accurate biometrics authentication technique based on fast, robust iris recognition system using...

Upload: journal-of-computing

Post on 05-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    1/13

    1. INTRODUCTIONHuman eye is an organ that works with the brain and

    provided us vision. The colored part of the eye lies

    between the cornea and lens consists of connective

    tissues and smooth muscle fibers known as iris and

    that is used for person identity verification based on

    biometrics system. The confirmation of the true

    identity of a person is one of the biggest challenges in

    todays information technology world; number of

    systems has to compromise because of this challenge.

    There is need of authentication of personal identity to

    access the confidential and secure system.

    Authentication plays an important role as it is the

    basic line of defense against the intrusion attacks.

    Authentication is provided by traditional methods

    and biometrics method. Biometrics consists of the

    methods for uniquely recognizing the human identity

    by physical or behavioral characteristics. Physical

    characteristics are related to the shape of the body for

    example finger prints, face recognition and iris

    recognition while behavioral characteristics are

    related to the behavior of the person for example

    signatures, keystrokes and voice. Probability of

    variation in behavioral characteristic is more than in

    physical characteristic because it is easy to copy the

    signatures and voice as compared to the face, finger

    prints and iris of a person.

    Traditional methods include passwords, identity

    cards or token. Among all biometrics methods based

    on physical characteristics iris recognition is the most

    safe and secure identification and authentication

    technique. As iris is the internal organ of the eye and

    the basic feature of human iris is that the color, texture

    of each humans iris is unique and stable. Iris is

    protected from the surrounding environment and

    remains same till its life time so because of its stability

    and reliability it becomes the most consistent and

    secure feature for person identification and

    verification and most importantly human iris is the

    best feature for recognition and authentication.

    The basic concept of this study is to develop the

    system which does identification (one-to-manytemplate matching) and verification (one-to-one

    template matching) of a person. It is the system which

    provides the high level security to the person based

    on automated iris recognition. The main objective of

    the system is that to secure private and off the record

    data and information and it is not easily accessible to

    anyone. People can feel secure because only the

    identified and verified person can access the system.

    Accurate Biometrics Authentication Technique based on Fast,

    Robust Iris Recognition System using Enhanced Quality Image

    Zoama Afaq, Bushra Sikander,and Malik Sikander Hayat Khiyal

    AbstractThe main aim of this research is to develop biometrics authentication system with high accuracy based on human iris

    recognition using enhanced quality image. An iris recognition system has been developed using pattern recognition techniquesbased on templates i.e. the images have been captured from the live video generated from high resolution camera and has been

    stored as the Dataset. Additionally a collection of different eye images have been stored in separate database that have been used

    for comparison and matching for accurate identification and verification phenomenon. Iris identification and authentication is

    thus based on individuals eye. Authentication has been done with low error rate i.e. False Acceptance Rate (FAR) and False

    Rejection Rate (FRR). 1D Log Gabor Filters have been used for feature extraction and hamming distance has been used for

    template matching that also provides low FAR. In this way a fast and robust personal identification and verification system

    has been developed which gives the precise and accurate results. Thus the proposed system provides the secure, efficient and

    user friendly interface to the person.

    Index Terms: Biometrics Authentication, Iris Recognition, False Acceptance Rate, False Rejection Rate, Iris Identification.

    u

    Zoama Afag is an under graduate student of Department of Software

    Engineering, Fatima Jinnah Women University The Mall, Rawalpindi,

    Pakistan.

    Bushra Sikander is Lecturer at the Department of Computer Sciences,

    Fatima Jinnah Women University The Mall, Rawalpindi, Pakistan.

    Dr. Malik Sikandar Hayat Khiyal is Professor and Head of Academic

    (ES), APCOMS, Khadim Hussain Road, Lalkuti, Rawalpindi, Pakistan.

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 56

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    2/13

    There are various biometrics methods for the system

    security and user identification that contain some

    strong and weak points on the basis of which the

    project is developed. There are real systems that

    recognize the personal identification but some with

    the errors that must be minimized for proper and

    accurate system.

    User acceptance is the important issue in biometrics

    technology and we also know that various biometrics

    techniques and systems exist that confirm the person

    identity but the identification and authentication

    system based on human iris gives the satisfactory

    results. As iris is the unique organ of the eye can be

    used for person identification by extracting the iris

    pattern from the digital image of the eye of a person.

