SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Int. J. on Recent Trends in Engineering and Technology, Vol. 10, No. 1, Jan 2014

Enhancing Security and Privacy Issue in Airport by
Biometric based Iris Recognition System using Matlab
Syed Jaffar Abbas1 , Raju Manjhi 2 and Amrita Priyam3
Department of Computer Application, Ranchi University , Ranchi , India1, 2
Department of Computer Science and Engineering, BIT , Ranchi , India3
sjaranchi@gmail.com, raj98355_kumar@rediff.com, amrita.priyam@gmail.com
Abstract— Few years ago a self service has been predominant way of passenger at airport.
For the passenger that is a very enjoyable and comfort situation because it keeps control
over all process during their complete journey. For airport and for airlines is also very
interesting evolution because self service allows increasing capacity of airport without any
significant extra investment. However success of self service induces one potential risk. That
is of lack of human contact between airline operator and passenger, there is a problem in
identifying a passenger. This is definitely the problem for immigrations forcibly. This
potential risk of the industry is needed to be addressed and biometrics definitely can solve
this kind of problem. Nowadays biometric is considered to be the most important and
reliable method for personal identification. Iris recognition is considered as most personal
identification.
Index Terms— Iris recognition methods, Template matching, Best Match search method,
Manhattan distance

I. LITERATURE REVIEW
A. Introduction
Iris is a complex pattern which consists of many distinctive features. Each iris is unique and even twins have
different iris. Furthermore, iris is more easily imaged than retina; it is very difficult task to tamper iris texture
information and it is also possible to detect artificial iris. Although early iris based identification systems
required considerable user participation and were expensive, efforts are underway to build more user-friendly
and cost-effective versions. To obtain a good image of iris, identification systems, typically illuminate iris
with near-infrared light, which can be observed by most cameras and is not detectable by humans. The
results are more accurate for iris-based identification. Due to this advantage and it is common to consider iris
is one of the best biometric traits. the above described characteristics, it is common to consider iris as one of
the best biometric traits.
Properties of an iris as an identifier
Highly protected Internal organ of the eye.
Externally visible from distance up to some meters.
Random pattern of great complexity and uniqueness..
Pattern is not genetically defined
B. Template matching[2]
The match metrics use a difference equation with general form:
DOI: 01.IJRTET.10.1.519
© Association of Computer Electronics and Electrical Engineers, 2014
Dn(x,y) = (
xi yi p) /
denotes the metric space ( Rn,dp) for Rn n>1
Where Rn denotes the n number of Region
dp denotes the difference of the match metrics.
P denotes the pixel of images.
Sums of absolute difference (SAD) [1] : This metrics sum the absolute value of the difference between
pixels in the originals image and the corresponding pixels in the template image. The metric is the ll norm of
the difference image. The lowest SAD stores estimates the best position of template within the search image
The general SAD distance metric becomes:
d1(Ij,T) =
Ii, j Ti
Where T denotes pixels in the Template image.
I1 denotes the pixel in the original image.
C. Best Match Search Method
Best Match Search Method [2] :This method to find the best match location for the output parameter. This
option appears when we select Best match location for the output parameter .Select search method i.e
Exhaustive output N X N matrics of metrics values around best match. This option appears when selected
now Best match location for the output parameter. Select the checkbox (which is a particular pixel is
selected) to output a metrics values centered around the best match. While doing this block adds the
Nmetric(Numeric metric) and Nvalid (Neighborhood metric). The region of interest(ROI) appears when Best
match location for the output parameter is selected. The check box for the template matching block is
selected for the region of interest processing . When this is done the block adds the Region of Interest (ROI)
input port to the template matching block. The ROI processing option is only available for the best match
index mode. The output of the metric port for the match metric mode is of the valid image size . The ROI
port requires a four element vector that defines a rectangular area must have the format [x, y, width, height].
The first two element represent [x,y] co-ordinates for the upper left corner of the region . The second two
elements represents the width and height of the region. The search starts with a step size equal to or slightly
greater than half of the maximum search range and then employs the following steps:
The block compares search points in each method. There is a central point and other search points
located on the search area boundary.
The block decrements the step sign of one pixel.
At each new steps, the block moves the search center to the best matching point resulting from the
previous step.
D. Manhattan Distance metric[3]
Manhattan distance metric[3] is the difference between pixels in the original image and the corresponding
pixels in the template image. The metric is the norm of the difference image. The lowest Manhattan
distance store estimates the best position of template within the search image. The general Manhattan
distance metric becomes:
d1(Ij,T) =
Ii, j Ti
Where T denotes the pixels in the template image
Ij denotes the pixel in the original image
II. RELATED W ORK
A. Introduction
In this paper we have developed an algorithm to identify person in airport to stop terrorist activities , Bomb
blast and others. When the passenger will enter the airport of the camera will capture the if eye is considered.
Passenger with the top of that there is simplicity. The entire passenger just needs to do that Just steps into that
place where camera is placed. Look at the camera and we are actually reverting the traditional process where
the person had to stand in front of camera take instruction like move back a little , move forward please look
at the camera and please try again. Now it is very simple you just walk in stop you look and look and walk
out. The third element is speed, the identifying a person in airport this system take nearly only 2 seconds that
speed of human verification.

