JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 2, FEBRUARY 2011 19

Iris Recognition Based on Log-Gabor and Discrete Cosine Transform Coding R.M. Gad, M.A. Mohamed, and N. A. El-Fishawy Abstract— Iris recognition systems are widely used in biometrical based technology for personal identification and verification. Many systems have been implemented and their performances have been tested; each of them has its own advantages and disadvantages. In order to get over the drawbacks of these systems mixed techniques were described to implement an iris recognition system. The circular iris and pupil were segmented using threshold concepts and a canny edge detector followed by Circular Hough transform (CHT). Localized iris was normalized by Daugman's rubber sheet model. The coding methods based on 1D log-Gabor transform and Discrete Cosine Transform (DCT) is used to extract the discriminating features. Finally Hamming Distance (HD) operator was used in the template matching process. The proposed system was tested on CASIA database version-1. The identification success rate based on 1D Log-Gabor and DCT is 98.559% and 92.962% respectively. For verification, a variable threshold is applied to the distance metric, the False Accept Rate (FAR) and False Reject Rate (FRR) are recorded. The statistical Equal Error Rate (EER) is predicted to be as low as 0.869% for 1D Log-Gabor and 4.485% for DCT with good, fast interclass separation, and low computational cost of later. Index Terms— Iris Recognition System, Image Preprocessing, 1D log-Gabor filter, Hamming Distance (HD), Unwrapping and Normalization, Feature Encoding, Discrete Cosine Transform.

——————————  ——————————

1 INTRODUCTION

T

Here has been a rapid increase in the need of accurate and reliable personal identification infrastructure in recent years, and biometrics has become an important technology for the security. Iris recognition has been considered as one of the most reliable biometrics technologies in recent years [1- 3]. However, some critical problems still persist and significant work needs to be done before mass-scale deployment on national and international levels can be achieved. Many issues, including system robustness, consistent performance under variability, speed of enrolment and recognition, and noncooperative identification remain to be addressed [4]. The iris identification using analysis of the iris texture has attracted lot of attention and researchers have presented variety of approaches. Daugman [5] has presented most promising 2D Gabor filter based approach for the iris identification system. Boles [6] has detailed fine-tocoarse approximation at different resolution levels that are based on zero-crossing representation from the wavelet transform decomposition. Wildes et al. [1] have focused on efficient implementation of gradient-based iris segmentation using Laplacian pyramid. Proença and Alexandre [7] have suggested region-based feature extraction for the iris images acquired from large distances.

Thornton et al. [8] have recently estimated the non-linear deformations from the iris patterns and proposed a Bayesian approach for reliable performance improvement. Huang et al. [9] have demonstrated the usage of phasebased local correlations for matching iris patterns and achieved notable performance over the prior techniques. Li Ma et al. [10], [11] employed multi-scale band pass decomposition and evaluated comparative performance from prior approaches. Feature extraction for iris code based on DCT achieves less size extracted normalized iris data codes, due to DCT energy compaction characteristic giving such less time real time implementation. This paper is organized as follows; section 2 reviews basic background concepts in iris anatomy and its performance. Section 3 gives briefly data collection overview. Section 4 demonstrates our implementation for iris recognition system and the algorithms used. Section 5 shows the proposed system test results. Finally, section 6 concludes our work.

2. Background Concepts

In high security areas, verification is highly needed. Logging on to computers, access an Automatic Teller machines (ATMs), pass through airport, access control in laboratories and factories, people need to verify their ———————————————— identities [12]. Some traditional methods are used as user • R. M. G. is with the Computer Science and Engineering Department, Fanames, passwords, and identification cards. However, culty of Electronic Engineering, Menoufia University, Egypt. • M. A. M. is with the Electronic and Communication Department, Faculty password can be forgotten, and identification cards can of Engineering, Mansoura University, Egypt. be lost or stolen [13]. • N. A. E. is with the Computer Science and Engineering Department, FaBiometric methods become reliable and secure identificulty of Electronic Engineering, Menoufia University, Egypt. cation of people, due to its reliability and nearly perfect recognition rates [14]. Many biometric-based identifica© 2011 JCSE http://sites.google.com/site/jcseuk/

