Human Identification System Based On Iris Scan
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Biometrics includes various technologies for uniquely identifying an individual person in accordance with an examination of particular attributes of either the person’s interior or exterior eye. The technologies have made biometric systems more accurate, convenient, and secure than the widely referred means of identification such as ID cards. In this paper, identification and verification approach based on human iris pattern is represented. The system is based on several steps from capturing the iris pattern, determining and localizing the iris boundaries, transformation of localized iris into rectangular and polar components, extracting the features from image based on wavelet transformation and at the end matching of the iris based on the calculating the Hamming codes of different irises. Publically available iris image database namely CASIA version 1.0 is used, instead of capturing CCD camera. In preprocessing region of interest (RIO) radius of pupil and center of pupil is calculated using scanning method, normalization of iris image is done using Daugman’s rubber sheet model. Performance evaluation parameters, computation time, humming distance variation, False Acceptance Rate (FAR) , False Rejection Rate (FRR) are calculated through various fundamental and graphical performance measures.
Authors and Affiliations
Varsharani M. Sultanpure, Prof. S. D. Mali
Decision Tree Classifier for Classification of Phishing Website with Info Gain Feature Selection
Security of the information is very challenging task for every organizations and institute due to increasing demand of information and communication technology. Phishing attack is one of the important issues to access t...
Energy-Aware Load Balancing and Application Scaling For the Cloud Ecosystem
To introduce an energy-aware operation model used for load balancing and application scaling on a cloud. The basic philosophy of our approach is defining an energy-optimal operation regime and attempting to maximize the...
An Overview of Intrusion Detection System
With invent of new technologies and devices, Intrusion has become a major concern in businness sector as well as in research area. By monitoring the computer system and networks resources intrusion detection identify an...
Development and Investigation of Mechanical Behaviour of Bamboo Based Fiber Composites
The modern dynamic world can’t imagine its development without bringing the concept of advancement in material composite. Various researches are going on in this field to achieve the desired standard. Natural fiber rein...
Analysis of Efficient Adiabatic Logic Circuits and Their Power Extraction in Finfet (10nm) and Comparison With 90nm and 45nm
This paper describes the design style and analysis of low power adiabatic logic circuits based on ECRL (Efficient Charge Recovery Logic Circuits), PFAL(Positive Feedback Adiabatic Logic) and SCRL(Split Charge Recovery L...