Efficient Iris Pattern Recognition Method by using Adaptive Hamming Distance and 1D Log-Gabor Filter
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Iris recognition is one of the highly reliable security methods as compared to the other bio-metric security techniques. The iris is an internal organ whose texture is randomly de-termined during embryonic gestation and is amenable with a computerized machine vision system for the remote examination. Previously, researchers utilized different approaches like Ham-ming Distance in their iris recognition algorithms. In this paper, we propose a new method to improve the performance of the iris recognition matching system. Firstly, 1D Log-Gabor Filter is used to encode the unique features of iris into the binary template. The efficiency of the algorithm can be increased by taking into account the coincidence fragile bit’s location with 1D Log-Gabor filter. Secondly, Adaptive Hamming Distance is used to examine the affinity of two templates. The main steps of proposed iris recognition algorithm are segmentation by using the Hough’s circular transformation method, normalization by Daugman’s rubber sheet model that provides a high percentage of accuracy, feature encoding and matching. Simulation studies are made to test the validity of the proposed algorithm. The results obtained ensure the superior performance of our algo-rithm against several state-of-the-art iris matching algorithms. Experiments are performed on the CASIA V1.0 iris database, the success of the proposed method with a genuine acceptance rate is 99.92%.
Authors and Affiliations
Rachida Tobji, Wu Di, Naeem Ayoub, Samia Haouassi
Appraising Research Direction & Effectiveness of Existing Clustering Algorithm for Medical Data
The applicability and effectiveness of clustering algorithms had unquestioningly benefitted solving various sectors of real-time problems. However, with the changing time, there is a significant change in forms of the da...
A Comparative Study of various Secure Routing Protocols based on AODV
The paper surveyed and compared various secure routing protocols for the mobile ad hoc networks (MANETs). MANETs are vulnerable to various security threats because of its dynamic topology and selfconfigurable nature. Sec...
Empirical Study of Segment Particle Swarm Optimization and Particle Swarm Optimization Algorithms
In this paper, the performance of segment particle swarm optimization (Se-PSO) algorithm was compared with that of original particle swarm optimization (PSO) algorithm. Four different benchmark functions of Sphere, Rosen...
E-learning in Higher Educational Institutions in Kuwait: Experiences and Challenges
E-learning as an organizational activity started in the developed countries, and as such, the adoption models and experiences in the developed countries are taken as a benchmark in the literature. This paper investigated...
Semantic Feature Based Arabic Opinion Mining Using Ontology
with the increase of opinionated reviews on the web, automatically analyzing and extracting knowledge from those reviews is very important. However, it is a challenging task to be done manually. Opinion mining is a text...