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 2, FEBRUARY 2011 20

tion systems have been proposed: fingerprint, face recognition, facial expressions, voice, iris, etc; for this purpose. These methods based on physical or behavioral characteristics are of interest because people cannot forget or lose their physical characteristics [13], [5]. Biometric system can then operate in two modes: verification or identification. While identification involves comparing the acquired biometric information against templates corresponding to all users in the database, verification involves comparison with only those templates corresponding to the claimed identity [15]. Biometric methods based on iris allow very high accuracy and reliability. Every iris had a highly detailed and unique texture, which remained unchanged in clinical photographs spanning decades [5]. Iris marked Medium in collectability and performance. A high universality, distinctiveness, and permanence give iris recognition a popular interest and research in recent years [15]. The human iris begins to form in the 3rd month of gestation and the structures creating the pattern are complete by the 8th month; the color and pigmentation continue to build through the first year of birth [14]. This pattern contains many distinctive features such as arching ligaments, furrows, ridges, crypts, rings, corona, freckles, and zigzag collarette [16]. This pattern remains stable through a person's life. The iris is a thin circular ring lies between cornea and the lens of the human eye. A front-on view of the iris is shown in Fig.1; in which iris encircles the pupil; the

Fig. 1. The human eye [13].

dark centered portion of the eye. The function of iris is to control the amount of light entering through the pupil, this done by the sphincter and dilators muscles, which adjust the size of the pupil [17]. The average diameter of the iris is nearly 11 mm and the pupil radius can range from 0.1 to 0.8 of the iris radius [16]. It shares high-contrast boundaries with the pupil but less-contrast boundaries with the sclera [14]. Formation of the unique patterns of the iris is random and not related to any genetic factors [1]. Due to that the two eyes of an individual contain completely independent iris patterns (left eye is not the same as right one), and it should not verified by an example [18]. The false accept probability can be estimated at 1 in 1031 [16].

2.1 Iris System Challenges One of the major challenges of automated iris recognition systems is to capture a high quality image of iris while remaining noninvasive to the human operator.

Moreover, capturing the rich details of iris patterns, an imaging system should resolve a minimum of 70 pixels in iris radius. In the field trials to date, a resolved iris radius of 80–130 pixels has been more typical. Monochrome CCD cameras (480×640) have been widely used because near infrared (NIR) illumination in the 700–900-nm band was required for imaging to be nonintrusive to humans. Some imaging platforms deployed a wide-angle camera for coarse localization of eyes in faces; to steer the optics of a narrow-angle pan/tilt camera that acquired higher resolution images of eyes [16]. Given that iris is a relatively small (1 cm in diameter), dark object and that human operators are very sensitive about their eyes; this matter required careful engineering. Some points should be taken into account: (i) acquiring images of sufficient resolution and sharpness; (ii) good contrast in the interior iris pattern without resorting to a level of illumination that annoys the operator; (iii) the images should be well framed (i.e. centered), and (iv) noises in the acquired images should be eliminated as much as possible.

2.2 Advantages of Iris Systems Iris recognition is especially attractive due to high degree of entropy per unit area of iris; as well as, the stability of iris texture patterns with age and health conditions. Moreover, there are several advantages of iris: (i) an internal organ; (ii) mostly flat with muscles; which control the diameter of the pupil, (iii) no need for a person to be identified to touch any equipment that has recently been touched by strangers; (iv) surgical procedures do not change the texture of the iris; (v) immensely reliable, and (vi) it has responsive nature [19]. 2.3 Disadvantages of iris systems However, there are some disadvantages of using iris as a biometric measurement are: (i) small target (1-cm) to acquire from a distance (about 1-m) therefore it is hard to detect from a distance; (ii) illumination should not be visible or bright; (iii) the detection of iris is difficult when the target is moving; (iv) the cornea layer is curved; (v) eyelashes, corrective lens and reflections may blur iris pattern, it also Partially occluded by eyelids, often drooping; (vi) iris will deform non-elastically when the pupil changes its size, and (vii) iris scanning devices are very expensive [19]. A general iris recognition system is composed of four steps; (i) Image acquisition as the user's eye is captured by the system. Using CCD cameras (480×640) by near infrared (NIR) illumination in (700-900 nm) or by standard cameras (i.e. Panasonic BMET 100); (ii) the image is preprocessed to normalize the scale and illumination of the iris localizing the iris; (iii) features representing the iris patterns are extracted and quantized; Finally, (iv) decision is made by using template matching techniques for iris code generation [20].

3. Data Collection All images tested are taken from the Chinese Academy of Sciences Institute of Automation (CASIA) iris database, apart from being the oldest; this database is clearly the

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 2, FEBRUARY 2011 21

most known and widely used by the majority of researchers. Beginning with a 320×280 pixel photograph of the eye took from 4 cm away using a near infrared camera. The NIR spectrum emphasizes the texture patterns of iris making the measurements taken during iris recognition more precise. CASIA database (version.1) includes 756 iris images from 108 eyes, hence 108 classes. For each eye, 7 images were captured; in two sessions, where 3 samples are collected in the first and 4 samples in the second session. Images have been captured under highly constrained environment. They present very close and homogeneous characteristics and their noise factors are exclusively related with iris obstructions by eyelids and eyelashes; Fig. 2, [21].

