SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 7 Issue 5, September-October 2023 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 11
Performance of Hasty and Consistent Multi
Spectral Iris Segmentation using Deep Learning
Ram Niwas Sharma1, Ankit Kumar Navalakha2, Neha Sharma3
1
M Tech Scholar, Department of Computer Science Engineering, Mewar University, Chittorgarh, Rajasthan, India
2
Assistant Professor, Department of Computer Science Engineering, Mewar University, Chittorgarh, Rajasthan, India
3
Lecturer, Department of Computer Science Engineering, MLVTE, Bhilwara, Rajasthan, India
ABSTRACT
The recognition system is composed of seven phases: acquisition,
preprocessing, segmentation, normalization, feature extraction,
feature selection, and classification. In the acquisition phase, iris
images are captured, followed by preprocessing to enhance the
quality of the images. The segmentation phase involves separating
the iris region from the background, and the normalized iris region is
shaped into a rectangle in the normalization phase. Iris segmentation
is a critical step in iris recognition systems and has a direct impact on
authentication and recognition results. However, standard
segmentation techniques may not perform well in noisy iris databases
captured under challenging conditions. Moreover, the lack of large
iris databases hinders the performance improvement of convolution
neural networks. The proposed method addresses these challenges by
effectively handling irregular iris images captured under visible light.
The iris region is processed and evaluated to generate a unique
feature vector, which is then used for person identification. VGG16, a
well-known deep learning model, is employed for image
classification, and the feature vector is fed into VGG16 for
classification purposes.
KEYWORDS: Deep Learning, Multi Spectral Iris, neural networks,
VGG16
How to cite this paper: Ram Niwas
Sharma | Ankit Kumar Navalakha |Neha
Sharma "Performance of Hasty and
Consistent Multi Spectral Iris
Segmentation using Deep Learning"
Published in
International Journal
of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-7 |
Issue-5, October
2023, pp.11-15, URL:
www.ijtsrd.com/papers/ijtsrd59853.pdf
Copyright © 2023 by author (s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION
A biometric system is an automated system that
recognizes individuals based on unique features or
characteristics. Various biometric systems have been
developed using different features such as
fingerprints, facial features, voice, hand geometry,
handwriting, the retina, and the focus of this thesis,
the iris [1]. Biometric systems typically operate in
two modes: an enrollment mode for adding templates
to a database and an identification mode where a
template is created for an individual and matched
against the pre-enrolled templates in the database. .
The iris comprises several layers, including the
epithelium layer with densely pigmented cells and the
stromal layer with blood vessels, pigment cells, and
iris muscles [1]. The color of the iris is determined by
the density of stromal pigmentation.
The epigenetic nature of iris patterns results in each
eye of an individual having independent patterns,
even in the case of identical twins. The iris is an
externally visible and protected organ, maintaining its
stable epigenetic pattern throughout adulthood. The
visual system plays a crucial role in processing
information within the human body [2]. An integral
component of the visual system is the eye, which
consists of three concentric layers. Biometric research
and development require the analysis of human data.
However, it is impractical to perform algorithm
testing on real-time captured data due to various
constraints [3]. Therefore, standardized biometric
databases play a crucial role in the testing and
evaluation of recognition methods.
Biometrics encompasses quantifiable data related to
human characteristics and traits. It is used for
identification and access control in computer science
and surveillance applications. In the initial phase of
biometric processing, various characteristics are
captured. However, for automated capturing and
IJTSRD59853
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 12
comparison with stored data, the biometric
characteristics should satisfy certain criteria.
Multimodal biometric systems utilize more than one
physiological or behavioral characteristic for
enrollment, verification, or identification. These
systems are employed in applications such as border
entry/exit, access control, civil identification, and
network security to reduce false match and false non-
match rates, provide alternative means of enrollment