    Digital camera is used to acquire the image, the user

    must be look straight into the camera so that theaccurate image is captured which is further processed

    and used for pattern is matching. Pattern matching is

    done with the iris images already stored in the

    database for identification and authentication of the

    legitimate user. It requires the accurate captured

    image in which the persons eyes are opened in a way

    that show the exact iris part however eyelashes and

    eyelids are included as a noise. For this purpose user

    is allowed to view in the camera for a few seconds in

    order to store the some images as if one image is not

    captured perfectly then the system rejects that image

    and take the next one for the comparison. The Iris

    recognition is the most reliable and accepted system

    among all biometrics system as iris is more stable and

    easy to compare with the other iris images with less

    error rate. Following are the errors that occur during

    iris verification process. When an authorized person is

    rejected by biometrics system then this is known as

    type I error also called as false rejection rate (FRR) [1].

    When an unauthorized person is incorrectly accepted

    by the biometrics system then this is referred to type II

    error also known as false acceptance rate (FAR) [1].

    The percentage rating of false rejection rate versusfalse acceptance rate is crossover error rate (CER). The

    accuracy of the system is inversely proportional to the

    crossover error rate i.e. lower CER means better

    accuracy of the system [1]. There are various

    applications of iris recognition system some of them

    are described here. Iris recognition system can be

    deployed at airports as the current security system at

    the Amsterdams Schiphol Airport. The currently

    existing system at Amsterdams airport is by Schiphol

    Group which verifies a persons identity and also

    used for border passing functions. Schiphol group is

    an airport operator in the Netherlands. The current

    AUTOMATIC BORDER PASSING (ABP) system [2]

    runs on the IBM server and uses iris scan technique

    for travelers identification by template matching

    using pre-registered iris data, stored on encryptedsmart card. This system provides the high security to

    all the passengers involves identifications in function

    such as ticketing, checking and boarding. At

    Charlotte/Douglas Airport in North Carolina a

    biometric system based on iris recognition is

    providing the security and safety from the intruders

    and is designed by Eye Ticket Corporation in Virginia

    [3]. An individuals iris code is recorded with the help

    of a black and white video camera and then the image

    is stored in the database of enrolled user for

    authentication. This system involves revolving doorways; in the first door the iris recognition is done and

    in the next door confirmation of user identity is done.

    IRISPASS-S Gate Management system [4] has been

    installed in Japan at many locations that fulfills the

    security needs in different companies and

    government data centers where there is need to secure

    the confidential information from the intruders. In

    Japan, Oki Electric Industry Corporation Limited

    introduced a new iris recognition system which is

    IRISPASS-WG system [4]. It contains the enhanced

    user-operability which involves the automatic

    detection of the human eye. The system consists oftwo devices named as management device and

    registration device; both are installed at the entrance.

    Iris recognition system also provides security at the

    national border controls, for logon to computer, for

    credit card authentication, for anti-terrorism, for

    secure financial transactions, for internet security and

    hence in many other areas [5].

    The remaining part of this paper covers the proposed

    system design and implementation phase. In section 2

    the reviewed literature is described. In section 3modeling problem and system design is elaborated, in

    section 4 experimental results are illustrated and in

    last section conclusion and future work is

    summarized.

    2. LITERATURE REVIEW

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 57

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    3/13

    Ganeshan et al., [6] has developed a biometric

    technique for iris recognition and identification that

    provides remote examination based on the multi-scale

    representation to capture the image at varying spatial

    scales. And it is achieved by Laplacian of Gaussian

    filter named as LoG filter. It is an advanced research

    of biometrics where iris recognition is fast and costeffective. Localization and alignment technique used

    in this research paper is unique and frames the

    subjects iris in efficient manner. It provides accurate

    results and enhanced features of iris recognition.

    Multi-scale representation is an efficient technique

    explained in this paper. The drawback in this research

    is that the rejection process is not explained in this

    paper i.e. what if the irises are not matched or

    matched with error. And also it is not for closed eyes.

    If the iris scan is done remotely, then the certainty of

    authentication is lower.

    Chen et al., [7] has developed the Automatic Iris

    Recognition System (AIRS). The system authenticates

    the right person and rejects the fake person. The main

    focus of the researcher is on extracting the unique iris

    features from iris images. When we use 2D Gabor

    wavelet transform then the visible texture of humans

    iris is encoded in a sequence of multi scale 2D Gabor

    wavelet coefficients and whose most significant bit

    consisting of 256 byte code that is called iris code. Iris

    code is used to recognize individuals using fractal

    dimensions. The existing AIRS system described by

    the author generates the iris feature code and two

    matching techniques have been used namely K-means

    and Neural Networks and they have been applied on

    the iris feature code to identify the iris pattern. The

    existing system is performed well for high security

    using first method. In first method original domain is

    used while in second method wavelet domain is used

    for feature extraction. We conclude from our results

    that wavelet domain is superior to original image

    domain. Thus, this is the accurate system for FAR. The

    problem appeared in the research of AIRS is that itprovides the low FAR but it does not provide the low

    FRR.

    Dong et al., [8] has make iris recognition easier by

    proposing iris recognition systems with efficient

    human computer interface and with two different

    strategies, one meets the requirements of low end

    market and other meets the requirements of high end

    market. As to make iris recognition comfortable this

    research covers the two iris recognition system; one is

    double eye device based on LCD screen feedback like

    a magic mirror and other is long distance device on a

    high resolution camera, long focus lens and pan tilt

    zoom unit. . For image acquisition iris image is done

    using digital sensor through an optical lens. Digital

    sensors CCD and CMOS are used. People can performiris recognition from 3 meters away. Thus,

    Recognition algorithm used in this research has been

    very fast, robust and accurate. Two types of iris

    recognition system will satisfy the markets need. All

    available methods are integrated to make the

    comfortable iris recognition system. This paper does

    not cover the verification phenomenon. This system

    only covers the image acquisition phenomenon which

    is helpful for the people engaged in the development

    of iris recognition system.

    Vatsa et al., [9] has developed the system to improve

    the accuracy and speed of iris recognition. Iris images

    are captured in a controlled environment to ensure

    high quality. This research effort focuses on reducing

    the false rejection. Iris textural and topological feature

    has been extracted using 1D log polar Gabor

    transform. The masked polar image thus converted to

    binary images. To verify a persons identity, the iris

    template has been matched with the stored templates.

    Topological feature extraction has been done using

    Eulers method. 2-SVM method has been used to

    achieve low error rate. In this research ICE 2005

    database, CASIA version3 database and UBIRIS

    database have been used. The Algorithms used for

    validation is Daugmans Integro Differential and 2-

    SVM algorithm. Results of this system have shown the

    improvement in the performance of iris verification

    and identification and it shows accurate non ideal iris

    segmentation using modified functions. Thus the

    proposed algorithm reduces the false rejection rate by

    maintaining the low false acceptance rate. This system

    requires much effort and one module will affect the

    other in case of performance and accuracy. It is timeconsuming and expensive as well.

    Vrcek et al., [10] has covered the personal verification

    system based on iris pattern by removing the noise

    and sobel edge detection operator has been used. The

    iris pattern has been converted to fix two dimensional

    spaces based on Dougmans model. The author has

    used the 2D Gabor wavelet method for feature

    extraction. Then Hamming Distance (HD) has been

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 58

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    4/13

    calculated using XOR. It gives accurate results for

    false acceptance rate but not for false rejection rate.

    For real test system the results that are achieved, are

    satisfactory.

    By the literature review it is come to know that the

    existing research papers lack the high quality image,low error rates and high accuracy for iris recognition

    and authentication. So, to overcome these drawbacks

    there is need to propose a better system so the main

    purpose of this research is to develop a biometrics

    system based on iris recognition and authentication

    that is also able to retain high accuracy with less

    computational time by maintaining the high quality

    regions unchanged and improving the low quality

    regions of the iris image.

    3. SYSTEM DESIGN

    First of all there is need to explain the actual problem

    related to the system on the basis of which proposed

    system is implemented.

    3.1.Statement of the modeling problem

    In order to achieve the accurate results for the iris

    recognition and verification system it becomes

    necessary to design and implement the general andefficient system. There are various existing systems

    for static images but here the problem needs to be

    solved is that to recognize and verify the human iris

    for dynamic images and thus the system has been

    based on biometrics authentication technique. By

    following the above mentioned steps the resultant

    solution is as follows:

    Resultant Image= (IV(TM (FE (IS (M (E (A (B (U (G (R

    (I))))))))))))

    Where the symbols are described in the table 1.

    Table 1. List of factors

    Symbols Description

    R Read Image

    U Uint8 Conversion

    G Grayscale

    I Image to be processed

    B Binary

    A Average Filter

    E Edge Detection

    M Morphological Operation

    IS Iris Segmentation

    FE Feature Extraction

    TM Template MatchingIV Iris Verification

    On the basis of some problems in iris recognition

    system, discussed previously, a new model has been

    proposed and the design of the proposed system is

    described in this section. Thus, the system is

    elaborated in the following steps.

    3.2. Image Acquisition

    First of all images have been captured from a videoand frames are stored in a permanent storage in JPG

    format with size 280x320. These frames have been

    retrieved one by one and then used for pre-processing

    and pattern matching after applying various

    techniques for image processing. Frames captured

    from the video are in RGB format and these frames

    have been converted into grayscale. The images have

    been stored in the variable that consists of the array

    elements. Gray scale image has been changed to uint8

    image. Uint8 image has been transformed to binary

    image.

    3.3. Image Pre-processing

    Pre-processing consists of various operations on

    image. These operations does not increase the image

    information and contents but helps to decrease and

    remove the unwanted information from the image.

    Pre-processing operations include the image

    cropping, image filtering, edge detection, intensity

    adjustment, threshold control, histogram equalization

    and many other processes. The specific pre-processing

    operations performed here are:

    A. Smoothing:

    To retrieve the wanted details from the acquired

    image there is need to perform some operations on

    the image and first of all it is necessary to hide the low

    level detail i.e. unnecessary details. Filters are used for

    smoothing process and there are various filters for

    this purpose. They give the blurring effect to the

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 59

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    5/13

    desired level and it depends on the masking value of

    filter. Some of the low pass filters used for smoothing

    are Gaussian low pass filter, disk, median filter,

    maximum filter, minimum filter and average filter.

    Average filter is the linear smoothing filter while

    minimum, maximum and median filters are non

    linear smoothing filters. Average filter has by defaultfilter mask of [3 3] by increasing this vector value the

    image has become more blur and its selection depend

    on the system requirement. The purpose is to hide the

    low level detail in order to get the desired results. The

    average filter gives the better and efficient required

    results than other low pass filters. Average filter is

    given by:

    Ones (n (1), n (2))/ (n (1)*n (2))

    It creates a square matrix of ones having n dimension,

    where n is any integer normally the matrix is of [3 3].

    B. Edge Detection:

    After the smoothing process the edges of the image

    has been detected using the filters that are used for

    edge detection. More the detail and noise in the image

    more will be the detail in edge detected image. If the

    image has been blurred up to the certain level then it

    helps to show the less level of detail located inside the

    main edges of the image, which is basically referred toas noise. There are several 2D filters used for edge

    detection namely canny filter, zero cross method,

    laplacian filter, laplacian of Gaussian filter i.e. Log

    filter, Roberts filter, unsharp filter, prewitt filter and

    sobel filter. Canny filter is another type of filter used

    to detect the edges and it reduces the less detail so the

    canny filter produces the better results for the

    proposed system. Although for binary images all the

    filters give the same result but for the gray scale

    images their result vary.

    C. Morphological Operations:

    To identify the object within the image is the difficult

    task and various morphological operations have been

    used for this purpose. Some of them have been used

    in the proposed system. Strel and dilation has

    performed and dilated image depends on the value of

    the pixels specified in the parameter. After the

    dilation holes in the dilated image have been filled

    that helps to detect the center of the pupil and iris.

    D. Boundary Cropping:

    By applying the average filter the boundary of the

    image has become prominent and that is unnecessary

    for the image processed further to derive the center

    point for pupil and iris. So the boundary of the dilated

    image has been cropped manually.

    3.4. Generation of High Quality Image:

    After applying smoothing, edge detection filters and

    morphological operations the resultant image has

    been enhanced and of high quality.

    3.5. Iris Segmentation:

    After getting the enhanced image there is time to get

    the pupil and iris. First of all pupil center has been

    detected by using the binary image. As in the binary

    image the pixel value is either 0 or 1. 0 represents the

    black area in the image while 1 represents the white

    area in the image. After pre-processing phase, in the

    proposed system, the binary image has the smooth

    pupil and almost no noise. The column that has

    maximum number of ones has been retrieved first.Then the index of that column and its corresponding

    row has been achieved. The consecutive number of

    ones in that column has been noticed and the row,

    that contains the first one among all the consecutive

    ones, has been get. From starting and ending point of

    the maximum ones column the midpoint has been

    calculated and actually that is the row that has the

    center point. Thus the row and column has been

    achieved which is the x and y coordinates of the pupil

    respectively. Thus the center point of the pupil and

    radius of the pupil has been calculated. Using thatcenter point the circle around the pupil boundary has

    been drawn and in this way the pupil has been

    segmented. In the same way iris is segmented. In the

    proposed system the iris and pupil is almost

    concentric so their centers are also same but their

    radius are different and varying from image to image

    as the pupil size varies. With the help of iris radius the

    circle has been drawn around the iris boundary.

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 60

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    6/13

    Hence, the pupil and iris has been segmented

    properly and efficiently.

    Apart from above all there is a possibility that the

    person eye is closed, in that case error can occur and

    in order to make the system error free, a solution has

    been proposed and implemented.

    3.6. Iris Normalization:

    The segmented image has been converted from

    circular form to rectangular form as the pupil size

    varies from frame to frame so the iris region has been

    saved in rectangular form that is accurate method for

    better feature extraction and pattern matching. This

    also works in the loop i.e. the loop is from outer pupil

    boundary to the iris outer boundary and the in

    between region of both the pupil and iris boundarieshas been achieved. Each coordinate has been retrieved

    from the circular form and mapped to the rectangular

    form one by one. Thus the normalized image has the

    polar coordinates.

    3.7. Feature Extraction:

    After the iris normalization has been done there is

    time to extract the iris features for template matching

    and comparison. There are various methods that are

    used for feature extraction namely Wavelet encoding,Gabor filters, Haar wavelet and Log Gabor filter.

    However encoding based on Fourier transform was

    replaced by wavelet encoding because it gives the

    better and more effective results and also reduces

    signal to noise ratio. Gabor filter is for one

    dimensional signals as well as for two dimensions,

    first one is known as 1D Gabor filter and second one is

    called as 2D Gabor filter and mainly 1D Gabor filter

    provides excellent band pass filtering. The Log Gabor

    filter provides the logarithmic function in order to

    remove the DC component of medium high pass

    filter. So the 1D Log Gabor filter has been used for

    feature extraction in the proposed iris recognition

    system and it is given by:

    Where f gives the frequency of Log Gabor Filter, f0represents the centre frequency and is the

    bandwidth of the filter.

    3.8. Template Matching:

    Before the matching process there must be some otherimages of different irises of the persons in the separate

    database so that at the time of comparison images are

    retrieved one by one. So for this purpose images have

    been captured from the different live videos and have

    been stored in the dataset. The all processing steps,

    illustrated previously, have been applied on all the

    images in the new database and thus the images from

    both the database have been retrieved for comparison

    as it contains different type of iris images so that the

    efficient desired results have been produced in case of

    individuals identity.

    Although on the basis of feature extraction comparing

    templates have been created and it involves these two

    cases:

    If the metric gives the same range of values

    for both created templates from the same

    person eye then this is referred to as Intra

    Class Distribution.

    If the metric gives the different range of for

    the templates created from different irises

    then this is called Inter Class Distribution.

    Hamming Distance, Euclidean Distance and

    Normalized Correlation are the methods that are used

    for template matching but here the proposed method

    is Hamming Distance and it gives efficient results. As

    templates based on iris codes have been generated in

    the previous step that have been used in this step and

    thus hamming distance is the method for the

    comparison of iris codes generated either from the

    same irises or from iris of different persons. It is stated

    as:

    Here code A and code B are two iris codes, with

    corresponding bit masks, mask A and mask B.

    represents the XOR operator whereas representsthe AND operator. [11]

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 61

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    7/13

    3.9. Iris Verification:

    The iris Verification process is mainly based on the

    previous steps i.e. Hamming Distance. Two results

    have been concluded from this step. If the templatesare matched then the person identity will be verified,

    otherwise it will display the message that both eye

    images are of different persons.

    4. EXPERIMENTAL RESULTS

    As the system design has explained in the previous

    section now its time to show the results of proposed

    processing and logic described earlier. In this research

    main task is of image processing and the tool used for

    this purpose is MATLAB. MATLAB is theabbreviation of Matrix Laboratory [12] and it is the

    numerical computing and fourth generation language.

    Basically MATLAB deals with matrix and arrays and

    thus MATLAB is a high level matrix language. All

    data is stored in the form of arrays and matrices and

    additionally there is no need to declare the dimension

    of the arrays. Thus MATLAB is the technical

    computing language that contains the combination of

    visualization, computation and programming

    environment. MATLAB is also accurate in numerical

    calculations and applications.