Fig. 3. Block diagram of our proposed scheme.

Zhang (2001), and Ma et al. (2002) use Hough transform to localize iris [23]. Firstly, an edge detector operator is applied to a gray scale iris image to generate the edge map. The edge map is obtained by calculating the first derivative of intensity values and threshold the results. After that, a Gaussian filter; zero mean and unit variance, is applied to smooth the image to select the proper scale of edge analysis [20]. Canny edge detector is used to generate the edge map with parameters (threshold=0.1 and sigma=1) to reduce edge points with from the edge map.

Fig. 2. CASIA iris images

4. Processing Algorithm The proposed system will be implemented using MATLAB version 7.5.0.342 (R2007b). During this paper we tried to gain and combine all advantages of current iris processing algorithms as well as new trends in image processing algorithms in order to get a system that satisfies: (i) very accurate iris code generation; (ii) very simple iris normalization; (iii) very accurate iris and pupil detection; (iv) very simple quantization process, as well as (iv) very fast iris processing system; which will enable us to build a real time iris recognition system. Fig.3. shows the main steps of our proposed approach.

(a) (b) (c) Fig. 4. Pupil boundary detection steps: (a) Original eye image. (b) Pupil after threshold. (c) The segmented pupil.

Votes are cast in Hough space for the parameters of circles passing through each edge point. The Hough transform for a circular boundary and a set of recovered edge point (xj, yj): j=1, 2 … n is defined as [23]: n

H ( x c , y c , r ) = ∑ h( x j , y j , x c , y c , r )

(1)

j =0

4.1 Image Preprocessing The original eye image was presampled to (260×320) pixels to crop the unneeded parts of the eye image, as well as to decrease the processing time during the pupil boundary (iris inner boundary) detected [22]. 4.2 Detecting the Pupil Boundary Since the pupil is the darkest region in the image, this approach applies threshold segmentation method to find the region. Firstly, standout iris-pupil by contrasting, then filter bright pixels by using threshold brightness, after that, approximate center of pupil using weight centriod of pixels and radius calculated from the maximum summation of gradient points into the circle. Steps illustrated in Fig.4. 4.3 Detecting the Iris Boundary The pupil center can be used to detect the approximate inner and outer iris boundaries. Wildes (1997), Kong and

Where

1, if g ( x j , y j , xc , yc , r ) = 0 h ( x j , y j , xc , y c , r ) =  0, otherwise And

g ( x j , y j , xc , yc , r ) = ( x j − xc ) 2 + ( y j − yc ) 2 − r 2 Where (xc, yc) is the center coordinate, and r is the radius. From literature survey and CASIA basic features the iris radius was chosen to be in the range (100-130) pixels. It fails to detect some circles due to the fact that it depends on a threshold value. Also it is computationally exhaustive [20]. Hough transform is unaffected by noise and provides more accuracy in localization than Daugman's algorithm, it detects the outer iris boundary in a much more efficient method than the integro-differantial equation based techniques [20]. The iris localization processes is illustrated in Fig.5.

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 2, FEBRUARY 2011 22

(a) (b) (c) (d) Fig.5. Iris localization steps: (a) edge after canny detector; (b) Hough space of CHT; (c) The segmented iris; (d) Final iris isolated region.

4.4 Unwrapping and Normalization In order to allow comparisons, the inconsistency sources need to be fixed like dimensional inconsistencies due to pupil dilation from varying levels of illumination; varying imaging distance; rotation of the camera; head tilt, and rotation of the eye at capturing. Also the pupil region is not always concentric within the iris region, and is usually slightly nasal. The iris region needs to be normalized to compensate for these all states. Rubber sheet model proposed by Daugman [5], [18] remaps each point within iris region to a pair of polar coordinates (r, θ) where r is on the interval [0, 1] and θ is angle [0, 2π] as:

(a)

(b)

Fig. 6. Unwrapping and normalization: (a) Daugman Rubber Sheet model and (b) Unwrapped iris image (angular resolution of 512 and radial resolution of 64).