or identification, and counter fraudulent attempts [2].
The selection of a specific biometric for an
application requires weighing these factors, as no
single biometric can meet all requirements for every
situation.
LITERATURE REVIEW
The concept of iris recognition was first proposed by
Dr Frank Burch, an ophthalmologist, in 1936. In
1987, ophthalmologists Aran Safir and Leonard Flom
patented the idea, and they enlisted John Daugman in
1989 to develop practical algorithms for iris
recognition [12].
Cheng-Shun Hsiao, Chih-Peng Fan, and Yin-
Tsung Hwang (2022) proposed an algorithm for
locating the pupil center using an edge detection
method. They recorded the grey level values on
virtual concentric circles and constructed a zero-
crossing representation based on a one-dimensional
dyadic wavelet transform.
Viktor Varkarakis and Shabab Bazrafkan (2018)
developed an effective deep learning method for iris
biometric authentication. The proposed system
utilizes semantic segmentation technology based on
the UnEAT model to locate and extract the ROI
(Region of Interest) of the iris in an eye image.
Mahmut Karakaya (2018) conducted a study on
biometric authentication using an effective low-
complexity YOLOv3 tiny-based deep learning
inference network.
METHODOLOGY
The presence of noise regions in captured images
increases the need for robust and adaptable
segmentation techniques [11]. Various iris
segmentation proposals have been described,
including statistical approaches, alpha trimming
operation, and checking the gray level transition.
Image segmentation refers to the division of an image
into multiple components. It is a critical step in
automated image processing systems as it forms the
foundation for subsequent operations such as
description or recognition [4].
VGG16 is a convolutional neural network (CNN)
model proposed by K. Simonyan and A. Zisserman
from the University of Oxford in their paper titled
"Very Deep Convolution Networks for Large-Scale
Image Recognition." This model gained popularity
for its remarkable performance in the ImageNet
dataset, achieving a top-5 test accuracy of 92.7%.
Figure 01: VGG16 Architecture
The VGGNet configurations are labeled as A, B, C, D, and E. All configurations share the same overall
architecture and differ primarily in terms of depth. In terms of the width of the convolution layers [5], the
number of channels starts at 64 in the first layer. After each max-pooling layer, the number of channels doubles,
progressively increasing until it reaches 512 in the deeper layers [10].
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 13
Software Description
MATLAB 19 (b) is a high-level technical computing language and interactive environment that offers various
capabilities such as algorithm development, data visualization, data analysis, and numerical computation [6]. It
provides strong support for working with matrices and matrix operations, making it a powerful tool for data
analysis and visualization.
One of the key features of MATLAB 19 (b) is its extensive collection of toolboxes, which are sets of programs
designed to support specific tasks. The image processing toolbox is particularly relevant for handling images and
offers functions, commands, and techniques tailored to image analysis [6]. In MATLAB, functions play a crucial
role and are used to perform specific tasks by accepting input parameters and producing output results.
Additionally, users have the flexibility to create their own functions when necessary. MATLAB treats matrices
as its standard data type, considering all data to be matrices in some form. Images, while strings are essentially
matrices of characters, with the string length determining the matrix dimensions.
EXPERIMENTAL RESULTS
The performance of various CNN architectures, including VGG16 and SVM models, was evaluated in this
study. The models were initialized with zero biases and random weights with zero mean [7]. Dropout was
applied to the fully connected layers to mitigate over fitting. By considering these performance parameters, the
classifier's accuracy, precision, sensitivity, and specificity can be evaluated, providing insights into its
classification capabilities.
Table 01: Comparison Result with Existing Work
Database Approach Accuracy (%)
CASIA-INTERVAL
EXISTING SVM 74
PROPOSED VGG16 90.91
Figure 02: Comparison Result with Existing Work
This implies that the VGG16 model demonstrated the highest classification accuracy among the tested
architectures. Additionally, Table 02 presents a comparison of different factors derived from various datasets,
providing further insights into the evaluation and comparison process [7].
