IRIS RECOGNITION SYSTEM

Slides:



Advertisements
Similar presentations
QR Code Recognition Based On Image Processing
Advertisements

Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Biomedical Person Identification via Eye Printing Masoud Alipour Ali Farhadi Ali Farhadi Nima Razavi.
BIOMETRIC AUTHENTICATION
S E M I N A R Recognition of human Iris Patterns for Biometric Identification Mentor: Prof. dr Dragan Radenković by Marko Milovanović U N I V E R S I T.
Face Recognition and Biometric Systems Elastic Bunch Graph Matching.
ANKUSH KUMAR (M.Tech(CS))
‘ Glaucoma Detection In Retinal Images Using Automated Method ’
Emerging biometrics Presenter : Shao-Chieh Lien Adviser : Wei-Yang Lin.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
1Ellen L. Walker Edges Humans easily understand “line drawings” as pictures.
A Versatile Depalletizer of Boxes Based on Range Imagery Dimitrios Katsoulas*, Lothar Bergen*, Lambis Tassakos** *University of Freiburg **Inos Automation-software.
Localization of Piled Boxes by Means of the Hough Transform Dimitrios Katsoulas Institute for Pattern Recognition and Image Processing University of Freiburg.
A Study of Approaches for Object Recognition
Iris Recognition Slides adapted from Natalia Schmid and John Daugman.
Scale Invariant Feature Transform (SIFT)
Iris localization algorithm based on geometrical features of cow eyes Menglu Zhang Institute of Systems Engineering
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Computer-Aided Diagnosis and Display Lab Department of Radiology, Chapel Hill UNC Julien Jomier, Erwann Rault, and Stephen R. Aylward Computer.
Object recognition under varying illumination. Lighting changes objects appearance.
A Novel 2D To 3D Image Technique Based On Object- Oriented Conversion.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Iris Recognition Sathya Swathi Mabbu Long N Vuong.
Computer vision.
Following the work of John Daugman University of Cambridge
Study and Implementation Of Iris Recognition Schemes By:Ritika Jain Under guidance of DR K R RAO UNIVERSITY OF TEXAS AT ARLINGTON.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Vehicle License Plate Detection Algorithm Based on Statistical Characteristics in HSI Color Model Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh.
Intelligent Vision Systems ENT 496 Object Shape Identification and Representation Hema C.R. Lecture 7.
University of Texas at Austin CS384G - Computer Graphics Fall 2010 Don Fussell Image processing.
Digital Image Processing & Analysis Dr. Samir H. Abdul-Jauwad Electrical Engineering Department King Fahd University of Petroleum & Minerals.
Digital Image Processing CCS331 Relationships of Pixel 1.
March 10, Iris Recognition Instructor: Natalia Schmid BIOM 426: Biometrics Systems.
Detection of nerves in Ultrasound Images using edge detection techniques NIRANJAN TALLAPALLY.
G52IVG, School of Computer Science, University of Nottingham 1 Edge Detection and Image Segmentation.
Study Of Iris Recognition Schemes By:Ritika Jain Under guidance of DR K R RAO UNIVERSITY OF TEXAS AT ARLINGTON SPRING 2012.
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
IRIS RECOGNITION. CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION.
Doc.: IEEE /0431r0 Submission April 2009 Alexander Maltsev, Intel CorporationSlide 1 Polarization Model for 60 GHz Date: Authors:
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
IRIS RECOGNITION SYSTEM
Edge Detection and Geometric Primitive Extraction Jinxiang Chai.
Autonomous Robots Vision © Manfred Huber 2014.
Non-Ideal Iris Segmentation Using Graph Cuts
Automated Fingertip Detection
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities May 2, 2005 Prof. Charlene Tsai.
Face Detection Final Presentation Mark Lee Nic Phillips Paul Sowden Andy Tait 9 th May 2006.
Iris Recognition.
Machine Vision Edge Detection Techniques ENT 273 Lecture 6 Hema C.R.
Iris-based Authentication System Daniel Schonberg and Darko Kirovski, “Iris Compression for Cryptographically Secure Person Identification”, in Proceedings.
Digital Image Processing CSC331
Detection of nerves in Ultrasound Images using edge detection techniques NIRANJAN TALLAPALLY.
ATM WITH AN EYE. An automated teller machine (ATM) or automatic banking machine (ABM) is a computerised telecommunications device that provides the clients.
Over the recent years, computer vision has started to play a significant role in the Human Computer Interaction (HCI). With efficient object tracking.
IRIS RECOGNITION 1 CITY ENGINEERING COLLEGE Technical Seminar On “IRIS RECOGNITION” By NANDAN.T.MURTHY 1CE06EC043.
Automated Iris Recognition Technology & Iris Biometric System
Hand Geometry Recognition
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
Iris Recognition.
Study Of Iris Recognition Schemes(Interim - Power Point Presentation)
Following the work of John Daugman University of Cambridge
Image Segmentation Techniques
Presentation transcript:

