and requirements. The traditional authentication may be carried out by identity cards, pin codes, smart
cards, passwords etc., but these are easily misused. A better way of individual identification is based on human biological
features, which leads to biometric identification. The biometric authentication includes physiological and behavioral traits.
The physiological traits are parts of the human body and are almost constant through out the life time. They include iris,
retina, face, finger print, DNA etc. The behavioral traits such as voice, signature, key stroke dynamics and gait, depend on
mood and circumstances.
Any physiological and behavioral biometric features shall posses the following desirable characteristics:
Universality: Each person should have the biometric characteristic. Distinctiveness: Any two persons should be sufficiently
different in terms of the characteristic. Permanence: The characteristic should be sufficiently invariant with respect to the
matching criterion over a period of time. Collectability: The biometric characteristic can be measured quantitatively.
Acceptability: It indicates the extent to which people are willing to accept the use of a particular biometric characteristic in
their daily lives.
The biometric system can be utilized in two contexts: verification and identification. Verification is a one-to-one
match in which the biometric system tries to verify a person‟s identity by comparing the distance between test sample and
the corresponding sample in the database, with a predefined threshold. If the computed distance is smaller than the
predefined threshold, the subject is accepted as being genuine, else the subject is rejected. Identification is a one-to-many
match in which the system compares the test sample with all the samples in the database and chooses the sample with the
minimum computed distance i e., greatest similarity as the identified result. If the test sample and the selected database
sample are from the same subject, it is a correct match. The term authentication is often used as a synonym for verification.
A simple biometric system has four important modules:
(1) Enrolment module acquires the biometric samples of a number of individuals. The acquired samples are pre-
processed by resizing, gray scale conversion, cropping, thinning of images, image enhancement etc.
(2) Feature extraction module extracts features such as pixel density, angle, area, energy, transforms coefficients etc,
from the pre-processed images and stored as templates.
(3) Matching module in which the feature values are compared against those in the template by generating a matching
score.
(4) Decision-making module in which the user‟s identity is established or a claimed identity is either accepted or
rejected based on the matching score generated in the matching module.
Iris lies between the sclera and the pupil of human eye. Iris is an internal organ and is well protected by the eye-lid
when compared to other physiological characteristics. Iris recognition is a method of biometric authentication that uses
pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes. Iris scanning is less
16
2. Fusion of Hybrid Domain features for Iris Recognition
intrusive of the eye related biometrics, requires camera with Infra-red illumination and without physical contact of a person.
Iris recognition efficacy is rarely impeded by glasses or contact lenses. A key advantage of iris recognition is its stabilit y or
template longevity, as barring trauma, a single enrolment can last a lifetime.
An Iris pattern contains many distinctive features such as arching ligaments, furrows, ridges, crypts, rings, corona,
freckles and a zigzag collarette. The striated trabecular mesh work of elastic pectinate ligament creates the predominant
texture under visible light whereas in the near infrared wavelengths stromal features dominate the Iris pattern [1].
Iris Biometric systems are widely used in many applications such as access control to secure facilities, verification
of financial transactions, welfare fraud protection, law enforcement, and immigration status checking when entering a
country. Iris is considered as living passport.
Contribution: In this paper, an efficient algorithm for human authentication using an Iris recognition system is proposed.
Resizing, binarization, cropping and splitting are performed for pre-processing an Iris image. FFT and PCA are applied on
the left and right sides of the pre-processed Iris image respectively. The extracted features are fused by using an arithmetic
addition operator. Finally, matching between the test image and database image is done by using Euclidian Distance.
Organization: The paper is organized as follows. Section I gives an introduction to biometrics recognition. In Section II, we
discuss about literature survey. In Section III, we present the proposed model for the Iris recognition system. In Section IV,
we present the algorithm. The performance analysis is given in Chapter V and conclusion in Chapter VI.
II. LITERATURE SURVEY
The existing techniques are described for individual recognition using the Iris recognition system in this section.
