Biometric Authentication - Person Identification Using Iris Recognition
Biometric Authentication - Person Identification Using Iris Recognition
ISSN No:-2456-2165
Abstract:- Biometrics are used to offer person iris recognition model is one of the most natural methods
identification by measuring and analyzing people's used to identify individuals as the iris is fixed and
unique physiological and behavioral characteristics. As permanent and does not change throughout life. Moreover,
demands are increasing on this authentication it is impossible for two people to have the same iris features
technique a number of biometric modalities have even twins[1].
evolved and used like fingerprint reader, face identifier
and iris scanner. The human eye also has features and Using a unique characteristic in an individual’s iris,
patterns that are distinctive for recognition. Also, the iris recognition enables people to be identified. Other
low-cost equipment for utilizing this technique has methods like fingerprint readers may not be sufficient to
made it the most preferable framework in security handle the large variation in populations and also they can
reasons. As a reliable biometric authentication method, be copied. So it is considered as the most secure biometric
it is considered as the most explicit. authentication method available. A typical iris recognition
system made up of four stages namely, image acquisition,
In this paper, a standard database namely CASIA segmentation, feature extraction and pattern matching[2].
v3 is used for taking iris database and different Additionally pre-processing of can be done where image is
algorithms are used to recognize the targeted areas and resized, converted to gray scale and histogram equalization
the recognition process is performed. The algorithms we technique is used to enhance the image quality. In the
used are Morphology binary to remove the unwanted segmentation, iris and pupil is segmented and pixel values
backgrounds; Circular Hough Transform to detect the are binarized. Feature extraction collects the appropriate
iris; Gabor's filter to extract features of the human eye feature and pixel points from the image and classification
and KNN classifier to finally authenticate the query result shows the query image is authenticated or not.
image. The images from the database are acquired and
pre-processed before running through the algorithms. II. IRIS-STRUCTURE
I. INTRODUCTION
c) Histogram Equalization:
Histogram equalization is an example of Histogram
modelling techniques. By modifying the intensity
distribution of the histogram, it enables one to adjust
the dynamics of a picture and the contrast. Using this
Fig. 2: Steps involved for iris recognition technique technique, the cumulative probability function
associated with an image is given a linear trend.
A. Image Aacquisition or Image Capturing: Therefore, this technique, enhances the contrast and
Iris recognition starts with the step of image quality of the image.
acquisitioning or image capturing. Various people's irises
have different sizes and colors, so this step is quite
complicated. In this project iris pictures are obtained from
the dataset.
a) Morphology Binary:
Using a small template, a structuring element is
placed at different locations in the image and
compared with different neighboring pixels. It
determines whether it is overlaps the neighboring
Imaginary
𝑔(𝑥, 𝑦; 𝜆, 𝜃, 𝜓, 𝜎, 𝛾)
𝑥′2 + 𝛾 2 𝑦 ′2 𝑥′
= 𝑒𝑥𝑝 (− ) sin (2𝜋 + 𝜓)
2𝜎 2 𝜆
where
𝑥 ′ = 𝑥 cos 𝜃 + 𝑦 sin 𝜃
V. CONCLUSION
REFERENCES