K0966468

IOSR Journals
IOSR JournalsInternational Organization of Scientific Research (IOSR)

http://iosrjournals.org/IOSR-JCE.html

IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 6 (Mar. - Apr. 2013), PP 64-68
www.iosrjournals.org

 A Study of various soft computing techniques for iris recognition
                    Gaganpreet kaur1, Dilpreet kaur2, Dr. Dheerendra Singh3
                         1
                          A.P., Deptt. Of C.S.E., SGGSWU, Fatehgarh Sahib, Punjab, India.
                2
                    Research Scholar, Deptt. Of C.S.E., SGGSWU, Fatehgarh Sahib, Punjab, India.
                                 3
                                   Prof & Head, SUSCET, Tangori, Punjab, India.

Abstract: Iris Recognition is considered as one of the best biometric method used for human identification and
verification, because of its unique feature that differ from one person to another, and its importance in the
security field. This paper introduced the two soft computing techniques of neural network which are used for
pattern matching in iris recognition. This paper represents iris recognition based Competitive neural network
Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM) with essential
redefinition of pattern similarity and also introduces the mixture model ARAM for the measurements of patterns.
Keywords - ARAM, Biometric, Iris Recognition, LVQ, and Mixture model ARAM, Neural Network.

                                               I.    INTRODUCTION
 Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high
resolution images of the irises of an individual's eyes. Not to be confused with another, less prevalent, ocular-
based technology, retina scanning, and iris recognition uses camera technology, with subtle infrared illumination
reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of
the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield
unambiguous positive identification of an individual. Iris recognition efficacy is rarely impeded by glasses or
contact lenses. Iris technology has the smallest outlier group of all biometric technologies. The only biometric
authentication technology designed for use in a one-to-many search environment, a key advantage of iris
recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.
Plemmons proposed different optimization methods for designing the optics and the image processing
algorithms, and provide laboratory and simulation results from applying these systems and results on restoring
the intermediate phase encoded images using both direct Wiener filter and iterative conjugate gradient method
[1].
     Christel-Loïc Tisse et al examined a new iris recognition system that implements (i) gradient decomposed
Hough transform / integral-differential operators combination for iris localization and (ii) the ―analytic image‖
concept to extract pertinent information from iris texture [2]. Li Ma et al proposed a new approach for personal
identification based on iris recognition. The body of their papers details the steps of iris recognition, including
image preprocessing, feature extraction and classifier design. The proposed algorithm uses a bank of Gabor
filters to capture both local and global iris characteristics to form a fixed length feature vector. Iris matching is
based on the weighted Euclidean distance between the two corresponding iris vectors and is therefore very fast
[3]. Narayanswamy et al employs an especially designed Wave front Coded lens customized for iris recognition.
They presented experimental results that show the benefits of this technology for biometric identification [4].
Zhuoshi Wei et al presented a framework to synthesize large realistic iris databases, providing an alternative to
iris database collection. Firstly, iris patch is used as a basic element to characterize visual primitive of iris
texture, and patch-based sampling is applied to create an iris prototype [5]. Czajka et al presents an original,
independent of typical cryptographic techniques, method of biometric replay attack prevention for iris
biometrics. The proposed solution takes advantage of appropriate enhancements of iris templates and relies on
appropriate data alteration within the image space resulting in significant changes of the resulting code in the iris
feature space [6].

                                         II.  IRIS PREPROCESSING
Iris preprocessing consider following stages:
2.1Localization




                                             www.iosrjournals.org                                          64 | Page
A Study of various soft computing techniques for iris recognition




                                            Fig1. Localization of iris

The first step in the localization process is pupil segmentation based on analysis of the histogram. It is assumed,
like in [7] that a pupil is the darkest area in the image and standard deviation of luminance in this area is
relatively low. It has to be emphasized that unwanted elements may appear in the threshold image. Nevertheless
pupil can be segmented by relatively simple method, based on image thresholding using the histogram analysis.

2.2 Segmentation
Segmentation is one of the important steps in preprocessing since it separates the input iris image into several
components making it feasible to extract features easily. The Segmentation process is defined as separating the
input iris image into several components, so it is very important step in preprocessing because it describes and
recognize the input image. One of the best ways to separate the pupil from the whole eye is using circular
Hough transformation in order to find the circle of the pupil [7]. The pupil is the largest black area in the
intensity image; its edge can be easily detected from the binary image by using a suitable threshold of the
intensity image.




                                      Fig2. Example of Edge Detection [7]

2.3 Normalization
The purpose of iris normalization is to get the same region of iris to do matching regardless pupil dilation and
the different iris size caused by the different distance between the eye and video zoom factor. Moreover, the
shift, accounting for the offsets of the eye in the plane parallel to the camera’s sensor, should also be eliminated
[8]. Wildes [9][10] used an image-registration technique to eliminate dilation, scaling and rotation. This
approach wraps a new iris image into alignment with a normal image according to a mapping function so that
the difference between the two iris images is minimal.

2.4 Feature Vector Extraction and Match
Feature selection and extraction is to find out the important features to do matching. The visible features of an
iris are ciliary processes, contraction furrows, crypts, rings, corona, and freckle [11] and so on. How to set a
model to extract the feature of different irises and match them is especially important for it determines the
results of the whole system directly [12] [13].

                                            1. NEURAL NETWORK
The term ―neural network‖ [15] was traditionally used to refer to a network or circuit of biological neurons. The
modern usage of the term often refers to artificial neural networks, which are composed of artificial neurons or
nodes. Thus the term has two distinct usages:

i) ―Biological neural networks‖ are made up of real biological neurons that are connected or functionally related
in the peripheral nervous system or the central nervous system. In the field of neuroscience, they are often
identified as groups of neurons that perform a specific physiological function in laboratory analysis.
ii) ―Artificial neural networks‖ are composed of interconnecting artificial neurons (programming constructs that
mimic the properties of biological neurons). Artificial neural networks may either be used to gain an

                                             www.iosrjournals.org                                         65 | Page
A Study of various soft computing techniques for iris recognition

understanding of biological neural networks, or for solving artificial intelligence problems without necessarily
creating a model of a real biological system. The real, biological nervous system is highly complex: artificial
neural network algorithms attempt to abstract this complexity and focus on what may hypothetically matter most
from an information processing point of view. Good performance or performance mimicking animal or human
error patterns, can then be used as one source of evidence towards supporting the hypothesis that the abstraction
really captured something important from the point of view of information processing in the brain. Another
incentive for these abstractions is to reduce the amount of computation required to simulate artificial neural
networks, so as to allow one to experiment with larger networks and train them on larger data sets.
     An artificial neural network usually called neural network [15], is a mathematical model or computational
model that is inspired by the structure and functional aspects of biological neural networks. A neural network
consists of an interconnected group of artificial neurons, and it processes information using a connectionist
approach to computation. In most cases an ANN is an adaptive system that changes its structure based on
external or internal information that flows through the network during the learning phase. Modern neural
networks are non-linear statistical data modeling tools. They are usually used to model complex relationships
between inputs and outputs or to find patterns in data.

3.1 Soft computing techniques of neural network
Following two approaches of the neural network are used for enhancing the security in iris recognition system:

3.1.1 Learning Vector Quantization (LVQ)
 Learning Vector Quantization is a prototype-based supervised classification algorithm. LVQ can be understood
as a special case of an artificial neural network. LVQ is one of the competitive neural networks. LVQ is a
pattern classification method; each output node is represented as a class. The weight vector of an output node is
called a reference or codebook vector (CV). The LVQ attempts to adjust the weights to approximate a
theoretical bayes classifier. The result obtained depends on the majority voting among several weak classifiers
Input vectors are classified by assigning them as a class label of the weight vector closest to the input vector[14]
[15]. The result obtained depends on the majority voting among several weak classifiers. The LVQ consisting of
two layers; the first layer is the input layer which contains the input neurons, while the second layer is the output
layer that contains output neurons.
     The final step is the pattern matching of the Iris image with the stored templates from the database. The
Following figure shows Pattern matching process. These patterns are used to create templates forIris
recognition. It will work fine for less number of users, but it is not recommended for large number of users since
it requires large storage memory.




                                         Fig3. Pattern matching process

3.1.2 Template matching result
The Iris recognition steps, feature extraction, Pattern matching are performed using NI Vision Assistant and NI
Lab VIEW. The NI vision script for iris recognition using template matching.




                                       Fig4. Result of template matching

3.1.3 Adaptive Resonance Associative Map (ARAM)
The Adaptive Resonance Associative Map (ARAM) [16] belongs to the family of Adaptive Resonance Theory
(ART) self-organizing neural networks. Like another member of the family, ART-MAP ARAM is capable of
incrementally learning recognition categories and multidimensional maps of patterns. Compared to ART-MAP,
ARAM contains as implified pattern matching and learning process. An ARAM network has two individual
                                             www.iosrjournals.org                                          66 | Page
A Study of various soft computing techniques for iris recognition

short term memory (STM) and a shared long term memory (LTM) l that encodes the associated knowledge from
the two feature fields. The learning of the network is guided by an orienting subsystem with two logical gates,
defined with two vigilance parameter. The logical gates conditionally switch and reset the network state
according to predefined rules, and hence affect knowledge encoding in the LTM. ARAM acquires its domain
knowledge through an online, hard competitive learning process.
     ARAM uses two functions (choice and match) to evaluate the similarity between the input and recognition
category. These two functions may or may not have same definition, optionally providing a different view to
conform the degree of pattern matching. Secondly, the use of vigilance thresholds ensures only significantly
similar patterns may be grouped together. On the other hand, the vigilance parameters primarily affect the
clustering process. Lower vigilance thresholds generally lead to fewer recognition categories, and hence rougher
clustering result. Lastly while most importantly, ARAM provides an effective infrastructure for learning of
associative knowledge from two different domains. Depending on the input signals, ARAM may be applied to
different learning tasks. Examples include text and document classification [17], clustering and personalized
knowledge management and association rule mining [18] [19].

3.1.4 Mixture Model ARAM for GO Annotation and Gene Expression Data
whereas Mixture Model ARAM is straightforward: for each gene product. In ARAM’s pattern field A to encode
its expression profile and B to encode its GO annotation. Following common practices, the expression profile is
presented in vector format, and the GO annotation is presented as a set of descriptive GO terms, denoted as: x =
(xa|xb) = (e−−x→p| {go terms}). The LTM recognition category encodes an associative pattern w = (wa|wb),
where wa and wb respectively are the expression pattern and GO annotation term(s) representative to the inputs
that form the corresponding category [20].

3.1.5 Pattern Field for Gene Expression
Appropriate normalization of gene expression data prevents category proliferation without compromising their
biological representation. Variations of normalization techniques are adopted in different conditions [21][22].
Thus the Mixture Model ARAM network does not contain a fixed normalization link to alter the original input
gene expression. Input expressions are assumed and they are properly pre-normalized, and define the link
between Fa0 and Fb1 as a simple feed forward copy operation: xa = Ia. The measurement of the similarity
between two GO terms as the information content of their minimal subsumer. A so-called minimal subsumer of
two terms ti and t j, denoted as ∇ (ti, t j), is the subsumer that has the minimal likelihood. To formalize:

                                            Sim (ti, t j) ≡ℑ (∇ (ti, t j))
                                     = −log (min {p (t) |t ∈ S (ti, t j)})          (1)

Where S (ti, t j) is the subsumer set of term ti and t j, essentially being their common ancestor terms.

   Similarity between GO Annotations of two Genes while equation 1 measures the semantic similarity between
two GO terms, it is common that a gene product may be annotated with multiple GO terms, which will lead to
multiple term-to-term similarities between two genes. To formalize, suppose the multiple GO annotations of two
genes products gi and gj are denoted as: Ai = {ti1, ti2. . . tiP} and Aj = {t j1, t j2. . . t jQ} respectively, their
similarity is then calculated as:

                          Sim (Ai, Aj) = max {sim (tix, tjy) |x ∈ [1, P], y ∈ [1, Q]} (2)


   By applying the maximal term-to-term similarity as the similarity between to GO annotations, we essentially
identify their subsume that has the maximal information content, i.e. the maximal common factor.

                                            III.    CONCLUSION
This paper concluded that there are two important soft computing approaches of neural network which are used
for pattern matching in iris recognition to enhance the performance. Learning Vector Quantization is a
prototype-based supervised classification algorithm in which each output node is represented as a class.
Codebook vector (CV) is used for output node. It uses bayes classifier for adjusting the weight. The result
obtained depends on the majority voting among several weak classifiers. The patterns matching of the Iris image
is to be done with the stored templates from the database. Templates are created with these patterns but it will
work fine for less number of users; it is not recommended for large number of users since it requires large
storage memory whereas the Adaptive Resonance Associative Map (ARAM) belongs to the family of Adaptive
Resonance Theory (ART) self-organizing neural networks. It is capable of incrementally learning recognition
                                             www.iosrjournals.org                                          67 | Page
A Study of various soft computing techniques for iris recognition

categories and multidimensional maps of patterns. It contains a simplified pattern matching and learning. To
improve the pattern matching process mixture model ARAM is used which used gene ontology (GO) and gene
expression for checking the similarities and measurements of various pattern. This approach reduced the noise
from the whole data and provides the expression between various patterns. As compared Learning Vector
Quantization, the Adaptive Resonance Associative map is more recommended for large numbers of users.

                                                        REFERENCES
[1]    R. Plemmonsa, M. Horvatha, E. Leonhardta, P. Paucaa, S. Prasad, ―Computational Imaging Systems for Iris Recognition‖,
       Processing of Spiel 2004.
[2]    C. L. Tisse, L. Martin, L. Torres, M. Robert, "Person identification technique using human iris recognition", ST Journal of System
       Research Current Issue 2003.
[3]    L. Ma, U. Wang, T. Tan, "Iris Recognition Based on Multichannel Gabor Filtering", The 5th Asian Conference on Computer
       Vision, pp.23—25, Melbourne, Australia, January 2002.
[4]    R. Narayanswamy, P. E. X. Silveir, "Extended Depth-of-Field Iris Recognition System for a Workstation Environment",
       Proceedings of the Spied Biometric Technology for Human Identification II,Vol. 5779, pp. 41-50, Orlando, FL, 2005.
[5]    Z. Wei, T. Tan and Z. Sun, "Synthesis of Large Realistic Iris Databases Using Patch-based Sampling‖, IEEE, 2008.
[6]    A. Czajka, A. Pacut, "Replay Attack Prevention for Iris Biometrics", IEEE, ICCST 2008.
[7]    C. Teo and H. Ewe, "An Efficient One-Dimensional Fractal Analysis for Iris Recognition", Proceedings of the 13-
       thWSCGInternational Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 157-160,
       Plzen-Bory, Czech Republic, January 31 – February 4, 2005.
[8]    Daugman J G., ―High confidence visual recognition of persons by a test of statistical independence‖, IEEE Trans. Pattern Anal.
       Machine Intel. 1993, vol.15, no.11, pp.1148-1161.
[9]    Wildes R P., ―Iris Recognition: An Emerging Biometric Technology‖, In Proceeding of the IEEE, Piscataway, NJ, vol. 85, pp.1348-
       1363, 1997.
[10]   Daugman J G., ―Recognition persons by their pattern‖, Information Security Technical report, vol.13, no.1, pp. 33-39, 1998.
[11]   Daugman J G., ―High confidence visual recognition of persons by a test of statistical independence‖, IEEE Trans. Pattern Anal.
       Machine Intel, 1993, vol.15, no.11, pp. 1148-1161.
[12]   Daugman J G. ―High Confidence Recognition of Person by Rapid Video Analysis of Iris Texture‖, European Convection on
       Security Detection and Brighton, Brighton, UK, pp. 244-251, 1995.
[13]   Daugman J G. ―Recognition persons by their pattern‖, Information Security Technical report, vol.13, no.1, pp.33-39, 1998.
[14]   CBSR, 2005.Center for biometrics and security research. http://www.cbsr.ia.ac.cn/english/Databases.asp
[15]   Zhou Zhiping, Hui Maomao, Sun Ziwen, ―An iris recognition based on 2DWPCA and neural network‖, pp.9781-4244-2723,
       9/09/$25.00© 2009, IEEE.
[16]   Tan A.H., ―Adaptive Resonance Associative Map for Neural Networks‖, Vol.8, No.3, pp. 437–446, 1995.
[17]   Tan A.H., ―Predictive self-organizing networks for text categorization‖, Proceedings of the Pacific-Asia Conference on Knowledge
       Discovery and Data Mining (PAKDD), pp. 66–77, 2001.
[18]   Tan A.H., Ong H.L., Pan H., Ng J., Li Q.X., ―Towards personalized web intelligence‖, Knowledge and Information Systems, Vol.6,
       No.5, pp.595–616, 2004.
[19]   Tan A.H., Pan H., ―Predictive neural networks for gene expression data analysis‖, Neural Networks, Vol.18, No.3, pp. 297–306,
       2005.
[20]   Carpenter G., Gross berg S., Rosen D., ―ART 2-A: An adaptive resonance algorithm for rapid category learning and recognition‖,
       Neural Networks, Vol.4, pp. 493–504, 1991.
[21]   The Gene Ontology Consortium, ―Gene ontology: tool for the unification of biology‖, Nature Genetics, Vol.25, No.1, pp. 25–29,
       2000.
[22]   Ms. Gaganpreet Kaur, Mr. Akshay Girdhar and Ms. Manvjeet Kaur, " Article: Enhanced Iris Recognition System - an Integrated
       Approach to Person Identification", International Journal of Computer Applications, vol.8, no.1, pp.1–5, Published by Foundation
       of Computer Science, October 2010.