    As it is widely used in computer vision and image

    processing so new algorithms are being implemented

    in the MATLAB as certain functionalities are only

    available in the MATLAB. Thus it has the modern

    programming environment including the data

    structures, object oriented programming and

    debugging tools.

    To implement the system design MATLAB 7.9.0 is

    used. First of all image has been captured from the

    video. Sample image is given in figure 1:

    Figure 1. Original RGB image

    Then the acquired RGB image has been converted to

    the grayscale image as shown in the figure given

    below:

    Figure 2. Gray Scale Image

    The grayscale image is then converted to uint8 and

    then binary image and the result shows as follows:

    Figure 3. Binary Image

    Then the next step shows the results of [16 16] averagefiltered image and then edge detected image using

    canny filter has been obtained as shown in figure 4

    and figure 5:

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 62

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    8/13

    Figure 4. Average Filtered Image

    Figure 5. Edge Detected Image

    Some morphological operations have been performed

    on the edge detected image as shown below in figure

    6 and figure 7:

    Figure 6. Dilated Image

    Figure 7. Hole Filled Image

    After the image preprocessing the above described

    logic of iris segmentation has performed on the holes

    filled image to detect the pupil center. The midpoint is

    calculated from starting and ending point of the

    consecutive ones in the processed image.

    mid_point= floor ((starting point + ending point)/2);

    By the midpoint radius is easily calculated by

    subtracting the midpoint either from the starting point

    or ending point and the center mapped binary and

    gray scale image is shown in figure 8 and figure 9

    respectively:

    Figure 8. Center Detected Binary Image

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 63

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    9/13

    Figure 9. Center Detected Gray Scale Image

    Then to detect the pupil and iris boundary circle is

    drawn around pupil outer boundary and iris outer

    boundary. Thus to draw the circle following formula

    is implemented.

    re = round(2 * pi * radius);

    step = 2 * pi / re;

    Then for loop is executed from 0 to 2pi with the

    increment of step and in that loop x and y is

    calculated and wit the help of those x and y

    coordinates and radius. Circle is drawn, using the

    below mentioned formula, around pupil and iris as

    shown in figure 10 and 11 respectively:

    circle_x=round(midpoint+pupil_radius*cos (j));

    circle_y=round(column_index+pupil_radius*sin (j));

    Here circle_x and circle_y are the coordinates that

    have been get in the loop where j is the loop variable.

    For circle around the iris boundary pupil_radius will

    be replaced by iris_radius as,

    circle_x=round (midpoint+iris_radius*cos (j));

    circle_y=round(column_index+iris_radius*sin (j));

    Figure 10. Pupil Segmented Image

    Figure 11. Iris Segmented Image

    The next step is to normalize the iris and this is done

    by calculating value of theta in order to get coordinate

    on iris and pupil boundaries and then calculate the

    pixel coordinated at angle theta i.e. pupil x and y

    coordinates and iris x and y coordinates, x and y is

    computed using mathematical formula to get the

    points from pupil towards iris or from iris towards

    pupil as described below:

    x_pupil= pupil_x + pupil_radius * sin(t); y_pupil=

    pupil_y + pupil_radius * cos(t); x_iris= iris_x +

    iris_radius * sin(t); y_iris= iris_y + iris_radius *

    cos(t);

    And from both directions the resultant images are as

    shown in figure 12:

    (a)

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 64

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    10/13

    (b)

    Figure 12. Normalized Iris Images

    Feature extraction is done using 1D log Gabor filter

    using normalized iris. Before the template matching

    process same processing is done on the other stored

    images and then captured and stored images in the

    dataset are compared on the basis of hamming

    distance. If the hamming distance is less than 0.4 then

    the images are of same person otherwise images are of

    different pesons and if its value is zero then it shows

    the perfect match. Templates of the above normalized

    iris is shown in figure 13.

