SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
DOI: 10.5121/ijcsit.2022.14107 99
FEATURE EXTRACTION METHODS FOR IRIS
RECOGNITION SYSTEM: A SURVEY
Tara Othman Qadir1
, Nik Shahidah Afifi Md Taujuddin2
, Sundas Naqeeb Khan3
1, 2
Faculty of Electrical and Electronic Engineering,
Universiti Tun Hussein Onn Malaysia (UTHM), 86400, Parit Raja, Johor, Malaysia
3
Faculty of Computer Science and Information Technology,
Universiti Tun Hussein Onn Malaysia, 86400, Johor, Malaysia
ABSTRACT
Protection has become one of the biggest fields of study for several years, however the demand for this is
growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from
any workstation to cloud, and though protection must be incredibly important all over. Throughout the past
two decades, sufficient focus has been given to substantiation along with validation in the technology
model. Identifying a legal person is increasingly become the difficult activity with the progression of time.
Some attempts are introduced in that same respect, in particular by utilizing human movements such as
fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech
checker, and so on. A number of methods for effective iris detection have indeed been suggested and
researched. A general overview of current and state-of-the-art approaches to iris recognition is presented
in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and
methodologies for the extraction of features are also discussed.
KEYWORDS
Bio-metric traits, iris patterns, feature extraction, SVM, wavelet transform, iris security.
1. INTRODUCTION
The most significant security issue today is verification; if researchers can enhance this area, it
implies they are reducing security threats. Various secure techniques were used, including
security, but today a biometric technology known as iris recognition provides security in terms of
verification. Humans live in a safe environment owing to the unique iris pattern, but they also
have evil genius brains that can break the protection. As a result, academics are working to
develop more secure iris recognition technologies for a more safe society [1].
There are three focused categories of verification, such as starting from password, but this was a
very weak way to secure any system or object from hackers. The next method was card or token,
but that was also a very low-level security method. Anyone could present a card or token on their
own. The last step for security is biometric, and this method provides real security to
verification. According to the biometric method, no one can emulate or steal natural human
patterns [2 - 3].
Verification of a person based on physiological and behavioral aspects. Face, finger prints, palm
and hand geometry, DNA, retinal and iris trends are some of the most commonly observed
physical aspects in a person, while signatures, tone of voice, walking style, and keystrokes are
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
100
some of the most frequently observed behavioral aspects. From all of these above patterns, the
iris is the only method that is used for security verification [4].
Now a question arises about the word biometric. What is a biometric? It consists of two words.
Bios means life and metrikos means measurement, so when researchers use these two words
together, it becomes biometric. Therefore, a biometric system capable of identifying a person's
traits stands upon a feature vector [7].
Biometric systems consist of four major parts, such as the sensor unit, feature extraction element,
matching pattern, and decision response. Consequently, when a biometric system is applied to a
human trait, there are four basic conditions that a human must have, like entirety, uniqueness,
immovability, and collectability. There is a comparison between some biometric systems
according to their factors in terms of High (H), Medium (M) and Low (L) in table 1 [8].
TABLE 1. Comparison between biometric systems with their factors
In the modern age of secure applications, there are some traditional issues which have a great
impact on biometric systems, as described in Table 2 with their impact factor also in terms of
High, Medium, and Low [8].
TABLE 2. Biometric system traditional factors with their impact
As a result, iris recognition is a fully systematic biometric system in which issues are resolved
using various mathematical methods, and these methods are directly applied to individual eye
Biometric traits Entirety Uniqueness Immovability Collectability
Face recognition H L M H
Walking style M L L H
Keystroke dynamics L L L M
Odor H H H L
Ear M M H M
Hand geometry M M M H
Finger print M H H M
Retina H H M L
Palm print M H H M
Tone of voice M L L M
DNA H H H L
Signature L L L H
Iris H H H M
Biometric traits Performance Acceptability Circumvention
Face recognition L H H
Walking style L H M
Keystroke dynamics L M M
Odor L M L
Ear M H M
Hand geometry M M M
Finger print H M M
Retina H L L
Palm print H M M
Tone of voice L H H
DNA H L L
Signature L H H
Iris H L L
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
101
images that are considered distinctive [9 - 11]. There are many possible approaches which can be
used for iris recognition, but formally, researchers divided these approaches into three known
categories, such as supervised, unsupervised, and semi-supervised approaches. In supervised
approaches, trained data is available for testing by using different classifiers, while according to
unsupervised learning approaches, using unlabelled data, the working style of this approach is
slightly different from the supervised approach. If the data pool has a smaller amount of trained
data and a huge amount of untrained data, then researchers recommend the semi-supervised
approaches.
The first section contains an introduction to the study that is relevant to the research. The second
section is about the related research work, and the third portion describes the methodology of the
research. The results and discussion section is under the umbrella of the fourth portion of the
study, and at the end, the conclusion is included as a final discussion.
2. LITERATURE REVIEW
There are some main contributed articles that are considered related works. Due to certain
resolving issues, iris recognition systems are considered the main stream for security verification
of individuals. Nanik Suciati [12] presents an automatic recognition system for a person's
identification based on eye image. Canny Edge Detection (CED) with Hough Transform
techniques used for iris detection, followed by features selected by Wavelet Transform at the last
Support Vector Machine (SVM) classifier trained for feature representation, provides 93.5% of
the results. In [13], researchers worked on optimizing attribute mining according to the wavelet
task, while for the similarity method, they used multi-class SVM with an ant colony algorithm
and gave better outcomes in terms of performance.
Tejas's [14] research concept is based on energy compression, and three different Self Mutated
Hybrid Wavelet Transforms (SMHWT) methods are used to generate feature vectors.
Characteristics basic purpose of this research is to reduce vector size, with the help of partial
energy and the Genuine Acceptance Rate (GAR) metric. Cosine-Haar provides the best GAR
accuracy rate. Researchers [15] provide scattering and textural feature sets for the reduction of
dimensionality according to the Principle Component Analysis (PCA) method and the minimum
distance classifier algorithm, which are also used for matching and get a 99.2% accuracy
rate. Kiran [16] gives the idea of vigorous segmentation of detectable iris examples while
estimating the radius of the iris with a new deep sparse filtering algorithm for unsupervised
learning. The proposed method shows 85% accuracy in correct results on both the existing
dataset and the newly generated dataset VSSIRIS. Authors [17] give the idea of attribute mining
the name "vigorous keypoints method". In this method, they merge three detectors as regards
SIFT features for corresponding score points. The unions take care of the calculation of weights
with summation regulations and provide competitive performance as compared to baseline
methods.
Lydia Elizabeth [18] presents her work in 2014 on a grid-based algorithm for feature extraction
that combines Singular Value Detection (SVD) and Discrete Wavelet Transform (DWT).
Therefore, this hybrid process offers a powerful, protected, and imperceptible watermarking
