SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. II (Mar - Apr.2015), PP 21-24
www.iosrjournals.org
DOI: 10.9790/2834-10222124 www.iosrjournals.org 21 | Page
Recognition of Human Iris Patterns for Biometric Identification
Mrs.M.Sujatha, K.V.S.Sravanthi, B.Jahanavi Raja, L.Dhanunjay,
J.Naveen Kumar M.Sujatha-AssociateProfessor
K.V.S.Sravanthi-TeamLeader
Department of Electronics And Communication
Abstract: Iris recognition is an efficient method for identification of persons. This paper provides a technique
for the iris recognition. A biometric system provides automatic identification of individuals. Iris is an unique
feature which is applicable for identification. Unlike face recognition or finger prints, iris recognition comes
from randomly distributed features. It is most reliable and accurate method of identification. This paper
proposes a personal identification using iris recognition system with the help of six major steps i.e. image
acquisition,localization, Isolation, normalization, feature extraction and matching and also these six steps
consists a numbers of minor steps to complete each step. The boundaries of the iris, as papillary and limbic
boundary, are detected by using Canny Edge Detector. We can use masking technique to isolate the iris image
form the given eye image, this isolated iris image is transformed from Cartesian to polar co-ordinate. Now
finally extract the unique features (feature vector) of the iris after enhancing the iris image and then perform
matching process on iris code using Hamming Distance for acceptance and rejectance process.
Keywords: Canny edge detection , Hamming distance , Hough transform, Masking, Histogram equalization,
Haar wavelet.
I. Introduction:
Iris Recognition is a biometrical based technology for personal identification and verification and it is
to recognize a person from his/her iris prints. Iris patterns are characterized by high level of stability and
distinctiveness. Each individual has a
Unique iris the difference even exists between identical twins and between the left and right eye of the same
person. Thus, iris recognition is an efficient method of identifying persons.
II. Iris Recognition Systems:
The critical aspects for any biometrics are the number of degree-of-freedom of variation in the chosen
index across the human population, since this determines uniqueness it’s immutability over time and its
protection to intervention and the computational prospects for efficiently encoding and reliably recognizing the
identifying pattern. In the completely human population, no two irises are alike in their mathematical detail,
even among identical twins.
Iris recognition is a method of biometric authentication, based on extraction features of the iris of an
individual's eyes. Each individual has a unique iris, the variation even exists between identical twins and
between the left and right eye of the same person.
Fig: Representation of an eye
III. Characteristics Of Iris Making It Proper For Identification:
Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly
distributed features. This leads to its high reliability for personal identification, and at the same time, the
difficulty in effectively representing such details in an image.The iris has the great mathematical advantage that
Recognition of Human Iris Patterns for Biometric Identification
DOI: 10.9790/2834-10222124 www.iosrjournals.org 22 | Page
its patterns are highly variable and the variability among different persons is huge and enormous. Another point
which is highly favorable is that it is as internal (yet externally visible) organ of the eye, the iris is well protected
from the environment and stable over time.
Algorithm:
Image acquisition:
This is the first step for the entire process in the identification of iris. When a person desired to be
identified by iris recognition system,first take the picture of eye. The camera can be located between three and a
half inches and one meter to capture the image. In the manual procedure, the user needs to fine-tune the camera
to get the iris in focus and needs to be within six to twelve inches of the of the camera. This process is much
more manually concentrated and requires proper user training to be successful.
Fig: Image acquisition System (a) System with frame grabber (b) CCD Camera (c) Light Source (d) User.
Localization:
The obtained iris image has to be preprocessed to identify the iris, which is the portion between
the pupil (inner boundary) and the sclera (outer boundary). The first step in iris localization is to detect pupil
which is the black circular part encircled by iris tissues. The center of pupil can be used to detect the outer
radius of iris patterns. The important steps involved in the iris localization are:
Recognition of Human Iris Patterns for Biometric Identification
DOI: 10.9790/2834-10222124 www.iosrjournals.org 23 | Page
(i).Pupil detection
(ii). Outer iris localization
(i)Pupil Detection:
The iris image is converted into grayscale to remove the effect of illumination. As pupil is the largest
black area in the intensity image, its edges can be identified easily from the binarized image by using suitable
threshold on the intensity image. But the problem of binarization arises in case of persons having dark iris. Thus
the localization of pupil fails in such cases. In order to overcome these problems Circular Hough Transformation
for pupil detection can be used.
(ii)Outer iris localization:
External noise is removed by blurring the intensity image. But too much blurring may dilate the
boundaries of the edge or may make it difficult to detect the outer iris boundary, sorting out the eyeball and
sclera. Thus a unique smoothing filter such as the median filter is used on the original intensity image. This
type of filtering eliminates bare noise while preserving image boundaries. After filtering, the contrast of image
is enhanced to have sharp variation at image boundaries using histogram equalization.
Isolation:
Now the task is to segregate the iris. In the images used, there is some presence of the white of the eye.