154
B. Iris Recognition Methods
The iris is an visible protected organ which provides uniqueness pattern throughout the life. It is very
attractive biometrics system for identifying individuals specially in the case of twins. In the Iris recognition
system , their eye is first captured and then a template is created for their iris area. This template when
compared with the other template stored in the database until a matching is found and the person is identified
or no match is found then the person is not identified. It is the most protected biometric technology
compared with other biometric technologies such as face and finger recognition. In this method, captured
image first converted into segmented image and segmented image is then converted into normalized image
and finally normalized image is then converted into Binary signatures. Algorithm for the Iris recognition
system is mentioned below in Fig.1

Fig.1. A major Stages of Iris recognition method

Fig.2. Segmented Image

155
Fig.3. Normalized Image

Fig 4. Binary Image

Fig . 5. Binary Signature in 2D Matrix

Fig 6 : Identification of person from the template block using Iris recognition method

Explanation of Fig :
In Fig.2 we load the original image. We can perform arithmetic operations on integer data, which enables you
to convert image types without first converting the numeric class of the image data. To display the image,
use a grayscale color map with 256 values. Fig.3 is the normalized image which represents the iris using a
fixed parameter interval . In a binary image, each pixel assumes one of only two discrete values: 1 or 0. A
binary image is stored as a logical array. By convention, this documentation uses the variable name BW to
refer to binary images. The Fig.4 shows a binary image with a close-up view of some of the pixel values.
Binary images contain only 0's and 1's. Pixels with the value 0 are displayed as black; pixels with the value 1

156
are displayed as white. Fig.5 is the Binary signature of the 2D matrix which is equivalent to Binary image.
Fig.6 identify the person enrolled in the template block.
C. Algorithms : Iris recognition algorithms [4]
Step 1 : Capture the Image
Step 2 : Display the capture Image
Step 3 : Calculate the monochrome luminance by combining the RGB values according to the a NTSC
standard which applies co – efficient related to the eye`s sensitivity to RGB color
Step 4 : Convert Image to Binary Image based on threshold. The output image(level) replaces all pixels in
the input image with luminance greater than with the value 1 ( white) and replaces all other pixels with the
value 0 (Black).
Step 5 : Global Image threshold using Otsu`s method Level = graythresh(I) computes a global
threshold(level) that can be used to convert an intensity image to a binary image with im2bw . Level is a
normalized intensity value that lies in the range [0,1].The graythresh function uses otsu’s method , which
choose s the threshold to minimize the intraclass variance of the black and white pixels
Step 6 : Stored the converted Binary no of the captured Image into N x N matrix and compared with the
image stored in the database.
D. Program code[5]
rgb_img = imread(‘C:UsersDCDesktopimages.jpg’);
image(r)
axis image ;
I= 0.2989 *rgb_img(:,:,1) …
+ 0.5870 * rgb_img(:,:,2) …
+ 0.1140 * rgb_img(:,:,3);
I= imread(‘C:UsersDCDesktopimages.jpg’);
level = graythresh(I);
BW = im2bw(I, level);
imshow(BW)
III. RESULT [6]
Here is the example of how to calculate the manhattan distance between two iris codes. It sum the absolute
value of the difference between pixels in the original image and the corresponding pixels in the template
image. The metric is the l l norm of the difference image. The lowest SAD store estimates the best position of
template within the search image. To simulate the effect of uncertainty. the threshold is fixed to 0.141
Iris1:
1100010101100011100
Iris2:
1000101100011010101
Manhattan distance of above two iris code Iris 1 and Iris 2 is
MD
:
0.1235
Iris3:
10010011011011 0001
Iris 4: 1 1 1 0 1 1 0 0 1 0 0 1 0 0 01 0 0
Manhattan distance of above two iris code Iris 3 and Iris 4 is
MD
:
0.235
Identification: It is 1:M comparison of the captured image against a biometric database in attempt to identify
an unknown individual. The identification only succeeds in identifying the individual if the comparison of the
iris sample with a template in the database falls within a previously set threshold. As verification mode, in
identification decision context there are two possible outcomes normally called like verification :False Acceptance Rate: Occurs when the system says that an unknown sample matches a particular person in
the Template and the match is not correct.
that an impostor‘s iris sample matches an enrolled sample.The proportion of attempts whose MD is below a
given threshold. From Iris1 and Iris 2 , the MD = 0.1235 which is less than a given threshold (0.141) as
shown in below Table 1.