method with a minimum fault acceptance rate in good behavior. Imen Tajouri [19] improves on
Rai's algorithm by combining HAAR wavelet, 2D Log Gabor, and a monogenic filter for feature
extraction. This shows the 94.45% empirical results of the proposed method as compared to the
Daubechies wavelet and Histogram of Oriented Gradient (HOG). A deep learning approach
named convolutional neural network is integrated with a fusion method for iris recognition [43].
The feed forward mechanism proposed along a clustering method k-mean for the iris feature
extraction. The approach reduces the calculated time and size of source link as well as improves
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
102
the iris recognition [44]. An intelligent method presented for iris feature extraction and matching
activity in which the two hybrid methods used for this activity. Besides this, machine learning
algorithm is also include in the research as apart of matching approach which gives more efficient
results [45].
To address the low false rejection issue in feature extraction, the proposed Combined Directional
Wavelet Filter Bank (CDWFB) [20] algorithm combines the Directional Wavelet Filter Bank
(DWFB) and the Rotated Directional Wavelet Filter Bank (RDWFB). This approach extracts the
texture of the iris in 12 directions and provides excellent results as compared to more exciting
approaches. Researchers proposed [21] a hybrid technique design based on sparse demonstration,
including three classifiers for classes’ short list and further work on classes after that work
combining these classifiers with genetic algorithms to provide the best results. Table 3 shows the
considered articles as reviewed for related work and explains the main contributions of the
researchers.
TABLE 3. Biography of under consideration articles
Author name Article name
Search
engine
Amol D. Rahulkar and
Raghunath S. Holambe
[14]
Partial iris feature extraction and recognition based on a new
combined directional and rotated directional wavelet filter
banks
Elsevier
Vijay Prakash Sharma,
et al [7]
Improved Iris Recognition System using Wavelet Transform
and Ant Colony Optimization
IEEE
Lydia Elizabeth. B, et
al [12]
A grid based iris biometric watermarking using wavelet
transform
IEEE
Shervin Minaee, et al
[9]
Iris recognition using scattering transform and textural features IEEE
Kiran B. Raja, et al
[10]
Smartphone based visible iris recognition using deep sparse
filtering
Elsevier
Nanik Suciati, et al [6]
Feature Extraction Using Statistical Moments of Wavelet
Transform for Iris Recognition
IEEE
Tejas H. Jadhav and
Jaya H. Dewan [8]
Iris Recognition using Self Mutated Hybrid Wavelet Transform
using Cosine, Haar, Hartley and Slant Transforms with Partial
Energies of Transformed Iris Images
IJCA
Yuniol Alvarez-
Betancourt and Miguel
Garcia-Silvente [11]
A keypoints-based feature extraction method for iris
recognition under variable image quality conditions
Elsevier
Imen Tajouri, et al [13]
An Efficient Iris Texture Analysis Based On HAAR Wavelet
2D Log Gabor and Monogenic Filter
IEEE
Ashok K Bhateja, et al
[15]
Iris recognition based on sparse representation and k-nearest
subspace with genetic algorithm
Elsevier
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
103
3. METHODOLOGY
Iris recognition is performed by the different biometric systems. Due to certain specifications, the
evaluation process of iris recognition systems is divided into four major modules, which are
mentioned in Figure 1.
The very first step of iris recognition is acquiring the iris images from different types of objects
through electronic devices like cameras or sensors etc. Each image has elucidation, location area
among corporeal incarcerate structure, and other factors such as occlusion, illumination, and pixel
extent play an important role in image eminence [22].
The second step is early stage processing, in which we check the iris liveness and edge, pupil,
eyelid, normalization, subtraction of iris etc. Through iris liveness recognition, the security
system can check if the focal object is alive because there is an option in which biometric aspects
are employed illegitimately. Localization of the iris and pupil is another important preprocessing
step that was developed by Zhaofeng [5 - 6].
As a result, the parabolic arcs perform conformant of the eyelids and then plot this extorted iris
area according to the normalization. All forces composition [23] comes from the commencement
of the summation of points which examine the iris and pupil centre within the radius. Some
functions attained iris boundaries through applied form in [24]. The basic law of iris localization
is based on incline strength along consistency divergence [25].
Classification is performed through extracted aspects of iris images in the third step, where some
aspects have important variants such as 90° axis, range and dimensions of pupil, strength,
direction according to ellipsoid shape, and all the features snatched from the iris images which
are useful for security verification are organized in this step. The last step used processed iris
images along with stored images for the matching process [26]. Due to inter-class and intra-class
variables, classification issues can be resolved. Table 4 describes some important methods of iris
recognition according to their influence on results in the form of performance, where Equal Error
Rate (EER), False Rejection Rate (FRR) and False Acceptance Rate (FAR) are used as
performance measures.
Image acquisition
Matching/Recognition
Feature extraction
Preprocessing
Image adequate
through electronic
devices or from
stored database
This early stage
required methods/
techniques for
cleanliness of
noisy data
Unique units of
images fetched
by different
methods
Decision regarding
acceptance or
rejection perform in
this stage
FIGURE 1. Iris recognition system
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
104
TABLE 4. Iris patterns based methods with their performance and average time
4. RESULTS AND DISCUSSION
Table 5 shows the performance of the under consideration articles by SVM, PCA, different
algorithms and classifiers with their accuracy. Normally, SVM used with the combination of
some type of filters and statistical methods such as SVM with wavelet transform and colony
Methods Reference
Stored patterns
in DB
Performance
Average time
taken (seconds)
Phase based
method
Daugman
[27,28]
4258 images EER: 0.08% 0.71, 0.68
Martin Roche
[29]
300 images FRR: 8% 0.89
Masek [30] 624 images
FAR: 0.005% and
FRR: 0.238%
0.92
Xiaomei Liu
[31]
12000 images
(ICE)
Recognition rate:
96.61%
0.78
Karen
Hollingsworth
[32]
(i) 1226 images
from 24 subjects
(ICE)
(ii) 1061 videos
from 296 eyes
(iii) ICE database
(iv) 1263 images
from 18 subjects
(ICE)
(i)HD=7.48
(ii)EER=3.88x10-3,
FRR =7.61x10-6,
FAR=0.001
(iii) HD=0.15
(iv)FRR=0.271, FAR
= 0.001, EER=0.068
for large pupil subset
Null
Texture analysis
based method
Wildes [33, 34,
35]
60 images EER: 1.76% 0.62, 0.69, 0.78
Emine Krichen
[36]
700 images
Improvement in
FAR: 2% and FRR:
11.5%
0.88
Zero crossing
representation
method
Boles [37] Real images EER: 8.13% 0.69
Intensity
variations based
method
Li Ma [26, 38]
2245 images
(CASIA)
Correct Recognition
Rate: 94.33%.
0.77, Null
Jong Gook Ko
[39]
(i) 820 images
from 82
individuals
(ii) 756 images
(CASIA)
Recognition rate:
98.21%
0.66
N. Tajbakhsh
[40]
1877 images
(UBIRIS)
ERR: 0.66%, FRR:
4.10% and FAR:
0.01%
0.71
Independent
Component
Analysis (ICA)
based method
Ya Ping Haung
[41]
Real images
Blurred iris: 81.3%,
Variant illumination:
93.8% and Noise
interference: 62.5%
0.65
Continuous
Dynamic
Programming
based method
Radhika [42]
(i)1205 images
(UBIRIS)
(ii)1200 images
(CASIAv2)
Acceptance Rate:
98%
Rejection Rate 97%
Null
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
105
gives 93.5% and 98% results respectively. On the other hand, PCA was used with distance
classifiers and provided better results, like 99.2% accuracy. The Deep Sparse Algorithm is a
filtering algorithm used for the VSSIRIS dataset and has shown 85% accuracy in empirical
tests. The CED algorithm is based on grid watermarking. This is used for the global iris
recognition dataset and minimizes the fault acceptance and error rate by approximately 77%. The
Genetic Algorithm (GA) is associated with three classifiers and helps to reduce the execution
time. There are many algorithms used for feature extraction, like enhancement in Rai’s algorithm
integrated with filters, while on the basis of keypoints extraction, there are marginal
improvements among three detectors such as Harris, Hessian, and Fast Laplace. For the reduction
of feature vector size, researchers used the self-mutated hybrid wavelet transform method and
adequate 14% improvement in the results.
Figure 2 shows the testing results of articles in diverse domains that contain the time and
frequency developed through the measurements of performance. Consequently, figure 3 describes
the measurement results in terms of performance according to their relevant datasets, and several
feature extraction methods and algorithms were applied to these datasets and improved the angle
of performance and accuracy. In figure 4, we select the articles that have diversity in methods
such as phase-based methods, texture analysis methods, zero crossing representation based
methods, intensity variations based methods, independent component analysis based methods,
and continuous dynamic programming based methods along with their performance according to
the FAR and FRR with recognition and error rate.
TABLE 5. Summary of performance under reviewed articles with different applied methods
Task Approach Dataset Result Primary objectives
Limitations/f
uture work
Iris
recogniti
on
system
[12]
SVM with
Wavelet
transform
CASIA
eye
image
93.5%
Detection of iris area with
suitable selected features and
then representation of these
features are the focus
objectives of this research.
Improvement
in results
regarding
accuracy and
execution time
Selection
of
optimize
d feature
[13]
SVM with ant
colony
CASIA
eye
image
99% for
FAR and
98% for
FFR
Selection and optimization
operations perform with the
help of multi class SVM and
ant colony process.
Reduction of
computational
time
Feature
vector
size
reduction
[14]
Self mutated
hybrid
wavelet
transforms
Palacky
Universit
y Iris DB
14%
improve
ment
The SMHWT reduce the
feature vector size and
Cosine-Haar used partial
energy with best
improvement in GAR
function.
Color spaces
use for better
performance
Dimensio
nality
reduction
of feature
vector
[15]
Principal
component
analysis
(PCA) with
minimum
distance
classifier
Iris DB
collected
by IIT
Delhi
99.2%
Reduce dimensions of two
proposed feature sets
according to PCA and
algorithm used for best
accuracy.
Proposed set
of features test
on other
datasets and
biometric
detection
issues
Robust
segmenta
tion for
iris
recogniti
deep sparse
filtering
algorithm
with
VSSIRIS
BIPLab
DB and
VSSIRIS
newly
created
85%
accuracy
A deep sparse filtering
method used for robust
segmentation of observable
range iris recognition
provides high outcomes on
Supervised
learning
improve the
accuracy
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
106
on [16] dataset DB newly created dataset.
Feature
extractio
n [17]
Keypoints-
based feature
extraction
method
CASIA-
IrisV4-
Interval,
MMU2,
and
UBIRIS
1DB
68%
Keypoints feature extraction
combine three detectors like
Harris, Hessian and Fast
Laplace as a SIFT features for
matching score level and
calculate the weights for
attain better performance.
Implementatio
n of real time
application
Feature
extractio
n [18]
Grid based
approach
used Canny
Edge
Detection
(CED)
algorithm
Global
iris
recognitio
n dataset
77%
Grid based watermarking
algorithm used with a hybrid
SVD and DWT for
minimizing fault acceptance
and error rate.
Watermarking
algorithm
accuracy
Feature
extractio
n [19]
Rai’s
algorithm for
attribute
extraction
CASIA
V1.0 and
CASIA
V3.0
94.45%
Enhance the Rai’s algorithm
with combination of
monogenic filter and 2D Log
Gabor filter
Gabor Ordinal
Measures
GOM) test for
feature
extraction
Feature
extractio
n [20]
Combined
Directional
Wavelet
Filter Bank
(CDWFB)
proposed
approach
UBIRIS
and
MMU1
DBs
99%
accuracy
for
UBIRIS
and 98%
accuracy
for
MMU1
CDWFB a new approach for
feature extraction consists of
two different filter banks and
provide better performance in
terms of accuracy.
Improve the
performance
on real time
applications
Reductio
n of time
[21]
Three
classifiers
with genetic
algorithm
CASIA
and IITD
DBs
99.43%
on
CASIA
and
99.20%
on IITD
DBs
accuracy
Three classifiers used with
genetic algorithm for sparse
representation for reducing
the time.
Improve FRR
and FAR with
accuracy on
real time
applications
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
107
FIGURE 2. Year wise distribution of articles
FIGURE 3. Accuracy performance measured by different datasets
FIGURE 4. Iris recognition methods with their approved performance
2010
2012
2014
2016
2018
[10]
[11]
[14]
[15]
[12]
[13]
[6]
[7]
[9]
[8]
Elsevier IEEE IJCA
Year
wise
distribution
Search engines
Frequency count regarding
references
0
0.2
0.4
0.6
0.8
1
Performance
Datasets
Accuracy
0
0.2
0.4
0.6
0.8
1
Boles
[31]
EER:
Emine
Krichen
…
Jong
Gook
Ko
…
Martin
Roche
…
Masek
[24]
FRR:
N.
Tajbakhsh
…
Radhika
[36]
…
Wildes
…
Ya
Ping
Haung
…
Performance
Iris patterns references
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
108
5. CONCLUSION
This paper presents a comprehensive review of state-of-the-art techniques in iris recognition. It
comprises of methodologies, algorithms and techniques related to this domain like feature
extraction etc. Finally, the techniques have been evaluated in terms of efficiency. Different
evaluation criteria have been employed to find the variations in the methods proposed so far in
the literature and which method is better and in what capacity. The research also provides a wide
range of other articles and average time along their algorithms, methods, procedures and
approaches performance measure. It also includes the comparison of different researches
outcomes and give a brief description about all. The survey can be a good platform for fresh and
intermediate researchers in the field of iris recognition.
REFERENCES
[1] Bowyer, K. W., & Burge, M. J. (Eds.). (2016). Handbook of iris recognition. Springer London.
[2] Hasan, O., & Tahar, S. (2015). Formal verification methods. In Encyclopedia of Information Science
and Technology, Third Edition (pp. 7162-7170). IGI Global.
[3] Harz, D., & Knottenbelt, W. (2018). Towards safer smart contracts: A survey of languages and
verification methods. arXiv preprint arXiv:1809.09805.
[4] Rajhans, A., & Krogh, B. H. (2012, April). Heterogeneous verification of cyber-physical systems
using behavior relations. In Proceedings of the 15th ACM international conference on Hybrid
Systems: Computation and Control (pp. 35-44).
[5] He, Z., Sun, Z., Tan, T., Qiu, X., Zhong, C., & Dong, W. (2008, June). Boosting ordinal features for
accurate and fast iris recognition. In 2008 IEEE Conference on Computer Vision and Pattern
Recognition (pp. 1-8). IEEE.
[6] He, Z., Tan, T., Sun, Z., & Qiu, X. (2008, October). Robust eyelid, eyelash and shadow localization
for iris recognition. In 2008 15th IEEE International Conference on Image Processing (pp. 265-268).
IEEE.
[7] Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy
concerns. IEEE security & privacy, 99(2), 33-42.
[8] Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE
Transactions on circuits and systems for video technology, 14(1), 4-20.
[9] Thepade, S. D., & Bidwai, P. (2013, August). Iris recognition using fractional coefficients of
transforms, Wavelet Transforms and Hybrid Wavelet Transforms. In Control Computing
Communication & Materials (ICCCCM), 2013 International Conference on (pp. 1-5). IEEE.
[10] Dhage, S. S., Hegde, S. S., Manikantan, K., & Ramachandran, S. (2015). DWT-based feature
extraction and radon transform based contrast enhancement for improved iris recognition. Procedia
Computer Science, 45, 256-265.
[11] Kekre, H. B., Thepade, S. D., Jain, J., & Agrawal, N. (2011, February). Iris recognition using texture
features extracted from walshlet pyramid. In Proceedings of the International Conference &
Workshop on Emerging Trends in Technology (pp. 76-81). ACM.
[12] Suciati, N., Anugrah, A. B., Fatichah, C., Tjandrasa, H., Arifin, A. Z., Purwitasari, D., & Navastara,
D. A. (2016, October). Feature extraction using statistical moments of wavelet transform for iris
recognition. In Information & Communication Technology and Systems (ICTS), 2016 International
Conference on (pp. 193-198). IEEE.
[13] Sharma, V. P., Mishra, S. K., & Dubey, D. (2013, September). Improved Iris Recognition System
Using Wavelet Transform and Ant Colony Optimization. In Computational Intelligence and
Communication Networks (CICN), 2013 5th International Conference on (pp. 243-246). IEEE.
[14] Jadhav, T. H., & Dewan, J. H. (2016). Iris Recognition using Self Mutated Hybrid Wavelet
Transform using Cosine Haar Hartley and Slant Transforms with Partial Energies of Transformed Iris
Images. International Journal of Computer Applications (IJCA), 140, 0975-8887.
[15] Minaee, S., Abdolrashidi, A., & Wang, Y. (2015, August). Iris recognition using scattering transform
and textural features. In Signal Processing and Signal Processing Education Workshop (SP/SPE),
2015 IEEE (pp. 37-42). IEEE.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
109
[16] Raja, K. B., Raghavendra, R., Vemuri, V. K., & Busch, C. (2015). Smartphone based visible iris
recognition using deep sparse filtering. Pattern Recognition Letters, 57, 33-42.
[17] Alvarez-Betancourt, Y., & Garcia-Silvente, M. (2016). A keypoints-based feature extraction method
for iris recognition under variable image quality conditions. Knowledge-Based Systems, 92, 169-182.
[18] Duraipandi, C., Pratap, A., & Uthariaraj, R. (2014, April). A grid based iris biometric watermarking
using wavelet transform. In Recent Trends in Information Technology (ICRTIT), 2014 International
Conference on (pp. 1-6). IEEE.
[19] Tajouri, I., Ghorbel, A., Aydi, W., & Masmoudi, N. (2016, December). An efficient iris texture
analysis based on HAAR wavelet 2D Log Gabor and monogenic filter. In Sciences and Techniques of
Automatic Control and Computer Engineering (STA), 2016 17th International Conference on (pp.
153-157). IEEE.
[20] Rahulkar, A. D., & Holambe, R. S. (2012). Partial iris feature extraction and recognition based on a
new combined directional and rotated directional wavelet filter banks. Neurocomputing, 81, 12-23.
[21] Bhateja, A. K., Sharma, S., Chaudhury, S., & Agrawal, N. (2016). Iris recognition based on sparse
representation and k-nearest subspace with genetic algorithm. Pattern Recognition Letters, 73, 13-18.
[22] Bowyer, K. W., Hollingsworth, K., & Flynn, P. J. (2008). Image understanding for iris biometrics: A
survey. Computer vision and image understanding, 110(2), 281-307.
[23] He, Z., Tan, T., & Sun, Z. (2006, August). Iris localization via pulling and pushing. In Pattern
Recognition, 2006. ICPR 2006. 18th International Conference on (Vol. 4, pp. 366-369). IEEE.
[24] De Mira, J., & Mayer, J. (2003, October). Image feature extraction for application of biometric
identification of iris-a morphological approach. In Computer Graphics and Image Processing, 2003.
SIBGRAPI 2003. XVI Brazilian Symposium on (pp. 391-398). IEEE.
[25] Guo, G., & Jones, M. J. (2008, January). Iris extraction based on intensity gradient and texture
difference. In Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on (pp. 1-6).
IEEE.
[26] Ma, L., Tan, T., Wang, Y., & Zhang, D. (2003). Personal identification based on iris texture
analysis. IEEE transactions on pattern analysis and machine intelligence, 25(12), 1519-1533.
[27] Daugman, J. (2009). How iris recognition works. In The essential guide to image processing (pp.
715-739).
[28] Daugman, J. G. (1993). High confidence visual recognition of persons by a test of statistical
independence. IEEE transactions on pattern analysis and machine intelligence, 15(11), 1148-1161.
[29] de Martin-Roche, D., Sanchez-Avila, C., & Sanchez-Reillo, R. (2001, October). Iris recognition for
biometric identification using dyadic wavelet transform zero-crossing. In Security Technology, 2001
IEEE 35th International Carnahan Conference on (pp. 272-277). IEEE.
[30] Masek, L. (2003). Recognition of human iris patterns for biometric identification.
[31] Liu, X., Bowyer, K. W., & Flynn, P. J. (2005, June). Experimental evaluation of iris recognition.
In Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer
Society Conference on (pp. 158-158). IEEE.
[32] Hollingsworth, K., Baker, S., Ring, S., Bowyer, K. W., & Flynn, P. J. (2009, May). Recent research
results in iris biometrics. In Optics and Photonics in Global Homeland Security V and Biometric
Technology for Human Identification VI (Vol. 7306, p. 73061Y). International Society for Optics and
Photonics.
[33] Wildes, R. P., Asmuth, J. C., Green, G. L., Hsu, S. C., Kolczynski, R. J., Matey, J. R., & McBride, S.
E. (1996). A machine-vision system for iris recognition. Machine vision and Applications, 9(1), 1-8.
[34] Wildes, R. P. (1997). Iris recognition: an emerging biometric technology. Proceedings of the
IEEE, 85(9), 1348-1363.
[35] Wildes, R. P., Asmuth, J. C., Green, G. L., Hsu, S. C., Kolczynski, R. J., Matey, J. R., & McBride, S.
E. (1994, December). A system for automated iris recognition. In Applications of Computer Vision,
1994., Proceedings of the Second IEEE Workshop on (pp. 121-128). IEEE.
[36] Krichen, E., Mellakh, M. A., Garcia-Salicetti, S., & Dorizzi, B. (2004, August). Iris identification
using wavelet packets. In Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th
International Conference on (Vol. 4, pp. 335-338). IEEE.
[37] Boles, W. W., & Boashash, B. (1998). A human identification technique using images of the iris and
wavelet transform. IEEE transactions on signal processing, 46(4), 1185-1188.
[38] Ma, L., Tan, T., Wang, Y., & Zhang, D. (2004). Efficient iris recognition by characterizing key local
variations. IEEE Transactions on Image processing, 13(6), 739-750.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022
110
[39] Ko, J. G., Gil, Y. H., Yoo, J. H., & Chung, K. I. (2010). U.S. Patent No. 7,715,594. Washington, DC:
U.S. Patent and Trademark Office.
[40] Tajbakhsh, N., Misaghian, K., & Bandari, N. M. (2009, September). A region-based iris feature
extraction method based on 2D-wavelet transform. In European Workshop on Biometrics and Identity
Management (pp. 301-307). Springer, Berlin, Heidelberg.
[41] Huang, Y. P., Luo, S. W., & Chen, E. Y. (2002). An efficient iris recognition system. In Machine
Learning and Cybernetics, 2002. Proceedings. 2002 International Conference on (Vol. 1, pp. 450-
454). IEEE.
[42] Radhika, K. R., Sheela, S. V., Venkatesha, M. K., & Sekhar, G. N. (2009, September). Multi-modal
authentication using continuous dynamic programming. In European Workshop on Biometrics and
Identity Management (pp. 228-235). Springer, Berlin, Heidelberg.
[43] Al-Waisy, A. S., Qahwaji, R., Ipson, S., Al-Fahdawi, S., & Nagem, T. A. (2018). A multi-biometric
iris recognition system based on a deep learning approach. Pattern Analysis and Applications, 21(3),
783-802.
[44] Dua, M., Gupta, R., Khari, M., & Crespo, R. G. (2019). Biometric iris recognition using radial basis
function neural network. Soft Computing, 23(22), 11801-11815.
[45] Ahmadi, N., Nilashi, M., Samad, S., Rashid, T. A., & Ahmadi, H. (2019). An intelligent method for
iris recognition using supervised machine learning techniques. Optics & Laser Technology, 120,
105701.
AUTHORS
Tara Othman Qadir is a PhD student in Faculty of Electrical and Electronic Engineering,
Universiti Tun Hussein Onn Malaysia (UTHM), 86400, Parit Raja, Johor, Malaysia. She is
a lecturer at Department of Software and Informatics, College of Engineering, Salahaddin
University, Erbil, Kurduistan, Iraq. She got her MSc in Security and BSc, in Computer
Science in Baghdad and used to be a programmer in Iraqi Commission for Computer
Informatics, Scientific Technology Information Center in Baghdad.
Dr. Nik Shahidah Afifi Md Taujuddin is a senior lecturer at Electronic Engineering
Department, Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn
Malaysia. She obtained her PhD in Image Processing from the Universiti Tun Hussein
Onn Malaysia and her MSc and BSc (Hons) in Electrical and Electronic Engineering from
the Universiti Teknologi Malaysia. She also used to be a visiting researcher at Nagaoka
University of Technology, Japan. Her research area is Image Processing, Computer
Security and Computer Networks.
Sundas Naqeeb Khan is a PhD scholar at Faculty of Computer Science and Information
Technology, Universiti Tun Hussein Onn Malaysia. She obtained her MSCS degree with
distinction from The University of Lahore, Pakistan and her MSc from Fatima Jinnah
Women University, Pakistan. She also used to be a visiting lecturer in The University of
Punjab, Pakistan, and Mirpur University of Science and Technology, Pakistan. Her
research area is multi-disciplinary optimization, e-commerce, image processing, database
management, data mining, text mining, and electrical engineering.