This was done by using a masking technique as here I am choosing best technique among other so I will use
Gaussian Mask and then cropping the image to minimize the area that does not include any edge data. The mask
is circular one which has the same radius as the iris. It thus passes all pixels that are contained in the circle
which are all the pixels forming the iris.
Normalization:
For the purpose of accurate texture analysis, it is necessary to compensate this deformation. Since both
the inner and outer boundaries of the iris have been detected so it is easy to map the iris ring to a rectangular
block of texture of a fixed size.
Feature Extraction:
Both the Gabor Transform and the Haar Wavelet are considered as the Mother Wavelet. Laplacian of
Gaussian (LoG) is also used in previous papers. In my paper, using Haar Wavelet, decomposing upto 4th level a
feature vector with 87 dimensions is computed. Since each dimension has a real value ranging from -1.0 to +1.0,
the feature vector is sign quantized so that any positive value is represented by 1 and negative value as 0. This
results in a compact biometric template consisting of only 87 bits.
Matching:
Now this is our final phase for finishing our system. Here we will store the 87 bit iris code or template
in our database for future matching and this matching is done with the help of an efficient matching algorithm
here we are using Hamming Distance algorithm for the recognition of two samples that is reference template
and enrollment template. It is basically uses an exclusive OR (XOR) function between two bit patterns.
Hamming Distance is a measure, which delineate the differences, of iris codes.
Canny Edge Detection:
The Canny edge detection algorithm is known to many as the optimal edge detector. Canny's intentions
were to enhance the many edge detectors already out at the time he started his work. He was very successful in
achieving his goal and his ideas and methods can be found in his paper, "A Computational Approach to Edge
Detection". In his paper, he followed a list of criteria to improve current methods of edge detection. The first
and most obvious is low error rate. It is important that edges occuring in images should not be missed and that
there be NO responses to non-edges. The second criterion is that the edge points be well localized. In other
words, the distance between the edge pixels as found by the detector and the actual edge is to be at a minimum.
A third criterion is to have only one response to a single edge. This was implemented because the first 2 were
not substantial enough to completely eliminate the possibility of multiple responses to an edge.
Canny Edge Detection Algorithm:
The algorithm runs in 5 separate steps:
1. Smoothing: Blurring of the image to remove noise.
2. Finding gradients: The edges should be marked where the gradients of the image has
Large magnitudes.
Recognition of Human Iris Patterns for Biometric Identification
DOI: 10.9790/2834-10222124 www.iosrjournals.org 24 | Page
3. Non-maximum suppression: Only local maxima should be marked as edges.
4. Double thresholding: Potential edges are determined by thresholding.
5. Edge tracking by hysteresis: Final edges are determined by suppressing all edges that are not connected to a
very certain (strong) edge.
Some Current And Future Applications Of Iris Recognition:
 national border controls: the iris as a living passport
 computer login: the iris as a living password
 cell phone and other wireless-device-based authentication
 secure access to bank accounts at cash machines
 ticketless travel; authentication of rights to services
 premises access control (home, office, laboratory, etc)
 driving licenses; other personal certificates
 entitlements and benefits authorization
 forensics; birth certificates; tracing missing or wanted persons
 credit-card authentication
 automobile ignition and unlocking; anti-theft devices
 anti-terrorism (e.g. security screening at airports)
 secure financial transactions (electronic commerce, banking)
 Internet security; control of access to privileged information
 "Biometric-Key Cryptography" (stable keys from unstable templates)
IV. Conclusion:
In this review paper, we show how a number of ways can identify a person but as a substitute of
carrying bunk of keys or remembering things as passwords, we can use us as living password, which is called
biometric recognition technology it uses physical characteristics or habits of any person for identification. In
biometrics we have a number of characteristics which we are using in our recognition technology as fingerprint,
palm print, signature, face, iris recognition, thumb impression and so on but among these irises recognition is
best technology for identification of a person can say that this technology is not completely developed .Thus iris
recognition is an efficient method for identifying persons.
References:
[1]. http://www.amazingincredible.com/show/82-the-incredible-human-eye (last referred on 26 April 2013)
[2]. P.W. Hallinan, “Recognizing Human Eyes,” Geomtric Methods Comput .Vision ,vol. 1570, pp.214-226, 1991.
[3]. J. Daugman and C. Downing, “Epigenetic Randomness, Complexity, and Singularity of Human Iris Patterns,” Proc. Royal Soc.
(London) B: Biological Sciences, vol. 268, pp. 1737-1740, 2001
[4]. Daugman, J. “How Iris Recognition Works”, available at http://www.ncits.org/tc_home/m1htm/docs/m1020044.pdf.
[5]. L.P. Han and W.B. Yin. An Effective Adaptive Filter Scale Adjustment Edge Detection Method (China, Tsinghua university, 1997).
[6]. D. Marr and E. Hildreth , Theory of Edge Detection (London, 1980).
[7]. Canny John, A Computational Approach to Edge Detection, IEEE Transactions on Pattern Analysis and Machine
Intelligence,PAMI-8.
[8]. X.L Xu, Application of Matlab In Digital Image Processing, Modern Computer, 43(5), 2008, 35-37.
[9]. Y.Q Lv and G.Y Zeng , Detection Algorithm of Picture Edge, TAIYUANSCIENCE & TECHNOLOGY, 27(2), 2009, 34-35
[10]. D.F Zhang, MATLAB Digital Image Processing (Beijing, Mechanical Industry, 2009).

Mais conteúdo relacionado

Mais procurados

Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkijcsit
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security systemeSAT Publishing House
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition SystemCSCJournals
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaDrishty Sharma
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognitionmahesamrin
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsEditor IJMTER
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
Retinal Pattern Recognition
Retinal Pattern RecognitionRetinal Pattern Recognition
Retinal Pattern Recognitionhiratufail
 
A03640106
A03640106A03640106
A03640106theijes
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

Mais procurados (19)

Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition System
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognition
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition Systems
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Retinal Pattern Recognition
Retinal Pattern RecognitionRetinal Pattern Recognition
Retinal Pattern Recognition
 
A03640106
A03640106A03640106
A03640106
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Seminar
SeminarSeminar
Seminar
 

Destaque

Comparison of Psychological Variables within different positions of players o...
Comparison of Psychological Variables within different positions of players o...Comparison of Psychological Variables within different positions of players o...
Comparison of Psychological Variables within different positions of players o...IOSR Journals
 
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...IOSR Journals
 
Dosimetric evaluation of the MLCs for irregular shaped radiation fields
Dosimetric evaluation of the MLCs for irregular shaped radiation fieldsDosimetric evaluation of the MLCs for irregular shaped radiation fields
Dosimetric evaluation of the MLCs for irregular shaped radiation fieldsIOSR Journals
 
Development of Shape Based Leaf Categorization
Development of Shape Based Leaf CategorizationDevelopment of Shape Based Leaf Categorization
Development of Shape Based Leaf CategorizationIOSR Journals
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
A Comparative Study on Dyeing of Cotton and Silk Fabric Using Madder as a Nat...
A Comparative Study on Dyeing of Cotton and Silk Fabric Using Madder as a Nat...A Comparative Study on Dyeing of Cotton and Silk Fabric Using Madder as a Nat...
A Comparative Study on Dyeing of Cotton and Silk Fabric Using Madder as a Nat...IOSR Journals
 
Solving Age-old Transportation Problems by Nonlinear Programming methods
Solving Age-old Transportation Problems by Nonlinear Programming methodsSolving Age-old Transportation Problems by Nonlinear Programming methods
Solving Age-old Transportation Problems by Nonlinear Programming methodsIOSR Journals
 
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...IOSR Journals
 

Destaque (20)

Comparison of Psychological Variables within different positions of players o...
Comparison of Psychological Variables within different positions of players o...Comparison of Psychological Variables within different positions of players o...
Comparison of Psychological Variables within different positions of players o...
 
