Iris segmentation using illuminance texture-based features

Number of pages: 78 File Format: word File Code: 31591
Year: 2011 University Degree: Master's degree Category: Electronic Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Iris segmentation using illuminance texture-based features

    Dissertation for Master's Degree (MSC)

    Electronics Orientation

    Dissertation abstract (including summary, objectives, implementation methods and results obtained):

    A biometric system based on the unique characteristics of each person automatically identifies people. The system includes several steps to be able to identify a person. These steps are 1) taking an image 2) separating and isolating the iris region in the captured image 3) normalization 4) feature extraction and matching. In this project, we are trying to talk about the separation of the iris area from the captured image. The separation step is very important and sensitive because the codes based on these areas are not accurate subsequently and this wrong information is given to the system at the registration stage. The research presented in this thesis is to present two solutions for accurate iris zoning based on the characteristics of the lighting texture. The first solution is using the active contour method. In this method, using the values ??obtained from the input image, it gives us the equation of an ellipse, which represents the desired iris region. This program was tested on 100 images from the collection of known reference images (Kasia) and the success rate was about 89% with an error The second solution is to use wavelet and genetics. By using the wavelet coefficients of the input image, we get a circle that is placed on the smallest possible area by the genetic program, which is the iris area. The success rate is about 83.5% with an error of 16.5%. It has been shown that identifying people through iris images with the proposed methods has acceptable results. Attention and precision are among the available methods. rtl;"> statement of the problem:

    A biometric system automatically identifies people based on the unique characteristics of each person. Identification through iris images is now considered as one of the most reliable and reliable methods. Most of the commercial products in the field of iris are made based on the registered algorithm proposed by Dogman, which has 100% identification capability, but the algorithms presented in the articles are reported under favorable test conditions and without considering practical problems. The research presented in this thesis includes Iris image segmentation is based on light texture features. A set of CASIA images was used as a test. The presented method includes iris image segmentation based on two methods of active contours and genetic algorithm, which can determine the inner and outer borders of the iris along with its center and radii. 756 images from 108 people have been tested and the success rate is about 89% with an error rate of 11%.

    1-2       Research objectives:

    Here our goal is to do a better zoning using the lighting texture features

    Or in other words, improve the zoning with the help of methods.

    1-3 The importance of the research topic and the motivation to choose it:

    Identification through iris images is currently considered as one of the most reliable and feasible methods. This thesis includes iris segmentation using features based on lighting texture.

    1-4       Questions and main hypotheses of the problem:

    Research question:

    Is it possible to design and implement a new algorithm that is highly reliable for identification through the iris?

    research hypotheses:

    There are many parameters in the zoning of eye images that must be determined first.First, the border of the iris and sclera should be determined, then finding the pupil using wavelet transform and finally testing the techniques on the database, these parameters have a great impact on the identity recognition performance. It seems that if these parameters can be accurately obtained during the zoning, the zoning can be done with the least error.

    5-1 Biometric Technology

    Since ancient times, humans have been using fingerprints to identify people. As a commercial contract has been found in China belonging to 1200 years ago, and the end of the contract was signed by the parties. Still in the Far East, the fingerprint of the owner of the book can be seen on the back of the books where the name is written. For the first time in 1870 AD, the use of measuring different parts of the bones of prisoners' bodies was introduced by a French person named Burliton, and this system was used in the United States of America until 1920. In 1880 AD, the use of fingerprints and faces was suggested. In the identification card that was issued to people in Germany after World War II, the owner's fingerprint was also recorded. With the advancement of signal processing science in the 1960s, in addition to the previous ones, voice and signature were also used. Retinal capillaries were the next thing that was implemented in the 1980s. Although the use of iris was proposed in 1936, its use became practical in 1993. In today's modern society, due to the rapid growth of the economy, there is an increased need to recognize or confirm the identity of people in investment. When granting access is necessary to do something, for example entering a forbidden place or the presence and absence of people in a company, granting permission is generally in the form of issuing privileges to a specific person or group. In this chapter, we will review biometric technology. Biometric [1]:

    Recognition of human identity as a security issue has long been considered. Today, with the development of technology and the need for more security in societies, it has made people look for faster and more reliable ways to identify people. Identification methods have become more accurate and reliable over time. Identification methods are usually of three types:

    1- A person's assets, such as keys, magnetic cards, and smart cards.

    2- Through knowledge, such as passwords and identification numbers.

    3- Biometric properties.

    Biometrics is the automatic or semi-automatic use of physiological characteristics or behavioral characteristics of the human body and its analysis in order to identify a person. Each of the used methods has weaknesses and strengths that can be eliminated by combining them with other security methods. The biometric system is designed in such a way that instead of using something you have like a key or something you know like a password, it uses what the human being has made. Things that are never lost, stolen or forgotten. Also, in the identification process, a person must be present and it is not necessary to memorize or remember information. For this reason, experts consider this method of identification to be much safer and more reliable than any other method. In the biometric system, we are faced with two principles: [1]

    Identity recognition

    Identity verification

    The biometric system is able to confirm whether a person is the person he claims to be. Also, by receiving the person's information and compare it with the files saved by the deceased person to confirm his identity. In fact, confirmation is a one-to-one comparison. For example, in hand verification, the scanned hand pattern is compared with the hand of the person who claims it. While identity recognition requires that a person's characteristic is compared to the same characteristic of all the people who are stored. For example, it compares your fingerprint with all stored fingerprints, and finally, if it is already stored, it will recognize the person. The difference between these two is well shown in (Figure 2-1) and (Figure 2-2).

    Abstract

    A biometric system provides automatic identification based on a unique feature of an individual.

  • Contents & References of Iris segmentation using illuminance texture-based features

    List:

    Chapter 1: Introduction. 2

    1-1 statement of the problem. 2

    1-2 research objectives. 3

    1-3 The importance of the research topic and the motivation to choose it. 3

    1-4 questions and hypotheses of the problem. 3

    1-5 biometric technology. 4

    1-5-1 Introduction of biometric technology. 5

    1-5-1-1 fingerprint. 9

    1-5-1-2 retina. 10

    1-5-1-3 hand geometry. 11

    1-5-1-4 Confirmation of the speaker's voice. 11

    1-5-1-5 palm. 12

    1-5-1-6 iris. 12

    1-5-2 Advantages and disadvantages of the biometric method. 14

    1-5-2-1 biometric vulnerability. 15

    1-6 Identity recognition system using iris. 16

    1-6-1 Image acquisition. 17

    1-6-2 Iris zoning. 18

    1-6-3 normalization of the iris. 18

    1-6-4 Extraction and encryption of features 19

    1-6-5 Matching. 19

    1-7 Thesis process. 19

    Chapter 2: The iris of the eye. 22

    2-1 Introduction to the iris of the eye. 23

    2-2 Identity recognition through iris images. 25

    2-2-1 How does the iris recognition system work? 25

    2-3 overview of existing methods. 27

    2-3-1 Chen method. 27

    2-3-2 Fat method. 29

    2-3-3 Kang method. 33

    2-3-4 Basit method. 34

    2-3-5 edema method. 36

    2-3-6 Mirza method 38

    2-3-7 Annapurani method. 41

    2-3-8 Hoff conversion. 45

    2-3-9 active contour models. 48

    2-4 overview of other available methods. 48

    2-4-1 Separating the iris and eyelids from the eye image. 48

    2-4-2 Separating the internal border and calculating the radius and center of the pupil. 49

    2-4-3 Separation of the external border and calculation of the radius and center of the iris. 50

    2-5 a summary of the existing methods used. 51

    6-2 Conclusion. 55

    Chapter 3: Zoning of the iris. 56

    Introduction. 57

    3-1 Iris zoning. 57

    3-2 wavelet. 58

    3-2-1 types of wavelet transform. 59

    3-2-1-1 continuous wavelet transform. 59

    3-2-1-2 discrete wavelet transform. 60

    3-2-1-3 two-dimensional wavelet transform. 63

    3-3 active contours. 65

    3-3-1 active contours Parametric. 66

    3-3-2 Work done in the thesis. 69

    3-4 Genetic Algorithm. 69

    3-4-1 History of Genetic Algorithm. 70

    3-4-2 Law of Natural Selection. 71

    3-4-3 How does Genetic Algorithm work? 72

    3-4-4 Some Algorithm Terms Genetics. 73

    3-5 Iris zoning. 74

    3-5-1 Iris zoning. 75

    3-6 Border separation based on active contours. 76

    3-6-1 Introduction to circle separation methods. 76

    3-6-2 Border separation. 78

    3-7 Apply method Taken in the thesis. 79

    3-7-1 first method. 79

    3-7-2 second method. 79

    3-7-1-1 explanation of the methods used. 79

    3-8 conclusion. 91

    Chapter 4: Experiments .. 92

    Introduction. ..93

    4-1 reference images. 93

    4-2 The function of the active contour method. 94

    4-2-1 Test of the active contour method on 100 images. 94

    4-2-2 The results of the active contour method test. 96

    4-2-3 Analysis of the results obtained from the program. .97

    3-4 wavelet method and genetics. 98

    4-3-1 Test of wavelet and genetic method on 100 images. 98.

