Iris recognition based on subspace analysis
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 10
Abstract
Biometrics deals with the uniqueness of an individual arising from their physiological or behavioral characteristics for the purpose of personal identification. Among many biometrics techniques, iris recognition is one of the most promising approache. This paper presents traditional subspace analysis method for iris recognition. Initially the eye images have been localized in circular form by using Daugman’s grid method and circular Hough transform method. The algorithms for subspace analysis methods namely PCA and LDA are implemented and experimental results are reported. The comparative performance for both the algorithms has been observed in term of recognition rate. The comprehensive experiments completed on UPOL and CASIA V1 iris databases.
Authors and Affiliations
Pravin S. Patil
Estimation of Solar Radiation at a Particular Place: Comparative study between Soft Computing and Statistical Approach
This study focuses on the development of connectionist model such as neural network based method to efficiently predict solar radiation of a particular place. Here a comparative study is given between a conventional appr...
Cloud Computing: Securing Client Data Storage
Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with...
Architecture design of a virtualized embedded system
Nowadays, embedded systems have become a major driver of technological developments particularly in the industrial sector. In an embedded system, the hardware and software components are so intertwined that evolution is...
Global Chaos Synchronization of the Hyperchaotic Qi Systems by Sliding Mode Control
This paper investigates the problem of global chaos synchronization of identical hyperchaotic Qi systems (2008) by sliding mode control. The stability results derived in this paper for the synchronization of identical hy...
Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools
E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing...