All Iris Code Bits are Not Created Equal

Size: px
Start display at page:

Download "All Iris Code Bits are Not Created Equal"

Transcription

1 All ris Code Bits are Not Created Equal Karen Hollingsworth, Kevin W. Bowyer, Patrick J. Flynn Abstract-Many iris recognition systems use filters to extract information about the texture of an iris image. n the Daugman-style approach, the filter output is mapped to a binary iris code. The normalized Hamming distance between two iris codes is computed and decisions about the identity of a person are based on the computed distance. The normalized Hamming distance weights all bits in an iris code equally. However, this work presents experimental evidence that all the bits in an iris code are not equally useful. Some bits are more consistent than others. An explanation of the cause of this discrepancy is given. Different regions of the iris are compared to evaluate their relative consistency. Finally, this paper investigates the theoretical impact of consistent and inconsistent bits on the false reject rate of an iris recognition system.. NTRODUCTON THE human iris has extraordinary variations in texture, and it has been shown that iris texture can be used to identify a person. One typical method of using the iris for recognition involves applying a texture filter to an image of the iris, and extracting a representation of the texture, called the iris code. The iris code is a set of bits, each one of which indicates whether a given texture filter applied at a given point on the iris image has a negative or non-negative result. Many different texture filters and many different lengths of iris code have been investigated, although the Gabor filter texture analysis proposed by Daugman [1] is considered the traditional approach. Readers interested in other approaches may look at [2] and [3]. n addition, [4] presents a comparative study of different iris recognition algorithms. For a given iris, a bit in its iris code is "fragile" if there is any substantial probability of it ending up a 0 for some images of the iris and a 1 for other images of the iris. The possibility that fragile bits exist in the iris code was initially suggested by Bolle et al. [5]. They model the theoretical lower bounds for the false accept rate (FAR) and the false reject rate (FRR) of an iris biometrics system, and find that "the reported empirical FRR performance degradation is significantly more stable with respect to the system threshold variation than predicted by the theory. This implies that the invariant bits in the iris code representation are dramatically robust to the imaging noise." As a possible explanation for the difference between the empirical and theoretical results, they suggested "...that perhaps not all bits are equally likely to flip, that there are some particularly 'fragile' bits." n this paper, we use the terms "fragile" and "inconsistent" Karen Hollingsworth, Kevin Bowyer, and Patrick Flynn are with the University of Notre Dame. Telephone: (574) Fax: (574) addresses: kholling ond.edu, kwb 0cse.nd.edu, flynn o,nd.edu. interchangeably. To investigate the existence of fragile bits, we compared iris codes from multiple images of the same eye. This comparison showed that, indeed, some bits are more reliable than other bits in an iris code.. DATA AND SOFTWARE The data used for this experiment was collected at the University of Notre Dame and provided to the National nstitute of Standards and Technology (NST) for use in the ris Challenge Evaluation (CE) [6]. All images were acquired using an LG2200 camera. This dataset contains over a hundred different images for each of several irises. No more than six images were acquired for a particular iris of a particular subject in any given week. To test the fragility of individual bits in an iris code, we selected images that were mostly unoccluded by eyelids or lashes. Examples images are shown in Figures 1 through 4. We selected a subset ofthe data that contained 24 subjects, with between 15 and 118 images of the left eye of each subject, for a total dataset of 1251 images. This dataset contains 4 Asian and 20 Caucasian subjects. Ten of the subjects are female and 14 are male. Fig 1. Example image from our dataset. This image has no occlusion by eyelids or eyelashes. However, part of the sclera is included in the segmentation of this iris image. We used software similar to the open source software, risbee [6], for creating the iris codes. This software uses one dimensional log-gabor wavelets to create a 240x20x2-bit iris code. The software we used contains improvements to the segmentation as described in [7]. Our software found the inner and outer boundaries of the iris correctly, as determined by visual inspection, in all 1251 images selected for the study. The images were selected to /07/$ EEE Authorized licensed use limited to: UNVERSTY NOTRE DAME. Downloaded on December 21, 2009 at 15:14 from EEE Xplore. Restrictions apply.

2 there are specular highlights on irises of some of the images (Figure 2). To deal with these segmentation difficulties, we later consider how masking parts ofthe iris affects our results. n cases where the segmentation software detected occlusion by eyelids, parts of the iris region were masked (Figure 3). f part of the iris code was masked in even one image of a subject, the bits from that part of the iris code were left out of all computations in our experiments on that subject. Some of the images have sharp focus, but a few images are poorly focused (Figure 4). Our experiments show that some bits are consistent across all images, even when a few poorly-focused images are included in the experiment. This result matches Bolle's assertion that "the invariant bits in the iris code representation are dramatically robust to the imaging noise." [5] Two different iris codes from the same eye are not necessarily in the same orientation, and may have to be rotated in order to be aligned correctly. We wrote code that would rotate the iris codes so that all codes from the same eye could be aligned and compared for consistency. The output was a 240x20x2 matrix, where each entry in the matrix represented the average value for a particular bit in the iris code. Half of these entries correspond to the real part of the output from the texture filtering process, and half of the entries correspond to the imaginary part. n order to see patterns in the output, we divided each matrix into two 240x20xl matrices where one matrix represents the real bits of the iris code, and the other represents the imaginary bits. Fig 3. n this image, parts of the top and bottom of the iris were masked before the iris code was computed. Fig 4. Despite including some poorly focused images in the dataset, on average 15.99% of bits in the iris codes were perfectly consistent. minimize the effects of segmentation errors; however, some segmentation difficulties could not be avoided. One difficultly lies in the fact that irises are not exactly circular. Therefore, even the best circle caught part of the sclera or eyelid above and below some of the irises (Figure 1). Also,. ExiSTENCE OF FRAGLE BTS All subjects had three different regions apparent in their iris codes: areas consistently equal to 0, areas consistently equal to 1, and inconsistent areas. The inconsistent areas tend to occur at the boundaries between regions of zeros and regions of ones. Examples ofthe inconsistent regions in the iris codes are shown in Figure 5. f a bit was equal to one the majority of the time, but was equal to zero 30% of time, then we say that the bit "flipped" in 300% ofthe iris codes. f a bit was zero the majority of the time, but one for 30% of the time, we still say that the bit "flipped" in 30% of the iris codes. n this figure, the black regions correspond to bits that were flipped in at least 30% of the iris codes. f we are less strict in our definition of what constitutes a truly inconsistent bit, then there will be more inconsistent bits. Figure 6 shows that ifwe consider any bit that flips more than 20% of the time to be fragile, then there will be many fragile bits. fwe consider any bit that flips more than 40% of the time, then there will be fewer fragile bits. n our study we found that, on average, 15.99% of the bits in an iris code were perfectly consistent; that is, 15.99% ofthe unmasked bits were always equal to 1 or always equal to 0, for all iris codes for an iris. The subject with the smallest fraction had 4.74% of the bits perfectly consistent, and the subject with the largest fraction had 33.9% of the bits perfectly consistent. The sample standard deviation across the 24 irises was 6.39%. Authorized licensed use limited to: UNVERSTY NOTRE DAME. Downloaded on December 21, 2009 at 15:14 from EEE Xplore. Restrictions apply.

