Professional Documents
Culture Documents
8 5
2011 10
Abstract
This study presents a new algorithm for biometric-based iris recognition system. The proposed iris
identification algorithm consists of four major fundamental steps: image processing; image localization; IER
extraction; and image pattern recognition. An image of an individuals eye is processed into an 8-bit
grayscale BMP image until the boundaries of the iris are detected. The IER (Iris Effective Region) feature
is then extracted using the feature extraction algorithm. This IER feature is a 12x8 BMP image pattern
which contains the gray values of the iris and will be used for pattern matching. The IER feature extracted
is then used as input for the pattern recognition algorithm wherein the linear correlation coefficients are
analyzed and will be used as the basis for the identification and verification of an individual.
Keywords : Iris Recognition, Image Processing, Image Localization, IER Extraction, Pattern Recognition,
Linear Correlation Coefficient
1. Introduction
Biometric-based technologies have recently gained much consideration in the identification and verification of
an individuals identity. Individuals identity is verified based on physiological characteristics such as face,
fingerprints, hand geometry, iris, retina, and vein. Among these physiological characteristics, biometric
identification and verification based on iris patterns has attracted the attention of biometric-based identification
and verification research and development community. Iris patterns become interesting as an alternative approach
to reliable visual recognition of persons.
Iris is the annular ring between the pupil and the sclera of the eye. Individuals irides patterns are unique
Received(August 05, 2011), Review request(August 06, 2011), Review Result(1st: August 21, 2011, 2nd: August 30, 2011)
Accepted(October 31, 2011)
1
585
New Algorithm Biometric-Based Iris Pattern Recognition System: Basis of Identity Authentication and Verification
and structurally distinct although its coloration and structure is genetically linked and identical yet it has unique
characteristics that allows it to be used for accurate recognition of individuals identity. The variations in the
gray level intensity values of the irises distinguish two individuals. A difference exists between identical twins
and even between left and right eye of the same person.
The iris is highly protected, non-invasive and ideal for handling applications requiring management of large
user groups. Although small and sometimes problematic to image, the iris has the great mathematical advantage
that its pattern variability among different persons is enormous. In addition, as an internal yet externally visible
organ of the eye, the iris is well protected from the environment and stable over time. As a planar object, its
image is relatively insensitive to angle of illumination and changes in viewing angle but both fine
transformations and non-fine pattern distortion caused by pupillary dilation can be readily reversible. The ease
of localizing eyes in faces and the distinctive annular shape of the iris facilitate reliable and precise isolation of
this feature and the creation of a size-invariant representation.
In this study, new algorithm biometric-based iris recognition pattern system as a method of biometric
authentication, uses pattern-recognition techniques based on high-resolution images of the irides of an
individual's eye. It involves four main phases: image processing; image localization; IER extraction; and image
pattern recognition. Furthermore, this paper explains how the algorithms work and presents new data on the
statistical properties and singularity of iris patterns. Algorithms developed for recognizing persons by their iris
patterns have been tested with no false matches in several million comparison tests.
Iris recognition is achieved by comparison of results with stored patterns. Recognition will be based on the
results and analysis of the computation of the linear correlation coefficient. The biometrics information of an
individual who claims certain identity is compared with the biometrics on the record that represent the identity
that this individual claims. The comparison result determines whether the identity claims shall be accepted or
rejected.
Hence, this proposed new algorithm biometric-based iris recognition pattern system for iris pattern
identification for iris images would give a better performance for biometric authentication or identification. The
accuracy of iris recognition systems is proven to be much higher compared to other types of biometric systems
characteristics like fingerprint, handprint and voiceprint.
2. Related Works
For the past years, iris recognition is considered as one of the most accurate and reliable method of
biometric identification. The accuracy of iris recognition systems is proven to be much higher compared to
other biometric features since iris patterns have rich textures. In this section we briefly review a sample of the
iris recognition literatures:
586
8 5
2011 10
John G. Daugman, Ph.D. pioneered the formulation of iris recognition algorithms required for image
acquisition and one-to-many matching and become the basis of almost all currently commercially deployed
iris-recognition systems. His algorithm locates the iris boundaries using an integrodifferential operator that finds
the circles in the image where the intensity is changing most rapidly with respect to changes in the radius.
