You are on page 1of 5

International Journal of Research in Computer and ISSN(Online) 2278-5841

Communication Technology, Vol 2, Issue 8, August -2013 ISSN (Print) 2320-5156

Biometric Security Techniques For IRIS Recognition System


A.Mallikarjuna, S. Madhuri,
Research Scholar, Dept. of Computer Science, S.V. University, Tirupati,
Dept. of Information Technology, JNTU, Hyderabad, Andhra Pradesh.
mallikarjuna.asupathri@gmail.com , madhuri.siddulagari@gmail.com

Abstract physiological or behavioral characteristics [1].


Examples of physiological characteristics include hand,
Iris recognition is an automated method of biometric finger images, facial characteristics, and iris
identification that uses mathematical pattern-
recognition. Behavioral characteristics are traits that
recognition techniques on video images of the irides of
an individual's eyes, whose complex random patterns are learned or acquired. Dynamic signature
are unique and can be seen from some distance. Not to verification, speaker verification, and keystroke
be confused with another, less prevalent, ocular-based dynamics are examples of behavioral characteristics.
technology, retina scanning, iris recognition uses
camera technology with subtle infrared illumination to Biometrics system uses hardware to capture the
acquire images of the detail-rich, intricate structures of biometric information, and software to maintain and
the iris. A key advantage of iris recognition, besides its manage the system. In general, the system translates
speed of matching and its extreme resistance to false these measurements into a mathematical, computer-
matches is the stability of the iris as an internal,
readable format [2]. When a user first creates a
protected, yet externally visible organ of the eye. In
this paper, efficient bio metric security techniques for biometric profile, known as a template, that template
iris recognition system with high performance and high is stored in a database. The biometrics system then
confidence are described. compares this template to the new image created every
time a user accesses the system. Biometrics adds a
unique identifier to network authentication, one that is
Keywords
extremely difficult to duplicate. Smart cards and
Biometrics, IRIS recognition, E-business, E-security, tokens also provide a unique identifier, but biometrics
Illumination, User authentication. has an advantage over these devices: a user cannot
lose or forget his or her fingerprint, retina, or voice.
1. Introduction The practical applications for biometrics are diverse
and expanding, and range from healthcare to
government, financial services, transportation and
Today's e-security are in critical need of finding public safety and justice. Such applications are on-line
accurate, secure and cost-effective alternatives to identification for E-Commerce, access control of a
passwords and personal identification numbers (PIN) certain building or restricted area, off-line personal
as financial losses increases dramatically year by year identification, financial automated teller machine
from computer-based fraud such as computer hacking (ATM), on-line tickets purchase and internet kiosk
and identity theft . Biometric solutions addresses these and military area access control etc [3]. Using iris
fundamental problems, because an individual's recognition in ATM, a customer simply walks up to
biometric data is unique and cannot be transferred. the ATM and looks in a sensor camera to access their
Biometrics is an automated method of identifying a accounts. The camera instantly photographs the iris of
person or verifying the identity of a person based on the customer. If the customer’s iris data matches the

www.ijrcct.org Page 589


International Journal of Research in Computer and ISSN(Online) 2278-5841
Communication Technology, Vol 2, Issue 8, August -2013 ISSN (Print) 2320-5156

record stored ,a database access is granted [4]. At the excess of 266 degrees of freedom, i.e. the number of
ATM, a positive authentication can be read through variations in the iris that allow one iris to be
glasses, contact lenses and most sunglasses. Iris distinguished from another.
recognition proves highly accurate, easy to use and
virtually fraud proof means to verify the identity of the The fact that the iris is protected behind the eyelid,
customer. cornea and aqueous humour means that, unlike other
biometrics such as fingerprints, the likelihood of
1. Background and Related work damage and/or abrasion is minimal. The iris is also not
Identification vs. Verification subject to the effects of aging which means it remains
in a stable form from about the age of one until death.
It is important to distinguish whether a biometrics
The use of glasses or contact lenses (colored or clear)
system is used to verify or identify a person. These
has little effect on the representation of the iris and
are separate goals, and some biometrics systems are
hence does not interfere with the recognition
more appropriate for one than the other, though no
technology. Figure (1) shows examples of the iris
biometric system is limited to one or the other. The
pattern and they demonstrate the variations found in
needs of the environment will dictate which system is
irises [8].
chosen. The most common use of biometrics is
verification [5]. As the name suggests, the biometric
system verifies the user based on information
provided by the user. For example, when X enters
her/his user name and password, the biometric system
then fetches the template for X. If there is a match,
the system verifies that the user is in fact X.
Identification seeks to determine who the subject is
without information from the subject. For instance, Examples of human iris patterns: Figure 1
face recognition systems are commonly used for In general, the process of iris recognition system
identification; a device captures an image of the includes the following four steps:
subject is face and looks for a match in its database.
Identification is complicated and resource-intensive 1. Capturing the image
2. Defining the location of the iris
because the system must perform a one-to-many
3. Optimizing the image
comparison of images, rather than a one-to-one 4. Storing and comparing the image.
comparison performed by a verification system [6].

The iris features and process

The iris has many features that can be used to


distinguish one iris from another. One of the primary
visible characteristic is the trabecular meshwork, a
tissue which gives the appearance of dividing the iris in
a radial fashion that is permanently formed by the
eighth month of gestation. During the development of
the iris, there is no genetic influence on it, a process
known as chaotic morphogenesis that occurs during the
seventh month of gestation, which means that even
identical twins have differing irises [7]. The iris has in

www.ijrcct.org Page 590


International Journal of Research in Computer and ISSN(Online) 2278-5841
Communication Technology, Vol 2, Issue 8, August -2013 ISSN (Print) 2320-5156

How a biometric system works: Figure 2 Both the inner boundary and the outer boundary of a
typical iris can be taken as circles. But the two circles
2. The Proposed System are usually not co-centric. Compared with the other
part of the eye, the pupil is much darker. We detect the
inner boundary between the pupil and the iris by
In this section, we will discuss in detail the means of thresholding. The outer boundary of the iris
proposed system. The system contains five main is more difficult to detect because of the low contrast
steps; image acquisition, iris localization, between the two sides of the boundary. We detect the
outer boundary by maximizing changes of the
coordinate systems, recognition and identification
perimeter-normalized sum of gray level values along
process and matching and classification the circle. The technique is found to be efficient and
evaluation [9]. Each step is described as follows: effective.

1. Acquisition of Eye image Step-1 Edge detection: We will localize the


pupillary boundary by using a finer scale then
apply the Zero-Crossing for each pixel to make a
comparison between pixels to make all values of
the pupil to be zero to easy determine the
boundary.

Step -2 Edge Linking: Using coarse-to-fine


scale to get boundaries by merging the existing
edge segments into boundaries this is done by
edge linking.

Step-3 Enhancement : The result of step-1 and


step-2 should be enhanced by using median
filter.

Step-4: Pupil/limbus center : Determine the center


Configuration of the proposed image acquisition of the pupil (x0,y0) by counting the number of black
device: Figure 3
pixels (zero values) [10] as follows:
The human eye should be 9 cm far away from the
- Count every pixel in each row.
camera as shown above. The halogen lamp is in a
fixed position to get the same illumination effect
- Get the row of maximum number of pixels. -
over all the images, thus excluding the
Get the position of the first and last pixels
illuminated part from the Iris while getting the
Iris Code is easier, to acquire a more clear images respectively (x1,y1) and (x2,y2) of this row. Then find
through a CCD camera and minimize the effect of the center of this row by,
the reflected lights caused by the surrounding
illumination, we arrange two halogen lamps as x0=x1+x2/2.
the surrounding lights and the two halogen lamp
- Similarly apply the previous steps for determining
should be in front of the eye. Figure (3) shows the
the center of the column of maximum number of pixels
device configuration for acquiring human eye
images. by y0=y1+y2/2. We actually can not obtain only one
point, so we select the center point as the most
3. Iris Localization frequently crossed point. Consequently, the radius of
virtual circle of the pupil can be determined.

www.ijrcct.org Page 591


International Journal of Research in Computer and ISSN(Online) 2278-5841
Communication Technology, Vol 2, Issue 8, August -2013 ISSN (Print) 2320-5156

Step-5 Isolate the iris boundary: Segment the This section illustrates the technique of how to get
image of the iris from the eye by applying the feature vector (iris code) to able to compare the
boundary detection technique to localize the similarities of the human eyes and to identify the
pupillary boundary. person [12]. The wavelet transform breaks an image
down into four sub-sampled, or images. The results
consist of one image that has been high pass in the
horizontal and vertical directions, one that has been
low passed in the vertical and high passed in the
horizontal, and one that has been low pass filtered in
both directions. Where, H and L mean the high pass
and low pass filter, respectively. While HH means
that the high pass filter is applied to signals of both
directions.
Original image :Fig (a) Image after localization: Fig
(b)