IRIS RECOGNITION SYSTEM Biometric course : IRIS RECOGNITION SYSTEM Lecture by Rasha Tarawneh, Omamah Thunibat and Dr. Ahmad B. A. Hassanat Presented to: Dr Ahmad Alhassanat Mutah university Rasha Tarawneh Omamah Thunibat

Overview: Introduction What the iris? Why iris? History of iris Recognition Applications Methods of iris recognition system Image Acquisition Segmentation Normalization Iris Feature Encoding Iris code matching Disadvantages Conclusion References

Introduction Iris recognition is a method of biometric identification and authentication that use pattern-recognition techniques based on high resolution images of the irises of an individual's eyes . It is considered to be the most accurate biometric technology available today.

What is Iris ? The colored ring around the pupil of the eye is called the Iris

What is Iris ? The iris is a thin circular diaphragm, which lies between the cornea and the lens of the human eye. The iris is perforated close to its centre by a circular aperture known as the pupil. The function of the iris is to control the amount of light entering through the pupil. The average diameter of the iris is 12 mm, and the pupil size can vary from 10% to 80% of the iris diameter [2].

What is Iris ? The iris consists of a number of layers, the lowest is the epithelium layer, which contains dense pigmentation cells. The stromal layer lies above the epithelium layer, and contains blood vessels, pigment cells and the two iris muscles.

What is Iris ? The density of stromal pigmentation determines the colour of the iris. The externally visible surface of the multi-layered iris contains two zones, which often differ in colour An outer ciliary zone and an inner pupillary zone, and these two zones are divided by the collarette – which appears as a zigzag pattern[3].

Why the Iris? Externally visible highly protected internal organ. Unique patterns. Not genetically connected unlike eye color. Stable with age. Impossible to alter surgically. Living Password, Can not be forgotten or copied. Works on blind person. User needs not to touch appliances. Accurate , faster , and supports large data base.

Why the Iris?

Comparison between cost and accuracy Why the Iris? Comparison between cost and accuracy

History of Iris Recognition The concept of Iris Recognition was first proposed by Dr. Frank Burch in 1939. 1980 It was first implemented in 1990 when Dr. John Daugman created the algorithms for it. These algorithms employ methods of pattern recognition and some mathematical calculations for iris recognition. 1987 1987 1997-1999

Applications . ATMs .Computer login: The iris as a living password. · National Border Controls · Driving licenses and other personal certificates. · benefits authentication. ·birth certificates, tracking missing. · Credit-card authentication. · Anti-terrorism (e.g.:— suspect Screening at airports) · Secure financial transaction (e-commerce, banking). · Internet security, control of access to privileged information.

Methods Of IRIS Recognition System In identifying one’s iris, there are 2 methods for its recognition and are: Active Passive The active Iris system requires that a user be anywhere from six to fourteen inches away from the camera. The passive system allows the user to be anywhere from one to three feet away from the camera that locates the focus on the iris.

Iris Recognition Diagram Iris Segmentation Image Acquisition Normalization Eye Image Iris Region Feature points in the iris region Feature Matching Feature Encoding Identify or Reject Subject Iris Template Iris Templates Database

Image Acquisition The first step, image acquisition deals with capturing sequence of iris images from the subject using cameras and sensors with High resolution and good sharpness. These images should clearly show the entire eye especially iris and pupil part, and then some preprocessing operation may be applied to enhance the quality of image e.g. histogram equalization, filtering noise removal etc. (CASIA) eye image database

Segmentation/concept The first stage of iris segmentation to isolate the actual iris region in a digital eye image. The iris region, can be approximated by two circles, one for the iris/sclera boundary and another, interior to the first, for the iris/pupil boundary.

Segmentation/eyelids the derivatives in the horizontal direction for detecting the eyelids, and in the vertical direction for detecting the outer circular boundary of the iris . Taking only the vertical gradients for locating the iris boundary will reduce influence of the eyelids when performing circular Hough transform.

Segmentation/Hugh The circular Hough transform can be employed to deduce the radius and centre coordinates of the pupil and iris regions: Firstly, an edge map is generated by calculating the first derivatives of intensity values in an eye image and then thresholding the result. From the edge map, votes are cast in Hough space for the parameters of circles passing through each edge point, These parameters are the centre coordinates xc and yc, and the radius r, which are able to define any circle according to the equation : A maximum point in the Hough space will correspond to the radius and centre coordinates of the circle best defined by the edge points.

Segmentation/eyelash eyelashes are treated as belonging to two types : 1 -separable eyelashes: which are isolated in the image . 2-multiple eyelashes: which are bunched together and overlap in the eye image. Eyelids and Eyelashes are the main noise factor in the iris image. These noise factors can affect the accuracy of the iris recognition system. After applying circular Hough transform to iris, we are applying linear Hough transform and we get line detected noise region in the iris image. We have to remove these detected eyelids and eyelashes from the iris image Thresolding is used for the removal of eyelashes. Then, the noise free iris image can be available for future use.

LINEAR HOUGH TRANSFORM CIRCULAR HOUGH TRANSFORM Segmentation Diagram 1- Edge Detector 2- Hough Transform Finding gradient Double thresholding Smoothing Edge LINEAR HOUGH TRANSFORM CIRCULAR HOUGH TRANSFORM

Segmentation( cont…) Process of finding the iris in an image a. Iris and pupil localization: Pupil and Iris are considered as two circles using Circular Hough Transform . b. Eye lid detection and Eye lash noise removal using linear Hough Transform method.

Normalization Various Normalisation methods : 1- Daugman’s Rubber sheet Model by Daugman [2] 2- Image Registration modlyed by Wildes et al .[9] 3- Virtual Circles by Boles [14] .

Normalization Once the iris segmented ,the next stage transform the iris region so that it has fixed dimensions in order to allow comparisons. Since variations in the eye like pupil dilation and the inconsistence iris normalization is needed. Pupil dilation inconsistence iris Normalization process involves unwrapping the iris and converting it in to its polar equivalent .

Normalization ( cont...) It is done using Daugman’s Rubber sheet model . The centre of the pupil was considered as the reference point, and radial vectors pass through the iris region . A number of data points are selected along each radial line is defined as the radial resolution. The number of radial lines going around the iris region is defined as the angular resolution.

Normalization ( cont...)  

Normalization ( cont...) Normalisation produces a 2D array with horizontal dimensions of angular resolution and vertical dimensions of radial resolution. Rubber sheet model does not compensate for rotational inconsistencies

Feature Encoding Various feature encoding methods : 1-Gabor Filters employed by Daugman in [2] and Tuama.[6] 2- Log-Gabor Filters employed by D. Field.[15] . 3- Haar Wavelet employed by Lim et al.. [16] 4- Zero –crossing of the 1D wavelet employed by Boles and Boashash .[14] 5- Laplacian of gaussian filters employed by Wildes et al[9]

Feature Encoding Feature Encoding : creating a template containing only the most discriminating features of the iris . Extracted the features of the normalized iris by filtering the normalized iris region . [6] a Gabor filter is a sine ( or cosine) wave modulated by a Gaussian .  it is applied on the entire image at once and unique features are extracted from the image Feature encoding was implemented by convolving the normalized iris with 1D Gabor wavelets.

Feature Encoding ( cont …)  

Feature Encoding ( cont …) Daugman demodulates the output of the Gabor filters in order to compress the data this is done by quantising the phase information in to four levels , for each possible quadrant in the complex plane . [7] The demodulation and phase Quantisation process can be represented as where h{Re, Im} can be regarded as a complex valued bit whose real and imaginary components are dependent on the sign of the 2D integral, and I( ρ,θ ) is the raw iris image in a dimensionless polar coordinate system.

