International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

Similar documents
Iris Segmentation & Recognition in Unconstrained Environment

Iris Recognition using Hamming Distance and Fragile Bit Distance

IRIS Recognition Using Cumulative Sum Based Change Analysis

NOVEL APPROACH OF ACCURATE IRIS LOCALISATION FORM HIGH RESOLUTION EYE IMAGES SUITABLE FOR FAKE IRIS DETECTION

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

Iris Recognition using Histogram Analysis

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

ISSN: [Deepa* et al., 6(2): February, 2017] Impact Factor: 4.116

Postprint.

Direct Attacks Using Fake Images in Iris Verification

Fast identification of individuals based on iris characteristics for biometric systems

Iris Pattern Segmentation using Automatic Segmentation and Window Technique

Experiments with An Improved Iris Segmentation Algorithm

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

A New Fake Iris Detection Method

ANALYSIS OF PARTIAL IRIS RECOGNITION

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS RECOGNITION USING GABOR

Iris Recognition with Fake Identification

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

Pattern Matching based Iris Recognition System

Copyright 2006 Society of Photo-Optical Instrumentation Engineers.

Recent research results in iris biometrics

International Journal of Advance Engineering and Research Development

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Iris Recognition based on Pupil using Canny edge detection and K- Means Algorithm Chinni. Jayachandra, H.Venkateswara Reddy

Authentication using Iris

Global and Local Quality Measures for NIR Iris Video

Iris Recognition-based Security System with Canny Filter

ISSN: Page 511. International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017

Biometric Recognition Techniques

Impact of out-of-focus blur on iris recognition

A One-Dimensional Approach for Iris Identification

ABSTRACT I. INTRODUCTION II. LITERATURE SURVEY

Image Averaging for Improved Iris Recognition

Authenticated Automated Teller Machine Using Raspberry Pi

Note on CASIA-IrisV3

Iris Recognition in Mobile Devices

Evaluation of the Impact of Noise on Iris Recognition Biometric Authentication Systems

Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India)

Automatic Iris Segmentation Using Active Near Infra Red Lighting

[Kalsi*, 4.(7): July, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

Impact of Resolution and Blur on Iris Identification

Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System

Iris based Human Identification using Median and Gaussian Filter

Design of Iris Recognition System Using Reverse Biorthogonal Wavelet for UBIRIS Database

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

BEing an internal organ, naturally protected, visible from

Fast Subsequent Color Iris Matching in large Database

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Critical Literature Survey on Iris Biometric Recognition

Improving Far and FRR of an Iris Recognition System

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Modern Biometric Technologies: Technical Issues and Research Opportunities

Iris Recognition based on Local Mean Decomposition

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER

Automatic Licenses Plate Recognition System

Software Development Kit to Verify Quality Iris Images

The Role of Biometrics in Virtual Communities. and Digital Governments

A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES

BIOMETRICS BY- VARTIKA PAUL 4IT55

Title Goes Here Algorithms for Biometric Authentication

IRIS RECOGNITION SYSTEM

Selection of parameters in iris recognition system

Touchless Fingerprint Recognization System

Iris Recognition using Left and Right Iris Feature of the Human Eye for Bio-Metric Security System

ACCEPTED MANUSCRIPT. Pupil Dilation Degrades Iris Biometric Performance

Learning Hierarchical Visual Codebook for Iris Liveness Detection

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c

AN EFFICIENT METHOD FOR RECOGNIZING IDENTICAL TWINS USING FACIAL ASPECTS

Using Fragile Bit Coincidence to Improve Iris Recognition

Implementation of Face Spoof Recognization by Using Image Distortion Analysis

Improved iris localization by using wide and narrow field of view cameras for iris recognition

Performance Analysis of Multimodal Biometric System Authentication

License Plate Localisation based on Morphological Operations

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Improved Human Identification using Finger Vein Images

Image Averaging for Improved Iris Recognition

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches

A Novel Approach for Human Identification Finger Vein Images

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Efficient Iris Segmentation using Grow-Cut Algorithm for Remotely Acquired Iris Images

Empirical Evaluation of Visible Spectrum Iris versus Periocular Recognition in Unconstrained Scenario on Smartphones

Biometrics - A Tool in Fraud Prevention

Contact lens detection in iris images

U.S.N.A. --- Trident Scholar project report; no. 342 (2006) USING NON-ORTHOGONAL IRIS IMAGES FOR IRIS RECOGNITION

Biometric Recognition: How Do I Know Who You Are?

