Вы находитесь на странице: 1из 24

ABSTRACT

Biometric methods have been played important roles in personal


recognition during last twenty years. These methods include the face
recognition, finger print and iris recognition. Recently iris imaging has many
applications in security systems.
Our proposed method for iris recognition system is iris
recognition using ridgelet transform. It composed of image segmentation
algorithm used to localize pupil and iris boundary based on canny edge
detection algorithm ,also it segments the collaret area of eye which contains
maximum information. The extracted iris region was then normalized into a
rectangular block with constant dimensions to account for imaging
inconsistencies. Then we improve the quality of image by using median filter,
histogram equalization, and the two-dimensional (2D) Wiener filter as well.
Finally the ridgelet transform and curvelet transform are applied for extracting
features and then the binary bit stream vectors are generated. The Hamming
distance (HD) between the input bit stream vector and stored vectors is
calculated for iris identification. The Hamming distance was employed for
matching of iris patterns.

Abstract
An efficient method for personal identification based on the pattern of
human iris is proposed. Iris recognition is regarded as the most reliable and
accurate biometric identification system available.

It is composed of an automatic segmentation system that is based on


the Hough transform, and is able to localize the circular iris and pupil region,
occluding eyelids and eyelashes, and reflections. The extracted iris region was
then normalized into a rectangular block with constant dimensions to account
for imaging inconsistencies. The phase data from 1D Log-Gabor filters was
extracted and quantized to four levels to encode the unique pattern of the iris
into a bit-wise biometric template. Finally, The Hamming distance was
employed for matching of iris patterns.
Iris recognition is shown to be a reliable and accurate biometric
technology.

Introduction
In recent past, terror of several terrorist groups and act of outlaw is been
spreading rapidly in India. Tracking those acts before it is caused or
recovering from it has become difficult to our security system. That failure is
due to lack of integrated information from different department t of India like:
passport, transport, police, defense and, income tax etc. Moreover, tracking indepth information about ever individual is effected due to over population of
our country.
In order to overcome the security problems a systems which has
integrated information of all department of India along with some Biometric
system to uniquely identify ever individual. A biometric system provides
automatic recognition of an individual based on some sort of unique feature
or characteristic possessed by the individual.
Biometric characteristics can be divided into two main classes
Physiological are related to shape of the body.
Like Fingerprints, Face recognition, Hand geometry etc.
Behavioral are related to behavior of the person.
Like Signature, Keystroke, Voice or speech

A good biometric is characterized by use of a feature that is


Highly unique so that the chance of any two people having the
same characteristic will be minimal.
Stable so that the feature does not change over time.
Easily captured in order to provide convenience to the user,
and prevent misrepresentation of the feature.

Existing System

Existing systems are as follow:

The existing systems of security practiced in India are usually


primitive.

An citizen is identified on the bases of paper documents like birth


certificate, identification card, pan card or identification parade.

Birth Certificate

PAN Card

While some security areas are automated with motion detector alarm
system, barcode system, smart card etc.

Smart card

Barcode ID

Biometric systems are also used for unique identification of citizen like
fingerprint recognition, face recognition, DNA testing.

Fingerprint recognition

Data of all departments of security like defence, police or C.B.I is not


integrated.

Drawbacks of Existing System


The following are some of the drawbacks that were observed in the existing
system.

High maintenance
Identification documents like birth certificate, PAN card, smart card or barcode
ID, it can worn out with the time or spoil due to in contact with some foreign
element like water. So need to be maintained. Moreover identification
document need to be carried along always.

Time taken
Take taken for identification with identification parade is long. Biometric
identification of DNA testing is long procedure and takes lot of time.

High chance of fraudulence

There are high chances of fraudulence of identification document including


smart card and barcode ID, which can cheat the security system.

Faulty result
Identification parade and other identification document can also led to faulty
result in some cases. As wrong person is identified in identification parade.
Moreover, in biometric system like finger print can be identical in case of
twins.

Affected by the nature of work


Fingerprint readability also may be affected by the work an individual does.
For example, transportation workers such as mechanics, food
workers, may present fingerprints that are difficult to read due to dryness or
the presence of foreign substances, on fingers.

Distributed Information
Information of individual is distributed in different department of India which
make tracking of all information difficult in short time.