3. Polar Transformation

The localized iris part from the image should be


transformed into polar coordinates system Locating iris
in the image delineates the circular iris zone of analysis
by its own inner and outer boundaries. The Cartesian to
polar reference transform authorizes equivalent
For the 450x60 iris image in polar coordinates, we
rectangular representation of the zone of interest as
apply wavelet transform 4-times in order to get the
shown figure 5. In this way we compensate the
28x3 sub-images (i.e. 84 features). By combining
stretching of the iris texture as the pupil changes in
these 84 features in the HH sub-image of the high-
size, and we unfold the frequency information
pass filter of the fourth transform (HH4) and each
contained in the circular texture in order to facilitate
average value for the three remaining high-pass
next features extraction [11]. Moreover this new
filters areas (HH1,HH2,HH3), the dimension of the
representation of the iris breaks the no eccentricity of
resulting feature vector is 87. Each value of 87
the iris and the pupil.
dimensions has a real value between -1.0 and 1.0.
The )]2 ; Ѳ(Ѳ€[Ѳ;2∏]) parameter and dimensionless By quantizing each real value into binary form by
p(p€ [0;1]) parameter describe the polar coordinate convert the positive value into 1 and the negative
system. value into 0. Therefore, we can represent an iris
image with only 87 bits.

5. Matching Process

Comparison of Iris Code records includes


calculation of a Hamming Distance (HD), as a
measure of variation between the Iris Code recorded
from the presented iris and each Iris
Code recorded in the databases. Let jAj and Bj be
two iris codes to be compared, the Hamming
distance function can be calculated as:
Polar Transform: Figure 4
4. Feature Extraction

www.ijrcct.org Page 592


International Journal of Research in Computer and ISSN(Online) 2278-5841
Communication Technology, Vol 2, Issue 8, August -2013 ISSN (Print) 2320-5156

[2]. A. Julian, “Biometrics: Advanced Identity Verification”


The Complete Guide, Springer-Verlag publishers, 2000.

[3]. B J. Erik. “Overview of the Biometric Identification


Technology Industry” A presentation to the IBIA
Conference: Defending Cyberspace '99, http://www.ibia.org
denoting exclusive-OR operator. (The
exclusive-OR is a Boolean operator that equals one [4]. F. Kagan Gürkaynak, Y. Leblebici and D. Mlynek “A
if and only if the two bits Aj and Bj are different). Compact High-Speed Hamming Distance Comparator for
Pattern Matching Applications” http://turquoise.wpi.edu,
4. Result & Conclusion 1998.

[5]. G. Kee, Y. Byun, K. Lee and Y. Lee, “Improved


We describe in this paper efficient techniques for iris Techniques for an Iris Recognition System with High
recognition system with high performance from the Performance” Lecture Notes Artificial Intelligence, LNAI
2256, pp. 177-181, 2001.
practical point of view. These techniques are:
[6].G.O. Williams, “Iris Recognition Technology” IEE
• A method of evaluating the quality of an image in the Aerospace and Electronics Systems Magazine, vol. 12, no. 4,
image acquisition step and excluding it from the pp. 23-29,1997.
subsequent
centre
eye of theprocessing
• Aimage.
computer pupil andiflocalizing
graphics italgorithm
is not appropriate.
thefor
iris detecting
area fromthe
an
• Transforming the localized iris area into a simple [7].J.G Daugman, “Biometric Personal Identification
coordination system. System based on Iris Analysis” U.S. patent 5, 291,560,
March 1, 1994.
• A compact and efficient feature extraction method
which is based on 2D multiresolution wavelet [8]. P. Jablonski, R. Szewczyk, Z. Kulesza, A. Napieralski,
transform. J. Cabestany, M. Moreno, “People Identification on the
• Matching process based on Hamming distance Basis of Iris Pattern – Image Processing and Preliminary
function between the input code and the registered iris Analysis” International Conference MIEL'2002.
codes. [9]. R. Wildes, “Iris Recognition: An emerging biometric
technology” Proceedings of the IEEE, vol.85, no.9,
The system out the recognition rate is about 97.3%. September 1997.
[10]. R. Kevin, “E-Security for for E-Government” A
Kyberpass Technical White Paper, April 2001,
References: wwwkyberpass.com
[11]. Henley “Network Security and Metrics” , White Paper ,
[1]. A. A. Onsy, S. Maha, “A New Algorithm for Locating March 2012.
the Boundaries of the Human Iris”1st IEEE International [12].“Advanced verification and recognition techniques” ,
Symposium on Signal Processing and Information
Michael Owens, White Paper, January 2013.
Technology December 28-30, Hilton Ramses, Cairo, Egypt,
2001.

www.ijrcct.org Page 593

You might also like