 − (log( f / f )) 2  0  G( f ) = exp  2(log(σ f / f 0 )) 2   

(5)

with f0 is the central frequency and θf is the scaling factor of the radial bandwidth. The selected parameters to achieve the best performance were the center wavelength of 18 and ratio θf /f0 of 0.55. This approach compresses the data to obtain significant data [20]. The compressed data can be stored and processed affectivity. The 2D normalized pattern is broken up into a number of 1D signal and then convolved with 1D Gabor wavelets. Angular (2) direction is taken rather than the radial one. The total where x(r, θ) and y(r, θ) are defined as linear combina- number of bits in the template will be the angular resolutions of both the set of papillary boundary points tion times the radial resolution, times 2, times the number (xp(θ),yp(θ)) and limbos boundary points (xi(θ),yi(θ)) of filters used. It's suitable where the relevant texture inwhere[24]: formation has a bandwidth greater than one octave [26]. Fig.7 shows the decomposition of the normalized image x(r ,θ ) = (1 − r ) x p (θ ) + rxi (θ ) (3) and the phase coding. Fig.8. shows the real part of the iris code after log-Gabor filter. y (r ,θ ) = (1 − r ) y p (θ ) + ryi (θ )

I ( x(r,θ ), y (r ,θ )) → I (r ,θ )

(4)

It does not compensate for rotational inconsistencies, so rotation is accounted for during matching by shifting the iris templates in the θ direction until two iris templates are aligned [5] before Hamming distance applied. Fig.6. illustrates Daugman rubber sheet model and our normalization under angular resolution of 512 and radial resolution of 64.

4.5 Feature Encoding and Extraction This phase aims to extract the most discriminating features used to generate the significant iris code. 1D logGabor and DCT are typically used for analyzing the human iris patterns and extracting features from them.

(a)

(b)

Fig. 7. (a) Decomposition of the normalized image into a set of 1D signals and (b) Phase coding.

4.5.1 1D Log-Gabor wavelet Both Chenhong and Chou et al. [12] convolve the iris image with a Laplacian-of-Gaussian filter. The performance from the Log-Gabor filter is the best when followed by the Haar wavelet, discrete cosine transform (DCT), and Fast Fourier Transform (FFT) [25]. Such as zero DCcomponent can be obtained for any bandwidth by using a Gabor filter which is Gaussian on a logarithmic scale [25]. This filter is implemented in frequency domain with frequency response defined as follows:

(a)

(b)

Fig. 8. Iris code generation: (a) Normalized iris and (b) Encoded iris texture after 1D log-Gabor filter

4.5.2 The Discrete Cosine Transform (DCT) The two dimensional DCT (DCT-II) is often used in signal and image processing and can be considered as a direct extension of the 1-D case. It can constitute an integral part of successful pattern recognition system [13]. DCT is characterized by: (i) energy compaction; (ii) Decorrelation; (iii) Separation; (iv) Symmetry; and (v) Orthogonality.

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 2, FEBRUARY 2011 23

The DCT of an N*N image, f(x, y) is defined by: ( N −1) ( N −1) (2 x + 1)uπ (2 y + 1)vπ F (u , v) = C (u )C (v) ∑ ∑ f ( x, y ) cos cos 2N 2N x =0 y =0 (6) The inverse transform is defined by: ( N −1) ( N −1) (2 x + 1)uπ (2 y + 1)vπ (7) f (u , v) = ∑ ∑ C (u )C (v) F (u , v) cos cos 2 N 2N x =0 y =0

where

C (u ) = C (v) =

1 N

, foru , v = 0

and

C (u ) = C (v) =

2 , foru, v ≠ 0 N

ferent and the closer this distance is to 0; the more probable the two patterns are to be identical [14]. So, a threshold is set to define the imposter. Daugman set this threshold equal 0.32 [16]. This technique for matching is fast and simple and suitable for comparisons of millions of template in large database [20]. Several hamming distance values are computed from successive shifts. The smallest of these hamming distance values is adapted as the dissimilarity measure [26]. Table 1 and Table 2 illustrate the obtained results of the average HD distance for nine different cases of the CASIA database with seven irises each for both 1D L0g-Gabor and DCT respectively.

5. Results

In addition of its strong energy compaction property, the feature extraction capabilities of the DCT coupled with well-known fast computation techniques [4]. It compresses all the energy of the image and concentrates it in a few real valued coefficients located in the upper-left corner of the resulting real-valued M*N DCT/frequency matrix. Zero or low-level pixel values except at the top-left corner. These low-frequency, high-intensity coefficients are therefore, the most important coefficients in the frequency matrix and carry most of the information about the original image. A binary template is generated from the zero crossings of the differences between DCT coefficients. This coding method has low complexity and good interclass separation [20]. It is superior to other approaches in terms of both speed and accuracy. Fig.9 shows the encoded iris texture after DCT transform.

