BIOMETRIC FACE AND IRIS AUTHENTICATION
#1

[attachment=3961]

BIOMETRIC FACE AND IRIS AUTHENTICATION

Presented by
V. Divya
M. Janani
G. Lakshmi
J. Magdalene Milan

Project Guide
Mrs. V. Vinodha Vijayaragavan.



OBJECTIVE AND IDEA:

Enhance security purpose and right to vote
The face and iris images are taken and compared with the database images and turn on the polling machine if and only if it is authenticated.



IRIS IS A UNIQUE KEY IN THE WORLD

No two irises are alike.
There is no detailed correlation between the iris patterns of even identical twins, or the right and left eye of an individual.
Accuracy is greater than finger prints and DNA.
APPROVAL GIVEN BY CENTRE OF SCIENCE AND MATHEMATICS CONGREGETION OF UK
FLOW DIAGRAM:
ALGORITHM USED:



PCA: Principle Component Analysis

PCA, commonly referred to as the use of Eigen faces.
PCA approach is used to reduce the dimension of the data and removes the information that is not useful.
Thus revealing the most effective low dimensional features of facial patterns.
PCA algorithm is optimal in the sense of efficiency.



FACE RECOGNITION

Flow Diagram:
Input Image
rgb to gray

DCT
PCA
LMS
STEP1: INPUT IMAGE
STEP 2: RGB TO GRAY


STEP 3: DISCRETE COSINE TRANSFORM (DCT)

Computers store images as an NxN matrix of values that represent pixels
For example
256 gray-scale image each pixel is stored as a value between 0 “ 255
0 = black pixel
255 = white pixel
Value between are shades of gray.
Hence we going to DCT.
Two Dimensional DCT
Example
After subtracting,


STEP 4: PRINCIPAL COMPONENT ANALYSIS(PCA)



Principle
Linear projection method to reduce the number of parameters
Transfer a set of correlated variables into a new set of uncorrelated variables
Map the data into a space of lower dimensionality
Form of unsupervised learning

Properties
It can be viewed as a rotation of the existing axes to new positions in the space defined by original variables
New axes are orthogonal and represent the directions with maximum variability

STEPS IN PCA:

A.Calculate the covariance matrix
For the dataset of p variables(dimensions) X1;X2; Xp for n individuals.
Then we have a n x p data matrix X.

The covariance matrix is
Thus covariance and variance are calculated




B.TO CALCULATE EIGEN VECTOR & EIGEN VALUE

The Characteristics equation of Eigen Vectors are given as
(A - lI)X = 0
This is a homogeneous system of equations, and from fundamental linear algebra, we know that a solution exists if and only if
det (A -leigenval I) = 0
Using PCA in the Face Recognition (FR) (1)
STEP 5: LMS ALGORITHM
It calculates the difference between eigen vectors for the face.
(Eigen vector1-Eigen vector2)^2
If o/p =0 : authenticated
If o/p != 0 : unauthenticated
FACE RECOGNITION
IRIS RECOGNITION:
STEPS IN IRIS RECOGNITION:
STEP1: INPUT IMAGE




STEP 2: GAUSSIAN NOISE

Noise by definition is just unwanted sound.
It is added to reduce further addition of noise.
Gaussian coefficent
0.0113 0.0838 0.0113
0.0838 0.6193 0.0838
0.0113 0.0838 0.0113




STEP 3: EDGE DETECTION:

In our project we use Canny edge detection as it overcomes various drawbacks present in other detectors.
Canny coefficients are convolved with the filtered image.



CANNY COEFFICIENTS:

-1 -1 -1 -1 -1
-1 -1 -1 -1 -1
-1 -1 20 -1 -1
-1 -1 -1 -1 -1
-1 -1 -1 -1 -1
STEPS 4: NORMALISATION



STEP 5: IMAGE LOCALISATION

The database contains already processed normalised value.
The current normalised value is compared with the database , if found similar , the iris is recognised.


COMPARING THE RECOGNITIONS

If both comparison is positive, it is authenticated and turns on the polling machine. Or else it is unauthenticated.



Software required: MATLAB

MATLAB is a high-performance language for technical computing.
It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation.
MATLAB is an interactive system whose basic data element is an array that does not require dimensioning.



GUI:GRAPHICAL USER INTERFACE

How does it work
1. We can create buttons , axes( to display images) according to the task we perform and provides aesthetic look.

2. The corresponding codes will be generated in editor window and call back functions can be coded into it as per the need.
3. When we run the program, it calls the GUI automatically and we can display the output through it.



FUTURE WORK:

Last year of may 2009, only 36% voting takes place in TamilNadu and 60% voting amid violence.
Polling rate has been declined.
Thus this project helps individuals by making it available at the door step.



CONCLUSION:

PCA algorithm which helps in identifying and distinguishing the unique features of all the individuals.
It provides an enhanced security purpose to avoid the mal practices which is still taking place in our country.

We have provided a helping hand to our government to have secured method of voting.
THANK YOU
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: biometric authentication seminar paper, iris biometric, biometric iris scanner, biometric based authentication seminar report and ppt, biometric and cryptography, biometric technology pros and cons, iris biometric for person identification seminar report and ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,652 26-08-2016, 03:46 PM
Last Post: anasek
  Color Iris Recognition Using Quaternion Phase Correlation matlab project project topics 3 3,435 02-07-2016, 09:38 AM
Last Post: visalakshik
  ANTI THEFT ALERT AND AUTO ARRESTING SYSTEM FOR MUSEUMS AND JEWELRY SHOPS project report helper 11 14,622 12-08-2013, 09:57 AM
Last Post: computer topic
  AUTOMATIC VEHICLE ACCIDENT DETECTION AND MESSAGING SYSTEM USING GSM AND GPS MODEM smart paper boy 14 10,776 02-01-2013, 06:16 PM
Last Post: naidu sai
  Face Recognition Using Laplacian faces computer science crazy 1 2,691 19-11-2012, 01:14 PM
Last Post: seminar details
  RF Controlled Robot with Metal Detector and Wireless image and voice transmission(Mod seminar class 1 3,905 06-11-2012, 12:37 PM
Last Post: seminar details
  Salt-and-Pepper Noise Removal by Median-type Noise Detectors and Detail-preserving seminar class 1 2,332 24-10-2012, 01:45 PM
Last Post: seminar details
  Wavelet Based Palmprint Authentication System projectsofme 4 4,326 13-06-2012, 04:10 PM
Last Post: Naveen bille
  Personal Authentication Based on Iris Texture Analysis computer science technology 1 2,239 12-03-2012, 01:49 PM
Last Post: swethakv
  LIVE HUMAN DETECTION AND TRACKING USING GPS AND SEND SMS THROUGH GSM TO A MOBILE project report tiger 14 15,580 07-03-2012, 09:51 AM
Last Post: seminar paper

Forum Jump: