SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 5 (May 2014), PP.20-25
20
Iris Eye Segmentation and by multiple FCM
Ziad M. Abood Rafal Naser Salah Haeder Raad Hamed
Mustansiriyah University/ College of Education/ Iraq- Baghdad2014
Abstract:-In this research, the fuzzy c-means (FCM) technique applied toeye’s iris segmentation and with
multiple and evaluation the accuracy of results.
Keywords: FCM, Iris eye, Digital Image Processing, segmentation, Matlab.
I. INTRODUCTION
1- Biometrics
Biometrics (or biometric authentication) refers to the identification of humans by their characteristics
or traits. Biometrics is used in computer science as a form of identification and access control [1]. It is also used
to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable
characteristics used to label and describe individuals [2].
Biometric identifiers are often categorized as physiological versus behavioral characteristics
[3]. Physiological characteristics are related to the shape of the body. Examples include, but are not limited
to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, retina and
odor/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited
to: typing rhythm, gait, and voice [2]. Some researchers have coined the term behavior metrics to describe the
latter class of biometrics [4].
More traditional means of access control include token-based identification systems, such as a driver's license or
passport, and knowledge-based identification systems, such as a password or personal identification number
[2]. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token
and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about
the ultimate use of this information [2, 5].
II. IRIS RECOGNITION
The Iris is located behind the cornea and in front of the crystalline lens. The Iris divides the space
behind the cornea into the anterior and posterior chamber, which contains aqueous fluid. The Iris is a colored
tissue which extends from the ciliary body and is apparent at all times. The color of the Iris is determined
genetically. [6]
The purpose of the Iris is to constrict or enlarge the aperture of the pupil. By doing this it determines the amount
of light that enters the pupil. In bright light the muscles of the Iris constrict the amount of light entering the
pupil, and in low light the muscles enlarge the pupil to allow more light to enter[6]. Figure (1) shows structures
of the eye and iris, and examples of iris [7, 8, 9].
(a) (b)
Iris Eye Segmentation and by multiple FCM
21
(c) gray brown green blue
Figure (1) (a) Structures of the eye, (b) Iris, front view (c) An examples of a iris
III. IMAGE SEGMENTATION
Image Segmentation is the process of partitioning a digital image into multiple segments (sets of pixels,
also known as super pixels). The goal of segmentation is to simplify and/or change the representation of an
image into something that is more meaningful and easier to analyze. Image segmentation is typically used to
locate objects and boundaries (lines, curves, etc.) in images. More precisely, image segmentation is the process
of assigning a label to every pixel in an image such that pixels with the same label share certain visual
characteristics.
The result of image segmentation is a set of segments that collectively cover the entire image, or a set
of contours extracted from the image (edge detection). Each of the pixels in a region is similar with respect to
some characteristic or computed property, such as color, intensity, or texture. Adjacent regions are significantly
different with respect to the same characteristic(s). [10, 11]
IV. FUZZY C-MEANS (FCM) TECHNIQUE
The logic fuzzy and digital image processing techniques play an important role in the fields of
medicine types both in terms of diagnosis or treatment, with and put a lot of software to control over how the
performance of the means of science and technology that have become available to workers so as to provide the
amount bulk of the scientific potential in Stenographer Levy shortly purpose and it greatly facilitates the
diagnosis. [12]
The geometric center and the scope of each sub class are calculated adaptivelytoreducethecostfunction in fuzzy
c-means clustering [13].This method employs the membership function μmn to find the degree of membership of
nth object to them-th cluster. The cost function in fuzzyc-means clustering is [13]:
… (1)
Where, Nis the image pixel, is the center value of m-th cluster, presents the total number of image pixels and
denotes total clusters. (l>1) controls the fuzziness of the result ant segmentation. The membership function sare
accountable to the following constraints:
… (2)
The membership functions and the geometric centers can be updated in each iteration as follows:
… (3)
