Вы находитесь на странице: 1из 8

e-ISSN: 2582-5208

International Research Journal of Modernization in Engineering Technology and Science


Volume:02/Issue:08/August-2020 Impact Factor- 5.354 www.irjmets.com

IDENTIFYING HUMANS BASED ON EYE PATTERN


Madhusudhan S *1, Ganavi M*2
*1M.Tech, Department of Computer Science and Engineering,
Jawaharlal Nehru National College Of Engineering, Shimoga, Karnataka, India.
*2Asst. Professor, Department of Computer Science and Engineering,
Jawaharlal Nehru National College Of Engineering, Shimoga, Karnataka, India.
ABSTRACT
An accurate biometric authentication system may be a critical requirement during a sort of applications.
Iris based identification has been receiving tons of attention since its introduction in 1992. The planet
these days is creating speedy progress in its quest to know the dream of a making a user friendly, client
caring atmosphere. Each new technology desires a security to the system lapse which may permit the
misuse of the system. a significant success in making an attempt to bridge the arrival of a security lapse is
that the employment of statistics. Biometric technologies like fingerprint, face recognition ,and iris
recognition square measure deployed for verification and/or identification in applications like access
management, border management, and Identification systems. The work conferred throughout this paper
developing associate degree 'open-source' iris recognition system therefore on verify each the
individuality of the human iris and additionally its performance as a biometric. The recognition theme
conferred here is a lot of reliable and correct biometric technology.
KEYWORDS: - Segmentation, Normalization , Feature Extraction, Pattern recognition.

I. INTRODUCTION
Recognition and Authentication of a person is becoming more important in recent days. In the times
where computers and electronics devices are more extensively used and therefore the population of the
planet is increasing, there's a requirement to supply high level authentication technology. Traditional
techniques like user name, passwords, keys, ID cards, token based systems aren't so useful nowadays and
not secure in many of the safety fields. In modern society raise importance of automatic and reliable
authentication process. Nowadays biometric authentication system has proved to be more reliable means
to spot the human identity. Biometric refers to a science of analyzing human physiological or behavioral
feature for security purpose and therefore the word comes from the Greek word bios which suggests , life
and metrics means, measure. The biometric features aren't possible to be faked, forged, guessed and
stolen easily. There is no got to remember these biometric functions. biometric authentication techniques
are wont to inherent physical characteristics which are unique from many of us . In behavioral biometric
voice, keystroke, gait etc., and in physiological biometrics fingerprint, face, palm print, iris, retina, ear,
DNA etc., are used for recognition. Among the physiological biometrics in physical body , iris may be a
vital part and it's uniqueness and stability. Iris recognition technology is nowadays more advantageous
within the field of data security and authentication of individual person within the areas like access to
ATM machine, controlling access to security zones, verification of passengers at airports, stations,
computer access at defense establishments, research company, database access control in distributed
systems etc.

Fig-1: Parts inside human eye

www.irjmets.com@International Research Journal of Modernization in Engineering, Technology and Science


[1267]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
Volume:02/Issue:08/August-2020 Impact Factor- 5.354 www.irjmets.com
The iris pattern contains vast quantity of distinctive options and even 2 eyes of a non-public and identical
twins conjointly possess unrelated iris patters. A frontal read of the human eye is shown in Fig. 1. the
common diameter of human iris is concerning twelve millimetre and pupil size varies from 100 percent to
eightieth of iris diameter The outwardly visible surface of the multi-layered iris usually varies in color and
seems as a zigzag pattern . The pattern of human iris remains stable throughout the whole lifetime of a
human being then it's safer to use iris features as identification metrics.
II. METHODOLOGY
The system contains number of various levels, They are:
a) Image acquisition- Capturing eye image.
b) Segmentation - Find the iris area in an digital eye image.
c) Normalization - Developing a rectangular iris image Template.
d) Feature Encoding – Extracting a unique features from Templates.
e) Pattern Matching-Both the Templates are matched using hamming distance.
The data inserted to the device are going to be an human eye image, and therefore the output are going to
be an rectangular iris template.
a) Image Acquisition
The iris image ought to have high in iris texture as a result of the feature extraction stage depends upon
the image quality. Thus, the first step is image is acquisition by using a high definition camera placed at a
distance of roughly nine cm from the user eye. For the upper result this things has to be unbroken in
mind.
1. Good resolution and high sharpness: it's important for the accurate detection of outer and clique
boundaries.
2. Good lighting condition: The system of diffused light is employed to stop spotlight effect.

