SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 7, No. 5, October 2017, pp. 2530~2536
ISSN: 2088-8708, DOI: 10.11591/ijece.v7i5.pp2530-2536  2530
Journal homepage: http://iaesjournal.com/online/index.php/IJECE
A New Approach of Iris Detection and Recognition
Rubel Biswas, Jia Uddin, Md. Junayed Hasan
Departement of Computer Science and Engineering, BRAC University, Bangladesh
Article Info ABSTRACT
Article history:
Received Feb 26, 2017
Revised Jun 17, 2017
Accepted Sep 11, 2017
This paper proposes an IRIS recognition and detection model for measuring
the e-security. This proposed model consists of the following blocks:
segmentation and normalization, feature encoding and feature extraction, and
classification. In first phase, histogram equalization and canny edge detection
is used for object detection. And then, Hough Transformation is utilized for
detecting the center of the pupil of an IRIS. In second phase, Daugmen’s
Rubber Sheet model and Log Gabor filter is used for normalization and
encoding and as a feature extraction method GNS (Global Neighborhood
Structure) map is used, finally extracted feature of GNS is feed to the SVM
(Support Vector Machine) for training and testing. For our tested dataset,
experimental results demonstrate 92% accuracy in real portion and 86%
accuracy in imaginary portion for both eyes. In addition, our proposed model
outperforms than other two conventional methods exhibiting higher
accuracy.
Keywords:
Daugman’s rubber sheet
DNS (Dominant Neighborhood
Structure)
E-Secuirity
GNS (Global Neighborhood
Structure)
Iris recognition Copyright © 2017 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Jia Uddin, Assistant Professor
Departement of Computer Science and Engineering,
BRAC University,
66 Mohakhali, Dhaka 1212, Bangladesh.
Email: jia.uddin@bracu.ac.bd
1. INTRODUCTION
For the authentication of the identity of an individual, biometric recognition is a reliable way. For
biometric authentication, several physical stable characteristics, such as fingerprints, voice recognition, hand
geometry, hand writing, the retina, iris recognition are used. Among the characteristics, most of them require
the some physical actions of sensing device or some special actions [1]. To overcome the barrier like the
physical contacts, automated recognition technique is an alternative and less invasive. Iris recognition
technique is one of them[13].
Figure 1. Details of the portions of human eye
This noninvasive verification technique for the identification of individuals is more practical
because the pattern of the human iris is unique, distinctive and stable throughout the adult life [1]. Figure 1
illustrates a generalized overview of human eye; from it we can see the position of each portions of the eye.
IJECE ISSN: 2088-8708 
A New Approach of Iris Detection and Recognition (Rubel Biswas)
2531
From the human eyes, we can get the pattern of the iris which is identical and reliable for human
identification purpose. Previously, a number of researchers worked on Iris recognition. In most of the
conventional methods, researchers worked on either Iris localization or Iris pattern recognition. For Iris
localization most of the researchers use Daugman’s Iris recognition model [2]. In Daugman’s model, a 256
byte code is generated by quantizing the local phase angle based on the result of the filtered image. With a
quiet different approach the Wildes system fragmented a standardized connection based on goodness-of-
match values and Fisher’s linear discriminant for pattern identification [3]. Jiali Cui el al.[4] proposed an iris
detection algorithm based on principal component analysis. HyungGu Lee el al. utilized the binary feature
for Iris detection [5].
On these varieties of method, feature vector is not main key feature for detection techniques except
the Daugman’s model. For the numerical presentation of the character of any object, for the benefit in
statistical procedures and defining the characteristics into some dimensional vectors, feature vector approach
is more reliable. Beside these, selecting the optimal feature is also a vital criteria.
In our proposed model, we utilized the Daugman’s model. After feature encoding, DNS and GNS
maps [6, 7] are used to reduce the size of the feature vector and extract the feature vector of our tested IRIS
dataset. For the machine learning purpose on recognition phase, single class support vector machine has been
used.