The performance of the previously discussed method was tested and simulated using MATLAB 2009a, using a personal computer of the following specifications: (i) operating system WINDOWS XP, (ii) processor Dual-Core (1.6 GHZ/2MB Cache), (iii) RAM 2GB, (iv) Hard Disk 120 GB; the average estimated time excuting 1D Log-Gabor and DCT is 2.014144 sec. and 1.926794 sec. respectively. These results were obtained using CASIA version 1.0. A total of nine different eyes were tested, and for each iris seven images were used. This makes up a total of 63 experiments. Table 3 shows the results of the verification test

of 1D Log-Gabor and DCT respectively. For 1D Log-Gabor test shows that the optimum threshold for the proposed algorithm is 0.462 with associated FAR=0.55417% and FRR=0.88667%. The correct recognition rate is 98.559% with EER equals 0.869%. But, for the DCT test shows that the optimum threshold for this algorithm is 0.4837 with associated FAR=0.27708% and FRR=6.76087%. The correct recognition rate is 92.96204% with EER equals 4.485%. Figure 10 shows the distribution of intraclass and interclass matching distances of the two proposed methods.

Fig. 9. Encoded iris texture after DCT transform.

4.6 Template Matching Hamming distance employed by Daugman was chosen as a metric for recognition. It represents the number of bits that are different in the two patterns [20]. The hamming distance is defined as followed:

HD =

1 N ∑ X j ( XOR)Y j N j =1

(8)

where X and Y are the two bit patterns; that we compared and N is the total number of bits. The larger the hamming distance (closer to 1), the more the two patterns are dif-

Fig. 10. Probability distribution curves for matching and nearest nonmatching Hamming distances. (a) 1D Log-Gabor (b) DCT.

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 2, FEBRUARY 2011 24

Fig. 11 shows the two proposed approaches error versus their hamming distances. The EER is the point where the FAR and FRR are equal in value. The smaller the EER (which is dependant directly on FAR and FRR and its smaller value with regard to the smaller values of FAR and FRR intersection) is, the better the algorithm.

Fig.12 which is the Receiver Operating Characteristics (ROC) curve of the proposed methods. It is the FAR% versus FRR% curve which measures the accuracy of the iris matching process and shows the overall performance of algorithm.

Fig. 12. ROC of both 1D Log-Gabor and DCT approaches.

Fig. 11. FAR and FRR versus Hamming distances.