ABSTRACT I. INTRODUCTION

ISSN Vol.02,Issue.17, November-2013, Pages:

AUTOMATED IRIS RECOGNITION SYSTEM USING CMOS CAMERA WITH PROXIMITY SENSOR

Preprocessing of IRIS image Using High Boost Median (HBM) for Human Personal Identification

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Displacement Measurement of Burr Arch-Truss Under Dynamic Loading Based on Image Processing Technology

Tools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK)

BIOMETRIC SECURE ACCESS TECHNOLOGIES

A Statistical Sampling Strategy for Iris Recognition

SVM BASED PERFORMANCE OF IRIS DETECTION, SEGMENTATION, NORMALIZATION, CLASSIFICATION AND AUTHENTICATION USING HISTOGRAM MORPHOLOGICAL TECHNIQUES

A SURVEY ON HAND GESTURE RECOGNITION

Transcription:

Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept. of. Computer Science, SPMVV, Tirupati Abstract:Today's computerized society requires high quality security for the citizens. Possessing pin or memorizing passwords may be lost or forgotten. Security is based using their morphological or behavioral traits which cannot be lost or forgotten. Thus Biometrics plays an important role in providing security to an authorized user and thus differentiating between an genuine person and an impostor. Though there are several biometric traits, this paper concentrates on Iris recognition since it is considered as the most reliable Biometric technology. Several other physiological biometric traits like face recognition, fingerprint, Hand geometry, retina and behavioral biometric traits like keystroke, signature and voice recognition have their own advantages and disadvantages. This paper explains various biometric technologies, their advantages and disadvantages and explains how Iris can be considered as the most reliable Biometric Technology. There are four stages in a typical personal identification system. They are Iris image acquisition, Iris Liveness detection, Iris image quality assessment and Iris Recognition. Iris Recognition includes Segmentation, Normalization, Feature Extraction and Matching. High Resolution cameras are used for image capturing, Iris liveness detection is explained basing on Red eye effect, Image quality assessment is done by noise removal using median filters. Hough transform is used to detect the iris and pupil boundaries in segmentation. In Normalization, Daugman's Rubber sheet model is used to transform the iris circular region to a rectangular region with a fixed size. The iris region is normalized from Cartesian coordinates to polar representation.1d Log gabor filters are used in feature extraction. Features are extracted from normalized iris image and the generated template is stored in a database. Hamming distance is used to compare iris templates in matching. Keywords: Liveness Detection, Median filters, 1D Log gabor filters, Hamming distance I. Introduction Nowadays, the need for biometric authentication has become important. The process of identifying and authenticating the uniqueness of individuals based on morphological or behavioral traits is called Biometric Authentication. Biometrics are often used in a variety of fields where correct identification is imperative from computers to nuclear power plants, where different biometrics are used to control access to critical systems, as well as airlines, databases and other restricted sources. Airports are looking to biometrics access control technology to help address recent security breaches involving employees, which would help increase security for restricted areas. Fingerprints which are widely used may face problems like burns and bruises. Face changes over a period of time, even with the best algorithms face recognition has error rates of about 43 to 50%. Hand geometry is not distinctive enough to be used in large scale applications, hand written signatures can be forged. DNA is not unique among identical twins The iris is different for any two individuals even for identical twins. The iris is the pigmented elastic tissue that has adjustable circular opening in center of the eye. The accuracy of iris identification systems is proven to be much higher compared to all other biometric modalities. Iris identification will be explained in detail in the next section. Figure 1: Structure of Iris II. Implementation In general, A typical iris identification system consists of four stages[3]: 2.1. Iris image Acquisition. 2.2. Iris liveness detection. 2.3. Iris image quality assessment. 2.4. Iris recognition. 2.1. Iris image Acquisition: www.ijastems.org Page 328