Daugman [2, 3] proposed a phase based Iris recognition system where localization is done using the Integro-
differential operator. The phase information is extracted using quadrature 2-D Gabor wavelets and Iris recognition is done by
test of statistical independence, involving many degrees of freedom. Xianchao Qui et al., [4] proposed a method in which
pre-processing includes Gabor filter bank and k-means clustering for construction of Iris-Texton vocabulary, to represent
visual primitives of Iris images. Iris-Texton histogram was used to record the difference between the Iris textures. Martin
Roche et al., [5] used the Discrete Dyadic Wavelet Transform to represent the features of an Iris by fine-to-coarse
approximations at different resolution levels. In the pre-processing stage, the image of an eye is converted to gray scale and
its histogram is stretched. Iris is detected using a grinding process.
Libor Masek [6] proposed an Iris recognition system in which Localization was done by applying Hough
transform. The phase data from 1D Log-Gabor filters is extracted and quantized to four levels to encode the unique pattern
of an Iris into a bit-wise template. Hamming distance is employed for recognition. Xiaomei Liu et al., [7] proposed an Iris
recognition system with high accuracy. Focus was mainly on variation of performance of the system with image quality and
the amount of user cooperation required in real time environment. Karen Hollingsworth et al., [8] proposed techniques to
increase recognition rates using fragile bit masking, signal-level fusion of iris images, and detecting local distortions in Iris
texture. Fragile bit masking eliminates the effects of inconsistencies in Iris code that arise from the quantization of the
complex filter response in a canonical Iris biometrics algorithm.
Wildes [9, 10] proposed a system based on texture analysis. Isolation of an Iris is done by simple filtering and
histogram operations. Localization is done through edge detection and Hough transform. Emine Krichen et al., [11] proposed
a method that relied on use of packets of wavelets for the production of an Iris code. A hybrid method is used for Iris
segmentation. Hough transform is used to locate the outer boundary and Integro-differential operator is used to detect the
inner boundary of an Iris. Boles and Boashash [12] proposed a method that uses Zero-crossings of wavelet transform to
identify the Iris. Features of an Iris were represented by fine-to-coarse approximations at different resolution levels.
Localization of the Iris is done through edge detection techniques where centre of the pupil is located and then Iris
information is extracted. Feature extraction is based on its Dyadic Wavelet Transform.
Li Ma et al., [13] proposed an Iris recognition system based on local intensity variations. An Iris recognition
system includes four modules; image quality assessment and selection, pre-processing, feature extraction, and matching. In
image quality assessment stage, Fourier transform is applied on Iris located and Support Vector Machine (SVM) is used to
distinguish whether the corresponding Iris image is clear. Localization is done by projecting the pupil in horizontal and
vertical directions to find the centre. The binarization is done and exacted parameters are calculated by applying Hough
transform and canny edge detector. For normalization, the Iris ring was unwrapped counter clockwise into a rectangular
block of fixed size. Image enhancement is done through histogram equalization. Feature extraction is done by constructing a
bank of spatial filters. For matching Fisher Linear Discriminant is first used to reduce the dimensionality of the feature
vector and then the nearest centre classifier is adopted for classification. Sateesh Kumar et al., [14] proposed Iris recognition
using Empirical Mode Decomposition (EMD) and Fast Fourier Transform (FFT). The eye image is pre-processed, using
Circular Hough Transform and Daugman‟s Rubber Sheet model. The EMD and FFT are applied on the pre-processed image
for features extraction. Raju Dehankar et al., [15] explained edge detection technique for Iris using Haar wavelet. Anuradha
Shrivas and Preeti Tuli [16] proposed Iris recognition algorithm based on Hough transform for localization and removal of
occlusions. The outer boundary of Iris is obtained by circular summation of intensity. The localized Iris image transformed
17
3. Fusion of Hybrid Domain features for Iris Recognition
from Cartesian to polar coordinate system. Corners in the transformed Iris image are detected using covariance matrix of
change in intensity along rows and columns. All the detected are corners are features.
