SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 159
Iris Encryption using (2, 2) Visual cryptography &
Average Orientation Circularity Algorithm
Priti.P.Dafale
PG Scholar-Tech
Dept. of Computer Science & Engineering
B.D. College of Engineering Wardha
Prof.P.V.Chavan
Asst.Prof (Sr.Gr)
Dept. of Computer Engineering
B.D. College of Engineering Wardha,
Abstract: Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
Keywords: Secret sharing, Visual cryptography, Iris, Biometrics, Image processing.
I.INTRODUCTION
In the internet era, it is a trend that data has been transmitted, published and shared on the internet. Through
internet lot of user problems solved in spite of that internet is the convenient platform there still problems may exist.
Hackers may misuse the internet to commit the computer crime, resulting secret data may be forged, and stolen etc.The
best way to provide security security to data is to encrypt the secret information before sharing them. Authentication is of
different types such as physiological, behavioural and biometric authentication. The basic idea behind visual
cryptography is to divide the secret into two shares. To decrypt the secret, shares are super imposed (logical X-OR
operation is performed).There are different types of visual cryptography schemes such as (2,2),(K,N) & (N,N)etc.Basic
scheme (2,2) is also called secret sharing scheme. To reveal secret all shares are to be gathered[11].
Biometric authentication consists of some characteristics such as
 Universality means that every person using a system should possess the quality, characteristics.
 Uniqueness means the trait should be sufficiently different for individuals such that they can be distinguished
from one another.
 Permanence relates to the manner in which a trait varies over time.
 Measurability (collectability) relates to the ease of acquisition or measurement of the trait.
 Acceptability relates to individuals in the relevant population accept the how the manner in which a trait varies
over time.[10]
As biometric authentication include iris recognition, facial recognition. hand recognition, gait recognition, fingerprint
recognition etc. The performance of perfect biometric scheme includes uniqueness, universality, permanence, user
friendliness.
1.1IRIS
Iris is the thin circular structure of human eye. While comparing each and every authentication scheme it is found that iris
is unique.Texture of iris start at the third months of born baby and this structure is unique throughout the life of that
person.The most important feature of iris that it is used for identification purpose.
1.2 FINGERPRINT
Fingerprint are graphical flow like ridges present on the human fingers.Its formations depend on the initial conditions of
the embryonic mesoderm from which they develop. Lot of research has been done later it is used for criminal
identification purpose.Nowadays this system are used in multiple civil areas.
1.3 HAND GEOMETRY
Hand geometry based biometric system has proven to be the most suitable and acceptable biometric trait for medium and
low security application. Geometric measurements of the human hand have been used for identity authentication in
commercial system [17].
1.4. FACIAL EXPRESSION
Emotion is a state of feeling like thoughts, psychological changes and expressions. Emotions positively affect intelligent
functions such as decision making, perception and empathic understanding. The approach on Facial Action Coding
System (FACS) which separates the expression into upper and lower face action[18]
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 160
II. SHARE GENERATION SCHEME
The theoretical foundation of key generation rule are stated below.
Input: original image I of size 512 X 512 pixels
output: shares S 1 and S2.
for(i=0;i<512;i++)
for( j=0;j<512;j++ )
Random assign s1[i][j] as white or black
If I[i][j] is white then
S2[i][j]=S1[i][j]
else
S2[i][j]=complement of S1[i][j];
else
End if
End for
By using traditional methods original secret image can be reveal by using OR operation which has low contrast and
quality.Inorder to improve the we will replace this methods by using binary XOR operation .By using XOR operation it
will give original image without noise.
III. LITERATURE SURVEY
Desmedt,Y.Hou,S.Quisquata in 1998 proposed(2,n) audio secret sharing scheme. In this scheme shares are the audio
files but the secret is the bit string which is constructed without any computation. The ASSS is a secret sharing scheme in
which shares & or the secret are audio files. It is mainly used in audio application. This scheme achieve shares in
random[1] Yong Zhu,Tieniu Tan and Yunhong Wang in 2000 proposed a new system based on personal identification
based on iris patterns[ 2]. Thien and Lin in 2002 proposed (k,n) threshold secret sharing scheme using shamir secret
sharing scheme to generate the image shares[3]. Milos Stojmenovic,Amiya Nayak in 2007 proposed the circularity
measures.There are two ways of determining the center of shape.The algo work on open and closed algo.The measures
were compared with human measurements of circularity of the same set[4]. A. Ektesabi,A. Kapoor in 2011 proposed
techniques to determine the exact iris,pupil boundaries with high speed processing without losing the accuracy. The
software filters is applied to reduce the disturbance .To improve the computational time , it is more accurate,simpler and
faster with shorter detection[5]. Pallavi V Chavan, Dr. Mohammad Atique, and Dr. Anjali R Mahajan proposed the
concept of an intelligent hierarchical visual cryptography. Visual cryptography is the art of encryption such that
decryption can be perform by mathematical operation. The secret image consists of collection of black and white pixels.
The major disadvantages of this scheme is that visually blind people cannot used this scheme[6].
Young-Chang Hou and Zen-Yu Quan proposed the techniques of progressive visual cryptography with unexpanded
shares.The contrast of this scheme is better than conventional VC.The share size is same as that of secret.PVSS differs
from the conventional VSS in the way that when more than one share is stacked together,the hidden information will
appear little by little.The current researches on PVSS are based on pixel expansion which resulted in the waste of the
transmission time and storage space[7]. R.M. Farouk, R. Kumar, K.A. Riad in 2011 proposed this method is found to
give results that are with the other pattern recognition techniques.It is capable of excellent pattern recognition.The
conventional matching techniques with regard to time and effectiveness of results[8]. A visual cryptography scheme
(VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into n shares distributed to n
participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without
any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of
VCS which consists of meaningful shares (compared to the random shares of traditional VCS). In this paper, we propose
a construction of EVCS which is realized by embedding random shares into meaningful covering shares, and we call it
the embedded EVCS[9]. R.Sinduja,R.D.Sathiya and Dr.V.Vaithiyanatham in 2012 proposed the feature template
databases and the user template should be same. For authentication, storing authentication, storing the template in the
database. Main issue with generating the shares is the degradation on the image quality found[10]. Ferhat-taleb Alim,K
.Messaoudi, S.Seddiki and O.Kerdjiji in 2012 proposed FPGA an architecture method used to detect circles from edge
images based on Hough transform algorithm. Hough transform is the broad application ,it robust techniques for finding
curves that increases the complexity of hardware parameter. Hough transform algo. is applied on binary images ,first we
have to convert binary images into color images[11]. Leandro Schwarz,Fabio Cabral Pacheco in 2012 proposed to
describe a computer system to detect and measure the pupil and iris size. Open CV is defined as open computer vision
library. The system was written in real time video processing. The frames are captured in gray scale images and proceed
using normalization and threshold techniques. The pupillometry is the measurement in the dilation of pupils. Increase in
the amount of light enters in eye,the activity of sphincter muscle of the iris is inhibit and the activity of dilator muscle is
stimulated,causing the pupils dilate. Due to the arrangement of camera and the mask used to support the face the image
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 161
filtering operation is not to be performed. In this it is possible to select an area of image that contains eye and perform
operation to save processing time and memory. The library is written in C/C++ language,but also supports java, Python
and visual basics .It is used to perform the main filtering,feature extraction such as Active Contour and Hough
transformation[13]. T.Kathikeyan ,B.Sabarigiri in 2012 proposed IRIS and EEG. Used multi-modality human
identification system. Multi-modality human identification makes it difficult to achieve spoofing in biometric sensors
[15]. Milos Stojmenovic, Aleksander Jevremovic, Amiya Nayak in 2013 proposed shape based circularity.The
algorithmn isolates the pupil boundary byextracting image edges,then find the largest contiguous set of points.If human
irises are sometimes not perfect circles ,nor do the iris and pupil necessarily form concentric circle[16]. Hui Zhang,
Xiangfeng Guan in 2012 proposed new iris recognition system to improve accuracy and to reduce the recognition time.
Most of the human eyes iris boundary is not round by shape,it may certainly cause pupil legacy,reducing iris
identification. As for the operation time compared with neural network,combination of KNN algo. Ensure the
accuracy,average,reduce the operation time more than 20 times. It can improved the running speed of recognition [17].
1V.IMPLEMENTED WORK
By using (2,2) secret sharing scheme we will generate shares and reveal the secret and also used the average
orientation circularity algorithm.Circulariy value is in the range of 0 and 1.If the circularity value is 1 then shapr is circle
Otherwise shape is line. To select the center of the shape is the important factor while measuring the circularity.Center of
gravity of shape corresponds to per-coordinate average value of each pixel in the shape.The cartesian pixel array was
transformed into the array of polar co-ordinates pixels.Points are transformed from polar coordinate to cartesian
coordinates. The points (x,y) in the cartesian form ( ,arctan(y/x)).
Fig2.Polar co-ordinate representation
There are two phases of IRIS detection algorithm such as
 Registration phase
 Authentication phase
In Registration phase: In the Registration phase administrative has to collect all the user iris image. We processed the
iris image apply edge detection & generate meaningful shares of all the iris image stored in the database. There are two
shares first shares stored in the database called as database share & second share are stored in the user shares.
In the Authentication phase :
When the user share match with the database share by using unique identification id then it is authenticated one.
Otherwise it is not a authenticated one. At the same time it will open the person person with its information. Graph is also
calculated.Time complexity for generating shares and to reveal the secret is also calculated. We will also count the total
number of black and white pixels
COMPARATIVE STUDY
PARAMETERS
NO. OF
SHARE
PIXEL
EXPANSION
TYPE OF
SECRET
CONTRAST
TYPE OF
IMAGES
Halftone cryptography color
images
N No Random Better Color images
(K,N) for color images
Extended VCS
N No Meaningful shares Poor Color images
(K,N) Visual cryptography
scheme
K No Random Better Gray images
Progressive Visual
cryptography
2 No Random 50% Gray Images
(2,n)Visual Threshold scheme N
Minimal
Expansion
Random optimality Gray images
(2,2)Secret sharing scheme 2 Yes Random Better Gray Images
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 162
V.CONCLUSION
Iris is more secure, reliable .To provide security to iris we used (2,2) secret sharing scheme .It is used for authentication
purpose. So,it come into conclude that conventional ID are one that we carry but biometric system are those that we
are!.In future we will try to work on realtime images.
VI.REFERENCES
[1] Desmedt, Y.Hou, S.Quisquater, J,,”Audio and optical cryptography”,in Advances in Cryptology-Asia
crypt’98,Springer-Verlag LNCS vol.1514, pp,392-404,1998.
[2] Yong Zhu,Tieniu Tan and Yunhong Wang,”Biometric Personal identification based on iris patterns”,IEEE
pp,801-804,2000.
[3] C.C.Thien and J.C.Lin,”Secret image sharing”,Computers & Graphics, vol.26, no.5,pp.765-770,2002.
[4] “Shape based circularity measures of planar point set “Milos Stojmenovic, Amiya Nayak in IEEE 2007 page
no-1279-1282.
[5] A. Ektesabi, A. Kapoor,” Exact pupil and iris boundary detection”, IInd
International conference on control,
Instrumentation and Automation ,IEEE,PP.1217-1221,2011.
[6] P.V.Chavan, Dr. M.Atique, Dr.A.R.Mahajan,” An intelligent System for secured Authentication using
Hierarchical Visual cryptography-review”, ACEEE International Journal on Network Security, Vol
02,No.04,Oct 2011.
[7] “Young-Chang Hou and Zen-Yu Quan”,Progressive visual cryptography with unexpanded shares,IEEE
Transactions on circuits and system for video technology ,Vol 21,Nov 2011.
[8] R.M. Farouk, R. Kumar, K.A. Riad ,"Iris matching using multi-dimensional artificial neural network" , The
Institution of Engineering and Technology 2011, lET Comput. Vis., 2011, Vol. 5, Iss. 3, pp. 178-1.
[9] Feng Liu,Chauanku Wu,”Embedded Extended VC scheme”,Volume:6,2011,IEEE
[10] Dr.V.Vaithiyanathan,R.Sinduja,R.D.Sathiya ”Sheltered Iris Attestation by means of Visual Cryptography
(SIA-VC)”, IEEE International conference on advances in Engineering Science and Management 2012.page
no.650-655.
[11] “Modified Circular Hough Transform using FPGA” F. Ferhat-taleb Alim, K. Messaoudi, S. Seddiki an
O.Kerdjidj,International conference on Microelectronics, IEEE, 2012.
[12] ”Pupil & iris detection in dynamic pupillometry using OpenCV Library”,”Leandro Schwarz,Fabio Cabral
Pachew,Miguel Autonio Sovierzoski”,CISP,IEEE,PP,211-215,2012
[13] “Halftone VC with color share”,Granular Computing IEEE 2012,International
Conference,Liu,Yuangfeng,Wang,Zhongmi
[14] T. Kathikeyan, B.Sabagiri”, Countermeasures against IRIS Spoofing and Liveness Detection using
Electroencephalogram”, IEEE ,2012.
[15] Hui Zhang,Xiangfeng Guan,”Iris Recognition Based on Grouping KNN and Rrectangle conversion “,IEEE
2012.
[16] Milos Stojmenovic, Aleksander Jevremovic, Amiya Nayak,“Fast iris detection via shape based circularity”,8th
Conference on Industrial Electronics & Applications, pp.747-753,IEEE,2013
[17] Poonam Rathi, Dr. Sipi Dubey, ”, (IJARCET) Volume 2, Issue 6, June 2013, “Hand Geometry
Recognition System Using Feature Extraction”
[18] G.Hemalatha1, C.P. Sumathi, (IJCSES) Vol.5, April 2014,”A Study of Techniques for Facial Detection and
Expression Classification”

More Related Content

What's hot

A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationIOSR Journals
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
 
A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition SystemCSCJournals
 
Optimized Biometric System Based on Combination of Face Images and Log Transf...
Optimized Biometric System Based on Combination of Face Images and Log Transf...Optimized Biometric System Based on Combination of Face Images and Log Transf...
Optimized Biometric System Based on Combination of Face Images and Log Transf...sipij
 

What's hot (19)

A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person Authentication
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 
237 240
237 240237 240
237 240
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFT
 
A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2
 
50120130406045
5012013040604550120130406045
50120130406045
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
G0333946
G0333946G0333946
G0333946
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition System
 
Optimized Biometric System Based on Combination of Face Images and Log Transf...
Optimized Biometric System Based on Combination of Face Images and Log Transf...Optimized Biometric System Based on Combination of Face Images and Log Transf...
Optimized Biometric System Based on Combination of Face Images and Log Transf...
 
33 102-1-pb
33 102-1-pb33 102-1-pb
33 102-1-pb
 
Independent Research
Independent ResearchIndependent Research
Independent Research
 

Viewers also liked

If you’ve ever wondered what happens at the moment that an astronaut’s return...
If you’ve ever wondered what happens at the moment that an astronaut’s return...If you’ve ever wondered what happens at the moment that an astronaut’s return...
If you’ve ever wondered what happens at the moment that an astronaut’s return...Aba Nguyễn
 
RAM installation Rev 5
RAM installation Rev 5RAM installation Rev 5
RAM installation Rev 5Scott Graser
 
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARESA COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARESAM Publications
 
Static Analysis and Experimentation of Jute Fiber Reinforced with E-Glass
Static Analysis and Experimentation of Jute Fiber Reinforced with E-GlassStatic Analysis and Experimentation of Jute Fiber Reinforced with E-Glass
Static Analysis and Experimentation of Jute Fiber Reinforced with E-GlassAM Publications
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Địa chỉ học chứng chỉ nghiệp vụ lễ tân
Địa chỉ học chứng chỉ nghiệp vụ lễ tânĐịa chỉ học chứng chỉ nghiệp vụ lễ tân
Địa chỉ học chứng chỉ nghiệp vụ lễ tânThảo Nguyễn
 
A Novel approach for Document Clustering using Concept Extraction
A Novel approach for Document Clustering using Concept ExtractionA Novel approach for Document Clustering using Concept Extraction
A Novel approach for Document Clustering using Concept ExtractionAM Publications
 
From the outside it looks like any other slightly unloved tatty trailer park ...
From the outside it looks like any other slightly unloved tatty trailer park ...From the outside it looks like any other slightly unloved tatty trailer park ...
From the outside it looks like any other slightly unloved tatty trailer park ...Aba Nguyễn
 
(Ne)održivost usluga plhiv (plwha) organizacija nakon odlaska gfatm a - vladi...
(Ne)održivost usluga plhiv (plwha) organizacija nakon odlaska gfatm a - vladi...(Ne)održivost usluga plhiv (plwha) organizacija nakon odlaska gfatm a - vladi...
(Ne)održivost usluga plhiv (plwha) organizacija nakon odlaska gfatm a - vladi...PinHealth
 
TVET DWA 2012-3-7_KKedits FINAL to DWA
TVET DWA 2012-3-7_KKedits FINAL to DWATVET DWA 2012-3-7_KKedits FINAL to DWA
TVET DWA 2012-3-7_KKedits FINAL to DWAToyin Oshaniwa
 
[QTKDQT] - Thâm nhập thị trường nước ngoài
[QTKDQT] - Thâm nhập thị trường nước ngoài[QTKDQT] - Thâm nhập thị trường nước ngoài
[QTKDQT] - Thâm nhập thị trường nước ngoàiDo Ha Van
 

Viewers also liked (14)

تفسير سورة الصف
تفسير سورة الصفتفسير سورة الصف
تفسير سورة الصف
 
If you’ve ever wondered what happens at the moment that an astronaut’s return...
If you’ve ever wondered what happens at the moment that an astronaut’s return...If you’ve ever wondered what happens at the moment that an astronaut’s return...
If you’ve ever wondered what happens at the moment that an astronaut’s return...
 
Pradeep Dhakad Cv
Pradeep Dhakad CvPradeep Dhakad Cv
Pradeep Dhakad Cv
 
RAM installation Rev 5
RAM installation Rev 5RAM installation Rev 5
RAM installation Rev 5
 
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARESA COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
 
Ghar ka khaana
Ghar ka khaanaGhar ka khaana
Ghar ka khaana
 
Static Analysis and Experimentation of Jute Fiber Reinforced with E-Glass
Static Analysis and Experimentation of Jute Fiber Reinforced with E-GlassStatic Analysis and Experimentation of Jute Fiber Reinforced with E-Glass
Static Analysis and Experimentation of Jute Fiber Reinforced with E-Glass
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Địa chỉ học chứng chỉ nghiệp vụ lễ tân
Địa chỉ học chứng chỉ nghiệp vụ lễ tânĐịa chỉ học chứng chỉ nghiệp vụ lễ tân
Địa chỉ học chứng chỉ nghiệp vụ lễ tân
 
A Novel approach for Document Clustering using Concept Extraction
A Novel approach for Document Clustering using Concept ExtractionA Novel approach for Document Clustering using Concept Extraction
A Novel approach for Document Clustering using Concept Extraction
 
From the outside it looks like any other slightly unloved tatty trailer park ...
From the outside it looks like any other slightly unloved tatty trailer park ...From the outside it looks like any other slightly unloved tatty trailer park ...
From the outside it looks like any other slightly unloved tatty trailer park ...
 
(Ne)održivost usluga plhiv (plwha) organizacija nakon odlaska gfatm a - vladi...
(Ne)održivost usluga plhiv (plwha) organizacija nakon odlaska gfatm a - vladi...(Ne)održivost usluga plhiv (plwha) organizacija nakon odlaska gfatm a - vladi...
(Ne)održivost usluga plhiv (plwha) organizacija nakon odlaska gfatm a - vladi...
 
TVET DWA 2012-3-7_KKedits FINAL to DWA
TVET DWA 2012-3-7_KKedits FINAL to DWATVET DWA 2012-3-7_KKedits FINAL to DWA
TVET DWA 2012-3-7_KKedits FINAL to DWA
 
[QTKDQT] - Thâm nhập thị trường nước ngoài
[QTKDQT] - Thâm nhập thị trường nước ngoài[QTKDQT] - Thâm nhập thị trường nước ngoài
[QTKDQT] - Thâm nhập thị trường nước ngoài
 

Similar to Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circularity Algorithm

Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceIOSR Journals
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique ijsc
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsEditor IJMTER
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
 
Feature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyFeature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyAIRCC Publishing Corporation
 
Eye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIEye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIDr. Amarjeet Singh
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of CrimeIRJET Journal
 
A review of factors that impact the design of a glove based wearable devices
A review of factors that impact the design of a glove based wearable devicesA review of factors that impact the design of a glove based wearable devices
A review of factors that impact the design of a glove based wearable devicesIAESIJAI
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIRJET Journal
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...aciijournal
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)aciijournal
 
A Novel Approach for Detecting the IRIS Crypts
A Novel Approach for Detecting the IRIS CryptsA Novel Approach for Detecting the IRIS Crypts
A Novel Approach for Detecting the IRIS CryptsIJERDJOURNAL
 

Similar to Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circularity Algorithm (20)

Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
F0932733
F0932733F0932733
F0932733
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition Systems
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
 
Feature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyFeature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A Survey
 
E0543135
E0543135E0543135
E0543135
 
Eye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIEye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AI
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of Crime
 
A review of factors that impact the design of a glove based wearable devices
A review of factors that impact the design of a glove based wearable devicesA review of factors that impact the design of a glove based wearable devices
A review of factors that impact the design of a glove based wearable devices
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
 
A Novel Approach for Detecting the IRIS Crypts
A Novel Approach for Detecting the IRIS CryptsA Novel Approach for Detecting the IRIS Crypts
A Novel Approach for Detecting the IRIS Crypts
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circularity Algorithm

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 159 Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circularity Algorithm Priti.P.Dafale PG Scholar-Tech Dept. of Computer Science & Engineering B.D. College of Engineering Wardha Prof.P.V.Chavan Asst.Prof (Sr.Gr) Dept. of Computer Engineering B.D. College of Engineering Wardha, Abstract: Biometric authentication scheme used for person identification. Biometric authentication scheme consists of uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2) secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques that divide the secret into shares. Keywords: Secret sharing, Visual cryptography, Iris, Biometrics, Image processing. I.INTRODUCTION In the internet era, it is a trend that data has been transmitted, published and shared on the internet. Through internet lot of user problems solved in spite of that internet is the convenient platform there still problems may exist. Hackers may misuse the internet to commit the computer crime, resulting secret data may be forged, and stolen etc.The best way to provide security security to data is to encrypt the secret information before sharing them. Authentication is of different types such as physiological, behavioural and biometric authentication. The basic idea behind visual cryptography is to divide the secret into two shares. To decrypt the secret, shares are super imposed (logical X-OR operation is performed).There are different types of visual cryptography schemes such as (2,2),(K,N) & (N,N)etc.Basic scheme (2,2) is also called secret sharing scheme. To reveal secret all shares are to be gathered[11]. Biometric authentication consists of some characteristics such as  Universality means that every person using a system should possess the quality, characteristics.  Uniqueness means the trait should be sufficiently different for individuals such that they can be distinguished from one another.  Permanence relates to the manner in which a trait varies over time.  Measurability (collectability) relates to the ease of acquisition or measurement of the trait.  Acceptability relates to individuals in the relevant population accept the how the manner in which a trait varies over time.[10] As biometric authentication include iris recognition, facial recognition. hand recognition, gait recognition, fingerprint recognition etc. The performance of perfect biometric scheme includes uniqueness, universality, permanence, user friendliness. 1.1IRIS Iris is the thin circular structure of human eye. While comparing each and every authentication scheme it is found that iris is unique.Texture of iris start at the third months of born baby and this structure is unique throughout the life of that person.The most important feature of iris that it is used for identification purpose. 1.2 FINGERPRINT Fingerprint are graphical flow like ridges present on the human fingers.Its formations depend on the initial conditions of the embryonic mesoderm from which they develop. Lot of research has been done later it is used for criminal identification purpose.Nowadays this system are used in multiple civil areas. 1.3 HAND GEOMETRY Hand geometry based biometric system has proven to be the most suitable and acceptable biometric trait for medium and low security application. Geometric measurements of the human hand have been used for identity authentication in commercial system [17]. 1.4. FACIAL EXPRESSION Emotion is a state of feeling like thoughts, psychological changes and expressions. Emotions positively affect intelligent functions such as decision making, perception and empathic understanding. The approach on Facial Action Coding System (FACS) which separates the expression into upper and lower face action[18]
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 160 II. SHARE GENERATION SCHEME The theoretical foundation of key generation rule are stated below. Input: original image I of size 512 X 512 pixels output: shares S 1 and S2. for(i=0;i<512;i++) for( j=0;j<512;j++ ) Random assign s1[i][j] as white or black If I[i][j] is white then S2[i][j]=S1[i][j] else S2[i][j]=complement of S1[i][j]; else End if End for By using traditional methods original secret image can be reveal by using OR operation which has low contrast and quality.Inorder to improve the we will replace this methods by using binary XOR operation .By using XOR operation it will give original image without noise. III. LITERATURE SURVEY Desmedt,Y.Hou,S.Quisquata in 1998 proposed(2,n) audio secret sharing scheme. In this scheme shares are the audio files but the secret is the bit string which is constructed without any computation. The ASSS is a secret sharing scheme in which shares & or the secret are audio files. It is mainly used in audio application. This scheme achieve shares in random[1] Yong Zhu,Tieniu Tan and Yunhong Wang in 2000 proposed a new system based on personal identification based on iris patterns[ 2]. Thien and Lin in 2002 proposed (k,n) threshold secret sharing scheme using shamir secret sharing scheme to generate the image shares[3]. Milos Stojmenovic,Amiya Nayak in 2007 proposed the circularity measures.There are two ways of determining the center of shape.The algo work on open and closed algo.The measures were compared with human measurements of circularity of the same set[4]. A. Ektesabi,A. Kapoor in 2011 proposed techniques to determine the exact iris,pupil boundaries with high speed processing without losing the accuracy. The software filters is applied to reduce the disturbance .To improve the computational time , it is more accurate,simpler and faster with shorter detection[5]. Pallavi V Chavan, Dr. Mohammad Atique, and Dr. Anjali R Mahajan proposed the concept of an intelligent hierarchical visual cryptography. Visual cryptography is the art of encryption such that decryption can be perform by mathematical operation. The secret image consists of collection of black and white pixels. The major disadvantages of this scheme is that visually blind people cannot used this scheme[6]. Young-Chang Hou and Zen-Yu Quan proposed the techniques of progressive visual cryptography with unexpanded shares.The contrast of this scheme is better than conventional VC.The share size is same as that of secret.PVSS differs from the conventional VSS in the way that when more than one share is stacked together,the hidden information will appear little by little.The current researches on PVSS are based on pixel expansion which resulted in the waste of the transmission time and storage space[7]. R.M. Farouk, R. Kumar, K.A. Riad in 2011 proposed this method is found to give results that are with the other pattern recognition techniques.It is capable of excellent pattern recognition.The conventional matching techniques with regard to time and effectiveness of results[8]. A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into n shares distributed to n participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS). In this paper, we propose a construction of EVCS which is realized by embedding random shares into meaningful covering shares, and we call it the embedded EVCS[9]. R.Sinduja,R.D.Sathiya and Dr.V.Vaithiyanatham in 2012 proposed the feature template databases and the user template should be same. For authentication, storing authentication, storing the template in the database. Main issue with generating the shares is the degradation on the image quality found[10]. Ferhat-taleb Alim,K .Messaoudi, S.Seddiki and O.Kerdjiji in 2012 proposed FPGA an architecture method used to detect circles from edge images based on Hough transform algorithm. Hough transform is the broad application ,it robust techniques for finding curves that increases the complexity of hardware parameter. Hough transform algo. is applied on binary images ,first we have to convert binary images into color images[11]. Leandro Schwarz,Fabio Cabral Pacheco in 2012 proposed to describe a computer system to detect and measure the pupil and iris size. Open CV is defined as open computer vision library. The system was written in real time video processing. The frames are captured in gray scale images and proceed using normalization and threshold techniques. The pupillometry is the measurement in the dilation of pupils. Increase in the amount of light enters in eye,the activity of sphincter muscle of the iris is inhibit and the activity of dilator muscle is stimulated,causing the pupils dilate. Due to the arrangement of camera and the mask used to support the face the image
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 161 filtering operation is not to be performed. In this it is possible to select an area of image that contains eye and perform operation to save processing time and memory. The library is written in C/C++ language,but also supports java, Python and visual basics .It is used to perform the main filtering,feature extraction such as Active Contour and Hough transformation[13]. T.Kathikeyan ,B.Sabarigiri in 2012 proposed IRIS and EEG. Used multi-modality human identification system. Multi-modality human identification makes it difficult to achieve spoofing in biometric sensors [15]. Milos Stojmenovic, Aleksander Jevremovic, Amiya Nayak in 2013 proposed shape based circularity.The algorithmn isolates the pupil boundary byextracting image edges,then find the largest contiguous set of points.If human irises are sometimes not perfect circles ,nor do the iris and pupil necessarily form concentric circle[16]. Hui Zhang, Xiangfeng Guan in 2012 proposed new iris recognition system to improve accuracy and to reduce the recognition time. Most of the human eyes iris boundary is not round by shape,it may certainly cause pupil legacy,reducing iris identification. As for the operation time compared with neural network,combination of KNN algo. Ensure the accuracy,average,reduce the operation time more than 20 times. It can improved the running speed of recognition [17]. 1V.IMPLEMENTED WORK By using (2,2) secret sharing scheme we will generate shares and reveal the secret and also used the average orientation circularity algorithm.Circulariy value is in the range of 0 and 1.If the circularity value is 1 then shapr is circle Otherwise shape is line. To select the center of the shape is the important factor while measuring the circularity.Center of gravity of shape corresponds to per-coordinate average value of each pixel in the shape.The cartesian pixel array was transformed into the array of polar co-ordinates pixels.Points are transformed from polar coordinate to cartesian coordinates. The points (x,y) in the cartesian form ( ,arctan(y/x)). Fig2.Polar co-ordinate representation There are two phases of IRIS detection algorithm such as  Registration phase  Authentication phase In Registration phase: In the Registration phase administrative has to collect all the user iris image. We processed the iris image apply edge detection & generate meaningful shares of all the iris image stored in the database. There are two shares first shares stored in the database called as database share & second share are stored in the user shares. In the Authentication phase : When the user share match with the database share by using unique identification id then it is authenticated one. Otherwise it is not a authenticated one. At the same time it will open the person person with its information. Graph is also calculated.Time complexity for generating shares and to reveal the secret is also calculated. We will also count the total number of black and white pixels COMPARATIVE STUDY PARAMETERS NO. OF SHARE PIXEL EXPANSION TYPE OF SECRET CONTRAST TYPE OF IMAGES Halftone cryptography color images N No Random Better Color images (K,N) for color images Extended VCS N No Meaningful shares Poor Color images (K,N) Visual cryptography scheme K No Random Better Gray images Progressive Visual cryptography 2 No Random 50% Gray Images (2,n)Visual Threshold scheme N Minimal Expansion Random optimality Gray images (2,2)Secret sharing scheme 2 Yes Random Better Gray Images
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 162 V.CONCLUSION Iris is more secure, reliable .To provide security to iris we used (2,2) secret sharing scheme .It is used for authentication purpose. So,it come into conclude that conventional ID are one that we carry but biometric system are those that we are!.In future we will try to work on realtime images. VI.REFERENCES [1] Desmedt, Y.Hou, S.Quisquater, J,,”Audio and optical cryptography”,in Advances in Cryptology-Asia crypt’98,Springer-Verlag LNCS vol.1514, pp,392-404,1998. [2] Yong Zhu,Tieniu Tan and Yunhong Wang,”Biometric Personal identification based on iris patterns”,IEEE pp,801-804,2000. [3] C.C.Thien and J.C.Lin,”Secret image sharing”,Computers & Graphics, vol.26, no.5,pp.765-770,2002. [4] “Shape based circularity measures of planar point set “Milos Stojmenovic, Amiya Nayak in IEEE 2007 page no-1279-1282. [5] A. Ektesabi, A. Kapoor,” Exact pupil and iris boundary detection”, IInd International conference on control, Instrumentation and Automation ,IEEE,PP.1217-1221,2011. [6] P.V.Chavan, Dr. M.Atique, Dr.A.R.Mahajan,” An intelligent System for secured Authentication using Hierarchical Visual cryptography-review”, ACEEE International Journal on Network Security, Vol 02,No.04,Oct 2011. [7] “Young-Chang Hou and Zen-Yu Quan”,Progressive visual cryptography with unexpanded shares,IEEE Transactions on circuits and system for video technology ,Vol 21,Nov 2011. [8] R.M. Farouk, R. Kumar, K.A. Riad ,"Iris matching using multi-dimensional artificial neural network" , The Institution of Engineering and Technology 2011, lET Comput. Vis., 2011, Vol. 5, Iss. 3, pp. 178-1. [9] Feng Liu,Chauanku Wu,”Embedded Extended VC scheme”,Volume:6,2011,IEEE [10] Dr.V.Vaithiyanathan,R.Sinduja,R.D.Sathiya ”Sheltered Iris Attestation by means of Visual Cryptography (SIA-VC)”, IEEE International conference on advances in Engineering Science and Management 2012.page no.650-655. [11] “Modified Circular Hough Transform using FPGA” F. Ferhat-taleb Alim, K. Messaoudi, S. Seddiki an O.Kerdjidj,International conference on Microelectronics, IEEE, 2012. [12] ”Pupil & iris detection in dynamic pupillometry using OpenCV Library”,”Leandro Schwarz,Fabio Cabral Pachew,Miguel Autonio Sovierzoski”,CISP,IEEE,PP,211-215,2012 [13] “Halftone VC with color share”,Granular Computing IEEE 2012,International Conference,Liu,Yuangfeng,Wang,Zhongmi [14] T. Kathikeyan, B.Sabagiri”, Countermeasures against IRIS Spoofing and Liveness Detection using Electroencephalogram”, IEEE ,2012. [15] Hui Zhang,Xiangfeng Guan,”Iris Recognition Based on Grouping KNN and Rrectangle conversion “,IEEE 2012. [16] Milos Stojmenovic, Aleksander Jevremovic, Amiya Nayak,“Fast iris detection via shape based circularity”,8th Conference on Industrial Electronics & Applications, pp.747-753,IEEE,2013 [17] Poonam Rathi, Dr. Sipi Dubey, ”, (IJARCET) Volume 2, Issue 6, June 2013, “Hand Geometry Recognition System Using Feature Extraction” [18] G.Hemalatha1, C.P. Sumathi, (IJCSES) Vol.5, April 2014,”A Study of Techniques for Facial Detection and Expression Classification”