    Figure 13. Binary Template of Normalized Iris

    Similarly the same processing is done on the other iris

    image of the same person and all the above mentioned

    steps give the results as shown in the figures given

    below:

    Figure 14. (a) RGB Image

    Figure 2. (b) Gray scale Image

    Figure 3. (c) Binary Image

    Figure 4(a) Average Filtered Image

    Figure 5 (b) Edge detected Image

    Figure 6 (c) Dilated Image

    Figure 7 (d) Hole Filled Image

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 65

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    11/13

    Figure 8 (a) Center Detected Binary Image

    Figure 9 (b) Center Detected Gray Scale Image

    Figure 10(a) Pupil Segmented Image

    Figure 117 (b) Iris Segmented Image

    Figure 12(a) Normalized Iris Image

    Figure 13 (b) Binary Template

    The next step is to compare the captured images with

    the stored images in the dataset and for this purpose

    same processing is done on the stored images and the

    final results of that images are shown in the figures

    given below:

    Figure 14 (a) c) Pupil segmentation

    Figure 15 (b) Iris Segmentation on the Images in the

    Dataset

    Figure 19 c) Pupil segmentation

    (a)

    (b)

    (c)

    Figure 160. Iris Normalization of the Images in the

    Dataset

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 66

  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    12/13

    (a)

    (b)

    (c)

    Figure 21. Binary Templates of the Images in the

    Dataset

    5. CONCLUSION AND FUTURE WORK

    The biometrics authentication system based on human

    iris features is the most secure authentication system

    and this report represents an efficient iris recognition

    system. The proposed system has been implemented

    in MATLAB 7.9 that has many latest and useful built

    in functions and commands and thus helps to

    implement the various constructive image processing

    techniques that have been used to implement the

    better and accurate human computer interface. The

    two major tasks involves in the development of iris

    recognition system has been covered in this paper i.e.

    Iris Segmentation and the Feature Extraction. Iris

    Segmentation is the critical process involved in

    development of iris recognition system because the

    accuracy of the system mainly depends on the iris

    segmentation. Problem is basically faced in the centerdetection step and on which the basis of pupil and iris

    has been segmented. Then segmented iris has been

    normalized and then 1D log Gabor Filter has been

    used and after hamming distance calculation results

    have been shown. Thus the proposed system will

    verify the authentic and valid user only by accurate

    template matching. It is also for the time when the eye

    is closed or user blinks his eyes, it will prompt the

    message in that case and next image has been taken

    for the processing of iris identification and

    authentication. Thus it has been concluded that thedeveloped system is the efficient and friendly user

    interface system that provides the individuals

    security with accuracy and low error rates.

    Although the study that has been done is

    comprehensive and sufficient in its own terms, but

    there is always room for improvement as in this

    project as well. However the accuracy matters a lot

    than the fast system but to reduce the time

    consumption the system can be implemented in C++

    or C# as MATLAB is the integrated language. As the

    series matching has been done in the proposed system

    so parallel matching could reduce the time so for that

    purpose FPGA can be used. Eye lid and eyelashes

    detection phenomenon can be added to increase the

    accuracy and efficiency of the developed system.Another extension to this project is that high

    resolution camera can be used to play the video at the

    run time and then frames are captured and stored in

    the database.

    REFERENCES

    [1] http://www.scribd.com/doc/38156947/Report-of-

    Iris-Recognition-by-Bharath-m.

    [2] http://www03.ibm.com/press/us/en/pressrelease/7

    75.wss.

    [3] http://edition.cnn.com/2000/TECH/computing/07/

    24/iris.explainer.

    [4] http://www.oki.com/en/press/2002/z02011e.html.

    [5] http://www.cl.cam.ac.uk/~jgd1000/applics.html.

    [6] Balaji Ganeshan, Dhananjay Theckedath, Rupert

    Young, Chris Chatwin, Biometric iris recognition

    system using a fast and robust iris localization

    and alignment procedure, Optics and Lasers in

    Engineering, vol 44(1), pp 124, January 2006.

    [7] Wen-Shiung Chen, Shang-Yuan Yuan, A Novel

    Personal Biometric Authentication Technique

    Using Human Iris Based on Fractal Dimension

    Features, In proceedings of IEEE International

    Conference on Acoustics, Speech, and Signal

    Processing, ICASSP 2003, Hong Kong, Vol 3,

    pages 201-204, April 6-10, 2003.

    [8] Wenbo Dong, Zhenan Sun, Tieniu Tan, How to

    make Iris Recognition Easier?, In proceedings of

    IEEE International Conference on Pattern

    Recognition, ICPR 2008, Florida, USA, pages 1-

    4, December 8-11, 2008.

    [9] Mayank Vatsa, Richa Singh, and Afzel Noore,

    Improving Iris Recognition Performance UsingSegmentation, Quality Enhancement, Match Score

    Fusion, and Indexing, IEEE Transactions on

    System, Man, and CyberneticsPart B:

    Cybernetics, pp 1021-1035, Vol. 38, No. 4, August

    2008.