3 [~C 4~4f45F (Zr -L1C. J4¾J Y Wi F A bea 6 Fig 5. Black areas in each rectangle are less consistent parts of the iris code, and white areas are more consistent. Each rectangle represents data from the iris codes of at least 15 different images of the same eye. Two rectangles are shown for each subject; one rectangle shows the real bits in the iris code, and the next rectangle shows the imaginary bits. Light gray regions are masked regions. The numbers on the side are the subject numbers associated with the CE dataset. (A) p=20% acquire more images of an iris, there are more opportunities to acquire outliers in any given bit in the iris code. n addition to considering perfectly consistent bits, we also looked at the average fragility of the unmasked bits of a subject. For each bit, the percent of the time that the bit flips must lie between 0n and 500n, or between 0 and 0.5. We found the percent ofthe time that each bit flipped and took the average across all bits for a subject. This average fragility for each subject is not correlated with the number of images we had for the subject. The correlation coefficient between these factors is only , which is not statistically significant (p-value ). Fragile bits show up in about equal amounts in both males and females. Figure 7 shows the average fragility of the 24 subjects when divided into groups of males and females. There is no apparent difference between the two genders. n our dataset, Asian subjects had more fragile bits than Caucasian subjects. Figure 8 shows average fragility versus race, and the Asian subjects in general had more fragile bits in their iris codes. However, we only have four Asian subjects in our dataset, so it is quite possible that this trend may not be apparent if we had more Asian subjects. 0, c.a.2._- 0 0, LV F 0.2 F 0.15 F 0.1k 0.05s J Male Female Fig 7. There is no difference in the average fragility of iris code bits between the two different genders. (B) p=30% (C) p=40% Fig 6. The number of fragile bits depends on the threshold used. There are fewer bits that flip in at least 40% of the iris codes than there are that flip in at least 20% of the iris codes. There is a negative correlation between the number of images we had for a subject and the percent of perfectly consistent bits. Specifically, the correlation coefficient between number of images and percent ofperfectly consistent bits is , which is a statistically significant correlation (p-value ). This result makes sense because as we a.2_._- _._ n} k (a) L- 0>u Q.1F _Q r) 0.3k 0.25k 0.2k 0.05 F nj Asian White Fig 8. The four Asian subjects in our dataset tended to have more fragile bits in their iris codes, but with only four subjects, we cannot conclude that this is a general trend. Authorized licensed use limited to: UNVERSTY NOTRE DAME. Downloaded on December 21, 2009 at 15:14 from EEE Xplore. Restrictions apply.

