Novel Iris Recognition Techniques using Energy Compaction and Partial Energies of Transformed Iris Images with Cosine-Kekre and CosineHartley Hybrid Wavelet Transforms
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
The paper presents novel Iris Recognition technique using Energy Compaction and Partial Energies of transformed iris images with the Hybrid wavelet transform namely ‘Cosine-Kekre’ and ‘Cosine-Hartley’ Hybrid wavelet transform. These two Hybrid wavelet transforms are applied on the iris images to obtain transformed iris images from which the feature vectors are generated in five different ways. The feature vector with 100% energy considers all of the coefficients of the transformed iris images to generate the feature vector so the size of feature vector is very large, in Energy compaction based feature vectors only the coefficients that hold 99%, 98%, 97% and 96% of energy are considered. Use of Partial energy reduces the feature vector size to a great extent and also it leads to lesser number of computations. The results tested using generic iris image database consisting 384 iris images have shown performance improvement in partial energy percentages with reduced feature vector size as indicated by higher Genuine Acceptance ratios as compared to 100% energy consideration.
Authors and Affiliations
Dr. Sudeep Thepade, Pushpa R. Mandal
Modified Histogram Based Contrast Enhancement Using Unsharp masking Filter For Medical Images
Low contrast digital images analysis is major drawback in the medical image processing. An image with low contrast has a narrow histogram located typically toward the middle of the intensity scale. Low contrast digit...
Enhancing qos of manet by deploying omni directional antenna for ieee 802.11 networks
MANET stands for Mobile Ad Hoc Networks that used in the area of Wireless Networking. In the MANET each node communicates with the other node temporarily and stops all the communication when all the data transfers do...
Storage Correctness and Dynamic Data Support for Cloud Data
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Cloud storage is a model with virtualized pools of storage which is genera...
Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...
Wireless Mesh Network Deployed in Disaster Area using Gateway Selection
As known from the history, communication services turns out to be exceedinglyimperative after calamity strike. Wireless Mesh network (WMN) serves as a cost effective technology that yield backbone infrastructure to p...