IRIS RECOGNITION FOR HIGH LEVEL SECURITY ENVIRONMENT USING HAAR WAVELETS AND 2D
#1

[attachment=4912]

Prepared by:
T. Swetha
P. Sri Vyshnavi

Abstract
The biometric person authentication technique based on the pattern of the human iris is well suited for application to any access control system requiring a high level of security. Iris technology has been applied to person verification and identification. This thesis examines
1) Comparitive study of biometric security techniques such as fingerprint, voice, facial, retina and iris.
2) An algorithm for iris recognition system, which is composed of iris image acquisition, segmentation, normalization, feature extraction and matching.
In this a fusion mechanism that amalgamates canny edge detection scheme is used to detect the iris’ boundaries in the eye’s digital image. Haar wavelet is applied in order to extract the deterministic patterns in a person’s iris in the form of a feature vector. By comparing the quantized vectors using the Hamming Distance operator, determined finally whether two irises are similar. Experimental results show that the algorithm is efficient and adaptive to environment. The system performed with perfect recognition on a set of eye images. Therefore, iris recognition is shown to be a reliable and accurate biometric technology.

Introduction
The purpose of ‘Iris Recognition’, a biometrical basic technology for personal identification and verification, is to recognize a person from his/her iris prints. In fact, iris patterns are characterized by high level stability and distinctiveness. Each individual has a unique iris (see figure 1.1); the difference even exists between identical twins and between the left and right eye of the same person.
Among various physical characteristics, iris patterns have attracted a lot of attention for the last few decades in biometric technology because they have stable and distinctive features for personal identification that is because every iris has fine and unique patterns and does not change over time since two or three years after the birth, so it might be called as a kind of optical finger print. The automated personal identity authentication systems based on iris recognition are reputed to be the most reliable among all biometric methods. We consider that the probability of finding two people with identical iris pattern is almost zero, thus making this technology an important biometric solution for people identification in access control as networked access to computer application.

Reply
#2

[attachment=5138]
Iris Recognition

BIOM 426: Biometrics Systems

Instructor: Natalia Schmid



Abstract
The biometric person authentication technique based on the pattern of the human iris is well suited for application to any access control system requiring a high level of security. Iris technology has been applied to person verification and identification. This thesis examines
1) Comparitive study of biometric security techniques such as fingerprint, voice, facial, retina and iris.
2) An algorithm for iris recognition system, which is composed of iris image acquisition, segmentation, normalization, feature extraction and matching.
In this a fusion mechanism that amalgamates canny edge detection scheme is used to detect the iris’ boundaries in the eye’s digital image. Haar wavelet is applied in order to extract the deterministic patterns in a person’s iris in the form of a feature vector. By comparing the quantized vectors using the Hamming Distance operator, determined finally whether two irises are similar. Experimental results show that the algorithm is efficient and adaptive to environment. The system performed with perfect recognition on a set of eye images. Therefore, iris recognition is shown to be a reliable and accurate biometric technology.


Reference: http://studentbank.in/report-iris-recogn...z11Ycg7fMl
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mobile voting system using iris recognition and cryptography techniques all delials, iris recognition and multiwavelet, iris recognition using wavelets, ppt for biometric security using iris recognition, electrical technical seminar topics on wavelets, far and frr iris recognition, mobile voting system using iris recognition and cryptography techniques,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  MICRO CONTROLLER BASED SECURITY SYSTEM USING SONAR ajukrishnan 5 7,153 31-01-2015, 11:55 PM
Last Post: Guest
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,371 20-09-2013, 10:52 AM
Last Post: computer topic
  Android Mobile Security – An Issue of Future computer girl 2 2,402 24-08-2013, 10:26 AM
Last Post: computer topic
  BLOOD VESSEL ENHANCEMENT AND SEGMENTATION USING WAVELET TRANSFORM science projects buddy 3 5,479 04-08-2013, 10:21 PM
Last Post: Guest
  GESTURE RECOGNITION seminar projects crazy 4 4,750 19-02-2013, 11:28 AM
Last Post: seminar details
  GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS & SECURITY full report seminar presentation 1 2,735 06-02-2013, 10:02 AM
Last Post: seminar details
  Fingerprint Recognition future directions full report seminar topics 11 12,513 12-01-2013, 11:49 AM
Last Post: seminar details
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,056 10-01-2013, 05:30 PM
Last Post: Guest
  iris scanning seminars report electronics seminars 7 11,577 17-12-2012, 11:36 AM
Last Post: seminar details
Music High Speed OFDM Packet Access Computer Science Clay 1 1,882 08-12-2012, 02:44 PM
Last Post: seminar details

Forum Jump: