The document describes a robust approach for iris recognition used for person authentication. It proposes using eight main stages: 1) scanning the iris image, 2) converting it to grayscale, 3) applying median filters to reduce noise, 4) detecting the pupil center, 5) using canny edge detection to identify iris and pupil edges, 6) determining the iris and pupil radii, 7) localizing the iris, and 8) unrolling the iris texture. It then uses k-means clustering to compare images and match them to authenticate individuals in a database. The approach aims to improve on previous iris recognition methods by more accurately detecting non-circular iris and pupil shapes.
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
This document proposes a new iris recognition method called IRDO that fuses Dual Tree Complex Wavelet Transform (DTCWT) and Overlapping Local Binary Pattern (OLBP) features. DTCWT is used to extract micro-texture features from the iris, while OLBP enhances the extraction of edge features. Fusing these two methods results in improved matching performance and classification accuracy compared to state-of-the-the-art techniques. The proposed IRDO method achieves higher iris recognition rates as measured by Total Success Rate and Equal Error Rate.
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes a proposed algorithm called Fusion of Hybrid Domain features for Iris Recognition (FHDIR).
The algorithm pre-processes iris images by resizing, binarization, cropping and splitting them. It then applies Fast Fourier Transform (FFT) to the left half of the iris image to extract features and applies Principal Component Analysis (PCA) to the right half to extract features. These feature sets are then fused using arithmetic addition to generate a final feature vector. Test iris features are compared to the database using Euclidean Distance for identification.
The proposed algorithm is evaluated on the CASIA iris database and is found to have better performance than existing algorithms in terms of false rejection rate, false acceptance rate, and true
This document summarizes various methods for iris feature extraction that are used in iris recognition systems. It discusses four main categories of iris feature extraction techniques: texture-based, phase-based, zero-crossing based, and intensity variation based. It provides details on several popular methods, including Gabor filtering, Log-Gabor filtering, wavelet transforms, and Haar encoding. It also reviews several studies that have compared the performance of different iris feature extraction algorithms and their accuracy rates.
This document presents a new iris segmentation method for iris recognition systems. The proposed method uses Canny edge detection and Hough transform to locate the iris boundary after finding the pupil boundary using image gray levels. Experiments on the CASIA iris image database of 756 images show the method can accurately detect the iris boundary in 99.2% of images. This is an improvement over other existing segmentation techniques. The key steps of the proposed method are preprocessing, segmentation using Canny edge detection and Hough transform, normalization using the rubber sheet model, feature encoding with Gabor wavelets, and matching with Hamming distance.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
This document presents a study on iris segmentation analysis using the integro-differential operator and Hough transform techniques in biometric systems. The study experiments with two iris segmentation techniques: the integro-differential operator and Hough transform. The Hough transform technique segmented iris images more successfully than the integro-differential operator, achieving a segmentation accuracy of 80.88% compared to 22.06% for the integro-differential operator. The Hough transform also had lower false rejection and recognition error rates. However, it has higher computational complexity than the integro-differential operator. The document concludes that the Hough transform technique resulted in better overall performance than the integro-differential operator for iris segmentation
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
This document discusses using watermarking and visual cryptography for secure identity-based authentication. It proposes embedding an iris image using a watermarking algorithm and visual cryptography techniques for protection. Feature extraction and binomial distribution analysis are used to evaluate false acceptance and rejection rates to validate two algorithms, MASEK and Ma, for iris recognition on noisy images. The document also discusses discrete cosine transform (DCT) and discrete wavelet transform (DWT) techniques for image processing and compression in iris recognition systems.
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
This document proposes a new iris recognition method called IRDO that fuses Dual Tree Complex Wavelet Transform (DTCWT) and Overlapping Local Binary Pattern (OLBP) features. DTCWT is used to extract micro-texture features from the iris, while OLBP enhances the extraction of edge features. Fusing these two methods results in improved matching performance and classification accuracy compared to state-of-the-the-art techniques. The proposed IRDO method achieves higher iris recognition rates as measured by Total Success Rate and Equal Error Rate.
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes a proposed algorithm called Fusion of Hybrid Domain features for Iris Recognition (FHDIR).
The algorithm pre-processes iris images by resizing, binarization, cropping and splitting them. It then applies Fast Fourier Transform (FFT) to the left half of the iris image to extract features and applies Principal Component Analysis (PCA) to the right half to extract features. These feature sets are then fused using arithmetic addition to generate a final feature vector. Test iris features are compared to the database using Euclidean Distance for identification.
The proposed algorithm is evaluated on the CASIA iris database and is found to have better performance than existing algorithms in terms of false rejection rate, false acceptance rate, and true
This document summarizes various methods for iris feature extraction that are used in iris recognition systems. It discusses four main categories of iris feature extraction techniques: texture-based, phase-based, zero-crossing based, and intensity variation based. It provides details on several popular methods, including Gabor filtering, Log-Gabor filtering, wavelet transforms, and Haar encoding. It also reviews several studies that have compared the performance of different iris feature extraction algorithms and their accuracy rates.
This document presents a new iris segmentation method for iris recognition systems. The proposed method uses Canny edge detection and Hough transform to locate the iris boundary after finding the pupil boundary using image gray levels. Experiments on the CASIA iris image database of 756 images show the method can accurately detect the iris boundary in 99.2% of images. This is an improvement over other existing segmentation techniques. The key steps of the proposed method are preprocessing, segmentation using Canny edge detection and Hough transform, normalization using the rubber sheet model, feature encoding with Gabor wavelets, and matching with Hamming distance.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
This document presents a study on iris segmentation analysis using the integro-differential operator and Hough transform techniques in biometric systems. The study experiments with two iris segmentation techniques: the integro-differential operator and Hough transform. The Hough transform technique segmented iris images more successfully than the integro-differential operator, achieving a segmentation accuracy of 80.88% compared to 22.06% for the integro-differential operator. The Hough transform also had lower false rejection and recognition error rates. However, it has higher computational complexity than the integro-differential operator. The document concludes that the Hough transform technique resulted in better overall performance than the integro-differential operator for iris segmentation
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
This document discusses using watermarking and visual cryptography for secure identity-based authentication. It proposes embedding an iris image using a watermarking algorithm and visual cryptography techniques for protection. Feature extraction and binomial distribution analysis are used to evaluate false acceptance and rejection rates to validate two algorithms, MASEK and Ma, for iris recognition on noisy images. The document also discusses discrete cosine transform (DCT) and discrete wavelet transform (DWT) techniques for image processing and compression in iris recognition systems.
Biometric Iris Recognition Based on Hybrid Techniqueijsc
This document presents a study on implementing an iris recognition system using a hybrid technique. The system utilizes several image processing and machine learning techniques. It begins with preprocessing the iris image, including capturing, resizing and converting to grayscale. Histogram equalization is then used for enhancement. Two-dimensional discrete wavelet transform (2D DWT) is applied for feature extraction. Various edge detection algorithms including Canny, Prewitt, Roberts and Sobel are used to detect iris boundaries. The features are then stored in a vector for classification. The system is tested on different iris images and analysis shows 2D DWT and Canny edge detection provide adequate results for feature extraction and iris recognition.
This document describes an iris recognition system implemented using National Instruments LabVIEW for secure voting. The system has four main stages: 1) image acquisition using an infrared camera, 2) iris localization by detecting circles in the iris image, 3) pattern matching to extract an iris code, and 4) authentication by matching the iris code to a database. The database stores voter information and iris codes in an encrypted format. On voting day, the system matches the voter's ID and captured iris image to the database to verify their identity before allowing them to vote. The system aims to provide more secure identity verification than traditional password or ID systems.
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
The document summarizes iris recognition as a biometric technique for human identification. It discusses how iris recognition works in four main steps: iris image acquisition, preprocessing the image to locate and normalize the iris, extracting features from the iris pattern, and matching the features to stored iris patterns. The iris is suitable for recognition due its complex random patterns that are stable over a person's lifetime and differ even between identical twins. Iris recognition provides highly accurate identification with a very low false match rate of 1 in 1.2 million.
This document presents a student's proposal for a human retina identification system using biometric technology. The proposal discusses how the unique patterns of blood vessels in the retina can be used to identify individuals with high accuracy. The proposed system will involve segmenting retinal images to extract features like branch points and endpoints, and then storing these features as templates to compare new images against for matching. The student believes this technology provides strong security but also has disadvantages like intrusiveness and high costs that need to be addressed.