                                                    www.iosrjournals.org                                                     68 | Page

Recommandé

IRDO: Iris Recognition by fusion of DTCWT and OLBP par
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
396 vues12 diapositives
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME... par
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
501 vues10 diapositives
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG par
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
49 vues21 diapositives
International Journal of Engineering Research and Development (IJERD) par
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
472 vues6 diapositives
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil... par
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...ijtsrd
46 vues5 diapositives
Transform Domain Based Iris Recognition using EMD and FFT par
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
47 vues8 diapositives

Contenu connexe

Tendances

Microscopy images segmentation algorithm based on shearlet neural network par
Microscopy images segmentation algorithm based on shearlet neural networkMicroscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural networkjournalBEEI
45 vues8 diapositives
L_3011_62.+1908 par
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908Sunil Kumar Chawla
126 vues4 diapositives
109 115 par
109 115109 115
109 115Ijarcsee Journal
308 vues7 diapositives
Automated fundus image quality assessment and segmentation of optic disc usin... par
Automated fundus image quality assessment and segmentation of optic disc usin...Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...IJECEIAES
23 vues12 diapositives
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION par
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONTRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONijaia
18 vues18 diapositives
A comparison of multiple wavelet algorithms for iris recognition 2 par
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
838 vues10 diapositives

Tendances(18)

Microscopy images segmentation algorithm based on shearlet neural network par journalBEEI
Microscopy images segmentation algorithm based on shearlet neural networkMicroscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural network
journalBEEI45 vues
Automated fundus image quality assessment and segmentation of optic disc usin... par IJECEIAES
Automated fundus image quality assessment and segmentation of optic disc usin...Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...
IJECEIAES23 vues
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION par ijaia
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONTRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
ijaia18 vues
A comparison of multiple wavelet algorithms for iris recognition 2 par IAEME Publication
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION par sipij
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
sipij925 vues
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im... par IRJET Journal
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
IRJET Journal46 vues
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N... par CSCJournals
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
CSCJournals236 vues
Biometric Iris Recognition Based on Hybrid Technique par ijsc
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
ijsc27 vues
IRJET- Survey of Iris Recognition Techniques par IRJET Journal
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
IRJET Journal53 vues
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means Clustering par IRJET Journal
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means ClusteringAn Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means Clustering
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means Clustering
IRJET Journal48 vues
Secure System based on Dynamic Features of IRIS Recognition par ijsrd.com
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognition
ijsrd.com352 vues
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK par ijaia
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
ijaia298 vues
IJCER (www.ijceronline.com) International Journal of computational Engineerin... par ijceronline
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline506 vues
A Robust Approach in Iris Recognition for Person Authentication par IOSR Journals
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person Authentication
IOSR Journals402 vues

En vedette

G01114650 par
G01114650G01114650
G01114650IOSR Journals
389 vues5 diapositives
Development and Validation of prediction for estimating resting energy expend... par
Development and Validation of prediction for estimating resting energy expend...Development and Validation of prediction for estimating resting energy expend...
Development and Validation of prediction for estimating resting energy expend...IOSR Journals
486 vues4 diapositives
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ... par
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
391 vues5 diapositives
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s... par
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...IOSR Journals
948 vues8 diapositives
Wireless Speed Control of an Induction Motor Using Pwm Technique with Gsm par
Wireless Speed Control of an Induction Motor Using Pwm Technique with GsmWireless Speed Control of an Induction Motor Using Pwm Technique with Gsm
Wireless Speed Control of an Induction Motor Using Pwm Technique with GsmIOSR Journals
1K vues5 diapositives
A High Throughput CFA AES S-Box with Error Correction Capability par
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityIOSR Journals
650 vues10 diapositives

En vedette(20)

Development and Validation of prediction for estimating resting energy expend... par IOSR Journals
Development and Validation of prediction for estimating resting energy expend...Development and Validation of prediction for estimating resting energy expend...
Development and Validation of prediction for estimating resting energy expend...
IOSR Journals486 vues
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ... par IOSR Journals
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
IOSR Journals391 vues
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s... par IOSR Journals
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
IOSR Journals948 vues
Wireless Speed Control of an Induction Motor Using Pwm Technique with Gsm par IOSR Journals
Wireless Speed Control of an Induction Motor Using Pwm Technique with GsmWireless Speed Control of an Induction Motor Using Pwm Technique with Gsm
Wireless Speed Control of an Induction Motor Using Pwm Technique with Gsm
IOSR Journals1K vues
A High Throughput CFA AES S-Box with Error Correction Capability par IOSR Journals
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
IOSR Journals650 vues
Hybrid Algorithm for Clustering Mixed Data Sets par IOSR Journals
Hybrid Algorithm for Clustering Mixed Data SetsHybrid Algorithm for Clustering Mixed Data Sets
Hybrid Algorithm for Clustering Mixed Data Sets
IOSR Journals471 vues
Leadership and the Climate Change Challenge (Work in Progress) par Duncan Noble
Leadership and the Climate Change Challenge (Work in Progress)Leadership and the Climate Change Challenge (Work in Progress)
Leadership and the Climate Change Challenge (Work in Progress)
Duncan Noble398 vues
Image Steganography Based On Hill Cipher with Key Hiding Technique par IOSR Journals
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
IOSR Journals408 vues
Heart Attack Prediction System Using Fuzzy C Means Classifier par IOSR Journals
Heart Attack Prediction System Using Fuzzy C Means ClassifierHeart Attack Prediction System Using Fuzzy C Means Classifier
Heart Attack Prediction System Using Fuzzy C Means Classifier
IOSR Journals869 vues
Role of Machine Translation and Word Sense Disambiguation in Natural Language... par IOSR Journals
Role of Machine Translation and Word Sense Disambiguation in Natural Language...Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...
IOSR Journals486 vues
Présentation de la formation à l'édition en France par Asfored
Présentation de la formation à l'édition en FrancePrésentation de la formation à l'édition en France
Présentation de la formation à l'édition en France
Asfored801 vues
Transport go green par Aralc Eiob
Transport   go greenTransport   go green
Transport go green
Aralc Eiob438 vues
A New Theoretical Approach to Location Based Power Aware Routing par IOSR Journals
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
IOSR Journals363 vues
Medial Axis Transformation based Skeletonzation of Image Patterns using Image... par IOSR Journals
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
IOSR Journals555 vues
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U... par IOSR Journals
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...
IOSR Journals502 vues
Scalable Transaction Management on Cloud Data Management Systems par IOSR Journals
Scalable Transaction Management on Cloud Data Management SystemsScalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management Systems
IOSR Journals507 vues
Dynamic AI-Geo Health Application based on BIGIS-DSS Approach par IOSR Journals
Dynamic AI-Geo Health Application based on BIGIS-DSS ApproachDynamic AI-Geo Health Application based on BIGIS-DSS Approach
Dynamic AI-Geo Health Application based on BIGIS-DSS Approach
IOSR Journals413 vues
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm par IOSR Journals
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
IOSR Journals332 vues
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling par IOSR Journals
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
IOSR Journals619 vues

Similaire à K0966468

A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems par
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
352 vues5 diapositives
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME... par
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
6 vues10 diapositives
International Journal of Computational Engineering Research(IJCER) par
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
375 vues8 diapositives
Transfer Learning with Convolutional Neural Networks for IRIS Recognition par
Transfer Learning with Convolutional Neural Networks for IRIS RecognitionTransfer Learning with Convolutional Neural Networks for IRIS Recognition
Transfer Learning with Convolutional Neural Networks for IRIS Recognitiongerogepatton
66 vues18 diapositives
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION par
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION gerogepatton
135 vues18 diapositives
Biometric Iris Recognition Based on Hybrid Technique par
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique ijsc
4 vues9 diapositives

Similaire à K0966468(20)

A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems par IOSR Journals
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
IOSR Journals352 vues
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME... par IJNSA Journal
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal6 vues
International Journal of Computational Engineering Research(IJCER) par ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline375 vues
Transfer Learning with Convolutional Neural Networks for IRIS Recognition par gerogepatton
Transfer Learning with Convolutional Neural Networks for IRIS RecognitionTransfer Learning with Convolutional Neural Networks for IRIS Recognition
Transfer Learning with Convolutional Neural Networks for IRIS Recognition
gerogepatton66 vues
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION par gerogepatton
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
gerogepatton135 vues
Biometric Iris Recognition Based on Hybrid Technique par ijsc
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
ijsc4 vues
A Survey : Iris Based Recognition Systems par Editor IJMTER
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition Systems
Editor IJMTER312 vues
Ieeepro techno solutions ieee embedded project secure and robust iris recog... par srinivasanece7
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
srinivasanece7286 vues
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel... par IJERD Editor
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor468 vues
International Journal of Engineering and Science Invention (IJESI) par inventionjournals
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
Iris recognition based on 2D Gabor filter par IJECEIAES
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filter
IJECEIAES7 vues
A Novel Biometric Approach for Authentication In Pervasive Computing Environm... par aciijournal
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
aciijournal121 vues
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM... par aciijournal
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
aciijournal6 vues
Advanced Computational Intelligence: An International Journal (ACII) par aciijournal
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
aciijournal5 vues
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul... par AM Publications
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
AM Publications247 vues
Security for Identity Based Identification using Water Marking and Visual Cry... par IRJET Journal
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal45 vues
A robust iris recognition method on adverse conditions par ijcseit
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditions
ijcseit661 vues

Plus de IOSR Journals

A011140104 par
A011140104A011140104
A011140104IOSR Journals
1.2K vues4 diapositives
M0111397100 par
M0111397100M0111397100
M0111397100IOSR Journals
747 vues4 diapositives
L011138596 par
L011138596L011138596
L011138596IOSR Journals
732 vues12 diapositives
K011138084 par
K011138084K011138084
K011138084IOSR Journals
602 vues5 diapositives
J011137479 par
J011137479J011137479
J011137479IOSR Journals
603 vues6 diapositives
I011136673 par
I011136673I011136673
I011136673IOSR Journals
511 vues8 diapositives

Dernier

Narration ppt.pptx par
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptxTARIQ KHAN
135 vues24 diapositives
231112 (WR) v1 ChatGPT OEB 2023.pdf par
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdfWilfredRubens.com
157 vues21 diapositives
AI Tools for Business and Startups par
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and StartupsSvetlin Nakov
107 vues39 diapositives
Community-led Open Access Publishing webinar.pptx par
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
93 vues9 diapositives
Class 10 English notes 23-24.pptx par
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptxTARIQ KHAN
131 vues53 diapositives
Dance KS5 Breakdown par
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 BreakdownWestHatch
79 vues2 diapositives

Dernier(20)

Narration ppt.pptx par TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN135 vues
AI Tools for Business and Startups par Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov107 vues
Community-led Open Access Publishing webinar.pptx par Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc93 vues
Class 10 English notes 23-24.pptx par TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN131 vues
Dance KS5 Breakdown par WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch79 vues
REPRESENTATION - GAUNTLET.pptx par iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood100 vues
Solar System and Galaxies.pptx par DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar91 vues
Ch. 7 Political Participation and Elections.pptx par Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala97 vues
Scope of Biochemistry.pptx par shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba133 vues
Class 10 English lesson plans par TARIQ KHAN
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN288 vues
Narration lesson plan.docx par TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN112 vues
Are we onboard yet University of Sussex.pptx par Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc96 vues
UWP OA Week Presentation (1).pptx par Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc88 vues
The Open Access Community Framework (OACF) 2023 (1).pptx par Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc110 vues

K0966468

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 6 (Mar. - Apr. 2013), PP 64-68 www.iosrjournals.org A Study of various soft computing techniques for iris recognition Gaganpreet kaur1, Dilpreet kaur2, Dr. Dheerendra Singh3 1 A.P., Deptt. Of C.S.E., SGGSWU, Fatehgarh Sahib, Punjab, India. 2 Research Scholar, Deptt. Of C.S.E., SGGSWU, Fatehgarh Sahib, Punjab, India. 3 Prof & Head, SUSCET, Tangori, Punjab, India. Abstract: Iris Recognition is considered as one of the best biometric method used for human identification and verification, because of its unique feature that differ from one person to another, and its importance in the security field. This paper introduced the two soft computing techniques of neural network which are used for pattern matching in iris recognition. This paper represents iris recognition based Competitive neural network Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM) with essential redefinition of pattern similarity and also introduces the mixture model ARAM for the measurements of patterns. Keywords - ARAM, Biometric, Iris Recognition, LVQ, and Mixture model ARAM, Neural Network. I. INTRODUCTION Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high resolution images of the irises of an individual's eyes. Not to be confused with another, less prevalent, ocular- based technology, retina scanning, and iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual. Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier group of all biometric technologies. The only biometric authentication technology designed for use in a one-to-many search environment, a key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime. Plemmons proposed different optimization methods for designing the optics and the image processing algorithms, and provide laboratory and simulation results from applying these systems and results on restoring the intermediate phase encoded images using both direct Wiener filter and iterative conjugate gradient method [1]. Christel-Loïc Tisse et al examined a new iris recognition system that implements (i) gradient decomposed Hough transform / integral-differential operators combination for iris localization and (ii) the ―analytic image‖ concept to extract pertinent information from iris texture [2]. Li Ma et al proposed a new approach for personal identification based on iris recognition. The body of their papers details the steps of iris recognition, including image preprocessing, feature extraction and classifier design. The proposed algorithm uses a bank of Gabor filters to capture both local and global iris characteristics to form a fixed length feature vector. Iris matching is based on the weighted Euclidean distance between the two corresponding iris vectors and is therefore very fast [3]. Narayanswamy et al employs an especially designed Wave front Coded lens customized for iris recognition. They presented experimental results that show the benefits of this technology for biometric identification [4]. Zhuoshi Wei et al presented a framework to synthesize large realistic iris databases, providing an alternative to iris database collection. Firstly, iris patch is used as a basic element to characterize visual primitive of iris texture, and patch-based sampling is applied to create an iris prototype [5]. Czajka et al presents an original, independent of typical cryptographic techniques, method of biometric replay attack prevention for iris biometrics. The proposed solution takes advantage of appropriate enhancements of iris templates and relies on appropriate data alteration within the image space resulting in significant changes of the resulting code in the iris feature space [6]. II. IRIS PREPROCESSING Iris preprocessing consider following stages: 2.1Localization www.iosrjournals.org 64 | Page
  • 2. A Study of various soft computing techniques for iris recognition Fig1. Localization of iris The first step in the localization process is pupil segmentation based on analysis of the histogram. It is assumed, like in [7] that a pupil is the darkest area in the image and standard deviation of luminance in this area is relatively low. It has to be emphasized that unwanted elements may appear in the threshold image. Nevertheless pupil can be segmented by relatively simple method, based on image thresholding using the histogram analysis. 2.2 Segmentation Segmentation is one of the important steps in preprocessing since it separates the input iris image into several components making it feasible to extract features easily. The Segmentation process is defined as separating the input iris image into several components, so it is very important step in preprocessing because it describes and recognize the input image. One of the best ways to separate the pupil from the whole eye is using circular Hough transformation in order to find the circle of the pupil [7]. The pupil is the largest black area in the intensity image; its edge can be easily detected from the binary image by using a suitable threshold of the intensity image. Fig2. Example of Edge Detection [7] 2.3 Normalization The purpose of iris normalization is to get the same region of iris to do matching regardless pupil dilation and the different iris size caused by the different distance between the eye and video zoom factor. Moreover, the shift, accounting for the offsets of the eye in the plane parallel to the camera’s sensor, should also be eliminated [8]. Wildes [9][10] used an image-registration technique to eliminate dilation, scaling and rotation. This approach wraps a new iris image into alignment with a normal image according to a mapping function so that the difference between the two iris images is minimal. 