III. PROPOSED MODEL
In this section, the definitions and proposed FHDIR model are described.
A. Definitions
1) False Rejection Rate (FRR) is the measure of genuine Iris images rejected. It is defined as the ratio of number of
genuine persons rejected to the total number of persons in the database.
2) False Acceptance Rate (FAR) is the measure of imposters accepted. It is defined as the ratio of number of persons
accepted from out of database to the total number of persons out of database.
3) Equal Error Rate (EER) indicates that the proportion of the false acceptances is equal to the proportions of false
rejections. The lower the EER value, the higher the accuracy of the biometric system.
4) True Success Rate or Correct Recognition Rate (TSR or CRR) is the rate at which the system recognizes all the
persons in the database as particular individuals correctly. It is the measure of correctness of the system. It is the
ratio of number of persons correctly matched to the total number of persons in the database.
B. Proposed FHDIR model
Figure 1 shows the block diagram of the proposed model. The Iris image is read from the database. Pre-processing
is performed to get the desired part of the Iris and exclude the unwanted information. The required feature is extracted using
FFT and PCA. The matching between the database image and test image are done using the Euclidean Distance.
Database Test Iris
Pre-processing
FFT PCA
Fusion
Matching
(Accept/Reject)
Figure 1. The proposed FHDIR model
1) Iris database: The CASIA Iris database version 1.0 is used as input to the system. The database consists of Iris images
from 108 persons. Each person has 7 Iris images. There are total of 756 Iris images. The database is created using 50
peoples‟ Iris images and 58 peoples‟ are out of database. The 6 Iris images per person out of 7 images per person are
retained in the database and remaining one is used as test image. This classification is done for the computation of FRR, TSR
and EER. The FAR computation is done using the out of database images only.
2) Pre-processing: The CASIA database eye image is as shown in Figure 2. The image is resized to 100*300. The eye image
is binarized to locate pupil. It is observed that the intensity values of the pixels in pupil are between 0 and 70. The intensity
values of pixels less than or equal to 70 are assigned „0‟ and the intensity values more than 70 are assigned „1‟ in
binarization. The binarized image is shown in Figure 3, in which the pupil is located. The part of the image above and below
the pupil is cropped off to obtain the eye image of size 70*300 as shown in Figure 4. 35 pixels to the left and the right of the
pupil are detected and cropped. The final pre-processed Iris image parts are shown in Figure 5 and 6. The left and right
portions of image are of size 70*35 (rows*columns). The FFT is applied on the left part of the pre-processed image and PCA
is applied on the right part of the Iris image to generate features.
18
4. Fusion of Hybrid Domain features for Iris Recognition
Figure 2. The eye image
Figure 3. The binarised image in which the pupil is located
Figure 4. Horizontally segmented portion of the eye
Figure 5. Left half of Iris image
Figure 6. Right half of Iris image
3) Principal Component Analysis: PCA involves the calculation of the Eigen value decomposition of a data covariance
matrix or singular value decomposition of a data matrix, usually after mean centring of the data for each attribute. The
results of a PCA are usually discussed in terms of component scores and loadings. PCA is the simplest of the true
eigenvector based multivariate analyses. Often, its operation can be thought of as revealing the internal structure of the data
in a way which best explains the variance in the data.
PCA using the covariance method: The main aim of PCA is to convert a given data set X of dimension M to an alternative
data set Y of smaller dimension L by finding the matrix Y, where Y is the Karhunen–Loève Transform (KLT) of matrix X and
given by the Equation 1.
Y KLT X ------------------------ (1)
The data set: Consider a data set of observations of M variables, which need to be reduced so that each observation can be
described with only L variables, L < M. The data is arranged as a set of N data vectors X1, X2…. XN with each Xn representing
a single grouped observation of the M variables. X1, X2…. XN are taken as column vectors, each of which has M rows. The
column vectors are placed into a single matrix X of dimension M × N.
The empirical mean: The empirical mean along each dimension m=1, 2, 3…M is found. The calculated mean values are
placed into an empirical mean vector u of dimensions M × 1 and this is given by the Equation 2.