In addition, we have compared the performance of our proposed approach considering the same
environment with two other approaches: one is proposed by Li M. el al. [8], another one by K. Sathiyarajael
al.[9]. However, the recent performance comparison in the area of iris recognition and detection depends on
how far the accyracy, efficacy and scalability performance can be increased [15].
Iris dection and recognition is an important pre-processing step in automatic automatic systems and a
well-designed technique can improve the accuracy in collecting clear iris images and mark noise areas
[16].The paper is organized as follows – Section 2 describes the overview in depth of our proposed model.
The results of the experiments carried out and their analysis are included in Section 3 and finally Section 4
concludes the paper.
2. RESEARCH METHOD
Figure 2 presents a detailed implementation of our research model, in which we highlight the major
portions by drawing seperate blocks.
Figure 2.The full steps of the IRIS detection and recognition model
 ISSN: 2088-8708
IJECE Vol. 7, No. 5, October 2017 : 2530 – 2536
2532
2.1. Segmentation
At the beginning of processing of the input image, some steps are required to ensure better
performance from the system. We have used histogram equalization technique to adjust the image intensities
in order to enhance contrast. For improving the edge detection, we have considered image adjustment. For
the edge detection part, we have used Canny Edge Detection Algorithm (CEDA) [10]. CEDA is a multi-stage
algorithm to detect a wide range of edges in the image. By smoothing the image with the help of Gaussian
filter the noise will be removed. Then this algorithm finds the intensity gradients of the image and then non-
maximum suppression is applied to get rid of spurious response to edge detection. Figure 2 shows that in
Segmentation portion (A), for pupil and boundary selection Hogh transformation has been used and for
sclera/IRIS detection, mid point algorithm has been used.
For iris detection, in our system, we have implemented an automatic segmentation process with the
help of two algorithms. Initially, we check for the corneal reflection. We have taken the complement of the
given image and then we removed the dark points (reflection points). After that, from the given image we
have calculated the first derivatives of intensity values by calculating the result based on threshold value we
generate an edge map. The parameters of circles (center coordinates and the radius) are evaluated by voting
in Hough space. In order to detect the pupil we bias the first derivative in vertical direction. Finally, we have
drawn a circle by doubling the pupil radius.
2.2. Normalization
Daugman’s model [2] is used for the normalization of our segmented iris regions. We have made
sure that for all the normalized images must have the same resolution. We considered the center of the pupil
as the reference point. We have passed the radial vectors through the iris region. The selected data points
along each radial line are known as radial resolution. The number of radial lines going around the iris region
are known as radial resolution where the number of radial lines going around the iris region are defined as
angular resolution [14].
Because of the non-concentric nature of the pupil to the iris, to rescale points a remapping formula is
needed based on the angle around the circle. The formula is
(1)
With
(2)
(3)
Here, (Ox, Oy) represents the center displacement of the pupil compare to iris center. r′
represents the
distance between the edges of pupil and iris. is the angle based on the edges were counted. r1 is the radius of
the iris[14].
Figure 3.Rectangular sheet formation from circular area of Daugman’s rubber sheet model
The function first gives a ‘doughnut’ form to the iris region based on the angle. From this
‘doughnut’ form iris region we construct a 2D array with horizontal dimension of angular resolution and
vertical dimension of the radial resolution [1]. Figure 3 shows the main structural visualization of producing
the rectangular area from the circular radius of Daugman’s rubber sheet model.
IJECE ISSN: 2088-8708 
A New Approach of Iris Detection and Recognition (Rubel Biswas)
2533
2.3. Feature Encoding
The template matrix size is set in such a way by doubling the column size of the normalized iris
image and the row is kept same. The reason behind this – in our template both the real and imaginary value
