Академический Документы
Профессиональный Документы
Культура Документы
Abstract
An efficient method for personal identification based on the pattern of
human iris is proposed. Iris recognition is regarded as the most reliable and
accurate biometric identification system available.
Introduction
In recent past, terror of several terrorist groups and act of outlaw is been
spreading rapidly in India. Tracking those acts before it is caused or
recovering from it has become difficult to our security system. That failure is
due to lack of integrated information from different department t of India like:
passport, transport, police, defense and, income tax etc. Moreover, tracking indepth information about ever individual is effected due to over population of
our country.
In order to overcome the security problems a systems which has
integrated information of all department of India along with some Biometric
system to uniquely identify ever individual. A biometric system provides
automatic recognition of an individual based on some sort of unique feature
or characteristic possessed by the individual.
Biometric characteristics can be divided into two main classes
Physiological are related to shape of the body.
Like Fingerprints, Face recognition, Hand geometry etc.
Behavioral are related to behavior of the person.
Like Signature, Keystroke, Voice or speech
Existing System
Birth Certificate
PAN Card
While some security areas are automated with motion detector alarm
system, barcode system, smart card etc.
Smart card
Barcode ID
Biometric systems are also used for unique identification of citizen like
fingerprint recognition, face recognition, DNA testing.
Fingerprint recognition
High maintenance
Identification documents like birth certificate, PAN card, smart card or barcode
ID, it can worn out with the time or spoil due to in contact with some foreign
element like water. So need to be maintained. Moreover identification
document need to be carried along always.
Time taken
Take taken for identification with identification parade is long. Biometric
identification of DNA testing is long procedure and takes lot of time.
Faulty result
Identification parade and other identification document can also led to faulty
result in some cases. As wrong person is identified in identification parade.
Moreover, in biometric system like finger print can be identical in case of
twins.
Distributed Information
Information of individual is distributed in different department of India which
make tracking of all information difficult in short time.
Objective
They researched and documented the potential of using the iris for
identifying people and were awarded a patent in 1987.
Since then many other systems have been developed, most notable
include the systems of Wildes, Boles and Boashash, Lim and Noh.
Agus Harjoko, Sri Hartati, and Henry dwiyasa proposed method for
iris recignition using 1d coiflet wavelet.It is one of the latest method for
iris identification.
Study of Iris
The iris is a thin circular diaphragm, which lies between the cornea and
the lens of the human eye.
The iris is divided into two major regions:
The pupillary zone is the inner region whose edge forms the boundary
of the pupil.
The ciliary zone is the rest of the iris that extends to its origin at the
ciliary body.
The function of the iris is to control the amount of light entering through
the pupil, and this is done by the sphincter and the dilator muscles,
which adjust the size of the pupil.
The average diameter of the iris is 12 mm, and the pupil size can vary
from 10% to 80% of the iris diameter.
The stromal layer lies above the epithelium layer, and contains blood
vessels, pigment cells and the two iris muscles.
An outer ciliary zone and an inner pupillary zone, and these two zones
are divided by the collarette which appears as a zigzag pattern.
The iris is not to be confused with the retina, which lines the
inside of the back of the eye.
Pigmentation of the stroma takes place in the first few years. This
depends on genetics.
There is no detailed correlation between not only twins but also in the
right and left eye of an individual.
Proposed System
The system at hand can be divided into two inter-related subsystems:
Iris pattern generator and matcher system:
This part of the system deals generating and compare iris pattern
using various image processing technique.
There are various processes that are handled by this system are:
M a n a g em en t s y s te m
A d d in g a n d
E d itin g h u m a n
In fo r m a tio n
F e a tu re
E x tra c to r
S e a r c h in g a n d
r e tr ie v in g h u m a n
in fo r m a tio n
P r e -P r o c e sse d
im a g e
Ir is P a t t e r n
g en era to r
M a tch er
U ser
Management system :
This part deals with the management side of the security
system. The various processes handled by this system are:
The system user can add a new management user i.e. new admin.
The management can register and edit details of a human like
personal information, educational etc.
The system user can search and retrieve the confidential
information
System user can add new user ,both can access the information
with there unique code.
Scenarios
Login Process
Identifier and name
Login Process
Initiator
Goal
Pre-condition
System user
To access the data from system
The system is running, the user is registered and added
as admin into the system.