Software Implementation of Iris Recognition System using MATLABijtsrd
The software implementation of iris recognition system introduces in this paper. This system intends to apply for high security required areas. The demand on security is increasing greatly in these years and biometric recognition gradually becomes a hot field of research. Iris recognition is a branch of biometric recognition method. In thesis, Iris recognition system consists of localization of the iris region and generation of data set of iris images followed by iris pattern recognition. In thesis, a fast algorithm is proposed for the localization of the inner and outer boundaries of the iris region. Located iris is extracted from an eye image, and, after normalization and enhancement, it is represented by a data set. Using this data set a Neural Network NN is used for the classification of iris patterns. The adaptive learning strategy is applied for training of the NN. The implementation of the system is developed with MATLAB. The results of simulations illustrate the effectiveness of the neural system in personal identification. Finally, the accuracy of iris recognition system is tested and evaluated with different iris images. Mo Mo Myint Wai | Nyan Phyo Aung | Lwin Lwin Htay "Software Implementation of Iris Recognition System using MATLAB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25258.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25258/software-implementation-of-iris-recognition-system-using-matlab/mo-mo-myint-wai
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
The document proposes a unified framework for iris recognition that addresses challenges in unconstrained acquisition, robust matching, and privacy. It uses random projections and sparse representations to select good quality iris images, recognize iris patterns in a single step, and introduce cancelable templates for enhanced privacy without compromising security or recognition performance. Experimental results on public datasets demonstrate benefits of the proposed approach for robust and accurate iris recognition.
A Novel Approach for Detecting the IRIS CryptsIJERDJOURNAL
ABSTRACT:- The iris is a stable biometric trait that has been widely used for human recognition in various applications. However, deployment of iris recognition in forensic applications has not been reported. A primary reason is the lack of human friendly techniques for iris comparison. To further promote the use of iris recognition in forensics, the similarity between irises should be made visualizable and interpretable. Recently, a human-in-the-loop iris recognition system was developed, based on detecting and matching iris crypts. Building on this framework, we propose a new approach for detecting and matching iris crypts automatically. Our detection method is able to capture iris crypts of various sizes. Our matching scheme is designed to handle potential topological changes in the detection of the same crypt in different images. Our approach outperforms the known visible-feature-based iris recognition method on three different data sets. After iris Crypts detection, Iris images were taken before and after the treatment of eye disease and the output shows the mathematical difference obtained from treatment. Gabor filter is used to extract the features. This iris recognition was effectively withstood with most ophthalmic disease like corneal oedema, iridotomies and conjunctivitis. This proposed iris recognition should be used to solve the potential problems that could cause in key biometric technology and medical diagnosis
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
The document compares multiple wavelet algorithms for iris recognition, including complex wavelet transform, Gabor wavelets, and discrete wavelet transform. It first provides background on iris recognition and wavelets. It then describes typical iris recognition systems which involve image acquisition, segmentation, normalization, feature extraction, and matching. Next, it discusses complex wavelets, Gabor wavelets, and discrete wavelet transform for feature extraction in iris recognition. Complex wavelets extract phase and amplitude information to accurately describe oscillating functions. Gabor filters model human visual processing and generate phase-coded bit strings for matching. Discrete wavelet transform uses dyadic wavelet scales and positions for efficient analysis. The paper compares these wavelet algorithms for iris image enhancement,
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
Biometrics has become important in security applications. In comparison with many other
biometric features, iris recognition has very high recognition accuracy because it depends on
iris which is located in a place that still stable throughout human life and the probability to find
two identical iris's is close to zero. The identification system consists of several stages including
segmentation stage which is the most serious and critical one. The current segmentation
methods still have limitation in localizing the iris due to circular shape consideration of the
pupil. In this research, Daugman method is done to investigate the segmentation techniques.
Eyelid detection is another step that has been included in this study as a part of segmentation
stage to localize the iris accurately and remove unwanted area that might be included. The
obtained iris region is encoded using haar wavelets to construct the iris code, which contains
the most discriminating feature in the iris pattern. Hamming distance is used for comparison of
iris templates in the recognition stage. The dataset which is used for the study is UBIRIS
database. A comparative study of different edge detector operator is performed. It is observed
that canny operator is best suited to extract most of the edges to generate the iris code for
comparison. Recognition rate of 89% and rejection rate of 95% is achieved.
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
The biometrics are used to authenticate a person effectively compared to conventional methods of identification. In this paper we propose the biometric algorithm based on fusion of Discrete Wavelet Transform(DWT) frequency components of enhanced iris image.The iris template is extracted from an eye image by considering horizontal pixels in an iris part.The iris template contrast is enhanced using Adaptive Histogram Equalization (AHE) and Histogram Equalization (HE).The DWT is applied on enhanced iris template.The features are formed by straight line fusion of low and high frequency coefficients of DWT.The Euclidian distance is used to compare final test features with database features. It is observed that the performance parameters are better in the case of proposed algorithm compared to existing algorithms.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
Retinal recognition uses the unique pattern of blood vessels in the retina to identify individuals. It is considered the most reliable biometric since the retina develops randomly and is difficult to alter. However, retinal scanners are invasive, expensive, and not widely accepted. They work by capturing an image of the retina using infrared light and extracting over 400 data points to create a template for identification. Factors like eye movement, distance from the lens, or a dirty lens can cause errors in scanning.
This document discusses various soft computing techniques for iris recognition, specifically focusing on two neural network approaches: Competitive neural network Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM). It provides an overview of iris recognition as a biometric method, summarizes preprocessing steps like localization, segmentation, and normalization of iris images. It also describes feature extraction and matching steps. Finally, it defines artificial neural networks and discusses how LVQ and ARAM can be used for pattern matching in iris recognition applications.
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
Face recognition is still an open problem. Many 2D
face recognition approaches came into light to achieve high
recognition rate. But these approaches are still challenged by
the changes in illuminations, expressions, pose, noise, etc. A
3D face recognition technique is proposed to overcome such
challenges and to enhance robustness to expression variations.
Here, we compare the person at different age groups with
higher recognition rate in comparison to 2D face recognition
techniques. We propose a two stage procedure of 3D face
recognition based on FLD (Fisher Linear Discriminant), SURF
operator and depth-image. First, FLD is used on depth-image
to perform recognition and then the SURF features of 2D
gray images to carry out the refined recognition. Finally, our
proposed work will increase the robustness in expression
variations.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
This document studies the strength characteristics of concrete when sand is partially replaced by granulated blast furnace slag (GBFS). Tests were conducted by replacing sand at 10%, 20%, and 30% with GBFS at various water-cement ratios of 0.4, 0.5, 0.6, and 0.7. The compressive strength was tested at curing ages of 3, 7, 14, 28, 56, and 90 days. The results show that replacing sand with 10-20% GBFS increased the compressive strength at lower water-cement ratios of 0.4-0.5. However, replacing sand with 30% GBFS decreased the compressive strength.
Impact of Family Support Group on Co-Dependent BehaviourIOSR Journals
The present study aimed to investigate the impact of family support group on co-dependent
behaviour of spouse of drug addicts. It was hypothesized there would be significant difference between new and
old members of family support group on co-dependent behaviour. It was also hypothesized that new members
will score higher on denial, self- esteem, control and compliance as compare to old members. A sample (N=60)
female spouse acquired through addiction treatment Centre’s of Lahore city. The data was collected through
purposive sampling technique. Am I Co-dependent Scale was administered to measure co-dependant behaviour.
Independent sample t- test was used to find out the difference of co-dependent behaviour. Results shows that
there is significant difference between new members and old family support members on variables. Findings can
be implemented to enhance the benefits of self-help groups or group therapies supported by drug treatment
centres to family members
Biometric Iris Recognition Based on Hybrid Techniqueijsc
This document presents a study on implementing an iris recognition system using a hybrid technique. The system utilizes several image processing and machine learning techniques. It begins with preprocessing the iris image, including capturing, resizing and converting to grayscale. Histogram equalization is then used for enhancement. Two-dimensional discrete wavelet transform (2D DWT) is applied for feature extraction. Various edge detection algorithms including Canny, Prewitt, Roberts and Sobel are used to detect iris boundaries. The features are then stored in a vector for classification. The system is tested on different iris images and analysis shows 2D DWT and Canny edge detection provide adequate results for feature extraction and iris recognition.
This document describes an iris recognition system implemented using National Instruments LabVIEW for secure voting. The system has four main stages: 1) image acquisition using an infrared camera, 2) iris localization by detecting circles in the iris image, 3) pattern matching to extract an iris code, and 4) authentication by matching the iris code to a database. The database stores voter information and iris codes in an encrypted format. On voting day, the system matches the voter's ID and captured iris image to the database to verify their identity before allowing them to vote. The system aims to provide more secure identity verification than traditional password or ID systems.
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
The document summarizes iris recognition as a biometric technique for human identification. It discusses how iris recognition works in four main steps: iris image acquisition, preprocessing the image to locate and normalize the iris, extracting features from the iris pattern, and matching the features to stored iris patterns. The iris is suitable for recognition due its complex random patterns that are stable over a person's lifetime and differ even between identical twins. Iris recognition provides highly accurate identification with a very low false match rate of 1 in 1.2 million.
This document presents a student's proposal for a human retina identification system using biometric technology. The proposal discusses how the unique patterns of blood vessels in the retina can be used to identify individuals with high accuracy. The proposed system will involve segmenting retinal images to extract features like branch points and endpoints, and then storing these features as templates to compare new images against for matching. The student believes this technology provides strong security but also has disadvantages like intrusiveness and high costs that need to be addressed.
Software Implementation of Iris Recognition System using MATLABijtsrd
The software implementation of iris recognition system introduces in this paper. This system intends to apply for high security required areas. The demand on security is increasing greatly in these years and biometric recognition gradually becomes a hot field of research. Iris recognition is a branch of biometric recognition method. In thesis, Iris recognition system consists of localization of the iris region and generation of data set of iris images followed by iris pattern recognition. In thesis, a fast algorithm is proposed for the localization of the inner and outer boundaries of the iris region. Located iris is extracted from an eye image, and, after normalization and enhancement, it is represented by a data set. Using this data set a Neural Network NN is used for the classification of iris patterns. The adaptive learning strategy is applied for training of the NN. The implementation of the system is developed with MATLAB. The results of simulations illustrate the effectiveness of the neural system in personal identification. Finally, the accuracy of iris recognition system is tested and evaluated with different iris images. Mo Mo Myint Wai | Nyan Phyo Aung | Lwin Lwin Htay "Software Implementation of Iris Recognition System using MATLAB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25258.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25258/software-implementation-of-iris-recognition-system-using-matlab/mo-mo-myint-wai
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
The document proposes a unified framework for iris recognition that addresses challenges in unconstrained acquisition, robust matching, and privacy. It uses random projections and sparse representations to select good quality iris images, recognize iris patterns in a single step, and introduce cancelable templates for enhanced privacy without compromising security or recognition performance. Experimental results on public datasets demonstrate benefits of the proposed approach for robust and accurate iris recognition.
A Novel Approach for Detecting the IRIS CryptsIJERDJOURNAL
ABSTRACT:- The iris is a stable biometric trait that has been widely used for human recognition in various applications. However, deployment of iris recognition in forensic applications has not been reported. A primary reason is the lack of human friendly techniques for iris comparison. To further promote the use of iris recognition in forensics, the similarity between irises should be made visualizable and interpretable. Recently, a human-in-the-loop iris recognition system was developed, based on detecting and matching iris crypts. Building on this framework, we propose a new approach for detecting and matching iris crypts automatically. Our detection method is able to capture iris crypts of various sizes. Our matching scheme is designed to handle potential topological changes in the detection of the same crypt in different images. Our approach outperforms the known visible-feature-based iris recognition method on three different data sets. After iris Crypts detection, Iris images were taken before and after the treatment of eye disease and the output shows the mathematical difference obtained from treatment. Gabor filter is used to extract the features. This iris recognition was effectively withstood with most ophthalmic disease like corneal oedema, iridotomies and conjunctivitis. This proposed iris recognition should be used to solve the potential problems that could cause in key biometric technology and medical diagnosis
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
The document compares multiple wavelet algorithms for iris recognition, including complex wavelet transform, Gabor wavelets, and discrete wavelet transform. It first provides background on iris recognition and wavelets. It then describes typical iris recognition systems which involve image acquisition, segmentation, normalization, feature extraction, and matching. Next, it discusses complex wavelets, Gabor wavelets, and discrete wavelet transform for feature extraction in iris recognition. Complex wavelets extract phase and amplitude information to accurately describe oscillating functions. Gabor filters model human visual processing and generate phase-coded bit strings for matching. Discrete wavelet transform uses dyadic wavelet scales and positions for efficient analysis. The paper compares these wavelet algorithms for iris image enhancement,
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
Biometrics has become important in security applications. In comparison with many other
biometric features, iris recognition has very high recognition accuracy because it depends on
iris which is located in a place that still stable throughout human life and the probability to find
two identical iris's is close to zero. The identification system consists of several stages including
segmentation stage which is the most serious and critical one. The current segmentation
methods still have limitation in localizing the iris due to circular shape consideration of the
pupil. In this research, Daugman method is done to investigate the segmentation techniques.
Eyelid detection is another step that has been included in this study as a part of segmentation
stage to localize the iris accurately and remove unwanted area that might be included. The
obtained iris region is encoded using haar wavelets to construct the iris code, which contains
the most discriminating feature in the iris pattern. Hamming distance is used for comparison of
iris templates in the recognition stage. The dataset which is used for the study is UBIRIS
database. A comparative study of different edge detector operator is performed. It is observed
that canny operator is best suited to extract most of the edges to generate the iris code for
comparison. Recognition rate of 89% and rejection rate of 95% is achieved.
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
The biometrics are used to authenticate a person effectively compared to conventional methods of identification. In this paper we propose the biometric algorithm based on fusion of Discrete Wavelet Transform(DWT) frequency components of enhanced iris image.The iris template is extracted from an eye image by considering horizontal pixels in an iris part.The iris template contrast is enhanced using Adaptive Histogram Equalization (AHE) and Histogram Equalization (HE).The DWT is applied on enhanced iris template.The features are formed by straight line fusion of low and high frequency coefficients of DWT.The Euclidian distance is used to compare final test features with database features. It is observed that the performance parameters are better in the case of proposed algorithm compared to existing algorithms.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
Retinal recognition uses the unique pattern of blood vessels in the retina to identify individuals. It is considered the most reliable biometric since the retina develops randomly and is difficult to alter. However, retinal scanners are invasive, expensive, and not widely accepted. They work by capturing an image of the retina using infrared light and extracting over 400 data points to create a template for identification. Factors like eye movement, distance from the lens, or a dirty lens can cause errors in scanning.
This document discusses various soft computing techniques for iris recognition, specifically focusing on two neural network approaches: Competitive neural network Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM). It provides an overview of iris recognition as a biometric method, summarizes preprocessing steps like localization, segmentation, and normalization of iris images. It also describes feature extraction and matching steps. Finally, it defines artificial neural networks and discusses how LVQ and ARAM can be used for pattern matching in iris recognition applications.
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
Face recognition is still an open problem. Many 2D
face recognition approaches came into light to achieve high
recognition rate. But these approaches are still challenged by
the changes in illuminations, expressions, pose, noise, etc. A
3D face recognition technique is proposed to overcome such
challenges and to enhance robustness to expression variations.
Here, we compare the person at different age groups with
higher recognition rate in comparison to 2D face recognition
techniques. We propose a two stage procedure of 3D face
recognition based on FLD (Fisher Linear Discriminant), SURF
operator and depth-image. First, FLD is used on depth-image
to perform recognition and then the SURF features of 2D
gray images to carry out the refined recognition. Finally, our
proposed work will increase the robustness in expression
variations.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
This document studies the strength characteristics of concrete when sand is partially replaced by granulated blast furnace slag (GBFS). Tests were conducted by replacing sand at 10%, 20%, and 30% with GBFS at various water-cement ratios of 0.4, 0.5, 0.6, and 0.7. The compressive strength was tested at curing ages of 3, 7, 14, 28, 56, and 90 days. The results show that replacing sand with 10-20% GBFS increased the compressive strength at lower water-cement ratios of 0.4-0.5. However, replacing sand with 30% GBFS decreased the compressive strength.
Impact of Family Support Group on Co-Dependent BehaviourIOSR Journals
The present study aimed to investigate the impact of family support group on co-dependent
behaviour of spouse of drug addicts. It was hypothesized there would be significant difference between new and
old members of family support group on co-dependent behaviour. It was also hypothesized that new members
will score higher on denial, self- esteem, control and compliance as compare to old members. A sample (N=60)
female spouse acquired through addiction treatment Centre’s of Lahore city. The data was collected through
purposive sampling technique. Am I Co-dependent Scale was administered to measure co-dependant behaviour.
Independent sample t- test was used to find out the difference of co-dependent behaviour. Results shows that
there is significant difference between new members and old family support members on variables. Findings can
be implemented to enhance the benefits of self-help groups or group therapies supported by drug treatment
centres to family members
This document describes the design and simulation of an AlGaN/GaN high electron mobility transistor (HEMT) on a silicon carbide substrate for low noise applications. Key findings from the simulation of the 0.25 um gate length device include:
1) The device exhibited a minimum noise figure of 0.41 dB and maximum associated gain of 19.95 dB at 10 GHz.