Feature Encoding ( cont …) Using real and imaginary values, the phase information is extracted and encoded in a binary pattern . The total number of bits in the template will be the angular resolution times the radial resolution , times 2, times number of filters used . The number of filters,their centre frequencies and parameters of the modulating Gaussian function must be detecting according to the used data base .

Feature encoding process

Feature Matching Various feature matching methods : 1- Hamming distance employed by Daugman [2] 2- Weighted Euclidean Distance employed by Zhu et al[17] . 3- Normalised correlation employed by Wildes [9] .

Feature Matching The Hamming Distance was chosen as a matching metric , which gave a measure of how many bits disagreed between two templates . When the hamming distance of two templates is calculated , one template is shifted left and right bit-wise and a number of hamming distance values are calculated from successive shifts , in order to account for rotational inconsistencies .

Feature Matching ( cont …) The actual number of shifts required to normalise rotational inconsistencies will be determined by the maximum angle difference between two images of the same eye . One shift is defined as one shift to the left , followed by one shift to the right . This method is suggested by Daugman . [7]

Feature Matching ( cont …)

Research’s Database The Chines Academy of Sciences – Institute of Automation (CASIA) eye image database contains 756 greyscale eye images with 108 unique eyes or class are taken from two sessions .[8]

FAR & FRR for the ‘CASIA-a’ data set Threshold FAR (%) FRR (%) 0.20 0.000 99.047 0.25 82.787 0.30 37.880 0.35 5.181 0.40 0.005 0.238 0.45 7.599 0.50 99.499 Table 1 – False accept and false reject rates for the ‘CASIA-a’ data set with different separation points using the optimum parameters.

Disadvantages Accuracy changes with user’s height ,illumination , Image quality etc. Person needs to be still, difficult to scan if not co-operated. Risk of fake Iris lenses. Alcohol consumption causes deformation in Iris pattern Expensive .

Conclusion Highly accurate but easy Fast Needs some developments Experiments are going on Will become day to day technology very soon

References [1] · http://www.cl.cam.ac.uk [2] J. Daugman. How iris recognition works. Proceedings of 2002 International Conference on Image Processing, Vol. 1, 2002. [3]E. Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976. [4] L.Flom and A. Safir : Iris Recognition System .U.S. atent No.4641394(1987). [5] T. Chuan Chen K . Liang Chung : An Efficient Randomized Algorithm for Detecting Circles. Computer vision and Image Understanding Vol.83(2001) 172-191. [6] Amel saeed Tuama “ It is Image Segmentation and Recognition Technology” vol-3 No.2 April 2012 . [7] S. Sanderson, J. Erbetta. Authentication for secure environments based on iris scanning technology. IEE Colloquium on Visual Biometrics, 2000 . http://www.cl.cam.ac.uk

References [8] E. Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976 . [9] R. Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride. A system for automated iris recognition. Proceedings IEEE Workshop on Applications of Computer Vision, Sarasota, FL, pp. 121-128, 1994. [10] W. Kong, D. Zhang. Accurate iris segmentation based on novel reflection and eyelash detection model. Proceedings of 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing, Hong Kong, 2001. [11] C. Tisse, L. Martin, L. Torres, M. Robert. Person identification technique using human iris recognition. International Conference on Vision Interface, Canada, 2002. [12] L. Ma, Y. Wang, T. Tan. Iris recognition using circular symmetric filters. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002. [13] N. Ritter. Location of the pupil-iris border in slit-lamp images of the cornea. Proceedings of the International Conference on Image Analysis and Processing, 1999.

References [14] W. Boles, B. Boashash. A human identification technique using images of the iris and wavelet transform. IEEE Transactions on Signal Processing, Vol. 46, No. 4, 1998. [15] D. Field. Relations between the statistics of natural images and the response properties of cortical cells. Journal of the Optical Society of America, 1987. [16] S. Lim, K. Lee, O. Byeon, T. Kim. Efficient iris recognition through improvement of feature vector and classifier. ETRI Journal, Vol. 23, No. 2, Korea, 2001. [17] Y. Zhu, T. Tan, Y. Wang. Biometric personal identification based on iris patterns. Proceedings of the 15th International Conference on Pattern Recognition, Spain, Vol. 2, 2000.