In order to incorporate the spatial information in to the fuzzy clustering technique, Chuang et al. [14] proposed
the following fuzzy membership functions:
Iris Eye Segmentation and by multiple FCM
22
… (4)
Where p and q control the respective contributions and the variable hmn includes the spatial information.
V. RESULTS AND DISCUSSION
1. Algorithm and Results
Figure (2) show the general algorithm of present study.
Figure (2) Algorithm scheme illustrates the current study
Figure (3) show the results of FCM application with the images samples of irises human eye.
No. Original image FCM1 FCM2 FCM3
1.
2.
3.
Image acquisition
ROI Image
FCM
Image segmentation
Iris Eye Segmentation and by multiple FCM
23
4.
5.
6.
7.
8.
9.
10.
Figure (3) Algorithm scheme illustrates the current study
Table (2) shows the Results of the application of FCM segmentational gorithm with (25) images representing
the irises. Our FCM algorithm was implemented in MATLAB.
Iris Eye Segmentation and by multiple FCM
24
Table (2)
No.
image
FCM1 FCM2 FCM3
Iteration
count
obj. fcn Iteration
count
obj. fcn Iteration
count
obj. fcn
1. 1 2937.982714 12 414.274014 25 412.490762
2. 1 11791.860070 16 2999.116295 33 2993.763293
3. 1 1208.573425 20 372.052345 41 371.983357
4. 1 751.624070 20 228.584372 41 228.425655
5. 1 3405.280719 11 775.337023 23 773.764884
6. 1 4383.128560 17 1074.919033 34 1074.792780
7. 1 1153.563214 15 487.215489 30 391.254801
8. 1 5672.197708 15 1227.396679 31 1227.121581
9. 1 9402.423147 21 2350.188146 42 2349.677084
10. 1 3283.185220 17 2190.148270 34 2004.185220
The outputs of segmentation and classifies ofimages with one representing weed stem and
zerorepresenting other objects. Performances of the classifierswere evaluated using the misclassification rate
(MCR). The MCR is defined as the ratio between thenumber of non-stem pixels misclassified as stem pixels
andthe total number of non-stem pixels in the image. [15]
To measure the segmentation accuracy, we also apply the quantitative evaluation of performance by defining the
misclassification ratio (MCR), which isgiven by:[15]
Table (3) shows the value of MCR of FCM level for images.
Table (3)
No.
image
FCM1 FCM2 FCM3
1. 28.25% 10.01% 6.11%
2. 21.35% 9.21% 6.45%
3. 19.78% 11.74% 4.86%
4. 19.56% 12.89% 5.03%
5. 27.45% 10.23% 4.89%
6. 28.01% 9.41% 6.01%
7. 28.30% 9.11% 5.79%
8. 36.25% 12.78% 4.89%
9. 30.56% 11.54% 4.23%
10. 17.78% 10.89% 4.78%
VI. CONCLUSIONS
In this paper, the fuzzy C-means technique applied to segmentation of iris image, given good results
with level increases.
From the results show the process, the color of iris has a clear impact in the process of segmentation.
Blue color of iris shows a clearer segmentation of other colors.
REFERENCES
[1] Zetter, Kim (2012-07-25). "Reverse-Engineered Irises Look So Real, They Fool Eye-Scanners". Wired
Magazine.Retrieved 25 July 2012.
[2] Jain, A., Hong, L., Pankanti, S. (2000). "Biometric Identification".Communications of the ACM, 43(2),
p. 91-98.
[3] Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK;
[4] Weaver, A. C. (2006). "Biometric Authentication". Computer, 39 (2), p. 96-97.
[5] Sahoo, SoyujKumar; MahadevaPrasanna, SR, Choubisa, Tarun (2012). "Multimodal Biometric Person
Authentication : A Review". IETE Technical Review 29 (1): 54.
[6] A look at the Structure of The Eye, Help & Information, SelectSpecs.com, 2014.
pixelsofnumbertotal
pixelsdmisclassfeofnumber
=MCR
Iris Eye Segmentation and by multiple FCM
25
[7] "eye, human”. Encyclopedia Britannica from Encyclopedia Britannica 2006.
[8] Gold, Daniel H; Lewis, Richard; "Clinical Eye Atlas," pp. 396-397.
[9] Sensory Reception,“Human Vision: Structure and function of the Human Eye", vol. 27, p. 175
Encyclopedia Britannica, 1987.
[10] Linda G. Shapiro and George C. Stockman: “Computer Vision”, pp 279-325, New Jersey, Prentice-
Hall, ISBN 0-13-030796-3.2001.
[11] Barghout, Lauren, and Lawrence W. Lee. "Perceptual information processing system".Paravue Inc.
U.S. Patent Application 10/618,543, filed July 11, 2003.
[12] Nedeljkovic I., Image Classification Based On Fuzzy Logic, The International Archives of the
Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 34, Part XXX.
[13] B. Li, C. Chui, S. Chang, and S. Hong, “Integrating spatial fuzzy clustering with levelset methods for
automated medical image segmentation”, Comp. in Biology and Medicine, vol. 11, pp. 1-10, 2011.
[14] K. Chuang, H. Hzeng, S. Chen, J. Wu, and T. Chen, “Fuzzy c-means clustering with spatial
information for image segmentation,” Computerized Medical Imaging, and Graphics, vol. 30, pp. 9–15,
2006.
[15] Lei Jiang, Wenhui Yang A Modified Fuzzy C-Means Algorithm for Segmentation of Magnetic
Resonance Images, Proc. VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot
H., Ourselin S. and Adriaansen T. (Eds.), 10-12 Dec. 2003, Sydney.
‫الخالصة‬:

Mais conteúdo relacionado

Mais procurados

IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
 
Multi modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresMulti modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresijcga
 
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...IRJET Journal
 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...eSAT Journals
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESijcsit
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...IJECEIAES
 
Robust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofRobust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofijfcstjournal
 
A Spectral Domain Local Feature Extraction Algorithm for Face Recognition
A Spectral Domain Local Feature Extraction Algorithm for Face RecognitionA Spectral Domain Local Feature Extraction Algorithm for Face Recognition
A Spectral Domain Local Feature Extraction Algorithm for Face RecognitionCSCJournals
 
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...journalBEEI
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...IJECEIAES
 
Human Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierHuman Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierIJERA Editor
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGcsandit
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...IRJET Journal
 
PERIOCULAR RECOGNITION USING REDUCED FEATURES
PERIOCULAR RECOGNITION USING REDUCED FEATURESPERIOCULAR RECOGNITION USING REDUCED FEATURES
PERIOCULAR RECOGNITION USING REDUCED FEATURESijcsit
 
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...IJCSIS Research Publications
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPCSCJournals
 

Mais procurados (19)

IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
LazarusPatent2
LazarusPatent2LazarusPatent2
LazarusPatent2
 
Multi modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresMulti modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet features
 
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...
 
Robust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofRobust 3 d face recognition in presence of
Robust 3 d face recognition in presence of
 
Ijetcas14 315
Ijetcas14 315Ijetcas14 315
Ijetcas14 315
 
A Spectral Domain Local Feature Extraction Algorithm for Face Recognition
A Spectral Domain Local Feature Extraction Algorithm for Face RecognitionA Spectral Domain Local Feature Extraction Algorithm for Face Recognition
A Spectral Domain Local Feature Extraction Algorithm for Face Recognition
 
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
 
Human Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierHuman Segmentation Using Haar-Classifier
Human Segmentation Using Haar-Classifier
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
 
PERIOCULAR RECOGNITION USING REDUCED FEATURES
PERIOCULAR RECOGNITION USING REDUCED FEATURESPERIOCULAR RECOGNITION USING REDUCED FEATURES
PERIOCULAR RECOGNITION USING REDUCED FEATURES
 
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
 

Semelhante a Iris Eye Segmentation Using Fuzzy C-Means

Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...IAESIJAI
 
Quality assessment for online iris
Quality assessment for online irisQuality assessment for online iris
Quality assessment for online iriscsandit
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIJECEIAES
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
Iris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIRJET Journal
 
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINAAN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINAijait
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPIRJET Journal
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...CSCJournals
 
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...IRJET Journal
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSAM Publications
 
Prediction of Cognitive Imperiment using Deep Learning
Prediction of Cognitive Imperiment using Deep LearningPrediction of Cognitive Imperiment using Deep Learning
Prediction of Cognitive Imperiment using Deep LearningIRJET Journal
 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...ijcsit
 
IRJET- Brain Tumor Detection using Image Processing, ML & NLP
IRJET- Brain Tumor Detection using Image Processing, ML & NLPIRJET- Brain Tumor Detection using Image Processing, ML & NLP
IRJET- Brain Tumor Detection using Image Processing, ML & NLPIRJET Journal
 
IRJET - Brain Tumor Detection using Image Processing, ML & NLP
IRJET - Brain Tumor Detection using Image Processing, ML & NLPIRJET - Brain Tumor Detection using Image Processing, ML & NLP
IRJET - Brain Tumor Detection using Image Processing, ML & NLPIRJET Journal
 
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET Journal
 

Semelhante a Iris Eye Segmentation Using Fuzzy C-Means (20)

Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...
 
Quality assessment for online iris
Quality assessment for online irisQuality assessment for online iris
Quality assessment for online iris
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filter
 
E0543135
E0543135E0543135
E0543135
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
Iris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning Technique
 
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINAAN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
 
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
 
K0966468
K0966468K0966468
K0966468
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
 
Prediction of Cognitive Imperiment using Deep Learning
Prediction of Cognitive Imperiment using Deep LearningPrediction of Cognitive Imperiment using Deep Learning
Prediction of Cognitive Imperiment using Deep Learning
 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
 
IRJET- Brain Tumor Detection using Image Processing, ML & NLP
IRJET- Brain Tumor Detection using Image Processing, ML & NLPIRJET- Brain Tumor Detection using Image Processing, ML & NLP
IRJET- Brain Tumor Detection using Image Processing, ML & NLP
 
IRJET - Brain Tumor Detection using Image Processing, ML & NLP
IRJET - Brain Tumor Detection using Image Processing, ML & NLPIRJET - Brain Tumor Detection using Image Processing, ML & NLP
IRJET - Brain Tumor Detection using Image Processing, ML & NLP
 
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
 

Mais de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mais de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Iris Eye Segmentation Using Fuzzy C-Means

