Академический Документы
Профессиональный Документы
Культура Документы
TECHNOLOGY
SALEM.
Paper presentation on
DIGITAL IMAGE
PROCESSING
POLLING BY IRIS TECHNOLOGY
ADVANCED
Submitted by,
KARTHIK.S
KANDAKRISHNAN.S
karthikshenju@gmail.com
Contact no: 8760067863
ABSTRACT:
INDEX
Introduction. 4
Block diagram.. 6
Image acquisition. 6
Data storage..... 6
Image cropping......... 7
Edge detection. 7
Image transformation... 7
Image comparison.... 8
Online Acess.... 9
Network accessment..11
Merits.11
Conclusion.12
Refrences...12
INTRODUCTION:
Biometrics is the
science of measuring an
individual's
physiological
or
behavioral characteristics
for
automatic
identification.
Biometrics is the only
viable
approach
to
personal
recognition.
It
physiological
or
behavioral characteristics.
Any human
biometric
character
satisfies
Distinctiveness
Permanence
Collectiveness.
the
only
way
for
convenience
traditional
than
methods
personal
of
recognition.
Types
of
biometric
technologies follows
the recognition of person
by his Fingerprint, Face,
Hand
geometry,
scanning
and
recognition.
Iris
Voice
The
comparison
of
the
biometrics
with
the
follows:
BIOMETRIC
Iris
recognition
AUTHENTICATION
MECHANISM:
from
the
vascular
Authentication is defined
as
advantage
measuring
individual's
an
of
being
physical
an
lens
specific
be
and
features
in
user
determined
can
at
rare
in
can be granted.
population.
the
the
alignment
general
Iris scan:
Iris :
perfect
cavity.
Lens
Optometrist
vessels
and
are
contraction.
It
even
between
twins,
were
specifically
surveys
say
that
by
the
blood
vessel detection.
BLOCK DIAGRAM:
IMAGE ACQUISITION:
reflected
light
into
electronic
as follows:
Hand-held:
They
are
inexpensive
and
less
flat bed.
movement
be
must
DATA STORAGE:
The
image
obtained so is digitalized.
8
IMAGE CROPPING:
amplitude of f ` at spatial
the
types.
energy.
The
factor
data
called
the
Spatial:
This
is related with
the
interval. High
spatial
resolution,
identity,
residential
more sampling
personal
remains
sampling point.
address
and
details.
This
sampling
Gray
level:
This
depends
on
quantization
level.
quantization
identification process.
levels
the
More
results in the
On polling day the person
who has to vote will give
his
biometry
more
This
authentication
specifically,
iris.
has
the
following steps.
EDGE DETECTION:
Boundary between
form an edge.
pixel
information
Many
derivative
used
process
local
operators
are
to
packing
of
the
is
The
image
transformation is done to
edge
transformed
cosine transform.
IMAGE
COMPARISON:
detected
and
using
Then
the
the
image
IMAGE
TRANSFORMATION:
The
image
of
the
test
image
is
obtained is to be converted
so
as
to
make
the
in
the
database
the
persons
information
is
10
Minimization of FAR :
following factors:
the
acceptance
Typ
e of
bio
metr
ic
Raising
feat
ure
(reti
na
in
this
case
Qua
iden
lity
tific
of
atio
the
sens
ors
ONLINE ACCESS:
User
In
beha
the
general
vior
Effe
ctiv
enes
s of
concerned
authorities
the
check
authorized
reco
gniti
on
algo
rith
The
num
ber
of
process.
these
Further
bio
The
the
metr
ic
extra
refer
servants.
ence
implementation
s in
an
wages
for
the
In the actual
process,
12
uniquely
characteristics
of
the
attribute
biometric attribute.
The
through
appropriate
an
scanning
technique.
differentiating
Once
the
content
is
be
user
scanned
acquired,
it
must
database)
for
processing purposes.
The localization is
actually
encrypted
in
cant
extraneous
informational
cant
(cryptographic algorithm),
for
form
for
attributes
user
matching
stored
in
be
that
done.
because
Our
once
involved
in
the
13
NETWORK ACCESSMENT:
14
MERITS:
This
severe head
integrated
system
is
more
trauma
are
enough to be used
identity established
by a face
recognition
system, a fingerprint
malpractice
verification
system,
illegal
blame
system etc.
stable
It
meets
like
voting,
of voters etc.
the
Since this is an
response time as
integrated network
well
as
the
accuracy
requirements.
any
part in that
of some types of
particular constituency
degenerative
(WAN).
eye
diseases or cases of
15
computers
or
systems.
the
particular
event
to
individual,
is
becoming
socially
The
increase
malpractices
in
the
iris
scanning
during
like
more
polling
privacy
election
polling
system.
though
Even
the
present
in
individuals
and
security,
one.
Again
through
this
scheme
malpractice
is
increased.
further
Implementing
measures
may
the
computer
basics
security.
REFERENCE:
of
We
Books:
1.
Benjamin,
Lewin,
Genes
Sites :
1.
www.bioinformatic
s.weizmann.ac.il
2.
www.biometrics.or
g
3.
www.findbiometric
s.com
4.www.directbiom
etrics.co
17