4 The spatial pattern apparent in these consistent and inconsistent regions likely comes as a result of how the iris image is processed. A Fourier transform is applied to the iris image, and then the values are multiplied by the log-gabor filter. Next an inverse Fourier transform is applied, resulting in 4800 complex numbers. Rather than storing the complex numbers as the iris codes, each complex number is mapped to a two-bit number. f the real part of the number is positive, then the first bit is a 1, otherwise the first bit is a 0. f the imaginary part ofthe number is positive, then the second bit is a 1, and otherwise, the second bit is a 0. Thus, a complex number in the first quadrant of the complex plane is mapped to the value, 1 1; the second quadrant, 01; the third quadrant, 00; and the fourth quadrant, 10. f a region ofthe iris image were associated with a complex number near the negative y-axis, small changes in the complex number could make that region of the iris map to a 00 some of the time, and a 10 at other times. n this case, we would expect the real bit to be fragile because half ofthe time that bit would be a 0, and half ofthe time that bit would be a 1. Furthermore, we would expect the imaginary bit to be consistent, because the imaginary bit is equal to zero no matter whether the complex number is in the third or fourth quadrants. Figure 9 shows an example of the distribution of 64 complex numbers from 64 different iris images. Each of these 64 complex numbers is associated with the same location in the iris code. n particular, this location on the iris code had a highly consistent imaginary bit and a highly inconsistent real bit. As we expected, the complex numbers associated with these two bits of the iris lay close to the that the outer bands of the iris contained less discriminating texture features than the inner bands of the iris. Since the inner part of the iris is less likely to be occluded, we suspect that it is the occlusion, rather than lack of texture, that might make outer bands less valuable. To test this idea, we graphed the percent of fragile bits that occurred at each band in the iris. Some of the bits in the iris code never changed over all different images ofthe same eye. These bits have probability close to p = 0.0 of changing. Bits that were equal to 0 half of the time and equal to 1 the other half of the time have a probability close to p = 0.5 of changing. We arbitrarily chose to let the threshold for determining which bits are fragile be p=0.4. That is, any bit that flipped less than 4000 of the time was considered "consistent" for this experiment, and any bit that changed more than 400O of the time was considered "fragile" for this experiment. Using this threshold, we calculated the percent ofbits that were fragile for each row of the "unwrapped" iris image, for all 24 iris images. The results are shown in Figure 10. t T+ e imaginary axis 1 T j. j t ~ ~ ~ ~ ~ ~ ~ ~ ~ Row Number (row 1 is next to pupil) 6 Fig 10. This figure shows the percent of fragile bits in each row of the iris code. Rows in the middle ofthe iris code (rows 5 through 12) are the most consistent. Numbers in the legend refer to the subject number in the CE dataset. U0U2 0.0)i rr-nni1ai s LF, -0.01i T1 negative y-axis. U.U4 t t F n fm Fig 9. These 64 complex numbers, each from the same region on 64 different images of the same subject's eye, all correspond to the same location on the iris code. Each complex number is mapped to two bits. This particular part of the iris code had a highly consistent second (imaginary) bit, and a highly inconsistent first (real) bit. Despite our efforts to obtain unoccluded images for the dataset, we suspected that specular highlights close to the eyelids could be affecting our measurements of the consistency ofthe different bands ofthe iris code. Therefore, we applied a mask to the data to mask the upper and lower quarters of the iris, and then we looked at the percent of fragile bits for each row of the iris code in the unmasked quarters of the iris (left and right sides of the iris). The mask used is shown in Figure 11, and the result is shown in Figure 12. Fig 1 1. Mask used for evaluating the consistency of the inner versus V. NNER BANDS VS. OUTER BANDS Several researchers [8,9,10] have suggested using only the inner part of the iris for recognition. Du et al. [ 1] suggested outer bands of the iris. When we consider only the right and left sides of the iris, and disregard the top and bottom sections, which had the most specular highlights and occlusion, there is not as much spread Authorized licensed use limited to: UNVERSTY NOTRE DAME. Downloaded on December 21, 2009 at 15:14 from EEE Xplore. Restrictions apply.

5 in the fraction of fragile bits across the rows. There still seems to be a high percentage of fragile bits in rows 1 and 2 of the iris code; however, the general trend shows that all rows ofthe iris code have a high amount of consistent information. The fragility threshold, p = 0.4 is used for the graphs presented here. We performed the same test using thresholds of p = 0.30 and p = n all cases, masking the top and bottom quarters improved the consistency of the outer rows. Clearly, the quality of the segmentation affects the value of the outer rows of the iris z using bits from all 4 quarters using bits from left & right quarters only 0.25 te U.115 reject rate is FRR(dT) = Pr(h(Q, R) > dt h(q, R) = 0) pi(l1_p)n-i = 1, i =dt +1 where p is the probability that a bit will flip, and (1 - p) is the probability of not flipping a bit. Since we showed that not all bits have the same probability of flipping, we modify Bolle et al.'s equation to include two different probabilities. Suppose that k of the bits have probability p1 of flipping, and N - k have probability P2 of flipping. The first k bits will be termed "Set 1" and the second k bits are "Set 2". Let p, > P2 so that Set 1 contains the more fragile bits. Let i be the number of bits that flip when iris code Q is acquired. The normalized Hamming distance is the fraction of bits in the two iris codes that disagree, so the probability of a false reject is the probability that i/n > dt, or equivalently, that i > N dt. Let j be the number of bits from Set 1 that flip, and let i - j be the number of bits from set 2 that flip. The probability of j bits flipping, out of k bits from Set 1 is G Fowv Number 14 1G J Fig 12. When the regions most affected by specular highlights and occlusion are masked, the consistency of the outer rows of the iris code improves. (The black horizontal line is drawn to aid in comparison between outer and inner rows.) The probability of i -j bits flipping, out ofthe N -k bits in set 2 is V. THEORETCAL MPACT OF FRAGLE BTS ON FALSE REJECT RATE Thus, the total FRR when using all N bits from the iris code is Knowing which bits in a particular subject's iris code are fragile could improve recognition performance. At enrollment, a sequence of iris images could be taken and analyzed to create the enrollment iris code and a mask which would mask out inconsistent bits. Such a mask could be used in addition to a mask for masking out eyelids and eyelashes. This section presents the theoretical false reject rate for an iris recognition scenario, and then shows how this rate can be improved by masking out the fragile bits in the iris code. We try to follow as closely as possible the notation presented by Bolle et al. in their calculations of FRR. We make two different calculations for FRR. The first calculation presents the error rate for a traditional method that uses all bits in the iris code, and the second calculation presents the error rate for a method that masks fragile bits and only uses the more consistent bits. Let Q and R be real world iris codes of length N, both from the same iris. When iris code Q is calculated by the iris acquisition system, some ofthe bits flip so that the result, Q, is only an approximation to the true iris code, and does not match iris code R exactly. f enough ofthe bits flip so that the Hamming distance h( Q, R) exceeds the decision threshold, dt, then a false reject occurs. Bolle et al. showed that the false (P2 ) (1 P2 ) k N-k k(pl)p Y.j(1) j(2) P2)_N-k-i+j summed over all possible values for i and j: i ranges from N dt to N, andj ranges from max{i -N + k, 0 to min{i, k}. Now consider the situation where the k fragile bits from Set 1 are masked out. Let it be the number of remaining bits that flip. The probability of a false reject is the probability that i*/(n - k) > dt. The total FRR when using N - k bits is NE i*=(n-k)-dt N-k pi(_pnki i V. NUMERCAL EVALUATON To compare the situation of using all N bits to the second situation of using only N - k bits, we assume some numerical values. Bolle et al. used N = 173 because Daugman's 1993 paper found 173 independent degrees of freedom in the iris code. n order for our results to be easily comparable to Bolle et al., we also take N= 173. We analyzed the experimental consistency data so we could choose reasonable values for k, Pt, and P2. For each subject, we divided the bits into two groups: fragile bits with probability greater than 0.4 of flipping, and consistent bits Authorized licensed use limited to: UNVERSTY NOTRE DAME. Downloaded on December 21, 2009 at 15:14 from EEE Xplore. Restrictions apply.