TABLE 1. THE AVERAGE HD RESULTS OF 1D LOG-GABOR BASED TEMPLATE MATCHING Eye Code 25 29 30 34 40 55 62 77 100

25

29

30

34

40

55

62

77

100

0.33626 0.48350 0.48368 0.48993 0.48118 0.48724 0.48694 0.48874 0.48899

0.48350 0.30261 0.48713 0.48832 0.48726 0.48433 0.47874 0.48475 0.48819

0.48368 0.48713 0.41838 0.47767 0.48701 0.48589 0.47777 0.48280 0.48644

0.48993 0.48832 0.47767 0.35238 0.48663 0.48886 0.47978 0.48906 0.48751

0.48118 0.48726 0.48701 0.48663 0.38007 0.48483 0.48061 0.48817 0.48686

0.48724 0.48433 0.48589 0.48886 0.48483 0.44462 0.48465 0.48815 0.48690

0.48694 0.47874 0.47777 0.47978 0.48061 0.48465 0.32729 0.48848 0.48218

0.48874 0.48475 0.48280 0.48906 0.48817 0.48815 0.48848 0.38166 0.48288

0.48899 0.48819 0.48644 0.48751 0.48686 0.48690 0.48218 0.48288 0.36204

TABLE 2. THE AVERAGE HD RESULTS OF DCT BASED TEMPLATE MATCHING Eye Code 25 29 30 34 40 55 62 77 100

25

29

30

34

40

55

62

77

100

0.48819 0.49209 0.49236 0.49145 0.49124 0.49205 0.49118 0.49240 0.49197

0.49209 0.48190 0.49320 0.49187 0.49155 0.49207 0.49192 0.49278 0.49305

0.49236 0.49320 0.48977 0.49055 0.49225 0.49193 0.49192 0.49232 0.49136

0.49145 0.49187 0.49055 0.48264 0.49173 0.49207 0.49149 0.49121 0.49198

0.49124 0.49155 0.49225 0.49173 0.48395 0.49078 0.49224 0.49220 0.49257

0.49205 0.49207 0.49193 0.49207 0.49078 0.49013 0.49161 0.49250 0.49239

0.49118 0.49192 0.49192 0.49149 0.49224 0.49161 0.48589 0.49264 0.49234

0.49240 0.49278 0.49232 0.49121 0.49220 0.49250 0.49264 0.48803 0.49206

0.49197 0.49305 0.49136 0.49198 0.49257 0.49239 0.49234 0.49206 0.48397

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 2, FEBRUARY 2011 25

TABLE 3. RESULTS OF VERIFICATION TEST. 1D Log-Gabor

DCT

Threshold

FAR

FRR

Threshold

FAR

FRR

0.402

0

3.047936

0.4727

0

8.645054

0.412

0

2.493766

0.4746

0

8.423386

0.422

0

2.050429

0.4764

0

8.367969

0.432

0

1.66251

0.4781

0

8.201718

0.442

0

1.385425

0.4800

0.055417

7.98005

0.452

0

1.052923

0.4819

0.110834

7.370463

0.462

0.55417

0.886672

0.4837

0.277085

6.760876

0.472

5.486284

0.609587

0.4855

0.886672

6.040454

0.482

36.99086

0.498753

0.4874

3.103353

4.876697

0.492

80.63175

0.110834

0.4891

10.36298

2.826268

6. Conclusion In this paper, a robust iris recognition system based on 1D Log-gabor and DCT has been presented. To overcome the problems of obtaining real time decision of human iris in an accurate and fast technique; threshold concepts were used to segment the pupil. Wilde's techniques are used to localize iris region based on edge detector and CHT. Daugman's Rubber Sheet Model used as unwrapping and normalization (of size 64×512) algorithm. Iris features extracted using 1D log-Gabor transform; which treats the normalized iris row by row. Finally the template matching was performed using the HD operator of the real part of the iris code. Experimental tests on the CASIA database achieved 98.559% of recognition accuracy using 1D Log-gabor coefficients with EER equals 0.869%, and 92.96204% of accuracy using DCT coefficients with EER equals 4.485%, with low computational cost and good interclass separation in minimum time.

References [1] R.P. Wildes, "Iris recognition: an emerging biometric technology", Proceedings of the IEEE, Vol. 85, No. 9,pp. 13481363,September 1997. [2] A. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal Identification in a Networked Society, Kluwer Academic Publishers, Norwell, Mass, USA, 1999. [3] Kaushik Roy and Prabir Bhattacharya," Optimal Features Subset Selection and Classification for Iris Recognition", EURASIP Journal on Image and Video Processing Volume 2008, Article ID 743103, 20 pages [4] Donald M. Monro, Dexin Zhang," DCT-Based Iris Recognition",IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, No. 4, pp. 586-595, April 2007 [5] J. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Patt. Anal. Machine Intell., vol. 15, pp. 1148-1161, Nov. 1993. [6] W. W. Boles, “A security system based on human iris identification using wavelet transform,” Proc. Intl. Conf. KnowledgeBased Intelligent Electronic Systems, pp. 533-541, May 1997. [7] H. Proença and L. A. Alexandre, “Towards noncooperative iris recognition: A classification approach using multiple signatures,” IEEE Trans. Patt. Anal. Machine Intell., vol. 29, pp.

607-612, Apr. 2007 [8] J. Thornton, M. Savvides, and B. V. K. Vijay Kumar, “A Bayesian approach to deformed pattern matching of iris images,” IEEE Trans. Patt. Anal. Machine Intell., vol. 29, pp. 596-606, Apr. 2007. [9] J. Huang, T. Tan, L. Ma, Y. Wang, “Phase correlation based iris image registration model,” Computer Science and Technology, vol. 20, no. 3, pp. 419-425, May 2005. [10] L. Ma, T. Tan, Y. Wang, and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. Patt. Anal. Machine Intell., vol. 25, pp. 1519-1533, 2003. [11] L. Ma, T. Tan, Y. Wang and D. Zhang. “Efficient Iris Recognition by characterizing Key Local Variations”, IEEE Trans. Image Process., vol. 13, pp. 739-750, 2004. [12] K.W. Bowyer, K. Hollingsworth, and P.J. Flynn, "Image understanding for iris biometrics: A survey", Computer Vision and Image Understanding, Vol. 110, No. 2, PP. 281–307, May 2008. [13] A.M. Sarhan, "Iris Recognition Using Discrete Cosine Transform and Artificial Neural Networks", Journal of Computer Science, Vol. 5, No. 5, PP. 369-373, May 2009. [14] J.G. Daugman, "The importance of being random: statistical principles of iris recognition", Pattern Recognition, Vol. 36, No. 2, PP. 279 – 291, February 2003. [15] K. Delac, M. Grgic, "A survey of Biometric Recognition Methods", 46th International Symposium Electronics in Marine, ELMAR-2004, Zadar, Croatia, PP. 184-193, 16-18 June 2004. [16] J.G. Daugman," How Iris Recognition Works", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1,pp. 21-30, January 2004. [17] M. Nabti, L. Ghouti, and A. Bouridanem, "An effective and fast iris recognition system based on a combined multi-scale feature extraction technique", Science direct, the journal of the Pattern Recognition society, Vol. 41, pp. 868 – 879, 2008. [18] A. Basit, M.Y. Javed, and M. A. Anjum, "Efficient Iris Recognition Method for Human Identification," World Academy of Science, Engineering and Technology, Vol. 4, No. 7, PP. 2426, April 2005. [19] A. Harjoko, S. Hartati, and H. Dwiyasa, "A Method for Iris Recognition Based on 1D Coiflet Wavelet", World Academy of Science, Engineering and Technology, Vol. 56, No. 24, PP. 126-129, August 2009. [20] R.Y. Fatt Ng, Y.H. Tay, and K.M. Mok, "A Review of Iris Recognition Algorithms", IEEE, International Symposium on Information Technology, Vol. 2, pp. 1-7, Kuala Lumpur, Malaysia, 26-28 August 2008. [21] Ismail A. Ismail, Mohammed A. Ramadan, Talaat. El danf , and Ahmed H. Samak, "An Effective Iris Recognition System Using Fourier Descriptor And Principle Component Analysis", International Journal of Computer and Electrical Engineering, Vol. 1, No. 2, PP. 117-120, June 2009. [22] Hasan Demirel and Gholamreza Anbarjafari, "Iris Recognition System Using Combined Histogram Statistics", 23rd International Symposium on Computer and Information Sciences, Istanbul, pp. 1-4, 27-29 October 2008. [23] A.E. Yahya and M.J. Nordin, "A New Technique for Iris Localization in Iris recognition Systems", Information Technology Journal, Vol. 7, No. 6,PP. 924-929,2008. [24] S. Patnala, R.C. Murty, E. S. Reddy, and I.R. Babu, "Iris Recognition System Using Fractal Dimensions of Haar Patterns",

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 2, FEBRUARY 2011 26

International Journal of Signal Processing, Image Processing, and Pattern Recognition , Vol. 2, No.3, PP. 75-84, September 2009. [25] A. Kumar, A. Passi, "Comparison and Combination of Iris Matchers for Reliable Personal Identification", IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, Anchorage, AK, pp. 1-7, 23-28 June 2008. [26] D.L. Terissi, L. Cipolinm, and P. Balding, "Iris Recognition System based on Log-Gabor Coding," 7th Symposium Argentine of Artificial Intelligence – ASIA, Rosario, PP. 160-171, 29-30 August 2005.

Ramadan Mohamed Gad received the “B.Sc” degree in Computer Science & Engineering from Faculty of Electronic Engineering, Menoufya University, Egypt, in 2005. From 2005 to 2007, he worked in Higher Institute for Engineering & Technology as a researcher. In July 2007, he joined Faculty of Electronic Engineering, Menoufya University, Egypt, as a M.Sc student in Computer Science & Engineering. He is currently working in Iris Recognition System. His research interests are in the areas of biometrics, FPGA, security and digital signal/image processing.

Mohamed Abdel-Azim Mohamed received the PhD degree in Electronics and Communications Engineering from the Faculty of Engineering-Mansoura University-Egypt by 2006. After that he worked as an assistant professor at the Electronics & Communications engineering department until now. He has 42 publications in various international journals and conferences. His current research interests are in multimedia processing, wireless communication systems, and field programmable gate array (FPGA) applications.

Nawal Ahmed El-Fishawy received the Ph.D degree in mobile communications the faculty of Electronic Eng., Menoufia university, Menouf, Egypt, in collaboration with Southampton university in 1991.Now she is the head of Computer Science and Engineering Dept., Faculty of Electronic Eng. Her research interest includes computer communication networks with emphasis on protocol design, traffic modeling and performance evaluation of broadband networks and multiple access control protocols for wireless communications systems and networks.Now she directed her research interests to the developments of security over wireless communications networks (mobile communications, WLAN, Bluetooth), VOIP, and encryption algorithms.She has served as a reviewer for many national and international journals and conferences. Also she participated in many technical program committees of major international conferences in wireless communications.

