Study and Development of Iris Segmentation and Normalisation Techniques
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
There have been several implementations of security systems using biometric, especially for identification and verification cases. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). In other words, bio means living creature and metrics means the ability to measure an object quantitatively. An example of pattern used in biometric is the iris pattern in human eye. The iris pattern has been proved unique for each person. The iris recognition system consists of an automatic segmentation system that is based on the Hough transform, and is able to localize the circular iris and pupil region, occluding eyelids and eyelashes, and reflections. The extracted iris region was then normalized into a rectangular block with constant dimensions to account for imaging inconsistencies. Finally, the phase data from 1D Log-Gabor filters were extracted and quantized to four levels to encode the unique pattern of the iris into a bit-wise biometric template using Daugman’s rubber-sheet model. The Hamming distance was employed for classification of iris templates, and two templates were found to match if a test of statistical independence was failed.
Authors and Affiliations
Anshu Parasha , Yogita Gulati,
Decisive Load-Acquainted Routing Strategy For Wireless Mesh Networks
This paper introducing a load-acquainted routing strategy for wireless mesh networks (WMNs). In a WMN, the transfer load tends to be haphazardly disseminated over the network. In this circumstance, the load-acquain...
BER AND SIMULATION OF OFDM MODULATOR AND DEMODULATOR FOR WIRELESS BROADBAND APPLICATIONS
With the rapid growth of digital wireless communication in recent years, the need for high speed mobile data transmission has increased. New modulation techniques are being implemented to keep up with the desired more...
Implementation of MKD-WebServer Rating Application for Analysis of Web performance through SSL
In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (SET). SSL is a deceptively simple technology...
Memory Learning Framework for Retrieval of Neural Objects
Most current content-based image retrieval systems are still incapable of providing users with their desired results. The major difficulty lies in the gap between low-level image features and high-level image seman...
PIC CONTROLLER BASED PROCESS CONTROL SYSTEM USING GSM
: Devices with microcontroller are widely used in industrial field. We use network interface for connecting more than one device for parallel control. Here we present a design of PIC controller based embedded RS 48...