N
um X m, n
1
N n 1 --------- (2)
The deviations from the mean: Mean subtraction is an integral part of the solution for finding a principal component as it
minimizes the mean square error of the approximation of the data. When mean subtraction is not performed, the first
principal component will correspond to the mean of the data. Hence it is absolutely necessary to perform mean subtraction
(or "mean centering"), so that it ensures that the first principal component describes the direction of maximum variance,
which can be used for the deciphering. Therefore the centering of data is performed by subtracting the empirical mean vector
19
5. Fusion of Hybrid Domain features for Iris Recognition
u from each column of the data matrix X. The mean-subtracted data is stored in the M × N matrix B, as given by the Equation
3.
B X uh ----------- (3)
Where h denotes a 1 x N row vector of all 1's, which is given in the form of Equation 4.
hn 1 , for n 1 N ----------- (4)
The covariance matrix: The M × M empirical covariance matrix C is found by using the formula in Equation 5.
C B B B B 1
N
B B ---------- (5)
where
E denotes the expected value operator,
denotes the outer product operator, and
denotes the conjugate transpose operator.
The Eigen vectors and Eigen values of the covariance matrix: The matrix V of eigenvectors which diagonalizes the
covariance matrix C is calculated using the Equation 6.
V 1CV D ------------- (6)
D is the diagonal matrix which has the Eigen values of C. The Matrix D will take the form of an M × M diagonal matrix,
where
D p, q m for
pqm -------------(7)
The Equation 8 is the mth Eigen value of the covariance matrix C, and
D p, q 0 for
p q ------------- (8)
Matrix V, is also of dimensions M × M, containing M column vectors, each of length M, which represent the M
eigenvectors of the covariance matrix C. The Eigen values and eigenvectors so obtained are ordered and paired. Thus the mth
Eigen value corresponds to the mth eigenvector.
The PCA is directly applied to the right half of the pre-processed image. The right half of the pre-processed Iris
image of size 70*35 yields PCA coefficients matrix of the size 35*35. This coefficient matrix is converted to a 1D matrix,
which is of the size 1x1225, of which the first 252 are selected as they contain sufficient information needed for recognition.
The rest are discarded but the amount of information lost is insignificant.
4) Fast Fourier Transform: The Fast Fourier Transform (FFT) is one of the faster methods for calculating the DFT. While
it produces the same result as the other approaches, it is incredibly more efficient, often reducing the computation time
by hundred times. The DFT is calculated using the formula given in Equation 9.
N 1 N 1 j 2km j 2 ln
X k , l xm, ne N
e N
, 0 k , l N 1 --------------------- (9)
m 0 n 0
Where N is the total no of samples, X(k) are the DFT coefficients.
Fast Fourier Transform is used for feature extraction of the left half of the pre-processed image. The left half of the
Iris image matrix of size 70*35 is converted into a one dimensional matrix of the size 1*2450 and results in 2450 Fourier
coefficients. The first 252 coefficients are selected on the basis of observation as they yield the best results.
5) Fusion: The FFT and the PCA coefficients obtained, form the basis of feature vector and fused to get final feature vector.
The final feature vector is formed by arithmetic addition of the FFT and the PCA coefficients element by element. The final
feature vector is given in Equation 10.
Final Feature Vector = {FeatureFFT + FeaturePCA} ------ (10)
6) Template Matching: Euclidean distance is used as a classifier for matching. The Euclidean distance is also called as
Pythagorean distance. The minimum Euclidean distance gives the similarity between the unknown Iris images that is being
tested and the ones in the database. The Euclidean distance is selected as it gives us the best result.
In Cartesian co-ordinates, if p = (p1, p2... pn) and q = (q1, q2... qn) are two points in Euclidean Space, then the
distance from p to q is given by Equation 11.
d p, q q1 p1 2 q2 p2 2 .... qn pn 2 --------(11)
20
6. Fusion of Hybrid Domain features for Iris Recognition
Here p = (p1, p2... pn) are the matrix elements of the person whose being compared (tested) and q = (q1, q2... qn) are
the matrix elements of the person who is in the database and with whom the comparison is being done.
IV. ALGORITHM
Problem Definition: Efficient Iris Recognition system using fusion of FFT and PCA features to authenticate a
person. The Objectives are to:
i. increase the TSR
ii. reduce FAR and FRR
Table I shows the algorithm for the proposed FHDIR system, which verifies the authenticity of a given test Iris.
The Iris is pre-processed to obtain left and right portions of Iris. The FFT and PCA are applied to left and right portions of
Iris to extract transform and spatial domain features. Euclidian Distance is used for comparison.
Table I: FHDIR Algorithm
Input : Iris image database, Test Iris images
Output : Match/ Mismatch
1. CASIA Iris database is considered.
2. Iris images are pre-processed to obtain left and
right portion nearer to the pupil of Iris.
3. FFT is applied on left portion of Iris to generate
transform domain features.
4. PCA is applied on right portion of Iris to generate
spatial domain features.
5. Fusion of FFT and PCA features using arithmetic
addition to generate final feature set.
6. Repeat step 2 to 5 for Test Iris images.
7. Compare Test image features with database
features using Euclidean Distance.
V. PERFORMANCE ANALYSIS
The proposed FHDIR model is tested on the CASIA Iris image database–version 1.0, which are the most widely
used database containing 756 grey-scale Eye images with 108 unique Eyes or classes and 7 different images of each unique
Eye. The algorithm is simulated on MATLAB version 7.8. For the performance analysis, the 6 Iris images of first 50 persons
are considered to create database. The remaining one Iris image from these 50 persons is considered for finding FRR and
TSR. The 7 images of 58 persons are out of database and used for finding the FAR. Seven samples of a human eye in
CASIA Iris database are as shown in Figure 7.
Figure 7. Sample Iris images of a person in CASIA database.
Table II shows the performance parameters of the FHDIR system, when FFT, PCA and fusion of FFT-PCA are
considered separately. It is observed that the values of TSR and FAR increase, whereas FRR decreases with increasing
threshold, when PCA is used for feature extraction. The TSR in the case of PCA is around 6% with high values of FAR and
FRR. In the case of FFT, the value of TSR is around 96% with FRR value of 0.04 and FAR value of 0.71 at the threshold
value of 90. In the case of proposed FHDIR algorithm, the TSR is 100% for threshold value of 80, which is an improved
TSR value compared to individual PCA and FFT techniques.
Table II: Performance Analysis by applying PCA, FFT and FHDIR
PCA FFT Proposed FHDIR method
Threshold TSR
TSR (%) FRR FAR FRR FAR TSR (%) FRR FAR
(%)
10 0 1.0000 0.0000 0 1.0000 0.0000 0 1.0000 0.0000
20 0 1.0000 0.1207 0 1.0000 0.0000 0 1.0000 0.0000
30 6 0.9400 1.0000 2 0.9800 0.0000 4 0.9600 0.0517
40 6 0.9400 1.0000 14 0.8600 0.0345 34 0.6600 0.1207
21
7. Fusion of Hybrid Domain features for Iris Recognition
50 6 0.9400 1.0000 26 0.7400 0.0517 64 0.3600 0.3276
60 6 0.9400 1.0000 56 0.4400 0.1552 84 0.1600 0.5172
70 6 0.9400 1.0000 70 0.3000 0.3276 96 0.0400 0.7069
80 6 0.9400 1.0000 88 0.1200 0.4655 100 0.0000 0.8448
90 6 0.9400 1.0000 96 0.0400 0.7069 100 0.0000 0.9310
100 6 0.9400 1.0000 96 0.0400 0.7931 100 0.0000 1.0000
110 6 0.9400 1.0000 96 0.0400 0.9138 100 0.0000 1.0000
The efficiency of the FHDIR model is compared with that of existing methods namely, Xianchao Qui et al., [4],
Boles and Boashash [12], Martin-Roche et al., [5], Li Ma et al., [13]. From the Table III, it can be seen that the FHDIR
model has a better efficiency than the existing ones.
