Вы находитесь на странице: 1из 18

KNOWLEDGE INSITUTE OF

TECHNOLOGY
SALEM.
Paper presentation on

DIGITAL IMAGE
PROCESSING
POLLING BY IRIS TECHNOLOGY

ADVANCED

Submitted by,

KARTHIK.S

KANDAKRISHNAN.S

2nd year CSE

2nd year CSE

karthikshenju@gmail.com
Contact no: 8760067863

ABSTRACT:

India is a secular country


This phrase will prove to be more effective if the Democracy of India is
enriched. For this enrichment the participation of the HUMAN RESOURCE
is essential and obviously the ELECTIONS play the key role. This paper
aims at providing the suitable panacea for the prevailing malpractices in
general elections.

We come up with biometric solution against rigging, miscreants and


hacking of personnel database. As many as 15 types of identifications
schemes are used in general elections nowadays. So the rate of interchange
is high. But, this can be avoided by our new innovative possible
technological trend of implementing IRIS SCANNING MECHANISM.
Iris is the colored part of the eye that consists of a muscular diaphragm
surrounding the pupil and regulating the light entering the eye by expanding
and contracting the pupil. As the ratio of people having same iris structure is
10^78 we have adopted this mechanism. Thus providing biometric security,
we sign to bring secured democracy in our nation.

INDEX

Introduction. 4

Biometric authentication mechanism... 4

Block diagram.. 6

Image acquisition. 6

Data storage..... 6

Image cropping......... 7

Edge detection. 7

Image transformation... 7

Image comparison.... 8

Identification and authentication. 8

Online Acess.... 9

User and the server10

Network accessment..11

Merits.11

Conclusion.12

Refrences...12

INTRODUCTION:
Biometrics is the
science of measuring an
individual's
physiological

or

behavioral characteristics
for

automatic

identification.
Biometrics is the only
viable

approach

to

personal

recognition.

It

can give automatic


personal recognition based
on

physiological

or

behavioral characteristics.
Any human
biometric

character

satisfies

Distinctiveness

Permanence

Collectiveness.

So, Biometry can


be

the

only

way

for

offering greater security


and

convenience

traditional

than

methods

personal

of

recognition.

Types

of

biometric

technologies follows
the recognition of person
by his Fingerprint, Face,
Hand

geometry,

scanning

and

recognition.

Iris
Voice
The

comparison

of

the

biometrics

with

the

characteristics are given as


Universality

follows:

BIOMETRIC

Iris

recognition

AUTHENTICATION

creates an "eye signature"

MECHANISM:

from

the

vascular

configuration of the iris, an


Biometric

extremely consistent and

Authentication is defined

reliable attribute with the

as

advantage

measuring

individual's

an

of

being

physical

protected inside the eye

an

itself. An image of iris is

authentication inquiry and

captured by having the

comparing this data with

individual look through a

stored biometric reference

lens

data, identification for a

target. Diseases or injuries

specific

be

that would interfere with

and

the iris are comparatively

features

in

user

determined

can

at

authentication for access

rare

in

can be granted.

population.

the

the

alignment

general

Iris scan:
Iris :

perfect

cavity.

Lens

contains 60-70% of water


and 7% of fat with more
proteins.

Optometrist

research suggested that the


patterns of blood vessels
on the back of the human
eye were unique from
Eye is the precious
part of the body with the
diameter of 20 mm. It
consists of outer sclera,
cornea, and the choroids
ant the retina. Choroids are
below sclera formed by the
blood

vessels

and

are

pigmented. The anterior


choroids is divided into
ciliary body and iris
diaphragm. Iris has
the capability of expansion
and

contraction.

It

person to person. Further


research resulted that these
patterns,
identical

even

between

twins,

were

indeed unique throughout


the iris.
More
the

specifically

surveys

say

that

1:10^78 will have the


same type of iris which is
the rarity case of error
occurrence. This can be
avoided

by

the

blood

vessel detection.

maintains the lens in the

BLOCK DIAGRAM:

IMAGE ACQUISITION:

resolution. CCD captors

The image of the

are used to convert the

iris is acquired using the

reflected

light

into

scanning techniques. The

electronic

scanning of iris is made by

and numerical signals.

any type of the scanners.

Desktop: This scanner has

The types of scanners are

the same process of flat

as follows:

bet. But the bits transferred

Hand-held:

They

are

is 12 rather 8 done in the

inexpensive

and

less

flat bed.

versatile. But the error

Micro film : This scanner

occurrence depends on the

scans the film using CCD

hand that holds. Shaky

captor or screen of micro

movement

be

film. This image acquired

avoided to get clear image.

using those microfilms are

Flatbed: This follows the

accurate but cant withhold

process of absorption and

for a long time.

must

reflection of the light.


Black light is absorbed and

DATA STORAGE:

white is reflected. The


colors are reflected or
absorbed according to the

The

image

obtained so is digitalized.
8

The image is represented


as f(x, y) having the

IMAGE CROPPING:

amplitude of f ` at spatial

The eye consists of

co-ordinates (x, y) is the

the

intensity of image at that

resolution. This is of two

points. f(x, y) is the non

types.

zero and finite, since light


is

energy.

The

factor

data

called

the

Spatial:

This

is related with

obtained from the scanner

the

is stored in the database of

interval. High

the system as a digitalized

spatial

form with the persons

resolution,

identity,

residential

more sampling

personal

rate and increase in the

remains

sampling point.

address

and

details.

This

unchanged in the server.

sampling

Gray

level:

The process is similar to

This

depends

the preparation of voters

on

list. This image is called as

quantization

the first image.

level.

These following form the

quantization

identification process.

levels

the
More

results in the
On polling day the person
who has to vote will give
his

biometry

lower quantization error.


The test image is

more

converted to the gray level

This

scale. Then the image is

image is called the test

cropped i.e. the needed

image. The process of

information is taken from

authentication

the tested image.

specifically,

iris.

has

the

following steps.

EDGE DETECTION:

of the types- DFT, FFT,

Boundary between

Walsh, Hadamard, DCT,

two regions with relatively

Haal, Slant, and Hotelling.

gray level properties will

Discrete cosine transform

form an edge.

can be suggested because

pixel

locations of abrupt gray

information

level change are noted.

superior; basis images of

Many

derivative

DCT are fixed.

used

process

local

operators

are

to

packing

of

the

is
The

image

detect the edge points.

transformation is done to

Edge detection can be

the test image. Then the

made using the gradient

first image is cropped,

operators. Many types of

edge

the operators are available.

transformed

The highly contented is

cosine transform.

the sobel operator and

IMAGE

prewitt operator. Thus the

COMPARISON:

edge detection of the test


image is done.

detected

and

using

Then

the

the

image

comparison between the


test and first image is

IMAGE

made. The grant and denial

TRANSFORMATION:

of the process is made by


this process. The transform

The

image

of

the

test

image

is

obtained is to be converted

compared with the every

into the mathematical form

first images in the data

so

base. If the match is found

as

to

make

the

comparison with the first

in

the

database

the

image that is obtained

persons

information

is

already. So the test image

displayed and hes allowed

is transformed using any

10

to cast his vote. Else hes


rejected for voting.
IDENTIFICATION AND AUTHENTICATION:

Minimization of FAR :

others mainly affect the


FRR. For a fixed FRR,

The false acceptance rate

FAR is dependent on the

(FAR) can be adjusted in

following factors:

the recognition algorithm


via

the

acceptance

Typ
e of

threshold - the higher the

bio

acceptance threshold, the

metr

lower the FAR.

ic

Raising

the acceptance threshold,

feat

however also raises the

ure

FRR. Therefore, the goal

(reti

must be to have as small

na

an FAR as possible for any

in

given FRR, and vice versa.

this

There are certain

case

factors, which primarily

influence the FAR, while


11

Qua

iden

lity

tific

of

atio

the

sens
ors

ONLINE ACCESS:

User
In

beha

the

general

vior

election process, the voter

Effe

should bring the identity

ctiv

card or citizenship card to

enes

the election booth.

s of

concerned

authorities

the

check

authorized

reco

identity cards. In case

gniti

both databases are same

on

,the voter is checked for

algo

already polling in the same

rith

election the voter is sent to

poll. In the EVM the voter

The

poll for his / her desired

num

party. Since this is a time

ber

consuming and unreliable

of

process.

these

Further

bio

The

the

metr

government has to pay

ic

extra

refer

servants.

ence

implementation

s in

the voter should stand

an

before the retina scanning

wages

for

the

In the actual
process,

12

device system; the system

uniquely

acquires an image of the

characteristics

of

the

attribute

biometric attribute.

The

through

appropriate

an

scanning

technique.

differentiating

scanned template of that

Once

the

person is checked with all

content

is

other templates. if the

be

exact match is found, then

localized (in the server &

the database is checked

user

whether he has already

scanned
acquired,

it

must

database)

for

processing purposes.

voted on the same election,

The localization is
actually

encrypted

in

GAIC algorithm ( so that


unauthorized

voter D-base is published


(saying eligible to vote).

cant

The voter can poll

access ). During this step,

for his / her desired party.

extraneous

informational

In case, if a voter tries to

content is discarded and

vote for once again, it

minutiae are isolated and

cant

turned into a template

Algorithm made a sweep

(cryptographic algorithm),

for

a sort of internal canonical

polling is done; an entry is

form

made in to the voters

for

attributes

user

if not, then the concerned

matching

stored

in

database. Minutiae are the

be
that

done.
because

Our
once

Database. This prevents


the malpractice of rigging.

FLOW CHART FOR ONLINE ACCESS :


The following flow
chart shows the process

involved

in

the

authentication of the voter.

13

USER AND THE SERVER:

NETWORK ACCESSMENT:

14

MERITS:
This

severe head

integrated

system

is

more

trauma

are

reliable than the

enough to be used

identity established

throughout one's life.

by a face

This secure voting

recognition

system prevents the

system, a fingerprint

malpractice

verification

system,

illegal

and a mole verification

blame

system etc.

stable

It

meets

like
voting,

of voters etc.
the

Since this is an

response time as

integrated network

well

system, one can put

as

the

accuracy

his\her vote from

requirements.

any

With the exception

part in that

of some types of

particular constituency

degenerative

(WAN).

eye

diseases or cases of

15

computers

or

systems.

This is because biometrics


links

the

particular

event

to

individual,

is

convenient, accurate, can


provide an audit trail and
is
CONCLUSION:

becoming

socially

acceptable for its security.


Hence we surely say that

The

increase

malpractices

in

the

iris

scanning

during

technology is the most

like

prominent one among the

rigging, miscreant made us

biometrics and helps much

to relay on highly secure

more

polling

privacy

election

polling

system.

though

Even

the

present

EVMPS skips some sort of

in

individuals
and

security,

helping thus in online


polling system.

burden. Still it is not much


reliable

one.

Again

through

this

scheme

malpractice

is

increased.

further

Implementing

the use of information


security

measures

may

help in the war against


hacking, but we must not
forget

the

computer

basics

security.

REFERENCE:

of
We

must do the simple things


that make it harder for
hackers to get into our

Books:
1.
Benjamin,

Lewin,
Genes

VII (2000), p. 546


2. Venter, Craig et
al., Science (2001),
vol. 291 p. 1305
16

Sites :
1.
www.bioinformatic
s.weizmann.ac.il
2.
www.biometrics.or
g
3.
www.findbiometric
s.com
4.www.directbiom
etrics.co

17

Вам также может понравиться