The user is successfully able to log in into the system
Post-condition
Authorized person can access the confidential data. If any other person
trying to access data or to do any manipulation that will be directly inform to
the authorized person. When admin wishes add, edit or do some processing
then need to login, the user supplies his credentials to the system. The system
can successfully verify the user supplied credentials. The system can
successfully allow the user to perform various admin level tasks as follow:
Initiator
Goal
Pre-condition
Post-condition
System User
The system should be accessible by more than one user.
The system is running
The admin is successfully able to add new personal
information to the system.
In order to add new person to the system. The system user (authorized
person) needs to fill up the forms like Personal Information, Contact Detail,
and Health Detail etc. in the system. The system verifies weather a person
with same or similar iris pattern exists. If it is not then system will add it and
it data will b accessible to both user
Search Process
Search Process
Admin User
The System should allow the admin to find the person
in system.
The system should be running.
The user should be successfully able to find the person
information by proving necessary credential.
When admin wish to get the information about a particular person then
admin need to provide necessary credential to get the information and
admin would b able to get all the information about the person.
Scope
The system will have a console system implementation and three-tier
architecture.
The middle layer will contain logics of iris pattern generator and
matcher and the data would be stored in external data stores which the user
that is admin can access from graphical user interface.
G r a p h ic a l
u s e r in t e r fa c e
M id d le w a r e c o n ta in in g L o g ic
D a ta sto rag e
Project feature
The project would include the following features:
Software
The software used to develop the system is as follow:
MATLAB
MATLAB is a high-level technical computing language and
interactive environment for algorithm development, data visualization,
data analysis, and numeric computation. Using the MATLAB product, you
can solve technical computing problems faster than with traditional
programming languages, such as C, C++, and FORTRAN.
Environment
The system is designed with following tools.
Environment
MATLAB
Language
Matlab
Database
Operating System
Feasibility study
When developing software, the highlighted concept is mainly the
feasibility of the system i.e. whether the system is feasible in the following
contexts:
Technical feasibility
Technical aspects were considered while the feasibility study was
conducted. Since the nation has licensed copy of all the software required for
the system as well as necessary hardware to meet the requirement of Infrared
camera of the new knowledge based security system, it can be concluded
that the system is technically feasible.
Operational feasibility
New employees are required to administer and maintain, for the same
small training program is required.
This training will include briefing of the knowledge based security
system with case and role-plays. Initially a demonstration will be allowed to
use the knowledge based security system in presence of developers. Any
problems encountered can thus be taken care of. As the users have originated
the request for a new system, acceptability is expected to be high. Hence we
can conclude that the knowledge based security system is operationally
feasible.
Financial feasibility
A financial feasibility study was carried out to know the financial
viability of the project in the terms of the amount of investment in the project
and output expected.
The study includes the cost involved at the time of development of the
project as well as the future cost in terms of maintenance of software and
other miscellaneous expenditure.
The costs involved during the development of the knowledge based security
system from the national point of view would include:
The benefits of using the potential knowledge based security system are
already described earlier, however some of them are:
It provides user friendly interface make easy to access the system and
reduce training cost.
Gantt chart
Gantt chart for eight months timeline:
Verification Phases
Requirements analysis
In the Requirements analysis phase, the requirements of the
proposed system are collected by analyzing the needs of the user(s).
This phase is concerned about establishing what the ideal system has
to perform.
The user requirements document will typically describe the
systems functional, physical, interface, performance, data, security
requirements etc as expected by the user. It is one which the business
System Design
Architecture Design
Unit Testing
Integration Testing
System Testing
System Implementation
System has been implemented in this environment:
Operating System
Environment
Application
Development
MATLAB
Presentation Tier
UI Programming using Matlab, flash & Photoshop
Middle Tier
Logic Development matlab language
Data Tier
Relational Tables in MS Access
RDBMS
CPU
RAM
Hardware
requirements
Other
Hardware
requirement
512 MB
3.00 MHz Intel Pentium III processor ( equivalent) and later
120 GB available disk space.
High end Infrared camera.
S ta rt
A cq u is itio n of
P re p ro c e s s e d
Im a g e
S e g m e n ta tio n fo r
I r is b o u n d a r y
d e f in it io n
N o r m a liz a tio n
F e atu re
e n c o d in g
C h e c k if
e x is t
YES
M a t c h i n g u s in g
H a m m in g c o d e
N O
I r is P a t t e r n s t o r e d
in t o d a t a d is k
S to p
R e s u lt