The first step of the iris identification system is image acquisition. This step is very complicated because the size and color of iris of every person is different. For example, recognition of iris images of poor quality, nonlinearly deformed iris images, iris images at a distance, moving iris images, and faked iris images all are open problems in iris recognition. As this technology is expensive and we need a video camera with NIR illumination for the infrastructure, most of the researchers go for some existing iris databases to implement Iris recognition. Examples of some existing iris databases are CASIA [15] and UBIRIS. In this system, UBIRIS database is used for iris images[5]. In Quality assessment, all the acquired images are not clear, suitable, and sharp enough for recognition. Iris region is occluded largely by eyelashes and eyelids, when the eye is partially opened. Image Quality can also be enhanced by preprocessing. Image preprocessing involves noise removal and identifying the portion occluded by eye lashes. Noise will be removed by Median filters which is a non linear digital filtering technique. They replace the central gray value in an 20*20 window by the median of the sorted pixel values. Median filtering reduces noise without blurring edges and other sharp details[3]. Figure 2: Sample images from UBIRIS database 2.2. Iris Liveness Detection: Liveness Detection is an anti-spoofing strategy for fighting against impostors[2]. Iris liveness detection can be done using physiological and optical characteristics of human iris. Eye blink is a physiological activity of closing and opening eyelids which can be used for both face and iris liveness detection. Iris Liveness can be identified by Red eye effect, Pupil dilations[6]. Red eye effect is the common appearance of red pupils in color photographs of eyes. It occurs when we use a photographic flash very close to the camera lens in ambient low light. The Pupil is in the state of rhythmic contraction and dilation called hippus. Active illuminators are usually employed in iris cameras to cause significant pupil movements or constriction[7]. Usually, Pupil size increases in a dark environment and decreases in a bright environment. Each measurement registers the spontaneous pupil oscillations and its reaction after increasing the intensity of visible light. 2.3. Iris image quality Assessment Figure 3: Results of a) Median filters b) After removing Noise. 2.4. Iris Recognition Again Iris recognition includes four steps: i. Segmentation (localization). ii. Normalization. iii. Feature Extraction. iv. Matching. www.ijastems.org Page 329

Segmentation Segmentation is also known as Localization. The first stage of iris recognition is to isolate the actual iris region in a digital eye image. Iris localization is the detection of the iris area between pupil and sclera[1]. Circular Hough transform is used to identify the radius and center of iris. The Hough transform for the iris/sclera boundary was performed and then Hough transform for the iris/pupil boundary was performed within the iris region, unless the whole eye region. After this process was complete, six parameters are stored, the radius, and center coordinates for both circles. Normalization Once the iris region is localized from an eye image, the next step is to transform the iris region so that it has fixed dimensions in order to allow comparisons [12]. Daugman s rubber sheet model was employed to unwrap the iris region to a rectangular block of texture. Since the pupil can be nonconcentric, a remapping formula is necessary to rescale points depending on the angle around the circle. This is given by with where o x,o y = Displacement of the center of the pupil relative to the center of the iris. r = Distance between the edge of the pupil and edge of the iris. Figure 4: Results a) Segmentation b) Normalization Feature Extraction: Feature Extraction is a special kind of Dimensionality reduction and contains more information about the original image. It is the crucial stage of the whole iris recognition process for personal identification. Features are extracted using the normalized iris region. In order to provide accurate recognition of individuals, the most discriminating information present in iris have to be extracted. Only the significant features of the iris must be encoded so that comparisons between templates can be made. The iris contains important unique features, such as stripes, coronas, freckles etc. These features are collectively called as the texture of iris. These features are extracted using Gabor Wavelets. Feature encoding was done by convolving the normalized iris pattern with1d Log-Gabor wavelets. The rows of the 2D normalized pattern are used as the 1D signal, each row corresponds to a circular ring on the iris region. The encoding process delivers a bitwise template containing a number of bits of information. θ = Angle between edge of the pupil and edge of the iris(around the region). = Radius of the iris. ri Figure 4: Result of Feature Extraction Matching: Hamming distance was chosen as a metric for Matching, since bit-wise comparisons were needed. It will be calculated using only the bits generated from the true iris region. The Hamming distance formula is given as www.ijastems.org Page 330