2) It also demonstrated a minimum noise figure of 0.71 dB and maximum associated gain of 17.4 dB at 18 GHz.
3) The device showed a peak extrinsic transconductance of 215 mS/mm and a high current drive capability of 1400 mA/mm, indicating its potential for
This document simulates a cognitive radio system using MATLAB. It describes how cognitive radios can detect unused spectrum bands (spectrum holes) to allow secondary users to transmit without interfering with primary users. The simulation initializes 6 carrier frequency bands, modulates user data, adds the modulated signals, estimates the power spectral density, allocates unused slots to new secondary users, and empties slots when requested. The results show the cognitive radio detecting spectrum holes and assigning secondary users to the vacant bands, optimizing spectrum usage until all bands are in use.
This document proposes a new approach to compressed image steganography using wavelet transform. The method embeds a compressed payload image within a cover image using discrete wavelet transform (DWT) for image compression and discrete Fourier transform (DFT) to select pixel locations in the cover image. Five test cases of the approach are described and evaluated. In the first case, DWT is applied to the payload image to get 32x32 approximate coefficients, DFT is applied to the cover image to select pixel locations below a threshold, and the coefficients replace the selected pixel values to create the stego-image. The other cases vary the DWT level, threshold value, and image sizes. Results show the stego-image quality
This document discusses using Gamma tone Frequency Cepstral Coefficients (GFCC) and K-means clustering to identify singers based on their voice. It begins by explaining that MFCC is not accurate in noisy environments, while GFCC performs well in both clean and noisy audio. The process involves extracting GFCC features from the audio, using K-means clustering to group similar voices into clusters, and dynamic time warping for authentication. Feature extraction with GFCC involves preprocessing, framing, windowing, computing the discrete Fourier transform, applying a gamma tone filter bank, logarithmic compression, and discrete cosine transformation to generate feature vectors. K-means clustering is then used to group the feature vectors from similar voices into clusters to identify
This document summarizes research using artificial neural networks to forecast the output power performance of a solar thermal lag Stirling engine. Input parameters like angular velocity, temperature, and tank volumes were used to train neural networks. The best network structure had inputs, hidden, and output layers. It was trained on 572 data points and showed high accuracy in predicting engine performance based on validation metrics. Graphs showed the neural network could successfully predict variables like gas temperature, tank volume, and output power under different operating conditions. The research demonstrated artificial neural networks are a useful tool for simulating Stirling engine performance without complex modeling equations.
Periodic Table Gets Crowded In Year 2011.IOSR Journals
Abstract: Year 2011, has been specially important for teachers and students of chemistry, as after a gap of about 14 years at least five new elements were named and included in the periodic table. All these elements are synthetic and radioactive and some were actually made in 1999, but got their name and status by IUPAC, in July 2011. The total number of elements now in periodic table is 112, and scientists are trying their best to prepare elements with atomic numbers 118, 119 and 120 as well.
This document describes an experimental setup for a solar vapor absorption cooling system using a flat plate collector. The system consists of two main circuits: 1) A solar water heating system circuit that uses a flat plate collector to heat water which is then used in the generator. 2) A vapor absorption refrigeration circuit consisting of a generator, absorber, evaporator, condenser and solution heat exchanger, using an ammonia-water working fluid. Experimental results showed a temperature drop of 7-8°C in the evaporator and a coefficient of performance of 0.75-0.79 for the solar powered vapor absorption system, lower than the maximum theoretical COP of 3.11 but demonstrating the potential to produce refrigeration from solar energy
This document discusses soil-structure interaction calculations for rigid hydraulic structures using the finite element method (FEM). It examines two common computational models: the Winkler and Pasternak models. The Winkler model represents soil behavior with independent vertical springs, while the Pasternak model adds a shear layer between the soil and structure. Equations are provided for deriving the stiffness matrix of a beam foundation considering each model. The influence of these models on displacements and developed stresses of rigid structures is evaluated through FEM calculations.
This document analyzes heat transfer in internal combustion engine cylinders made from different materials through modeling and simulation. It describes designing a cylinder with dimensions of 0.25m length, 0.25m width and 0.2m height. Materials analyzed include gray cast iron, aluminum, stainless steel, and nickel. Transient thermal analysis in ANSYS is conducted with inside cylinder temperatures of 600°C, 1000°C and 2000°C and outside at 22°C. Graphs show total and directional heat flux over time. Gray cast iron has the lowest heat transfer rate due to its low thermal conductivity but can withstand high temperatures. Aluminum and other lightweight materials are alternatives for weight optimization, though cast iron remains common due to
This document summarizes a study on liquefaction analysis of the Kakinada region in India using geotechnical borehole data. The study aims to determine the factor of safety against liquefaction for the region using standard penetration test (SPT) data. Deterministic liquefaction analysis is performed using SPT-based methods to calculate the factor of safety, which is the ratio of cyclic resistance ratio to cyclic stress ratio. Reliability analysis is also conducted considering uncertainties in models and parameters. Key findings from selected boreholes include the soil profile period, peak ground acceleration, and ground response spectrum at the surface.
This document describes linking design and manufacturing on a PLM (Product Lifecycle Management) platform. Specifically, an automobile fuel tank cap was modeled in Creo Parametric. An injection mold was then developed for the part. The complete design data was integrated into Windchill PLM software for data and process management. The fuel tank cap design, mold design, and NC programs for manufacturing the mold were generated. The design data was then imported into Windchill where it could be accessed and reviewed by authorized users, including providing customer feedback. Integrating the design and manufacturing data onto a PLM platform allows for efficient management of the product data and process throughout the lifecycle.
The researchers used strain gauges to experimentally determine the drag coefficient of a scale model Toyota car. Tests were conducted in a subsonic wind tunnel from 21.17 to 33 m/s. Drag coefficients were obtained ranging from 1.10 to 0.53, decreasing about 50% over the speed range tested. Flow visualization showed recirculating vortices at the rear that influence drag. Measurement errors for velocity, drag force, and drag coefficient decreased with increasing air speed.
A three-step DMAIC process was implemented using Six Sigma methodology to reduce DM make up water consumption in a thermal power plant. The Define phase involved mapping the cycle make up water process and identifying critical success factors. In the Measure phase, four months of water consumption data was analyzed. The Analyze phase used tools like run charts, process capability analysis, fishbone diagrams, and pareto charts to identify root causes like blow down, valve passings, and leaks. The Improve and Control phases established actions to address the root causes, including training, process adjustments, and regular inspections. This led to an improvement in the process capability and a reduction in the DM make up water consumption.
This document summarizes research on an innovative no-fines concrete pavement model. It discusses how no-fines concrete has properties that make it suitable for use as rigid pavement on low-traffic volume roads. The document outlines a trial mix design for M20 grade no-fines concrete and describes achieving a density of 21 kN/m3 and flexural strength of 35 kg/cm2. It then proposes a pavement design that allows for storing water in the concrete to reduce runoff and recharge groundwater, with a perforated pipe to drain stored water.
Comparative Study on Selected Physical Fitness Components among the Physical ...IOSR Journals
This document summarizes a study that compared selected physical fitness components among physical education students from three universities in West Bengal, India. The study found:
1) There was a significant difference in agility and cardiovascular endurance between the universities, with students from Visva Bharati University scoring significantly better in agility than the other two universities.
2) While there were mean differences in explosive power between the groups, the differences were not statistically significant, indicating no significant differences between universities.
3) In conclusion, physical education students significantly differed in agility and cardiovascular endurance based on university, but did not significantly differ in explosive power.
The document analyzes the thermodynamic performance of a lithium bromide (LiBr) and water based vapor absorption air conditioning system that utilizes waste exhaust heat from a diesel engine. The system consists of a generator, condenser, evaporator, absorber, and solution heat exchanger. The effects of varying the temperatures of these components on the system's coefficient of performance (COP) and exergy efficiency are examined. The results show that COP increases with higher evaporator temperature but decreases with higher condenser and absorber temperatures. Exergy analysis indicates the condenser and absorber have higher exergy losses than the generator and evaporator. A small-scale LiBr-water system can feasibly operate using exhaust heat from
This document summarizes an experimental study that investigated heat transfer enhancement in rectangular fin arrays with circular perforations. The researchers measured heat transfer and other parameters for solid and perforated fins under varying flow conditions. For the perforated fins, they found enhancement in heat transfer compared to solid fins. Specifically, they tested parallel and cross fins made of aluminum with dimensions of 100mm by 60mm by 5mm thickness. Testing was done with air flow velocities from 3000-6000 Reynolds number. Temperature and other measurements were taken over time as heat was applied. Calculations were done to determine heat transfer coefficients, finding values of 233.3 W/m2-K for parallel fins and 242.58 W/m2-K for cross fins
This document proposes using a Markov chain model and bipartite graphing to efficiently schedule spectrum in cognitive radio networks. It models the cognitive radio network as a k-connected bipartite graph and uses a Markov chain to represent the state transitions of channels between idle and busy. It then applies the Banker's algorithm to the modeled cognitive radio network to allocate spectrum to users while avoiding deadlock. The proposed approach indicates it could improve spectrum scheduling and allocation performance in cognitive radio networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed systems, make it a good candidate to replace most of thesecurity systems around. By making use of the distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person. Identification of this person is possible by applying appropriate matching algorithm.In this paper, Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical analysis of different feature detection operators is performed, features extracted is encoded using Haar wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and False Reject Rate is 10%.
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
Iris is a physiological biometric trait, which is unique among all biometric traits to recognize person
effectively. In this paper we propose Multi-scale Independent Component Analysis (ICA) based Iris
Recognition using Binarized Statistical Image Features (BSIF) and Histogram of Gradient orientation
(HOG). The Left and Right portion is extracted from eye images of CASIA V 1.0 database leaving top and
bottom portion of iris. The multi-scale ICA filter sizes of 5X5, 7X7 and 17X17 are used to correlate with
iris template to obtain BSIF. The HOGs are applied on BSIFs to extract initial features. The final feature is
obtained by fusing three HOGs. The Euclidian Distance is used to compare the final feature of database
image with test image final features to compute performance parameters. It is observed that the
performance of the proposed method is better compared to existing methods.
A survey paper on various biometric security system methodsIRJET Journal
This document summarizes various biometric security systems for identification. It discusses fingerprint recognition, iris recognition, and face recognition methods. It provides an overview of different approaches that have been proposed, including using watermarking, edge detection techniques, adaptive boosting algorithms, and fuzzy logic. The document also analyzes the drawbacks of previous methods and proposes using a multimodal biometric system that fuses fingerprints, iris, and face for more secure identification. Overall, the document surveys different biometric identification techniques and highlights that a multimodal approach can help overcome limitations of individual methods.
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
This document summarizes several techniques for iris recognition. It begins with an abstract describing iris recognition and its accuracy compared to other biometric traits. It then reviews four iris recognition techniques in the literature:
1. A technique using moment invariants and Euclidean or Mahalanobis distance classifiers that achieved 100% recognition rates.
2. A segmentation algorithm using Daugman's integro differential operator that improved discrimination capabilities over other methods.
3. A pupil localization technique using negative thresholds and neighbors, and iris boundary detection using contrast enhancement and thresholding, achieving accurate segmentation.
4. A technique using Gaussian mixture models, Gabor filter banks, and simulated annealing to generate iris masks and increase recognition rates
This document describes a technique for human iris recognition for biometric identification. It involves 6 major steps: image acquisition, localization, isolation, normalization, feature extraction, and matching. The iris is localized by detecting the pupil and outer iris boundaries using techniques like Canny edge detection and Hough transforms. The iris region is then isolated using masking. It is normalized and represented as a fixed-sized block. Features are extracted using techniques like Gabor filters and Haar wavelets to generate biometric templates. Templates are matched using Hamming distance to identify individuals in applications like border control, computer login, and financial transactions. The iris has properties that make it suitable and accurate for identification compared to other biometrics.
A Survey : Iris Based Recognition SystemsEditor IJMTER
The security is one of the important aspect of today's life. Iris recognization is one of the leading
research of security which is used to identify the individual person. Usually iris based biometric is more better
than other biometric in terms of accuracy, fast, stability, uniqueness. The iris recognition system works by
capturing and storing biometric information and then compare scanned copy of iris biometric with the stored iris
images in the database. There are several Iris Based Recognition Systems are developed so far. In this paper we
presented several iris techniques and create a base for our future roadmap.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Biometric Iris Recognition Based on Hybrid Technique ijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
This document is a seminar report on an iris recognition biometric security system. It provides an abstract that describes iris recognition technology and how it is used for biometric identification. It then discusses the key components of an iris recognition system, including image acquisition, preprocessing, image analysis, and image recognition. It also compares iris recognition to other biometric technologies and discusses applications of iris recognition systems.
Iris recognition based on 2D Gabor filterIJECEIAES
Iris recognition is a type of biometrics technology that is based on physiological features of the human body. The objective of this research is to recognize and identify iris among many irises that are stored in a visual database. This study employed a left and right iris biometric framework for inclusion decision processing by combining image processing and artificial bee colony. The proposed approach was evaluated on a visual database of 280 colored iris pictures. The database was then divided into 28 clusters. Images were preprocessed and texture features were extracted based Gabor filters to capture both local and global details within an iris. The technique begins by comparing the attributes of the online-obtained iris picture with those of the visual database. This technique either generates a reject or approve message. The consequences of the intended work reflect the output’s accuracy and integrity. This is due to the careful selection of attributes, besides the deployment of an artificial bee colony and data clustering, which decreased complexity and eventually increased identification rate to 100%. We demonstrate that the proposed method achieves state-of-the-art performance and that our recommended procedures outperform existing iris recognition systems.
Enhance iris segmentation method for person recognition based on image proces...TELKOMNIKA JOURNAL
The limitation of traditional iris recognition systems to process iris images captured in unconstraint environments is a breakthrough. Automatic iris recognition has to face unpredictable variations of iris images in real-world applications. For example, the most challenging problems are related to the severe noise effects that are inherent to these unconstrained iris recognition systems, varying illumination, obstruction of the upper or lower eyelids, the eyelash overlap with the iris region, specular highlights on pupils which come from a spot of light during captured the image, and decentralization of iris image which caused by the person’s gaze. Iris segmentation is one of the most important processes in iris recognition. Due to the different types of noise in the eye image, the segmentation result may be erroneous. To solve this problem, this paper develops an efficient iris segmentation algorithm using image processing techniques. Firstly, the outer boundary segmentation of the iris problem is solved. Then the pupil boundary is detected. Testes are done on the Chinese Academy of Sciences’ Institute of Automation (CASIA) database. Experimental results indicate that the proposed algorithm is efficient and effective in terms of iris segmentation and reduction of time processing. The accuracy results for both datasets (CASIA-V1 and V4) are 100% and 99.16 respectively.
The document summarizes recent progress in iris recognition technology. It discusses iris image acquisition, preprocessing techniques like localization and normalization, and pattern recognition methods. It also outlines applications of iris recognition in areas like border control, criminal investigations, and secure banking. Emerging areas discussed include long-range iris recognition, multi-biometric systems, and generating synthetic iris images for database construction.
Iris Biometric for Person IdentificationManish Kumar
This document discusses iris biometrics for person identification. It begins by defining biometrics and explaining why they are used. It then focuses on iris biometrics, describing how the iris is unique, how iris recognition systems work to capture images and extract iris codes for identification, and the techniques involved like localization, normalization and enhancement. It compares iris recognition to other biometrics like fingerprints in terms of accuracy, stability, speed and security. It concludes by discussing current and future uses of iris biometrics with references.
A robust iris recognition method on adverse conditionsijcseit
As a stable biometric system, iris has recently attracted great attention among the researchers. However,
research is still needed to provide appropriate solutions to ensure the resistance of the system against error
factors. The present study has tried to apply a mask to the image so that the unexpected factors affecting
the location of the iris can be removed. So, pupil localization will be faster and robust. Then to locate the
exact location of the iris, a simple stage of boundary displacement due to the Canny edge detector has been
applied. Then, with searching left and right IRIS edge point, outer radios of IRIS will be detect. Through
the process of extracting the iris features, it has been sought to obtain the distinctive iris texture features by
using a discrete stationary wavelets transform 2-D (DSWT2). Using DSWT2 tool and symlet 4 wavelet,
distinctive features are extracted. To reduce the computational cost, the features obtained from the
application of the wavelet have been investigated and a feature selection procedure, using similarity
criteria, has been implemented. Finally, the iris matching has been performed using a semi-correlation
criterion. The accuracy of the proposed method for localization on CASIA-v1, CASIA-v3 is 99.73%,
98.24% and 97.04%, respectively. The accuracy of the feature extraction proposed method for CASIA3 iris
images database is 97.82%, which confirms the efficiency of the proposed method.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Journal looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the Journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
This document reviews various techniques for iris segmentation in iris recognition systems. It discusses 8 techniques: (1) Integrodifferential operator, (2) Hough transform, (3) Masek method, (4) Fuzzy clustering algorithm, (5) Pulling and Pushing method, (6) Eight-neighbor connection based clustering, (7) Segmentation approach based on Fourier spectral density, and (8) Circular Gabor Filter. Each technique achieves some level of segmentation accuracy but also has disadvantages like high computational time, low accuracy, or poor performance on noisy images. The document concludes that a unified framework approach provides the highest overall segmentation accuracy for robustly segmenting iris images.
This document reviews various techniques for iris segmentation in iris recognition systems. It discusses integrodifferential operator and Hough transform approaches, as well as the Masek, fuzzy clustering, and pulling and pushing methods. Each approach has advantages and disadvantages. The Masek method achieves circular iris and pupil localization but has lower accuracy and speed. Fuzzy clustering provides better segmentation for non-cooperative iris recognition but requires an extensive search. The pulling and pushing method aims to develop a more accurate and rapid iris segmentation algorithm.
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONsipij
There is considerable rise in the research of iris recognition system over a period of time. Most of the
researchers has been focused on the development of new iris pre-processing and recognition algorithms for
good quail iris images. In this paper, iris recognition system using Haar wavelet packet is presented.
Wavelet Packet Transform (WPT ) which is extension of discrete wavelet transform has multi-resolution
approach. In this iris information is encoded based on energy of wavelet packets.. Our proposed work
significantly decreases the error rate in recognition of noisy images. A comparison of this work with nonorthogonal Gabor wavelets method is done. Computational complexity of our work is also less as
compared to Gabor wavelets method.
Similar to A Robust Approach in Iris Recognition for Person Authentication (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
A Robust Approach in Iris Recognition for Person Authentication
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 3 (Jul. - Aug. 2013), PP 59-67
www.iosrjournals.org
www.iosrjournals.org 59 | Page
A Robust Approach in Iris Recognition for Person Authentication
Chinni. Jayachandra1
H. Venkateswara Reddy2
B. Suresh Kumar3
B. Sruthi4
1
M.Tech (C.S.E), VCE, Hyderabad, India,
2
Associate Professor in CSE, VCE, Hyderabad, India,
3
M.Tech (C.S.E), VCE, Hyderabad, India,
4
M.Tech (C.S.E), VCE, Hyderabad, India,
Abstract: In Iris recognition authentication process, iris and sclera are used as the previous inputs using to
recognize the eye with different mechanisms like segmentation combining with different versions. In this paper,
entirely biometric-based personal verification and identification methods have gained much interest with an
increasing accent on safety. The iris texture pattern has no links with the genetic structure of an individual and
since it is generated by chaotic processes externally visible patterns imaged from a distance. Iris patterns
possess a high degree of randomness and uniqueness. Here we propose two algorithms they are K-Means
algorithm and canny Edge Detection. Totally eight process acting to identify the pupil and also for iris
recognition. Comparing images k- means algorithm is to give accurate contest. As a final point it leads to open
authentication person details from database.
Key words - Median filter, Iris Radius Detection, Iris Unrolling, Iris Recognition, Pupil Detection, Canny edge
detection algorithm, K-means algorithm.
I. Introduction
Recognizing individuals based on biometric systems is increasing rapidly in organizations, industries
and others. It mainly focuses on security throughout the world and it is so far increasing. By examining physical
or behavioral characters of human beings, biometric systems are reliable [1] which are unique among all
individuals. In recognition process biometric systems are deploying and enhancing the security, reliability,
convenience and efficiency. Based on uniqueness and stability of the biometrics during human’s lifetime, it has
been utilized as an expedient method for the recognizing process for many years. There are few biometric
systems are available in world like finger prints, palm, signature, face, DNA, retina, ear and iris. Iris recognition
is the process of recognizing a person by analyzing the random pattern of the iris images. The automated method
of iris recognition is relatively young, existing in patent only since in 1994.The human iris, an annular region
located around the pupil and covered by the cornea, can provide independent and unique information of a
person. Among these iris is one of the better authentication method for verification and identification of person
in both modes. Iris is a ring like chromatic texture between the black central pupil and white colored sclera in
the eye. The inner and outer circular templates in eye are not in a standard circular shape.
Complex characteristics exist in iris pattern exhibit the iris as an important, convenient and non-
invasive natural identification means. From past years iris is utilized as identification systems rapidly. The
existing algorithms are using two circular templates to identify the eye. But they are not in a standard circle
shape it leads to iris legacy and difficult to find proper identification. From past iris recognition is proposed as a
reliable biometric system in 1987 by L. Form [2]. Although the correlation and the structure of the iris is
genetically link, the details of the pattern are not. Iris develops during prenatal growth through a process of tight
forming and folding of the tissue membrane. Genetically identical an individual’s irides are unique and
structurally distinct, which allows for it to be used for recognizing purposes. Iris based biometric, on the other
hand, involves analyze features found in the colored ring of tissue that surrounds the pupil. Identity of
verification and authentication increasing day by day to provide security for this iris recognition is more
accurate which cannot change by human age.
1.1 Relate Work
Daugman developed Daugman's theory using 2-d Gabor filter phase quantification and the code
identification system [3, 4]. Wildes given a theory based on the multiscale Gaussian filters for iris identification
system [5]. Boles recommended a method based on the wavelet transformation algorithm to iris recognition [6].
Boles and Boashash’s [7] given that iris images are analyzed in a 1-D dyadic wavelet transform in different
resolution levels, using wavelet results the feature vector of the iris image was extracted. Junzhou Huang given
iris segmentation and Edge extraction is using phase congruency to identify the iris [8]. H. Proenca and L.A.
Submitted Date 20 June 2013 Accepted Date: 25 June 2013
2. A Robust Approach In Iris Recognition For Person Authentication
www.iosrjournals.org 60 | Page
Alexandre proposed Iris segmentation methodologies for non-cooperative recognition [9]. Chung-Chih
Tsai given iris segmentation based on possibilistic fuzzy logic method to iris recognition using local vectors
[10]. Li Ma, Tieniu Tan is given a method Characterizing Key Local Variations for iris recognition [11]. LiYu
and David Zhang given iris recognition based on relative distance of key point [12].
C. Sanchez-Avila and R. Sanchez-Reillo used two approaches using Gabor filters and multiscale zero-
crossing representation for iris recognition to make efficient [13]. Ahmad M. Sarhan gave an approach using
with Discrete Cosine Transform and Artificial Neural Networks for iris pattern recognition [14]. Lenina Birgale
and Manesh Kokare used Ridgelets with False Acceptance Rate (FAR) and False Rejection Rate (FRR) for iris
recognition [15]. Hui Zhang proposed Rectangle Conversion for folded eye and for grouping KNN method [16].
Richard P. Wildes proposed Distinctive features of the iris are manifest across a range of spatial scales. Pattern
matching is well served by a band pass decomposition spanning high to low spatial frequency [17]. Hugo
Proenca developed analysis for error rate in iris segmentation process regarding accuracy [18]. Kevin W.
Bowyer gave a survey on iris recognition in biometrics [19]. Makram Nabti develops an effective and fast iris
recognition system using addition of multiscale feature extraction technique [20]. The past techniques like
multiscale, wavelets, local features, edge extraction and segmentation are used rapidly to increase the accuracy
and make simple.
1.2 Outline:
In eye there are inner and outer boundaries which are not in a standard circular shape. The iris is a
muscle with in the eye regulates the size of the pupil, controlling the amount of light, which enters the eye. It is
the colored portion of the eye with coloring based on the amount of melatonin pigment within the muscle as
shown in Fig.1.In this paper, we find the edges of two circular templates and we concentrate on only pupil. It
helps in if there is any iris legacy and texture loss in image. Our approach is having iris recognition system is
composed of eight main stages they are Scanning, RGB to gray scale, median filters, pupil center detection,
canny edge detection, iris radius, iris localization and iris unrolling. In addition to this K-means algorithm is
used to compare the image and to match the image form the database. According to the matching value person is
authenticated and retrieve person details.
(a) (b)
Fig 1. (a) Iris and Pupil in eye. (b) Iris and pupil Structure with colors.
In eye there are different color membrance of iris like blue, gray, red , green etc. But pupil is always
having black color. In this paper mostly concentrate on pupil and next iris. The structure of pupil and iris with
color is shown in above fig.1.
II. An Iris Recognition System Is Composed Of Eight Stages
Identity of verification and authentication of person is increasing rapidly for this iris recognition is the
one of the best biometric system. To improve this recognition process proposed method is developed using eight
stages. In this canny edge detection algorithm is mainly used to identify the edges of pupil and iris. In this
recognition process we mainly focuses on pupil.
The architecture for pupil identification for iris recognition process is shown in fig.2 with process flow.
The initial step is scanning the given input image, converting RGB color image to Gray scale image, median
filters to reduce the noise in images, Pupil detection by assigning center point, canny edge detection algorithm
which help to identify the edges of image (pupil and iris), finding radius of iris and pupil, iris localization and
finally iris unrolling as shown below. At last the result is obtained with accuracy and fine edges to without iris
legacy and texture loss, which helps to match the image with database images to authenticate person
information.
3. A Robust Approach In Iris Recognition For Person Authentication
www.iosrjournals.org 61 | Page
Fig 2. Architecture for Iris recognition
The Iris recognition process using pupil is follows:
2.1 Scanning Eye
Initially collect all eye images stored in dataset. In next process is scan process input to any one eye
image. This is the process which is used to pick the image and scan the image from relevant database. In process
flow it is treated as scanned input image which is used to continue next processes.
2.2 RGB Image Converting to Gray Scale Format
In next step taking scanned image which is having RGB color image because iris is having different
colors like green, black, brown, red, blue. To find edges we need to convert the RGB to Grayscale image. The
RGB encoding of pure red is (255, 0, 0), pure green (0, 255, 0) and pure blue is (0, 0,255). In all RGB
encodings, the first value is the amount of red, and second value is the amount of green, and the third value is
the amount of blue. Range of the 3 numbers is (0-255). Grayscale images are rendered in black, and white, and
all the shades of gray in between that process. The format encoding of any gray values is a set of three equal
numbers, (a, a, a), where x is some integer between 0 and 255. For instance, white is (255,255,255), black is (0,
0, 0) and medium gray is (127,127,127). The higher the numbers lighter the gray. To convert a non-neutral color
to its equivalent grayscale value, next must compute a weighted average of the green, red, and blue values
representation are shown in fig 3.
Fig 3. Converting RGB to Grayscale
2.3 Median Filter
In image processing, it is often desirable to be able to perform noise reduction in image or signal.
Median filtering is very widely used in digital image processing because it preserves edges while removing
Input Eye Image
Scanning Image
Converting RGB
image to Gray
Scale
Filtering using
“Median Filter”
Pupil detection
by assigning
center point
“Canny Edge
Detection
Algorithm”
Result
Iris/Pupil Radius
Detection
Iris Localization
Iris Unrolling
4. A Robust Approach In Iris Recognition For Person Authentication
www.iosrjournals.org 62 | Page
noise. From the gray scale image remove the noise data like lightning, illusions, blurred data etc. This filters
used before edge detection. The idea is to examine a sample of the input and decide if it is representative of the
signal. This is performed using a window consisting of an odd number of samples. The values in the window are
sorted into numerical order. The median value, the sample in the center of the window, is selected as the output.
The oldest sample is discarded, a new sample acquired, and the calculation repeats.
2.4 Pupil detection by assigning center point
To perform the fourth step, find the center of the pupil to orient the coordinate system at the center of
the eye. Pupil is main process to identify the iris and eye. After completing median filtering directly assign the
center of eye which leads to focus on pupil as shown in fig 4.
Fig 4. Pupil detection by assigning center point
2.5 Canny Edge Detection Algorithm
The canny edge detection algorithm is to identify the edges of image with gradient points. After
identifying pupil center for that image apply this algorithm which leads to find iris and pupil boundaries. When
the grayscale intensity of the image is changed to find the edges basically canny algorithm is used. This gives
the effective edges of eye. This algorithm processed in following steps:
Step 1: Smoothing technique is to remove that noise is mistaken for edges, noise must be reduced and also
remove the noise from the blur images.
Step 2: From the smoothed images the gradient points are determines each pixel by applying Sobel-operator.
First step is to approximate the gradient in the x- and y-direction respectively by applying the kernels.
The gradient magnitudes are also call as edge strengths, can then be determined as Euclidean distance
measured by applying the law of Pythagoras as shown in Equations (1) and (2).
(1) Sometimes it is easy by applying Manhattan distance measure shown in Equation.
(2) To diminish the computational complexity.
2 2
x yG = G + G (1)
x yG = G + G (2)
Where, Gx = gradients in the x-direction and Gy are the gradients in the y-directions respectively.
Gradient magnitude determines edges with respect to an image clearly. Though, the edges are typically
broad and do not indicate precisely where the edges are. The direction of the edges must be determined
and stored as shown in Equation (3).
y
x
G
θ = arctan
G
(3)
Step 3: Non-maximum suppression is to convert the blurred edges in the image of the gradient magnitudes to
make sharp edges. Basically this is done by preserving all local maxima in the gradient image, and
deleting everything else. The algorithm is for each pixel in the gradient images is: (a) Round the
gradient direction θ to nearest coordinate, equivalent to the use of 8-connected vicinity. (b) Contrast the
edge strength of the existing pixel with the edge strength of the pixel in the optimistic and pessimistic
gradient direction. (c) If the edge strength is large for current pixel, then conserve value of the edge
strength and if not stem the value.
Step 4: Double thresholding mechanism is to assign edge pixels stronger than the high threshold are marked as
strong, edge pixels weaker than the low threshold are concealed and edge pixels between the two
thresholds are marked as weak. Because some of edges will probably be true edges in the image, but
5. A Robust Approach In Iris Recognition For Person Authentication
www.iosrjournals.org 63 | Page
some may cause noise or color variations for instance due to rough surfaces. The simplest way to
distinguish between these would be to use a threshold, and then only strongest edge value would be
preserved.
Step 5: Edge tracking by hysteresis Edge tracking can be determined by BLOB-analysis (Binary Large Object).
Using 8-connected neighborhood it connect to Blob’s. Blob’s should contains at least one strong edge
pixel is then preserved, while other Blob’s are hidden.
Canny edge detection algorithm provides:
Good detection – the algorithm should mark as many real edges in the image as possible.
Good localization – edges marked should be as close as possible to the edge in the real image.
Minimal response – a given edge in the image should only be marked once, and where possible, image noise
should not create false edges.
With this step edges will obtained with pupil and iris boundaries respectively.
2.6 Pupil and Iris Radius Detection
Center of the iris can be computed by examining the shift vectors of the chords. Looking at both sides
of a chord and comparing their lengths and width and radius can be computed. The center was shifted by this
vector it would equal to two components of the chord. By doing this with two chords two x different offset
vectors can be computed.
2.7 Iris Localization
This process is mostly for visual purposes and refers to removing erroneous information from the
original image outside of the iris radius, whereby leaving one image within the bounds of the iris radius
induction. Before eye centre localization, a pre-processing step needs to be taken. Since reflections that affect
the results in a negative way, frequently appear on the eye, a reflection removal step is implemented. Such
highlights are usually bright areas consisting of no more than a few pixels.
2.8 Iris Unwrapping (Unrolling)
The integro-differential operator proposed by Daugman[3] locates the pupil, iris inner and outer
boundaries as well as the up and down eyelid boundaries.
0 0
0 0
σ(r,x ,y )
r,x ,y
I(x,y)
ds
2πr
max G (r)*
r
0
2
2
σ
(r - r )
-
2π1
G (r) = e
2πσ
Where I(x,y) represents the eye image, are (r,x0,y0)parameters that correspond to a circle of radius and
center coordinates (x0,y0) , respectively. Is a radial r smoothing Gaussian function with center and standard
deviation? One application of this function is that it searches the entire eye image for integrations along different
circular contours with center coordinates and an increasing radius. The maximum contour integral derivative
found will then be classified as the most likely circle tracing the iris. In a similar manner, the circular boundaries
for the pupil and iris regions are localized by search process through the entire iris image for the maximum
integration along various circular contours. In addition, Daugman approximates the upper and lower eyelids
with two open curves that are part of two different circles. Finally, the iris region surrounded by the upper and
lower eyelids as well as the extracted circular pupil and iris boundaries are used for further feature extraction in
the iris recognition process. This method, referred to as ―Daugman’s Rubber Sheet Model‖, is developed by
Daugman(2003) to map the sampled iris pixels from the Cartesian coordinates to the normalized 65polar
coordinates in order to accomplish a size-invariant sampling of the original iris points. After unwrapping the
output of our process is as shown in below fig 5.
6. A Robust Approach In Iris Recognition For Person Authentication
www.iosrjournals.org 64 | Page
Fig 5. Iris recognition eight process output
After completion of this process pupil is identified without loss of texture and legacy. Next section, to
match or compare the image and find the proper image to given input using K- Means algorithms.
