You are on page 1of 5

Comparison on IRIS Recognition System Using Hough Transform and Image Processing

Anu Sharma
Computer Science and Engineering College of Engineering, TMU Moradabad, India. anu.sweetys@gmail.com

International Journal of Computer Information Systems, Vol. 3, No. 3, 2011

Gulista Khan
Computer Science and Engineering College of Engineering, TMU Moradabad, India. Gulista.khan@gmail.com

Computer Science and Engineering HITM, Ambala, Kurukshetra University, Haryana, India, Er.wajid.ali@gmail.com

Wajid Ali

Abstract Iris recognition is one of the biometric technologies


used for personal identification. It is one of the most reliable and widely used biometric techniques available. Each method has its own strengths and limitations. In this paper, we present a novel approach for statistical feature by using Laplacian of Gaussian filter to iris recognition. Our goal is todevelop best algorithm that enhances iris images, reduces noise to the maximum extent possible, extracts the important features from the image, and matches those features with data in an iris database. This approach will be simple and effective, and can be implemented in realtime. Experiments are performed using iris images obtained from CASIA database and Matlab application for its easy and efficient tools in image manipulation.

Keywords- Iris recognition, image processing, canny edge detection, Hough transform, laplacian of Gaussian filter. I. INTRODUCTION Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individuals eyes. Iris recognition system is a digital image processing engine that analyzes digital images of eye irides for identification and verification of individuals[1]. The term "Biometrics" refers to a science involving the statistical analysis of biological characteristics. Here biometrics is used in a context of analyzing human characteristics for security purposes.[8]. Iris recognition system can be designed using a DSP processor hardware and a Matlab sourcecode on image processing algorithms. Alternatively the Iris recognition system can be implemented in VLSI digital system using FPGA design (VHDL/Verilog coding) and Matlab FPGA-toolboxes for converting image processing software code into VLSI RTL code. recognition uses camera technology with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images

provide mathematical representations of the iris. [1]

Figure 1: Iris image Iris is a membrane in the eye, responsible for controlling the amount of light reaching the retina. The iris consists of pigmented fibro vascular tissue known as a stoma. It is the most forward portion of the eye and the only one seen on superficial inspection. The stroma connects a sphincter muscle (sphincter pupillae), which contracts the pupil, and a set of dilator muscles (dilator papillae) which open it. The back surface is covered by a heavily pigmented epithelial layer that is two-cells-thick (the iris pigment epithelium), but the front surface has no epithelium. The outer edge of the iris, known as the root, is attached to the sclera and the anterior ciliary body. The iris and ciliary body together are known as the anterior uvea. [2]. Today, biometric recognition is a common and reliable way to authenticate the identity of a living person based on physiological or behavioral characteristics. A physiological characteristic is relatively stable physical characteristics, such as fingerprint, iris pattern, facial feature, hand silhouette, etc. This kind of measurement is basically unchanging and unalterable without significant duress. A behavioral characteristic is more a reflection of an individuals psychological makeup as signature, speech pattern, or how one types at a keyboard. The automated personal identity authentication systems based on iris recognition are reputed to be the most reliable among all biometric methods: we consider that : the probability of finding two people with identical iris pattern is almost zero . Thats why iris recognition technology is becoming an important biometric solution for people identification in access control as networked access to computer application

Special Issue

Page 1 of 69

ISSN 2229 5208

.Compared to fingerprint, iris is protected from the external environment behind the cornea and the eyelid.[3] A. Current Applications of Iris Recognition National border controls: the iris as a living passport Computer login: the iris as a living password Cell phone and other wireless-device-based authentication Secure access to bank accounts at ATM cash machines Ticketless travel: authentication of rights to services Premises access control (home, office, laboratory, etc) Driving licenses; other personal certificates Forensics; birth certificates; tracing missing or wanted persons Automobile ignition and unlocking, anti-theft devices for modern intelligent vehicles Anti-terrorism (e.g. security screening at airports) Secure financial transactions (electronic commerce, banking), Credit-card authentication Internet security; control of access to privileged information . [1]

International Journal of Computer Information Systems, Vol. 3, No. 3, 2011 the hysteresis thresholding. The threshold values that have been used are 0.19 and 0.2 (low and high threshold respectively). Adjust gamma correction controls the overall brightness of an image i.e. it adjusts the image gamma value. After the edge directions are known, non maximum suppression is applied to trace along the edge in the edge direction and suppress any pixel value that is not considered to be an edge.[4]

(a)

(b)

A. Background Ophthalmologists Alphonse Bertillon and Frank Burch were one among the first to propose that iris patterns can be used for identification systems. In 1992, John Daugman was the first to develop the iris identification software. Other important contribution was by R.Wildes et al. Their method differed in the process of iris code generation and also in the pattern matching technique. The Daugman system has been tested for a billion images and the failure rate has been found to be very low. His systems are patented by the Iriscan Inc. and are also being commercially used in Iridian technologies, UK National Physical Lab, British Telecom etc. [9] II. A. ALGORITHM

Figure. 2 (a) Adjust gamma correction, maximumsuppression,(c)Canny edge image

(c) (b) Non-

Edge Detection The canny edge detection has been used in this paper.Segmentation processes is done to separate the iris from the eye image. The iris inner and outer boundaries are located by finding the edge image using the Canny edge detector . The advantage of Canny edge detector over other edge detectors is that there is very less probability of not marking any real edges and marking unwanted edges. It uses a filter based on the first derivative of a Gaussian, hence the result is a slightly blurred version of the original image. Canny edge detector mainly involves three steps such as: finding the gradient, adjust gamma correction, non-maximum suppression and Figure 3. Example of Cannny edge Detector

Special Issue

Page 2 of 69

ISSN 2229 5208

International Journal of Computer Information Systems, Vol. 3, No. 3, 2011 C. Image Pre-processing An iris image, contains not only the region of interest (iris) but also some unuseful parts (e.g. eyelid, pupil etc.). In addition, a change in the camera-to-eye distance may result in the possible variation in the size of the same iris. Furthermore, the brightness is not uniformly distributed because of nonuniform illumination. Before extracting features from the original image, the image needs to be preprocessed to localize iris, normalize iris, and reduce the influence of the factors mentioned above. Such preprocessing is described in the following subsections.

Figure 4 : Edge detection by canny method

Figure.5 An iris image from CASIA database [7] Iris localization Both the inner boundary and the outer boundary of a typical iris can approximately be taken as circles. However, the two circles are usually not co-centric. The iris is localized in two steps: a) Approximate region of iris in an image can be found by projecting iris image in horizontal and vertical direction. b) The exact parameters of these two circles are obtained by using edge detection and Hough transform in a certain region determined in the first step. 1)

Figure 5. Flow Chart of Iris Recognition [5] B. HOUGH Transform The HOUGH Transform is considered as a very powerful tool in edge linking for line extraction . Its main advantages are its Insensitivity to noise and its capability to extract lines even in areas with pixel absence (pixel gaps). The Standard HOUGH Transform (SHT) proposed by Duda and Hart (Duda and Hart, 1972) is widely applied for line extraction in natural scenes, while some of its modifications have been adjusted for geologic lineament extraction purposes. The circle is simpler to represent in parameter space, compared to the line, since the parameter of the circle can be directly transfer to the parameter space. The equation of the circle is: (x-a)2 + (y-b)2=r2 As it can be seen the circle to get three parameter r, a & b, where a & b are the centre of the circle in the direction x & y respectively and r is the radius .Then we have a n dimensional parameter space (three dimensional space for a circle).This model has three parameters: two parameters for the centre of the circle and one parameter for the radius of the circle. For ellipses and other parametric objects the algorithm is quite similar, but the computation complexity (dimension of the Hough space) increases with the number of the variables.[6]

Figure.6 The localization result Iris Normalization Irises from different people may be captured in different size, and even for the iris from the same person, the size may change because of the variation of the illumination 2)

Special Issue

Page 3 of 69

ISSN 2229 5208

and other factors. Such elastic deformations in iris texture affect the results of iris matching. For the purpose of achieving more accurate recognition results, it is necessary to compensate for these deformations. Here, we anti-clockwise unwrap the iris ring to a rectangular block of texture of a fixed size (64x512) by piecewise linear mapping. The distortion of the iris caused by pupil dilation can thus be reduced. Iris Image Enhancement and Denoising The normalized iris image still has low contrast and may have non-uniform illumination caused by the position of light sources. In order to obtain more well-distributed texture image, we enhance iris image by means of local histogram equalization and remove high frequency noises by filtering the image with a low-pass Gaussian filter. Figure 1d shows the preprocessing result of an iris image. From Fig. 1d, we can see that finer texture characteristics of the iris become clearer than that in Fig. 1c. The method of enhancement and denoising is very effective. [7] 3)

International Journal of Computer Information Systems, Vol. 3, No. 3, 2011 4) Feature Extraction The iris has a particularly interesting structure and provides abundant texture information. So, it is desirable to explore representation methods which can capture local underlying information in an iris. From the viewpoint of texture analysis, the local spatial patterns in an iris mainly involve frequency information and orientation information. But in experiments, we find that orientation is not a crucial factor when analyzing the characteristics of a small iris region such as a 10x10 region. That is, in a small iris region, frequency information accounts for the major differences of the irises from different people. We thus propose an effective scheme to capture these discriminating frequency information. Because the majority of useful information of the iris is in specific frequency band, a bank of circular symmetric filters is constructed to capture them. For a preprocessed iris image (e.g. Figure 1d), the texture of the iris becomes coarser from top down. So, we use filters at different frequencies for different regions in the image.. III. DISADVANTAGES OF IRIS RECOGNITION TECHNOLOGY

The camera used in the process needs to have the correct amount of illumination. Without this, it is very difficult to capture an accurate image of the iris. Inadequate training of users at the initial enrolment period will cause problems both at the initial enrolment time and subsequent authentications. IV. CONCLUSION The iris recognition system is tested using CASIA image database. The segmentation is the crucial stage in iris recognition. We have used the global threshold value for segmentation. iris recognition which utilizes both the intensity gradient and texture difference between the iris and sclera or between the pupil and iris. The iris localization rate based on this method is much higher because the popular Hough transforms technique is used and hence can work well when the gradient is not strong enough. Our approach detects the center and the boundaries quickly and reliably, even in the presence of eyelashes, under very low contrast interface . REFERENCES [1] [2] (d) [3] Figure 7. Image preprocessing: (a) Original image; (b) Detected iris region; (c) Unwrapped image; (d) Iris image after enhancement and denoising, where the region of interest used in feature extraction is above the dotted line. Iris Recognition Biometric Security & Access Control System(Internet Draft). IRIS Recognition Using Neural Network, Leila Fallah Araghi, Hamed Shahhosseini, Farbod Setoudeh Person identification technique using human iris recognition Christel-loc TISSE1, Lionel MARTIN1, Lionel TORRES 2, Michel ROBERT 2 1Advanced System Technology STMicroelectronics ZI Rousset 13106 Rousset Cedex, France Universit de Montpellier, UMR 5506, L.I.R.M.M.

(a)

(b)

(c)

Special Issue

Page 4 of 69

ISSN 2229 5208

[4]

[5]

[6]

[7]

[8]

[9]

Iris Recognition System Based on Statistical Feature Analysis Using Haar Wavelet Rega. R PG Student, Applied Electronics, Jerusalem College of Engineering, Chennai - 600100, India. IRIS RECOGNITION SYSTEM USING A CANNY EDGE DETECTION AND A CIRCULAR HOUGH TRANSFORM, Naveen Singh1, Dilip Gandhi2, Krishna Pal Singh3 1Elect. & Comm. Dept, Uni. Institute of Technology Barkatullah University, Bhopal (M.P) , India, International Journal of Advances in Engineering & Technology, May 2011. IJAET ISSN: 2231-1963 221 Vol. Iris Recognition System using canny edge detection for Biometric Identification Bhawna chouhan Dr. (Mrs.) shailja shukla M.E. VI sem, JEC, Jabalpur JEC, Jabalpur Improving Iris-based Personal Identification using Maximum Rectangular Region Detection Serestina Viriri and Jules-R Tapamo School of Computer Science University of KwaZulu-Natal, Durban, South Africa International Conference on Digital Image Processing IRIS RECOGNITION SYSTEM USING A CANNY EDGE DETECTION AND A CIRCULAR HOUGH TRANSFORM Naveen Singh1, Dilip Gandhi2, Krishna Pal Singh3 1Elect. & Comm. Dept, Uni. Institute of Technology Barkatullah University, Bhopal (M.P) , India 2Elect. & Comm. Dept, R.K.D.F College of Engineering, Bhopal (M.P) , India 3M.Tech Student, R.K.D.F Institute of Science and Technology, Bhopal (M.P) Iris Recognition for Personal Identification,Shrikanth Mohan, Intelligent Systems, Electrical Engineering, Clemson University

International Journal of Computer Information Systems, Vol. 3, No. 3, 2011


AUTHORS PROFILE

Anu Sharma born in india on November 18,1984. She Completed her B.Tech from N.C College,Israna, Panipat(Haryan)in 2006. She completed post graduatiuon from MMEC ,Mullana, Ambala(Haryana) in 2011. She is having experience of more than 4 years as lecturer. Presently working as a Assistant Professor in Teerthankar Mahaveer University,Moradabad(U.P).

Gulista Khan born in india on September 30,1985. Shri Krishan Institute of Engineering And Technology, Kurukshetra in 2006.. She completed post graduatiuon from MMEC ,Mullana, Ambala(Haryana) in 2009. She is having experience of more than 4.8 years as lecturer in Haryana Engineering college.. Presently working as a Assistant Professor in Teerthankar Mahaveer University,Moradabad(U.P). Wajid Ali was born on Feb. 20, 1985. After completing, Bachelor of Technology in the field of Computer Engineering from Acharya Institute of Management And Technology 2009, He did his Masters in Technology in the field of Information Technology from Karnataka University. Presently he is doing job as lecturer in Hindustan Institute of Technology and Management.

Special Issue

Page 5 of 69

ISSN 2229 5208

You might also like