SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
All Rights Reserved © 2012 IJARCET
920

Abstract— Recognize people identity becomes an essential
problem, Iris based biometric system provides accurate
personal identification. Feature encoding and pattern
matching are major task in the iris recognition. In our
proposed system gives how to set a model to extract the
feature of different irises and match them is especially
important for it determines the results of the whole system
directly. Gabor wavelets are able to provide optimum
conjoint representation of a signal in space and spatial
frequency. A Gabor filter is constructed by modulating a
sine/cosine wave with a Gaussian. Feature Encoding was
implemented by convolving the normalised iris pattern with
1-D Gabor filters. For Matching hamming distance will be
calculated and accurate recognition was achieved.
Keywords— Feature Encoding, Gabor Filters, 1-D Gabor
Filters, Hamming Distance, Pattern Matching
I. INTRODUCTION
Iris Segmentation and Edge Detection Provides abundant
texture information. Feature selection and extraction is to find
out important features to perform matching. The visible
features of an iris are ciliary processes, contraction furrows,
crypts, rings, cornea, and freckles and so on. To set a model to
extract the feature of different irises and match them is
especially important for it determines the results of the whole
system directly. A feature vector is formed which consists of
the ordered sequence of features extracted from the various
representation of the images. In order to provide accurate
recognition of individuals, The Most discriminating
information present in an iris pattern must be extracted. Only
the significant features of the iris must be encoded so that
comparisons between templates can be made. Most Iris
recognition systems make use of a band pass decomposition
of the image to create biometric templates.
II. MATERIALS AND METHODS
A. Gabor Filters
Gabor wavelets are able to provide optimum conjoint
representation of a signal in space and spatial frequency.
A Gabor filter [1], [2] is constructed by modulating a
sine/cosine wave with a Gaussian. A 2-D Gabor filter over an
image domain (x, y) is represented as:
Manuscript received March 03, 2013.
T.Karthikeyan, Department of Computer Science, PSG College of arts
and Science. Coimbatore, INDIA,
B.Sabarigiri, Department of Computer Science, PSG College of arts and
Science, Coimbatore, INDIA, +91-97882-06468.
)]0(0)0(0[2
]2/2)0(2/2)0[(
),(
yyvxxui
e
yyxx
eyxG





(1)
Figure 1: A quadrature pair of 2D Gabor Filters, (a)
Depicts the real component or even symmetric filter
characterised by a cosine modulated by a Gaussian and (b)
Depicts the imaginary component or odd symmetric filter
characterised by a sine modulated by a Gaussian.
Where equation 1
(x0, y0) Specify position in the image,
),(  Specify the effective width and length,
And (u0, v0) Specify modulation, which has spatial
frequency 2
0
2
0
0 vu 
This is able to provide the optimum conjoint localisation in
both space and frequency, since a sine wave is perfectly
localised in frequency, but not localised in space. Modulation
of sine with a Gaussian provides localisation in space, through
with loss of localisation in frequency. Decomposition of a
signal is accomplished using a quadrature pair of Gabor filters,
with a real part specified by a sine modulated by a Gaussian.
The real and imaginary filters are also known as the even
symmetric and odd symmetric components respectively. The
center frequency of the filter specified by the frequency of the
sine/cosine wave, and the bandwidth of the filter is specified
by the width of the Gaussian. Daugman makes use of a 2-D
version of Gobar filters in order to encode iris pattern data.
Daugman demodulated the output of the Gabor filters in
order to compress the data. This is done by quantising the
phase information into four levels, for each possible quadrant
in the complex plane. Taking only the phase will allow
encoding of discriminating information in the iris, while
discarding redundant information such as illumination, which
is represented by the amplitude component. These four levels
are represented using two bits of data, so each pixel in the
normalised iris patterns to two bits of data in the iris template.
A total of 9600 bits are calculated for the template, and an
equal number of masking bits are generated in order to mask
out corrupted regions within the iris. This creates a compact
1200-byte template, which allows for efficient storage and
comparison of irises. The daugman system makes of polar
An Efficient Iris Feature Encoding and Pattern
Matching for Personal Identification
T.Karthikeyan1
, B.Sabarigiri2
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
921
All Rights Reserved © 2013 IJARCET
co-ordinates for normalization, therefore in polar form the
filters are given as:
2/2)
0
(2/2)
0
()
0
(
),(




i
e
rr
e
i
erh
(2)
(
0
,
0
r ) Specify the centre frequency of the filter.
III. IRIS CODE CONSTRUCTION AND ENTROPY
MEASURES
A. The Iris Code
The 2-D Gabor filters used for iris recognition are defined
the doubly dimensions polar co-ordinate system ),( r as
shown in figure 2, 2-D Gabor Filter Equation is as follows.
2/2)
0
(2/2)
0
()
0
(
),(




i
e
rr
e
i
erG
(3)
The real parts of the 2D Gabor filters are slightly adjusted
through truncation to give them zero volume, and hence no
DC response, so that computed iris code bits do not depend
upon the strength of illumination (The imaginary parts of the
filters have no DC response because of odd symmetry).
Figure 2: Gabor Filter at 0 Degree Orientation
Figure 3: Phase-Quadrant Iris Demodulation Code
The parameters  and  co-vary in inverse proportion 
to generate a self- similar, multi-scale wavelet family of 2D
frequency-selective quadrate filters with constant logarithmic
bandwidth, whose locations, specified by
0
 and
0
r , range
across the zones of analysis of the iris. Each bit, h, in an iris
code is regarded as a co-ordinate of one of the four vertices of
a logical unit square in the complex plane It is composed by
evaluating the sign of the iris image, I( , ), on to a particular
complex 2D Gabor filter.
B. Commensurability of Iris Codes
A very important aspect of iris coding approach is to
achieve commensurability among the iris codes. This is done
by mapping all irises into a representation having universal
format and constant length, regardless of the apparent amount
of iris detail. If there were no commensurability among the
codes, showing partial agreement and partial disagreement in
their lists of features, in this case, there is no straight ahead
mathematically solution for how one would be able to make
objective decisions and compute confidence levels. Therefore
commensurability is necessary to facilitate and objectify the
code comparison process, and the computation of confidence
levels for each decision. It also speeds up the whole process of
iris recognition as well as increasing the reliability.
IV.IRIS ENCODING
For Encoding, we have used log-Gabor filter because it
covers more spectrum and eliminates DC component of the
images. Feature encoding was implemented by convolving
the normalized iris pattern with 1-D Log Gabor Wavelets.
The 2-D normalized pattern is broken up into a number of 1-D
signals, and then these 1-D signals are convolved with 1-D
Gabor Wavelets [3]-[6].
The rows of the 2-D normalized pattern are taken as the
1-D signal. Each row corresponds to circular ring on the iris
region. The angular direction is taken rather than the radial
one, which corresponds to columns of the normalized pattern,
since maximum independence occurs in the angular direction.
The intensity values at known noise areas in the normalized
pattern are set to the average intensity of surrounding pixels to
prevent intense of noise in the output of the filtering. The
output of filtering is then phase quantized to four levels using
the daugman method, with each filter producing two bits of
data for each phases. The output of phase quantisation is
chosen to be grey code, so that when going from one quadrant
to another, only one bit changes. This will minimize the
number of bits disagreeing, if say two intra-class patterns are
sightly misaligned and thus will provide more accurate
recognition. Therefore, the encoding process produced a
bitwise template containing a number of bits of information,
and a corresponding noise mask which corresponds to corrupt
areas within the iris pattern, and marks bits in the template as
corrupt.
V. MATCHING OF IRIS PATTERNS
For matching, the hamming distance was chosen as a
metric for recognition, since bit-wise comparisons between
biometric iris templates were required. The Hamming
distance also incorporates noise masking, so that only
significant bits are used between to iris templates. The
hamming distance will be calculated using only the bits
generated from the true iris region [7], [8].
Although, in theory, two iris templates generated from the
same iris should have a Hamming distance of 0, in practice
this will not occur because normalization is not perfect due to
noise that goes undetected. So some variation will be present
when comparing two intra-class iris templates. In order to
account for rotational inconsistencies, when calculating the
hamming distance of two templates, one template is shifted
left and right bit-wise and a number of hamming distance
values are calculated from each shifts. This bit-wise shifting
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
All Rights Reserved © 2012 IJARCET
922
in the horizontal direction corresponds to rotation of the
original iris region by an angle given by the angular resolution
used. If an angular resolution of 360 is used, each shift will
corresponds to a rotation of 1 degree in the iris region. This
method corrects misalignments in the normalized iris pattern
caused by rotational differences during imaging.
From the calculated Hamming distance values, only the
lowest is taken, since this corresponds to the best match
between the two templates. The actual number of shifts
required to normalise rotational inconsistencies will be
determined by the maximum angle difference between two
images of the same eye. For our set of eye images, a rotational
inconsistency was a maximum of 24 degrees hence, shift of -8
to +8 bits. The template that is generated in the feature
encoding process will need a corresponding matching metric
system, which gives a measure of similarity between two iris
templates. This metric system should give one range of values
when comparing templates generated from the same eye,
known as intra-class comparisons, and another range of
values when comparing templates created from different
irises, known as inter-class comparisons. These two cases
should give distinct and separate values, so that a decision can
be made high confidence as to whether two templates are from
the same iris, or from two different irises.
Figure 4: An Illustration of encoding Process
A. Hamming Distance(HD)
The Hamming Distance (HD) gives a measure of how
many bits are same between two bit patterns [7], [8]. Using
the hamming distance of two bit patterns, a decision can be
made as to whether the two patterns were generated from
different irises or from the same one.
In comparing the bit patterns X and Y, the HD, is defined
as the sum of disagreeing bits (Sum of the exclusive-OR
between X and Y) over N, The total number of bits in the bit
pattern.
TABLE I
TRUTH TABLE OF XOR
Truth Table of XOR
X Y Result
0 0 0
0 1 1
1 0 1
1 1 0
]
,
1
0
,
[),(
kj
y
n
k
ki
yji
HAD
d 


  (4)
In the equation dHAD
is the Hamming distance between the
objects i and j, k is the index of the respective variable reading
y out of the total number of variables n. The Hamming
distance it gives the number of mismatches between the
variables paired by k. Each iris region will produce a
bit-pattern which is independent to that produced by another
iris, on the other hand, two iris codes produced from the same
iris will be highly correlated. If two bits patterns are
completely independent, such as iris templates generated
from different irises, the hamming distance between the two
patterns should be equal to 0.5. This occurs because
independence implies the two bit patterns will be totally
random, so there is 50 percent chance of setting any bit to 1,
and vice versa. Therefore, half of the bits will agree and half
will disagree between the two patterns.
If two patterns are derived from the same iris, The HD
between them will be close to 0.0. Since they are highly
correlated and the bits should agree between the two iris
codes. The hamming distance is the matching metric
employed by daugman, and calculation of the hamming
distance is taken only with bits that are generated from the
actual iris region. Matching process requires a threshold value
of HD to decide whether the iris of and authenticated user or
an imposer. Deciding this threshold value requires
comparison between inter-class and intra-class distribution.
One filter is used to encode the templates, so only two bits
are moved during a shift. The lowest Hamming Distance, in
this case zero, is then used since this corresponds to the best
match between the two templates. The iris code is represented
by 256 bytes, or 2048 bits, but the iris only has 250 degrees of
freedom (not 2048). The reason for this is that the furrow and
ciliary processes tends to propagate across a significant radial
distance in the iris, and thus making the iris code less
independent. Also, Inherent correlations are introduced by the
band pass property of the 2-D Gabor filters, specifically by
the finite bandwidth determined by parameters.
The number of independent degrees-of-freedom that
remains in an iris code after these two sources of correlation
has been removed, can be estimated by examining the
distribution of hamming distances computed across a
population of unrelated iris codes. Comparing each pair of iris
codes A and B bit-by-bit, their normalized Hamming distance
HD is defined as the fraction of disagreeing bits between
them.
j
BXOR
j
j
AHD )(
2048
1
2048
1