D012112027
D012112027D012112027
D012112027
 
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
 
G0562430
G0562430G0562430
G0562430
 
E0962836
E0962836E0962836
E0962836
 
C0961621
C0961621C0961621
C0961621
 
D0612025
D0612025D0612025
D0612025
 
Dosimetric evaluation of the MLCs for irregular shaped radiation fields
Dosimetric evaluation of the MLCs for irregular shaped radiation fieldsDosimetric evaluation of the MLCs for irregular shaped radiation fields
Dosimetric evaluation of the MLCs for irregular shaped radiation fields
 
Development of Shape Based Leaf Categorization
Development of Shape Based Leaf CategorizationDevelopment of Shape Based Leaf Categorization
Development of Shape Based Leaf Categorization
 
C0451823
C0451823C0451823
C0451823
 
E0543135
E0543135E0543135
E0543135
 
S130304109117
S130304109117S130304109117
S130304109117
 
I012545259
I012545259I012545259
I012545259
 
A0220105
A0220105A0220105
A0220105
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
A Comparative Study on Dyeing of Cotton and Silk Fabric Using Madder as a Nat...
A Comparative Study on Dyeing of Cotton and Silk Fabric Using Madder as a Nat...A Comparative Study on Dyeing of Cotton and Silk Fabric Using Madder as a Nat...
A Comparative Study on Dyeing of Cotton and Silk Fabric Using Madder as a Nat...
 
J0945761
J0945761J0945761
J0945761
 
Solving Age-old Transportation Problems by Nonlinear Programming methods
Solving Age-old Transportation Problems by Nonlinear Programming methodsSolving Age-old Transportation Problems by Nonlinear Programming methods
Solving Age-old Transportation Problems by Nonlinear Programming methods
 
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
 
L010618188
L010618188L010618188
L010618188
 

Semelhante a E010222124

EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationIOSR Journals
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Face Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones AlgorithmFace Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones Algorithmpaperpublications3
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsIJRES Journal
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001vital vital
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001vital vital
 
Face recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysisFace recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysisacijjournal
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIJECEIAES
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 

Semelhante a E010222124 (20)

EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person Authentication
 
E045052731
E045052731E045052731
E045052731
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Face Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones AlgorithmFace Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones Algorithm
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001
 
Face recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysisFace recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysis
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filter
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

E010222124

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. II (Mar - Apr.2015), PP 21-24 www.iosrjournals.org DOI: 10.9790/2834-10222124 www.iosrjournals.org 21 | Page Recognition of Human Iris Patterns for Biometric Identification Mrs.M.Sujatha, K.V.S.Sravanthi, B.Jahanavi Raja, L.Dhanunjay, J.Naveen Kumar M.Sujatha-AssociateProfessor K.V.S.Sravanthi-TeamLeader Department of Electronics And Communication Abstract: Iris recognition is an efficient method for identification of persons. This paper provides a technique for the iris recognition. A biometric system provides automatic identification of individuals. Iris is an unique feature which is applicable for identification. Unlike face recognition or finger prints, iris recognition comes from randomly distributed features. It is most reliable and accurate method of identification. This paper proposes a personal identification using iris recognition system with the help of six major steps i.e. image acquisition,localization, Isolation, normalization, feature extraction and matching and also these six steps consists a numbers of minor steps to complete each step. The boundaries of the iris, as papillary and limbic boundary, are detected by using Canny Edge Detector. We can use masking technique to isolate the iris image form the given eye image, this isolated iris image is transformed from Cartesian to polar co-ordinate. Now finally extract the unique features (feature vector) of the iris after enhancing the iris image and then perform matching process on iris code using Hamming Distance for acceptance and rejectance process. Keywords: Canny edge detection , Hamming distance , Hough transform, Masking, Histogram equalization, Haar wavelet. I. Introduction: Iris Recognition is a biometrical based technology for personal identification and verification and it is to recognize a person from his/her iris prints. Iris patterns are characterized by high level of stability and distinctiveness. Each individual has a Unique iris the difference even exists between identical twins and between the left and right eye of the same person. Thus, iris recognition is an efficient method of identifying persons. II. Iris Recognition Systems: The critical aspects for any biometrics are the number of degree-of-freedom of variation in the chosen index across the human population, since this determines uniqueness it’s immutability over time and its protection to intervention and the computational prospects for efficiently encoding and reliably recognizing the identifying pattern. In the completely human population, no two irises are alike in their mathematical detail, even among identical twins. Iris recognition is a method of biometric authentication, based on extraction features of the iris of an individual's eyes. Each individual has a unique iris, the variation even exists between identical twins and between the left and right eye of the same person. Fig: Representation of an eye III. Characteristics Of Iris Making It Proper For Identification: Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly distributed features. This leads to its high reliability for personal identification, and at the same time, the difficulty in effectively representing such details in an image.The iris has the great mathematical advantage that
  • 2. Recognition of Human Iris Patterns for Biometric Identification DOI: 10.9790/2834-10222124 www.iosrjournals.org 22 | Page its patterns are highly variable and the variability among different persons is huge and enormous. Another point which is highly favorable is that it is as internal (yet externally visible) organ of the eye, the iris is well protected from the environment and stable over time. Algorithm: Image acquisition: This is the first step for the entire process in the identification of iris. When a person desired to be identified by iris recognition system,first take the picture of eye. The camera can be located between three and a half inches and one meter to capture the image. In the manual procedure, the user needs to fine-tune the camera to get the iris in focus and needs to be within six to twelve inches of the of the camera. This process is much more manually concentrated and requires proper user training to be successful. Fig: Image acquisition System (a) System with frame grabber (b) CCD Camera (c) Light Source (d) User. Localization: The obtained iris image has to be preprocessed to identify the iris, which is the portion between the pupil (inner boundary) and the sclera (outer boundary). The first step in iris localization is to detect pupil which is the black circular part encircled by iris tissues. The center of pupil can be used to detect the outer radius of iris patterns. The important steps involved in the iris localization are:
  • 3. Recognition of Human Iris Patterns for Biometric Identification DOI: 10.9790/2834-10222124 www.iosrjournals.org 23 | Page (i).Pupil detection (ii). Outer iris localization (i)Pupil Detection: The iris image is converted into grayscale to remove the effect of illumination. As pupil is the largest black area in the intensity image, its edges can be identified easily from the binarized image by using suitable threshold on the intensity image. But the problem of binarization arises in case of persons having dark iris. Thus the localization of pupil fails in such cases. In order to overcome these problems Circular Hough Transformation for pupil detection can be used. (ii)Outer iris localization: External noise is removed by blurring the intensity image. But too much blurring may dilate the boundaries of the edge or may make it difficult to detect the outer iris boundary, sorting out the eyeball and sclera. Thus a unique smoothing filter such as the median filter is used on the original intensity image. This type of filtering eliminates bare noise while preserving image boundaries. After filtering, the contrast of image is enhanced to have sharp variation at image boundaries using histogram equalization. Isolation: Now the task is to segregate the iris. In the images used, there is some