Contents & References of Iris segmentation using illuminance texture-based features
List:
Chapter 1: Introduction. 2
1-1 statement of the problem. 2
1-2 research objectives. 3
1-3 The importance of the research topic and the motivation to choose it. 3
1-4 questions and hypotheses of the problem. 3
1-5 biometric technology. 4
1-5-1 Introduction of biometric technology. 5
1-5-1-1 fingerprint. 9
1-5-1-2 retina. 10
1-5-1-3 hand geometry. 11
1-5-1-4 Confirmation of the speaker's voice 11
1-5-1-5 Palm. 12
1-5-1-6 iris. 12
1-5-2 Advantages and disadvantages of the biometric method. 14
1-5-2-1 biometric vulnerability. 15
1-6 Identity recognition system using iris. 16
1-6-1 Image acquisition. 17
1-6-2 Iris zoning. 18
1-6-3 normalization of the iris. 18
1-6-4 Extraction and encryption of features 19
1-6-5 Matching. 19
1-7 Thesis process. 19
Chapter 2: The iris of the eye. 22
2-1 Introduction to the iris of the eye. 23
2-2 Identity recognition through iris images. 25
2-2-1 How does the iris recognition system work? 25
2-3 overview of existing methods. 27
2-3-1 Chen method. 27
2-3-2 Fat method. 29
2-3-3 Kang method. 33
2-3-4 Basit method. 34
2-3-5 edema method. 36
2-3-6 Mirza method 38
2-3-7 Annapurani method. 41
2-3-8 Hoff conversion. 45
2-3-9 active contour models. 48
2-4 overview of other available methods. 48
2-4-1 Separating the iris and eyelids from the eye image. 48
2-4-2 Separating the internal border and calculating the radius and center of the pupil. 49
2-4-3 Separation of the external border and calculation of the radius and center of the iris. 50
2-5 Summary of the existing methods used 51
2-6 Conclusion. 55
Chapter 3: Zoning of the iris. 56
Introduction. 57
3-1 Iris zoning. 57
3-2 wavelet. 58
3-2-1 types of wavelet transform. 59
3-2-1-1 continuous wavelet transform. 59
3-2-1-2 discrete wavelet transform. 60
3-2-1-3 two-dimensional wavelet transform. 63
3-3 active contours. 65
3-3-1 active contours Parametric. 66
3-3-2 Work done in the thesis. 69
3-4 Genetic Algorithm. 69
3-4-1 History of Genetic Algorithm. 70
3-4-2 Law of Natural Selection. 71
3-4-3 How does Genetic Algorithm work? 72
3-4-4 Some genetic algorithm terms.73
3-5 Iris zoning. 74
3-5-1 Iris zoning. 75
3-6 Border separation based on active contours. 76
3-6-1 Introduction to circle separation methods. 76
3-6-2 Border separation. 78
3-7 The method used in the thesis. 79
3-7-1 The first method.79
3-7-2 The second method.79
3-7-1-1 Explanation of the methods used.79
3-8 Conclusion.91
Chapter 4: Experiments..92
Introduction. ..93
4-1 reference images. 93
4-2 The function of the active contour method. 94
4-2-1 Test of the active contour method on 100 images. 94
4-2-2 The results of the active contour method test. 96
4-2-3 Analysis of the results obtained from the program. .97
3-4 wavelet method and genetics. 98
4-3-1 Test of wavelet and genetic method on 100 images. 98.
4-3-2 The results obtained from the genetic and wavelet test. 100
4-3-3 The results obtained from the genetic and wavelet test. 101
4-4 Results from CASIA and MMU databases. 102
4-5 other results of research on the database in question. 103
4-6 Conclusion. 104
Chapter 5: Conclusion and suggestions 105
Introduction. 106
5-1 Examining the results of the active contour method. 106
5-2 Examining the results of wavelet and genetic methods. 107
5-3 Examining the results of CASIA and MMU databases. 107
5-4 Checking other results of research on the target database. 108
5-5 Summary. 108
5-6 suggestions for further research. 109
References 102
List of forms
Chapter109
References 102
List of forms
Chapter One
Figure (1-1) Identification. 7
Figure (1-2) identity verification. 7
Figure (1-3) biometric methods. 9
Figure (1-4) is an example of fingerprints obtained from different scanners. 10
Figure (1-5) Retina. 11
Figure (1-6) image of the iris. 13
Figure (1-7) identity recognition system. 16
Figure (1-8) eye image from Kasia database. 17
Chapter Two
Figure (1-2) front view of the eye. 23
Figure (2-2) histology of wool and its related details. 25
Figure (2-3) Pupil zoning in Fat method. 30
Figure (2-4) outer and inner borders of the iris. 31
Figure (2-5) zoning upper and lower eyelids. 32
Figure (2-6) zoning of the inner and outer borders of the iris with the Basit method. 35
Figure (2-7) is an example of zoning the eyelids by Basit method. 35
Figure (2-8) edge mapping. 36
Figure (9-2) final edge selection. 37
Figure (2-10) an example of the zoning of the eyelids 38
Figure (2-11) a window for identifying the eyelids. 39
Figure (2-12) Eyelid and eyelash detection 40
Figure (2-13) Pupil zoning. 42
Figure (2-14) Edge gradient image. 43
Figure (2-15) Zoning of pupil, iris and eyelid by Annapurani method. 44
Figure (2-16) Zoning of pupil, iris and eyelid. 45
Figure (17-2) some examples of pupil zonation. 46
Figure (2-18) Binary image. 47
Figure (2-19) Separation of the internal border and pupil. 49
Figure (20-2) Pupil radius calculation. 49
Figure (21-2) Internal border of iris and pupil. 50
Source:
[1] B. Miller, “Vital signs of identification,” in IEEE Spectrum, vol. 31, no. 2, pp. 22-30,1994.
[2]Zdene&V?clav, 1999, Biometric Authentication Systems, publisher: Faculty of Informatics Masaryk University.
[3]Reillo, 2000, 1168-1171, Biometric Identification through Han Geometry Measurements, IEEE Transactions on Intelligence, Vol. 22. [4] Shu&-Zhang, 2004, 2359-2362, Automated Personal Identification by Palmprint, optical engineering, Vol.37.
[5] Zhang&Etal, 2003, 1041 - 1050, Online Palmprint Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.25.
[6] Shu&-Zhang, 1998, 219-223, Palm prints Verification: An Implementation of Biometric Technology, International Conference on Pattern Recognition, Vol. 1.
[7]Nishino&-Nayar, 2004, 704-711, Eyes for relighting, ACM Transactions on Graphics, Vol.23.
[8]Huang&Etal, 2002, 450-454, An Efficient Iris Recognition System, International Conference on Machine Learning and Cybernetics.
[9]Wildes, 1997, 1348 - 1363, Iris recognition: an emerging biometric technology, ProceedingsoftheIEEE, Vol.85.
[10] Daugman, 2004, 21-30, How Iris Recognition Works, IEEE on Transactions Circuits and Systems for Video Technology, Vol.14.
[11] Sanderson&-Erbetta, 2000, 8, Authentication for secure environments based on iris scanning technology, IEE Seminar Digests, Vol. 2000.
[12]Chinese Academy of Sciences, Institute of Automation, CASIA Iris Image Database(version 1.0), Available at: http://www.sinobiometrics.com/resources.htm.
[13]Bowyer&Etal, 2008, 281-307, Image Understanding for Iris Biometrics, Computer Vision and Image Understanding, Vol. 110.
[14]Chen&Etal, 2006, 373-381, Localized Iris Image Quality Using 2-D Wavelet, International Conference on Biometrics.
[15]Ng &Etal, 2008, 548-553, An Effective Segmentation Method for Iris Recognition System, International Conference on Visual Information Engineering.
[16]Kong&-Zhang, 2003, 1025–1034, Detecting eyelash and Reflection for Accurate Iris Segmentation, Journal of Pattern Recognition and Artificial Intelligence.
[17]Basit&Etal, 2007, 720-723, A Robust Method of Complete Iris Segmentation, International Conference on Intelligent and Advanced Systems.
[18]Adam&Etal, 2007, 720-723. 2008, 82-85, Eyelid Localization for Iris Identification, VOL. 17.