DSP-Based Implementation and Optimization of an Iris Verification Algorithm using Textural Feature

Author: Richard Ng Yew Fatt Co-authors: Mr. Mok Kai Ming Dr. Tay Yong Haur

Computer Vision and Intelligent Systems (CVIS) Group Universiti Tunku Abdul Rahman, Malaysia Presented by: Tou Jing Yi

1. INTRODUCTION - What is biometrics? 

It employs physiological or behavioural characteristics to identify an individual.



Physiological characteristics  Iris, fingerprint, face, hand geometry and palm-prints.



Behavioural characteristics  Voice, signature and keystroke dynamics.

1.1 Iris Verification Stages

2. PROPOSED ALGORITHM 2.1 Iris Segmentation  Circular Hough transform is used to detect iris inner boundary [4].  Edge detector is applied to generate the edge map.

 Gaussian filter is applied to smooth the image to select the proper scale of edge analysis.  The center coordinate and radius of the circle with maximum number of edge points are defined as the pupil center and iris inner boundary.

Fig . Iris inner boundary localization.

( xi  xc ) 2  ( yi  yc ) 2  r 2

2.1 Iris Segmentation  The proposed method selects two search regions including the outer iris boundaries.  The intensities of each radius in the two search regions are added up. The right and left iris boundaries are the maximum difference between the sum of intensities of two outer radii and two inner radii. Fig . Iris outer boundary localization.

2.2 Iris Normalization  Iris may be captured in different size with varying imaging distance.

Normalization process

Fig . Original image

Radial resolution

 Normalize the iris region into rectangular block.

Angular resolution Fig . Normalized image

2.3 Iris Enhancement

Normalized image

Enhancement

Enhanced image

• The normalized iris image has low contrast and non-uniform illumination caused by the light source position

• Local histogram equalization is applied to reduce the effect of non-uniform illumination and obtain well-distributed texture image • Enhanced image is divided into three zones according to the characteristic of the iris texture

2.4 Feature Extraction exp((  log( w / w0 ) 2 ) G ( w)  2(log( k / w0 )) 2 ) where w0 = Filter’s center frequency k = Bandwidth of the filter  1D Log Gabor filter is used to extract the frequency information which represents the iris textures [5].  Zone Z1, Z2 and Z3 are processed with filter of decreasing center frequency respectively.

2.4 Feature Extraction Each pattern is demodulated to extract its phase information.

The phase information is quantized into four quadrants in the complex plane.

Fig. Phase-quadrant demodulation code [2-3]

2.5 Template Matching  Hamming distance is a measure of dissimilarity between two binary templates.  A threshold is set to decide if the two templates are from the same person or different persons. HD 

(templateA  templateB )  maskA  maskB maskA  maskB

THD  HD1  HD2  HD3

    1

 α, β and γ have decreasing weightings because inner zone Z1 provides more texture information than outer zone Z3.

3. PERFORMANCE EVALUATION  We run experiments on CASIA iris image database version 1.0 [1].  There are 756 iris images from 108 different irises. For each eye, 7 images are captured in two sessions.  The time interval between two sessions is about one month. The resolution of the iris images is 320×280 pixels.

Fig. Localized iris images

3. PERFORMANCE EVALUATION Fig. ROC Curve for iris verification system

4. DEVELOPMENT ENVIRONMENT 

 

IDDE – Integrated software development and debugging environment. It includes C/C++ compiler, assembler, expert linker, loader, run-time library, simulator and hardware emulator. The embedded iris verification system is implemented on ADSPBF561 EZ-KIT LITE evaluation board. It consists of decoding part, encoding part and DSP processing part.

4.1. System architecture for iris verification system

4.2 Optimization and Performance Profile 

The optimization strategies such as source code tuning, compiler’s pragmas, and conditional code optimization are implemented.



Data cache and memory optimization are implemented to utilize the memory hierarchy.



The performance is evaluated in term of speed before and after optimization.

4.2 Optimization and Performance Profile 

The performance profile for the iris verification algorithm is gathered using statistical profiler tool.



After optimization, the total computation time of iris verification algorithm drops for about 67%.



The total computation time is 0.475 second, which conforms to the speed requirement of the iris verification system.

4.2 Optimization and Performance Profile Total computation time for IVS before and after optimization

5. CONCLUSIONS     

A robust iris verification algorithm is implemented on Blackfin DSP. The algorithm has achieved a high recognition rate of 98.32%. The iris verification algorithm is mapped and optimized on the EZ-KIT Lite evaluation board. The total verification time is 475.23 milliseconds to process an iris image. DSP-based iris verification system is portable, power efficient, fast authentication and compact in size.

6. REFERENCES [1] “CASIA iris image database,” http://www.sinobiometrics.com/Databases.htm, 2007. [2] J. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Tans. Pattern Analysis and Machine Intelligence, vol.15, 1993, pp.11481161. [3] J. Daugman, “How iris recognition works,” IEEE Trans. CSVT, vol. 14, no. 1, 2004, pp. 21 – 30. [4] R. Y. F. Ng, Y. H. Tay, and K. M. Mok, “An effective segmentation method for iris recognition system,” Proc. the Fifth International Conference on Visual Information Engineering, July 2008, pp. 548-553. [5] R. Y. F. Ng, Y. H. Tay, and K. M. Mok, “Iris Recognition Algorithms Based on Texture Analysis,” Proc. 3rd International Symposium on Information Technology, vol. 2, Aug 2008, pp. 904-908.

7. Questions?

Q&A Richard ([email protected])

DSP-Based Implementation and Optimization of an Iris ...

HD. THD γ β α. +. +. = ➢ Hamming distance is a measure of dissimilarity between two binary templates. ➢ A threshold is set to decide if the two templates are ...

516KB Sizes 3 Downloads 282 Views

Recommend Documents

DSP-Based Implementation and Optimization of an Iris ...
it suitable for high security access control application. The three main .... Development Environment ... interface which speeds up development time and reduces.

an evaluation of iris biometrics
technologies need to develop among the general public to help biometric ..... EyeTicket website claims that JetStream “expedites processing and reduces total ...

Review of Iris Recognition System Iris Recognition System Iris ... - IJRIT
Abstract. Iris recognition is an important biometric method for human identification with high accuracy. It is the most reliable and accurate biometric identification system available today. This paper gives an overview of the research on iris recogn

Review of Iris Recognition System Iris Recognition System Iris ...
It is the most reliable and accurate biometric identification system available today. This paper gives an overview of the research on iris recognition system. The most ... Keywords: Iris Recognition, Personal Identification. 1. .... [8] Yu Li, Zhou X

Optimization Based Controller Design and Implementation for the ...
ering the short development time and the large number of different tasks that ... For controlling a high DoF system such as a humanoid robot, there are two main ...

Implementation of multi-objective optimization for ...
To describe vulnerability, the paper provides an analytical ... complex networks, are solved using the evolutionary algorithm known as the multi-objective ... technology, previously decoupled service systems have ... [12] studied the vulnerability of

The Design and Implementation of an AFP/AFS Protocol ... - CiteSeerX
The translator is designed to export AFS and UNIX local file system ... using the AppleTalk Filing Protocol (AFP), is the native Macintosh file-sharing mech- .... (NBP), a file service (AFP), and additional print services to the Macintosh (PAP).

Design and Implementation of an IPv6-enabled ...
In anomaly intrusion detection, profiles of normal ... from Rules Database in sequence and present them ... patterns in IPv4 IDS (such as snort's rule database),.

In search of an SVD and QRcp Based Optimization ... - CiteSeerX
Therefore, an optimum design of neural network is needed towards real-time ... (corresponding author to provide phone: +91-3222-283556/1470; fax: +91-. 3222-255303 .... or not in a Digital Signal Processor based system. We use that.

In search of an SVD and QRcp Based Optimization ... - CiteSeerX
optimize empirically chosen over-parameterized ANN structure. Input nodes present in ... (corresponding author to provide phone: +91-3222-283556/1470; fax: +91-. 3222-255303 ... of the recorded waveform [4], [5] and allows computer aided.

Design and Optimization of an XYZ Parallel Micromanipulator with ...
by resorting to the finite element analysis (FEA) via software package ANSYS .... the original and the current CPM are analyzed via the nonlinear statics analysis.

Patterns of genetic and phenotypic variation in Iris ...
The small interregional/ taxon component in the AMOVA (≈ 5%) and the near lack of alleles 'specific' for each group (at 3 of 132 loci examined) may attest to the ...

Implementation of an Extension of the CHAP Protocol ...
degree of security. The purpose of practically realizing the QKD is to find ways to establish a QKD network. The. Local Area Networks (LANs) present many ...

An Effective Segmentation Method for Iris Recognition System
Biometric identification is an emerging technology which gains more attention in recent years. ... characteristics, iris has distinct phase information which spans about 249 degrees of freedom [6,7]. This advantage let iris recognition be the most ..

iris StoryCV_2016_english.pdf
Iris as an artist and a human being. ... Indonesia, China) to become better acquainted with the basic elements of craftsmanship (colours, forms) and ... which cleverly combines human anatomy, physiology, Traditional Chinese Medicine ...

binary taylor diagrams: an efficient implementation of ...
implementing Taylor expansion Diagrams (TED) that is called. Binary Taylor ..... [12] Parasuram, Y.; Stabler, E.; Shiu-Kai Chin; “Parallel implementation.

An Effective Implementation of the Compound Element ...
DC operating point of the whole circuit due to the inevitable oscillation problems of some subcircuit structures. In order to improve the convergence properties, the novel compound element PTA algorithm is proposed in [2], which can avoid the oscilla

iris coloured.pdf
Sign in. Page. 1. /. 5. Loading… Page 1 of 5. Page 1 of 5. Page 2 of 5. Page 2 of 5. Page 3 of 5. Page 3 of 5. iris coloured.pdf. iris coloured.pdf. Open. Extract.

Iris Floorplan.pdf
Page 1 of 1 ! " #. $$ %" %#%". &. $$. %. #'. (. #. ) *$. + ! ! ) ,. -. $. $. ) (. ) $. Page 1 of 1. Iris Floorplan.pdf. Iris Floorplan.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Iris Floorplan.pdf. Page 1 of 1.

Requirements and Implementation of Risk ...
Software Project, Risk management, Software Tool, Effort, Risk, Budget ... Sales risk – building a product that the sales force doesn't understand how to sell.