Table III: Comparing efficiency of FHDIR model with existing techniques.
Method Efficiency (%)
Xianchao Qui et al.,[4] 91.02
Boles and Boashash [12] 92.62
Martin- Roche et al., [5] 93.6
Li Ma et al.,[13] 98.06
Proposed FHDIR model 100.00
VI. CONCLUSION
The Biometrics is used to identify an individual proficiently than the existing traditional methods of identification.
The proposed FHDIR system is tested on CASIA Iris database. In this method Binarization technique is applied at the pre-
processing stage, to obtain left and right portions of Iris. On the left portion of the Iris, FFT is applied and on the right
portion of Iris, PCA is applied to obtain their respective coefficients at the Feature Extraction stage. The FFT and PCA
coefficients are combined using arithmetic addition to obtain the final feature vector. Euclidean Distance is used to compare
the test features with the database feature set. Finally it is noted that the performance parameters are enhanced in the case of
proposed FHDIR system than the existing systems. For the future work, pre-processing can be done by using Histogram
and/or Edge Detection. Also Dual Tree Complex Wavelet Transform (DTCWT) can be used to generate the features.
REFERENCES
[1]. Kresimir Delac and Mislav Grgic, “A Survey of Biometric Recognition Methods,” International Symposium on Electronics in
Marine, pp. 184 -193, 2004.
[2]. J Daugman, “How Iris recognition works,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.14, No.1, pp.
21-30, 2004.
[3]. J Daugman, “High Confidence Visual Recognition by a Test of Statistical Independence,” IEEE Transactions on Pattern
Analysis and Machine Intelligence, Vol. 15, No.11, pp.1148-1161, 1993.
[4]. Xianchao Qui, Zhenan Sun and Tieniu Tan, “Learning Appearance Primitives of Iris images for Ethnic Classification,”
International Conference on Image Processing, pp. 405-408, 2007.
[5]. Martin-Roche D, Sanchez-Avila C and Sanchez-Reillo R., “Iris Recognition for Biometric Identification using Dyadic Wavelet
Transform Zero-Crossing,” IEEE International Conference on Security Technology, pp. 272-277, 2001.
[6]. Libor Masek, “Recognition of Human Iris Patterns for Biometric Identification,” Thesis, School of Computer Science and Soft
Engineering, The University of Western Australia, 2003.
[7]. Xiaomei Liu, Bowyer K W and Patrick J Flynn, “Experimental Evaluation of Iris Recognition,” IEEE Computer Society
Conference on Computer Vision and Pattern Recognition, pp. 158-165, 2005.
[8]. Karen Hollingsworth, Sarah Baker, Sarah Ring, Kevin W Bowyer and Patrick J Flynn, “Recent Research Results in Iris
Biometrics,” Proceedings of the SPIE, Vol. 7306, pp. 73061Y- 73061Y-10, 2009.
[9]. R P Wildes, “Iris Recognition: An Emerging Biometric Technology,” IEEE Proceedings, Vol. 85, pp. 1348-1363, 1997.
[10]. R P Wildes, J C Asmuth, G L Green, S C Hsu, R J Kolczynski, J R Matey, S E McBride, David Sarno Research Centre,
Princeton, N J, “A System for Automated Iris Recognition,” Proceedings of the Second IEEE Workshop on Applications of
Computer Vision, pp. 1-6, 1994.
[11]. Emine Krichen, M Anouar Mellakh, Sonia Garcia-Salicetti and Bernadette Dorizzi, “Iris Identification using Wavelet Packets,”
International Conference on Pattern Recognition, Vol. 4, pp. 335- 338, 2004.
[12]. W W Boles and B Boashash, “A Human Identification Technique using Images of the Iris and Wavelet Transform,” IEEE
Transactions on Signal Processing, Vol. 46, No. 4, pp. 1185-1187, 1998.