    [10]Gorazd Vrcek and Peter Peer , Iris-Based Human

    Verification System, In proceedings of

    IEEE International Workshop on Systems, Signal

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 67

    http://www.scribd.com/doc/38156947/Report-of-Iris-Recognition-by-Bharath-m.%20%20%20%20%20http://www.scribd.com/doc/38156947/Report-of-Iris-Recognition-by-Bharath-m.%20%20%20%20%20http://www03.ibm.com/press/us/en/pressrelease/775.wss.%20http://www03.ibm.com/press/us/en/pressrelease/775.wss.%20http://edition.cnn.com/2000/TECH/computing/07/24/iris.explainer.%20http://edition.cnn.com/2000/TECH/computing/07/24/iris.explainer.%20http://www.oki.com/en/press/2002/z02011e.html.%20http://www.cl.cam.ac.uk/~jgd1000/applics.html.%20http://www.scribd.com/doc/38156947/Report-of-Iris-Recognition-by-Bharath-m.%20%20%20%20%20http://www.scribd.com/doc/38156947/Report-of-Iris-Recognition-by-Bharath-m.%20%20%20%20%20http://www03.ibm.com/press/us/en/pressrelease/775.wss.%20http://www03.ibm.com/press/us/en/pressrelease/775.wss.%20http://edition.cnn.com/2000/TECH/computing/07/24/iris.explainer.%20http://edition.cnn.com/2000/TECH/computing/07/24/iris.explainer.%20http://www.oki.com/en/press/2002/z02011e.html.%20http://www.cl.cam.ac.uk/~jgd1000/applics.html.%20
  • 7/31/2019 Accurate Biometrics Authentication Technique based on Fast, Robust Iris Recognition System using Enhanced Quali

    13/13

    and Image Processing, IWSSIP 2009, Chalkida,

    Greece, pages 1-4, July 18-18, 2009.

    [11]Libor Masek, Recognition of Human Iris Patterns

    for Biometric Identification, B. Eng. thesis,

    University of Western Australia, Australia, 2003.

    [12] http://staff.iiu.edu.my/azami/MATLAB%20tutorial%20of%20fundamental

    %20programming.pdf.

    BIBLIOGRAPHY

    Zoama Afaq is the under graduate student of

    Department of Software Engineering in Fatima Jinnah

    Women University the Mall, Rawalpindi, Pakistan.

    Bushra Sikander is the Lecturer in the Department of

    Computer Science in Fatima Jinnah Women

    University the Mall, Rawalpindi, Pakistan. Her

    qualification isMS-CS..

    Dr. Malik Sikandar Hayat Khiyal is Head of

    Academic (ES), APCOMS, Khadim Hussain Road,

    Lalkurti, Pakistan. He served in Pakistan Atomic

    Energy Commission for 25 years and involved in

    different research and development program of the

    PAEC. He developed software of underground flow

    and advanced fluid dynamic techniques. He was also

    involved at teaching in Computer Training Centre,

    PAEC and International Islamic University. His area

    of interest is Numerical Analysis of Algorithm,

    Theory of Automata and Theory of Computation. He

    has more than hundred research publications

    published in National and International Journals and

    Conference proceedings. He has supervised three PhD

    and more than one hundred and thirty research

    projects at graduate and postgraduate level. He is

    member of SIAM, ACM, Informing Science Institute,

    IACSIT. He is associate editor of IJCTE and coeditor of

    the journals JATIT and International Journal of

    Reviews in Computing. He is reviewer of the journals,

    IJCSIT, JIISIT, IJCEE and CEE of Elsevier.

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 6, JUNE 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 68

    http://staff.iiu.edu.my/azami/MATLAB%20tutorial%20of%20fundamental%20programming.pdfhttp://staff.iiu.edu.my/azami/MATLAB%20tutorial%20of%20fundamental%20programming.pdfhttp://staff.iiu.edu.my/azami/MATLAB%20tutorial%20of%20fundamental%20programming.pdfhttp://staff.iiu.edu.my/azami/MATLAB%20tutorial%20of%20fundamental%20programming.pdfhttp://staff.iiu.edu.my/azami/MATLAB%20tutorial%20of%20fundamental%20programming.pdfhttp://staff.iiu.edu.my/azami/MATLAB%20tutorial%20of%20fundamental%20programming.pdf