Iris Recognition.

Slides:



Advertisements
Similar presentations
Object Recognition from Local Scale-Invariant Features David G. Lowe Presented by Ashley L. Kapron.
Advertisements

Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
Iris Recognition Under Various Degradation Models Hans Christian Sagbakken.
July 27, 2002 Image Processing for K.R. Precision1 Image Processing Training Lecture 1 by Suthep Madarasmi, Ph.D. Assistant Professor Department of Computer.
ANKUSH KUMAR (M.Tech(CS))
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack 42 nd Hawaii International Conference on System Sciences, Electrical.
Emerging biometrics Presenter : Shao-Chieh Lien Adviser : Wei-Yang Lin.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Efficient Bit Allocation and CTU level Rate Control for HEVC Picture Coding Symposium, 2013, IEEE Junjun Si, Siwei Ma, Wen Gao Insitute of Digital Media,
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Boundary Detection Jue Wang and Runhe Zhang. May 17, 2004 UCLA EE206A In-class presentation 2 Outline Boundary detection using static nodes Boundary detection.
A Bayesian algorithm for tracking multiple moving objects in outdoor surveillance video Department of Electrical Engineering and Computer Science The University.
Iris Recognition Slides adapted from Natalia Schmid and John Daugman.
FACE RECOGNITION, EXPERIMENTS WITH RANDOM PROJECTION
1 A Unified Rate-Distortion Analysis Framework for Transform Coding Student : Ho-Chang Wu Student : Ho-Chang Wu Advisor : Prof. David W. Lin Advisor :
Iris localization algorithm based on geometrical features of cow eyes Menglu Zhang Institute of Systems Engineering
Computer-Aided Diagnosis and Display Lab Department of Radiology, Chapel Hill UNC Julien Jomier, Erwann Rault, and Stephen R. Aylward Computer.
A New Rate-Complexity-QP Algorithm for HEVC Intra-Picture Rate Control LING TIAN, YIMIN ZHOU, AND XIAOJUN CAO 2014 INTERNATIONAL CONFERENCE ON COMPUTING,
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Presenting by, Prashanth B R 1AR08CS035 Dept.Of CSE. AIeMS-Bidadi. Sketch4Match – Content-based Image Retrieval System Using Sketches Under the Guidance.
October 8, 2013Computer Vision Lecture 11: The Hough Transform 1 Fitting Curve Models to Edges Most contours can be well described by combining several.
Stereo Matching Information Permeability For Stereo Matching – Cevahir Cigla and A.Aydın Alatan – Signal Processing: Image Communication, 2013 Radiometric.
Shape Blending Joshua Filliater December 15, 2000.
Following the work of John Daugman University of Cambridge
Study and Implementation Of Iris Recognition Schemes By:Ritika Jain Under guidance of DR K R RAO UNIVERSITY OF TEXAS AT ARLINGTON.
Multimedia Databases (MMDB)
Robotics Simulation (Skynet) Andrew Townsend Advisor: Professor Grant Braught.
ECE 8443 – Pattern Recognition LECTURE 03: GAUSSIAN CLASSIFIERS Objectives: Normal Distributions Whitening Transformations Linear Discriminants Resources.
March 10, Iris Recognition Instructor: Natalia Schmid BIOM 426: Biometrics Systems.
1 Circle Drawing Algorithms Pictures snagged from
Study Of Iris Recognition Schemes By:Ritika Jain Under guidance of DR K R RAO UNIVERSITY OF TEXAS AT ARLINGTON SPRING 2012.
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Fitting: The Hough transform
EXAMINING INTRA-VISIT IRIS STABILITY (VISIT 1) Bo Brown, Jing Guan, Vince Sipocz, Aidan Chamberlain, Brandon Cox, Preston Flint, Eric Hollensbe, Brandon.
Chapter 10 Hashing. The search time of each algorithm depend on the number n of elements of the collection S of the data. A searching technique called.
Expectation-Maximization (EM) Case Studies
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Biometric Iris Recognition System INTRODUCTION Iris recognition is fast developing to be a foolproof and fast identification technique that can be administered.
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
IRIS RECOGNITION SYSTEM
Implementation of a Relational Database as an Aid to Automatic Target Recognition Christopher C. Frost Computer Science Mentor: Steven Vanstone.
Non-Ideal Iris Segmentation Using Graph Cuts
Automated Fingertip Detection
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities May 2, 2005 Prof. Charlene Tsai.
Improved Daugman’s Method Team Beta Bryan Chamberlain Kyle Barkes Daniel Lohmer Patrick Braga-Henebry CSE30332 Programming Paradigms Professor Patrick.
Iris-based Authentication System Daniel Schonberg and Darko Kirovski, “Iris Compression for Cryptographically Secure Person Identification”, in Proceedings.
What is Multimedia Anyway? David Millard and Paul Lewis.
Computer Graphics CC416 Lecture 04: Bresenham Line Algorithm & Mid-point circle algorithm Dr. Manal Helal – Fall 2014.
Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons.
Hough Transform CS 691 E Spring Outline Hough transform Homography Reading: FP Chapter 15.1 (text) Some slides from Lazebnik.
IRIS RECOGNITION SYSTEM
Face Detection 蔡宇軒.
April 21, 2016Introduction to Artificial Intelligence Lecture 22: Computer Vision II 1 Canny Edge Detector The Canny edge detector is a good approximation.
IRIS RECOGNITION 1 CITY ENGINEERING COLLEGE Technical Seminar On “IRIS RECOGNITION” By NANDAN.T.MURTHY 1CE06EC043.
Another Example: Circle Detection
Saleh Ud-din Ahmad Dr. Md. Shamim Akhter
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
Iris Recognition.
Study Of Iris Recognition Schemes(Interim - Power Point Presentation)
Following the work of John Daugman University of Cambridge
Fitting Curve Models to Edges
Fourier Transform of Boundaries
A Block Based MAP Segmentation for Image Compression
Presentation transcript:

