The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile security is a major concern in today's world. Biometric security techniques are modern ways to ensure security in these systems. Iris is a unique biometric trait that offers greater advantage over other traits. The user's iris image is captured using the mobile camera and is matched with the pre stored templates in the phone for the purpose of authentication. But such images are prone to noise...
In this paper, an iris recognition algorithm based on coarse and fine location is described. The algorithm uses the Hough transformation and calculus methods to obtain rough location of the inner and outer boundary of iris, then uses the Canny edge extraction and the round Hough transformation to locate the iris boundary accurately, and finally obtains the accurate iris boundary. Compared with other...
The correct identification of the eyelids and its aperture provide essential data to infer a subject's mental state (e.g., vigilance, fatigue, and drowsiness) and to validate or reduce the search space of other eye features (e.g., pupil, and iris). This knowledge can be used not only to improve many applications, such as eye tracking and iris recognition, but also to derive information about the user...
Iris recognition has proved to be one of the most reliable and stable biometric for human identification. This paper outlines an iris recognition approach based on deep learning. In addition, contour based feature vector has been used to discriminate samples belonging to different classes i.e. difference of sclera-iris and iris-pupil contours, and is named as “Unique Signature”. Moreover, contours...
A Multi-biometric System amalgamates the evidences collected from the multiple sources or single source for person recognition based on templates like fingerprint, palm print and iris. These evidences can be combined at various levels like pixel level, score level, feature level, and decision level. A rich set of information is present at feature level, but there is a problem of dimensionality which...
This paper presents an efficient Iris recognition system based on Fast Fourier Transform. The system is comprised of several algorithms which are employed to provide effective identification of an individual based on the individual's Iris pattern. The proposed combines canny edge detector and circular Hough transform model algorithms which yield more rapid and accurate Iris boundaries localization...
Multibiometric system used to enhanced accuracy of the authentication process and also reduce error rates such as FAR, FRR. Person identification required in many systems such as area-access control, PC login, e-commerce etc. The biometric system is most probably used for security purpose. Unimodal biometric and multimodal biometric are the two frameworks of biometric systems. A single biometric trait...
Biometric traits such as an iris texture is one of the dependable physiological biometric traits because of its uniqueness. In this paper, we explore a different approach of matching score fusion and the effect of normalization method to the fusion process. Despite a plenty of work of iris recognition methods have been proposed in recent years, many are paying attention to the feature extraction process...
Biometrics based security systems play a significant role in almost all the security aspects. Ear is a new class of relative stable biometrics. Feature Extraction plays a vital role in deciding the efficiency of any identification system. One of the challenges in Ear biometric system is segmentation of ear from the image. Ear biometric based human identification system's performance mainly depends...
This paper introduces an iris classification system using FFNNGSA and FFNNPSO. This iris identification system consists of localization of the iris region, normalization, feature extraction and then classification as a final stage. A Canny Edge Detection scheme and a Circular Hough Transform are used to detect the iris boundaries. After that the extracted IRIS region is normalized using Daugman rubber...
A methodological study on significance of image processing and its applications in the field of computer vision is carried out here. During an image processing operation the input given is an image and its output is an enhanced high quality image as per the techniques used. Image processing usually referred as digital image processing, but optical and analog image processing also are possible. Our...
Iris is unique for each person, so that it can be used as one alternative solution for human identification. In this study, an iris recognition system is developed to automatically identify a person by using eye image data. Firstly, iris area of eye image is detected using Canny Edge Detection and Hough Transform methods. Secondly, texture feature of iris image is extracted using statistical moments...
Iris recognition uses automated techniques to extract iris features which are stored in a database as a feature template to be later used for individual identification and authentication. Strict image quality control is a basic requirement for most iris identification systems. Low cost devices used under uncontrolled environments acquire poor iris images with inconsistent illumination and specular...
The iris pattern of human eye is considered to be unique and distinct that it plays an important role as reliable biometric system for authentication purposes. Iris recognition has become a challenging issue under varying lighting or contrast conditions and due to occlusions such as eyelashes. Therefore, in this paper we have proposed a novel technique for eliminating the eyelashes, namely Entropy...
A wide variety of systems requires consistency in personal legality to identify an isolated users seeking access to their opted services. The aim of these systems is to make sure that the yield utilities are gained only by the above board. This Consistency can be achieved by using multibiometric which is associated with weaving of unique physiological features of an isolated user. However, these multibiometric...
Iris based authentication is a pattern recognition technique that makes use of Iris patterns, which are analytically unique. In this paper, we propose a novel approach for enhanced Iris Recognition (IR) system using Segmentation based Background Removal (SBR) and Triangular shaped DCT (TriDCT) extraction techniques. Segmentation is a process of isolating the objects of interest from the rest of scene...
The study of algorithms for iris recognition is an area of continued growth. Although a variety of methods have been proposed, this paper focuses on the analysis and implementation of an algorithm which consists of the basic steps for iris recognition- including preprocessing, segmentation, and normalization, as well as features extraction and matching- on a low-cost, low-power ARM based board, BeagleBone...
Iris Recognition (IR) across illumination variations is a problem of fundamental importance in computer vision. In this paper, we propose two novel techniques, viz., Triangular DCT based Feature Extraction (T-DCT) and Radon Transform based Pre-processing, to improve the performance of an IR system. T-DCT is used for efficient feature extraction and Radon Transform is used for curve detection in iris...
Several recent advancement in field of technology has created a various range of systems or applications that requires reliable and efficient recognition schemes which can determine the identity of the users and only authorized and legitimate persons are allowed to use the service or applications. Signature Verification is the most widely used biometrics for authentication purpose. It is a method...
Iris Recognition (IR) under varying contrast and live-tissues is challenging. This paper proposes two novel techniques viz., Radon Transform Thresholding (RTT) and Gradient-based Isolation (GI). RTT is used to extract the prominent features from the pre-processed image. GI is a pre-processing technique which uses the edge detection property of Gradient operator to isolate the patterns, thereby obtaining...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.