Objective

The Development & Implementation of this Knowledge base Security


system with Iris recognition is aiming to:

Develop an integrated knowledge based security system containing


detailed information of citizen in the country.

Knowledge based security system should be enabled with biometric


system.

Biometric system, where iris of human eye will be used as unique


feature of a citizen for validating.

To provide fast, easy and integrated information of a citizen.

To reduce the time factor needed for searching information of a citizen


form different department of Indian security.

History Of Iris Technology

The iris has been historically recognized to possess characteristics


unique to each individual. In the mid-1980s, two ophthalmologists Dr.
Leonard Flom , Aran Safir proposed the concept that no two irises are
alike.

They researched and documented the potential of using the iris for
identifying people and were awarded a patent in 1987.

Soon after, sophisticated algorithm that brought the concept to reality


was developed by Dr. John Daugman and patented in 1994.

Since then many other systems have been developed, most notable
include the systems of Wildes, Boles and Boashash, Lim and Noh.

Agus Harjoko, Sri Hartati, and Henry dwiyasa proposed method for
iris recignition using 1d coiflet wavelet.It is one of the latest method for
iris identification.

Study of Iris

The iris is a thin circular diaphragm, which lies between the cornea and
the lens of the human eye.
The iris is divided into two major regions:

The pupillary zone is the inner region whose edge forms the boundary
of the pupil.

The ciliary zone is the rest of the iris that extends to its origin at the
ciliary body.

The iris is perforated close to its centre by a circular aperture known as


the pupil.

The function of the iris is to control the amount of light entering through
the pupil, and this is done by the sphincter and the dilator muscles,
which adjust the size of the pupil.

The average diameter of the iris is 12 mm, and the pupil size can vary
from 10% to 80% of the iris diameter.

The iris consists of a number of layers; the lowest is the epithelium


layer, which contains dense pigmentation cells.

The stromal layer lies above the epithelium layer, and contains blood
vessels, pigment cells and the two iris muscles.

The density of stromal pigmentation determines the color of the iris.


The externally visible surface of the multi-layered iris contains two
zones, which often differ in color.

An outer ciliary zone and an inner pupillary zone, and these two zones
are divided by the collarette which appears as a zigzag pattern.
The iris is not to be confused with the retina, which lines the
inside of the back of the eye.

Unique feature of Iris

The iris is an externally visible, yet protected organ

Pigmentation of the stroma takes place in the first few years. This
depends on genetics.

Patterns of the iris is randomly formed, in depend to genetics.

Unique epigenetic pattern remains stable throughout adult life.

No two irises are alike. It is epigenetic in nature.


E.g.: identical twins posses uncorrelated iris patterns.

There is no detailed correlation between not only twins but also in the
right and left eye of an individual.

The amount of information that can be measured in a single iris is


much greater than fingerprints, and the accuracy is greater than DNA.

Iris pattern remain almost stable throughout life.

Proposed System
The system at hand can be divided into two inter-related subsystems:
Iris pattern generator and matcher system:
This part of the system deals generating and compare iris pattern
using various image processing technique.
There are various processes that are handled by this system are:

Unique feature extracted of iris.


Iris pattern is generated and stored into the database.
Each time Iris pattern is matched to the iris patterns stored in
the database.

P a ttern G en era to r & m a tc h e r


s y s tem

M a n a g em en t s y s te m
A d d in g a n d
E d itin g h u m a n
In fo r m a tio n

F e a tu re
E x tra c to r
S e a r c h in g a n d
r e tr ie v in g h u m a n
in fo r m a tio n

P r e -P r o c e sse d
im a g e

Ir is P a t t e r n
g en era to r

M a tch er

U ser

Management system :
This part deals with the management side of the security
system. The various processes handled by this system are:

The system user can add a new management user i.e. new admin.
The management can register and edit details of a human like
personal information, educational etc.
The system user can search and retrieve the confidential
information
System user can add new user ,both can access the information
with there unique code.

Scenarios

Login Process
Identifier and name

Login Process

Initiator
Goal
Pre-condition

System user
To access the data from system
The system is running, the user is registered and added
as admin into the system.
The user is successfully able to log in into the system

Post-condition

Authorized person can access the confidential data. If any other person
trying to access data or to do any manipulation that will be directly inform to
the authorized person. When admin wishes add, edit or do some processing
then need to login, the user supplies his credentials to the system. The system
can successfully verify the user supplied credentials. The system can
successfully allow the user to perform various admin level tasks as follow:

Adding new person detail.


Editing person detail.
Searching person information.
Adding new organization detail.
Adding new institution detail.
Adding new admin that exist in person database.

Add new person detail


Identifier and name

Add new person

Initiator
Goal
Pre-condition
Post-condition

System User
The system should be accessible by more than one user.
The system is running
The admin is successfully able to add new personal
information to the system.

In order to add new person to the system. The system user (authorized
person) needs to fill up the forms like Personal Information, Contact Detail,
and Health Detail etc. in the system. The system verifies weather a person
with same or similar iris pattern exists. If it is not then system will add it and
it data will b accessible to both user
Search Process

Identifier and name


Initiator
Goal
Pre-condition
Post-condition

Search Process
Admin User
The System should allow the admin to find the person
in system.
The system should be running.
The user should be successfully able to find the person
information by proving necessary credential.

When admin wish to get the information about a particular person then
admin need to provide necessary credential to get the information and
admin would b able to get all the information about the person.

Scope
The system will have a console system implementation and three-tier
architecture.
The middle layer will contain logics of iris pattern generator and
matcher and the data would be stored in external data stores which the user
that is admin can access from graphical user interface.

G r a p h ic a l
u s e r in t e r fa c e

M id d le w a r e c o n ta in in g L o g ic

D a ta sto rag e

Registered admin can login to the system, and do various processes.


Admin can add or edit person information.
Admin can when search a person on the system by providing
necessary credential which can be printed also.
Admin can add organization detail.
Admin can add institutional detail.

Project feature
The project would include the following features:

Attractive and user friendly graphical user interface.


Unique bio-metric feature used for identifying the citizen.
It provides help which make the system user, easy to understand the
use of the system.

Type of user expected for system


This is knowledge based security system, which is used by security
personnel. As system contain integrated information from different
department of India like passport, judiciary, Banks, H.R. department of any
organization, Insurance and Loan companies etc. it is useful for security
personnel to get integrated information about ever citizen.
Hence, security personnel, Banks, H.R. department of any
organization, Insurance and Loan companies are expected to use this
software.

Software
The software used to develop the system is as follow:
MATLAB
MATLAB is a high-level technical computing language and
interactive environment for algorithm development, data visualization,
data analysis, and numeric computation. Using the MATLAB product, you
can solve technical computing problems faster than with traditional
programming languages, such as C, C++, and FORTRAN.

Environment
The system is designed with following tools.

Environment

MATLAB

Language

Matlab

Database
Operating System

Micro soft Access


Microsoft XP professional

Feasibility study
When developing software, the highlighted concept is mainly the
feasibility of the system i.e. whether the system is feasible in the following
contexts:
Technical feasibility
Technical aspects were considered while the feasibility study was
conducted. Since the nation has licensed copy of all the software required for
the system as well as necessary hardware to meet the requirement of Infrared
camera of the new knowledge based security system, it can be concluded
that the system is technically feasible.
Operational feasibility
New employees are required to administer and maintain, for the same
small training program is required.
This training will include briefing of the knowledge based security
system with case and role-plays. Initially a demonstration will be allowed to
use the knowledge based security system in presence of developers. Any
problems encountered can thus be taken care of. As the users have originated
the request for a new system, acceptability is expected to be high. Hence we
can conclude that the knowledge based security system is operationally
feasible.
Financial feasibility
A financial feasibility study was carried out to know the financial
viability of the project in the terms of the amount of investment in the project
and output expected.
The study includes the cost involved at the time of development of the
project as well as the future cost in terms of maintenance of software and
other miscellaneous expenditure.

The proposed hardware and software are affordable cost. Cost of


developing the software is very little. On the basis of analysis the study
concluded that the project is financial viable.
Start-up cost
1. Salaries of programmers
2. Cost of training
3. Preparation of manuals and other documents
Operating cost
1. Salaries of administrator & management people.
2. Cost of installation and maintenance.
3. Cost of high end Infrared camera.
Result of feasibility study
On all the three levels i.e. Technical, operational and economical level,
the proposed system is feasible. Knowledge based security system is
providing more benefits when compared with the Traditional practice mainly
on the basis of costs in terms of time & overhead incurred.

Cost benefits analysis


COST BENEFIT ANALYSIS (CBA) typically is a weighing scale
approach to decision making. The cost incurred during the development of
the knowledge based security system is weighed against the benefits that the
nation will gain.
Since the Software used for developing this system was already
available, hence the cost for acquiring the software is negligible.

The costs involved during the development of the knowledge based security
system from the national point of view would include:

Cost incurred for developers & testers.

Cost of electricity & other resources.

Cost of training of the various users.

Cost of hardware like Infra red camera to produce pre-processed image

The benefits of using the potential knowledge based security system are
already described earlier, however some of them are:

It provides a mechanism by which unique identification in citizen will


become easy as well as cost effective in terms of time and overhead.

It provides user friendly interface make easy to access the system and
reduce training cost.

However, a rough estimate of the can be made by taking into consideration


the effort put into the development of the knowledge based security system
considering that the software needed is available & free.
Only overhead is Infra red camera but benefit incurred from the system is
more then overhead.

Gantt chart
Gantt chart for eight months timeline:
Verification Phases

Requirements analysis
In the Requirements analysis phase, the requirements of the
proposed system are collected by analyzing the needs of the user(s).
This phase is concerned about establishing what the ideal system has
to perform.
The user requirements document will typically describe the
systems functional, physical, interface, performance, data, security
requirements etc as expected by the user. It is one which the business

analysts use to communicate their understanding of the system back to


the users.

System Design

Systems design is the phase where system engineers analyze


and understand the business of the proposed system by studying the
user requirements document. They figure out possibilities and
techniques by which the user requirements can be implemented.
The documents for system testing are prepared in this phase.

Architecture Design

The phase of the design of computer architecture and software


architecture can also be referred to as high-level design. The baseline in
selecting the architecture is that it should realize all which typically
consists of the list of modules, brief functionality of each module, their
interface relationships, dependencies, database tables, architecture
diagrams, technology details etc. The integration testing design is
carried out in this phase.
Module Design
The module design phase can also be referred to as low-level
design. The designed system is broken up into smaller units or
modules and each of them is explained so that the programmer can
start coding directly.
Validation Phases

Unit Testing

In the V-model of software development, unit testing implies


the first stage of dynamic testing process.
It involves analysis of the written code with the intention of
eliminating errors. It also verifies that the codes are efficient and
adheres to the adopted coding standards. It is done using the Unit
test design prepared during the module design phase.

Integration Testing

In integration testing the separate modules will be tested


together to expose faults in the interfaces and in the interaction
between integrated components.

System Testing

System testing will compare the system specifications against


the actual system. The system test design is derived from the system
design documents and is used in this phase.

User Acceptance Testing

Acceptance testing is the phase of testing used to determine


whether a system satisfies the requirements specified in the
requirements analysis phase. The acceptance test phase is the phase
used by the customer to determine whether to accept the system or not.

System Implementation
System has been implemented in this environment:

Operating System

Windows XP Professional with SP3

Environment
Application
Development

MATLAB
Presentation Tier
UI Programming using Matlab, flash & Photoshop
Middle Tier
Logic Development matlab language
Data Tier
Relational Tables in MS Access

RDBMS
CPU

Micro soft Access


Intel Pentium
Intel Celeron
AMD Athlon or AMD Duron Processor
Running at 300 MHz or faster

RAM
Hardware
requirements
Other
Hardware
requirement

512 MB
3.00 MHz Intel Pentium III processor ( equivalent) and later
120 GB available disk space.
High end Infrared camera.

Process flow diagram

S ta rt

A cq u is itio n of

P re p ro c e s s e d
Im a g e

S e g m e n ta tio n fo r
I r is b o u n d a r y
d e f in it io n

N o r m a liz a tio n

F e atu re
e n c o d in g

C h e c k if
e x is t

YES

M a t c h i n g u s in g
H a m m in g c o d e

N O
I r is P a t t e r n s t o r e d
in t o d a t a d is k

S to p

R e s u lt

Вам также может понравиться