Weitere ähnliche Inhalte

Was ist angesagt?

Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
Hemanth Kumar
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
ijtsrd
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
IJRAT
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
CSCJournals
 

Was ist angesagt? (19)

G0333946
G0333946G0333946
G0333946
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
 
IRJET- Automated Measurement of AVR Feature in Fundus Images using Image ...
IRJET-  	  Automated Measurement of AVR Feature in Fundus Images using Image ...IRJET-  	  Automated Measurement of AVR Feature in Fundus Images using Image ...
IRJET- Automated Measurement of AVR Feature in Fundus Images using Image ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
IRJET - Detection of Skin Cancer using Convolutional Neural Network
IRJET -  	  Detection of Skin Cancer using Convolutional Neural NetworkIRJET -  	  Detection of Skin Cancer using Convolutional Neural Network
IRJET - Detection of Skin Cancer using Convolutional Neural Network
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication System
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
 

Ähnlich wie Feature Extraction Methods for IRIS Recognition System: A Survey

Gated recurrent unit decision model for device argumentation in ambient assis...
Gated recurrent unit decision model for device argumentation in ambient assis...Gated recurrent unit decision model for device argumentation in ambient assis...
Gated recurrent unit decision model for device argumentation in ambient assis...
IJECEIAES
 
Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)
lakshmi.ec
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
IJTET Journal
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
vasim hasina
 

Ähnlich wie Feature Extraction Methods for IRIS Recognition System: A Survey (20)

Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
Health monitoring catalogue based on human activity classification using mac...
Health monitoring catalogue based on human activity  classification using mac...Health monitoring catalogue based on human activity  classification using mac...
Health monitoring catalogue based on human activity classification using mac...
 
Wearable sensor-based human activity recognition with ensemble learning: a co...
Wearable sensor-based human activity recognition with ensemble learning: a co...Wearable sensor-based human activity recognition with ensemble learning: a co...
Wearable sensor-based human activity recognition with ensemble learning: a co...
 
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
 
Gated recurrent unit decision model for device argumentation in ambient assis...
Gated recurrent unit decision model for device argumentation in ambient assis...Gated recurrent unit decision model for device argumentation in ambient assis...
Gated recurrent unit decision model for device argumentation in ambient assis...
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)
 
Detecting outliers and anomalies in data streams
Detecting outliers and anomalies in data streamsDetecting outliers and anomalies in data streams
Detecting outliers and anomalies in data streams
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
 
1879 1885
1879 18851879 1885
1879 1885
 
1879 1885
1879 18851879 1885
1879 1885
 
New hybrid ensemble method for anomaly detection in data science
New hybrid ensemble method for anomaly detection in data science New hybrid ensemble method for anomaly detection in data science
New hybrid ensemble method for anomaly detection in data science
 
Gaussian Multi-Scale Feature Disassociation Screening in Tuberculosise
Gaussian Multi-Scale Feature Disassociation Screening in TuberculosiseGaussian Multi-Scale Feature Disassociation Screening in Tuberculosise
Gaussian Multi-Scale Feature Disassociation Screening in Tuberculosise
 
An Empirical Comparison and Feature Reduction Performance Analysis of Intrusi...
An Empirical Comparison and Feature Reduction Performance Analysis of Intrusi...An Empirical Comparison and Feature Reduction Performance Analysis of Intrusi...
An Empirical Comparison and Feature Reduction Performance Analysis of Intrusi...
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
 
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
 
Analysis of Fall Detection Systems: A Review
Analysis of Fall Detection Systems: A ReviewAnalysis of Fall Detection Systems: A Review
Analysis of Fall Detection Systems: A Review
 

Mehr von AIRCC Publishing Corporation

The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
AIRCC Publishing Corporation
 

Mehr von AIRCC Publishing Corporation (20)

Big Data and Machine Learning in Defence
Big Data and Machine Learning in DefenceBig Data and Machine Learning in Defence
Big Data and Machine Learning in Defence
 
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
 
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Kürzlich hochgeladen (20)

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

Feature Extraction Methods for IRIS Recognition System: A Survey

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 DOI: 10.5121/ijcsit.2022.14107 99 FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY Tara Othman Qadir1 , Nik Shahidah Afifi Md Taujuddin2 , Sundas Naqeeb Khan3 1, 2 Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia (UTHM), 86400, Parit Raja, Johor, Malaysia 3 Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, 86400, Johor, Malaysia ABSTRACT Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed. KEYWORDS Bio-metric traits, iris patterns, feature extraction, SVM, wavelet transform, iris security. 1. INTRODUCTION The most significant security issue today is verification; if researchers can enhance this area, it implies they are reducing security threats. Various secure techniques were used, including security, but today a biometric technology known as iris recognition provides security in terms of verification. Humans live in a safe environment owing to the unique iris pattern, but they also have evil genius brains that can break the protection. As a result, academics are working to develop more secure iris recognition technologies for a more safe society [1]. There are three focused categories of verification, such as starting from password, but this was a very weak way to secure any system or object from hackers. The next method was card or token, but that was also a very low-level security method. Anyone could present a card or token on their own. The last step for security is biometric, and this method provides real security to verification. According to the biometric method, no one can emulate or steal natural human patterns [2 - 3]. Verification of a person based on physiological and behavioral aspects. Face, finger prints, palm and hand geometry, DNA, retinal and iris trends are some of the most commonly observed physical aspects in a person, while signatures, tone of voice, walking style, and keystrokes are
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 100 some of the most frequently observed behavioral aspects. From all of these above patterns, the iris is the only method that is used for security verification [4]. Now a question arises about the word biometric. What is a biometric? It consists of two words. Bios means life and metrikos means measurement, so when researchers use these two words together, it becomes biometric. Therefore, a biometric system capable of identifying a person's traits stands upon a feature vector [7]. Biometric systems consist of four major parts, such as the sensor unit, feature extraction element, matching pattern, and decision response. Consequently, when a biometric system is applied to a human trait, there are four basic conditions that a human must have, like entirety, uniqueness, immovability, and collectability. There is a comparison between some biometric systems according to their factors in terms of High (H), Medium (M) and Low (L) in table 1 [8]. TABLE 1. Comparison between biometric systems with their factors In the modern age of secure applications, there are some traditional issues which have a great impact on biometric systems, as described in Table 2 with their impact factor also in terms of High, Medium, and Low [8]. TABLE 2. Biometric system traditional factors with their impact As a result, iris recognition is a fully systematic biometric system in which issues are resolved using various mathematical methods, and these methods are directly applied to individual eye Biometric traits Entirety Uniqueness Immovability Collectability Face recognition H L M H Walking style M L L H Keystroke dynamics L L L M Odor H H H L Ear M M H M Hand geometry M M M H Finger print M H H M Retina H H M L Palm print M H H M Tone of voice M L L M DNA H H H L Signature L L L H Iris H H H M Biometric traits Performance Acceptability Circumvention Face recognition L H H Walking style L H M Keystroke dynamics L M M Odor L M L Ear M H M Hand geometry M M M Finger print H M M Retina H L L Palm print H M M Tone of voice L H H DNA H L L Signature L H H Iris H L L
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 101 images that are considered distinctive [9 - 11]. There are many possible approaches which can be used for iris recognition, but formally, researchers divided these approaches into three known categories, such as supervised, unsupervised, and semi-supervised approaches. In supervised approaches, trained data is available for testing by using different classifiers, while according to unsupervised learning approaches, using unlabelled data, the working style of this approach is slightly different from the supervised approach. If the data pool has a smaller amount of trained data and a huge amount of untrained data, then researchers recommend the semi-supervised approaches. The first section contains an introduction to the study that is relevant to the research. The second section is about the related research work, and the third portion describes the methodology of the research. The results and discussion section is under the umbrella of the fourth portion of the study, and at the end, the conclusion is included as a final discussion. 2. LITERATURE REVIEW There are some main contributed articles that are considered related works. Due to certain resolving issues, iris recognition systems are considered the main stream for security verification of individuals. Nanik Suciati [12] presents an automatic recognition system for a person's identification based on eye image. Canny Edge Detection (CED) with Hough Transform techniques used for iris detection, followed by features selected by Wavelet Transform at the last Support Vector Machine (SVM) classifier trained for feature representation, provides 93.5% of the results. In [13], researchers worked on optimizing attribute mining according to the wavelet task, while for the similarity method, they used multi-class SVM with an ant colony algorithm and gave better outcomes in terms of performance. Tejas's [14] research concept is based on energy compression, and three different Self Mutated Hybrid Wavelet Transforms (SMHWT) methods are used to generate feature vectors. Characteristics basic purpose of this research is to reduce vector size, with the help of partial energy and the Genuine Acceptance Rate (GAR) metric. Cosine-Haar provides the best GAR accuracy rate. Researchers [15] provide scattering and textural feature sets for the reduction of dimensionality according to the Principle Component Analysis (PCA) method and the minimum distance classifier algorithm, which are also used for matching and get a 99.2% accuracy rate. Kiran [16] gives the idea of vigorous segmentation of detectable iris examples while estimating the radius of the iris with a new deep sparse filtering algorithm for unsupervised learning. The proposed method shows 85% accuracy in correct results on both the existing dataset and the newly generated dataset VSSIRIS. Authors [17] give the idea of attribute mining the name "vigorous keypoints method". In this method, they merge three detectors as regards SIFT features for corresponding score points. The unions take care of the calculation of weights with summation regulations and provide competitive performance as compared to baseline methods. Lydia Elizabeth [18] presents her work in 2014 on a grid-based algorithm for feature extraction that combines Singular Value Detection (SVD) and Discrete Wavelet Transform (DWT). Therefore, this hybrid process offers a powerful, protected, and imperceptible watermarking method with a minimum fault acceptance rate in good behavior. Imen Tajouri [19] improves on Rai's algorithm by combining HAAR wavelet, 2D Log Gabor, and a monogenic filter for feature extraction. This shows the 94.45% empirical results of the proposed method as compared to the Daubechies wavelet and Histogram of Oriented Gradient (HOG). A deep learning approach named convolutional neural network is integrated with a fusion method for iris recognition [43]. The feed forward mechanism proposed along a clustering method k-mean for the iris feature extraction. The approach reduces the calculated time and size of source link as well as improves
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 102 the iris recognition [44]. An intelligent method presented for iris feature extraction and matching activity in which the two hybrid methods used for this activity. Besides this, machine learning algorithm is also include in the research as apart of matching approach which gives more efficient results [45]. To address the low false rejection issue in feature extraction, the proposed Combined Directional Wavelet Filter Bank (CDWFB) [20] algorithm combines the Directional Wavelet Filter Bank (DWFB) and the Rotated Directional Wavelet Filter Bank (RDWFB). This approach extracts the texture of the iris in 12 directions and provides excellent results as compared to more exciting approaches. Researchers proposed [21] a hybrid technique design based on sparse demonstration, including three classifiers for classes’ short list and further work on classes after that work combining these classifiers with genetic algorithms to provide the best results. Table 3 shows the considered articles as reviewed for related work and explains the main contributions of the researchers. TABLE 3. Biography of under consideration articles Author name Article name Search engine Amol D. Rahulkar and Raghunath S. Holambe [14] Partial iris feature extraction and recognition based on a new combined directional and rotated directional wavelet filter banks Elsevier Vijay Prakash Sharma, et al [7] Improved Iris Recognition System using Wavelet Transform and Ant Colony Optimization IEEE Lydia Elizabeth. B, et al [12] A grid based iris biometric watermarking using wavelet transform IEEE Shervin Minaee, et al [9] Iris recognition using scattering transform and textural features IEEE Kiran B. Raja, et al [10] Smartphone based visible iris recognition using deep sparse filtering Elsevier Nanik Suciati, et al [6] Feature Extraction Using Statistical Moments of Wavelet Transform for Iris Recognition IEEE Tejas H. Jadhav and Jaya H. Dewan [8] Iris Recognition using Self Mutated Hybrid Wavelet Transform using Cosine, Haar, Hartley and Slant Transforms with Partial Energies of Transformed Iris Images IJCA Yuniol Alvarez- Betancourt and Miguel Garcia-Silvente [11] A keypoints-based feature extraction method for iris recognition under variable image quality conditions Elsevier Imen Tajouri, et al [13] An Efficient Iris Texture Analysis Based On HAAR Wavelet 2D Log Gabor and Monogenic Filter IEEE Ashok K Bhateja, et al [15] Iris recognition based on sparse representation and k-nearest subspace with genetic algorithm Elsevier
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 103 3. METHODOLOGY Iris recognition is performed by the different biometric systems. Due to certain specifications, the evaluation process of iris recognition systems is divided into four major modules, which are mentioned in Figure 1. The very first step of iris recognition is acquiring the iris images from different types of objects through electronic devices like cameras or sensors etc. Each image has elucidation, location area among corporeal incarcerate structure, and other factors such as occlusion, illumination, and pixel extent play an important role in image eminence [22]. The second step is early stage processing, in which we check the iris liveness and edge, pupil, eyelid, normalization, subtraction of iris etc. Through iris liveness recognition, the security system can check if the focal object is alive because there is an option in which biometric aspects are employed illegitimately. Localization of the iris and pupil is another important preprocessing step that was developed by Zhaofeng [5 - 6]. As a result, the parabolic arcs perform conformant of the eyelids and then plot this extorted iris area according to the normalization. All forces composition [23] comes from the commencement of the summation of points which examine the iris and pupil centre within the radius. Some functions attained iris boundaries through applied form in [24]. The basic law of iris localization is based on incline strength along consistency divergence [25]. Classification is performed through extracted aspects of iris images in the third step, where some aspects have important variants such as 90° axis, range and dimensions of pupil, strength, direction according to ellipsoid shape, and all the features snatched from the iris images which are useful for security verification are organized in this step. The last step used processed iris images along with stored images for the matching process [26]. Due to inter-class and intra-class variables, classification issues can be resolved. Table 4 describes some important methods of iris recognition according to their influence on results in the form of performance, where Equal Error Rate (EER), False Rejection Rate (FRR) and False Acceptance Rate (FAR) are used as performance measures. Image acquisition Matching/Recognition Feature extraction Preprocessing Image adequate through electronic devices or from stored database This early stage required methods/ techniques for cleanliness of noisy data Unique units of images fetched by different methods Decision regarding acceptance or rejection perform in this stage FIGURE 1. Iris recognition system
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 104 TABLE 4. Iris patterns based methods with their performance and average time 4. RESULTS AND DISCUSSION Table 5 shows the performance of the under consideration articles by SVM, PCA, different algorithms and classifiers with their accuracy. Normally, SVM used with the combination of some type of filters and statistical methods such as SVM with wavelet transform and colony Methods Reference Stored patterns in DB Performance Average time taken (seconds) Phase based method Daugman [27,28] 4258 images EER: 0.08% 0.71, 0.68 Martin Roche [29] 300 images FRR: 8% 0.89 Masek [30] 624 images FAR: 0.005% and FRR: 0.238% 0.92 Xiaomei Liu [31] 12000 images (ICE) Recognition rate: 96.61% 0.78 Karen Hollingsworth [32] (i) 1226 images from 24 subjects (ICE) (ii) 1061 videos from 296 eyes (iii) ICE database (iv) 1263 images from 18 subjects (ICE) (i)HD=7.48 (ii)EER=3.88x10-3, FRR =7.61x10-6, FAR=0.001 (iii) HD=0.15 (iv)FRR=0.271, FAR = 0.001, EER=0.068 for large pupil subset Null Texture analysis based method Wildes [33, 34, 35] 60 images EER: 1.76% 0.62, 0.69, 0.78 Emine Krichen [36] 700 images Improvement in FAR: 2% and FRR: 11.5% 0.88 Zero crossing representation method Boles [37] Real images EER: 8.13% 0.69 Intensity variations based method Li Ma [26, 38] 2245 images (CASIA) Correct Recognition Rate: 94.33%. 0.77, Null Jong Gook Ko [39] (i) 820 images from 82 individuals (ii) 756 images (CASIA) Recognition rate: 98.21% 0.66 N. Tajbakhsh [40] 1877 images (UBIRIS) ERR: 0.66%, FRR: 4.10% and FAR: 0.01% 0.71 Independent Component Analysis (ICA) based method Ya Ping Haung [41] Real images Blurred iris: 81.3%, Variant illumination: 93.8% and Noise interference: 62.5% 0.65 Continuous Dynamic Programming based method Radhika [42] (i)1205 images (UBIRIS) (ii)1200 images (CASIAv2) Acceptance Rate: 98% Rejection Rate 97% Null
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 105 gives 93.5% and 98% results respectively. On the other hand, PCA was used with distance classifiers and provided better results, like 99.2% accuracy. The Deep Sparse Algorithm is a filtering algorithm used for the VSSIRIS dataset and has shown 85% accuracy in empirical tests. The CED algorithm is based on grid watermarking. This is used for the global iris recognition dataset and minimizes the fault acceptance and error rate by approximately 77%. The Genetic Algorithm (GA) is associated with three classifiers and helps to reduce the execution time. There are many algorithms used for feature extraction, like enhancement in Rai’s algorithm integrated with filters, while on the basis of keypoints extraction, there are marginal improvements among three detectors such as Harris, Hessian, and Fast Laplace. For the reduction of feature vector size, researchers used the self-mutated hybrid wavelet transform method and adequate 14% improvement in the results. Figure 2 shows the testing results of articles in diverse domains that contain the time and frequency developed through the measurements of performance. Consequently, figure 3 describes the measurement results in terms of performance according to their relevant datasets, and several feature extraction methods and algorithms were applied to these datasets and improved the angle of performance and accuracy. In figure 4, we select the articles that have diversity in methods such as phase-based methods, texture analysis methods, zero crossing representation based methods, intensity variations based methods, independent component analysis based methods, and continuous dynamic programming based methods along with their performance according to the FAR and FRR with recognition and error rate. TABLE 5. Summary of performance under reviewed articles with different applied methods Task Approach Dataset Result Primary objectives Limitations/f uture work Iris recogniti on system [12] SVM with Wavelet transform CASIA eye image 93.5% Detection of iris area with suitable selected features and then representation of these features are the focus objectives of this research. Improvement in results regarding accuracy and execution time Selection of optimize d feature [13] SVM with ant colony CASIA eye image 99% for FAR and 98% for FFR Selection and optimization operations perform with the help of multi class SVM and ant colony process. Reduction of computational time Feature vector size reduction [14] Self mutated hybrid wavelet transforms Palacky Universit y Iris DB 14% improve ment The SMHWT reduce the feature vector size and Cosine-Haar used partial energy with best improvement in GAR function. Color spaces use for better performance Dimensio nality reduction of feature vector [15] Principal component analysis (PCA) with minimum distance classifier Iris DB collected by IIT Delhi 99.2% Reduce dimensions of two proposed feature sets according to PCA and algorithm used for best accuracy. Proposed set of features test on other datasets and biometric detection issues Robust segmenta tion for iris recogniti deep sparse filtering algorithm with VSSIRIS BIPLab DB and VSSIRIS newly created 85% accuracy A deep sparse filtering method used for robust segmentation of observable range iris recognition provides high outcomes on Supervised learning improve the accuracy