will participate. After that, the normalized iris pattern is convoluted with 1D Log-Gabor wavelets. First 1D
signals are generated from 2D normalized iris pattern and then Gabor filter is used to those 1D signals. In the
Log –Gabor equation we used the following value. The value f0 is set to 18 which represents a scale 4 Gabor
wavelet. From the experiment, we set the value of sigma over frequency to the 0.5.
(4)
Where G is the Gabor filtered function.f0 and σ are the parameters of the filter. f0 will give the
center frequency of the filter [12].Log-Gabor filter returns a matrix with complex valued element with the
size of normalized iris image. After that, two new matrix is created from based on the real part and imaginary
part of Log-Gabor returned matrix. Thereafter, the raw data of these is converted to pseudo-polar coordinate
system.Then, the values of the real part matrix and imaginary part matrix in converted into binary value.
Finally, by merging these two matrix we get the template of a human. The data is set in such a way that the
odd columns contains real part matrix value and the even columns holds imaginary matrix value. We also
calculated absolute values. Figure 4 shows the phase quantization process in short. From this figure, the
process of collecting the real and imaginary response of the image after applying applying Log Gabor Filter;
has been visualized.
Figure 4. Phase quantization process of feature encoding
2.4. Texture Feature Extarction
For feature extraction, from the Gabor filtered image getting from feature encoding phase, we
construct the DNS [6] maps according to the statistical parameters of Table 1. From Table 1 we are getting
the exact parameters of the GNS and DNS map. We then calculate GNS feature vectors by averaging the
DNS [6, 7] values of the filtered image. For selecting the most significant features from the GNS map which
exhibits spatial textures, we select only the features in the concentric circles of various radii at the center of
the map. In our experiment, 8 and 16 features from first two innermost circles, 24 uniform angular features
from each of the other 8 circles are considered to construct the feature vector. Therefore, the number of
dimensions of the feature vector is 216 (=8+16+8x24). Figure 6 exhibits the steps of GNS and DNS map
extraction from Gabor filtered image.
 ISSN: 2088-8708
IJECE Vol. 7, No. 5, October 2017 : 2530 – 2536
2534
Table 1. Statistical parameters of DNS and GNS maps used in the experiment
Parameters Values
Searching window size 21x21
Neighbor window 13x13
Number of central pixels 144
Size of DNS map 21x21
Size of GNS map 21x21
Gap between two central pixels 5
Total number of dimensions of feature vector 216
2.5. Training
In the training and testing, we utilize SVM (Single Class) with a Gaussian radial kernel function [6, 7]
The Gaussian radial basis kernel function is represented as:
𝑘 (𝑆𝑉𝑖 − 𝑆𝑉𝑗) = 𝑒𝑥𝑝
|𝑆𝑉𝑖 − 𝑆𝑉𝑗|2
2𝜎2 (5)
Where 𝑘 (𝑆𝑉𝑖 − 𝑆𝑉𝑗)is the kernel function, 𝑆𝑉𝑖 and 𝑆𝑉𝑗 are the input feature vectors, and σ is a
parameter set by users to determine the effective width of the basis kernel function [14].
3. RESULTS AND ANALYSIS
To validate the proposed model, CASIA-Iris-Interval dataset V3.0 [11] has been used. Also we have
used the same dataset for comparison portion. This data set is consisting of six subset. Among those we have
considered 200 images in total, in which we have utilized 70% data for training and 30% data for testing
purposes for each eye of the individual.
Figure 5. The output block of the whole process to get the GNS for right eye
Figure 5 demonstrate the output blocks for each steps according to our propose model for the right eye
from detection to GNS.After the detection of the eye, we eliminate the refection and then we detect the inner
circle. From the rubber sheet image of the eye, we get imaginary and real response. Then we calculate the
IJECE ISSN: 2088-8708 
A New Approach of Iris Detection and Recognition (Rubel Biswas)
2535
GNS part and from that result, we get the real, imaginary and absolute results. For iris detection phase, we
have considered the real and imaginary values.
Table 2. Experimental Results Details for Training and Testing for Both Eye for
Their Real and Imaginary Values
Eye Considered
Value
Train/
person
Test/
person
Recognized out of
50 persons
Perchantage of
Accurecy
Left Real 70% 30% 44 88%
Left Imaginary 70% 30% 40 80%
Right Real 70% 30% 43 86%
