Performance of Personal Identification System Technique Using Iris Biometrics Technology

Full Text (PDF, 298KB), PP.63-71

Views: 0 Downloads: 0

Author(s)

V.K. Narendira Kumar 1,* B. Srinivasan 1

1. Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2013.05.08

Received: 30 Nov. 2012 / Revised: 9 Jan. 2013 / Accepted: 14 Mar. 2013 / Published: 28 Apr. 2013

Index Terms

Biometrics, Iris, Feature Processing, Iris Acquisition, Template

Abstract

The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris recognition uses iris patterns for personnel identification. The system steps are capturing iris patterns; determining the location of iris boundaries; converting the iris boundary to the stretched polar coordinate system; extracting iris code based on texture analysis. The system has been implemented and tested using dataset of number of samples of iris data with different contrast quality. The developed algorithm performs satisfactorily on the images, provides 93% accuracy. Experimental results show that the proposed method has an encouraging performance.

Cite This Paper

V.K. Narendira Kumar,B. Srinivasan,"Performance of Personal Identification System Technique Using Iris Biometrics Technology", IJIGSP, vol.5, no.5, pp.63-71, 2013. DOI: 10.5815/ijigsp.2013.05.08

Reference

[1]J. Daugman, "High confidence personal identification by rapid video analysis of iris texture", in Proceedings of the 1992 IEEE International Carnahan Conference on Security Technology, 1992.

[2]J. Daugman, "The Importance of Being Random: Statistical Principles of Iris Recognition", in Pattern Recognition, Vol. 36, No. 2, pp. 279–291, 2003.

[3]T. Matsumoto, M. Hirabayashi, and K. Sato: "A Vulnerability Evaluation of Iris Matching (Part 3)", in Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS), Institute of Electronics, Information and Communication Engineers, pp. 701–706, 2004.

[4]R.Wildes, "Iris Recognition: An Emerging Biometric Technology," Proc. IEEE, Vol. 85, No. 9, pp. 1348–1363, Sep. 1997.

[5]Liu S. And Silverman M. "A Practical Guide to Iris Biometric Security Technology", pp. 71–76, January 2000. 

[6]UK Biometrics Working Group, "Use of Iris Biometrics for Identification and Authentication: Advice on Product Selection", pp. 55–68, November 2010.

[7]A.K. Jain, Rued Bolle and Sharath Pankanti "Biometrics: Personal Identification in Networked Society" Publisher: Springer; 1st edition, 1999. 2nd printing edition 2005. pp. 22–26,

[8]Shin young Lim, Kwanyong Lee, Okhwan Byeon, and Taiyun Kim., "Efficient Iris Recognition through Improvement of Feature Vector and Classifier", ETRI Journal, 23(2):61–70, June 2001.

[9]L. Ma, Y. Wang, and T. Tan., "Iris Recognition Based on Multichannel Gabor Filtering" In Proc. of the 5th Asian Conference on Computer Vision, Volume I, pages 279–283, 2002.