Once located, the iris image is converted to a Cartesian form by projecting it to onto a dimensionless
pseudo-polar coordinate system. The iris features are encoded and a signature is created using a 2-D
complex-valued Gabor filter. Finally, two images are said to be independent if their fractional Hamming
distance (Hd) is above a certain threshold, otherwise they are a match. Hd is equal to the number of
587
New Algorithm Biometric-Based Iris Pattern Recognition System: Basis of Identity Authentication and Verification
r +1.
If x and y have a strong positive linear correlation, r is close to +1 which is called Positive Correlation and
if x and y have a strong negative linear correlation, r is close to -1 which is called Negative Correlation. If
there is no linear correlation or a weak linear correlation, r is close to 0. A value near zero means that there
is a random, nonlinear relationship between the two variables. A correlation greater than 0.8 is generally
described as strong, whereas a correlation less than 0.5 is generally described as weak. These values can vary
based upon the "type" of data being examined. A study utilizing scientific data may require a stronger
correlation than a study using social science data.
Now, the second central moment is called the variance of x. It is denoted by is the standard
deviation of x which is the positive square root of the variance. Variance of x is defined by
Where,
is the mean of x,
N is the number of pairs of data.
Now, the variance of y is defined by-
588
8 5
2011 10
is the mean of y,
N is the number of pairs of data,
is the standard deviation of y which is the positive square root of the variance.
Now, the second order mixed central moment is called the covariance of X and Y. It is denoted by
cov(X,Y) and is defined as-
Where,
is the mean of x ,
is the mean of y, N is the number of pairs of data.
Now, the correlation coefficient is-
4. Proposed Work
The propose method for iris pattern recognition identification is divided into four main phases: image
589
New Algorithm Biometric-Based Iris Pattern Recognition System: Basis of Identity Authentication and Verification
processing; image localization; IER detection and extraction; and image recognition.
8 5
2011 10
for(x=0;x<=originalImage.rows-1;x++){
for(y=0;y<=originalImage.cols-1;y++){
if (Grayvalue(x, y)==0) {
if((GrayValue(x,y-1)!=0)&& GrayValue(x,y+1)==0))){
GrayValue (x, y-1) = 255
}else if((GrayValue(x,y-1)==0)&&GrayValue(x,y+1)!=0))){
GrayValue (x, y+1) = 255
}else
No change in the GrayValue.
}
}
}
Step 3: Detect the IRIS Boundary and set the boundary pixels to 255 (white) using following pseudocode:
for(x=0;x<=originalImage.rows-1;x++){
for(y=0;y<=originalImage.cols-1;y++){
if(x>12 && x<70 && y>12 && y<50){
if(Grayvalue(x,y)<100 && Grayvalue(x,y)!=0){
if(((Grayvalue(x,y-1))-(GrayValue(x,y+1))>24 &&
(Grayvalue(x,y-1))>=100&&(Grayvalue(x,y-1))!=255 &&
(Grayvalue(x,y+1))<100 &&(Grayvalue(x,y+1))!=0 ){
GrayValue(x,y-1) = 255
}else
No change in the GrayValue
}else
No change in the GrayValue.
}else
Write to new BMP file
}
}
By considering the 8-bit BMP image, two-pass masking is used, namely, Horizontal and Vertical kernels.
The PlanarImage now passed through these masks or kernels. Resultant transformed image generates the distinct
marks for IRIS area; the process is called edge detection.
New Algorithm Biometric-Based Iris Pattern Recognition System: Basis of Identity Authentication and Verification
After the detection of pupil boundary and the iris left boundary, we have to extract the effective region of
the iris. The effective region of the iris means a specific size (say 55) of matrix which is in the iris portion,
neither in sclera nor in pupil portion be included in this effective region. The iris effective region is extracted
using the following algorithm:
Step 1: Take the 8-Bit BMP Image produced from previous algorithm as input and open this BMP file in
binary Read Mode.
Step 2: Read the raster Data and store the raster data into a matrix of vectorSize. Where vectorSize =
filesize - (54+(4*256)).
Step 3: Then an 8*12 Iris Pattern is extracted from Edge Detected BMP using following pseudocode:
for(x=0;x<=originalImage.rows-1;x++) {
for(y=0;y<=originalImage.cols-1;y++) {
if( y<30&&x=((originalImage.rows/2)+4)&&GrayValue==255) {
for(i=0;i<8;i++) {
for(j=0;j<12;j++) {
*(edgeImage.data + (i * edgeImage.cols) + j) = *(originalImage.data + (x *
originalImage.cols) - (i * originalImage.cols) + (y + j));
Write to new BMP Image file
}
}
}
}
}
The 12x8 8-bit BMP image is the output of the algorithm. In this algorithm, we locate the middle row and
first column of the input image, and then we move 4 pixels upward and check the gray value of each pixel
until the 255 (white) values is reached. Then the pixels are read and stored the corresponding gray values into
an 8x12 matrix.
The output is a new BMP image of size 12x8 and a matrix of the same size which contains the gray
values.
8 5
2011 10
Step 1: Take 1 training (input) iris pattern image of any individual and given identification number.
Step 2: Read all 10 iris pattern images from database against his/her identification number.
Step 3: Taking input pattern image with each stored iris pattern images in database, calculate correlation
coefficient(r) using the following psudocode:
for(i=0;i<row;i++){
for(j=0;j<col;j++){
x = matrix_database[i][j];
y = matrix_Input[i][j];
sum_x2 += x*x;
sum_y2 += y*y;
sum_xy += x*y;
sum_x += x;
sum_y += y;
}
}Sxx = sum_x2 - ((sum_x*sum_x)/n);
Sxy = sum_xy - ((sum_x*sum_y)/n);
Syy = sum_y2 - ((sum_y*sum_y)/n);
r = Sxy/(sqrt(Sxx*Syy));
Step 4: Ten correlation coefficient(r) values are generated and then calculate the average of these 10
r-values. If the average of the 10 r-values >= 0.8 then the individual with the given input iris
pattern is identified as a member of the organization. Otherwise the individual is unauthorized.
5. Experimental Results
In this thesis, iris recognition performance is evaluated using the False Acceptance Rate (FAR) and False
Rejection Rate (FRR).
The false acceptance rate, or FAR, is the measure of the likelihood that the biometric security system will
incorrectly accept an access attempt by an unauthorized user. A systems FAR typically is stated as the ratio of
the number of false acceptances divided by the number of identification attempts. FAR is defined as
The false rejection rate, or FRR, is the measure of the likelihood that the biometric security system will
incorrectly reject an access attempt by an authorized user. A systems FRR typically is stated as the ratio of
593
New Algorithm Biometric-Based Iris Pattern Recognition System: Basis of Identity Authentication and Verification
the number of false rejections divided by the number of identification attempts. FRR is defined as :
Output of this Algorithm is as follows:
Person1
0.92527
0.920889
0.901001
0.866415
0.813186
0.841426
0.944121
0.931877
0.925426
0.946985
Person2
0.887013
0.894657
0.597282
0.903323
0.892065
0.924572
0.967363
0.964236
0.920788
0.910433
Person3
0.90191
0.94282
0.950476
0.896841
0.923513
0.773495
0.900203
0.932124
0.932675
0.930373
Person4
0.817018
0.837767
0.842439
0.861058
0.916403
0.906519
0.908223
0.903906
0.781454
0.861127
Person5
0.771615
0.9443
0.698773
0.811424
0.884811
0.84561
0.731279
0.85349
0.792124
0.83753
Person2
-0.04326
-0.0285
0.006919
0.064761
0.009741
-0.04319
-0.06479
-0.07535
-0.09937
-0.09589
Person3
-0.43106
-0.37071
-0.35172
-0.39909
-0.34608
0.027949
-0.44331
-0.37269
-0.43547
-0.41842
Person4
0.019021
-0.03883
0.067881
-0.08786
-0.07962
-0.02023
-0.01245
0.005396
-0.04114
-0.00903
Person5
-0.04106
0.06212
-0.06451
-0.0627
-0.03233
0.095871
0.090123
0.095601
0.106594
0.073078
594
Person1
-0.00599
-0.01092
0.023669
-0.04637
-0.02285
-0.07197
-0.01049
0.004875
0.053236
-0.01722
8 5
2011 10
From Table 1, we can see there are 0 falsely rejected incidents in 50 samples and from Table 2, there are
2 falsely accepted incidents in 50 samples in our experimental database results. i.e.
FAR (%)
FRR (%)
New Algorithm Biometric-Based Iris Pattern Recognition System: Basis of Identity Authentication and Verification
References
[1] J. G. Daugman, High confidence visual recognition of person by a test of statistical independence, IEEE
Trans. PAMI 15, 1148-1161 (1993).
[2] J. G. Daugman, "The importance of being random: statistical principles of iris recognition," Pattern.
Recognition 36, 279-291 (2003).
[3] J. G. Daugman, How iris recognition works, IEEE Trans. Circuits and Syst. for Video Tech. 14(1), 21-30
(2004).
[4] C. L. Tisse, L. Martin, L. Torres, M. Robert, "Person identification technique using human iris recognition"
ST Journal of System Research Current Issue 2003.
[5] C. Tisse, L. Martin , L. Torres, and M. Robert, Iris recognition system for person identification, PRIS
2002 : 186-199 (2002).
[6] L. Ma, T. Tan, Y. Wang, and D. Zhang, Personel identification based on iris texture analysis, IEEE
Trans. On Pattern Analysis and Machine Intelligence 25(12):1519-1533, (2003).
[7] Z. Wei, T. Tan and Z. Sun, "Synthesis of Large Realistic Iris Databases Using Patch-based Sampling" IEEE
2008.
[8] R. P. Wildes, Automated iris recognition: An emerging biometric technology, Proceedings of the IEEE 85
1348-1363 (1997).
[9] W. Boles, and B. Boashash, A human identification technique using images of the iris and wavelet
transform, IEEE Trans. Signal Proc. 4:1185-1188, (1998).
[10] S. Lim, K. Lee, O. Byeon, and T. Kim, Efficient iris recognition through improvement of feature vector
and classifier, ETRI J. 23(2):61-70, (2001).
596
8 5
2011 10
Author
Eun-suk Cho
1994 Associate in Dept. of Nursing Science, Suwon Women Colleage.
2000 B.L. in Dept. of Law, Korea National Open University
2003 Ed. M. in Dept. of Education, Ajou University
Currently, Integrated Course for M.S. and Ph.D. in Dept. of Multimedia Engineering,
Hannam University.
Research interests : Hospital Security, Patients' privacy, U-healthcare system.
Ronnie D. Caytiles
1995
2000: Bachelor of Science in Computer Engineering, Western Institute of
Technology, Iloilo City, Philippines
Currently: Integrated Course for M.S. and Ph.D. in Multimedia Engineering, Hannam
University, Daejon, Korea.
Research Interests: Information Technology Security, U-Learning, Control and
Automation
Seoksoo Kim
Received a B.S. degree in computer engineering from Kyungnam University , Korea,
1989, and M.S. degree in Information engineering from Sungkyun-kwan
University, Korea, 1991 and Ph D. degree in Information engineering from
Sungkyun-kwan University, Korea, 2002. In 2003 he joined the faculty of
Hannam University, Korea where he is currently a professor in Department of
Multimedia. His research interests include Multimedia Communication systems,
Distance learning, Multimedia Authoring, Telemedicine, Multimedia Programming,
Computer Networking. Information Security. He is a Member of KCA, KICS,
KIMICS, KIPS, KMS, and DCS.
597
New Algorithm Biometric-Based Iris Pattern Recognition System: Basis of Identity Authentication and Verification
598