2.4 Feature Vector Extraction and Match Feature selection and extraction is to find out the important features to do matching. The visible features of an iris are ciliary processes, contraction furrows, crypts, rings, corona, and freckle [11] and so on. How to set a model to extract the feature of different irises and match them is especially important for it determines the results of the whole system directly [12] [13]. 1. NEURAL NETWORK The term ―neural network‖ [15] was traditionally used to refer to a network or circuit of biological neurons. The modern usage of the term often refers to artificial neural networks, which are composed of artificial neurons or nodes. Thus the term has two distinct usages: i) ―Biological neural networks‖ are made up of real biological neurons that are connected or functionally related in the peripheral nervous system or the central nervous system. In the field of neuroscience, they are often identified as groups of neurons that perform a specific physiological function in laboratory analysis. ii) ―Artificial neural networks‖ are composed of interconnecting artificial neurons (programming constructs that mimic the properties of biological neurons). Artificial neural networks may either be used to gain an www.iosrjournals.org 65 | Page
  • 3. A Study of various soft computing techniques for iris recognition understanding of biological neural networks, or for solving artificial intelligence problems without necessarily creating a model of a real biological system. The real, biological nervous system is highly complex: artificial neural network algorithms attempt to abstract this complexity and focus on what may hypothetically matter most from an information processing point of view. Good performance or performance mimicking animal or human error patterns, can then be used as one source of evidence towards supporting the hypothesis that the abstraction really captured something important from the point of view of information processing in the brain. Another incentive for these abstractions is to reduce the amount of computation required to simulate artificial neural networks, so as to allow one to experiment with larger networks and train them on larger data sets. An artificial neural network usually called neural network [15], is a mathematical model or computational model that is inspired by the structure and functional aspects of biological neural networks. A neural network consists of an interconnected group of artificial neurons, and it processes information using a connectionist approach to computation. In most cases an ANN is an adaptive system that changes its structure based on external or internal information that flows through the network during the learning phase. Modern neural networks are non-linear statistical data modeling tools. They are usually used to model complex relationships between inputs and outputs or to find patterns in data. 3.1 Soft computing techniques of neural network Following two approaches of the neural network are used for enhancing the security in iris recognition system: 3.1.1 Learning Vector Quantization (LVQ) Learning Vector Quantization is a prototype-based supervised classification algorithm. LVQ can be understood as a special case of an artificial neural network. LVQ is one of the competitive neural networks. LVQ is a pattern classification method; each output node is represented as a class. The weight vector of an output node is called a reference or codebook vector (CV). The LVQ attempts to adjust the weights to approximate a theoretical bayes classifier. The result obtained depends on the majority voting among several weak classifiers Input vectors are classified by assigning them as a class label of the weight vector closest to the input vector[14] [15]. The result obtained depends on the majority voting among several weak classifiers. The LVQ consisting of two layers; the first layer is the input layer which contains the input neurons, while the second layer is the output layer that contains output neurons. The final step is the pattern matching of the Iris image with the stored templates from the database. The Following figure shows Pattern matching process. These patterns are used to create templates forIris recognition. It will work fine for less number of users, but it is not recommended for large number of users since it requires large storage memory. Fig3. Pattern matching process 3.1.2 Template matching result The Iris recognition steps, feature extraction, Pattern matching are performed using NI Vision Assistant and NI Lab VIEW. The NI vision script for iris recognition using template matching. Fig4. Result of template matching 3.1.3 Adaptive Resonance Associative Map (ARAM) The Adaptive Resonance Associative Map (ARAM) [16] belongs to the family of Adaptive Resonance Theory (ART) self-organizing neural networks. Like another member of the family, ART-MAP ARAM is capable of incrementally learning recognition categories and multidimensional maps of patterns. Compared to ART-MAP, ARAM contains as implified pattern matching and learning process. An ARAM network has two individual www.iosrjournals.org 66 | Page
  • 4. A Study of various soft computing techniques for iris recognition short term memory (STM) and a shared long term memory (LTM) l that encodes the associated knowledge from the two feature fields. The learning of the network is guided by an orienting subsystem with two logical gates, defined with two vigilance parameter. The logical gates conditionally switch and reset the network state according to predefined rules, and hence affect knowledge encoding in the LTM. ARAM acquires its domain knowledge through an online, hard competitive learning process. ARAM uses two functions (choice and match) to evaluate the similarity between the input and recognition category. These two functions may or may not have same definition, optionally providing a different view to conform the degree of pattern matching. Secondly, the use of vigilance thresholds ensures only significantly similar patterns may be grouped together. On the other hand, the vigilance parameters primarily affect the clustering process. Lower vigilance thresholds generally lead to fewer recognition categories, and hence rougher clustering result. Lastly while most importantly, ARAM provides an effective infrastructure for learning of associative knowledge from two different domains. Depending on the input signals, ARAM may be applied to different learning tasks. Examples include text and document classification [17], clustering and personalized knowledge management and association rule mining [18] [19]. 3.1.4 Mixture Model ARAM for GO Annotation and Gene Expression Data whereas Mixture Model ARAM is straightforward: for each gene product. In ARAM’s pattern field A to encode its expression profile and B to encode its GO annotation. Following common practices, the expression profile is presented in vector format, and the GO annotation is presented as a set of descriptive GO terms, denoted as: x = (xa|xb) = (e−−x→p| {go terms}). The LTM recognition category encodes an associative pattern w = (wa|wb), where wa and wb respectively are the expression pattern and GO annotation term(s) representative to the inputs that form the corresponding category [20]. 3.1.5 Pattern Field for Gene Expression Appropriate normalization of gene expression data prevents category proliferation without compromising their biological representation. Variations of normalization techniques are adopted in different conditions [21][22]. Thus the Mixture Model ARAM network does not contain a fixed normalization link to alter the original input gene expression. Input expressions are assumed and they are properly pre-normalized, and define the link between Fa0 and Fb1 as a simple feed forward copy operation: xa = Ia. The measurement of the similarity between two GO terms as the information content of their minimal subsumer. A so-called minimal subsumer of two terms ti and t j, denoted as ∇ (ti, t j), is the subsumer that has the minimal likelihood. To formalize: Sim (ti, t j) ≡ℑ (∇ (ti, t j)) = −log (min {p (t) |t ∈ S (ti, t j)}) (1) Where S (ti, t j) is the subsumer set of term ti and t j, essentially being their common ancestor terms. Similarity between GO Annotations of two Genes while equation 1 measures the semantic similarity between two GO terms, it is common that a gene product may be annotated with multiple GO terms, which will lead to multiple term-to-term similarities between two genes. To formalize, suppose the multiple GO annotations of two genes products gi and gj are denoted as: Ai = {ti1, ti2. . . tiP} and Aj = {t j1, t j2. . . t jQ} respectively, their similarity is then calculated as: Sim (Ai, Aj) = max {sim (tix, tjy) |x ∈ [1, P], y ∈ [1, Q]} (2) By applying the maximal term-to-term similarity as the similarity between to GO annotations, we essentially identify their subsume that has the maximal information content, i.e. the maximal common factor. III. CONCLUSION This paper concluded that there are two important soft computing approaches of neural network which are used for pattern matching in iris recognition to enhance the performance. Learning Vector Quantization is a prototype-based supervised classification algorithm in which each output node is represented as a class. Codebook vector (CV) is used for output node. It uses bayes classifier for adjusting the weight. The result obtained depends on the majority voting among several weak classifiers. The patterns matching of the Iris image is to be done with the stored templates from the database. Templates are created with these patterns but it will work fine for less number of users; it is not recommended for large number of users since it requires large storage memory whereas the Adaptive Resonance Associative Map (ARAM) belongs to the family of Adaptive Resonance Theory (ART) self-organizing neural networks. It is capable of incrementally learning recognition www.iosrjournals.org 67 | Page
  • 5. A Study of various soft computing techniques for iris recognition categories and multidimensional maps of patterns. It contains a simplified pattern matching and learning. To improve the pattern matching process mixture model ARAM is used which used gene ontology (GO) and gene expression for checking the similarities and measurements of various pattern. This approach reduced the noise from the whole data and provides the expression between various patterns. As compared Learning Vector Quantization, the Adaptive Resonance Associative map is more recommended for large numbers of users. REFERENCES [1] R. Plemmonsa, M. Horvatha, E. Leonhardta, P. Paucaa, S. Prasad, ―Computational Imaging Systems for Iris Recognition‖, Processing of Spiel 2004. [2] C. L. Tisse, L. Martin, L. Torres, M. Robert, "Person identification technique using human iris recognition", ST Journal of System Research Current Issue 2003. [3] L. Ma, U. Wang, T. Tan, "Iris Recognition Based on Multichannel Gabor Filtering", The 5th Asian Conference on Computer Vision, pp.23—25, Melbourne, Australia, January 2002. [4] R. Narayanswamy, P. E. X. Silveir, "Extended Depth-of-Field Iris Recognition System for a Workstation Environment", Proceedings of the Spied Biometric Technology for Human Identification II,Vol. 5779, pp. 41-50, Orlando, FL, 2005. [5] Z. Wei, T. Tan and Z. Sun, "Synthesis of Large Realistic Iris Databases Using Patch-based Sampling‖, IEEE, 2008. [6] A. Czajka, A. Pacut, "Replay Attack Prevention for Iris Biometrics", IEEE, ICCST 2008. [7] C. Teo and H. Ewe, "An Efficient One-Dimensional Fractal Analysis for Iris Recognition", Proceedings of the 13- thWSCGInternational Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 157-160, Plzen-Bory, Czech Republic, January 31 – February 4, 2005. [8] Daugman J G., ―High confidence visual recognition of persons by a test of statistical independence‖, IEEE Trans. Pattern Anal. Machine Intel. 1993, vol.15, no.11, pp.1148-1161. [9] Wildes R P., ―Iris Recognition: An Emerging Biometric Technology‖, In Proceeding of the IEEE, Piscataway, NJ, vol. 85, pp.1348- 1363, 1997. [10] Daugman J G., ―Recognition persons by their pattern‖, Information Security Technical report, vol.13, no.1, pp. 33-39, 1998. [11] Daugman J G., ―High confidence visual recognition of persons by a test of statistical independence‖, IEEE Trans. Pattern Anal. Machine Intel, 1993, vol.15, no.11, pp. 1148-1161. [12] Daugman J G. ―High Confidence Recognition of Person by Rapid Video Analysis of Iris Texture‖, European Convection on Security Detection and Brighton, Brighton, UK, pp. 244-251, 1995. [13] Daugman J G. ―Recognition persons by their pattern‖, Information Security Technical report, vol.13, no.1, pp.33-39, 1998. [14] CBSR, 2005.Center for biometrics and security research. http://www.cbsr.ia.ac.cn/english/Databases.asp [15] Zhou Zhiping, Hui Maomao, Sun Ziwen, ―An iris recognition based on 2DWPCA and neural network‖, pp.9781-4244-2723, 9/09/$25.00© 2009, IEEE. [16] Tan A.H., ―Adaptive Resonance Associative Map for Neural Networks‖, Vol.8, No.3, pp. 437–446, 1995. [17] Tan A.H., ―Predictive self-organizing networks for text categorization‖, Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), pp. 66–77, 2001. [18] Tan A.H., Ong H.L., Pan H., Ng J., Li Q.X., ―Towards personalized web intelligence‖, Knowledge and Information Systems, Vol.6, No.5, pp.595–616, 2004. [19] Tan A.H., Pan H., ―Predictive neural networks for gene expression data analysis‖, Neural Networks, Vol.18, No.3, pp. 297–306, 2005. [20] Carpenter G., Gross berg S., Rosen D., ―ART 2-A: An adaptive resonance algorithm for rapid category learning and recognition‖, Neural Networks, Vol.4, pp. 493–504, 1991. [21] The Gene Ontology Consortium, ―Gene ontology: tool for the unification of biology‖, Nature Genetics, Vol.25, No.1, pp. 25–29, 2000. [22] Ms. Gaganpreet Kaur, Mr. Akshay Girdhar and Ms. Manvjeet Kaur, " Article: Enhanced Iris Recognition System - an Integrated Approach to Person Identification", International Journal of Computer Applications, vol.8, no.1, pp.1–5, Published by Foundation of Computer Science, October 2010. www.iosrjournals.org 68 | Page