    4-3-2 The results obtained from the genetic and wavelet test. 100

    4-3-3 The results obtained from the genetic and wavelet test. 101

    4-4 Results from CASIA and MMU databases. 102

    4-5 other results of research on the database in question. 103

    4-6 Conclusion. 104

    Chapter 5: Conclusion and suggestions 105

    Introduction. 106

    5-1 Examining the results of the active contour method. 106

    5-2 Examining the results of wavelet and genetic methods. 107

    5-3 Examining the results of CASIA and MMU databases. 107

    5-4 Checking other results of research on the target database. 108

    5-5 Summary. 108

    5-6 suggestions for further research. 109

    References

    Source:

     

    [1] B. Miller, “Vital signs of identification,” in IEEE Spectrum, vol. 31, no. 2, pp. 22-30,1994.

    [2] Zdene&-V?clav, 1999, Biometric Authentication Systems, publisher: Faculty of Informatics Masaryk University.

    [3]  

    [3] Reillo, 2000, 1168-1171, Biometric Identification through Han Geometry Measurements, IEEE Transactions on Intelligence, Vol. 22. [4] Shu&-Zhang, 2004, 2359-2362, Automated Personal Identification by Palmprint, optical engineering, Vol.37. [5] Zhang&Etal, 2003, 1041-1050, Online Palmprint Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.25. [6] Shu&-Zhang, 1998, 219-223, Palm prints Verification: An Implementation of Biometric Technology, International Conference on Pattern Recognition, Vol. 1. [7] Nishino&-Nayar, 2004, 704-711, Eyes for relighting, ACM Transactions on Graphics, Vol.23. [8] Huang&Etal, 2002, 450-454, An Efficient Iris Recognition System, International Conference on Machine Learning and Cybernetics. [9] Wildes, 1997, 1348-1363, Iris recognition: an emerging biometric technology, ProceedingsoftheIEEE, Vol.85.

    [10]           Daugman, 2004, 21-30, How Iris Recognition Works, IEEE on Transactions Circuits and Systems for Video Technology, Vol.14.

    [11]           Sanderson&-Erbetta, 2000, 8, Authentication for secure environments based on iris scanning technology, IEE Seminar Digests, Vol. 2000. [12] Chinese Academy of Sciences, Institute of Automation, CASIA Iris Image Database (version 1.0), Available at: http://www.sinobiometrics.com/resources.htm. [13] Bowyer&Etal, 2008, 281-307, Image Understanding for Iris Biometrics, Computer Vision and Image Understanding, Vol. 110. [14] Chen&Etal, 2006, 373-381, Localized Iris Image Quality Using 2-D Wavelet, International Conference on Biometrics. [15] Ng &Etal, 2008, 548-553, An Effective Segmentation Method for Iris Recognition System, International Conference on Visual Information Engineering.

    [16] Kong&-Zhang, 2003, 1025–1034, Detecting eyelash and Reflection for Accurate Iris Segmentation, Journal of Pattern Recognition and Artificial Intelligence.

    [17] Basit&Etal, 2007, 720-723, A Robust Method of Complete Iris Segmentation, International Conference on Intelligent and Advanced Systems.

    [18]            Adam&Etal, 2008, 82-85, Eyelid Localization for Iris Identification, VOL. 17. [19] Mirza&Etal, 2009, 533-536, A robust eyelid and eyelash removal method and a local binarizationbased feature extraction technique for Iris Recognition System, IEEE International Multitopic [20] Annapoorani&Etal, 2010, 1492-1499, Accurate and Fast Iris Segmentation.

    [21] D, Zhang, Biometric solution for authentication in an E-world. Kluwer Academics publishers.Boston,2002.

    [22] TJAN&Etal, 2004, 3977-3980, Fast Algorithm and Application of Hough Transform in Iris Segmentation, International Conference on Machine Learning and Cybernetics, vol.7.

    [23] N. Ritter, "Location of the pupil-iris border in slit-lamp images of the cornea," in IARP10th International Conference on Image Analysis and Processing (ICIAP), pp. 740-745, Venice, Italy, September, 1999.

    [24] J. Greco, D. Kallenborn, and M. C, Nechyba, “Statistical pattern recognition of the iris,” In FCRAP, 17th annual Florida Conference on the recent Advances in Robotics, Florida, December 2004.

    [25] L. Ma, Y. Wang, and T.Tan, "Iris recognition using circular symmetric filters," in Processing Of 16th International Conference on Pattern Recognition, vol.2, pp.414-417, Quebec, Canada, August, 2002. [26] H. Sung, J. Lim, j. H. park, and Y. Lee, "Iris recognition using collarette boundary localization," in proceedings of the 17th International Conference on pattern recognition, Cambridge, Unite Kingdon, 1051-4651, August 2004. [27] L.
Iris segmentation using illuminance texture-based features