It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

International Journal of Image, Graphics and Signal Processing(IJIGSP)

International Journal of Image, Graphics and Signal Processing (IJIGSP)

ISSN: 2074-9074(Print), ISSN: 2074-9082 (Online)

Publisher: MECS
  • IJIGSP Vol.5, No.5, April 2013

Performance of Personal Identification System Technique Using Iris Biometrics Technology

 
Full Text (PDF, 298KB), PP.63-71, DOI: 10.5815/ijigsp.2013.05.08  
Author(s)  
V.K. Narendira Kumar,B. Srinivasan  
Index Terms  
Biometrics, Iris, Feature Processing, Iris Acquisition, Template  
Abstract  

The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris recognition uses iris patterns for personnel identification. The system steps are capturing iris patterns; determining the location of iris boundaries; converting the iris boundary to the stretched polar coordinate system; extracting iris code based on texture analysis. The system has been implemented and tested using dataset of number of samples of iris data with different contrast quality. The developed algorithm performs satisfactorily on the images, provides 93% accuracy. Experimental results show that the proposed method has an encouraging performance.

 
Reference  
[1]J. Daugman, "High confidence personal identification by rapid video analysis of iris texture", in Proceedings of the 1992 IEEE International Carnahan Conference on Security Technology, 1992.
[2]J. Daugman, "The Importance of Being Random: Statistical Principles of Iris Recognition", in Pattern Recognition, Vol. 36, No. 2, pp. 279–291, 2003.
[3]T. Matsumoto, M. Hirabayashi, and K. Sato: "A Vulnerability Evaluation of Iris Matching (Part 3)", in Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS), Institute of Electronics, Information and Communication Engineers, pp. 701–706, 2004.
[4]R.Wildes, "Iris Recognition: An Emerging Biometric Technology," Proc. IEEE, Vol. 85, No. 9, pp. 1348–1363, Sep. 1997.
[5]Liu S. And Silverman M. "A Practical Guide to Iris Biometric Security Technology", pp. 71–76, January 2000.
[6]UK Biometrics Working Group, "Use of Iris Biometrics for Identification and Authentication: Advice on Product Selection", pp. 55–68, November 2010.
[7]A.K. Jain, Rued Bolle and Sharath Pankanti "Biometrics: Personal Identification in Networked Society" Publisher: Springer; 1st edition, 1999. 2nd printing edition 2005. pp. 22–26,
[8]Shin young Lim, Kwanyong Lee, Okhwan Byeon, and Taiyun Kim., "Efficient Iris Recognition through Improvement of Feature Vector and Classifier", ETRI Journal, 23(2):61–70, June 2001.
[9]L. Ma, Y. Wang, and T. Tan., "Iris Recognition Based on Multichannel Gabor Filtering" In Proc. of the 5th Asian Conference on Computer Vision, Volume I, pages 279–283, 2002.
 
Citation  
V.K. Narendira Kumar,B. Srinivasan,"Performance of Personal Identification System Technique Using Iris Biometrics Technology", IJIGSP, vol.5, no.5, pp.63-71, 2013.DOI: 10.5815/ijigsp.2013.05.08