Contents & References of Iris segmentation using illuminance texture-based features
List:
Chapter 1: Introduction. 2
1-1 statement of the problem. 2
1-2 research objectives. 3
1-3 The importance of the research topic and the motivation to choose it. 3
1-4 questions and hypotheses of the problem. 3
1-5 biometric technology. 4
1-5-1 Introduction of biometric technology. 5
1-5-1-1 fingerprint. 9
1-5-1-2 retina. 10
1-5-1-3 hand geometry. 11
1-5-1-4 Confirmation of the speaker's voice. 11
1-5-1-5 palm. 12
1-5-1-6 iris. 12
1-5-2 Advantages and disadvantages of the biometric method. 14
1-5-2-1 biometric vulnerability. 15
1-6 Identity recognition system using iris. 16
1-6-1 Image acquisition. 17
1-6-2 Iris zoning. 18
1-6-3 normalization of the iris. 18
1-6-4 Extraction and encryption of features 19
1-6-5 Matching. 19
1-7 Thesis process. 19
Chapter 2: The iris of the eye. 22
2-1 Introduction to the iris of the eye. 23
2-2 Identity recognition through iris images. 25
2-2-1 How does the iris recognition system work? 25
2-3 overview of existing methods. 27
2-3-1 Chen method. 27
2-3-2 Fat method. 29
2-3-3 Kang method. 33
2-3-4 Basit method. 34
2-3-5 edema method. 36
2-3-6 Mirza method 38
2-3-7 Annapurani method. 41
2-3-8 Hoff conversion. 45
2-3-9 active contour models. 48
2-4 overview of other available methods. 48
2-4-1 Separating the iris and eyelids from the eye image. 48
2-4-2 Separating the internal border and calculating the radius and center of the pupil. 49
2-4-3 Separation of the external border and calculation of the radius and center of the iris. 50
2-5 a summary of the existing methods used. 51
6-2 Conclusion. 55
Chapter 3: Zoning of the iris. 56
Introduction. 57
3-1 Iris zoning. 57
3-2 wavelet. 58
3-2-1 types of wavelet transform. 59
3-2-1-1 continuous wavelet transform. 59
3-2-1-2 discrete wavelet transform. 60
3-2-1-3 two-dimensional wavelet transform. 63
3-3 active contours. 65
3-3-1 active contours Parametric. 66
3-3-2 Work done in the thesis. 69
3-4 Genetic Algorithm. 69
3-4-1 History of Genetic Algorithm. 70
3-4-2 Law of Natural Selection. 71
3-4-3 How does Genetic Algorithm work? 72
3-4-4 Some Algorithm Terms Genetics. 73
3-5 Iris zoning. 74
3-5-1 Iris zoning. 75
3-6 Border separation based on active contours. 76
3-6-1 Introduction to circle separation methods. 76
3-6-2 Border separation. 78
3-7 Apply method Taken in the thesis. 79
3-7-1 first method. 79
3-7-2 second method. 79
3-7-1-1 explanation of the methods used. 79
3-8 conclusion. 91
Chapter 4: Experiments .. 92
Introduction. ..93
4-1 reference images. 93
4-2 The function of the active contour method. 94
4-2-1 Test of the active contour method on 100 images. 94
4-2-2 The results of the active contour method test. 96
4-2-3 Analysis of the results obtained from the program. .97
3-4 wavelet method and genetics. 98
4-3-1 Test of wavelet and genetic method on 100 images. 98.
4-3-2 The results obtained from the genetic and wavelet test. 100
4-3-3 The results obtained from the genetic and wavelet test. 101
4-4 Results from CASIA and MMU databases. 102
4-5 other results of research on the database in question. 103
4-6 Conclusion. 104
Chapter 5: Conclusion and suggestions 105
Introduction. 106
5-1 Examining the results of the active contour method. 106
5-2 Examining the results of wavelet and genetic methods. 107
5-3 Examining the results of CASIA and MMU databases. 107
5-4 Checking other results of research on the target database. 108
5-5 Summary. 108
5-6 suggestions for further research. 109
References
Source:
[1] B. Miller, “Vital signs of identification,” in IEEE Spectrum, vol. 31, no. 2, pp. 22-30,1994.
[2] Zdene&-V?clav, 1999, Biometric Authentication Systems, publisher: Faculty of Informatics Masaryk University.
[3]
[3] Reillo, 2000, 1168-1171, Biometric Identification through Han Geometry Measurements, IEEE Transactions on Intelligence, Vol. 22. [4] Shu&-Zhang, 2004, 2359-2362, Automated Personal Identification by Palmprint, optical engineering, Vol.37. [5] Zhang&Etal, 2003, 1041-1050, Online Palmprint Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.25. [6] Shu&-Zhang, 1998, 219-223, Palm prints Verification: An Implementation of Biometric Technology, International Conference on Pattern Recognition, Vol. 1. [7] Nishino&-Nayar, 2004, 704-711, Eyes for relighting, ACM Transactions on Graphics, Vol.23. [8] Huang&Etal, 2002, 450-454, An Efficient Iris Recognition System, International Conference on Machine Learning and Cybernetics. [9] Wildes, 1997, 1348-1363, Iris recognition: an emerging biometric technology, ProceedingsoftheIEEE, Vol.85.
[10] Daugman, 2004, 21-30, How Iris Recognition Works, IEEE on Transactions Circuits and Systems for Video Technology, Vol.14.
[11] Sanderson&-Erbetta, 2000, 8, Authentication for secure environments based on iris scanning technology, IEE Seminar Digests, Vol. 2000. [12] Chinese Academy of Sciences, Institute of Automation, CASIA Iris Image Database (version 1.0), Available at: http://www.sinobiometrics.com/resources.htm. [13] Bowyer&Etal, 2008, 281-307, Image Understanding for Iris Biometrics, Computer Vision and Image Understanding, Vol. 110. [14] Chen&Etal, 2006, 373-381, Localized Iris Image Quality Using 2-D Wavelet, International Conference on Biometrics. [15] Ng &Etal, 2008, 548-553, An Effective Segmentation Method for Iris Recognition System, International Conference on Visual Information Engineering.
[16] Kong&-Zhang, 2003, 1025–1034, Detecting eyelash and Reflection for Accurate Iris Segmentation, Journal of Pattern Recognition and Artificial Intelligence.
[17] Basit&Etal, 2007, 720-723, A Robust Method of Complete Iris Segmentation, International Conference on Intelligent and Advanced Systems.
[18] Adam&Etal, 2008, 82-85, Eyelid Localization for Iris Identification, VOL. 17. [19] Mirza&Etal, 2009, 533-536, A robust eyelid and eyelash removal method and a local binarizationbased feature extraction technique for Iris Recognition System, IEEE International Multitopic [20] Annapoorani&Etal, 2010, 1492-1499, Accurate and Fast Iris Segmentation.
[21] D, Zhang, Biometric solution for authentication in an E-world. Kluwer Academics publishers.Boston,2002.
[22] TJAN&Etal, 2004, 3977-3980, Fast Algorithm and Application of Hough Transform in Iris Segmentation, International Conference on Machine Learning and Cybernetics, vol.7.
[23] N. Ritter, "Location of the pupil-iris border in slit-lamp images of the cornea," in IARP10th International Conference on Image Analysis and Processing (ICIAP), pp. 740-745, Venice, Italy, September, 1999.
[24] J. Greco, D. Kallenborn, and M. C, Nechyba, “Statistical pattern recognition of the iris,” In FCRAP, 17th annual Florida Conference on the recent Advances in Robotics, Florida, December 2004.
[25] L. Ma, Y. Wang, and T.Tan, "Iris recognition using circular symmetric filters," in Processing Of 16th International Conference on Pattern Recognition, vol.2, pp.414-417, Quebec, Canada, August, 2002. [26] H. Sung, J. Lim, j. H. park, and Y. Lee, "Iris recognition using collarette boundary localization," in proceedings of the 17th International Conference on pattern recognition, Cambridge, Unite Kingdon, 1051-4651, August 2004. [27] L.