presence of the white of the eye. This was done by using a masking technique as here I am choosing best technique among other so I will use Gaussian Mask and then cropping the image to minimize the area that does not include any edge data. The mask is circular one which has the same radius as the iris. It thus passes all pixels that are contained in the circle which are all the pixels forming the iris. Normalization: For the purpose of accurate texture analysis, it is necessary to compensate this deformation. Since both the inner and outer boundaries of the iris have been detected so it is easy to map the iris ring to a rectangular block of texture of a fixed size. Feature Extraction: Both the Gabor Transform and the Haar Wavelet are considered as the Mother Wavelet. Laplacian of Gaussian (LoG) is also used in previous papers. In my paper, using Haar Wavelet, decomposing upto 4th level a feature vector with 87 dimensions is computed. Since each dimension has a real value ranging from -1.0 to +1.0, the feature vector is sign quantized so that any positive value is represented by 1 and negative value as 0. This results in a compact biometric template consisting of only 87 bits. Matching: Now this is our final phase for finishing our system. Here we will store the 87 bit iris code or template in our database for future matching and this matching is done with the help of an efficient matching algorithm here we are using Hamming Distance algorithm for the recognition of two samples that is reference template and enrollment template. It is basically uses an exclusive OR (XOR) function between two bit patterns. Hamming Distance is a measure, which delineate the differences, of iris codes. Canny Edge Detection: The Canny edge detection algorithm is known to many as the optimal edge detector. Canny's intentions were to enhance the many edge detectors already out at the time he started his work. He was very successful in achieving his goal and his ideas and methods can be found in his paper, "A Computational Approach to Edge Detection". In his paper, he followed a list of criteria to improve current methods of edge detection. The first and most obvious is low error rate. It is important that edges occuring in images should not be missed and that there be NO responses to non-edges. The second criterion is that the edge points be well localized. In other words, the distance between the edge pixels as found by the detector and the actual edge is to be at a minimum. A third criterion is to have only one response to a single edge. This was implemented because the first 2 were not substantial enough to completely eliminate the possibility of multiple responses to an edge. Canny Edge Detection Algorithm: The algorithm runs in 5 separate steps: 1. Smoothing: Blurring of the image to remove noise. 2. Finding gradients: The edges should be marked where the gradients of the image has Large magnitudes.
  • 4. Recognition of Human Iris Patterns for Biometric Identification DOI: 10.9790/2834-10222124 www.iosrjournals.org 24 | Page 3. Non-maximum suppression: Only local maxima should be marked as edges. 4. Double thresholding: Potential edges are determined by thresholding. 5. Edge tracking by hysteresis: Final edges are determined by suppressing all edges that are not connected to a very certain (strong) edge. Some Current And Future Applications Of Iris Recognition:  national border controls: the iris as a living passport  computer login: the iris as a living password  cell phone and other wireless-device-based authentication  secure access to bank accounts at cash machines  ticketless travel; authentication of rights to services  premises access control (home, office, laboratory, etc)  driving licenses; other personal certificates  entitlements and benefits authorization  forensics; birth certificates; tracing missing or wanted persons  credit-card authentication  automobile ignition and unlocking; anti-theft devices  anti-terrorism (e.g. security screening at airports)  secure financial transactions (electronic commerce, banking)  Internet security; control of access to privileged information  "Biometric-Key Cryptography" (stable keys from unstable templates) IV. Conclusion: In this review paper, we show how a number of ways can identify a person but as a substitute of carrying bunk of keys or remembering things as passwords, we can use us as living password, which is called biometric recognition technology it uses physical characteristics or habits of any person for identification. In biometrics we have a number of characteristics which we are using in our recognition technology as fingerprint, palm print, signature, face, iris recognition, thumb impression and so on but among these irises recognition is best technology for identification of a person can say that this technology is not completely developed .Thus iris recognition is an efficient method for identifying persons. References: [1]. http://www.amazingincredible.com/show/82-the-incredible-human-eye (last referred on 26 April 2013) [2]. P.W. Hallinan, “Recognizing Human Eyes,” Geomtric Methods Comput .Vision ,vol. 1570, pp.214-226, 1991. [3]. J. Daugman and C. Downing, “Epigenetic Randomness, Complexity, and Singularity of Human Iris Patterns,” Proc. Royal Soc. (London) B: Biological Sciences, vol. 268, pp. 1737-1740, 2001 [4]. Daugman, J. “How Iris Recognition Works”, available at http://www.ncits.org/tc_home/m1htm/docs/m1020044.pdf. [5]. L.P. Han and W.B. Yin. An Effective Adaptive Filter Scale Adjustment Edge Detection Method (China, Tsinghua university, 1997). [6]. D. Marr and E. Hildreth , Theory of Edge Detection (London, 1980). [7]. Canny John, A Computational Approach to Edge Detection, IEEE Transactions on Pattern Analysis and Machine Intelligence,PAMI-8. [8]. X.L Xu, Application of Matlab In Digital Image Processing, Modern Computer, 43(5), 2008, 35-37. [9]. Y.Q Lv and G.Y Zeng , Detection Algorithm of Picture Edge, TAIYUANSCIENCE & TECHNOLOGY, 27(2), 2009, 34-35 [10]. D.F Zhang, MATLAB Digital Image Processing (Beijing, Mechanical Industry, 2009).