 (5)
Where the Boolean operator (XOR) equals 1, the two bits
Aj and Bj are different. Each of the bits in an iris code has an
equal chance of being 1 or 0, this means that there is a 50
percent chance that any pair of bits in an iris code, this means
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
923
All Rights Reserved © 2013 IJARCET
that if the iris code consisted of only independent bits, the
hamming distances would be a binominal distribution with
p=0, 5 and N=2048(Hence a peak around 1024). Adding the
2D Gabor filters, the new distributed Hamming distances
would have a distributions of p= 0, 5 and N=506, where all of
the iris code are without any correlations. This measured
distribution of Hamming distances, generated from 2064
comparisons between unrelated pairs of iris codes.
Here the mean is 497,0 and the standard derivation is
 =0,038. This distribution of hamming distances is
equivalent to a binominal process with N=173 Bernoulli trials
per run and p=0,5 which as it turns out corresponds to about
173 independent binary degrees of freedom remaining in a
2048-bit iris code(This number varies in each measure, and is
often closer to 250 as mentioned before). This means that the
probability of two irises having the same iris code by chance
in these distributions, is in the order 1052
= (2173
).
Hamming distributions contains unrelated iris codes, but
there still remains the problem of determining at what
hamming distance a sampled iris code should be considered
an authentic, or an imposer. There are lot of the same iris. The
following figure models the hamming distance measured for
9.1 million eyes to the left the Hamming distance of 7070
different pairs of same-eye images at different times, under
different conditions, and usually with different cameras.
Here, the Hamming distance is 0, because there is
absolutely no overlapping between the two distributions.
Since the camera conditions almost never will be the same for
two different images of neither the same eye nor different eyes.
That means there always will be a chance for failing the test,
either by saying that a sample is authentic. One will always
have to find a balance between these two states of error,
because the reducing one will make the other grow. A way of
calibrating this is calculating its decidability index, d’:
2/)2221(
21
'




d (6)
d’ Measures how well separated the two distributions are.
It is based on the means, 1
and 2 their standard derivatives,
1 and  2 .The higher the value of d’, the more separated are
the distribution of the distributions of the imposers and the
authentic.
B. Uniqueness of patterns
The first test was to confirm the uniqueness of iris patterns.
Testing the uniqueness of iris patterns is important, since
recognition relies on iris patterns from different eyes being
entirely independent, with failure of a test statistical
independence resulting in a match. Uniqueness was
determined by comparing templates generated from different
eyes to each other, and examining the distribution of hamming
distance values produced. This distribution is known as the
inter-class distribution.
C. Recognition of Individuals
The main objective of an iris recognition system able to
achieve a distinct separation on intra-class and inter-class
hamming distance distributions. A separation or threshold
value of hamming distance can be chosen which allows a
decision to be made when comparing two templates. If the
hamming distance between two templates is less than the
threshold, the templates were generated from the same iris
and a match is found. Otherwise if the hamming distance is
greater than the threshold the two templates are considered to
have been generated from different irises.
The distance between the minimum hamming distance
value for inter-class comparisons and maximum hamming
distance value for intra-class comparisons could be used as a
metric to measure separation. However, this is not a very
accurate measure since outliers will corrupt the value
calculated, and the measure is dependent on the number of iris
templates compared. A better metric is decidability, which
takes into account the mean and standard deviation of the
intra-class and inter-class distributions.
Decidability d’ is a distance measured in standard
deviations and is a function of the magnitude of difference
between the mean of the intra-class distribution
s
 and the
mean of the inter-class distribution
D
 , and also the standard
deviation of the intra-class and inter-class distributions s
2

and D
2
 respectively. The higher decidability and greater
separation provides more accurate recognition by Intra-class
and inter-class distributions. However, the intra-class
distributions may have some overlap, which would result in a
number of incorrect matches or false accepts, and a number of
mismatches or false rejects.
The Correct reject rate, also known as type I error, and
measures the probability of an enrolled individual not being
identified by the system. The false accept rate (FAR), also
known as Type II error, measures the probability of an
individual being wrongly identified as another individual.
The false accept and false reject rates can be calculated by
the amount of overlap between two distributions, which is
illustrated in Figure 5. The false accept rate is defined by the
normalized area between 0 and the separation point, K, in the
inter-class distributions Pdiff. The false reject rate is defined as
the normalized area between the threshold, K, and l in the
intra-class distribution Psame.
Irises were encoded by convolving the normalized iris
region with 1D Log-Gabor filters and phase quantizing the
output in order to produce a bit-wise biometric template.
Encoding depended upon the filter parameters and optimum
filter parameters were chosen according to decidability factor.
Figure 5: Intra-class and Inter-Class Hamming Distance
Distributions with Overlap and Threshold at 0.35.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
All Rights Reserved © 2012 IJARCET
924
VI. EXPERIMENTAL RESULTS
Table 2: Inter-class Hamming Distance
No Shift 8 Shift left and right
0.4015 0.3880
0.4007 0.3882
0.4017 0.3832
0.4023 0.3817
0.4090 0.3851
0.4016 0.3848
0.4102 0.3857
0.4122 0.3943
0.4157 0.4036
0.4122 0.3984
0.4078 0.3898
0.4111 0.3932
0.4203 0.3848
0.4087 0.3866
0.4017 0.3892
The inter-class hamming distance distributions fairly
conform to the theory of statistical independence i.e. unique,
since the mean of the distributed near to 0.5. After introducing
shifting the mean inter-class hamming distance value
decreased as expected.
Since information on filter parameters for encoding iris
templates was lacking. The best filters parameters were found
through statistical trial and error experimentations.
Filter parameters for which decidability factors were
highest were taken, to maximize inter-class and intra-class
filter distribution.
Table 3: Decidability (for  /f=0.5)
min