Right Imaginary 70% 30% 39 78%
Combined Real 70% 30% 46 92%
Combined Imaginary 70% 30% 43 86%
According to Table 2, experimental result shows that our proposed model gives 92% accuracy for
combined real portion recognition and 86% accuracy for combined imaginary portion. For each case, the real
part always exhibits accuracy of more than 86% while the imaginary one exhibits always more than 78%,
which concludes a good amount of percentage of accuracy. We have compared our proposed model with two
other conventional approaches: one is by Li M.el al.[17] and other one is by K. Sathiyaraja el al. [18].
Figure 6. The comparison chart among our model vs. algorithm 1 vs. algorithm 2 for both real and imaginary
value for both eye
From Figure 6, we have seen that for combined real and imaginary part, our proposed model gives a
better performance than two other stated models: Li M. el al. [17] as algorithm 1 and K. Sathiyaraja el al.
[18] as algorithm 2. It is clearly visible that while for real portion the algorithm 1 and 2 is giving the result of
86% and 84%, ours one is giving 92%, which is really significant. Beside these, imaginary portion is giving
86% recognition accuracy while algorithm 1 and 2 is giving 82% and 81%.
4. CONCLUSION
In our proposed model, for segmentation purpose we have used Hough Transformation. Then
Daugman’s Rubber Shhet model is utilized for normalization purpose. For reducing the number of feature
vector we have used GNS and DNS mapping, which creates significant changes on experimental result.
Overall, we have got 92% accuracy in real portion and 86% accuracy in imaginary portion for both eyesalong
with the reduced dimension of 216 feature vector.
 ISSN: 2088-8708
IJECE Vol. 7, No. 5, October 2017 : 2530 – 2536
2536
REFERENCES
[1] R.P. Wildes "Iris Recognition: An Emerging Biometric Technology" Proc. IEEE vol. 85 no. 9 pp. 1348-1363 1997.
[2] J. Daugman. How iris recognition works. Proceedings of 2002 International Conference on Image Processing, Vol.
1, 2002.
[3] Wildes, R.P., Asmuth, J.C. et al., "A System for Automated Iris Recognition", Proc. of the Second IEEE Workshop
on Applications of Computer Vision, 1994, pp.121-128.
[4] Jiali Cui, Yunhong Wang, JunZhou Huang, Tieniu Tan and Zhenan Sun, “An Iris Image Synthesis Method Based on
PCA and Super-resolution”, IEEE CS Proceedings of the 17th International Conference on Pattern Recognition
(ICPR’04).2004.
[5] A Yuniarti, "Classification and numbering of dental radiographs for an automated human identification system,”
TELKOMNIKA Telecommunication, Computing, Electronics and Control., vol. 10, no. 1, pp. 137-146, 2012.
[6] Khellah FM. Texture Classification Using Dominant Neighborhood Structure. IEEE Transaction on Image
Processing 2011; 20(11):3270-3279.
[7] J. Uddin, M. Kang, D. V. Nguyen, and J.-M. Kim, “Reliable fault classification of induction motors using texture
feature extraction and a multiclass support vector machine,” Mathematical Problems in Engineering, vol. 2014,
Article ID 814593, 9 pages, 2014.
[8] L. Ma, T. Tan, Y. Wang and D. Zhang, “Efficient Iris Recognition by Characterizing Key Local Variations”, IEEE
Transactions on Image Processing, Vol. 13, No. 6, 2004, pp. 739.
[9] IKGD Putra, E Erdiawan, "High performance palmprint identification system based on two dimensional gabor,”
TELKOMNIKA Telecommunication Computing Electronics and Control., vol. 8, no. 3, pp. 309-318, 2010.
[10] "The CASIA iris image database", [online] Available: http://biometrics.idealtest.org.
[11] D. J. Field. Relations between the statistics of natural images and the response properties of cortical cells. J. Opt.
Soc. Am. A, 1987, pp. 2379-2394.
[12] Naseem I, Aleem A, Togneri R, Bennamoun M, “Iris recognition using class-specific dictionaries”, Computers &
Electrical Engineering, Feb 18, 2016.
[13] Anwar, A. M. "An Iris detection and recognition system to measure the performance of E-security." Diss., BRAC
University, 2016.
[14] G. Indrawan, S. Akbar and B. Sitohang, “Fingerprint Direct-Access Strategy Using Local-Star-Structure based
Discriminator Features: A Comparison Study,” International Journal of Electrical and Computer Engineering
(IJECE).” vol. 4, no.5,October 2014, pp. 817-830.
[15] S. Saparudin, S. Akbar and G. Sulong, “Segmentation of Fingerprint Image Based on Gradient Magnitude and
Coherence,” International Journal of Electrical and Computer Engineering (IJECE)” vol.5, no.5, October 201, pp.
834-849.

More Related Content

What's hot

EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...IJECEIAES
 
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...IJCSIS Research Publications
 
Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform IJECEIAES
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmEditor IJCATR
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filtersIAEME Publication
 
A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationeSAT Publishing House
 
A survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodsA survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodseSAT Journals
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...IJECEIAES
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET Journal
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques CSCJournals
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsijcseit
 
Recent developments in iris based biometric
Recent developments in iris based biometricRecent developments in iris based biometric
Recent developments in iris based biometriceSAT Publishing House
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001vital vital
 

What's hot (19)

EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
 
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
 
D04402024029
D04402024029D04402024029
D04402024029
 
Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filters
 
D45012128
D45012128D45012128
D45012128
 
A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimation
 
A survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodsA survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methods
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditions
 
Recent developments in iris based biometric
Recent developments in iris based biometricRecent developments in iris based biometric
Recent developments in iris based biometric
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Aa4102207210
Aa4102207210Aa4102207210
Aa4102207210
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001
 

Similar to A New Approach of Iris Detection and Recognition

Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkijcsit
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 
Secure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognitionijsrd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAReal Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAIRJET Journal
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...TELKOMNIKA JOURNAL
 
IRJET- Shape based Image Classification using Geometric ­–Properties
IRJET-  	  Shape based Image Classification using Geometric ­–PropertiesIRJET-  	  Shape based Image Classification using Geometric ­–Properties
IRJET- Shape based Image Classification using Geometric ­–PropertiesIRJET Journal
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001vital vital
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...IJECEIAES
 
An Experiment with Sparse Field and Localized Region Based Active Contour Int...
An Experiment with Sparse Field and Localized Region Based Active Contour Int...An Experiment with Sparse Field and Localized Region Based Active Contour Int...
An Experiment with Sparse Field and Localized Region Based Active Contour Int...CSCJournals
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 

Similar to A New Approach of Iris Detection and Recognition (20)

Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
E017443136
E017443136E017443136
E017443136
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
Secure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognition
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Iris sem
Iris semIris sem
Iris sem
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAReal Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
 
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris RecognitionComparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFT
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...
 
IRJET- Shape based Image Classification using Geometric ­–Properties
IRJET-  	  Shape based Image Classification using Geometric ­–PropertiesIRJET-  	  Shape based Image Classification using Geometric ­–Properties
IRJET- Shape based Image Classification using Geometric ­–Properties
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
 
An Experiment with Sparse Field and Localized Region Based Active Contour Int...
An Experiment with Sparse Field and Localized Region Based Active Contour Int...An Experiment with Sparse Field and Localized Region Based Active Contour Int...
An Experiment with Sparse Field and Localized Region Based Active Contour Int...
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 

Recently uploaded (20)

KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 

A New Approach of Iris Detection and Recognition

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 7, No. 5, October 2017, pp. 2530~2536 ISSN: 2088-8708, DOI: 10.11591/ijece.v7i5.pp2530-2536  2530 Journal homepage: http://iaesjournal.com/online/index.php/IJECE A New Approach of Iris Detection and Recognition Rubel Biswas, Jia Uddin, Md. Junayed Hasan Departement of Computer Science and Engineering, BRAC University, Bangladesh Article Info ABSTRACT Article history: Received Feb 26, 2017 Revised Jun 17, 2017 Accepted Sep 11, 2017 This paper proposes an IRIS recognition and detection model for measuring the e-security. This proposed model consists of the following blocks: segmentation and normalization, feature encoding and feature extraction, and classification. In first phase, histogram equalization and canny edge detection is used for object detection. And then, Hough Transformation is utilized for detecting the center of the pupil of an IRIS. In second phase, Daugmen’s Rubber Sheet model and Log Gabor filter is used for normalization and encoding and as a feature extraction method GNS (Global Neighborhood Structure) map is used, finally extracted feature of GNS is feed to the SVM (Support Vector Machine) for training and testing. For our tested dataset, experimental results demonstrate 92% accuracy in real portion and 86% accuracy in imaginary portion for both eyes. In addition, our proposed model outperforms than other two conventional methods exhibiting higher accuracy. Keywords: Daugman’s rubber sheet DNS (Dominant Neighborhood Structure) E-Secuirity GNS (Global Neighborhood Structure) Iris recognition Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Jia Uddin, Assistant Professor Departement of Computer Science and Engineering, BRAC University, 66 Mohakhali, Dhaka 1212, Bangladesh. Email: jia.uddin@bracu.ac.bd 1. INTRODUCTION For the authentication of the identity of an individual, biometric recognition is a reliable way. For biometric authentication, several physical stable characteristics, such as fingerprints, voice recognition, hand geometry, hand writing, the retina, iris recognition are used. Among the characteristics, most of them require the some physical actions of sensing device or some special actions [1]. To overcome the barrier like the physical contacts, automated recognition technique is an alternative and less invasive. Iris recognition technique is one of them[13]. Figure 1. Details of the portions of human eye This noninvasive verification technique for the identification of individuals is more practical because the pattern of the human iris is unique, distinctive and stable throughout the adult life [1]. Figure 1 illustrates a generalized overview of human eye; from it we can see the position of each portions of the eye.
  • 2. IJECE ISSN: 2088-8708  A New Approach of Iris Detection and Recognition (Rubel Biswas) 2531 From the human eyes, we can get the pattern of the iris which is identical and reliable for human identification purpose. Previously, a number of researchers worked on Iris recognition. In most of the conventional methods, researchers worked on either Iris localization or Iris pattern recognition. For Iris localization most of the researchers use Daugman’s Iris recognition model [2]. In Daugman’s model, a 256 byte code is generated by quantizing the local phase angle based on the result of the filtered image. With a quiet different approach the Wildes system fragmented a standardized connection based on goodness-of- match values and Fisher’s linear discriminant for pattern identification [3]. Jiali Cui el al.[4] proposed an iris detection algorithm based on principal component analysis. HyungGu Lee el al. utilized the binary feature for Iris detection [5]. On these varieties of method, feature vector is not main key feature for detection techniques except the Daugman’s model. For the numerical presentation of the character of any object, for the benefit in statistical procedures and defining the characteristics into some dimensional vectors, feature vector approach is more reliable. Beside these, selecting the optimal feature is also a vital criteria. In our proposed model, we utilized the Daugman’s model. After feature encoding, DNS and GNS maps [6, 7] are used to reduce the size of the feature vector and extract the feature vector of our tested IRIS dataset. For the machine learning purpose on recognition phase, single class support vector machine has been used. In addition, we have compared the performance of our proposed approach considering the same environment with two other approaches: one is proposed by Li M. el al. [8], another one by K. Sathiyarajael al.[9]. However, the recent performance comparison in the area of iris recognition and detection depends on how far the accyracy, efficacy and scalability performance can be increased [15]. Iris dection and recognition is an important pre-processing step in automatic automatic systems and a well-designed technique can improve the accuracy in collecting clear iris images and mark noise areas [16].The paper is organized as follows – Section 2 describes the overview in depth of our proposed model. The results of the experiments carried out and their analysis are included in Section 3 and finally Section 4 concludes the paper. 2. RESEARCH METHOD Figure 2 presents a detailed implementation of our research model, in which we highlight the major portions by drawing seperate blocks. Figure 2.The full steps of the IRIS detection and recognition model
  • 3.  ISSN: 2088-8708 IJECE Vol. 7, No. 5, October 2017 : 2530 – 2536 2532 2.1. Segmentation At the beginning of processing of the input image, some steps are required to ensure better performance from the system. We have used histogram equalization technique to adjust the image intensities in order to enhance contrast. For improving the edge detection, we have considered image adjustment. For the edge detection part, we have used Canny Edge Detection Algorithm (CEDA) [10]. CEDA is a multi-stage algorithm to detect a wide range of edges in the image. By smoothing the image with the help of Gaussian filter the noise will be removed. Then this algorithm finds the intensity gradients of the image and then non- maximum suppression is applied to get rid of spurious response to edge detection. Figure 2 shows that in Segmentation portion (A), for pupil and boundary selection Hogh transformation has been used and for sclera/IRIS detection, mid point algorithm has been used. For iris detection, in our system, we have implemented an automatic segmentation process with the help of two algorithms. Initially, we check for the corneal reflection. We have taken the complement of the given image and then we removed the dark points (reflection points). After that, from the given image we have calculated the first derivatives of intensity values by calculating the result based on threshold value we generate an edge map. The parameters of circles (center coordinates and the radius) are evaluated by voting in Hough space. In order to detect the pupil we bias the first derivative in vertical direction. Finally, we have drawn a circle by doubling the pupil radius. 2.2. Normalization Daugman’s model [2] is used for the normalization of our segmented iris regions. We have made sure that for all the normalized images must have the same resolution. We considered the center of the pupil as the reference point. We have passed the radial vectors through the iris region. The selected data points along each radial line are known as radial resolution. The number of radial lines going around the iris region are known as radial resolution where the number of radial lines going around the iris region are defined as angular resolution [14]. Because of the non-concentric nature of the pupil to the iris, to rescale points a remapping formula is needed based on the angle around the circle. The formula is (1) With (2) (3) Here, (Ox, Oy) represents the center displacement of the pupil compare to iris center. r′ represents the distance between the edges of pupil and iris. is the angle based on the edges were counted. r1 is the radius of the iris[14]. Figure 3.Rectangular sheet formation from circular area of Daugman’s rubber sheet model The function first gives a ‘doughnut’ form to the iris region based on the angle. From this ‘doughnut’ form iris region we construct a 2D array with horizontal dimension of angular resolution and vertical dimension of the radial resolution [1]. Figure 3 shows the main structural visualization of producing the rectangular area from the circular radius of Daugman’s rubber sheet model.
  • 4. IJECE ISSN: 2088-8708  A New Approach of Iris Detection and Recognition (Rubel Biswas) 2533 2.3. Feature Encoding The template matrix size is set in such a way by doubling the column size of the normalized iris image and the row is kept same. The reason behind this – in our template both the real and imaginary value will participate. After that, the normalized iris pattern is convoluted with 1D Log-Gabor wavelets. First 1D signals are generated from 2D normalized iris pattern and then Gabor filter is used to those 1D signals. In the Log –Gabor equation we used the following value. The value f0 is set to 18 which represents a scale 4 Gabor wavelet. From the experiment, we set the value of sigma over frequency to the 0.5. (4) Where G is the Gabor filtered function.f0 and σ are the parameters of the filter. f0 will give the center frequency of the filter [12].Log-Gabor filter returns a matrix with complex valued element with the size of normalized iris image. After that, two new matrix is created from based on the real part and imaginary part of Log-Gabor returned matrix. Thereafter, the raw data of these is converted to pseudo-polar coordinate system.Then, the values of the real part matrix and imaginary part matrix in converted into binary value. Finally, by merging these two matrix we get the template of a human. The data is set in such a way that the odd columns contains real part matrix value and the even columns holds imaginary matrix value. We also calculated absolute values. Figure 4 shows the phase quantization process in short. From this figure, the process of collecting the real and imaginary response of the image after applying applying Log Gabor Filter; has been visualized. Figure 4. Phase quantization process of feature encoding 2.4. Texture Feature Extarction For feature extraction, from the Gabor filtered image getting from feature encoding phase, we construct the DNS [6] maps according to the statistical parameters of Table 1. From Table 1 we are getting the exact parameters of the GNS and DNS map. We then calculate GNS feature vectors by averaging the DNS [6, 7] values of the filtered image. For selecting the most significant features from the GNS map which exhibits spatial textures, we select only the features in the concentric circles of various radii at the center of the map. In our experiment, 8 and 16 features from first two innermost circles, 24 uniform angular features from each of the other 8 circles are considered to construct the feature vector. Therefore, the number of dimensions of the feature vector is 216 (=8+16+8x24). Figure 6 exhibits the steps of GNS and DNS map extraction from Gabor filtered image.