III. K-Means Algorithm for Comparison of Images
To compare the images K-Means algorithm is reliable in our approach. Identifying pupil from the
image shown in previous process. To recognize the pupil from the K-means is one of the simplest unsupervised
learning algorithms that solve the well known clustering problem. The procedure follows a simple and easy way
to classify a given data set through a certain number of clusters (assume k clusters) fixed a priori. The main idea
is to define k centroids, one for each cluster. These centroids should be placed in a cunning way because of
different location causes different result. So, the better choice is to place them as much as possible far away
from each other. The next step is to take each point belonging to a given data set and associate it to the nearest
centroid. When no point is pending, the first step is completed and an early group age is done. At this point we
need to re-calculate k new centroids as gray centers of the clusters resulting from the previous step. After we
have these k new centroids, a new binding has to be done between the same data set points and the nearest new
centroid. A loop has been generated. As a result of this loop we may notice that the k centroids change their
location step by step until no more changes are done.
k n
2(j)
i j
j=1 i=1
J = x -c
Where is a chosen distance measure between a data point and the cluster centre ,
is an indicator of the distance of the n data points from their respective cluster centers.
The k-means algorithm can be run multiple times to reduce this effect. Here based on the pupil, the iris
identification process runs. The input image is go to the related color set in that the image edges are used to
match the same edge form the nearest image edges. It continues till it finds the exact image. After matching
image it open the person details to process future steps. If suppose we take net banking system for that iris
recognition is first it capture the image and start matching and it opens the bank account as shown in fig 6.
7. A Robust Approach In Iris Recognition For Person Authentication
www.iosrjournals.org 65 | Page
Fig 6. Representation of authentication process with bank application
III. Performance and Experimental Results
In previous there are many models for segmentation process but it is not applicable to find high
accuracy and it is having some defects like loss of texture. Based on pupil we can find the Iris recognition with
high accuracy because it doesn’t have texture loss and legacy. In our approach we find the good accuracy rate
compare with other models, some sample images as shown in below by using above eight processes in step by
step manner:
Image 1:
Image 2:
8. A Robust Approach In Iris Recognition For Person Authentication
www.iosrjournals.org 66 | Page
Image 3:
Fig 6. Iris recognition with different sample images in composed eight step process
According to existing system iris recognition is improved and accuracy rate is high compared with the
existing system as shown in Fig 7. In Table 1, there the values which shows accuracy rate between existing and
proposed systems.
TABLE 1
Existing 1 1.354 2.721 3.099 4.0123 4.367 4.789 5.355
Proposed 1.134 1.789 3.345 3.987 4.712 4.988 5.238 5.732
(a) (b)
Fig 7. Graph for Performance (a) Existing and (b) Proposed system.
IV. APPLICATIONS
The most popular biometric authentication from the last few years is Iris Recognition. It mainly focuses
on entry control, ATMs and Government program applications. Recently in India to provide identity for
citizen’s adhar card is developed. To issue that card person need to complete personal verification in that
process they used biometric systems like finger prints and eye detection. In that iris recognition used to provide
identity and also to verify the person. It is applicable in organizations security to authenticate the employee with
their details. Some organizations companies have realized the advantages of biometric authentication for
networks and offer products to achieve this scheme. Products offered include fingerprint analysis, iris
recognition, voice recognition or combinations of these. It is applicable for bank applications like ATM, a
customer simply walks up to the ATM and looks in a sensor camera and if he is authenticated it allows
continuing the transaction otherwise not. Iris recognition is highly accurate, easy to use and virtually fraud proof
means to identify customer’s details.
V. Conclusion
In Iris recognition process the traditional approaches methods cause the problem of pupil legacy and
loss of texture. In eye, inner and outer circular templates are not in a standard circular shape. Our approach is
0
1
2
3
4
5
6
0 5 10
0
1
2
3
4
5
6
0 5 10
9. A Robust Approach In Iris Recognition For Person Authentication
www.iosrjournals.org 67 | Page
based on canny edge detection and K-means algorithm effectively improves the iris positioning accuracy,
through the combination of K-Means algorithm to raise the accuracy and speed of recognition. It guarantees the
effective pupil detection to get accurate iris identification. In future we used recognition techniques using
multichannel median filtering. Hence, they have used 8-directional median filters with multiple frequencies to
capture both global and local details in an iris image. The mean and variance of these Median filtered images are
used as features for the matching process. Input from dataset Eye Image next Eight Process Finishing operations
and Image comparison, Iris radiation, pupil detection operation using K-means Algorithm and canny edge
detection algorithm. This approach is efficient, convenient and low cost implementation.
References
[1] Jain, A.K., Flynn, P., Ross, A. (Eds.), 2007. Handbook of Biometrics. Springer-Verlag.
[2] L. Flom, A. Safir, Iris Recognition System, U.S. Patent 4 641 349, 1987.
[3] J. G. Daugman, ―High confidence personal identification by rapid video analysis of iris texture,‖ in Proc. IEEE Int. Carnahan
Conf. SecurityTechnol., 1992, pp. 1–11.
[4] J G Dauglllan, ―High confidence visual recognition of Persons by a test of statistical independence‖. IEEE Transactions on Pattern
Analysis and Machine Intelligence, 1993, 15(1):1148-116.
[5] R P wildes, et al. A system for automated iris recognition[C]. In Proceedings of the Second IEEE Workshop on Applications of
Computer Vision. Sarasota, Horida, 1994. 121-128.
[6] W W Boles. A wavelet transform based technique for the recognition of the human iris. In Proeeedings of the 1996 International
SylnPosium on Signal Processing and its Applications, Gold Cost, Australia, 1996.
[7] W. W. Boles and B. Boashash, ―A human identification technique using images of the iris and wavelet transform,‖ IEEE Trans.
Signal Process. vol. 46, no. 4, pp. 1185–1188, Apr. 1998.
[8] Junzhou Huang, Yunhong Wang, Tieniu Tan, Jiali Cui, ―A New Iris Segmentation Method for Recognition‖, Proceedings of the
17th International Conference on Pattern Recognition, IEEE, 2004.
[9] H. Proenc¸a and L.A. Alexandre, ―Iris segmentation methodology for non-cooperative recognition‖. In IEE Proc.-Vis. Image
Signal Process. Vol. 153, No. 2, April 2006.
[10] Chung-Chih Tsai, Heng-Yi Lin, Jinshiuh Taur, and Chin-Wang Tao, ―Iris Recognition Using Possibilistic Fuzzy Matching on
Local Features‖. In IEEE Transactions on Systems, Man, and Cybernetics—Part B: Cybernetics in 2010.
[11] Li Ma, Tieniu Tan, Yunhong Wang and Dexin Zhang, ―Efficient Iris Recognition by Characterizing Key Local Variations‖. In
IEEE Transactions On Image Processing, Vol. 13, No. 6, June 2004.
[12] LiYu, David Zhang,‖ The relative distance of key point based iris recognition‖. In Pattern Recognition Society, Elsevier, 2006.
[13] C. Sanchez-Avila and R. Sanchez-Reillo, ―Two different approaches for iris recognition using Gabor filters and multiscale zero-
crossing representation‖. In Pattern Recognition Society, Pergamon, Elsevier, 2004.
[14] Ahmad M. Sarhan, ―Iris Recognition Using Discrete Cosine Transform and Artificial Neural Networks‖. Journal of Computer
Science 5 (5): 369-373, 2009.
[15] Lenina Birgale and Manesh Kokare, ―Iris Recognition Using Ridgelets‖. In Journal of Information Processing Systems, Vol.8,
No.3, September 2012.
[16] Hui Zhang, ―Iris Recognition Based on Grouping KNN andRectangle Conversion‖. IEEE, 2012.
[17] Richard P. Wildes, ―Iris Recognition: An Emerging Biometric Technology‖. Proceedings of the IEEE, Vol. 85, No. 9, September
1997.
[18] Hugo Proença and Luís A. Alexandre, ―Iris recognition: Analysis of the error rates regarding the accuracy of the segmentation
stage‖. Image and Vision Computing 28, pp no: 202–206, Elsevier, 2010.
[19] Kevin W. Bowyer and Karen Hollingsworth, Image understanding for iris biometrics: A survey‖. Computer Vision and Image
Understanding 110, 281–307, Elsevier, 2008.
[20] Makram Nabti,‖ An effective and fast iris recognition system based on a combined multiscale feature extraction technique‖.
Pattern Recognition 41, 868–879, Elsevier, 2008.