[13]. Li Ma, Tieniu Tan, Yunhong Wang and Dexin Zhang, “Personal Identification based on Iris Texture Analysis,” IEEE
Transactions on Pattern Analysis and Machine Intelligence, Vol.25, No.12, pp.1519 – 1533, 2003.
[14]. Sateesh Kumar H C, Abhilash S K and Raja K B, Venugopal K R and L M Patnaik, “ Iris Recognition using Fusion of EMD and
FFT,” IEEE International Conference on Computational Intelligence and Computing Research, pp.607-613, 2011.
[15]. Raju K Dehankar, Seema C Bhivgade and S I Parihsr, “Wavelet Based Comparison of Edge Detection Technique for Iris
Recognition” International Journal of Engineering Research and development, vol. 1, no. 9, pp. 30-33, 2012.
[16]. Anuradha shrivas and Preeti Tuli, “Analysis of Iris Images for Iris recognition System” International Journal of Computer
Applications, Vol. 46, No. 13, pp. 22-25, 2012.
22
8. Fusion of Hybrid Domain features for Iris Recognition
Author Biography
Prashanth C R received the BE degree in Electronics and the ME degree in Digital Communication from Bangalore
University, Bangalore. He is pursuing his Ph.D. in Computer Science and Engineering of Bangalore University under the
guidance of Dr. K. B. Raja, Assistant Professor, Department of Electronics and Communication Engineering, University
Visvesvaraya College of Engineering. He is currently an Assistant Professor, Dept. of Electronics and Communication
Engineering, Vemana Institute of Technology, Bangalore. His research interests include Computer Vision, Pattern
Recognition, Biometrics, and Communication Engineering. He is a life member of Indian Society for Technical
Education, New Delhi, member of IEEE and IACSIT.
K B Raja is an Assistant Professor, Dept. of Electronics and Communication Engineering, University Visvesvaraya
college of Engineering, Bangalore University, Bangalore. He obtained his BE and ME in Electronics and Communication
Engineering from University Visvesvaraya College of Engineering, Bangalore. He was awarded Ph.D. in Computer
Science and Engineering from Bangalore University. He has over 85 research publications in refereed International
Journals and Conference Proceedings. His research interests include Image Processing, Biometrics, VLSI Signal
Processing, computer networks.
K R Venugopal is currently the Principal and Dean, Faculty of Engineering, University Visvesvaraya College of
Engineering, Bangalore University, Bangalore. He obtained his Bachelor of Engineering from University Visvesvaraya
College of Engineering. He received his Masters degree in Computer Science and Automation from Indian Institute of
Science, Bangalore. He was awarded Ph.D. in Economics from Bangalore University and Ph.D. in Computer Science
from Indian Institute of Technology, Madras. He has a distinguished academic career and has degrees in Electronics,
Economics, Law, Business Finance, Public Relations, Communications, Industrial Relations, Computer Science and
Journalism. He has authored 27 books on Computer Science and Economics, which include Petrodollar and the World
Economy, C Aptitude, Mastering C, Microprocessor Programming, Mastering C++ etc. He has been serving as the Professor and Chairman,
Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore.
During his three decades of service at UVCE he has over 275 research papers to his credit. His research interests include computer networks,
parallel and distributed systems, digital signal processing and data mining.
L M Patnaik is the Honorary Professor, Indian Institute of Science, Bangalore, India. During the past 35 years of his
service at the Indian Institute of Science, Bangalore, He has over 550 research publications in refereed International
Journals and Conference Proceedings. He is a Fellow of all the four leading Science and Engineering Academies in India;
Fellow of the IEEE and the Academy of Science for the Developing World. He has received twenty national and
international awards; notable among them is the IEEE Technical Achievement Award for his significant contributions to
high performance computing and soft computing. His areas of research interest have been parallel and distributed
computing, mobile computing, CAD for VLSI circuits, soft computing, and computational neuroscience.
23