A Novel Approach for Iris Recognition
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
The iris has been proposed as a reliable means of biometric identification. The importance of the iris as a unique identifier is predicated on the assumption that the iris is stable throughout a person’s life. Also, the need for security systems going up, Iris recognition is emerging as one of the important methods of biometrics-based identification systems. Iris biometry has been proposed as a sound measure of personal identification. Iris biometry has been proposed as a sound measure of personal identification. This project basically explains comparison of the purposed algorithm with the existing algorithms for Iris recognition. In proposed method, image preprocessing is performed using Daugman’s Integro-differential operator. The extracted iris part is then normalized using Daugman’s rubber sheet model followed by extracting the iris portion of the eye image using Haar transform. Finally two Iris Codes are compared to find the Hamming Distance which is a fractional measure of the dissimilarity. The results obtained with this algorithm are of highest accuracy whereas the false acceptance ratio (FAR) and false rejection ratio (FRR) are lowest compared to existing algorithms.
Authors and Affiliations
Manisha M. Khaladkar , Sanjay R. Ganorkar
XML Query Answering using Tree based Association Rules
Mainly two approaches are used to access XML document: keyword-based search and query-answering. The first one comes from the tradition of information retrieval. Where most searches are performed on the textual con...
FPGA IMPLEMENTATION OF FOUR PHASE CODE DESIGN USING MODIFIED GENETIC ALGORITHM (MGA)
The proposed architecture consists of an efficient VLSI hardware implementation of the Modified Genetic Algorithm for identifying the good pulse compression sequences based on Discrimination Factor. The main advantag...
Intrusion Detection and Classification Using Improved ID3 Algorithm of Data Mining
Intrusion detection technology exists a lot of problems, such as low performance, low intelligent level, high false alarm rate, high false negative rate and so on. There is a need to develop some robust decision tr...
A Survey of Performance based Secure Routing Protocols in MANET
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a...
Improving the Efficiency of Ranked keyword Search over Cloud Data
In this paper we define and solve the effective yet secure ranked keyword search over encrypted cloud data. We used order preserving symmetric encryption to protect the cloud data. Even though there are lots of searching...