Iris Biometric Recognition for Person Identification in Security Society System

Page 1

IJSTE - International Journal of Science Technology & Engineering | Volume 4 | Issue 7 | January 2018 ISSN (online): 2349-784X

Iris Biometric Recognition for Person Identification in Security Society System Girish Gogate P.G Student Department of Computer Science & Engineering Sagar Institute of Research & Technology, Indore

Prof. Vinod Azad Assistance Professor Department of Information Technology Sagar Institute of Research & Technology, Indore

Abstract The pressures on today’s system administrators to have secure systems are ever increasing. One area where security can be improved is in authentication. Face, retina, iris and sclera recognition, biometrics, provide one of the most secure methods of authentication and identification. These technologies are very useful in areas such as information security, physical access security, ATMs and airport security. These technologies are more or less accurate, easy to use, non-intrusive, and difficult to forge and, despite what people may think, are actually quite fast systems once initial enrolment has taken place. However, they do require the co-operation of the subject: need specific hardware and software to operate. These recognition technologies do provide a good method of authentication to replace the current methods of passwords, token cards or PINs and if used in conjunction with something the user knows in a two-factor authentication system then the authentication becomes even stronger. Keywords: Facial Recognition, Palm Print, Signature Verification, Fingerprint, Iris Scan ________________________________________________________________________________________________________ I.

INTRODUCTION

Human face detection is gaining intrest as an important research area with many application .The application are video conferencing. hum computer interaction content-based image retrieval and automatic authorization etc. face detection problem can de stated as determining whether there are human faces in the image and if there are returning the location of each human face in the image regardless of its position and lighting condition. In recent year face recognition has concerned much attention .It has numerous application in compute vision communication and regular access control system .Face detection is the elementary yet an important step towards automatic face recognition. However face detection is not clear cut because it has lots of variations of image look such as pos variation (front, andfront).occlusion, image orientation illuminating situation and facial appearance. Face detection is the middle of all facial analysis e.g. face location facial feature detection face recognition face verification and facial expression recognition .Moreover it is a fundamental technique for other application such as content based image retrieval video conferencing and intelligent human computer interaction. The objective of face detection is to find out whether or not there are any face in the image and if present return the location and the extend of each face while face detection is a trivail task for human region. It is a challenge for computer region due to the variation skill location, orientation, pose, facial expression, light condition and variation appearance features (Example presence of glasses, facial hair, makeup etc.) To evaluate the performance of face detector, various metrics are used example – Learning time, execution time. The number of samples required in training, and the ratio between the detection rate and false alarm. Today e-security are in critical need of finding accurate secure and cost effective alternatives to password and personal identification number (PIN) as financial losses increase dramatically year over year from computer based fraud such as computer hacking and identity theft .Biometric solution address these fundamental problem because an individual ‘s biometric data is unique and cannot be transferred . Biometric which refer to identifying an individual by his or her physiological or behavioural characteristics has capability to distinguish between authorized user and an imposer .An advantage of using biometric authentification is that it cannot be lost or forgotten as the person has to be physically present during at the point of identification process .Biometric is inherently more reliable and traditional knowledge based and token based techniques. There are following techniques of biometric with comparatives: Facial Recognition Facial recognition record the spatial geometry of distinguishing feature of the face .Different vendors use different methods of facial recognition however all focus on measures of key features of the face .Facial recognition has been used in project to identify card counters or other undesirables in casinos shoplifters in store criminals and terrorists in urban area. This biometric system can easily spoof by the criminals or malicious intruders to fool recognition system or program .Iris cannot be spoof easily.

All rights reserved by www.ijste.org

59


Iris Biometric Recognition for Person Identification in Security Society System (IJSTE/ Volume 4 / Issue 7 / 010)

Palm Print Palm print verification is a slightly modified form of fingerprint technology. Palm print scanning uses an optical reader very similar to that used for fingerprint scanning; however, its size is much bigger, which is a limiting factor for use in workstations or mobile devices. Signature Verification It is an automated method of examining an individual’s signature. This technology is dynamic such as speed,[10] direction and pressure of writing, the time that the stylus is in and out of contact with the paper‖. Signature verification templates are typically 50 to 300 bytes. Disadvantages include problems with long-term reliability, lack of accuracy and cost. Fingerprint A fingerprint as in Figure1 recognition system constitutes of fingerprint acquiring device, minutia extractor and minutia matcher. As it is more common biometric recognition used in banking, military etc., but it has a maximum limitation that it can be spoofed easily. Other limitations are caused by particular usage factors such as wearing gloves, using cleaning fluids and general user difficulty in scanning. Iris Scan Iris as shown in Figure1 is a biometric feature, found to be reliable and accurate for authentication process comparative to other biometric feature available today [25] As a result, the iris patterns in the left and right eyes are different, and so scan be used quickly for both identification and verification applications because of its large number of degrees of freedom. Iris as in Figure 2 is like a diaphragm between the pupil and the sclera and its function is to control the amount of light entering through the pupil. Iris is composed of elastic connective tissue such as trabecular meshwork. The agglomeration of pigment is formed during the first year of life, and pigmentation of the stoma occurs in the first few years the highly randomized appearance of the iris makes its use as a biometric well recognized. Its suitability as an exceptionally accurate biometric

All rights reserved by www.ijste.org

60


Iris Biometric Recognition for Person Identification in Security Society System (IJSTE/ Volume 4 / Issue 7 / 010)

Method Iris recognition Finger printing Hand shape Facial recognition Signature Voice printing

Table – 1 Biometric Comparison List [11] Coded Mis-identify Security Iris pattern 1/1200000 High Fingerprint 1/1000 Medium Length & Thickness 1/100 Low Outline shape 1/100 Low Shape of letter 1/100 Low Voice characteristics 1/30 Low

Application High Security Universal Low Security Low Security Low Security Telephone service

Its genetic properties—no two eyes are the same. The characteristic that is dependent on genetics is the pigmentation of the iris, which determines its color and determines the gross anatomy. Details of development, that are unique to each case, determine the detailed morphology; v.its stability over time; the impossibility of surgically modifying it without unacceptable risk to vision and its physiological response to light, which provides a natural test against artifice After the discovery of iris, John G. Daugman, a professor of Cambridge University suggested an image-processing algorithm that can encode the iris pattern into 256 bytes based On the Gabor transform. In general, the iris recognition system is composed of the Following five steps as depicted in Figure 1 According to this flow chart, preprocessing including image enhancement. The remainder of the paper is organized as follows: focuses on Image Acquisition emphasizes on Preprocessing focuses on Feature extraction emphasizes on Pattern matching emphasizes on identification and verification emphasizes on conclusion of the proposed Algorithm. II. CONCLUSION A proposed research work is to enhance the algorithm for efficient person identification for other area of applications by increasing FRR more than 0.33% as the Verify algorithm [5] results with FRR 0.32% and FAR 0.001%. Wavelets iris recognition algorithm is suitable for reliable, fast and secure person identification. Wavelet, Gabor filter and the range of hamming distance for Haar wavelet is less i.e., 0.2866 to 0.5111, for robust and fast matching for healthcare application for patient identification. Proposed algorithm focus on the algorithm for rapid and accurate iris identification even if the images are occlude further algorithm will also focus on robust iris Recognition, even with gazing-away eyes or narrowed eyelids which solves all the security related problems. III. IDENTIFICATION AND VERIFICATION Identification and verification modes are two main goals of every security system based on the needs of the vironment. In the verification stage, the system checks if the user data that was entered is correct or not (e.g., username and password) but in the identification stage, the system tries to discover who the subject is without any input information. Hence, verification is a onetoone search but identification is a one-to-many comparison.[23] ACKNOWLEDGEMENTS I would like to thanks to our Prof.Vinod Azad, Assit.Professor of Sagar Institute of Research & Technology, Indore for kind support and providing facility to do my Research work REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13]