s

s

d

d
 d’
18 0.2875 0.0968 0.3710 0.0065 1.01
19 0.2873 0.0967 0.3712 0.0068 1.22
20 0.2866 0.0966 0.3706 0.0063 1.22
21 0.2869 0.0966 0.3706 0.0065 1.21
22 0.2867 0.0967 0.3700 0.0073 1.21
The Maximum decidability factor is 1.2268 for
50.0/ f and 20 .
VII. CONCLUSIONS
Successfully a new iris recognition system capable of
comparing two digital eye-images is developed. The
identification system is quite simple requiring few
components and is effective enough to be integrated within
security systems that require an identity check. The errors that
occurred can be easily overcome by the use of stable
equipment. Judging by the clear distinctiveness of the iris
patterns we can expect iris recognition systems to become the
leading technology in identity verification.
Segmented iris images were encoded in-to bit-wise
biometric template by convolving the normalized iris region
with 1-D Log Gabor filters and phase quantizing. The
Hamming distance was chosen as a matching metric, to
compare two-biometric templates. Optimum threshold was
calculated experimentally by finding optimum filter
parameters. A match occurred if the compared Hamming
distance is less than calculated threshold of 0.36.
REFERENCES
[1] Mark S. Nixon and alberto S.Aguado, “Feature extraction and image
processing” 2002..
[2] J.G Daugman, “Complete discrete 2-D Gabor transforms by neural
networks for image analysis and compression,” IEEE Transaction
Acoustic, Speech, Signal Processing, vol 36, 1988, P.1169-1179.
[3] C.H. Daouk, L.A. Ei-Esber,F.D. Kammoun and M.A. Al Alaoui, “Iris
Reconition”, IEEE ISSPIT 2002, Marrakesh-PP 558-562.
[4] Sandipan P.Narote, Abhilasha S, Narote and Laxman M.Waghmare,
“Iris recoginition System Using Wavelet Transform” IJCNS
International Journal of computer Science and Network Security, Vol
9, No.11, November 2009.
[5] Wen-Shiung chen,Kun-huel chih, sheng-Wen and Chih-ming Hsieh,
“Personal Identification with Human Iris Recognition based on
wavelet Transform” MVA2005 IAPR Conference on Machine Vision
Applications, May 16-18, 2005 Tsukuba Science City,Japan.
[6] Jafar M.H.Ali and about Ella Hassanien, “A Human Iris Recognition
Techniques to Enhance E-Security Environment Using Wavelet
Transform”,Intrernational Conference WWW/Internet 2003.
[7] Somnath Dey and Debasis Samanta, “Improved Feature Processing
for Iris Biometric Authentication System”, Intenational Journal of
Electrical and Electronics Engineering 4:2 2010
[8] Makram Nabti, Lahouari Ghouti and Ahmed Bouridane, “An
effective and fast recognition system based on a combined multiscale
feature extraction technique”, The Journal of the Pattern Recognition
security 41 2008 PP.868-879.
AUTHORS
Thirunavu Karthikeyan received his graduate degree in
Mathematics from Madras University in 1982. Post graduate
degree in Applied Mathematics from Bharathidasan University in
1984. Received Ph.D., in Computer Science from Bharathiar
University in 2009. Presently he is working as a Associate
Professor in Computer Science Department of P.S.G. College of
Arts and Science, Coimbatore. His research interests are Image
Coding, Medical Image Processing and Data mining. He has
published many papers in national and international conferences and
journals. He has completed many funded projects with excellent
comments. He has contributed as a program committee member
for a number of international conferences. He is the review board
member of various reputed journals. He is a board of studies member
for various autonomous institutions and universities.
Sabarigiri.B received the M.C.A., M.Phil. Degree in Computer
Science in 2007, 2010 receptively and is currently working towards
the PhD degree in computer science at PSG College of Arts and
Science, Coimbatore. He involved in the development of a
multimodal biometric system which includes Iris and EEG. He has
published 7 papers in national and international conferences and
journals. His areas of interest include Biometrics, Fusion Techniques
and Neuro Imaging.

Mais conteúdo relacionado

Mais procurados

EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEIAEME Publication
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 
A Comparative Study of Image Denoising Techniques for Medical Images
A Comparative Study of Image Denoising Techniques for Medical ImagesA Comparative Study of Image Denoising Techniques for Medical Images
A Comparative Study of Image Denoising Techniques for Medical ImagesIRJET Journal
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...eSAT Journals
 
A New Technique of Extraction of Edge Detection Using Digital Image Processing
A New Technique of Extraction of Edge Detection Using Digital  Image Processing A New Technique of Extraction of Edge Detection Using Digital  Image Processing
A New Technique of Extraction of Edge Detection Using Digital Image Processing IJMER
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSING
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSINGAN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSING
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSINGcscpconf
 
Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionShashank Dhariwal
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...sipij
 
Paper id 212014133
Paper id 212014133Paper id 212014133
Paper id 212014133IJRAT
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Publishing House
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)IAESIJEECS
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...INFOGAIN PUBLICATION
 
A novel method for character segmentation of vehicle
A novel method for character segmentation of vehicleA novel method for character segmentation of vehicle
A novel method for character segmentation of vehicleeSAT Publishing House
 
Shadow Detection and Removal Techniques A Perspective View
Shadow Detection and Removal Techniques A Perspective ViewShadow Detection and Removal Techniques A Perspective View
Shadow Detection and Removal Techniques A Perspective Viewijtsrd
 

Mais procurados (20)

EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
A Comparative Study of Image Denoising Techniques for Medical Images
A Comparative Study of Image Denoising Techniques for Medical ImagesA Comparative Study of Image Denoising Techniques for Medical Images
A Comparative Study of Image Denoising Techniques for Medical Images
 
B221223
B221223B221223
B221223
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...
 
A New Technique of Extraction of Edge Detection Using Digital Image Processing
A New Technique of Extraction of Edge Detection Using Digital  Image Processing A New Technique of Extraction of Edge Detection Using Digital  Image Processing
A New Technique of Extraction of Edge Detection Using Digital Image Processing
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSING
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSINGAN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSING
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSING
 
Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
 
Paper id 212014133
Paper id 212014133Paper id 212014133
Paper id 212014133
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...
 
A novel method for character segmentation of vehicle
A novel method for character segmentation of vehicleA novel method for character segmentation of vehicle
A novel method for character segmentation of vehicle
 
Iw3515281533
Iw3515281533Iw3515281533
Iw3515281533
 
Shadow Detection and Removal Techniques A Perspective View
Shadow Detection and Removal Techniques A Perspective ViewShadow Detection and Removal Techniques A Perspective View
Shadow Detection and Removal Techniques A Perspective View
 

Semelhante a Ijarcet vol-2-issue-3-920-924

AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...IJEEE
 
A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionIJECEIAES
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONsipij
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...IRJET Journal
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
VHDL Design for Image Segmentation using Gabor filter for Disease Detection
VHDL Design for Image Segmentation using Gabor filter for Disease DetectionVHDL Design for Image Segmentation using Gabor filter for Disease Detection
VHDL Design for Image Segmentation using Gabor filter for Disease DetectionVLSICS Design
 
Surface generation from point cloud.pdf
Surface generation from point cloud.pdfSurface generation from point cloud.pdf
Surface generation from point cloud.pdfssuserd3982b1
 
A Novel Method for Detection of Architectural Distortion in Mammogram
A Novel Method for Detection of Architectural Distortion in MammogramA Novel Method for Detection of Architectural Distortion in Mammogram
A Novel Method for Detection of Architectural Distortion in MammogramIDES Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Semelhante a Ijarcet vol-2-issue-3-920-924 (20)

Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
 
MEDICAL IMAGE SEGMENTATION FOR DISEASE DETECTION USING DIGITAL FILTER
MEDICAL IMAGE SEGMENTATION FOR DISEASE DETECTION USING DIGITAL FILTERMEDICAL IMAGE SEGMENTATION FOR DISEASE DETECTION USING DIGITAL FILTER
MEDICAL IMAGE SEGMENTATION FOR DISEASE DETECTION USING DIGITAL FILTER
 
A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and Recognition
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
 
E017443136
E017443136E017443136
E017443136
 
Iris sem
Iris semIris sem
Iris sem
 
F05843238
F05843238F05843238
F05843238
 
K010236168
K010236168K010236168
K010236168
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
 
366 369
366 369366 369
366 369
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
 
F41014349
F41014349F41014349
F41014349
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Ijcet 06 09_001
Ijcet 06 09_001Ijcet 06 09_001
Ijcet 06 09_001
 
VHDL Design for Image Segmentation using Gabor filter for Disease Detection
VHDL Design for Image Segmentation using Gabor filter for Disease DetectionVHDL Design for Image Segmentation using Gabor filter for Disease Detection
VHDL Design for Image Segmentation using Gabor filter for Disease Detection
 
Surface generation from point cloud.pdf
Surface generation from point cloud.pdfSurface generation from point cloud.pdf
Surface generation from point cloud.pdf
 
A Novel Method for Detection of Architectural Distortion in Mammogram
A Novel Method for Detection of Architectural Distortion in MammogramA Novel Method for Detection of Architectural Distortion in Mammogram
A Novel Method for Detection of Architectural Distortion in Mammogram
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Mais de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Mais de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Ijarcet vol-2-issue-3-920-924