Fig-2: Iris authentication system with Image acquisition


In the Fig 2 initiative is image acquisition, that's to urge individuals iris pattern. Then segmentation of
pupil takes place during which the pupil is separated from the remaining white a part of the attention
followed by the aligning the separated pupil pattern and getting the biometric pattern, called as
normalization. From the pupil pattern obtained we will extract the features, because each individual will
have different features, this is often feature extraction process. These features are later stored in
database. When there's a requirement by obtain these features from database and matching process is
completed , with this we come to a choice whether the individual is authenticated user.
b) Segmentation
The first stage of iris recognition is to isolate the actual iris region throughout a digital eye image. The iris
region, shown among the higher than figure, square measure usually approximated by 2 circles, one for
the iris/sclera boundary and another, interior to the first , for the iris/pupil border.[5][6] The favorable

www.irjmets.com@International Research Journal of Modernization in Engineering, Technology and Science


[1268]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
Volume:02/Issue:08/August-2020 Impact Factor- 5.354 www.irjmets.com
outcome of segmentation relays on the imaging quality of eye pictures. The center of pupil square
measure usually accustomed find the outer radius of iris patterns. The iris inner and outer boundaries
square measure set by finding the sting image mistreatment the smart edge detector [6].

Fig-3: Canny edge image with results of modified image using algorithm.
1. Hough Transform
Transform The Hough remodel is also a typical laptop vision rule which can be accustomed confirm the
parameters of easy geometric objects, like lines and circles, gift in an exceedingly image . The circular
Hough remodel area unit usually used to deduce the radius and centre coordinates of the pupil and iris
regions.[1][7] first off, a footing map is generated by calculative the first derivatives of intensity values in
fast fixed image then thresholding the result. . From the sting map, votes area unit forged in Hough house
for the parameters of circles passing through every edge purpose. These parameters area unit the centre
coordinates xc and yc, and the radius r, that area unit able to outline any circle in step with the equation.

Fig-4: (a) Contrast increasing image,(b)Drawing circles of different radii,(c)Separating Iris and pupil regions
c) Image Normalization
Once the iris region is metameric, succeeding stage is to normalize this half, to modify generation of the
iris code and their comparisons. Since variations among the attention, like optical size of the iris, position
of pupil among the iris, and thus the iris orientation modification person to person, it's needed to
normalize the iris image, so as that the illustration is common to all or any or any , with similar
dimensions.[8].Normalization method involves unwrapping the iris and changing it into its polar
equivalent. it's done exploitation Daugman’s Rubber sheet model. The centre of the pupil is taken under
consideration as a result of the purpose of reference and a Remapping formula is utilized to convert the
points on the philosopher scale to the polar scale.

Fig- 5: Normalization process

www.irjmets.com@International Research Journal of Modernization in Engineering, Technology and Science


[1269]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
Volume:02/Issue:08/August-2020 Impact Factor- 5.354 www.irjmets.com

(2)
Where r1 = iris radius

The radial resolution was set to a hundred and thus the angular resolution to 2400 pixels. for every pel
inside the iris, a similar position is acknowledged on polar axes.[8]The normalized image was then
interpolated into the scale of the primary image, by victimization the interp2 operate. The elements inside
the normalized image that yield a NaN, area unit divided by the total to urge a normalized worth.[8][5]

Fig-6 : Extracting rectangular Template from eye


1. Encoding

Fig-7: Normalized rectangular iris image


The final method is that the generation of the iris code. For this, the foremost discriminating feature
inside the iris pattern is extracted. The part info inside the pattern solely is used as a result of the part
angles square measure assigned notwithstanding the image distinction.[10] Amplitude info is not used
since it depends on extraneous factors. Extraction of the part info, in step with Daugman, is completed
victimization 2D Gabor wavelets. It determines that quadrant the ensuing phasor lies victimization the
wavelet:

having the value one or zero, hoping on that quadrant it lies in. a better means of mistreatment the Dennis
Gabor filter is by ending the 2D normalized pattern into sort of 1D wavelets, then these signals square
measure convolved with 1D Dennis Gabor wavelets.[8] Dennis Gabor filters square measure used to
extract localized frequency data. But, due to one or two of of its limitations, log-Gabor filters square
measure a lot of wide used for cryptography natural pictures. it had been recommended by Field, that the
log filters (which use Gaussian transfer functions viewed on a power scale) will code natural pictures
higher than Dennis Gabor filters (viewed on a linear scale). Statistics of natural pictures indicate the
presence of high-frequency elements.[1][8] Since the quality Dennis Gabor filters under-represent high
frequency elements, the logfilters become a much better selection. LogGabor filters square measure made
mistreatment.

www.irjmets.com@International Research Journal of Modernization in Engineering, Technology and Science


[1270]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
Volume:02/Issue:08/August-2020 Impact Factor- 5.354 www.irjmets.com

d) Features Encoding
The options in normalized iris pattern ar encoded mistreatment 1D Log-Gabor Wavelets. ab initio second
iris patterns are stormy into 1D signals that they are convoluted with the output response of 1D Log-
Gabor Wavelets. To avoid reedy output of filters, intensity values at familiar noise space of normalized iris
pattern are replaced by the quality of close pixels. The output of Wavelets filters is quantity into four part
levels mistreatment Daugman methodology [4]. every totally different part is leveled by 2 binary range
following gray code therefore as that only 1 bit changes between 2 consecutive phases. The frequency
response of a Log-Gabor filter is given as wherever center frequency is ƒO, and o represents the
information measure of the filter.

e) Pattern Matching
We use the playing distance metric to match the IRIS image with the info The feature vectors live
compared using a similarity measure that matching algorithms are used. Let I1 and I2 be the two iris
codes to be compared, and M1 and M2 be their various masks. The playing distance (HD) is calculated:

where, the XOR operator, Ä, detects the disagreement between the corresponding bits at intervals the iris
codes, the AND operator I ensures that the acting distance is calculated exploitation solely the bits
generated from truth iris region and so the operator × computes the norm of the bit vector. Ideally, the
acting distance between 2 pictures of the same iris are about to be zero corresponds to real score that
between 2 pictures of assorted irises are about to be zero.5 that is cheat score. For matching, the acting
distance was chosen as a metric for recognition, since bitwise comparisons were necessary. The acting
distance algorithmic program used additionally incorporates noise masking, so as that solely important
bits are utilized in conniving the acting distance between 2 iris templates. currently once taking the acting
distance, solely those bits within the iris pattern that corresponds to ‘0’ bits in noise masks of each iris
patterns are about to be utilized within the calculation. The acting distance are about to be calculated
exploitation solely the bits generated from truth iris region, and this changed acting distance formula is
given as,

where, Xj and Yj are the two bit-wise templates to match , Xnj and Ynj are the corresponding noise masks
for Xj and Yj, and N is that the quantity of bits portrayed by every model. Although, in theory, 2 iris
templates generated from identical iris can have a playacting distance of zero.0, in observe this might not
occur. social control is not good, and conjointly there will be some noise that goes undiscovered, thus
some variation are reaching to be gift once scrutiny 2 intra-class iris templates. In order to account for
motion inconsistencies, once the playacting distance of 2 templates is calculated, one model is shifted left
and right bit-wise and type of playacting distance values are calculated from sequential shifts. This
bitwise shifting among the horizontal direction corresponds to rotation of the primary iris region by

www.irjmets.com@International Research Journal of Modernization in Engineering, Technology and Science