R. Derakhshani,A.Ross,S.Crihalmeanu,A new biometric modality based on conjunctival vasculature, in: Proceedings of Artificial Neural Networks in Engineering (ANNIE2006),St.Louis,Missouri,USA,2006. S.Crihalmeanu,A.Ross,R.Derakhshani, Enhancement and registration schemes for matching conjunctival vasculature,in:Proceedingsofthe3rd IAPR/IEEE International Conferenceon Biometrics(ICB2009),Italy,2009, pp. 1240–1249. N.L. Thomas, Y. Du, Z. Zhou, A new approach for sclera vein recognition, in: Proceedings of the International Society for Optical Engineering (SPIE), vol. 7708, 2010. Z. Zhou,E.Y.Du,N.L.Thomas,A comprehensive sclera image quality measure, in: proceedings of the 11th International Conference on Control, Automation, Robotics and Vision(ICARCV2010),Singapore,2010,pp.638–643. S.Crihalmeanu,A.Ross,Multispectral scleral patterns for ocular biometric recognition, PatternRecognit.Lett.33(14)(2012)1860–1869. R. Derakhshani,A.Ross,Atexture-based neural network classifier for biometric identification using ocular surface vasculature, in: Proceedings of International Joint Conference on Neural Networks(IJCNN2007),Kensas,USA, 2007,pp.2982–2987. K.Oh,K.A.Toh, Extracting sclera features for cancel able identity verification, in: Proceedings of the 5th IAPR International Conference on Biometrics (ICB 2012), NewDelhi, India, 2012. U.Park,R.R.Jillela,A.Ross,A.K.Jain, Periocular biometrics in the visible spectrum, IEEETrans.Inf.ForensicsSecur.6(1)(2011)96–106 S. Bharadwaj,H.S.Bhatt,M.Vatsa,R.Singh, Periocular biometrics:wheniris recognition fails,in:Proceedings of the 4th IEEE International Conference on Biometrics: Theory Applications and Systems(BTAS2010),2010. P.E.Miller,A.W.Rawls,S.J.Pundlik,D.L.Woodard,Personal identification using periocular skin texture,in:Proceedingsofthe2010ACMSymposiumon Applied Computing,2010,pp.1496–1500. Daugman JG. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Machine Intell 1993;15: 1148– 61. Daugman JG. How iris recognition works. IEEE Trans Circuits Syst Video Technol 2003;14:1–17. Daugman JG. The importance of being random: statistical principles of iris recognition. Pattern Recognition 2003;36:279–91

All rights reserved by www.ijste.org

61


Iris Biometric Recognition for Person Identification in Security Society System (IJSTE/ Volume 4 / Issue 7 / 010) [14] A. Haro, I. Essa, M. Flickner, Detecting and tracking eyes by using their physiological properties, in: Proceedings of the Conference on Computer Vision and Pattern Recognition, June 2000. [15] X. Xie, R. Sudhakar, H. Zhuang. Real-time eye feature tracking from a video image sequence using Kalman Elter, IEEE Trans. Syst. Man Cybern. 25 (1995) 1568–1577. [16] S. Sirohey, A. Rosenfeld, Z. Duric, A method of detecting and tracking irises and eyelids in video, Pattern Recognition 35 (2002) 1389–1401. [17] Green JS, Bear JC, Johnson GJ. The burden of genetically determined eye disease. Br J Ophthalmol. 1986;70:696–699. [18] Krumpaszky HG, Ludtke R, Mickler A, Klauss V, Selbmann HK. Blindness incidence in Germany. A population-based study from WurttembergHohenzollern. Ophthalmologica.1999; 213:176–182. [19] Munier A, Gunning T, Kenny D, O‟Keefe M. Causes of blindness in the adult population of the Republic of Ireland. Br J Ophthalmol. 1998;82:630–633. [20] Cotter SA, Varma R, Ying-Lai M, Azen SP, Klein R. Causes of low vision and blindness in adult Latinos: the Los Angeles Latino Eye Study. Ophthalmology. 2006; 113:1574–1582. 5. Buch H, Vinding T, La Cour M, Appleyard M, Jensen GB, Nielsen NV. Prevalence and causes of visual impairment and blindness among 9980 Scandinavian adults: the Copenhagen City Eye Study. Ophthalmology. 2004; 111:53–61 [21] Christel-loïc TISSE1, Lionel MARTIN1, Lionel TORRES 2, Michel ROBERT ―Person identification technique using human iris recognition‖. [22] D.E.Benn, M.S.Nixon and J.N.Carter, ―Robust eye Extraction using H.T. ― AVBPA’99 [23] Shimaa M.Elsherief, Mhamoud E.Allam and Mohamed W.Fakhr,‖Biometric Personal Identification based on Iris Recognition‖,IEEE,2006. [24] A.Poursaberi and B.N.Araabi, ―iris recognition for partially occluded images: methodology and sensitivity Analysis‖ Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2007, Article ID 36751, [25] Verieye iris recognition concept for performance evaluation, http:// www.neurotechnology.com

All rights reserved by www.ijste.org

62


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.