  • 5.  ISSN: 2088-8708 IJECE Vol. 7, No. 5, October 2017 : 2530 – 2536 2534 Table 1. Statistical parameters of DNS and GNS maps used in the experiment Parameters Values Searching window size 21x21 Neighbor window 13x13 Number of central pixels 144 Size of DNS map 21x21 Size of GNS map 21x21 Gap between two central pixels 5 Total number of dimensions of feature vector 216 2.5. Training In the training and testing, we utilize SVM (Single Class) with a Gaussian radial kernel function [6, 7] The Gaussian radial basis kernel function is represented as: 𝑘 (𝑆𝑉𝑖 − 𝑆𝑉𝑗) = 𝑒𝑥𝑝 |𝑆𝑉𝑖 − 𝑆𝑉𝑗|2 2𝜎2 (5) Where 𝑘 (𝑆𝑉𝑖 − 𝑆𝑉𝑗)is the kernel function, 𝑆𝑉𝑖 and 𝑆𝑉𝑗 are the input feature vectors, and σ is a parameter set by users to determine the effective width of the basis kernel function [14]. 3. RESULTS AND ANALYSIS To validate the proposed model, CASIA-Iris-Interval dataset V3.0 [11] has been used. Also we have used the same dataset for comparison portion. This data set is consisting of six subset. Among those we have considered 200 images in total, in which we have utilized 70% data for training and 30% data for testing purposes for each eye of the individual. Figure 5. The output block of the whole process to get the GNS for right eye Figure 5 demonstrate the output blocks for each steps according to our propose model for the right eye from detection to GNS.After the detection of the eye, we eliminate the refection and then we detect the inner circle. From the rubber sheet image of the eye, we get imaginary and real response. Then we calculate the
  • 6. IJECE ISSN: 2088-8708  A New Approach of Iris Detection and Recognition (Rubel Biswas) 2535 GNS part and from that result, we get the real, imaginary and absolute results. For iris detection phase, we have considered the real and imaginary values. Table 2. Experimental Results Details for Training and Testing for Both Eye for Their Real and Imaginary Values Eye Considered Value Train/ person Test/ person Recognized out of 50 persons Perchantage of Accurecy Left Real 70% 30% 44 88% Left Imaginary 70% 30% 40 80% Right Real 70% 30% 43 86% Right Imaginary 70% 30% 39 78% Combined Real 70% 30% 46 92% Combined Imaginary 70% 30% 43 86% According to Table 2, experimental result shows that our proposed model gives 92% accuracy for combined real portion recognition and 86% accuracy for combined imaginary portion. For each case, the real part always exhibits accuracy of more than 86% while the imaginary one exhibits always more than 78%, which concludes a good amount of percentage of accuracy. We have compared our proposed model with two other conventional approaches: one is by Li M.el al.[17] and other one is by K. Sathiyaraja el al. [18]. Figure 6. The comparison chart among our model vs. algorithm 1 vs. algorithm 2 for both real and imaginary value for both eye From Figure 6, we have seen that for combined real and imaginary part, our proposed model gives a better performance than two other stated models: Li M. el al. [17] as algorithm 1 and K. Sathiyaraja el al. [18] as algorithm 2. It is clearly visible that while for real portion the algorithm 1 and 2 is giving the result of 86% and 84%, ours one is giving 92%, which is really significant. Beside these, imaginary portion is giving 86% recognition accuracy while algorithm 1 and 2 is giving 82% and 81%. 4. CONCLUSION In our proposed model, for segmentation purpose we have used Hough Transformation. Then Daugman’s Rubber Shhet model is utilized for normalization purpose. For reducing the number of feature vector we have used GNS and DNS mapping, which creates significant changes on experimental result. Overall, we have got 92% accuracy in real portion and 86% accuracy in imaginary portion for both eyesalong with the reduced dimension of 216 feature vector.
  • 7.  ISSN: 2088-8708 IJECE Vol. 7, No. 5, October 2017 : 2530 – 2536 2536 REFERENCES [1] R.P. Wildes "Iris Recognition: An Emerging Biometric Technology" Proc. IEEE vol. 85 no. 9 pp. 1348-1363 1997. [2] J. Daugman. How iris recognition works. Proceedings of 2002 International Conference on Image Processing, Vol. 1, 2002. [3] Wildes, R.P., Asmuth, J.C. et al., "A System for Automated Iris Recognition", Proc. of the Second IEEE Workshop on Applications of Computer Vision, 1994, pp.121-128. [4] Jiali Cui, Yunhong Wang, JunZhou Huang, Tieniu Tan and Zhenan Sun, “An Iris Image Synthesis Method Based on PCA and Super-resolution”, IEEE CS Proceedings of the 17th International Conference on Pattern Recognition (ICPR’04).2004. [5] A Yuniarti, "Classification and numbering of dental radiographs for an automated human identification system,” TELKOMNIKA Telecommunication, Computing, Electronics and Control., vol. 10, no. 1, pp. 137-146, 2012. [6] Khellah FM. Texture Classification Using Dominant Neighborhood Structure. IEEE Transaction on Image Processing 2011; 20(11):3270-3279. [7] J. Uddin, M. Kang, D. V. Nguyen, and J.-M. Kim, “Reliable fault classification of induction motors using texture feature extraction and a multiclass support vector machine,” Mathematical Problems in Engineering, vol. 2014, Article ID 814593, 9 pages, 2014. [8] L. Ma, T. Tan, Y. Wang and D. Zhang, “Efficient Iris Recognition by Characterizing Key Local Variations”, IEEE Transactions on Image Processing, Vol. 13, No. 6, 2004, pp. 739. [9] IKGD Putra, E Erdiawan, "High performance palmprint identification system based on two dimensional gabor,” TELKOMNIKA Telecommunication Computing Electronics and Control., vol. 8, no. 3, pp. 309-318, 2010. [10] "The CASIA iris image database", [online] Available: http://biometrics.idealtest.org. [11] D. J. Field. Relations between the statistics of natural images and the response properties of cortical cells. J. Opt. Soc. Am. A, 1987, pp. 2379-2394. [12] Naseem I, Aleem A, Togneri R, Bennamoun M, “Iris recognition using class-specific dictionaries”, Computers & Electrical Engineering, Feb 18, 2016. [13] Anwar, A. M. "An Iris detection and recognition system to measure the performance of E-security." Diss., BRAC University, 2016. [14] G. Indrawan, S. Akbar and B. Sitohang, “Fingerprint Direct-Access Strategy Using Local-Star-Structure based Discriminator Features: A Comparison Study,” International Journal of Electrical and Computer Engineering (IJECE).” vol. 4, no.5,October 2014, pp. 817-830. [15] S. Saparudin, S. Akbar and G. Sulong, “Segmentation of Fingerprint Image Based on Gradient Magnitude and Coherence,” International Journal of Electrical and Computer Engineering (IJECE)” vol.5, no.5, October 201, pp. 834-849.