Iris Recognition using Hamming Distance and Fragile Bit Distance

Similar documents
Using Fragile Bit Coincidence to Improve Iris Recognition

Iris Segmentation & Recognition in Unconstrained Environment

RELIABLE identification of people is required for many

Experiments with An Improved Iris Segmentation Algorithm

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Iris Recognition using Histogram Analysis

Image Averaging for Improved Iris Recognition

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

IRIS Recognition Using Cumulative Sum Based Change Analysis

Fast identification of individuals based on iris characteristics for biometric systems

Recent research results in iris biometrics

Iris Pattern Segmentation using Automatic Segmentation and Window Technique

Iris Recognition with Fake Identification

Iris Recognition using Left and Right Iris Feature of the Human Eye for Bio-Metric Security System

Iris Recognition based on Pupil using Canny edge detection and K- Means Algorithm Chinni. Jayachandra, H.Venkateswara Reddy

NOVEL APPROACH OF ACCURATE IRIS LOCALISATION FORM HIGH RESOLUTION EYE IMAGES SUITABLE FOR FAKE IRIS DETECTION

The Best Bits in an Iris Code

ISSN: [Deepa* et al., 6(2): February, 2017] Impact Factor: 4.116

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

ACCEPTED MANUSCRIPT. Pupil Dilation Degrades Iris Biometric Performance

Image Averaging for Improved Iris Recognition

Authentication using Iris

IRIS RECOGNITION USING GABOR

Authenticated Automated Teller Machine Using Raspberry Pi

Improving Far and FRR of an Iris Recognition System

Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System

International Journal of Advance Engineering and Research Development

Design of Iris Recognition System Using Reverse Biorthogonal Wavelet for UBIRIS Database

A One-Dimensional Approach for Iris Identification

3D Face Recognition System in Time Critical Security Applications

Automatic Licenses Plate Recognition System

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches

Global and Local Quality Measures for NIR Iris Video

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL

Iris based Human Identification using Median and Gaussian Filter

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Critical Literature Survey on Iris Biometric Recognition

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

Iris Recognition-based Security System with Canny Filter

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Evaluation of the Impact of Noise on Iris Recognition Biometric Authentication Systems

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

Biometric Recognition Techniques

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER

Iris Recognition in Mobile Devices

Postprint.

Feature Extraction Techniques for Dorsal Hand Vein Pattern

INDIAN VEHICLE LICENSE PLATE EXTRACTION AND SEGMENTATION

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Keyword: Morphological operation, template matching, license plate localization, character recognition.

Automated Number Plate Verification System based on Video Analytics

Note on CASIA-IrisV3

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

ABSTRACT I. INTRODUCTION II. LITERATURE SURVEY

Modern Biometric Technologies: Technical Issues and Research Opportunities

[Kalsi*, 4.(7): July, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

Feature Extraction of Human Lip Prints

Original and Counterfeit Money Detection Based on Edge Detection

Impact of Resolution and Blur on Iris Identification

A Novel Image Deblurring Method to Improve Iris Recognition Accuracy

Software Development Kit to Verify Quality Iris Images

Learning Hierarchical Visual Codebook for Iris Liveness Detection

An Enhanced Biometric System for Personal Authentication

Improved Human Identification using Finger Vein Images

License Plate Localisation based on Morphological Operations

Copyright 2006 Society of Photo-Optical Instrumentation Engineers.