where Xj, Yj= two bit-wise templates to compare. Xn Yn = Noise masks for Xj and Yj respectively. j j N = Number of bits represented by each template. If the hamming distance between two irises is less than the threshold, then they are from the same eye otherwise not. gave a measure of how many bits disagreed between two templates. With the advancement of technology, more research work has to be done in the area of iris liveness detection and multimodal biometrics as it results in high accuracy and more reliability. Spoofing multi biometric traits of the same person may be difficult. Hence, it results in more accuracy and reliability. REFERENCES: [1] Masek L, Kovesi P," MATLAB source code for a biometric identification system based on iris patterns", The School of Computer Science and Software Engineering, The University of Western Australia,2003. [2] Kezia R Badhiti and Prof. SudhaThatimakula, Spoofing- A threat to biometric systems, Journal of Computer Science and Engineering. [3] R.T.Al-Zubi, D.I.Abu-Al-Nadi. "Automated personal identification system based on human iris analysis," Springer Pattern Anal Applic (2007) 10:147-164. [4] J. Daugman, How Iris Recognition Works, IEEE Trans. on circuits and systems for video technology,vol.14,no.1,jan 2004. [5] Proença,H. and Alexandre, {L.A.} "{UBIRIS}: A noisy iris image database" 13th International Conference on Image Analysis and Processing - ICIAP 2005, Springer, September 2005. [6] Kezia R Badhiti and Pasupuleti LP Bharati(2016)."Pupil dilations detect iris liveness Detection ". International Journal of Computer Science Engineering and Information Technology Research. Volume 6, Issue 2. Figure 5: Result(s) of Matching CONCLUSION: Firstly, an automatic segmentation algorithm was used, which would localize the iris region from an eye. Next, the segmented iris region was normalized to eliminate dimensional inconsistencies by implementing a version of Daugman s rubber sheet model, where the iris is unwrapped into a rectangular block with constant polar dimensions. The Hamming distance was chosen as a matching metric, which [7] Adam Czajka, Senior Member, IEEE (2015). Pupil dynamics for iris liveness detection. IEEE Transactions on information forensics and security, Vol. 10, No. 4. [8] E. Lee, K. Park, and J. Kim, Fake iris detection by using Purkinje image, in Proc. ICB, Hong Kong, China, 2006, pp. 397 403. [9] Karthik Nandakumar and Anil K. Jain, Biometric template protection-bridging the performance gap between theory and practice, IEEE signal processing magazine, September 2015. [10] Abdenour Hadid, Nicholas Evans, Sebastien Marcel, and Julian Fierrez, Biometrics systems under spoofing attack- An evaluation methodology and lessons learned, IEEE signal processing magazine, September 2015. [11] J. Daugman, High confidence visual recognition of persons by a test of statistical independence, IEEE Trans. Pattern Anal. Mach. Intell., vol. 15, no. 11, pp. 1148 1160, Nov. 1993. [12] Kezia R Badhiti and Sudha Thatimakula (2013)."Iris- An Emergent Biometric Technology for personal Authentication. International journal of Computer Science Engineering and Information Technology Research". Volume 3, issue 4. [13] L. Ma, T. Tan, Y. Wang, and D. Zhang, Personal identification based on iris texture analysis, IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 12, pp. 1519 1533, Dec. 2003. [14] J. Galbally, J. Ortiz-Lopez, J. Fierrez, and J. Ortega- Garcia, Iris liveness detection based on quality related www.ijastems.org Page 331

features, in Proc. ICB, New Delhi, India, 2012, pp. 271 276. [15] CASIA(2003) CASIA iris image database. http://www.sino-biometrics.com. www.ijastems.org Page 332