non-orthogonal view iris recognition system(3)

22
Non-Orthogonal View Iris Recognition System This project proposes a non-orthogonal view iris recognition system comprising a new iris imaging module, an iris segmentation module, an iris feature extraction module and a classification module. A dual-charge-coupled device camera was developed to capture four-spectral (red, green, blue, and near infrared) iris mages which contain useful information for simplifying the iris segmentation task. An intelligent random sample consensus iris segmentation method is proposed to robustly detect iris boundaries in a four-spectral iris image. In order to match iris images acquired at different off-axis angles, we propose a circle rectification method to reduce the off- axis iris distortion. The rectification parameters are estimated using the detected elliptical pupillary boundary. Furthermore, we propose a novel iris descriptor which characterizes an iris pattern with multiscale step/ridge edge-type maps. The edge-type maps are extracted with the derivative of Gaussian and the Laplacian of Gaussian filters. The iris pattern classification is accomplished by edge-type matching which can be understood intuitively with the concept of classifier ensembles. Experimental results show that the equal error rate of our approach is only 0.04% when recognizing iris images acquired at ifferent off-axis angles within ±30°

Upload: musthafa-kadersha

Post on 28-Mar-2015

102 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Non-Orthogonal View Iris Recognition System(3)

Non-Orthogonal View Iris Recognition System

This project proposes a non-orthogonal view iris recognition system comprising a new iris

imaging module, an iris segmentation module, an iris feature extraction module and a

classification module. A dual-charge-coupled device camera was developed to capture four-

spectral (red, green, blue, and near infrared) iris mages which contain useful information

for simplifying the iris segmentation task. An intelligent random sample consensus iris

segmentation method is proposed to robustly detect iris boundaries in a four-spectral iris

image. In order to match iris images acquired at different off-axis angles, we propose a

circle rectification method to reduce the off-axis iris distortion. The rectification

parameters are estimated using the detected elliptical pupillary boundary. Furthermore,

we propose a novel iris descriptor which characterizes an iris pattern with multiscale

step/ridge edge-type maps. The edge-type maps are extracted with the derivative of

Gaussian and the Laplacian of Gaussian filters. The iris pattern classification is

accomplished by edge-type matching which can be understood intuitively with the concept

of classifier ensembles. Experimental results show that the equal error rate of our

approach is only 0.04% when recognizing iris images acquired at ifferent off-axis angles

within ±30°

Page 2: Non-Orthogonal View Iris Recognition System(3)

1.1 Overview of the System

The physiological biometrics are based on measurements and data derived from direct

measurement of a part of the human body. Fingerprint, iris-scan, retina-scan, hand geometry, and facial

recognition are leading physiological biometrics.

Behavioral characteristics are based on an action taken by a person. Behavioral biometrics, in turn, are

based on measurements and data derived from an action, and indirectly measure characteristics of the

human body. Voice recognition, keystroke-scan, and signature-scan are leading behavioral biometric

technologies. One of the defining characteristics of a behavioral biometric is the incorporation of time as

a metric – the measured behavior has a beginning, middle and end.

A biometric system is essentially a pattern recognition system which makes a personal

identification by determining the authenticity of a specific physiological or behavioral characteristic

possessed by the user. An important issue in designing a practical system is to determine how an

individual is identified. Depending on the context, a biometric system can be either a verification

(authentication) system or an identification system.

There are two different ways to resolve a person's identity: verification and identification. Verification

(Am I whom I claim I am?) involves confirming or denying a person's claimed identity. In identification,

one has to establish a person's identity (Who am I?). Each one of these approaches has it's own

complexities and could probably be solved best by a certain biometric system.

Page 3: Non-Orthogonal View Iris Recognition System(3)

In day-to-day life most people with whom you do business verify your identity. You claim to be someone

(your claimed identity) and then provide proof to back up your claim. For encounters with friends and

family, there is no need to claim an identity. Instead, those familiar to you identify you, determining

your identity upon seeing your face or hearing your voice.