Iris Recognition

Iris Recognition Introduction Iris location Unwrapping Bit-code generation Database access Hamming distance Demonstration Results and conclusions

Introduction - Motivation Iris is good for identification Low correlation

Introduction John Daugman Dennis Gabor

Iris Location

Iris Location

Iris Location

Iris Location

Unwrapping the iris Why? We want to turn this: ... into this: Why? Because it’s computationally cheaper to work with

Unwrapping the iris The problem: The solution: Iris bound by two nonconcentric circles The human iris is not static (can be thought of like a rubber sheet) The solution: Similar to warping from Polar to Cartesian

Bitcode generation Why? To have a way of storing and comparing irises Now we want to turn this: ... into this (bitcode): Why? To have a way of storing and comparing irises

Bitcode generation: Gabor filtering Gabor wavelets Essentially just trigonometric functions in a Gaussian envelope 6 constants define shape of each wavelet Real and complex part

Bitcode generation: Gabor filtering To generate one bit in the bitcode: Define a Gabor wavelet Convolve wavelet with unwrapped image Calculate a sum of the resulting matrix If the result is > 0, add a bit with value of 1, otherwise, add a bit with value of 0 Bitcode size determined by number of different wavelets

Database Where to store What to store How to store and access data How to manage data and view metadata

Where to store DoC Postgres Database Ease of shared access JDBC interface compatibility SQL coverage in lectures

What to store Images or just bit-code Advantages to both What other metadata Access status What format to store the bit-code in

Converting bit-code Byte array format for admission into postgres The most significant bit in the result is guaranteed not to be a 1 (since BitSet does not support sign extension). The byte-ordering of the result is big-endian which means the most significant bit is in element 0. The bit at index 0 of the bit set is assumed to be the least significant bit.

How to store it JDBC Package Advantage of using Java for implementation Class databaseWrapper is in itself a new connection to the database with a scrollable resultset Allows other parts of the software to implement db functions and access metadata

How to manage data Functions in the code or in the database Administrators need to see and manage the database Means the db is fully integrated i.e software cannot be used without a connection

Iriscode Matching: Hamming Distance Simplest approach among many. The percentage of bits which disagree:

In theory... For two images of the same iris, the Hamming distance is zero. Different irises should give a Hamming distance of around 0.5.

In practice... Will never get zero for different images, even if it’s the same iris. Instead, look for a threshold. Daugman shows that a Hamming distance between 0 and 0.33 is good enough for a match. See his paper ‘How Iris Recognition Works’ for details. Our graph, although not perfect, shows similar behaviour. So we take 0.33 as our threshold point.

Two things to be mindful of... One: Ideally, we should account for occlusions in the image: eyelids, eyelashes, reflections. Two: Rotational inconsistencies between the two iris images, i.e. head tilt and movement of eye within its orbit, result in misaligned iriscodes. We address this as follows...

Bitshifting Hold one code in place and bitshift the other left/right, each time obtaining a different Hamming distance. Take the minimum such distance. It corresponds to our best match.

Limitations of Algorithms: Unwrapping the Iris The algorithm which unwraps the iris makes an assumption about how the iris looks when the pupil and limbus boundaries are not concentric. More than one option here. Different choices give different results. Implies no one method is perfect.

Limitations of Algorithms: Occlusion Detection No algorithm will detect, with 100% accuracy, all occlusions present in image. Some invalid bits go undetected and are passed into Hamming algorithm as valid bits. Cannot then get zero, even with two images of same iris. Bottom line: imperfect algorithms give imperfect results.

GUI

Results Daugman

Results One Eye

Results Two Eyes

Spot the difference...

Results Gaussian

Conclusion The team produced much more than any one individual could have in the time There is a lot still to learn... ...good start understanding Iris Recognition... ...and engineering software in teams

Acknowledgements Dr. Ashok Argent-Katwala Professor Duncan Gillies Supervisor Professor Duncan Gillies Additional advice David McBride Help with Condor

Bibliography "High confidence visual recognition of persons by a test of statistical independence." . Daugman, J. 1993. s.l. : IEEE Transactions on Pattern Analysis and Machine Intelligence, 1993, Vols. vol. 15(11), pp. 1148-1161. ‘How Iris Recognition Works’. Daugman, J. 2004. vol.14(1), s.l. : IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004. A 3x3 Isotropic Gradient Operator for Image Processing. Sobel, I. and Feldman, G. 1968. s.l. : presented at a talk at the Stanford Artificial Project ., 1968. A Linear Algorithm for Incremental Digital Display of Circular Arcs. Bresenham, J.E. 1977. s.l. : Communications of the ACM, 20(2), 1977. Vols. February ,100-106. Bresenham, J.E. (1965) “Algorithm for computer control of a digital plotter”. IBM Systems Journal Vol 4(1). Nelder, J.A. and Mead, R. 1965. s.l. : Computer Journal, 1965, Vols. vol.7, pp.308-313. W.K Kong and D. Zhang (2001), “Accurate Iris Segmentation Based on Novel Reflection and Eyelash Detection Model,” Proceedings of International Symposium on Intelligent Multimedia, Video and Speech Processing,Hong Kong. Libor Masek, Rocognition of Human Iris Patterns for Biometric Identification, University of Western Australia, 2003. Arvacheh, E.M.; Tizhoosh, H.R. (2006) 'IRIS Segmentation: Detecting Pupil, Limbus and Eyelids', Image Processing, 2006 IEEE International Conference.