Iris Recognition Based on Log-Gabor and Discrete ...

Index Terms— Iris Recognition System, Image Preprocessing, 1D log-Gabor filter, Hamming Distance (HD), .... took from 4 cm away using a near infrared camera. The ..... interests to the developments of security over wireless communica-.

503KB Sizes 1 Downloads 206 Views

Recommend Documents

Review of Iris Recognition System Iris Recognition System Iris ... - IJRIT
Abstract. Iris recognition is an important biometric method for human identification with high accuracy. It is the most reliable and accurate biometric identification system available today. This paper gives an overview of the research on iris recogn

Review of Iris Recognition System Iris Recognition System Iris ...
It is the most reliable and accurate biometric identification system available today. This paper gives an overview of the research on iris recognition system. The most ... Keywords: Iris Recognition, Personal Identification. 1. .... [8] Yu Li, Zhou X

Face Recognition Based on SVM ace Recognition ...
features are given to the SVM classifier for training and testing purpose. ... recognition has emerged as an active research area in computer vision with .... they map pattern vectors to a high-dimensional feature space where a 'best' separating.

Language Recognition Based on Score ... - Semantic Scholar
1School of Electrical and Computer Engineering. Georgia Institute of ... over all competing classes, and have been demonstrated to be effective in isolated word ...

Language Recognition Based on Score ... - Semantic Scholar
1School of Electrical and Computer Engineering. Georgia Institute ... NIST (National Institute of Standards and Technology) has ..... the best procedure to follow.

Face Recognition Based on Local Uncorrelated and ...
1State Key Laboratory for Software Engineering, Wuhan University, Wuhan, ... of Automation, Nanjing University of Posts and Telecommunications, 210046, ...

Iris Recognition Using Possibilistic Fuzzy Matching ieee.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Iris Recognition ...

An Effective Segmentation Method for Iris Recognition System
Biometric identification is an emerging technology which gains more attention in recent years. ... characteristics, iris has distinct phase information which spans about 249 degrees of freedom [6,7]. This advantage let iris recognition be the most ..

A Review: Study of Iris Recognition Using Feature Extraction ... - IJRIT
INTRODUCTION. Biometric ... iris template in database. There is .... The experiments have been implemented using human eye image from CASAI database.

A Review: Study of Iris Recognition Using Feature Extraction ... - IJRIT
analyses the Iris recognition method segmentation, normalization, feature extraction ... Keyword: Iris recognition, Feature extraction, Gabor filter, Edge detection ...

EF-45 Iris Recognition System - CMITECH.pdf
Whoops! There was a problem loading more pages. EF-45 Iri ... ITECH.pdf. EF-45 Iris ... MITECH.pdf. Open. Extract. Open with. Sign In. Details. Comments. General Info. Type. Dimensions. Size. Duration. Location. Modified. Created. Opened by me. Shari

Efficient Small Template Iris Recognition System Using ...
in illumination, pupil size and distance of the eye from the camera. ..... With a pre-determined separation Hamming distance, a decision can be made as to ...

Authorization of Face Recognition Technique Based On Eigen ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... computationally expensive but require a high degree of correlation between the ...

Robust Speech Recognition Based on Binaural ... - Research at Google
degrees to one side and 2 m away from the microphones. This whole setup is 1.1 ... technology and automatic speech recognition,” in International. Congress on ...

Three dimensional face recognition based on geodesic ...
dimensional face recognition systems, on the other hand, have been reported to be less .... to methods based on PCA applied to the 3D point clouds, fitting implicit ... surfaces, and PCA applied to range images.21 Its performance was equivalent to an

DSP-Based Implementation and Optimization of an Iris ...
it suitable for high security access control application. The three main .... Development Environment ... interface which speeds up development time and reduces.

DSP-Based Implementation and Optimization of an Iris ...
HD. THD γ β α. +. +. = ➢ Hamming distance is a measure of dissimilarity between two binary templates. ➢ A threshold is set to decide if the two templates are ...

Spoken Language Recognition Based on Gap ...
Feb 14, 2014 - gual speech recognition, speech translation, information security .... weighted by such as term frequency-inverse document frequency (TF-IDF),.

Phonotactic Language Recognition Based on Time ...
languages from the training data, and then classify a speech utterance to the most probable language based ... only being robust to deletion and insertion errors but also being capable of revealing the long-context .... Institute of Standards and Tec