6 with probability less than 0.4 of flipping. We counted how many bits fell into each group. On average, 15.0% ofbits had probability greater than 0.4 of flipping, and 85.0% of bits had probability less than 0.4 of flipping. The probability of a bit from the first group flipping averaged , and the probability of a bit from the second group flipping averaged % of 173 is approximately 26, so we let k = 26. We also let pl= and let P2= Assuming these numerical values, the FRR for the traditional scenario is , and the FRR for the scenario which masks the fragile bits is Thus, detecting fragile bits and masking them out can improve accuracy. V. CONCLUSON The consistency of the different bits in an iris code has not been studied by any other previously published work. Our experiments prove the existence of fragile bits. There appears to be no gender difference in the consistency of iris code bits. The evidence is not conclusive as to whether there might be an Asian/Caucasian race difference. There is not a large difference between the consistency of the inner and outer bands, although the inner and outer bands seem to be slightly worse than the middle bands. An important direction for future research is to test how modifications of the algorithm affect the consistency of the iris code bits. This study holds great potential for increasing our understanding of the workings of Daugman-style iris recognition systems, and for significantly decreasing the error rates of such systems. n the future, iris biometrics could potentially be used with extremely large populations. Any application of iris biometrics on a nationwide scale would necessitate extremely low error rates. Based on our numerical evaluations, we expect that we could potentially reduce the false reject rate by three orders of magnitude by using our knowledge of consistent and inconsistent bits. [3] Kevin Bowyer, Karen Hollingsworth, and Patrick Flynn. mage understanding for biometrics: a survey. University ofnotre Dame CSE Technical Report, [4] P. J. Phillips, W. T. Scruggs, A. J. O'Toole, P. J. Flynn, K.W. Bowyer, C. L. Schott, and M. Sharpe. FRVT 2006 and CE 2006 large-scale results. Technical report, National nstitute of Standards and Technology, NSTR 7408, March [5] Ruud M. Bolle, Sharath Pankanti, Jonathan H. Connell, and Nalini Ratha. ris individuality: A partial iris model. n nternational Conference on Pattern Recognition, pages 11: , [6] National nstitute of Standards and Technology. ris Challenge Evaluation, 2006, [7] Xiaomei Liu, Kevin W. Bowyer, and Patrick J. Flynn. Experiments with an improved iris segmentation algorithm. n Fourth EEE Workshop on Automatic dentification Technologies, pages , October [8] Christel-loic Tisse, Lionel Martin, Lionel Torres, and Michel Robert. Person identification technique using human iris recognition. Vision nterface, pages , [9] Li Ma, Tieniu Tan, Yunhong Wang, and Dexin Zhang. Local intensity variation analysis for iris recognition. Pattern Recognition, 37(6): , Feb 2004 [10] Kazuyuki Miyazawa, Koichi to, Takafumi Aoki, Koji Kobayashi, and Hiroshi Nakajima. An efficient iris recognition algorithm using phase-based image matching. nt. Conf on mage Processing, pages 11:49-52,2005. [11] Yingzi Du, Bradford Bonney, Robert ves, Delores Etter, and Robert Schultz. Analysis of partial iris recognition using a 1 -D approach. nternational Conference on Acoustics, Speech, and Signal Processing, pages 11: , ACKNOWLEDGMENT Biometrics research at the University of Notre Dame is supported by the National Science Foundation under grant CNSO , bythe Central ntelligence Agency, bythe US Department of Justice/National nstitute for Justice under grants 2005-DD-CX-K078 and 2006-J-CX-K041, by the National Geospatial ntelligence Agency, and by UNSYS Corp. The opinions, fimdings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of our sponsors. REFERENCES [1] John Daugman. How iris recognition works. EEE Transactions on Circuits and Systemsfor Video Technology, 14(1):21-30, [2] Richard P. Wildes. ris recognition. n Biometric Systems: Technology, Design and Performance Evaluation, pages Spring-Verlag, Authorized licensed use limited to: UNVERSTY NOTRE DAME. Downloaded on December 21, 2009 at 15:14 from EEE Xplore. Restrictions apply.

The Best Bits in an Iris Code

The Best Bits in an Iris Code IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), to appear. 1 The Best Bits in an Iris Code Karen P. Hollingsworth, Kevin W. Bowyer, Fellow, IEEE, and Patrick J. Flynn, Senior Member,

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

Using Fragile Bit Coincidence to Improve Iris Recognition

Using Fragile Bit Coincidence to Improve Iris Recognition Using Fragile Bit Coincidence to Improve Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn Abstract The most common iris biometric algorithm represents the texture of an iris

More information

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu

More information

Recent research results in iris biometrics

Recent research results in iris biometrics Recent research results in iris biometrics Karen Hollingsworth, Sarah Baker, Sarah Ring Kevin W. Bowyer, and Patrick J. Flynn Computer Science and Engineering Department, University of Notre Dame, Notre

More information

ACCEPTED MANUSCRIPT. Pupil Dilation Degrades Iris Biometric Performance

ACCEPTED MANUSCRIPT. Pupil Dilation Degrades Iris Biometric Performance Accepted Manuscript Pupil Dilation Degrades Iris Biometric Performance Karen Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn Dept. of Computer Science and Engineering, University of Notre Dame Notre

More information

RELIABLE identification of people is required for many

RELIABLE identification of people is required for many Improved Iris Recognition Through Fusion of Hamming Distance and Fragile Bit Distance Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn Abstract The most common iris biometric algorithm represents

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

Distinguishing Identical Twins by Face Recognition

Distinguishing Identical Twins by Face Recognition Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The

More information

Image Averaging for Improved Iris Recognition

Image Averaging for Improved Iris Recognition Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video

More information

ANALYSIS OF PARTIAL IRIS RECOGNITION

ANALYSIS OF PARTIAL IRIS RECOGNITION ANALYSIS OF PARTIAL IRIS RECOGNITION Yingzi Du, Robert Ives, Bradford Bonney, Delores Etter Electrical Engineering Department, U.S. Naval Academy, Annapolis, MD, USA 21402 ABSTRACT In this paper, we investigate

More information

Global and Local Quality Measures for NIR Iris Video

Global and Local Quality Measures for NIR Iris Video Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

Image Averaging for Improved Iris Recognition

Image Averaging for Improved Iris Recognition Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

THE field of iris recognition is an active and rapidly

THE field of iris recognition is an active and rapidly 1 Iris Recognition using Signal-level Fusion of Frames from Video Karen Hollingsworth, Tanya Peters, Kevin W. Bowyer, Fellow, IEEE, and Patrick J. Flynn, Senior Member, IEEE Abstract No published prior

More information

Template Aging in Iris Biometrics: Evidence of Increased False Reject Rate in ICE 2006

Template Aging in Iris Biometrics: Evidence of Increased False Reject Rate in ICE 2006 Template Aging in Iris Biometrics: Evidence of Increased False Reject Rate in ICE 2006 Sarah E. Baker, Kevin W. Bowyer, Patrick J. Flynn and P. Jonathon Phillips Abstract Using a data set with approximately

More information

A One-Dimensional Approach for Iris Identification

A One-Dimensional Approach for Iris Identification A One-Dimensional Approach for Iris Identification Yingzi Du a*, Robert Ives a, Delores Etter a, Thad Welch a, Chein-I Chang b a Electrical Engineering Department, United States Naval Academy, Annapolis,

More information

Factors that degrade the match distribution in iris biometrics

Factors that degrade the match distribution in iris biometrics IDIS (2009) 2:327 343 DOI 10.1007/s12394-009-0037-z Factors that degrade the match distribution in iris biometrics Kevin W. Bowyer & Sarah E. Baker & Amanda Hentz & Karen Hollingsworth & Tanya Peters &

More information

Software Development Kit to Verify Quality Iris Images

Software Development Kit to Verify Quality Iris Images Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,

More information

Impact of out-of-focus blur on iris recognition

Impact of out-of-focus blur on iris recognition Impact of out-of-focus blur on iris recognition Nadezhda Sazonova 1, Stephanie Schuckers, Peter Johnson, Paulo Lopez-Meyer 1, Edward Sazonov 1, Lawrence Hornak 3 1 Department of Electrical and Computer

More information

Copyright 2006 Society of Photo-Optical Instrumentation Engineers.

Copyright 2006 Society of Photo-Optical Instrumentation Engineers. Adam Czajka, Przemek Strzelczyk, ''Iris recognition with compact zero-crossing-based coding'', in: Ryszard S. Romaniuk (Ed.), Proceedings of SPIE - Volume 6347, Photonics Applications in Astronomy, Communications,

More information

Real Time Word to Picture Translation for Chinese Restaurant Menus

Real Time Word to Picture Translation for Chinese Restaurant Menus Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 837 Iris Recognition Using Signal-Level Fusion of Frames From Video Karen Hollingsworth, Tanya Peters, Kevin W. Bowyer,

More information

Iris Pattern Segmentation using Automatic Segmentation and Window Technique

Iris Pattern Segmentation using Automatic Segmentation and Window Technique Iris Pattern Segmentation using Automatic Segmentation and Window Technique Swati Pandey 1 Department of Electronics and Communication University College of Engineering, Rajasthan Technical University,

More information

Authentication using Iris

Authentication using Iris Authentication using Iris C.S.S.Anupama Associate Professor, Dept of E.I.E, V.R.Siddhartha Engineering College, Vijayawada, A.P P.Rajesh Assistant Professor Dept of E.I.E V.R.Siddhartha Engineering College

More information

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique Ms. Priti V. Dable 1, Prof. P.R. Lakhe 2, Mr. S.S. Kemekar 3 Ms. Priti V. Dable 1 (PG Scholar) Comm (Electronics) S.D.C.E.

More information

Fast identification of individuals based on iris characteristics for biometric systems

Fast identification of individuals based on iris characteristics for biometric systems Fast identification of individuals based on iris characteristics for biometric systems J.G. Rogeri, M.A. Pontes, A.S. Pereira and N. Marranghello Department of Computer Science and Statistic, IBILCE, Sao

More information

Note on CASIA-IrisV3

Note on CASIA-IrisV3 Note on CASIA-IrisV3 1. Introduction With fast development of iris image acquisition technology, iris recognition is expected to become a fundamental component of modern society, with wide application

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.

More information

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.

More information

IRIS Recognition Using Cumulative Sum Based Change Analysis

IRIS Recognition Using Cumulative Sum Based Change Analysis IRIS Recognition Using Cumulative Sum Based Change Analysis L.Hari.Hara.Brahma Kuppam Engineering College, Chittoor. Dr. G.N.Kodanda Ramaiah Head of Department, Kuppam Engineering College, Chittoor. Dr.M.N.Giri

More information

Iris Recognition based on Local Mean Decomposition

Iris Recognition based on Local Mean Decomposition Appl. Math. Inf. Sci. 8, No. 1L, 217-222 (2014) 217 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l27 Iris Recognition based on Local Mean Decomposition

More information

ABSTRACT I. INTRODUCTION II. LITERATURE SURVEY

ABSTRACT I. INTRODUCTION II. LITERATURE SURVEY International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 3 ISSN : 2456-3307 IRIS Biometric Recognition for Person Identification

More information

The Results of the NICE.II Iris Biometrics Competition. Kevin W. Bowyer. Department of Computer Science and Engineering. University of Notre Dame

The Results of the NICE.II Iris Biometrics Competition. Kevin W. Bowyer. Department of Computer Science and Engineering. University of Notre Dame The Results of the NICE.II Iris Biometrics Competition Kevin W. Bowyer Department of Computer Science and Engineering University of Notre Dame Notre Dame, Indiana 46556 USA kwb@cse.nd.edu Abstract. The

More information

Preprocessing of IRIS image Using High Boost Median (HBM) for Human Personal Identification

Preprocessing of IRIS image Using High Boost Median (HBM) for Human Personal Identification Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2,

More information

Automatic Iris Segmentation Using Active Near Infra Red Lighting

Automatic Iris Segmentation Using Active Near Infra Red Lighting Automatic Iris Segmentation Using Active Near Infra Red Lighting Carlos H. Morimoto Thiago T. Santos Adriano S. Muniz Departamento de Ciência da Computação - IME/USP Rua do Matão, 1010, São Paulo, SP,

More information

Mathematics of Magic Squares and Sudoku

Mathematics of Magic Squares and Sudoku Mathematics of Magic Squares and Sudoku Introduction This article explains How to create large magic squares (large number of rows and columns and large dimensions) How to convert a four dimensional magic

More information

Subregion Mosaicking Applied to Nonideal Iris Recognition

Subregion Mosaicking Applied to Nonideal Iris Recognition Subregion Mosaicking Applied to Nonideal Iris Recognition Tao Yang, Joachim Stahl, Stephanie Schuckers, Fang Hua Department of Computer Science Department of Electrical Engineering Clarkson University

More information

Experiment 2: Transients and Oscillations in RLC Circuits

Experiment 2: Transients and Oscillations in RLC Circuits Experiment 2: Transients and Oscillations in RLC Circuits Will Chemelewski Partner: Brian Enders TA: Nielsen See laboratory book #1 pages 5-7, data taken September 1, 2009 September 7, 2009 Abstract Transient

More information

Image Understanding for Iris Biometrics: A Survey

Image Understanding for Iris Biometrics: A Survey Image Understanding for Iris Biometrics: A Survey Kevin W. Bowyer, Karen Hollingsworth, and Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, Indiana

More information

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and 8.1 INTRODUCTION In this chapter, we will study and discuss some fundamental techniques for image processing and image analysis, with a few examples of routines developed for certain purposes. 8.2 IMAGE

More information

28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies 8th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies A LOWER BOUND ON THE STANDARD ERROR OF AN AMPLITUDE-BASED REGIONAL DISCRIMINANT D. N. Anderson 1, W. R. Walter, D. K.

More information

IRIS RECOGNITION OF DEFOCUSED IMAGES FOR MOBILE PHONES

IRIS RECOGNITION OF DEFOCUSED IMAGES FOR MOBILE PHONES International Journal of Pattern Recognition and Artificial Intelligence c World Scientific Publishing Company IRIS RECOGNITION OF DEFOCUSED IMAGES FOR MOBILE PHONES BO LIU 1, SIEW-KEI LAM,2, THAMBIPILLAI

More information

NOVEL APPROACH OF ACCURATE IRIS LOCALISATION FORM HIGH RESOLUTION EYE IMAGES SUITABLE FOR FAKE IRIS DETECTION

NOVEL APPROACH OF ACCURATE IRIS LOCALISATION FORM HIGH RESOLUTION EYE IMAGES SUITABLE FOR FAKE IRIS DETECTION International Journal of Information Technology and Knowledge Management July-December 2010, Volume 3, No. 2, pp. 685-690 NOVEL APPROACH OF ACCURATE IRIS LOCALISATION FORM HIGH RESOLUTION EYE IMAGES SUITABLE

More information

IRIS RECOGNITION USING GABOR

IRIS RECOGNITION USING GABOR IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition

More information

Multimodal Face Recognition using Hybrid Correlation Filters

Multimodal Face Recognition using Hybrid Correlation Filters Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com

More information

Improving Far and FRR of an Iris Recognition System

Improving Far and FRR of an Iris Recognition System IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 09 February 2017 ISSN (online): 2349-6010 Improving Far and FRR of an Iris Recognition System Neha Kochher Assistant

More information

Auto-tagging The Facebook

Auto-tagging The Facebook Auto-tagging The Facebook Jonathan Michelson and Jorge Ortiz Stanford University 2006 E-mail: JonMich@Stanford.edu, jorge.ortiz@stanford.com Introduction For those not familiar, The Facebook is an extremely

More information

Tu SRS3 07 Ultra-low Frequency Phase Assessment for Broadband Data

Tu SRS3 07 Ultra-low Frequency Phase Assessment for Broadband Data Tu SRS3 07 Ultra-low Frequency Phase Assessment for Broadband Data F. Yang* (CGG), R. Sablon (CGG) & R. Soubaras (CGG) SUMMARY Reliable low frequency content and phase alignment are critical for broadband

More information

Biometrics Final Project Report

Biometrics Final Project Report Andres Uribe au2158 Introduction Biometrics Final Project Report Coin Counter The main objective for the project was to build a program that could count the coins money value in a picture. The work was

More information

Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function

Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function Fang Hua 1, Peter Johnson 1, Nadezhda Sazonova 2, Paulo Lopez-Meyer 2, Stephanie Schuckers 1 1 ECE Department,

More information

Audio Fingerprinting using Fractional Fourier Transform

Audio Fingerprinting using Fractional Fourier Transform Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,

More information

Fast Subsequent Color Iris Matching in large Database

Fast Subsequent Color Iris Matching in large Database www.ijcsi.org 72 Fast Subsequent Color Iris Matching in large Database Adnan Alam Khan 1, Safeeullah Soomro 2 and Irfan Hyder 3 1 PAF-KIET Department of Telecommunications, Employer of Institute of Business

More information

Digital Image Processing. Lecture # 6 Corner Detection & Color Processing

Digital Image Processing. Lecture # 6 Corner Detection & Color Processing Digital Image Processing Lecture # 6 Corner Detection & Color Processing 1 Corners Corners (interest points) Unlike edges, corners (patches of pixels surrounding the corner) do not necessarily correspond

More information

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory Prev Sci (2007) 8:206 213 DOI 10.1007/s11121-007-0070-9 How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory John W. Graham & Allison E. Olchowski & Tamika

More information

Detection and Verification of Missing Components in SMD using AOI Techniques

Detection and Verification of Missing Components in SMD using AOI Techniques , pp.13-22 http://dx.doi.org/10.14257/ijcg.2016.7.2.02 Detection and Verification of Missing Components in SMD using AOI Techniques Sharat Chandra Bhardwaj Graphic Era University, India bhardwaj.sharat@gmail.com

More information

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 Objective: Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 This Matlab Project is an extension of the basic correlation theory presented in the course. It shows a practical application

More information

Method of color interpolation in a single sensor color camera using green channel separation

Method of color interpolation in a single sensor color camera using green channel separation University of Wollongong Research Online Faculty of nformatics - Papers (Archive) Faculty of Engineering and nformation Sciences 2002 Method of color interpolation in a single sensor color camera using

More information

Digital Image Processing 3/e

Digital Image Processing 3/e Laboratory Projects for Digital Image Processing 3/e by Gonzalez and Woods 2008 Prentice Hall Upper Saddle River, NJ 07458 USA www.imageprocessingplace.com The following sample laboratory projects are

More information

Direct Attacks Using Fake Images in Iris Verification

Direct Attacks Using Fake Images in Iris Verification Direct Attacks Using Fake Images in Iris Verification Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition

More information

Improved iris localization by using wide and narrow field of view cameras for iris recognition

Improved iris localization by using wide and narrow field of view cameras for iris recognition Improved iris localization by using wide and narrow field of view cameras for iris recognition Yeong Gon Kim Kwang Yong Shin Kang Ryoung Park Optical Engineering 52(10), 103102 (October 2013) Improved

More information

BEing an internal organ, naturally protected, visible from

BEing an internal organ, naturally protected, visible from On the Feasibility of the Visible Wavelength, At-A-Distance and On-The-Move Iris Recognition (Invited Paper) Hugo Proença Abstract The dramatic growth in practical applications for iris biometrics has

More information

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam

More information

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich *

Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Dept. of Computer Science, University of Buenos Aires, Argentina ABSTRACT Conventional techniques for signal

More information

Reliable Classification of Partially Occluded Coins

Reliable Classification of Partially Occluded Coins Reliable Classification of Partially Occluded Coins e-mail: L.J.P. van der Maaten P.J. Boon MICC, Universiteit Maastricht P.O. Box 616, 6200 MD Maastricht, The Netherlands telephone: (+31)43-3883901 fax:

More information

SELECTING RELEVANT DATA

SELECTING RELEVANT DATA EXPLORATORY ANALYSIS The data that will be used comes from the reviews_beauty.json.gz file which contains information about beauty products that were bought and reviewed on Amazon.com. Each data point

More information

VALIDATION OF THE CLOUD AND CLOUD SHADOW ASSESSMENT SYSTEM FOR LANDSAT IMAGERY (CASA-L VERSION 1.3)

VALIDATION OF THE CLOUD AND CLOUD SHADOW ASSESSMENT SYSTEM FOR LANDSAT IMAGERY (CASA-L VERSION 1.3) GDA Corp. VALIDATION OF THE CLOUD AND CLOUD SHADOW ASSESSMENT SYSTEM FOR LANDSAT IMAGERY (-L VERSION 1.3) GDA Corp. has developed an innovative system for Cloud And cloud Shadow Assessment () in Landsat

More information

[Kalsi*, 4.(7): July, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Kalsi*, 4.(7): July, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EFFICIENT BIOMETRIC IRIS RECOGNITION USING GAMMA CORRECTION & HISTOGRAM THRESHOLDING WITH PCA Jasvir Singh Kalsi*, Priyadarshani

More information

Long Range Acoustic Classification

Long Range Acoustic Classification Approved for public release; distribution is unlimited. Long Range Acoustic Classification Authors: Ned B. Thammakhoune, Stephen W. Lang Sanders a Lockheed Martin Company P. O. Box 868 Nashua, New Hampshire

More information

Automatic Dry Eye Detection

Automatic Dry Eye Detection Automatic Dry Eye Detection Tamir Yedidya 1, Richard Hartley 1, Jean-Pierre Guillon 2, and Yogesan Kanagasingam 2 1 The Australian National University, and National ICT Australia 2 Faculty of Medicine

More information

Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy

Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy Mario Konrad 1,HerbertStögner 1, and Andreas Uhl 1,2 1 School of Communication Engineering for

More information

A Fast Algorithm of Extracting Rail Profile Base on the Structured Light

A Fast Algorithm of Extracting Rail Profile Base on the Structured Light A Fast Algorithm of Extracting Rail Profile Base on the Structured Light Abstract Li Li-ing Chai Xiao-Dong Zheng Shu-Bin College of Urban Railway Transportation Shanghai University of Engineering Science

More information

Iris Recognition using Enhanced Method for Pupil Detection and Feature Extraction for Security Systems

Iris Recognition using Enhanced Method for Pupil Detection and Feature Extraction for Security Systems IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.11, November 2013 55 Iris Recognition using Enhanced Method for Pupil Detection and Feature Extraction for Security Systems