157
False Rejection Rate: Occurs when the system says that the sample does not match any of the entries in the
Template, but the sample in fact does belong to someone in the gallery. The proportion of authentic attempts
whose MD exceeds a given threshold. The rate at which a matching algorithm incorrectly fails to determine
that a genuine sample matches an enrolled sample. From Iris 3 and Iris 4, the MD=0.235 which exceeds a
given threshold(0.141) as shown in below Table I.
TABLE I. T OTAL SUCCESS RATE
MD
Threshold
0.141

False Acceptance Rate

False Rejection Rate

Total Success rate

10%

0%

80%

0.141

0%

20%

70%

Considering there two iris values it is observed that is the first case the total success rate is 80% on in the
second case it is 70%.
IV. CONCLUSION
In this paper we have developed an algorithm to identify person in airport to stop terrorist activities , Bomb
blast and others. It’s very simple passenger will walk into the catering space of the camera . Camera will
detect the face will look at the eyes will focus into the eyes then can saw the pictures of your iris coveted to
the court.This system has three key elements: Accurate, it really allows identifying to very high degree of
security every individual passenger with the top of that there is simplicity. We have used Template matching
,Best match search method and manhattan distance for matching the individual identity.
REFERENCE
[1] Koga T, el.al. motion compensated interference Coding for video conferencing. In national Telecommunications
conference ,New Orlean, LA, Nov. 1981,G5.3.1 1-5.
[2] Zakai M.”General distance criteria” IEEE Transaction on Information theory , pp,94-95 January, 1964.
[3] Yu , J.J. Amores ,N. Sebe, Q. Tian , 4 A new study on Distance metrices as semilians by measurement IEEE
International conferences on multimedia and Expo , 2006
[4] Otsa ,N,” A Threes hold selection method from Gray-level Histograms ” IEEE transactions on system, man , and
Cybermetics , vol,9 , No 1,1979, page No. 62-66
[5] Sanderson S., Erbetta J.( 2000) IEE Colloquium on Visual Biometrics.
[6]
-based personal authentication using a normalized directional energy
feature, Proc. 4th Int. Conf. Audio- and Video-Based Biometric Person Authentication, pp. 224–232, Jun. 2003.

158

Mais conteúdo relacionado

Mais procurados

Mais procurados (18)

Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
 
Ex4301908912
Ex4301908912Ex4301908912
Ex4301908912
 
EDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesEDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing Performances
 
Ed34785790
Ed34785790Ed34785790
Ed34785790
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
 
Vision based human computer interface using colour detection
Vision based human computer interface using colour detectionVision based human computer interface using colour detection
Vision based human computer interface using colour detection
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency Recognition
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median Filter
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
winter project
winter projectwinter project
winter project
 

Semelhante a Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recognition System using Matlab

Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
IJRAT
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...
sipij
 

Semelhante a Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recognition System using Matlab (20)

IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
Image processing
Image processingImage processing
Image processing
 
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
 
Automatic Vehicle Detection Using Pixelwise Classification Approach
Automatic Vehicle Detection Using Pixelwise Classification ApproachAutomatic Vehicle Detection Using Pixelwise Classification Approach
Automatic Vehicle Detection Using Pixelwise Classification Approach
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android App
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
Intelligent Parking Space Detection System Based on Image Segmentation
Intelligent Parking Space Detection System Based on Image SegmentationIntelligent Parking Space Detection System Based on Image Segmentation
Intelligent Parking Space Detection System Based on Image Segmentation
 
Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...
 
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
C010111519
C010111519C010111519
C010111519
 

Mais de idescitation

65 113-121
65 113-12165 113-121
65 113-121
idescitation
 
74 136-143
74 136-14374 136-143
74 136-143
idescitation
 
84 11-21
84 11-2184 11-21
84 11-21
idescitation
 
29 88-96
29 88-9629 88-96
29 88-96
idescitation
 

Mais de idescitation (20)

65 113-121
65 113-12165 113-121
65 113-121
 
69 122-128
69 122-12869 122-128
69 122-128
 
71 338-347
71 338-34771 338-347
71 338-347
 
72 129-135
72 129-13572 129-135
72 129-135
 
74 136-143
74 136-14374 136-143
74 136-143
 
80 152-157
80 152-15780 152-157
80 152-157
 
82 348-355
82 348-35582 348-355
82 348-355
 
84 11-21
84 11-2184 11-21
84 11-21
 
62 328-337
62 328-33762 328-337
62 328-337
 
46 102-112
46 102-11246 102-112
46 102-112
 
47 292-298
47 292-29847 292-298
47 292-298
 
49 299-305
49 299-30549 299-305
49 299-305
 
57 306-311
57 306-31157 306-311
57 306-311
 
60 312-318
60 312-31860 312-318
60 312-318
 
5 1-10
5 1-105 1-10
5 1-10
 
11 69-81
11 69-8111 69-81
11 69-81
 
14 284-291
14 284-29114 284-291
14 284-291
 
15 82-87
15 82-8715 82-87
15 82-87
 
29 88-96
29 88-9629 88-96
29 88-96
 
43 97-101
43 97-10143 97-101
43 97-101
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 

Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recognition System using Matlab

  • 1. Int. J. on Recent Trends in Engineering and Technology, Vol. 10, No. 1, Jan 2014 Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recognition System using Matlab Syed Jaffar Abbas1 , Raju Manjhi 2 and Amrita Priyam3 Department of Computer Application, Ranchi University , Ranchi , India1, 2 Department of Computer Science and Engineering, BIT , Ranchi , India3 sjaranchi@gmail.com, raj98355_kumar@rediff.com, amrita.priyam@gmail.com Abstract— Few years ago a self service has been predominant way of passenger at airport. For the passenger that is a very enjoyable and comfort situation because it keeps control over all process during their complete journey. For airport and for airlines is also very interesting evolution because self service allows increasing capacity of airport without any significant extra investment. However success of self service induces one potential risk. That is of lack of human contact between airline operator and passenger, there is a problem in identifying a passenger. This is definitely the problem for immigrations forcibly. This potential risk of the industry is needed to be addressed and biometrics definitely can solve this kind of problem. Nowadays biometric is considered to be the most important and reliable method for personal identification. Iris recognition is considered as most personal identification. Index Terms— Iris recognition methods, Template matching, Best Match search method, Manhattan distance I. LITERATURE REVIEW A. Introduction Iris is a complex pattern which consists of many distinctive features. Each iris is unique and even twins have different iris. Furthermore, iris is more easily imaged than retina; it is very difficult task to tamper iris texture information and it is also possible to detect artificial iris. Although early iris based identification systems required considerable user participation and were expensive, efforts are underway to build more user-friendly and cost-effective versions. To obtain a good image of iris, identification systems, typically illuminate iris with near-infrared light, which can be observed by most cameras and is not detectable by humans. The results are more accurate for iris-based identification. Due to this advantage and it is common to consider iris is one of the best biometric traits. the above described characteristics, it is common to consider iris as one of the best biometric traits. Properties of an iris as an identifier Highly protected Internal organ of the eye. Externally visible from distance up to some meters. Random pattern of great complexity and uniqueness.. Pattern is not genetically defined B. Template matching[2] The match metrics use a difference equation with general form: DOI: 01.IJRTET.10.1.519 © Association of Computer Electronics and Electrical Engineers, 2014
  • 2. Dn(x,y) = ( xi yi p) / denotes the metric space ( Rn,dp) for Rn n>1 Where Rn denotes the n number of Region dp denotes the difference of the match metrics. P denotes the pixel of images. Sums of absolute difference (SAD) [1] : This metrics sum the absolute value of the difference between pixels in the originals image and the corresponding pixels in the template image. The metric is the ll norm of the difference image. The lowest SAD stores estimates the best position of template within the search image The general SAD distance metric becomes: d1(Ij,T) = Ii, j Ti Where T denotes pixels in the Template image. I1 denotes the pixel in the original image. C. Best Match Search Method Best Match Search Method [2] :This method to find the best match location for the output parameter. This option appears when we select Best match location for the output parameter .Select search method i.e Exhaustive output N X N matrics of metrics values around best match. This option appears when selected now Best match location for the output parameter. Select the checkbox (which is a particular pixel is selected) to output a metrics values centered around the best match. While doing this block adds the Nmetric(Numeric metric) and Nvalid (Neighborhood metric). The region of interest(ROI) appears when Best match location for the output parameter is selected. The check box for the template matching block is selected for the region of interest processing . When this is done the block adds the Region of Interest (ROI) input port to the template matching block. The ROI processing option is only available for the best match index mode. The output of the metric port for the match metric mode is of the valid image size . The ROI port requires a four element vector that defines a rectangular area must have the format [x, y, width, height]. The first two element represent [x,y] co-ordinates for the upper left corner of the region . The second two elements represents the width and height of the region. The search starts with a step size equal to or slightly greater than half of the maximum search range and then employs the following steps: The block compares search points in each method. There is a central point and other search points located on the search area boundary. The block decrements the step sign of one pixel. At each new steps, the block moves the search center to the best matching point resulting from the previous step. D. Manhattan Distance metric[3] Manhattan distance metric[3] is the difference between pixels in the original image and the corresponding pixels in the template image. The metric is the norm of the difference image. The lowest Manhattan distance store estimates the best position of template within the search image. The general Manhattan distance metric becomes: d1(Ij,T) = Ii, j Ti Where T denotes the pixels in the template image Ij denotes the pixel in the original image II. RELATED W ORK A. Introduction In this paper we have developed an algorithm to identify person in airport to stop terrorist activities , Bomb blast and others. When the passenger will enter the airport of the camera will capture the if eye is considered. Passenger with the top of that there is simplicity. The entire passenger just needs to do that Just steps into that place where camera is placed. Look at the camera and we are actually reverting the traditional process where the person had to stand in front of camera take instruction like move back a little , move forward please look at the camera and please try again. Now it is very simple you just walk in stop you look and look and walk out. The third element is speed, the identifying a person in airport this system take nearly only 2 seconds that speed of human verification. 154
  • 3. B. Iris Recognition Methods The iris is an visible protected organ which provides uniqueness pattern throughout the life. It is very attractive biometrics system for identifying individuals specially in the case of twins. In the Iris recognition system , their eye is first captured and then a template is created for their iris area. This template when compared with the other template stored in the database until a matching is found and the person is identified or no match is found then the person is not identified. It is the most protected biometric technology compared with other biometric technologies such as face and finger recognition. In this method, captured image first converted into segmented image and segmented image is then converted into normalized image and finally normalized image is then converted into Binary signatures. Algorithm for the Iris recognition system is mentioned below in Fig.1 Fig.1. A major Stages of Iris recognition method Fig.2. Segmented Image 155
  • 4. Fig.3. Normalized Image Fig 4. Binary Image Fig . 5. Binary Signature in 2D Matrix Fig 6 : Identification of person from the template block using Iris recognition method Explanation of Fig : In Fig.2 we load the original image. We can perform arithmetic operations on integer data, which enables you to convert image types without first converting the numeric class of the image data. To display the image, use a grayscale color map with 256 values. Fig.3 is the normalized image which represents the iris using a fixed parameter interval . In a binary image, each pixel assumes one of only two discrete values: 1 or 0. A binary image is stored as a logical array. By convention, this documentation uses the variable name BW to refer to binary images. The Fig.4 shows a binary image with a close-up view of some of the pixel values. Binary images contain only 0's and 1's. Pixels with the value 0 are displayed as black; pixels with the value 1 156
  • 5. are displayed as white. Fig.5 is the Binary signature of the 2D matrix which is equivalent to Binary image. Fig.6 identify the person enrolled in the template block. C. Algorithms : Iris recognition algorithms [4] Step 1 : Capture the Image Step 2 : Display the capture Image Step 3 : Calculate the monochrome luminance by combining the RGB values according to the a NTSC standard which applies co – efficient related to the eye`s sensitivity to RGB color Step 4 : Convert Image to Binary Image based on threshold. The output image(level) replaces all pixels in the input image with luminance greater than with the value 1 ( white) and replaces all other pixels with the value 0 (Black). Step 5 : Global Image threshold using Otsu`s method Level = graythresh(I) computes a global threshold(level) that can be used to convert an intensity image to a binary image with im2bw . Level is a normalized intensity value that lies in the range [0,1].The graythresh function uses otsu’s method , which choose s the threshold to minimize the intraclass variance of the black and white pixels Step 6 : Stored the converted Binary no of the captured Image into N x N matrix and compared with the image stored in the database. D. Program code[5] rgb_img = imread(‘C:UsersDCDesktopimages.jpg’); image(r) axis image ; I= 0.2989 *rgb_img(:,:,1) … + 0.5870 * rgb_img(:,:,2) … + 0.1140 * rgb_img(:,:,3); I= imread(‘C:UsersDCDesktopimages.jpg’); level = graythresh(I); BW = im2bw(I, level); imshow(BW) III. RESULT [6] Here is the example of how to calculate the manhattan distance between two iris codes. It sum the absolute value of the difference between pixels in the original image and the corresponding pixels in the template image. The metric is the l l norm of the difference image. The lowest SAD store estimates the best position of template within the search image. To simulate the effect of uncertainty. the threshold is fixed to 0.141 Iris1: 1100010101100011100 Iris2: 1000101100011010101 Manhattan distance of above two iris code Iris 1 and Iris 2 is MD : 0.1235 Iris3: 10010011011011 0001 Iris 4: 1 1 1 0 1 1 0 0 1 0 0 1 0 0 01 0 0 Manhattan distance of above two iris code Iris 3 and Iris 4 is MD : 0.235 Identification: It is 1:M comparison of the captured image against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the iris sample with a template in the database falls within a previously set threshold. As verification mode, in identification decision context there are two possible outcomes normally called like verification :False Acceptance Rate: Occurs when the system says that an unknown sample matches a particular person in the Template and the match is not correct. that an impostor‘s iris sample matches an enrolled sample.The proportion of attempts whose MD is below a given threshold. From Iris1 and Iris 2 , the MD = 0.1235 which is less than a given threshold (0.141) as shown in below Table 1. 157
  • 6. False Rejection Rate: Occurs when the system says that the sample does not match any of the entries in the Template, but the sample in fact does belong to someone in the gallery. The proportion of authentic attempts whose MD exceeds a given threshold. The rate at which a matching algorithm incorrectly fails to determine that a genuine sample matches an enrolled sample. From Iris 3 and Iris 4, the MD=0.235 which exceeds a given threshold(0.141) as shown in below Table I. TABLE I. T OTAL SUCCESS RATE MD Threshold 0.141 False Acceptance Rate False Rejection Rate Total Success rate 10% 0% 80% 0.141 0% 20% 70% Considering there two iris values it is observed that is the first case the total success rate is 80% on in the second case it is 70%. IV. CONCLUSION In this paper we have developed an algorithm to identify person in airport to stop terrorist activities , Bomb blast and others. It’s very simple passenger will walk into the catering space of the camera . Camera will detect the face will look at the eyes will focus into the eyes then can saw the pictures of your iris coveted to the court.This system has three key elements: Accurate, it really allows identifying to very high degree of security every individual passenger with the top of that there is simplicity. We have used Template matching ,Best match search method and manhattan distance for matching the individual identity. REFERENCE [1] Koga T, el.al. motion compensated interference Coding for video conferencing. In national Telecommunications conference ,New Orlean, LA, Nov. 1981,G5.3.1 1-5. [2] Zakai M.”General distance criteria” IEEE Transaction on Information theory , pp,94-95 January, 1964. [3] Yu , J.J. Amores ,N. Sebe, Q. Tian , 4 A new study on Distance metrices as semilians by measurement IEEE International conferences on multimedia and Expo , 2006 [4] Otsa ,N,” A Threes hold selection method from Gray-level Histograms ” IEEE transactions on system, man , and Cybermetics , vol,9 , No 1,1979, page No. 62-66 [5] Sanderson S., Erbetta J.( 2000) IEE Colloquium on Visual Biometrics. [6] -based personal authentication using a normalized directional energy feature, Proc. 4th Int. Conf. Audio- and Video-Based Biometric Person Authentication, pp. 224–232, Jun. 2003. 158