[1271]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
Volume:02/Issue:08/August-2020 Impact Factor- 5.354 www.irjmets.com
associate angle given by the angular resolution used. From the calculated playacting distance values,
solely the lowest is taken, since this corresponds to the best match between 2 templates. the quantity of
bits captive throughout every shift is given by doubly the quantity of filters used, since every filter can
generate 2 bits of knowledge from one picture element of the normalized region.
III. APPLICATIONS
As the pattern of irises square measure complicated and virtually not possible to spoof it's been
mistreatment within the most sensitive sectors for correct identification of the applying of iris biometric
identification already enforced within the below verticals:
a) National Identity Card
Iris’s unique features helps to give entire nation a unique identity card to identify their citizens.
b) National Border Security
Implementing iris biometric authentication in national border areas helps the nation to increase security
near boarder regions.
c) Airport Security
Iris helps to create a unique password as there is a large scarcity in generating a alpha numeric password
for all and also to check the identity of the person entering the airport.
IV. RESULTS AND DISCUSSION
In the paper by using canny edge and Hough transform algorithms to get the desired iris region. After
that by applying the Daugman’s algorithm to convert the circular region into rectangular block. The
extracted template’s are used to match the temples which are already stored in the database. If the image
was found then the recognition system was a success otherwise back propagation would start training the
network again.

Fig-8 : Loading First Eye image.

Fig-9: Loading Second Eye image.

www.irjmets.com@International Research Journal of Modernization in Engineering, Technology and Science


[1272]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
Volume:02/Issue:08/August-2020 Impact Factor- 5.354 www.irjmets.com

Fig-10 : Matched iris.

Fig-11 : Dis-matched iris images


V. CONCLUSION
This paper present’s the complete iris recognition system consists of an automatic segmentation system
supported the Hough remodel, and is during a position to localize the circular iris and pupil region,
occluding eyelids and eyelashes, and reflections. The extracted iris region is then normalized into an
rectangular block with constant dimensions to account for imaging inconsistencies. The acting distance is
employed for examination the input iris guide with the info keep guide .The system bestowed throughout
this paper is during a position to perform accurately, but there square measure still sort of problems that
need to be self-addressed. 1st of all, the machine-driven segmentation wasn't excellent, since it could not
with success phase the iris regions for all of the eye pictures among the 2 databases. therefore on enhance
the machine-driven segmentation algorithmic program, a a lot of elaborate palpebra and lash detection
system could be enforced.
VI. REFERENCES
[1] J. G. Daugman: High confidence visual recognition of persons by a test of statistical independence.
IEEE Transactions on Pattern Analysis and Machine Intelligence Vol. 15 (1993) 1148–1161
[2] W.W. Boles, B. Boashah: A Human Identification Technique Using Images of the Iris and Wavelet
Transform. IEEE Transaction on Signal Processing Vol. 46 (1998) 1185-1188
[3] T. Chuan Chen, K. Liang Chung: An Efficient Randomized Algorithm for Detecting Circles. Computer
Vision and Image Understanding Vol. 83 (2001) 172-191
[4] T. Chuan Chen, K. Liang Chung: An Efficient Randomized Algorithm for Detecting Circles. Computer
Vision and Image Understanding Vol. 83 (2001) 172-191

www.irjmets.com@International Research Journal of Modernization in Engineering, Technology and Science


[1273]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
Volume:02/Issue:08/August-2020 Impact Factor- 5.354 www.irjmets.com
[5] Peter Kovesi, Matlab functions for Computer Vision and Image Processing. What are Log-Gabor
filters ?
[6] xpertsolutions.fortunecity.es/Technology/Biometrics/Xp recEng.htm
[7] L. Flom and A. Safir: Iris Recognition System. U.S
[8] E. R. Davies: Machine Vision. 3rd (2005)
[9] J. Canny: A Computational Approach to Edge Detection. IEEE Transaction on Pattern Analysis and
Machine Intelligence Vol. 8 (1986) 679-714
[10] Sowmya.B and Sreedevi.S.L, "Iris Recognition System for Biometric Identification," in International
Journal of Emerging Trends & Technology in Computer Science , 2013.
[11] Chinese Academy of Science - Institute of Automation (CASIA). Database of the Eye Grayscale
Images.
[12] K. Miyazawa, K. Ito, T. Aoki, K. Kobayashi and H. Nakajima, "A Phase-Based Iris Recognition
Algorithm," Springer-Verlag, pp. 356-365, 2005..

www.irjmets.com@International Research Journal of Modernization in Engineering, Technology and Science


[1274]

Вам также может понравиться