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 All Rights Reserved © 2012 IJARCET 920  Abstract— Recognize people identity becomes an essential problem, Iris based biometric system provides accurate personal identification. Feature encoding and pattern matching are major task in the iris recognition. In our proposed system gives how to set a model to extract the feature of different irises and match them is especially important for it determines the results of the whole system directly. Gabor wavelets are able to provide optimum conjoint representation of a signal in space and spatial frequency. A Gabor filter is constructed by modulating a sine/cosine wave with a Gaussian. Feature Encoding was implemented by convolving the normalised iris pattern with 1-D Gabor filters. For Matching hamming distance will be calculated and accurate recognition was achieved. Keywords— Feature Encoding, Gabor Filters, 1-D Gabor Filters, Hamming Distance, Pattern Matching I. INTRODUCTION Iris Segmentation and Edge Detection Provides abundant texture information. Feature selection and extraction is to find out important features to perform matching. The visible features of an iris are ciliary processes, contraction furrows, crypts, rings, cornea, and freckles and so on. To set a model to extract the feature of different irises and match them is especially important for it determines the results of the whole system directly. A feature vector is formed which consists of the ordered sequence of features extracted from the various representation of the images. In order to provide accurate recognition of individuals, The Most discriminating information present in an iris pattern must be extracted. Only the significant features of the iris must be encoded so that comparisons between templates can be made. Most Iris recognition systems make use of a band pass decomposition of the image to create biometric templates. II. MATERIALS AND METHODS A. Gabor Filters Gabor wavelets are able to provide optimum conjoint representation of a signal in space and spatial frequency. A Gabor filter [1], [2] is constructed by modulating a sine/cosine wave with a Gaussian. A 2-D Gabor filter over an image domain (x, y) is represented as: Manuscript received March 03, 2013. T.Karthikeyan, Department of Computer Science, PSG College of arts and Science. Coimbatore, INDIA, B.Sabarigiri, Department of Computer Science, PSG College of arts and Science, Coimbatore, INDIA, +91-97882-06468. )]0(0)0(0[2 ]2/2)0(2/2)0[( ),( yyvxxui e yyxx eyxG      (1) Figure 1: A quadrature pair of 2D Gabor Filters, (a) Depicts the real component or even symmetric filter characterised by a cosine modulated by a Gaussian and (b) Depicts the imaginary component or odd symmetric filter characterised by a sine modulated by a Gaussian. Where equation 1 (x0, y0) Specify position in the image, ),(  Specify the effective width and length, And (u0, v0) Specify modulation, which has spatial frequency 2 0 2 0 0 vu  This is able to provide the optimum conjoint localisation in both space and frequency, since a sine wave is perfectly localised in frequency, but not localised in space. Modulation of sine with a Gaussian provides localisation in space, through with loss of localisation in frequency. Decomposition of a signal is accomplished using a quadrature pair of Gabor filters, with a real part specified by a sine modulated by a Gaussian. The real and imaginary filters are also known as the even symmetric and odd symmetric components respectively. The center frequency of the filter specified by the frequency of the sine/cosine wave, and the bandwidth of the filter is specified by the width of the Gaussian. Daugman makes use of a 2-D version of Gobar filters in order to encode iris pattern data. Daugman demodulated the output of the Gabor filters in order to compress the data. This is done by quantising the phase information into four levels, for each possible quadrant in the complex plane. Taking only the phase will allow encoding of discriminating information in the iris, while discarding redundant information such as illumination, which is represented by the amplitude component. These four levels are represented using two bits of data, so each pixel in the normalised iris patterns to two bits of data in the iris template. A total of 9600 bits are calculated for the template, and an equal number of masking bits are generated in order to mask out corrupted regions within the iris. This creates a compact 1200-byte template, which allows for efficient storage and comparison of irises. The daugman system makes of polar An Efficient Iris Feature Encoding and Pattern Matching for Personal Identification T.Karthikeyan1 , B.Sabarigiri2
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 921 All Rights Reserved © 2013 IJARCET co-ordinates for normalization, therefore in polar form the filters are given as: 2/2) 0 (2/2) 0 () 0 ( ),(     i e rr e i erh (2) ( 0 , 0 r ) Specify the centre frequency of the filter. III. IRIS CODE CONSTRUCTION AND ENTROPY MEASURES A. The Iris Code The 2-D Gabor filters used for iris recognition are defined the doubly dimensions polar co-ordinate system ),( r as shown in figure 2, 2-D Gabor Filter Equation is as follows. 2/2) 0 (2/2) 0 () 0 ( ),(     i e rr e i erG (3) The real parts of the 2D Gabor filters are slightly adjusted through truncation to give them zero volume, and hence no DC response, so that computed iris code bits do not depend upon the strength of illumination (The imaginary parts of the filters have no DC response because of odd symmetry). Figure 2: Gabor Filter at 0 Degree Orientation Figure 3: Phase-Quadrant Iris Demodulation Code The parameters  and  co-vary in inverse proportion  to generate a self- similar, multi-scale wavelet family of 2D frequency-selective quadrate filters with constant logarithmic bandwidth, whose locations, specified by 0  and 0 r , range across the zones of analysis of the iris. Each bit, h, in an iris code is regarded as a co-ordinate of one of the four vertices of a logical unit square in the complex plane It is composed by evaluating the sign of the iris image, I( , ), on to a particular complex 2D Gabor filter. B. Commensurability of Iris Codes A very important aspect of iris coding approach is to achieve commensurability among the iris codes. This is done by mapping all irises into a representation having universal format and constant length, regardless of the apparent amount of iris detail. If there were no commensurability among the codes, showing partial agreement and partial disagreement in their lists of features, in this case, there is no straight ahead mathematically solution for how one would be able to make objective decisions and compute confidence levels. Therefore commensurability is necessary to facilitate and objectify the code comparison process, and the computation of confidence levels for each decision. It also speeds up the whole process of iris recognition as well as increasing the reliability. IV.IRIS ENCODING For Encoding, we have used log-Gabor filter because it covers more spectrum and eliminates DC component of the images. Feature encoding was implemented by convolving the normalized iris pattern with 1-D Log Gabor Wavelets. The 2-D normalized pattern is broken up into a number of 1-D signals, and then these 1-D signals are convolved with 1-D Gabor Wavelets [3]-[6]. The rows of the 2-D normalized pattern are taken as the 1-D signal. Each row corresponds to circular ring on the iris region. The angular direction is taken rather than the radial one, which corresponds to columns of the normalized pattern, since maximum independence occurs in the angular direction. The intensity values at known noise areas in the normalized pattern are set to the average intensity of surrounding pixels to prevent intense of noise in the output of the filtering. The output of filtering is then phase quantized to four levels using the daugman method, with each filter producing two bits of data for each phases. The output of phase quantisation is chosen to be grey code, so that when going from one quadrant to another, only one bit changes. This will minimize the number of bits disagreeing, if say two intra-class patterns are sightly misaligned and thus will provide more accurate recognition. Therefore, the encoding process produced a bitwise template containing a number of bits of information, and a corresponding noise mask which corresponds to corrupt areas within the iris pattern, and marks bits in the template as corrupt. V. MATCHING OF IRIS PATTERNS For matching, the hamming distance was chosen as a metric for recognition, since bit-wise comparisons between biometric iris templates were required. The Hamming distance also incorporates noise masking, so that only significant bits are used between to iris templates. The hamming distance will be calculated using only the bits generated from the true iris region [7], [8]. Although, in theory, two iris templates generated from the same iris should have a Hamming distance of 0, in practice this will not occur because normalization is not perfect due to noise that goes undetected. So some variation will be present when comparing two intra-class iris templates. In order to account for rotational inconsistencies, when calculating the hamming distance of two templates, one template is shifted left and right bit-wise and a number of hamming distance values are calculated from each shifts. This bit-wise shifting
