Iris segmentation using illuminance texture-based features

Number of pages: 105 File Format: word File Code: 30899
Year: 2011 University Degree: Master's degree Category: Electronic Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Iris segmentation using illuminance texture-based features

    Dissertation for Master Degree (MSC)

    Electronics Orientation

    Dissertation abstract (including summary, objectives, implementation methods and obtained results):

    A biometric system based on the unique characteristics of each person automatically identifies people. A system includes several steps to identify a person. These steps are 1) taking a picture 2) separating and Isolation of the iris region in the captured image 3) Normalization 4) Feature extraction and matching. In this project, we are trying to talk about the separation of the iris area from the captured image. The separation step is very important and sensitive because the codes based on these areas are not accurate subsequently and this wrong information is given to the system at the registration stage. The research presented in this thesis is to present two solutions for accurate iris zoning based on the characteristics of the lighting texture. The first solution is using the active contour method. In this method, using the values ??obtained from the input image, it gives us the equation of an ellipse, which represents the desired iris region. This program was tested on 100 images from the collection of known reference images (Kasia) and the success rate was about 89% with an error The second solution is to use wavelet and genetics. By using the wavelet coefficients of the input image, we get a circle that is placed on the smallest possible area by the genetic program, which is the iris area. The success rate is about 83.5% with an error of 16.5%. It has been shown that identifying people through iris images with the proposed methods has acceptable results. Attention and accuracy are among the available methods. Introduction Problem statement: A biometric system automatically identifies people based on the unique characteristics of each person. Identification through iris images is considered as one of the most reliable and reliable methods. Most of the commercial products in the field of iris are made based on the registered algorithm proposed by Dogman, which have 100% identification capability, but the algorithms presented in the articles are tested under favorable conditions and without considering practical problems. The research presented in this thesis includes the zoning of iris images using features based on lighting texture. To check the functionality of this algorithm, a set of Cassia images was used as a test. The presented method includes iris image segmentation based on two active contour methods and genetic algorithm, which can determine the inner and outer borders of the iris along with its center and radii. The results obtained by using several types of proposed algorithms have finally been tested on CASIA images, which include 756 images of 108 people, and the success rate is about 89% with an error rate of 11%.

    1-2       Research objectives:

    Here, our goal is to perform better zoning using the features of the lighting texture

    or in other words, to improve the zoning with the help of methods.

    1-3 The importance of the research topic and the motivation for choosing it:

    Identification through iris images is currently considered as one of the most reliable and capable methods. This thesis includes iris segmentation using features based on lighting texture. 1-4 Main questions and hypotheses of the problem: Research question: Is it possible to design and implement a new algorithm that can be identified through the iris of the eye with high reliability? First, the border of iris and sclera should be determined, then finding the pupil with the help of wavelet transformation and finally testing the techniques on the database, these parameters have a great impact on the identity recognition performance. It seems that if these parameters can be accurately obtained during the zoning, the zoning can be done with the least error. As a commercial contract has been found in China belonging to 1200 years ago, and the end of the contract was signed by the parties.Still in the Far East, the fingerprint of the owner of the book can be seen on the back of the books where the name is written. For the first time in 1870 AD, the use of measuring different parts of the bones of prisoners' bodies was introduced by a French person named Burliton, and this system was used in the United States of America until 1920. In 1880 AD, the use of fingerprints and faces was suggested. In the identification card that was issued to people in Germany after World War II, the owner's fingerprint was also recorded. With the advancement of signal processing science in the 1960s, in addition to the previous ones, voice and signature were also used. Retinal capillaries were the next thing that was implemented in the 1980s. Although the use of iris was proposed in 1936, its use became practical in 1993. In today's modern society, due to the rapid growth of the economy, there is an increased need to recognize or confirm the identity of people in investment. When granting access is necessary to do something, for example entering a forbidden place or the presence and absence of people in a company, granting permission is generally in the form of issuing privileges to a specific person or group. In this chapter, we will review biometric technology. Today, with the development of technology and the need for more security in societies, it has made people look for faster and more reliable ways to identify people. Identification methods have become more accurate and reliable over time. Identification methods are usually of three types:

    1- A person's assets, such as keys, magnetic cards, and smart cards.

    2- Through knowledge, such as passwords and identification numbers.

    3- Biometric properties.

    Biometrics using automatic or semi-automatic use of physiological or behavioral characteristics of the body. Man and its analysis is to identify the individual. Each of the used methods has weaknesses and strengths that can be eliminated by combining them with other security methods. The biometric system is designed in such a way that instead of using something you have like a key or something you know like a password, it uses what the human being has made. Things that are never lost, stolen or forgotten. Also, in the identification process, a person must be present and it is not necessary to memorize or remember information. For this reason, experts consider this method of identification to be much safer and more reliable than any other method. In the biometric system, we are faced with two principles: [1]

    Identity recognition

    Identity verification

    The biometric system is able to confirm whether a person is the person he claims to be or not. Also, by receiving the person's information and comparing it with the files saved by the deceased person, the identity can be recognized. In fact, confirmation is a one-to-one comparison. For example, in hand verification, the scanned hand pattern is compared with the hand of the person who claims it. While identity recognition requires that a person's characteristic is compared to the same characteristic of all the people who are stored. For example, it compares your fingerprint with all stored fingerprints, and finally, if it is already stored, it will recognize the person. The difference between these two is well shown in (Figure 2-1) and (Figure 2-2). Identity.

    According to the technology used in them, existing old methods can be divided based on 3 main properties [1] Proprietary-Knowledge-Biometric.

    Regarding the problems of old methods, for example, bank ATM systems, when a person wants to use his card, he needs to enter his personal identification number in order to withdraw his money. that the person has with him, which is a potential problem, for example, the card in this system can be stolen, the password is vulnerable, especially if this person behind you is looking at your hand while entering the password. However, it will be difficult for someone who has stolen the card to use the card without knowing the password.

  • Contents & References of Iris segmentation using illuminance texture-based features

    List:

     

    Chapter 1: Introduction. 2

    1-1 statement of the problem. 2

    1-2 research objectives. 3

    1-3 The importance of the research topic and the motivation to choose it. 3

    1-4 questions and hypotheses of the problem. 3

    1-5 biometric technology. 4

    1-5-1 Introduction of biometric technology. 5

    1-5-1-1 fingerprint. 9

    1-5-1-2 retina. 10

    1-5-1-3 hand geometry. 11

    1-5-1-4 Confirmation of the speaker's voice 11

    1-5-1-5 Palm. 12

    1-5-1-6 iris. 12

    1-5-2 Advantages and disadvantages of the biometric method. 14

    1-5-2-1 biometric vulnerability. 15

    1-6 Identity recognition system using iris. 16

    1-6-1 Image acquisition. 17

    1-6-2 Iris zoning. 18

    1-6-3 normalization of the iris. 18

    1-6-4 Extraction and encryption of features 19

    1-6-5 Matching. 19

    1-7 Thesis process. 19

    Chapter 2: The iris of the eye. 22

    2-1 Introduction to the iris of the eye. 23

    2-2 Identity recognition through iris images. 25

    2-2-1 How does the iris recognition system work? 25

    2-3 overview of existing methods. 27

    2-3-1 Chen method. 27

    2-3-2 Fat method. 29

    2-3-3 Kang method. 33

    2-3-4 Basit method. 34

    2-3-5 edema method. 36

    2-3-6 Mirza method 38

    2-3-7 Annapurani method. 41

    2-3-8 Hoff conversion. 45

    2-3-9 active contour models. 48

    2-4 overview of other available methods. 48

    2-4-1 Separating the iris and eyelids from the eye image. 48

    2-4-2 Separating the internal border and calculating the radius and center of the pupil. 49

    2-4-3 Separation of the external border and calculation of the radius and center of the iris. 50

    2-5 Summary of the existing methods used 51

    2-6 Conclusion. 55

    Chapter 3: Zoning of the iris. 56

    Introduction. 57

    3-1 Iris zoning. 57

    3-2 wavelet. 58

    3-2-1 types of wavelet transform. 59

    3-2-1-1 continuous wavelet transform. 59

    3-2-1-2 discrete wavelet transform. 60

    3-2-1-3 two-dimensional wavelet transform. 63

    3-3 active contours. 65

    3-3-1 active contours Parametric. 66

    3-3-2 Work done in the thesis. 69

    3-4 Genetic Algorithm. 69

    3-4-1 History of Genetic Algorithm. 70

    3-4-2 Law of Natural Selection. 71

    3-4-3 How does Genetic Algorithm work? 72

     

     

     

     

     

     

     

     

     

     

     

     

    3-4-4 Some genetic algorithm terms.73

    3-5 Iris zoning. 74

    3-5-1 Iris zoning. 75

    3-6 Border separation based on active contours. 76

    3-6-1 Introduction to circle separation methods. 76

    3-6-2 Border separation. 78

    3-7 The method used in the thesis. 79

    3-7-1 The first method.79

    3-7-2 The second method.79

    3-7-1-1 Explanation of the methods used.79

    3-8 Conclusion.91

    Chapter 4: Experiments..92

    Introduction. ..93

    4-1 reference images. 93

    4-2 The function of the active contour method. 94

    4-2-1 Test of the active contour method on 100 images. 94

    4-2-2 The results of the active contour method test. 96

    4-2-3 Analysis of the results obtained from the program. .97

    3-4 wavelet method and genetics. 98

    4-3-1 Test of wavelet and genetic method on 100 images. 98.

    4-3-2 The results obtained from the genetic and wavelet test. 100

    4-3-3 The results obtained from the genetic and wavelet test. 101

    4-4 Results from CASIA and MMU databases. 102

    4-5 other results of research on the database in question. 103

    4-6 Conclusion. 104

    Chapter 5: Conclusion and suggestions 105

    Introduction. 106

    5-1 Examining the results of the active contour method. 106

    5-2 Examining the results of wavelet and genetic methods. 107

    5-3 Examining the results of CASIA and MMU databases. 107

    5-4 Checking other results of research on the target database. 108

    5-5 Summary. 108

    5-6 suggestions for further research. 109

    References 102

     

     

     

     

    List of forms

    Chapter109

    References 102

     

     

     

     

    List of forms

    Chapter One

    Figure (1-1) Identification. 7

    Figure (1-2) identity verification. 7

    Figure (1-3) biometric methods. 9

    Figure (1-4) is an example of fingerprints obtained from different scanners. 10

    Figure (1-5) Retina. 11

    Figure (1-6) image of the iris. 13

    Figure (1-7) identity recognition system. 16

    Figure (1-8) eye image from Kasia database. 17

    Chapter Two

    Figure (1-2) front view of the eye. 23

    Figure (2-2) histology of wool and its related details. 25

    Figure (2-3) Pupil zoning in Fat method. 30

    Figure (2-4) outer and inner borders of the iris. 31

    Figure (2-5) zoning upper and lower eyelids. 32

    Figure (2-6) zoning of the inner and outer borders of the iris with the Basit method. 35

    Figure (2-7) is an example of zoning the eyelids by Basit method. 35

    Figure (2-8) edge mapping. 36

    Figure (9-2) final edge selection. 37

    Figure (2-10) an example of the zoning of the eyelids 38

    Figure (2-11) a window for identifying the eyelids. 39

    Figure (2-12) Eyelid and eyelash detection 40

    Figure (2-13) Pupil zoning. 42

    Figure (2-14) Edge gradient image. 43

    Figure (2-15) Zoning of pupil, iris and eyelid by Annapurani method. 44

    Figure (2-16) Zoning of pupil, iris and eyelid. 45

    Figure (17-2) some examples of pupil zonation. 46

    Figure (2-18) Binary image. 47

    Figure (2-19) Separation of the internal border and pupil. 49

    Figure (20-2) Pupil radius calculation. 49

    Figure (21-2) Internal border of iris and pupil. 50

     

    Source:

    [1] B. Miller, “Vital signs of identification,” in IEEE Spectrum, vol. 31, no. 2, pp. 22-30,1994.

    [2]Zdene&V?clav, 1999, Biometric Authentication Systems, publisher: Faculty of Informatics Masaryk University.

    [3]Reillo, 2000, 1168-1171, Biometric Identification through Han Geometry Measurements, IEEE Transactions on Intelligence, Vol. 22. [4] Shu&-Zhang, 2004, 2359-2362, Automated Personal Identification by Palmprint, optical engineering, Vol.37.

    [5] Zhang&Etal, 2003, 1041 - 1050, Online Palmprint Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.25.

    [6] Shu&-Zhang, 1998, 219-223, Palm prints Verification: An Implementation of Biometric Technology, International Conference on Pattern Recognition, Vol. 1.

    [7]Nishino&-Nayar, 2004, 704-711, Eyes for relighting, ACM Transactions on Graphics, Vol.23.

    [8]Huang&Etal, 2002, 450-454, An Efficient Iris Recognition System, International Conference on Machine Learning and Cybernetics.

    [9]Wildes, 1997, 1348 - 1363, Iris recognition: an emerging biometric technology, ProceedingsoftheIEEE, Vol.85.

    [10] Daugman, 2004, 21-30, How Iris Recognition Works, IEEE on Transactions Circuits and Systems for Video Technology, Vol.14.

    [11] Sanderson&-Erbetta, 2000, 8, Authentication for secure environments based on iris scanning technology, IEE Seminar Digests, Vol. 2000.

    [12]Chinese Academy of Sciences, Institute of Automation, CASIA Iris Image Database(version 1.0), Available at: http://www.sinobiometrics.com/resources.htm.

    [13]Bowyer&Etal, 2008, 281-307, Image Understanding for Iris Biometrics, Computer Vision and Image Understanding, Vol. 110.

    [14]Chen&Etal, 2006, 373-381, Localized Iris Image Quality Using 2-D Wavelet, International Conference on Biometrics.

    [15]Ng &Etal, 2008, 548-553, An Effective Segmentation Method for Iris Recognition System, International Conference on Visual Information Engineering.

    [16]Kong&-Zhang, 2003, 1025–1034, Detecting eyelash and Reflection for Accurate Iris Segmentation, Journal of Pattern Recognition and Artificial Intelligence.

    [17]Basit&Etal, 2007, 720-723, A Robust Method of Complete Iris Segmentation, International Conference on Intelligent and Advanced Systems.

    [18]Adam&Etal, 2007, 720-723. 2008, 82-85, Eyelid Localization for Iris Identification, VOL. 17.

Iris segmentation using illuminance texture-based features