• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Recognition of human iris patterns for biometric identification (2003)

by L Masek
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 141
Next 10 →

Image understanding for iris biometrics: A survey

by Kevin W. Bowyer, Karen Hollingsworth, Patrick J. Flynn , 2008
"... ..."
Abstract - Cited by 154 (35 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...a hypothesizeand-verify step to catch incorrect candidate iris locations and they present a method for improved detection of occlusion by eyelids. Experiments compare their results with that of Masek =-=[96]-=- and with the location reported by the LG 2200 iris biometrics system. The Masek iris location resulted in 90.9% rank-one recognition, the LG 2200 location resulted in 96.6%, and the ND IRIS location ...

Ubiris: A noisy iris image database

by Hugo Proença, Luís A. Alex - Tech. Rep , 2005
"... Abstract. This paper presents a new iris database that contains images with noise. This is in contrast with the existing databases, that are noise free. UBIRIS is a tool for the development of robust iris recognition algorithms for biometric proposes. We present a detailed description of the many ch ..."
Abstract - Cited by 65 (10 self) - Add to MetaCart
Abstract. This paper presents a new iris database that contains images with noise. This is in contrast with the existing databases, that are noise free. UBIRIS is a tool for the development of robust iris recognition algorithms for biometric proposes. We present a detailed description of the many characteristics of UBIRIS and a comparison of several image segmentation approaches used in the current iris segmentation methods where it is evident their small tolerance to noisy images. 1
(Show Context)

Citation Context

... based binary edge map construction followed by circular Hough transform. This methodology is the most widely used, being proposed with minor several variants in [3], [11], [14], [17], [19], [18] and =-=[20]-=-. [16] proposes one simple method based on thresholds and function maximization in order to obtain two ring parameters corresponding to iris inner and outer borders. Authors from [7] propose one iris ...

Experiments with an improved iris segmentation algorithm

by Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn - in: IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), 2005
"... Iris is claimed to be one of the best biometrics. We have collected a large data set of iris images, intention-ally sampling a range of quality broader than that used by current commercial iris recognition systems. We have re-implemented the Daugman-like iris recognition algorithm developed by Masek ..."
Abstract - Cited by 44 (23 self) - Add to MetaCart
Iris is claimed to be one of the best biometrics. We have collected a large data set of iris images, intention-ally sampling a range of quality broader than that used by current commercial iris recognition systems. We have re-implemented the Daugman-like iris recognition algorithm developed by Masek. We have also developed and imple-mented an improved iris segmentation and eyelid detection stage of the algorithm, and experimentally verified the im-provement in recognition performance using the collected dataset. Compared to Masek’s original segmentation ap-proach, our improved segmentation algorithm leads to an increase of over 6 % in the rank-one recognition rate. 1.
(Show Context)

Citation Context

... an image of sufficient quality for use. (a) Iridian LG EOU2200 (b) Iris acquisition Figure 1. The Iridian LG EOU2200 system. We reimplemented a Daugman-like algorithm originally implemented by Masek =-=[8]-=-. We also developed and implemented an improved iris segmentation and eyelid detection stage. Our improved system is denoted as ND IRIS. We tested ND IRIS on a set of over 4,000 images of varying qual...

Secure biometrics via syndromes

by Emin Martinian, Sergey Yekhanin, Jonathan S. Yedidia - in Allerton Conf , 2005
"... We consider the secure biometric storage problem and develop a solution using syndrome codes. Specifically, biometrics such as fingerprints, irises, and faces are often used for authentication, access control, and encryption instead of passwords. While it is well known that passwords should never be ..."
Abstract - Cited by 25 (4 self) - Add to MetaCart
We consider the secure biometric storage problem and develop a solution using syndrome codes. Specifically, biometrics such as fingerprints, irises, and faces are often used for authentication, access control, and encryption instead of passwords. While it is well known that passwords should never be stored in the clear, current systems often store biometrics in the clear and are easily compromised. We describe the secure biometric storage problem by discussing the insecurities in current systems, the reasons why password hashing/encryption algorithms are unsuitable for biometrics, and propose a secure biometric storage framework based on syndrome codes and the Slepian-Wolf theorem. 1
(Show Context)

Citation Context

...ation of the iris, unwrap it into a rectangular region, and use a bank of Gabor filters to extract a bit sequence, which we denote as m. These steps are performed using the matlab implementation from =-=[18]-=-. 2. Our key extraction procedure x(·) produces z from m by discarding the bits at certain fixed positions that we determined to be unreliable based on our training data. The resulting z = x(m) consis...

Iris Segmentation Using Geodesic Active Contours

by Samir Shah, Arun Ross
"... Abstract—The richness and apparent stability of the iris texture make it a robust biometric trait for personal authentication. The performance of an automated iris recognition system is affected by the accuracy of the segmentation process used to localize the iris structure. Most segmentation models ..."
Abstract - Cited by 24 (2 self) - Add to MetaCart
Abstract—The richness and apparent stability of the iris texture make it a robust biometric trait for personal authentication. The performance of an automated iris recognition system is affected by the accuracy of the segmentation process used to localize the iris structure. Most segmentation models in the literature assume that the pupillary, limbic, and eyelid boundaries are circular or elliptical in shape. Hence, they focus on determining model parameters that best fit these hypotheses. However, it is difficult to segment iris images acquired under nonideal conditions using such conic models. In this paper, we describe a novel iris segmentation scheme employing geodesic active contours (GACs) to extract the iris from the surrounding structures. Since active contours can 1) assume any shape and 2) segment multiple objects simultaneously, they mitigate some of the concerns associated with traditional iris segmentation models. The proposed scheme elicits the iris texture in an iterative fashion and is guided by both local and global properties of the image. The matching accuracy of an iris recognition system is observed to improve upon application of the proposed segmentation algorithm. Experimental results on the CASIA v3.0 and WVU nonideal iris databases indicate the efficacy of the proposed technique. Index Terms—Geodesic active contours (GACs), iriscodes, iris recognition, iris segmentation, level sets, snakes. Fig. 1. Block diagram of an iris recognition system.
(Show Context)

Citation Context

...s. Also, the upper and lower boundaries of the eyelid are approximated using parabolic curves. Matching is done using the normalized correlation between the test and training images. Masek and Kovesi =-=[7]-=- employ weighted gradients using a combination of Kovesi’s modified canny edge detector and the circular Hough-transform to segment the iris. Several other segmentation schemes proposed in the literat...

Comparison and Combination of Iris Matchers for Reliable Personal Identification

by Ajay Kumar, Arun Passi
"... The biometric identification approaches using iris images are receiving increasing attention in the literature. Several methods for the automated iris identification have been presented in the literature and those based on the phase encoding of texture information are suggested to be the most promis ..."
Abstract - Cited by 22 (1 self) - Add to MetaCart
The biometric identification approaches using iris images are receiving increasing attention in the literature. Several methods for the automated iris identification have been presented in the literature and those based on the phase encoding of texture information are suggested to be the most promising. However, there has not been any attempt to combine these phase preserving approaches to achieve further improvement in the performance. This paper presents a comparative study of the performance from the iris identification using log-Gabor, Haar wavelet, DCT and FFT based features. Our experimental results suggest that the performance from the Haar wavelet and log Gabor filter based phase encoding is the most promising among all the four approaches considered in this work. Therefore the combination of these two matchers is most promising, both in terms of performance and the computational complexity. Our experimental results from the all 411 users (CASIA v3) and 224 users (IITD v1) database illustrate significant improvement in the performance that is not possible with either of these approaches individually. 1.
(Show Context)

Citation Context

...ncy components in any encoding and an evensymmetric Gabor filter will have a DC component whenever the bandwidth is larger than one octave. Therefore the LogGabor filters have been recently suggested =-=[12]-=--[13] for phase encoding because the zero DC-component can be obtained for any bandwidth by using a Gabor filter which is Gaussian on a logarithmic scale. The Log-Gabor filters having extended tails a...

Multispectral Iris Analysis: A Preliminary Study

by Christopher Boyce, Arun Ross, Matthew Monaco, Lawrence Hornak, Xin Li
"... This paper explores the possibility of using multispectral iris information to enhance the recognition performance of an iris biometric system. Commercial iris recognition systems typically sense the iridal reflection pertaining to the near-infrared (IR) range of the electromagnetic spectrum. This w ..."
Abstract - Cited by 19 (7 self) - Add to MetaCart
This paper explores the possibility of using multispectral iris information to enhance the recognition performance of an iris biometric system. Commercial iris recognition systems typically sense the iridal reflection pertaining to the near-infrared (IR) range of the electromagnetic spectrum. This work examines the iris information represented in the visible and IR portion of the spectrum. It is hypothesized that, based on the color of the eye, different components of the iris are highlighted at multiple wavelengths. To this end, an acquisition procedure for obtaining co-registered multispectral iris images associated with the IR, Red, Green and Blue wavelengths of the electromagnetic spectrum, is first discussed. The components of the iris that are revealed in multiple spectral channels/wavelengths based on the color of the eye are studied. An adaptive histogram equalization scheme is invoked to enhance the iris structure. The performance of iris recognition across multiple wavelengths is next evaluated. Experiments indicate the potential of
(Show Context)

Citation Context

...omatic localization of the spatial extent of the iris structure by detecting its boundary in the image and designing a mask of ‘1’s and ‘0’s indicating the iris and non-iris regions, respectively ([1]=-=[2]-=-[3]). It is a crucial first step in any iris processing algorithm. The approach used in this paper can be divided into two stages: the pupillary boundary detection (between the pupil and iris) and the...

Performance evaluation of iris based recognition system implementing

by Natalia A. Schmid, Gamal Fahmy - PCA and ICA techniques,” Proc. of the SPIE 2005 Symp. on Defense and Security , 2005
"... In this paper, we describe and analyze the performance of two iris-encoding techniques. The first technique is based on Principle Component Analysis (PCA) encoding method while the second technique is a combination of Principal Component Analysis with Independent Component Analysis (ICA) following i ..."
Abstract - Cited by 12 (3 self) - Add to MetaCart
In this paper, we describe and analyze the performance of two iris-encoding techniques. The first technique is based on Principle Component Analysis (PCA) encoding method while the second technique is a combination of Principal Component Analysis with Independent Component Analysis (ICA) following it. Both techniques are applied globally. PCA and ICA are two well known methods used to process a variety of data. Though PCA has been used as a preprocessing step that reduces dimensions for obtaining ICA components for iris, it has never been analyzed in depth as an individual encoding method. In practice PCA and ICA are known as methods that extract global and fine features, respectively. It is shown here that when PCA and ICA methods are used to encode iris images, one of the critical steps required to achieve a good performance is compensation for rotation effect. We further study the effect of varying the image resolution level on the performance of the two encoding methods. The major motivation for this study is the cases in practice where images of the same or different irises taken at different distances have to be compared. The performance of encoding techniques is analyzed using the CASIA dataset. The original images are non-ideal and thus require a sequence of preprocessing steps prior to application of encoding methods. We plot a series of Receiver Operating Characteristics (ROCs) to demonstrate various effects on the performance of the iris-based recognition system implementing PCA and ICA encoding techniques.
(Show Context)

Citation Context

...over the last decade. The first complete iris based recognition system was designed and patented by J. Daugman [1]. It was followed by a number of other works. The most referred in the literature are =-=[2,3,4]-=-. The systems described in these works capture and further process a single or multiple copies of infra-red or visible light frontal view images of high resolution with no strong blur or occlusions (w...

Secure iris verification

by Shenglin Yang, Ingrid Verbauwhede - In IEEE Acoust., Speech, Signal Process
"... In this paper, we present a novel secure iris verification system, where a transformed version of the iris template instead of the plain reference is stored for protecting the sensitive biometric data. An Error Correcting Code (ECC) technique is adopted to perform the comparison in the transformed d ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
In this paper, we present a novel secure iris verification system, where a transformed version of the iris template instead of the plain reference is stored for protecting the sensitive biometric data. An Error Correcting Code (ECC) technique is adopted to perform the comparison in the transformed domain. A two-segment method is proposed to execute the feature verification, where a Bose-Chaudhuri-Hochquenghem (BCH) code of a random bit-stream is introduced to eliminate the considerable differences between the features extracted from different scans of irises. A reliable bits selection process during the iris feature generation stage reduces the system error rate from 6.0 % to 0.8%. The appropriate size of the set of reliable bits is determined by investigating the best match between the associated error correct cutting edge and the actual verification accuracy. Index Terms- iris, personal verification, data security 1.
(Show Context)

Citation Context

...characteristic iris features can be extracted for comparison. Shown in the following is the block diagram of the iris process algorithm implemented in the proposed system. Algorithms are derived from =-=[15]-=-. Segmentation Detect iris boundary Detect pupil boundary Isolate eyelid & eyelash r Normalization (Daugman’s rubber sheet model) Feature Coding 2D signal � � r Iris template Fig.1. Block diagram for ...

Securing biometric data

by Anthony Vetro, Stark Draper, Shantanu Rane, Jonathan Yedidia, Anthony Vetro, Stark C. Draper, Shantanu Rane, Jonathan S. Yedidia - in Distributed Source Coding
"... This chapter discusses the application of distributed source coding techniques to biometric security. A Slepian-Wolf coding system is used to provide a secure means of storing biometric data that provides robust biometric authentication for genuine users and guards against attacks from imposters. A ..."
Abstract - Cited by 12 (3 self) - Add to MetaCart
This chapter discusses the application of distributed source coding techniques to biometric security. A Slepian-Wolf coding system is used to provide a secure means of storing biometric data that provides robust biometric authentication for genuine users and guards against attacks from imposters. A formal quantification of the trade off between security and robustness is provided as a function of the Slepian-Wolf coding rate. Prototype secure biometric designs are presented for both iris and fingerprint modalities. These designs demonstrate that it is feasible to achieve information-theoretic security while not significantly compromising authentication performance (measured in terms of false-rejection and false-acceptance rates) when compared to conventional biometric systems. The methods described in this chapter can be applied to various architectures, including secure biometric authentication for access control and biometric-based key generation for encryption.
(Show Context)

Citation Context

... location of the iris is first detected, and the torus is then unwrapped into a rectangular region. Next, a bank of Gabor filters are applied to extract a bit sequence. The Matlab implementation from =-=[22]-=- could be used to perform these steps. Finally, the extracted feature vector x is produced by discarding bits at certain fixed positions that were determined to be unreliable 5 . The resulting x = ffe...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University