These two examples illustrate the difference between the two primary uses of biometrics: identification

and verification.

Identification (1:N, one-to-many, recognition) – The process of determining a person’s identity by

performing matches against multiple biometric templates. Identification systems are designed to

determine identity based solely on biometric information. There are two types of identification systems:

positive identification and negative identification. Positive identification systems are designed to find a

match for a user’s biometric information in a database of biometric information.

Positive identification answers the “Who am I?,” although the response is not necessarily a name – it

could be an employee ID or another unique identifier. A typical positive identification system would be a

prison release program where users do not enter an ID number or use a card, but simply look at a iris

capture device and are identified from an inmate database. Negative identification systems search

databases in the same fashion, comparing one template against many, but are designed to ensure that a

person is not present in a database. This prevents people from enrolling twice in a system, and is often

used in large-scale public benefits programs in which users enroll multiple times to gain benefits under

different names.

Page 4: Non-Orthogonal View Iris Recognition System(3)

Not all identification systems are based on determining a username or ID. Some systems are designed

determine if a user is a member of a particular category. For instance, an airport may have a database of

known terrorists with no knowledge of their actual identities. In this case the system would return a

match, but no knowledge of the person’s identity is involved.

Verification (1:1, matching, authentication) – The process of establishing the validity of a claimed

identity by comparing a verification template to an enrollment template. Verification requires that an

identity be claimed, after which the individual’s enrollment template is located and compared with the

verification template. Verification answers the question, “Am I who I claim to be?” Some verification

systems perform very limited searches against multiple enrollee records. For example, a user with three

enrolled fingerprint templates may be able to place any of the three fingers to verify, and the system

performs 1:1 matches against the user’s enrolled templates until a match is found. One-to-few. There is

a middle ground between identification and verification referred to as one-to-few (1:few). This type of

application involves identification of a user from a very small database of enrollees. While there is no

exact number that differentiates a 1:N from a 1:few system, any system involving a search of more than

500 records is likely to be classified as 1:N. A typical use of a 1:few system would be access control to

sensitive rooms at a 50-employee company, where users place their finger on a device and are located

from a small database.

Applications areas

Biometrics is a rapidly evolving technology which is being widely used in forensics such as

criminal identification and prison security, and has the potential to be used in a large range of civilian

application areas. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones,

smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions

Page 5: Non-Orthogonal View Iris Recognition System(3)

conducted via telephone and internet (electronic commerce and electronic banking). In automobiles,

biometrics can replace keys with key-less entry devices.

Biometrics Technologies

The primary biometric disciplines include the following:

¤ Fingerprint (optical, silicon, ultrasound, touch less)

¤ Facial recognition (optical and thermal)

¤ Voice recognition (not to be confused with speech recognition)

¤ Iris-scan

¤ Retina-scan

¤ Hand geometry

¤ Signature-scan

¤ Keystroke-scan

¤ Palm-scan (forensic use only)

Disciplines with reduced commercial viability or in exploratory stages include:

¤ DNA

¤ Ear shape

¤ Odor (human scent)

¤ Vein-scan (in back of hand or beneath palm)

¤ Finger geometry (shape and structure of finger or fingers)

¤ Nailbed identification (ridges in fingernails)

¤ Gait recognition (manner of walking)

Application area for Recognition of Human Iris are :

Page 6: Non-Orthogonal View Iris Recognition System(3)

The Charlotte/Douglas International Airport in North Carolina and the Flughafen

Frankfort Airport in Germany allow frequent passengers to register their iris scans in an effort to

streamline boarding procedures. There is discussion that banks may someday make iris scans a

routine part of ATM transactions, and some have begun taking the first steps in testing out these

systems.

In addition to the government and transportation markets, iris recognition is playing an

emerging role in healthcare. Healthcare solutions based on iris recognition protect access to

patient medical records at hospitals in locations such as Washington, D.C., Pennsylvania and

Alabama. Also, in Germany, infant nursing stations are equipped with iris recognition to ensure

that only parents, doctors and nurses have access to the room that holds newborn children and to

avoid potential abductions.