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 All Rights Reserved © 2012 IJARCET 922 in the horizontal direction corresponds to rotation of the original iris region by an angle given by the angular resolution used. If an angular resolution of 360 is used, each shift will corresponds to a rotation of 1 degree in the iris region. This method corrects misalignments in the normalized iris pattern caused by rotational differences during imaging. From the calculated Hamming distance values, only the lowest is taken, since this corresponds to the best match between the two templates. The actual number of shifts required to normalise rotational inconsistencies will be determined by the maximum angle difference between two images of the same eye. For our set of eye images, a rotational inconsistency was a maximum of 24 degrees hence, shift of -8 to +8 bits. The template that is generated in the feature encoding process will need a corresponding matching metric system, which gives a measure of similarity between two iris templates. This metric system should give one range of values when comparing templates generated from the same eye, known as intra-class comparisons, and another range of values when comparing templates created from different irises, known as inter-class comparisons. These two cases should give distinct and separate values, so that a decision can be made high confidence as to whether two templates are from the same iris, or from two different irises. Figure 4: An Illustration of encoding Process A. Hamming Distance(HD) The Hamming Distance (HD) gives a measure of how many bits are same between two bit patterns [7], [8]. Using the hamming distance of two bit patterns, a decision can be made as to whether the two patterns were generated from different irises or from the same one. In comparing the bit patterns X and Y, the HD, is defined as the sum of disagreeing bits (Sum of the exclusive-OR between X and Y) over N, The total number of bits in the bit pattern. TABLE I TRUTH TABLE OF XOR Truth Table of XOR X Y Result 0 0 0 0 1 1 1 0 1 1 1 0 ] , 1 0 , [),( kj y n k ki yji HAD d      (4) In the equation dHAD is the Hamming distance between the objects i and j, k is the index of the respective variable reading y out of the total number of variables n. The Hamming distance it gives the number of mismatches between the variables paired by k. Each iris region will produce a bit-pattern which is independent to that produced by another iris, on the other hand, two iris codes produced from the same iris will be highly correlated. If two bits patterns are completely independent, such as iris templates generated from different irises, the hamming distance between the two patterns should be equal to 0.5. This occurs because independence implies the two bit patterns will be totally random, so there is 50 percent chance of setting any bit to 1, and vice versa. Therefore, half of the bits will agree and half will disagree between the two patterns. If two patterns are derived from the same iris, The HD between them will be close to 0.0. Since they are highly correlated and the bits should agree between the two iris codes. The hamming distance is the matching metric employed by daugman, and calculation of the hamming distance is taken only with bits that are generated from the actual iris region. Matching process requires a threshold value of HD to decide whether the iris of and authenticated user or an imposer. Deciding this threshold value requires comparison between inter-class and intra-class distribution. One filter is used to encode the templates, so only two bits are moved during a shift. The lowest Hamming Distance, in this case zero, is then used since this corresponds to the best match between the two templates. The iris code is represented by 256 bytes, or 2048 bits, but the iris only has 250 degrees of freedom (not 2048). The reason for this is that the furrow and ciliary processes tends to propagate across a significant radial distance in the iris, and thus making the iris code less independent. Also, Inherent correlations are introduced by the band pass property of the 2-D Gabor filters, specifically by the finite bandwidth determined by parameters. The number of independent degrees-of-freedom that remains in an iris code after these two sources of correlation has been removed, can be estimated by examining the distribution of hamming distances computed across a population of unrelated iris codes. Comparing each pair of iris codes A and B bit-by-bit, their normalized Hamming distance HD is defined as the fraction of disagreeing bits between them. j BXOR j j AHD )( 2048 1 2048 1    (5) Where the Boolean operator (XOR) equals 1, the two bits Aj and Bj are different. Each of the bits in an iris code has an equal chance of being 1 or 0, this means that there is a 50 percent chance that any pair of bits in an iris code, this means
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 923 All Rights Reserved © 2013 IJARCET that if the iris code consisted of only independent bits, the hamming distances would be a binominal distribution with p=0, 5 and N=2048(Hence a peak around 1024). Adding the 2D Gabor filters, the new distributed Hamming distances would have a distributions of p= 0, 5 and N=506, where all of the iris code are without any correlations. This measured distribution of Hamming distances, generated from 2064 comparisons between unrelated pairs of iris codes. Here the mean is 497,0 and the standard derivation is  =0,038. This distribution of hamming distances is equivalent to a binominal process with N=173 Bernoulli trials per run and p=0,5 which as it turns out corresponds to about 173 independent binary degrees of freedom remaining in a 2048-bit iris code(This number varies in each measure, and is often closer to 250 as mentioned before). This means that the probability of two irises having the same iris code by chance in these distributions, is in the order 1052 = (2173 ). Hamming distributions contains unrelated iris codes, but there still remains the problem of determining at what hamming distance a sampled iris code should be considered an authentic, or an imposer. There are lot of the same iris. The following figure models the hamming distance measured for 9.1 million eyes to the left the Hamming distance of 7070 different pairs of same-eye images at different times, under different conditions, and usually with different cameras. Here, the Hamming distance is 0, because there is absolutely no overlapping between the two distributions. Since the camera conditions almost never will be the same for two different images of neither the same eye nor different eyes. That means there always will be a chance for failing the test, either by saying that a sample is authentic. One will always have to find a balance between these two states of error, because the reducing one will make the other grow. A way of calibrating this is calculating its decidability index, d’: 2/)2221( 21 '     d (6) d’ Measures how well separated the two distributions are. It is based on the means, 1 and 2 their standard derivatives, 1 and  2 .The higher the value of d’, the more separated are the distribution of the distributions of the imposers and the authentic. B. Uniqueness of patterns The first test was to confirm the uniqueness of iris patterns. Testing the uniqueness of iris patterns is important, since recognition relies on iris patterns from different eyes being entirely independent, with failure of a test statistical independence resulting in a match. Uniqueness was determined by comparing templates generated from different eyes to each other, and examining the distribution of hamming distance values produced. This distribution is known as the inter-class distribution. C. Recognition of Individuals The main objective of an iris recognition system able to achieve a distinct separation on intra-class and inter-class hamming distance distributions. A separation or threshold value of hamming distance can be chosen which allows a decision to be made when comparing two templates. If the hamming distance between two templates is less than the threshold, the templates were generated from the same iris and a match is found. Otherwise if the hamming distance is greater than the threshold the two templates are considered to have been generated from different irises. The distance between the minimum hamming distance value for inter-class comparisons and maximum hamming distance value for intra-class comparisons could be used as a metric to measure separation. However, this is not a very accurate measure since outliers will corrupt the value calculated, and the measure is dependent on the number of iris templates compared. A better metric is decidability, which takes into account the mean and standard deviation of the intra-class and inter-class distributions. Decidability d’ is a distance measured in standard deviations and is a function of the magnitude of difference between the mean of the intra-class distribution s  and the mean of the inter-class distribution D  , and also the standard deviation of the intra-class and inter-class distributions s 2  and D 2  respectively. The higher decidability and greater separation provides more accurate recognition by Intra-class and inter-class distributions. However, the intra-class distributions may have some overlap, which would result in a number of incorrect matches or false accepts, and a number of mismatches or false rejects. The Correct reject rate, also known as type I error, and measures the probability of an enrolled individual not being identified by the system. The false accept rate (FAR), also known as Type II error, measures the probability of an individual being wrongly identified as another individual. The false accept and false reject rates can be calculated by the amount of overlap between two distributions, which is illustrated in Figure 5. The false accept rate is defined by the normalized area between 0 and the separation point, K, in the inter-class distributions Pdiff. The false reject rate is defined as the normalized area between the threshold, K, and l in the intra-class distribution Psame. Irises were encoded by convolving the normalized iris region with 1D Log-Gabor filters and phase quantizing the output in order to produce a bit-wise biometric template. Encoding depended upon the filter parameters and optimum filter parameters were chosen according to decidability factor. Figure 5: Intra-class and Inter-Class Hamming Distance Distributions with Overlap and Threshold at 0.35.
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 All Rights Reserved © 2012 IJARCET 924 VI. EXPERIMENTAL RESULTS Table 2: Inter-class Hamming Distance No Shift 8 Shift left and right 0.4015 0.3880 0.4007 0.3882 0.4017 0.3832 0.4023 0.3817 0.4090 0.3851 0.4016 0.3848 0.4102 0.3857 0.4122 0.3943 0.4157 0.4036 0.4122 0.3984 0.4078 0.3898 0.4111 0.3932 0.4203 0.3848 0.4087 0.3866 0.4017 0.3892 The inter-class hamming distance distributions fairly conform to the theory of statistical independence i.e. unique, since the mean of the distributed near to 0.5. After introducing shifting the mean inter-class hamming distance value decreased as expected. Since information on filter parameters for encoding iris templates was lacking. The best filters parameters were found through statistical trial and error experimentations. Filter parameters for which decidability factors were highest were taken, to maximize inter-class and intra-class filter distribution. Table 3: Decidability (for  /f=0.5) min  s  s  d  d  d’ 18 0.2875 0.0968 0.3710 0.0065 1.01 19 0.2873 0.0967 0.3712 0.0068 1.22 20 0.2866 0.0966 0.3706 0.0063 1.22 21 0.2869 0.0966 0.3706 0.0065 1.21 22 0.2867 0.0967 0.3700 0.0073 1.21 The Maximum decidability factor is 1.2268 for 50.0/ f and 20 . VII. CONCLUSIONS Successfully a new iris recognition system capable of comparing two digital eye-images is developed. The identification system is quite simple requiring few components and is effective enough to be integrated within security systems that require an identity check. The errors that occurred can be easily overcome by the use of stable equipment. Judging by the clear distinctiveness of the iris patterns we can expect iris recognition systems to become the leading technology in identity verification. Segmented iris images were encoded in-to bit-wise biometric template by convolving the normalized iris region with 1-D Log Gabor filters and phase quantizing. The Hamming distance was chosen as a matching metric, to compare two-biometric templates. Optimum threshold was calculated experimentally by finding optimum filter parameters. A match occurred if the compared Hamming distance is less than calculated threshold of 0.36. REFERENCES [1] Mark S. Nixon and alberto S.Aguado, “Feature extraction and image processing” 2002.. [2] J.G Daugman, “Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression,” IEEE Transaction Acoustic, Speech, Signal Processing, vol 36, 1988, P.1169-1179. [3] C.H. Daouk, L.A. Ei-Esber,F.D. Kammoun and M.A. Al Alaoui, “Iris Reconition”, IEEE ISSPIT 2002, Marrakesh-PP 558-562. [4] Sandipan P.Narote, Abhilasha S, Narote and Laxman M.Waghmare, “Iris recoginition System Using Wavelet Transform” IJCNS International Journal of computer Science and Network Security, Vol 9, No.11, November 2009. [5] Wen-Shiung chen,Kun-huel chih, sheng-Wen and Chih-ming Hsieh, “Personal Identification with Human Iris Recognition based on wavelet Transform” MVA2005 IAPR Conference on Machine Vision Applications, May 16-18, 2005 Tsukuba Science City,Japan. [6] Jafar M.H.Ali and about Ella Hassanien, “A Human Iris Recognition Techniques to Enhance E-Security Environment Using Wavelet Transform”,Intrernational Conference WWW/Internet 2003. [7] Somnath Dey and Debasis Samanta, “Improved Feature Processing for Iris Biometric Authentication System”, Intenational Journal of Electrical and Electronics Engineering 4:2 2010 [8] Makram Nabti, Lahouari Ghouti and Ahmed Bouridane, “An effective and fast recognition system based on a combined multiscale feature extraction technique”, The Journal of the Pattern Recognition security 41 2008 PP.868-879. AUTHORS Thirunavu Karthikeyan received his graduate degree in Mathematics from Madras University in 1982. Post graduate degree in Applied Mathematics from Bharathidasan University in 1984. Received Ph.D., in Computer Science from Bharathiar University in 2009. Presently he is working as a Associate Professor in Computer Science Department of P.S.G. College of Arts and Science, Coimbatore. His research interests are Image Coding, Medical Image Processing and Data mining. He has published many papers in national and international conferences and journals. He has completed many funded projects with excellent comments. He has contributed as a program committee member for a number of international conferences. He is the review board member of various reputed journals. He is a board of studies member for various autonomous institutions and universities. Sabarigiri.B received the M.C.A., M.Phil. Degree in Computer Science in 2007, 2010 receptively and is currently working towards the PhD degree in computer science at PSG College of Arts and Science, Coimbatore. He involved in the development of a multimodal biometric system which includes Iris and EEG. He has published 7 papers in national and international conferences and journals. His areas of interest include Biometrics, Fusion Techniques and Neuro Imaging.