Table 02 Comparison Result with Different Dataset
Approach
Accuracy
(%)
Precision
(%)
Recall
(%)
F1
(%)
Specificity
(%)
CASIA-INTERVAL
VGG16
90.91 91.44 91.0 89.49 91.38
UBRIS.V2 84.25 83.99 86.95 86.15 84.39
MMU Database 87.15 83.26 84.12 85.15 86.00
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 14
Figure 03: Performance Graph
The evaluation was performed on the CASIA-INTERVAL dataset and compared with the UBRIS.V2 and MMU
databases [9]. The results indicated that CASIA-INTERVAL achieved the highest accuracy and specificity.
Furthermore, an attempt was made to utilize the conventional VGG16 architecture with pre-trained weights
obtained from a model in ImageNet [8].
CONCLUSION
The proposed system utilizes the GLCM and VGG16
for iris recognition. By combining these features with
other texture generation processes, the feature
extraction process becomes more effective. The
recognition of iris is achieved using the kernel
function of the VGG16 classifier. The system
accurately recognizes iris features in video, even in
the presence of challenges such as illumination and
contrast variations. It also detects the liveliness and
race of the person with high accuracy. Extensive
experiments are conducted using the CASIA Iris-,
UBIRIS.v2, and MMU databases to evaluate the
performance of the iris and eye recognition system
using VGG16 architecture. The proposed system
outperforms other existing technologies on each
database. Additionally, an iris segmentation
architecture based on CNN combined with VGG16
and VGG19 is proposed to further improve the
accuracy of the recognition system.
FUTURE WORK
The Biometric Authentication can be improved by
including more number of possible features and other
valid measures. Pupil dilation is found to have an
effect on the accuracy of iris recognition particularly
if the number of dilation is completely different at
enrollment than at verification. Wearing contact
lenses also modify the color and look of the attention
also can decrease the recognition rates.
REFERNCES
[1] Caiyong Wang; Jawad Muhammad; Yunlong
Wang; Zhaofeng; Zhenan Sun, "Towards
Complete and Accurate Iris Segmentation
Using Deep Multi-Task Attention Network for
Non-Cooperative Iris Recognition" IEEE
Transactions on Information Forensics and
Security, 2022.
[2] Cheng-Shun Hsiao; Chih-Peng Fan; Yin-Tsung
Hwang, "Design and Analysis of Deep-
Learning Based Iris Recognition Technologies
by Combination of U-Net and EfficientNet"9th
International Conference on Information and
Education Technology (ICIET), 2022.
[3] Chia-Wei Chuang; Chih-Peng Fan; Robert
Chen-Hao Chang, "Design of Low-Complexity
YOLOv3-Based Deep-Learning Networks with
Joint Iris and Sclera Messages for Biometric
Recognition Application", IEEE 9th Global
Conference on Consumer Electronics (GCCE),
2022.
[4] Shabab; Peter Corcoran, "Enhancing iris
authentication on handheld devices using deep
learning derived segmentation techniques",
IEEE International Conference on Consumer
Electronics (ICCE),2022.
[5] Mousumi Sardar; Subhash Banerjee; Sushmita
Mitra, "Iris Segmentation Using Interactive
Deep Learning", IEEE Access, 2021.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 15
[6] Gürkan Şahin; Orkun Susuz, "Encoder-Decoder
Convolutional Neural Network Based Iris-
Sclera Segmentation", 27th
Signal Processing
and Communications Applications Conference
(SIU), 2021.
[7] Ehsan eddin Jalilian; Mahmut Karakaya;
Andreas, "Iris Recognition Using CNN Based
Iris Segmentation", International Conference of
the Biometrics Special Interest Group
(BIOSIG), 2021.
[8] Ananya Zabin, Thiri machos Bourlai, "A Deep
Learning Based Approach to Iris Sensor
Identification", IEEE/ACM International
Conference on Advances in Social Networks
Analysis and Mining (ASONAM), 2021.
[9] Luiz A. Zanlorensi, Eduardo Luz, Rayson
Laroca, Alceu S. Britto, Luiz S. Oliveira, David
Menotti, "The Impact of Preprocessing on Deep
Representations for Iris Recognition on
Unconstrained Environments"31st SIBGRAPI
Conference on Graphics, Patterns and Images
(SIBGRAPI), 2018.
[10] Lozej; Dejan, Vitomir, Peter Peer, "Influence of
segmentation on deep iris recognition
performance"7th International Workshop on
Biometrics and Forensics (IWBF), 2020.
[11] Caiyong Wang; Yunlong Wang, Boqiang Xu;
Yong He, Zhiwei Dong; Zhenan Sun, "A
Lightweight Multi-Label Segmentation
Network for Mobile Iris Biometrics" IEEE
International Conference on Acoustics, Speech
and Signal Processing (ICASSP), 2020.
[12] Daniel Kerrigan, Mateusz Trokie lewicz,
Adam, Kevin W. Bowyer, "Iris Recognition
with Image Segmentation Employing Retrained
Off-the-Shelf Deep Neural Networks",
International Conference on Biometrics (ICB),
2020.

More Related Content

Similar to Performance of Hasty and Consistent Multi Spectral Iris Segmentation using Deep Learning

Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
IJAEMSJORNAL
 
Network Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningNetwork Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine Learning
IRJET Journal
 
Real-Time Pertinent Maneuver Recognition for Surveillance
Real-Time Pertinent Maneuver Recognition for SurveillanceReal-Time Pertinent Maneuver Recognition for Surveillance
Real-Time Pertinent Maneuver Recognition for Surveillance
IRJET Journal
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
 
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
ijtsrd
 
research Paper face recognition attendance system
research Paper face recognition attendance systemresearch Paper face recognition attendance system
research Paper face recognition attendance system
AnkitRao82
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
IRJET Journal
 
AI-Based Pet Adoption System
AI-Based Pet Adoption SystemAI-Based Pet Adoption System
AI-Based Pet Adoption System
IRJET Journal
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
CSCJournals
 
Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...
IAESIJAI
 
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
IRJET Journal
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET Journal
 
IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED-V2I1P12
IJSRED-V2I1P12
IJSRED
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
rahulmonikasharma
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
IRJET Journal
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...
Editor IJCATR
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
IJERA Editor
 
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
IRJET Journal
 

Similar to Performance of Hasty and Consistent Multi Spectral Iris Segmentation using Deep Learning (20)

Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
 
Network Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningNetwork Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine Learning
 
Real-Time Pertinent Maneuver Recognition for Surveillance
Real-Time Pertinent Maneuver Recognition for SurveillanceReal-Time Pertinent Maneuver Recognition for Surveillance
Real-Time Pertinent Maneuver Recognition for Surveillance
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
 
research Paper face recognition attendance system
research Paper face recognition attendance systemresearch Paper face recognition attendance system
research Paper face recognition attendance system
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
 
AI-Based Pet Adoption System
AI-Based Pet Adoption SystemAI-Based Pet Adoption System
AI-Based Pet Adoption System
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...
 
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 
IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED-V2I1P12
IJSRED-V2I1P12
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...
 
D56021216
D56021216D56021216
D56021216
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Performance of Hasty and Consistent Multi Spectral Iris Segmentation using Deep Learning

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 7 Issue 5, September-October 2023 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 11 Performance of Hasty and Consistent Multi Spectral Iris Segmentation using Deep Learning Ram Niwas Sharma1, Ankit Kumar Navalakha2, Neha Sharma3 1 M Tech Scholar, Department of Computer Science Engineering, Mewar University, Chittorgarh, Rajasthan, India 2 Assistant Professor, Department of Computer Science Engineering, Mewar University, Chittorgarh, Rajasthan, India 3 Lecturer, Department of Computer Science Engineering, MLVTE, Bhilwara, Rajasthan, India ABSTRACT The recognition system is composed of seven phases: acquisition, preprocessing, segmentation, normalization, feature extraction, feature selection, and classification. In the acquisition phase, iris images are captured, followed by preprocessing to enhance the quality of the images. The segmentation phase involves separating the iris region from the background, and the normalized iris region is shaped into a rectangle in the normalization phase. Iris segmentation is a critical step in iris recognition systems and has a direct impact on authentication and recognition results. However, standard segmentation techniques may not perform well in noisy iris databases captured under challenging conditions. Moreover, the lack of large iris databases hinders the performance improvement of convolution neural networks. The proposed method addresses these challenges by effectively handling irregular iris images captured under visible light. The iris region is processed and evaluated to generate a unique feature vector, which is then used for person identification. VGG16, a well-known deep learning model, is employed for image classification, and the feature vector is fed into VGG16 for classification purposes. KEYWORDS: Deep Learning, Multi Spectral Iris, neural networks, VGG16 How to cite this paper: Ram Niwas Sharma | Ankit Kumar Navalakha |Neha Sharma "Performance of Hasty and Consistent Multi Spectral Iris Segmentation using Deep Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-7 | Issue-5, October 2023, pp.11-15, URL: www.ijtsrd.com/papers/ijtsrd59853.pdf Copyright © 2023 by author (s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION A biometric system is an automated system that recognizes individuals based on unique features or characteristics. Various biometric systems have been developed using different features such as fingerprints, facial features, voice, hand geometry, handwriting, the retina, and the focus of this thesis, the iris [1]. Biometric systems typically operate in two modes: an enrollment mode for adding templates to a database and an identification mode where a template is created for an individual and matched against the pre-enrolled templates in the database. . The iris comprises several layers, including the epithelium layer with densely pigmented cells and the stromal layer with blood vessels, pigment cells, and iris muscles [1]. The color of the iris is determined by the density of stromal pigmentation. The epigenetic nature of iris patterns results in each eye of an individual having independent patterns, even in the case of identical twins. The iris is an externally visible and protected organ, maintaining its stable epigenetic pattern throughout adulthood. The visual system plays a crucial role in processing information within the human body [2]. An integral component of the visual system is the eye, which consists of three concentric layers. Biometric research and development require the analysis of human data. However, it is impractical to perform algorithm testing on real-time captured data due to various constraints [3]. Therefore, standardized biometric databases play a crucial role in the testing and evaluation of recognition methods. Biometrics encompasses quantifiable data related to human characteristics and traits. It is used for identification and access control in computer science and surveillance applications. In the initial phase of biometric processing, various characteristics are captured. However, for automated capturing and IJTSRD59853
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 12 comparison with stored data, the biometric characteristics should satisfy certain criteria. Multimodal biometric systems utilize more than one physiological or behavioral characteristic for enrollment, verification, or identification. These systems are employed in applications such as border entry/exit, access control, civil identification, and network security to reduce false match and false non- match rates, provide alternative means of enrollment or identification, and counter fraudulent attempts [2]. The selection of a specific biometric for an application requires weighing these factors, as no single biometric can meet all requirements for every situation. LITERATURE REVIEW The concept of iris recognition was first proposed by Dr Frank Burch, an ophthalmologist, in 1936. In 1987, ophthalmologists Aran Safir and Leonard Flom patented the idea, and they enlisted John Daugman in 1989 to develop practical algorithms for iris recognition [12]. Cheng-Shun Hsiao, Chih-Peng Fan, and Yin- Tsung Hwang (2022) proposed an algorithm for locating the pupil center using an edge detection method. They recorded the grey level values on virtual concentric circles and constructed a zero- crossing representation based on a one-dimensional dyadic wavelet transform. Viktor Varkarakis and Shabab Bazrafkan (2018) developed an effective deep learning method for iris biometric authentication. The proposed system utilizes semantic segmentation technology based on the UnEAT model to locate and extract the ROI (Region of Interest) of the iris in an eye image. Mahmut Karakaya (2018) conducted a study on biometric authentication using an effective low- complexity YOLOv3 tiny-based deep learning inference network. METHODOLOGY The presence of noise regions in captured images increases the need for robust and adaptable segmentation techniques [11]. Various iris segmentation proposals have been described, including statistical approaches, alpha trimming operation, and checking the gray level transition. Image segmentation refers to the division of an image into multiple components. It is a critical step in automated image processing systems as it forms the foundation for subsequent operations such as description or recognition [4]. VGG16 is a convolutional neural network (CNN) model proposed by K. Simonyan and A. Zisserman from the University of Oxford in their paper titled "Very Deep Convolution Networks for Large-Scale Image Recognition." This model gained popularity for its remarkable performance in the ImageNet dataset, achieving a top-5 test accuracy of 92.7%. Figure 01: VGG16 Architecture The VGGNet configurations are labeled as A, B, C, D, and E. All configurations share the same overall architecture and differ primarily in terms of depth. In terms of the width of the convolution layers [5], the number of channels starts at 64 in the first layer. After each max-pooling layer, the number of channels doubles, progressively increasing until it reaches 512 in the deeper layers [10].
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 13 Software Description MATLAB 19 (b) is a high-level technical computing language and interactive environment that offers various capabilities such as algorithm development, data visualization, data analysis, and numerical computation [6]. It provides strong support for working with matrices and matrix operations, making it a powerful tool for data analysis and visualization. One of the key features of MATLAB 19 (b) is its extensive collection of toolboxes, which are sets of programs designed to support specific tasks. The image processing toolbox is particularly relevant for handling images and offers functions, commands, and techniques tailored to image analysis [6]. In MATLAB, functions play a crucial role and are used to perform specific tasks by accepting input parameters and producing output results. Additionally, users have the flexibility to create their own functions when necessary. MATLAB treats matrices as its standard data type, considering all data to be matrices in some form. Images, while strings are essentially matrices of characters, with the string length determining the matrix dimensions. EXPERIMENTAL RESULTS The performance of various CNN architectures, including VGG16 and SVM models, was evaluated in this study. The models were initialized with zero biases and random weights with zero mean [7]. Dropout was applied to the fully connected layers to mitigate over fitting. By considering these performance parameters, the classifier's accuracy, precision, sensitivity, and specificity can be evaluated, providing insights into its classification capabilities. Table 01: Comparison Result with Existing Work Database Approach Accuracy (%) CASIA-INTERVAL EXISTING SVM 74 PROPOSED VGG16 90.91 Figure 02: Comparison Result with Existing Work This implies that the VGG16 model demonstrated the highest classification accuracy among the tested architectures. Additionally, Table 02 presents a comparison of different factors derived from various datasets, providing further insights into the evaluation and comparison process [7]. Table 02 Comparison Result with Different Dataset Approach Accuracy (%) Precision (%) Recall (%) F1 (%) Specificity (%) CASIA-INTERVAL VGG16 90.91 91.44 91.0 89.49 91.38 UBRIS.V2 84.25 83.99 86.95 86.15 84.39 MMU Database 87.15 83.26 84.12 85.15 86.00
  • 4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 14 Figure 03: Performance Graph The evaluation was performed on the CASIA-INTERVAL dataset and compared with the UBRIS.V2 and MMU databases [9]. The results indicated that CASIA-INTERVAL achieved the highest accuracy and specificity. Furthermore, an attempt was made to utilize the conventional VGG16 architecture with pre-trained weights obtained from a model in ImageNet [8]. CONCLUSION The proposed system utilizes the GLCM and VGG16 for iris recognition. By combining these features with other texture generation processes, the feature extraction process becomes more effective. The recognition of iris is achieved using the kernel function of the VGG16 classifier. The system accurately recognizes iris features in video, even in the presence of challenges such as illumination and contrast variations. It also detects the liveliness and race of the person with high accuracy. Extensive experiments are conducted using the CASIA Iris-, UBIRIS.v2, and MMU databases to evaluate the performance of the iris and eye recognition system using VGG16 architecture. The proposed system outperforms other existing technologies on each database. Additionally, an iris segmentation architecture based on CNN combined with VGG16 and VGG19 is proposed to further improve the accuracy of the recognition system. FUTURE WORK The Biometric Authentication can be improved by including more number of possible features and other valid measures. Pupil dilation is found to have an effect on the accuracy of iris recognition particularly if the number of dilation is completely different at enrollment than at verification. Wearing contact lenses also modify the color and look of the attention also can decrease the recognition rates. REFERNCES [1] Caiyong Wang; Jawad Muhammad; Yunlong Wang; Zhaofeng; Zhenan Sun, "Towards Complete and Accurate Iris Segmentation Using Deep Multi-Task Attention Network for Non-Cooperative Iris Recognition" IEEE Transactions on Information Forensics and Security, 2022. [2] Cheng-Shun Hsiao; Chih-Peng Fan; Yin-Tsung Hwang, "Design and Analysis of Deep- Learning Based Iris Recognition Technologies by Combination of U-Net and EfficientNet"9th International Conference on Information and Education Technology (ICIET), 2022. [3] Chia-Wei Chuang; Chih-Peng Fan; Robert Chen-Hao Chang, "Design of Low-Complexity YOLOv3-Based Deep-Learning Networks with Joint Iris and Sclera Messages for Biometric Recognition Application", IEEE 9th Global Conference on Consumer Electronics (GCCE), 2022. [4] Shabab; Peter Corcoran, "Enhancing iris authentication on handheld devices using deep learning derived segmentation techniques", IEEE International Conference on Consumer Electronics (ICCE),2022. [5] Mousumi Sardar; Subhash Banerjee; Sushmita Mitra, "Iris Segmentation Using Interactive Deep Learning", IEEE Access, 2021.
  • 5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD59853 | Volume – 7 | Issue – 5 | Sep-Oct 2023 Page 15 [6] Gürkan Şahin; Orkun Susuz, "Encoder-Decoder Convolutional Neural Network Based Iris- Sclera Segmentation", 27th Signal Processing and Communications Applications Conference (SIU), 2021. [7] Ehsan eddin Jalilian; Mahmut Karakaya; Andreas, "Iris Recognition Using CNN Based Iris Segmentation", International Conference of the Biometrics Special Interest Group (BIOSIG), 2021. [8] Ananya Zabin, Thiri machos Bourlai, "A Deep Learning Based Approach to Iris Sensor Identification", IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2021. [9] Luiz A. Zanlorensi, Eduardo Luz, Rayson Laroca, Alceu S. Britto, Luiz S. Oliveira, David Menotti, "The Impact of Preprocessing on Deep Representations for Iris Recognition on Unconstrained Environments"31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), 2018. [10] Lozej; Dejan, Vitomir, Peter Peer, "Influence of segmentation on deep iris recognition performance"7th International Workshop on Biometrics and Forensics (IWBF), 2020. [11] Caiyong Wang; Yunlong Wang, Boqiang Xu; Yong He, Zhiwei Dong; Zhenan Sun, "A Lightweight Multi-Label Segmentation Network for Mobile Iris Biometrics" IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020. [12] Daniel Kerrigan, Mateusz Trokie lewicz, Adam, Kevin W. Bowyer, "Iris Recognition with Image Segmentation Employing Retrained Off-the-Shelf Deep Neural Networks", International Conference on Biometrics (ICB), 2020.