More information

Accurate Utility Depth Measurements Using the Spar 300

Accurate Utility Depth Measurements Using the Spar 300 Accurate Utility Depth Measurements Using the Spar 3 This Application Note addresses how to obtain accurate subsurface utility depths using the model-based methods employed by the Spar 3. All electromagnetic

More information

Improving the Detection of Near Earth Objects for Ground Based Telescopes

Improving the Detection of Near Earth Objects for Ground Based Telescopes Improving the Detection of Near Earth Objects for Ground Based Telescopes Anthony O'Dell Captain, United States Air Force Air Force Research Laboratories ABSTRACT Congress has mandated the detection of

More information

U.S.N.A. --- Trident Scholar project report; no. 342 (2006) USING NON-ORTHOGONAL IRIS IMAGES FOR IRIS RECOGNITION

U.S.N.A. --- Trident Scholar project report; no. 342 (2006) USING NON-ORTHOGONAL IRIS IMAGES FOR IRIS RECOGNITION U.S.N.A. --- Trident Scholar project report; no. 342 (2006) USING NON-ORTHOGONAL IRIS IMAGES FOR IRIS RECOGNITION by MIDN 1/C Ruth Mary Gaunt, Class of 2006 United States Naval Academy Annapolis, MD (signature)

More information

Multiple Sound Sources Localization Using Energetic Analysis Method

Multiple Sound Sources Localization Using Energetic Analysis Method VOL.3, NO.4, DECEMBER 1 Multiple Sound Sources Localization Using Energetic Analysis Method Hasan Khaddour, Jiří Schimmel Department of Telecommunications FEEC, Brno University of Technology Purkyňova

More information

Target detection in side-scan sonar images: expert fusion reduces false alarms

Target detection in side-scan sonar images: expert fusion reduces false alarms Target detection in side-scan sonar images: expert fusion reduces false alarms Nicola Neretti, Nathan Intrator and Quyen Huynh Abstract We integrate several key components of a pattern recognition system

More information

DIGITAL IMAGE PROCESSING Quiz exercises preparation for the midterm exam

DIGITAL IMAGE PROCESSING Quiz exercises preparation for the midterm exam DIGITAL IMAGE PROCESSING Quiz exercises preparation for the midterm exam In the following set of questions, there are, possibly, multiple correct answers (1, 2, 3 or 4). Mark the answers you consider correct.

More information

ROBUST PITCH TRACKING USING LINEAR REGRESSION OF THE PHASE

ROBUST PITCH TRACKING USING LINEAR REGRESSION OF THE PHASE - @ Ramon E Prieto et al Robust Pitch Tracking ROUST PITCH TRACKIN USIN LINEAR RERESSION OF THE PHASE Ramon E Prieto, Sora Kim 2 Electrical Engineering Department, Stanford University, rprieto@stanfordedu

More information

Infographics at CDC for a nonscientific audience

Infographics at CDC for a nonscientific audience Infographics at CDC for a nonscientific audience A Standards Guide for creating successful infographics Centers for Disease Control and Prevention Office of the Associate Director for Communication 03/14/2012;

More information

Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India)

Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India) Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India) eramritpalsaini@gmail.com Abstract: The demand for an accurate biometric system that provides

More information

Chapter 3. Graphical Methods for Describing Data. Copyright 2005 Brooks/Cole, a division of Thomson Learning, Inc.

Chapter 3. Graphical Methods for Describing Data. Copyright 2005 Brooks/Cole, a division of Thomson Learning, Inc. Chapter 3 Graphical Methods for Describing Data 1 Frequency Distribution Example The data in the column labeled vision for the student data set introduced in the slides for chapter 1 is the answer to the

More information

Prof. Vidya Manian Dept. of Electrical and Comptuer Engineering

Prof. Vidya Manian Dept. of Electrical and Comptuer Engineering Image Processing Intensity Transformations Chapter 3 Prof. Vidya Manian Dept. of Electrical and Comptuer Engineering INEL 5327 ECE, UPRM Intensity Transformations 1 Overview Background Basic intensity

More information

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION Scott Deeann Chen and Pierre Moulin University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering 5 North Mathews

More information

A Novel Image Deblurring Method to Improve Iris Recognition Accuracy

A Novel Image Deblurring Method to Improve Iris Recognition Accuracy A Novel Image Deblurring Method to Improve Iris Recognition Accuracy Jing Liu University of Science and Technology of China National Laboratory of Pattern Recognition, Institute of Automation, Chinese

More information

Image preprocessing in spatial domain

Image preprocessing in spatial domain Image preprocessing in spatial domain convolution, convolution theorem, cross-correlation Revision:.3, dated: December 7, 5 Tomáš Svoboda Czech Technical University, Faculty of Electrical Engineering Center

More information

Authenticated Automated Teller Machine Using Raspberry Pi

Authenticated Automated Teller Machine Using Raspberry Pi Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.

More information

Connected Mathematics 2, 6th Grade Units (c) 2006 Correlated to: Utah Core Curriculum for Math (Grade 6)

Connected Mathematics 2, 6th Grade Units (c) 2006 Correlated to: Utah Core Curriculum for Math (Grade 6) Core Standards of the Course Standard I Students will acquire number sense and perform operations with rational numbers. Objective 1 Represent whole numbers and decimals in a variety of ways. A. Change

More information

How Many Pixels Do We Need to See Things?

How Many Pixels Do We Need to See Things? How Many Pixels Do We Need to See Things? Yang Cai Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213, USA ycai@cmu.edu

More information

Tile Number and Space-Efficient Knot Mosaics

Tile Number and Space-Efficient Knot Mosaics Tile Number and Space-Efficient Knot Mosaics Aaron Heap and Douglas Knowles arxiv:1702.06462v1 [math.gt] 21 Feb 2017 February 22, 2017 Abstract In this paper we introduce the concept of a space-efficient

More information

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye

More information

Impact of Resolution and Blur on Iris Identification

Impact of Resolution and Blur on Iris Identification 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Abstract

More information