Speed of Throughput

Exhaustive one-to-many search identifies individual in seconds

Performs at a matching rate of 100,000 per second

o Generally less than two (2) seconds to recognize

No degradation of accuracy

Page 7: Non-Orthogonal View Iris Recognition System(3)

Highly Scalable

Supports extremely large databases

Robust capabilities permit only one enrollment per individual

Denies duplicate records or enrollment under aliases

Iris Recognition Works as follows:

Captures a digital photograph of iris

Analyzes the unique iris patterns

Creates a unique 512 byte code

Compares and matches unique code to all codes in database

Authenticates or rejects individual

Standalone Iris Capture and Recognition Camera

Self-focusing

Self-illuminating

Adjustable for ADA compliance

Multi-language

Durable

Portable

Page 8: Non-Orthogonal View Iris Recognition System(3)

3.1 Existing Method

The existing system recognizes the person with digital signature or with some PIN code.

This digital signature method is widely used and this is data encryption mechanism and concept of hash

function. Both combined to produce the unique long encrypted number for signature. This system can

also be affected by intruders who can misuse the data or information available. The problems are:

o Easily traceable by intruders

o Low reliability

o No unique identification

Technology Comparison

Method Coded Pattern Misidentification rate

Security

Applications

Iris Recognition

Iris pattern 1/1,200,000 High High-security facilities

Fingerprinting Fingerprints 1/1,000 Medium

Universal

Hand Shape Size, length and thickness of hands 1/700 Low Low-security facilities

Facial Recognition

Outline, shape and distribution of eyes and nose

1/100 Low Low-security facilities

Signature Shape of letters, writing order, pen pressure

1/100 Low Low-security facilities

Voiceprinting Voice characteristics 1/30 Low Telephone service

Page 9: Non-Orthogonal View Iris Recognition System(3)

Benefits of Using Iris Technology

The iris is a thin membrane on the interior of the eyeball. Iris patterns are extremely complex.

Patterns are individual (even in fraternal or identical twins).

Patterns are formed by six months after birth, stable after a year. They remain the same for life.

Imitation is almost impossible.

Patterns are easy to capture and encode

Page 10: Non-Orthogonal View Iris Recognition System(3)

ARCHITECTURAL DIAGRAM

Page 11: Non-Orthogonal View Iris Recognition System(3)

SYSTEM DIAGRAM

Page 12: Non-Orthogonal View Iris Recognition System(3)

Flow Diagram

Page 13: Non-Orthogonal View Iris Recognition System(3)

SYSTEM SPECIFICATION

HARDWARE SPECIFICATION

The hardware used for the development of the project is:

PROCESSOR : Pentium IVRAM : 512 MB RAMMONITOR : 15” COLORHARD DISK : 20 GBKEYBOARD : TVS Champ MOUSE : Logitech WEBCAM : Logitech

SOFTWARE SPECIFICATION

The software used for the development of the project is:

OPERATING SYSTEM : Windows XPENVIRONMENT : Visual Studio .NET 2005.NET FRAMEWORK : Version 2.0LANGUAGE : VB.NETBACK END : SQLSERVER 2000

Page 14: Non-Orthogonal View Iris Recognition System(3)

Use Case Diagram :

Training

New User Eye

Testing

User

Admin

Database Management

Matching Result

Page 15: Non-Orthogonal View Iris Recognition System(3)

Sequence Diagram :

Database Management

New Eye

Training Testing Result

Page 16: Non-Orthogonal View Iris Recognition System(3)

State Flow Diagram:

Page 17: Non-Orthogonal View Iris Recognition System(3)

Collaboration Diagram :

Database Management

Matching

Mismatched Output

New User Eye

Training

YesTesting

Matched Content

Page 18: Non-Orthogonal View Iris Recognition System(3)

Matching

Result

Database Management

Testing

New Eye

Training