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 5 (May 2014), PP.20-25 20 Iris Eye Segmentation and by multiple FCM Ziad M. Abood Rafal Naser Salah Haeder Raad Hamed Mustansiriyah University/ College of Education/ Iraq- Baghdad2014 Abstract:-In this research, the fuzzy c-means (FCM) technique applied toeye’s iris segmentation and with multiple and evaluation the accuracy of results. Keywords: FCM, Iris eye, Digital Image Processing, segmentation, Matlab. I. INTRODUCTION 1- Biometrics Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control [1]. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals [2]. Biometric identifiers are often categorized as physiological versus behavioral characteristics [3]. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, retina and odor/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to: typing rhythm, gait, and voice [2]. Some researchers have coined the term behavior metrics to describe the latter class of biometrics [4]. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number [2]. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information [2, 5]. II. IRIS RECOGNITION The Iris is located behind the cornea and in front of the crystalline lens. The Iris divides the space behind the cornea into the anterior and posterior chamber, which contains aqueous fluid. The Iris is a colored tissue which extends from the ciliary body and is apparent at all times. The color of the Iris is determined genetically. [6] The purpose of the Iris is to constrict or enlarge the aperture of the pupil. By doing this it determines the amount of light that enters the pupil. In bright light the muscles of the Iris constrict the amount of light entering the pupil, and in low light the muscles enlarge the pupil to allow more light to enter[6]. Figure (1) shows structures of the eye and iris, and examples of iris [7, 8, 9]. (a) (b)
  • 2. Iris Eye Segmentation and by multiple FCM 21 (c) gray brown green blue Figure (1) (a) Structures of the eye, (b) Iris, front view (c) An examples of a iris III. IMAGE SEGMENTATION Image Segmentation is the process of partitioning a digital image into multiple segments (sets of pixels, also known as super pixels). The goal of segmentation is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. Image segmentation is typically used to locate objects and boundaries (lines, curves, etc.) in images. More precisely, image segmentation is the process of assigning a label to every pixel in an image such that pixels with the same label share certain visual characteristics. The result of image segmentation is a set of segments that collectively cover the entire image, or a set of contours extracted from the image (edge detection). Each of the pixels in a region is similar with respect to some characteristic or computed property, such as color, intensity, or texture. Adjacent regions are significantly different with respect to the same characteristic(s). [10, 11] IV. FUZZY C-MEANS (FCM) TECHNIQUE The logic fuzzy and digital image processing techniques play an important role in the fields of medicine types both in terms of diagnosis or treatment, with and put a lot of software to control over how the performance of the means of science and technology that have become available to workers so as to provide the amount bulk of the scientific potential in Stenographer Levy shortly purpose and it greatly facilitates the diagnosis. [12] The geometric center and the scope of each sub class are calculated adaptivelytoreducethecostfunction in fuzzy c-means clustering [13].This method employs the membership function μmn to find the degree of membership of nth object to them-th cluster. The cost function in fuzzyc-means clustering is [13]: … (1) Where, Nis the image pixel, is the center value of m-th cluster, presents the total number of image pixels and denotes total clusters. (l>1) controls the fuzziness of the result ant segmentation. The membership function sare accountable to the following constraints: … (2) The membership functions and the geometric centers can be updated in each iteration as follows: … (3) In order to incorporate the spatial information in to the fuzzy clustering technique, Chuang et al. [14] proposed the following fuzzy membership functions:
  • 3. Iris Eye Segmentation and by multiple FCM 22 … (4) Where p and q control the respective contributions and the variable hmn includes the spatial information. V. RESULTS AND DISCUSSION 1. Algorithm and Results Figure (2) show the general algorithm of present study. Figure (2) Algorithm scheme illustrates the current study Figure (3) show the results of FCM application with the images samples of irises human eye. No. Original image FCM1 FCM2 FCM3 1. 2. 3. Image acquisition ROI Image FCM Image segmentation
  • 4. Iris Eye Segmentation and by multiple FCM 23 4. 5. 6. 7. 8. 9. 10. Figure (3) Algorithm scheme illustrates the current study Table (2) shows the Results of the application of FCM segmentational gorithm with (25) images representing the irises. Our FCM algorithm was implemented in MATLAB.
  • 5. Iris Eye Segmentation and by multiple FCM 24 Table (2) No. image FCM1 FCM2 FCM3 Iteration count obj. fcn Iteration count obj. fcn Iteration count obj. fcn 1. 1 2937.982714 12 414.274014 25 412.490762 2. 1 11791.860070 16 2999.116295 33 2993.763293 3. 1 1208.573425 20 372.052345 41 371.983357 4. 1 751.624070 20 228.584372 41 228.425655 5. 1 3405.280719 11 775.337023 23 773.764884 6. 1 4383.128560 17 1074.919033 34 1074.792780 7. 1 1153.563214 15 487.215489 30 391.254801 8. 1 5672.197708 15 1227.396679 31 1227.121581 9. 1 9402.423147 21 2350.188146 42 2349.677084 10. 1 3283.185220 17 2190.148270 34 2004.185220 The outputs of segmentation and classifies ofimages with one representing weed stem and zerorepresenting other objects. Performances of the classifierswere evaluated using the misclassification rate (MCR). The MCR is defined as the ratio between thenumber of non-stem pixels misclassified as stem pixels andthe total number of non-stem pixels in the image. [15] To measure the segmentation accuracy, we also apply the quantitative evaluation of performance by defining the misclassification ratio (MCR), which isgiven by:[15] Table (3) shows the value of MCR of FCM level for images. Table (3) No. image FCM1 FCM2 FCM3 1. 28.25% 10.01% 6.11% 2. 21.35% 9.21% 6.45% 3. 19.78% 11.74% 4.86% 4. 19.56% 12.89% 5.03% 5. 27.45% 10.23% 4.89% 6. 28.01% 9.41% 6.01% 7. 28.30% 9.11% 5.79% 8. 36.25% 12.78% 4.89% 9. 30.56% 11.54% 4.23% 10. 17.78% 10.89% 4.78% VI. CONCLUSIONS In this paper, the fuzzy C-means technique applied to segmentation of iris image, given good results with level increases. From the results show the process, the color of iris has a clear impact in the process of segmentation. Blue color of iris shows a clearer segmentation of other colors. REFERENCES [1] Zetter, Kim (2012-07-25). "Reverse-Engineered Irises Look So Real, They Fool Eye-Scanners". Wired Magazine.Retrieved 25 July 2012. [2] Jain, A., Hong, L., Pankanti, S. (2000). "Biometric Identification".Communications of the ACM, 43(2), p. 91-98. [3] Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK; [4] Weaver, A. C. (2006). "Biometric Authentication". Computer, 39 (2), p. 96-97. [5] Sahoo, SoyujKumar; MahadevaPrasanna, SR, Choubisa, Tarun (2012). "Multimodal Biometric Person Authentication : A Review". IETE Technical Review 29 (1): 54. [6] A look at the Structure of The Eye, Help & Information, SelectSpecs.com, 2014. pixelsofnumbertotal pixelsdmisclassfeofnumber =MCR
  • 6. Iris Eye Segmentation and by multiple FCM 25 [7] "eye, human”. Encyclopedia Britannica from Encyclopedia Britannica 2006. [8] Gold, Daniel H; Lewis, Richard; "Clinical Eye Atlas," pp. 396-397. [9] Sensory Reception,“Human Vision: Structure and function of the Human Eye", vol. 27, p. 175 Encyclopedia Britannica, 1987. [10] Linda G. Shapiro and George C. Stockman: “Computer Vision”, pp 279-325, New Jersey, Prentice- Hall, ISBN 0-13-030796-3.2001. [11] Barghout, Lauren, and Lawrence W. Lee. "Perceptual information processing system".Paravue Inc. U.S. Patent Application 10/618,543, filed July 11, 2003. [12] Nedeljkovic I., Image Classification Based On Fuzzy Logic, The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 34, Part XXX. [13] B. Li, C. Chui, S. Chang, and S. Hong, “Integrating spatial fuzzy clustering with levelset methods for automated medical image segmentation”, Comp. in Biology and Medicine, vol. 11, pp. 1-10, 2011. [14] K. Chuang, H. Hzeng, S. Chen, J. Wu, and T. Chen, “Fuzzy c-means clustering with spatial information for image segmentation,” Computerized Medical Imaging, and Graphics, vol. 30, pp. 9–15, 2006. [15] Lei Jiang, Wenhui Yang A Modified Fuzzy C-Means Algorithm for Segmentation of Magnetic Resonance Images, Proc. VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot H., Ourselin S. and Adriaansen T. (Eds.), 10-12 Dec. 2003, Sydney. ‫الخالصة‬: