SlideShare a Scribd company logo
Iris Segmentation and Normalization
Algorithm Based on Zigzag Collarette
M. Rizky Faundra
Mathematics Department Post Graduate Student
Sepuluh Nopember Institut of Technology Surabaya
Presented on ICSAS
Syariah Hotel, Solo, 19th November 2016
MODERN
ERA
PROBLEMS
TECHNOLOGY
Biometrics
System
Security is an opportunity
What is Biometrics System?
Biometrics system is self-recognition
technology using body parts or human
behavior
Biometrics Technology
Biometrics technology has grown rapidly this decade. Some
biometrics technology such as
used as a self-replacing passwords at the important place that
requires a high security
Comparison of Biometrics
Biometrics Universality Distinctiveness Permanence Collectability
Iris High High High Medium
Fingerprints Medium High High Medium
Voice Medium Low Low Medium
Signature Low Low Low High
Face High Low Medium High
Palm Medium High High Medium
Application of Biometrics
Method Coded Pattern Misidentificati
on Rate
Security Applications
Iris Iris Pattern 1/1.200.000 High High Security
Fingerprints Finger Pattern 1/1.000 Medium Universal
Voice Voice
Characteristics
1/30 Low Telephone Service
Signature Shape of letters,
writing order, pen
pressure
1/100 Low Low Security
Face Outline, shape &
distribution of eyes,
nose
1/100 Low Low Security
Palm Size, length &
thickness hands
1/700 Low Low Security
Iris Recognition Diagram
Image
Acquisition
Iris
Segmentation Normalization
Eye Image Iris Region
Feature
Matching
IrisTemplates
Database
Feature points in the
iris region
Feature
Encoding
IrisTemplate
Identify or Reject
Subject
Focus Research
Image
Acquisition
Iris
Segmentation Normalization
Eye Image Iris Region
Feature
Encoding
Feature
Matching
IrisTemplates
Database
Feature points in the
iris region
IrisTemplate
Identify or Reject
Subject
Iris Segmentation
The method segmentation in iris has role important to the
next process, selection of part of the iris is very important
because it determines the percentage of the accuracy in
iris recognition system.
Method Selection Part of the iris
Masek Full iris selection, by eyelid and eyelash
Zhou Select 1750
, 2250
and 3100
, 3600
Kazakov Select interval 0, 450
∪ 1050
, 2250
∪ 3150
, 3600
Zigzag Collarette Area
Zigzag collarette area of the iris is located
near pupil, this area has many complex iris
pattern and concentric with the pupil.
Zigzag collarette
areaPupil
Segmentation Diagram
1. Edge Pupil Detection
Convert to
binary image
Sobel
Operator
Grouping at
an angle
Nonmaxsup Hystheresis
Finding Circle Pupil
2. Finding Circle Pupil
CIRCULAR HOUGH TRANSFORM
Centre of Pupil:
135, 182
Radius:
38
Isolation Zigzag Collarette
Closing pixel
outside
Draw circle
zigzag
Limiting only
Zigzag area
Close pupil and
eyelashes
Close eyelid
Normalization Iris
Since variations in the eye like pupil dilation and the inconsistence iris
normalization is needed. In this experiment used the formulation
Daugman Rubber Sheet Model to map the zigzag collarette into polar
form as follows:
𝐼 𝑥 𝑟, 𝜃 , 𝑦(𝑟, 𝜃) → 𝐼(𝑟, 𝜃)
with 𝑥 𝑟, 𝜃 = 1 − 𝑟 𝑥 𝑝 𝜃 + 𝑟𝑥 𝑧 𝜃
𝑦 𝑟, 𝜃 = 1 − 𝑟 𝑦𝑝 𝜃 + 𝑟𝑦𝑧 𝜃
where
𝑥 𝑝 𝜃 is the coordinates of the x-axis pupil boundary
𝑦𝑝 𝜃 is the coordinates of the y-axis pupil boundary
𝑥 𝑧 𝜃 is the coordinates of the x-axis zigzag collarette boundary
𝑦𝑧 𝜃 is the coordinates of the y-axis zigzag collarette boundary
Normalization Iris (Cont..)
Daugman Rubber Sheet Model In
Zigzag Collarete Area
Experiment Result
The proposed iris segmentation and normalisation algorithm has been
calculated and accuracy with specific threshold level to reduce edge
near pupil. The experimental result is shown in Table 3 below:
Threshold Level Accuracy
0.2
0.3
0.4
0.5
88.88%
98.88%
97.78%
73.33%
Table 3. Accuracy of Specific Threshold Level
Conclusion
1. Canny edge detection and Hough transform can be
localized pupil near zigzag area very well then
Daugman Rubber Sheet Model can represent isolation
zigzag collarette.
2. The experiment result show that algorithm can reduce
edge near pupil with high performance of 98.88 percent
with specific threshold level is 0.3.
3. Next experiment we will study about feature encoding
and matching to get whole accuracy iris recognition
system
References
[1] Anil K. Jain, Sharath Pankanti and Salil Prabhakar, “Biometric Recognition: Security and
Privacy Concerns”, IEEE Security & Privacy, 2003.
[2] Li Ma, Yunhong Wang, Tieniu Tan, “Iris Recognition Based on Multichannel Gabor Filter”,
ACCV2002: The 5th Asian Conference on Computer Vision, 2002.
[3] Adler F. H., “Physiology of the Eye: Clinical Application”, The C.V. Mosby Company, 1965.
[4] John Daugman, ”New Methods in Iris Recognition”, IEEE Transactions On Systems, Man,
And Cybernetics—Part B: Cybernetics, Vol. 37, No. 5, 2007
[5] Lijun Zhou, Yide Ma, Jing Lian and Zhaobin Wang, “A New Effective Algorithm for Iris
Location”, Proceeding of the IEEE International Conference on Robotics and Biometrics
(ROBIO), Shenzhen, China, 2013.
[6] Todor Kazakov, “Iris Detection and Normalization”, University of Birmingham Thesis, 2011.
[7] John Canny, “A Computational Approach to Edge Detection”, Pattern Analysis and Machine
Intelligence, IEEE Transactions on, PAMI-8(6):679–698, 1986.
[8] P.V.C. Hough, “Method and Means for Recognizing Complex Patterns”, U.S. Patent
3069654, 1962.
[9] CASIA iris image database.<http: //www.cbsr.ia.ac.cn/IrisDatabase>.
[10] Himansu Rai, “Iris Recognition Using Combined Support Vector Machine and Hamming
Distance Approach”. Expert Systems with Applications 41 (2014) 588–593, 2014.
TERIMA KASIH

More Related Content

What's hot

Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
Ahmed Tememe
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
Nilu Desai
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
ARUNASUJITHA
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
Iris Scan
Iris ScanIris Scan
Iris Scan
Matang Saxena
 
A fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties methodA fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties method
journalBEEI
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
shyamalaramesh2
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
sukanya thatamsetty
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
DexterChess
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
srinivasanece7
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
shams tabrez
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
AmbikaM8
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
Ankit Kumar
 
Seminar
SeminarSeminar
Seminar
ARJUN K P
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
Ajinkya Bhalerao
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
Piyush Mittal
 

What's hot (20)

Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
A fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties methodA fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties method
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Seminar
SeminarSeminar
Seminar
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 

Similar to Seminar internasional Universitas Negeri Surakarta

L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
Sunil Kumar Chawla
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
ijcsit
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
IRJET Journal
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
cscpconf
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditions
ijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
50120130406045
5012013040604550120130406045
50120130406045
IAEME Publication
 
Enhance iris segmentation method for person recognition based on image proces...
Enhance iris segmentation method for person recognition based on image proces...Enhance iris segmentation method for person recognition based on image proces...
Enhance iris segmentation method for person recognition based on image proces...
TELKOMNIKA JOURNAL
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
E010222124
E010222124E010222124
E010222124
IOSR Journals
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
Manish Kumar
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a survey
IJMER
 
IRIS RECOGNISATION
IRIS RECOGNISATION IRIS RECOGNISATION
IRIS RECOGNISATION
dont
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
IJERA Editor
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
IJERA Editor
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
 
237 240
237 240237 240

Similar to Seminar internasional Universitas Negeri Surakarta (20)

L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditions
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
50120130406045
5012013040604550120130406045
50120130406045
 
Enhance iris segmentation method for person recognition based on image proces...
Enhance iris segmentation method for person recognition based on image proces...Enhance iris segmentation method for person recognition based on image proces...
Enhance iris segmentation method for person recognition based on image proces...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
E010222124
E010222124E010222124
E010222124
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a survey
 
IRIS RECOGNISATION
IRIS RECOGNISATION IRIS RECOGNISATION
IRIS RECOGNISATION
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
237 240
237 240237 240
237 240
 

Recently uploaded

Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
mahaffeycheryld
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 

Recently uploaded (20)

Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 

Seminar internasional Universitas Negeri Surakarta

  • 1. Iris Segmentation and Normalization Algorithm Based on Zigzag Collarette M. Rizky Faundra Mathematics Department Post Graduate Student Sepuluh Nopember Institut of Technology Surabaya Presented on ICSAS Syariah Hotel, Solo, 19th November 2016
  • 3. What is Biometrics System? Biometrics system is self-recognition technology using body parts or human behavior
  • 4. Biometrics Technology Biometrics technology has grown rapidly this decade. Some biometrics technology such as used as a self-replacing passwords at the important place that requires a high security
  • 5. Comparison of Biometrics Biometrics Universality Distinctiveness Permanence Collectability Iris High High High Medium Fingerprints Medium High High Medium Voice Medium Low Low Medium Signature Low Low Low High Face High Low Medium High Palm Medium High High Medium
  • 6. Application of Biometrics Method Coded Pattern Misidentificati on Rate Security Applications Iris Iris Pattern 1/1.200.000 High High Security Fingerprints Finger Pattern 1/1.000 Medium Universal Voice Voice Characteristics 1/30 Low Telephone Service Signature Shape of letters, writing order, pen pressure 1/100 Low Low Security Face Outline, shape & distribution of eyes, nose 1/100 Low Low Security Palm Size, length & thickness hands 1/700 Low Low Security
  • 7. Iris Recognition Diagram Image Acquisition Iris Segmentation Normalization Eye Image Iris Region Feature Matching IrisTemplates Database Feature points in the iris region Feature Encoding IrisTemplate Identify or Reject Subject
  • 8. Focus Research Image Acquisition Iris Segmentation Normalization Eye Image Iris Region Feature Encoding Feature Matching IrisTemplates Database Feature points in the iris region IrisTemplate Identify or Reject Subject
  • 9. Iris Segmentation The method segmentation in iris has role important to the next process, selection of part of the iris is very important because it determines the percentage of the accuracy in iris recognition system. Method Selection Part of the iris Masek Full iris selection, by eyelid and eyelash Zhou Select 1750 , 2250 and 3100 , 3600 Kazakov Select interval 0, 450 ∪ 1050 , 2250 ∪ 3150 , 3600
  • 10. Zigzag Collarette Area Zigzag collarette area of the iris is located near pupil, this area has many complex iris pattern and concentric with the pupil. Zigzag collarette areaPupil
  • 11. Segmentation Diagram 1. Edge Pupil Detection Convert to binary image Sobel Operator Grouping at an angle Nonmaxsup Hystheresis
  • 12. Finding Circle Pupil 2. Finding Circle Pupil CIRCULAR HOUGH TRANSFORM Centre of Pupil: 135, 182 Radius: 38
  • 13. Isolation Zigzag Collarette Closing pixel outside Draw circle zigzag Limiting only Zigzag area Close pupil and eyelashes Close eyelid
  • 14. Normalization Iris Since variations in the eye like pupil dilation and the inconsistence iris normalization is needed. In this experiment used the formulation Daugman Rubber Sheet Model to map the zigzag collarette into polar form as follows: 𝐼 𝑥 𝑟, 𝜃 , 𝑦(𝑟, 𝜃) → 𝐼(𝑟, 𝜃) with 𝑥 𝑟, 𝜃 = 1 − 𝑟 𝑥 𝑝 𝜃 + 𝑟𝑥 𝑧 𝜃 𝑦 𝑟, 𝜃 = 1 − 𝑟 𝑦𝑝 𝜃 + 𝑟𝑦𝑧 𝜃 where 𝑥 𝑝 𝜃 is the coordinates of the x-axis pupil boundary 𝑦𝑝 𝜃 is the coordinates of the y-axis pupil boundary 𝑥 𝑧 𝜃 is the coordinates of the x-axis zigzag collarette boundary 𝑦𝑧 𝜃 is the coordinates of the y-axis zigzag collarette boundary
  • 15. Normalization Iris (Cont..) Daugman Rubber Sheet Model In Zigzag Collarete Area
  • 16. Experiment Result The proposed iris segmentation and normalisation algorithm has been calculated and accuracy with specific threshold level to reduce edge near pupil. The experimental result is shown in Table 3 below: Threshold Level Accuracy 0.2 0.3 0.4 0.5 88.88% 98.88% 97.78% 73.33% Table 3. Accuracy of Specific Threshold Level
  • 17. Conclusion 1. Canny edge detection and Hough transform can be localized pupil near zigzag area very well then Daugman Rubber Sheet Model can represent isolation zigzag collarette. 2. The experiment result show that algorithm can reduce edge near pupil with high performance of 98.88 percent with specific threshold level is 0.3. 3. Next experiment we will study about feature encoding and matching to get whole accuracy iris recognition system
  • 18. References [1] Anil K. Jain, Sharath Pankanti and Salil Prabhakar, “Biometric Recognition: Security and Privacy Concerns”, IEEE Security & Privacy, 2003. [2] Li Ma, Yunhong Wang, Tieniu Tan, “Iris Recognition Based on Multichannel Gabor Filter”, ACCV2002: The 5th Asian Conference on Computer Vision, 2002. [3] Adler F. H., “Physiology of the Eye: Clinical Application”, The C.V. Mosby Company, 1965. [4] John Daugman, ”New Methods in Iris Recognition”, IEEE Transactions On Systems, Man, And Cybernetics—Part B: Cybernetics, Vol. 37, No. 5, 2007 [5] Lijun Zhou, Yide Ma, Jing Lian and Zhaobin Wang, “A New Effective Algorithm for Iris Location”, Proceeding of the IEEE International Conference on Robotics and Biometrics (ROBIO), Shenzhen, China, 2013. [6] Todor Kazakov, “Iris Detection and Normalization”, University of Birmingham Thesis, 2011. [7] John Canny, “A Computational Approach to Edge Detection”, Pattern Analysis and Machine Intelligence, IEEE Transactions on, PAMI-8(6):679–698, 1986. [8] P.V.C. Hough, “Method and Means for Recognizing Complex Patterns”, U.S. Patent 3069654, 1962. [9] CASIA iris image database.<http: //www.cbsr.ia.ac.cn/IrisDatabase>. [10] Himansu Rai, “Iris Recognition Using Combined Support Vector Machine and Hamming Distance Approach”. Expert Systems with Applications 41 (2014) 588–593, 2014.