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

A Novel Approach for Human Identification Finger Vein Images

Iris Recognition using Enhanced Method for Pupil Detection and Feature Extraction for Security Systems

Morphological Image Processing Approach of Vehicle Detection for Real-Time Traffic Analysis

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Iris Recognition based on Local Mean Decomposition

A Statistical Sampling Strategy for Iris Recognition

Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images

An Effective Method for Removing Scratches and Restoring Low -Quality QR Code Images

All Iris Code Bits are Not Created Equal

Title Goes Here Algorithms for Biometric Authentication

Online Signature Verification on Mobile Devices

ANALYSIS OF PARTIAL IRIS RECOGNITION

Implementing Morphological Operators for Edge Detection on 3D Biomedical Images

Live Hand Gesture Recognition using an Android Device

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy

Factors that degrade the match distribution in iris biometrics

Content Based Image Retrieval Using Color Histogram

THE field of iris recognition is an active and rapidly

Impact of out-of-focus blur on iris recognition

PHASE PRESERVING DENOISING AND BINARIZATION OF ANCIENT DOCUMENT IMAGE

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method

The Results of the NICE.II Iris Biometrics Competition. Kevin W. Bowyer. Department of Computer Science and Engineering. University of Notre Dame

World Journal of Engineering Research and Technology WJERT

Adaptive Feature Analysis Based SAR Image Classification

Print Biometrics: Recovering Forensic Signatures from Halftone Images

Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India)

Automatic Iris Segmentation Using Active Near Infra Red Lighting

Distinguishing Identical Twins by Face Recognition

Transcription:

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik 1 Mr. B. G. Patil 2 1 M.Tech Student 2 Associate Professor 1,2 Department of Electronics Engineering 1,2 Walchand College of Engineering, Sangli, State-Maharashtra, India Abstract Iris recognition algorithms use the binary iris codes for iris. In iris code the iris information is represented with binary values. Iris recognition algorithms use different kind of filters to get details of iris pattern. The Gabor filters or Log-Gabor filters are mostly used for iris recognition. The iris code is real or imaginary part of the filtered iris template. Hamming distance between two iris codes can be used to measure similarity of two irises. Fragile bit pattern is term which defines location of fragile bits in the iris code. Similar to iris code, a fragile bit pattern for each iris can be generated. Based on hamming distance between two fragile bit patterns some similarity or non-similarity information for two irises can be obtained. Key words: Iris recognition algorithms, Bit fragility, Fragile bit pattern I. INTRODUCTION Reliable identification of person is required in many day to day applications. In organizations like college, hospitals, industries, it is used to take attendance of employs working there. In financial transactions also reliable methods for person identification are required. Biometric identification methods are now days very commonly used for personal identification. In biometrics there are two methods for identification, physiological identification and behavioral identification. Physiological methods are based on physical characteristics of person. It includes face photographs, finger print, iris and DNA. Behavioral methods are based on behavioral characteristics of person like signature and voice. Behavioral methods are easy to duplicate. Therefore behavioral methods are less reliable for person identification. Physiological methods are comparatively difficult to duplicate. Among the physiological methods mentioned before the iris is the good physiological characteristic for person identification. A. Bit Fragility In the iris recognition system for the same eye multiple images need to be taken for developing a robust system. For each iris image, iris code is obtained by applying some algorithm. Therefore multiple iris codes for same iris are obtained. For a particular pixel on the iris code throughout the multiple codes, it is not necessary that its value remain constant. If say among 10 different iris codes of same eye a particular pixel has value 1 for 7 times and value 0 for remaining 3 times. Then it can be said that that particular pixel is 70% consistent and 30% inconsistent. i.e. the pixel is 30% fragile. In table.1 for 10 iris images of same eye, 10 iris codes are obtained. If a particular pixel is varying its value among different codes then its fragility is given. Total images Pixel value = 1 _ times Pixel value= 0 _ times Pixel is _% fragile 10 4 6 40 10 6 4 40 10 2 8 20 10 8 2 20 10 7 3 30 10 3 7 30 Table 1: Pixel Fragility Conventionally, the bit fragility was decided by taking multiple images of same eye. As mentioned in [2], the lowest 25 % values in the Log-Gabor filter output can be considered as fragile bits and there is no need to take multiple images of same iris to decide fragility of pixel. II. WORK FLOW IN THE EXPERIMENT A. Iris Database In the work, iris database from Chinese Academy of Sciences (CAS) is used. This database is created by National Academy for Pattern Recognition of China. CASIA V1.0 is the name of database used in the work. B. Image Segmentation The image segmentation is preprocessing step for iris recognition. In the work pupil and iris are two parts which are of interest. The image segmentation is carried out in two steps. 1) Pupil Center and Radius Detection Pupil is the central part of iris. Pupil is having lowest pixel value in grayscale image of eye. To detect center of pupil this information is used. Thresholding, morphological opening and edge detection are operations used for detection of pupil properties. Thresholding converts gray scale image to a binary black and white image. The threshold is selected such as the black and white image contains the dark parts in the original gray scale image. These parts include pupil and some other dark parts in the image such as eyelids. The morphological opening is performed on thresholded image which removes small connected components in input image and returns connected components which have connectivity more than particular number of pixels. Edge detector operator is applied on the opened image to find shape of pupil. Robert operator, Sobel operator, Prewitt operator, Canny edge detector are the operators available for edge detetion. 2) Iris Outer Radius Detection Eye image is filtered with Gaussian filter for iris outer radius detection. Integro-differential operator is used for iris outer radius detection. All rights reserved by www.ijsrd.com 672

characteristic features at the same spatial location [3]. After segmentation has been completed, normalization is performed in all studied iris recognition systems to obtain invariance to iris size, position and different degrees of pupil dilation when matching different iris patterns at a later stage. The problem of that the iris can be rotated in the image is not resolved by this transformation. The method that is widely accepted for doing this is applying Daugman s rubber sheet model to the iris and transforming it into a rectangular block. D. Filtering In experiment normalized iris template is filtered with Log- Gabor filter. Fig. 1: center and radius show on input eye image Fig. 2: iris outer radius shown on Gaussian filtered input image E. Template Generation Template generation procedure used in experiment is shown in following fig. 4 and fig. 5. The normalized iris image is iris template. This iris template is filtered with Log-Gabor filter for feature extraction. Log-Gabor filtering gives two output matrices, real output (temp_real) and imaginary output (temp_img). Real output part is used for further calculations. Thresholded real part of Log-Gabor output is called temp_real_bw. Fragile bit pattern is matrix which denotes location of fragile bits in the temp_real. This matrix is obtained by setting logic 1 value for the location of fragile bits and setting logic 0 for the consistent bits. In this way fragile bit pattern (fbp) for temp_real is defined and this is a binary matrix. This template is denoted by temp_real_fbp_bw. Generation procedure for temp_real_fbp_bw is shown in fig. 5. C. Normalization Fig. 4: Log-Gabor filter outputs Fig. 3: (a) Normalized iris image (b) Normalized iris image without pupil part (c) Iris template (occluded part removed) (d) Enhanced iris template The normalization process is used to produce iris regions, which have the same constant dimensions, so that two images of the same iris under different conditions will have Fig. 5: Fragile bit pattern template All rights reserved by www.ijsrd.com 673

Fig. 6: Hamming distance calculation F. Hamming Distance and Fragile Bit Distance Calculation 1) Hamming Distance Hamming distance is calculated between templates temp_real_bw of two iris images. 2) Fragile Bit Distance Fragile bit distance is the hamming distance between fragile bit patterns temp_real_fbp_bw of two iris images. 3) Combination of Hamming Distance and Fragile Bit Distance In this method weighted average of hamming distance and fragile bit distance is taken in consideration. The distance calculation methods are explained in fig. 6 and fig. 7. 1) Match hamming or fragile bit distance This is the hamming or fragile bit distance calculated between two iris templates of same eye. 2) Non-match hamming or fragile bit distance This is the hamming or fragile bit distance calculated between two iris templates of different eye. Fig. 8: Work flow of experiment III. RESULTS Hamming distance vs fragile bit distance plot is shown in fig. 9. The match comparison points are shown by blue triangles and non-match comparison points are shown by red circles. As shown in fig. 10 and fig. 11 separation of match and non-match comparison results is better in fragile bit distance method than in hamming distance method. From fig. 11 and fig. 12 it can be said that there is no improvement in separation by combining hamming distance and fragile bit distance. Fig. 7: Fragile bit distance calculation Fig. 9: Hamming distance vs fragile bit distance All rights reserved by www.ijsrd.com 674

IV. CONCLUSION Equal error rate value is 8.75% for hamming distance method, 8.25% for fragile bit distance method and 8.25% for combination of hamming distance and fragile bit distance method. Equal error rate value is decreased by 0.50% in fragile bit distance method as compared to hamming distance method. Combination of hamming distance and fragile bit distance method has same results as fragile bit distance method. Fragile bit distance method is best for iris recognition (CASIA V1.0 database), taking computational complexity in consideration. Fig. 10: Hamming distance vs number of matches or nonmatches The FAR (False Accept Rate)-FRR (False Reject Rate) and EER (Equal Error Rate) results are shown in table 2. Method Threshold value EER Hamming Distance 0.4014 8.75% Fragile bit distance 0.4047 8.25% Combination of hamming distance and fragile bit distance 0.4075 8.25% Table 2: FAR-FRR Table Fig. 13: FAR-FRR plot for hamming distance method Fig. 11: Fragile bit distance vs number of matches or nonmatches Fig. 14: FAR-FRR plot for fragile bit distance method Fig. 12: combination of hamming distance and fragile bit distance vs number of matches of non-matches Fig. 15: FAR-FRR plot for combination of hamming distance and fragile bit distance vs number of matches of non-matches All rights reserved by www.ijsrd.com 675

REFERENCES [1] K.P. Hollingsworth, K.W. Bowyer, and P.J. Flynn, Improved Iris Recognition through Fusion of Hamming Distance and Fragile Bit Distance, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 33, No. 12, December 2011 [2] K.P. Hollingsworth, K.W. Bowyer, and P.J. Flynn, Using Fragile Bit Coincidence to Improve Iris Recognition, Proc. IEEE Third Int l Conf. Biometrics: Theory, Applications, and Systems, pp. 1-6, Sept. 2009. [3] J. Daugman, How Iris Recognition Works, IEEE Trans. Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan. 2004. [4] K.P. Hollingsworth, K.W. Bowyer, and P.J. Flynn, The Best Bits in an Iris Code, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 31, no. 6, pp. 964-973, June 2009. [5] F. Hao, J. Daugman, and P. Zielinski, A Fast Search Algorithm for a Large Fuzzy Database, IEEE Trans. Information Forensics and Security, vol. 3, no. 2, pp. 203-212, June 2008. [6] R. Mukherjee and A. Ross, Indexing Iris Images, Proc. Int l Conf. Pattern Recognition, pp. 1-4, Dec. 2008. [7] Z. Sun, T. Tan, and X. Qiu, Graph Matching Iris Image Blocks with Local Binary Pattern, Proc. Int l Conf. Biometrics, pp. 366-372, Jan. 2006. [8] A.W.K. Kong, D. Zhang, and M.S. Kamel, An Analysis of Iriscode, IEEE Trans. Image Processing, vol. 19, no. 2, pp. 522-532, Feb. 2010. [9] Rashmi, Mukesh Kumar and Rohini Saxena, Algorithm and Technique on Various Edge Detection: A Survey, Signal & Image Processing: An International Journal (SIPIJ) Vol.4, No.3, June 2013. [10] Gaussian Filtering, Available: https://www.cs.auckland.ac.nz/courses/gassian filtering [11] Azizah Jaafar, Asama Kuder Nsaef and Khider Nassif Jassim, Enhancement Segmentation Technique for Iris Recognition System Based on Daugman s Integro- Differential Operator, International Symposium on Instrumentation and measurement, sensor network and Automation, 2012. [12] Javier R, Movellan, Tutorial on Gabor filters. All rights reserved by www.ijsrd.com 676