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 106 on [16] dataset DB newly created dataset. Feature extractio n [17] Keypoints- based feature extraction method CASIA- IrisV4- Interval, MMU2, and UBIRIS 1DB 68% Keypoints feature extraction combine three detectors like Harris, Hessian and Fast Laplace as a SIFT features for matching score level and calculate the weights for attain better performance. Implementatio n of real time application Feature extractio n [18] Grid based approach used Canny Edge Detection (CED) algorithm Global iris recognitio n dataset 77% Grid based watermarking algorithm used with a hybrid SVD and DWT for minimizing fault acceptance and error rate. Watermarking algorithm accuracy Feature extractio n [19] Rai’s algorithm for attribute extraction CASIA V1.0 and CASIA V3.0 94.45% Enhance the Rai’s algorithm with combination of monogenic filter and 2D Log Gabor filter Gabor Ordinal Measures GOM) test for feature extraction Feature extractio n [20] Combined Directional Wavelet Filter Bank (CDWFB) proposed approach UBIRIS and MMU1 DBs 99% accuracy for UBIRIS and 98% accuracy for MMU1 CDWFB a new approach for feature extraction consists of two different filter banks and provide better performance in terms of accuracy. Improve the performance on real time applications Reductio n of time [21] Three classifiers with genetic algorithm CASIA and IITD DBs 99.43% on CASIA and 99.20% on IITD DBs accuracy Three classifiers used with genetic algorithm for sparse representation for reducing the time. Improve FRR and FAR with accuracy on real time applications
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 107 FIGURE 2. Year wise distribution of articles FIGURE 3. Accuracy performance measured by different datasets FIGURE 4. Iris recognition methods with their approved performance 2010 2012 2014 2016 2018 [10] [11] [14] [15] [12] [13] [6] [7] [9] [8] Elsevier IEEE IJCA Year wise distribution Search engines Frequency count regarding references 0 0.2 0.4 0.6 0.8 1 Performance Datasets Accuracy 0 0.2 0.4 0.6 0.8 1 Boles [31] EER: Emine Krichen … Jong Gook Ko … Martin Roche … Masek [24] FRR: N. Tajbakhsh … Radhika [36] … Wildes … Ya Ping Haung … Performance Iris patterns references
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 108 5. CONCLUSION This paper presents a comprehensive review of state-of-the-art techniques in iris recognition. It comprises of methodologies, algorithms and techniques related to this domain like feature extraction etc. Finally, the techniques have been evaluated in terms of efficiency. Different evaluation criteria have been employed to find the variations in the methods proposed so far in the literature and which method is better and in what capacity. The research also provides a wide range of other articles and average time along their algorithms, methods, procedures and approaches performance measure. It also includes the comparison of different researches outcomes and give a brief description about all. The survey can be a good platform for fresh and intermediate researchers in the field of iris recognition. REFERENCES [1] Bowyer, K. W., & Burge, M. J. (Eds.). (2016). Handbook of iris recognition. Springer London. [2] Hasan, O., & Tahar, S. (2015). Formal verification methods. In Encyclopedia of Information Science and Technology, Third Edition (pp. 7162-7170). IGI Global. [3] Harz, D., & Knottenbelt, W. (2018). Towards safer smart contracts: A survey of languages and verification methods. arXiv preprint arXiv:1809.09805. [4] Rajhans, A., & Krogh, B. H. (2012, April). Heterogeneous verification of cyber-physical systems using behavior relations. In Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control (pp. 35-44). [5] He, Z., Sun, Z., Tan, T., Qiu, X., Zhong, C., & Dong, W. (2008, June). Boosting ordinal features for accurate and fast iris recognition. In 2008 IEEE Conference on Computer Vision and Pattern Recognition (pp. 1-8). IEEE. [6] He, Z., Tan, T., Sun, Z., & Qiu, X. (2008, October). Robust eyelid, eyelash and shadow localization for iris recognition. In 2008 15th IEEE International Conference on Image Processing (pp. 265-268). IEEE. [7] Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE security & privacy, 99(2), 33-42. [8] Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on circuits and systems for video technology, 14(1), 4-20. [9] Thepade, S. D., & Bidwai, P. (2013, August). Iris recognition using fractional coefficients of transforms, Wavelet Transforms and Hybrid Wavelet Transforms. In Control Computing Communication & Materials (ICCCCM), 2013 International Conference on (pp. 1-5). IEEE. [10] Dhage, S. S., Hegde, S. S., Manikantan, K., & Ramachandran, S. (2015). DWT-based feature extraction and radon transform based contrast enhancement for improved iris recognition. Procedia Computer Science, 45, 256-265. [11] Kekre, H. B., Thepade, S. D., Jain, J., & Agrawal, N. (2011, February). Iris recognition using texture features extracted from walshlet pyramid. In Proceedings of the International Conference & Workshop on Emerging Trends in Technology (pp. 76-81). ACM. [12] Suciati, N., Anugrah, A. B., Fatichah, C., Tjandrasa, H., Arifin, A. Z., Purwitasari, D., & Navastara, D. A. (2016, October). Feature extraction using statistical moments of wavelet transform for iris recognition. In Information & Communication Technology and Systems (ICTS), 2016 International Conference on (pp. 193-198). IEEE. [13] Sharma, V. P., Mishra, S. K., & Dubey, D. (2013, September). Improved Iris Recognition System Using Wavelet Transform and Ant Colony Optimization. In Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on (pp. 243-246). IEEE. [14] Jadhav, T. H., & Dewan, J. H. (2016). Iris Recognition using Self Mutated Hybrid Wavelet Transform using Cosine Haar Hartley and Slant Transforms with Partial Energies of Transformed Iris Images. International Journal of Computer Applications (IJCA), 140, 0975-8887. [15] Minaee, S., Abdolrashidi, A., & Wang, Y. (2015, August). Iris recognition using scattering transform and textural features. In Signal Processing and Signal Processing Education Workshop (SP/SPE), 2015 IEEE (pp. 37-42). IEEE.
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 109 [16] Raja, K. B., Raghavendra, R., Vemuri, V. K., & Busch, C. (2015). Smartphone based visible iris recognition using deep sparse filtering. Pattern Recognition Letters, 57, 33-42. [17] Alvarez-Betancourt, Y., & Garcia-Silvente, M. (2016). A keypoints-based feature extraction method for iris recognition under variable image quality conditions. Knowledge-Based Systems, 92, 169-182. [18] Duraipandi, C., Pratap, A., & Uthariaraj, R. (2014, April). A grid based iris biometric watermarking using wavelet transform. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE. [19] Tajouri, I., Ghorbel, A., Aydi, W., & Masmoudi, N. (2016, December). An efficient iris texture analysis based on HAAR wavelet 2D Log Gabor and monogenic filter. In Sciences and Techniques of Automatic Control and Computer Engineering (STA), 2016 17th International Conference on (pp. 153-157). IEEE. [20] Rahulkar, A. D., & Holambe, R. S. (2012). Partial iris feature extraction and recognition based on a new combined directional and rotated directional wavelet filter banks. Neurocomputing, 81, 12-23. [21] Bhateja, A. K., Sharma, S., Chaudhury, S., & Agrawal, N. (2016). Iris recognition based on sparse representation and k-nearest subspace with genetic algorithm. Pattern Recognition Letters, 73, 13-18. [22] Bowyer, K. W., Hollingsworth, K., & Flynn, P. J. (2008). Image understanding for iris biometrics: A survey. Computer vision and image understanding, 110(2), 281-307. [23] He, Z., Tan, T., & Sun, Z. (2006, August). Iris localization via pulling and pushing. In Pattern Recognition, 2006. ICPR 2006. 18th International Conference on (Vol. 4, pp. 366-369). IEEE. [24] De Mira, J., & Mayer, J. (2003, October). Image feature extraction for application of biometric identification of iris-a morphological approach. In Computer Graphics and Image Processing, 2003. SIBGRAPI 2003. XVI Brazilian Symposium on (pp. 391-398). IEEE. [25] Guo, G., & Jones, M. J. (2008, January). Iris extraction based on intensity gradient and texture difference. In Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on (pp. 1-6). IEEE. [26] Ma, L., Tan, T., Wang, Y., & Zhang, D. (2003). Personal identification based on iris texture analysis. IEEE transactions on pattern analysis and machine intelligence, 25(12), 1519-1533. [27] Daugman, J. (2009). How iris recognition works. In The essential guide to image processing (pp. 715-739). [28] Daugman, J. G. (1993). High confidence visual recognition of persons by a test of statistical independence. IEEE transactions on pattern analysis and machine intelligence, 15(11), 1148-1161. [29] de Martin-Roche, D., Sanchez-Avila, C., & Sanchez-Reillo, R. (2001, October). Iris recognition for biometric identification using dyadic wavelet transform zero-crossing. In Security Technology, 2001 IEEE 35th International Carnahan Conference on (pp. 272-277). IEEE. [30] Masek, L. (2003). Recognition of human iris patterns for biometric identification. [31] Liu, X., Bowyer, K. W., & Flynn, P. J. (2005, June). Experimental evaluation of iris recognition. In Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on (pp. 158-158). IEEE. [32] Hollingsworth, K., Baker, S., Ring, S., Bowyer, K. W., & Flynn, P. J. (2009, May). Recent research results in iris biometrics. In Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI (Vol. 7306, p. 73061Y). International Society for Optics and Photonics. [33] Wildes, R. P., Asmuth, J. C., Green, G. L., Hsu, S. C., Kolczynski, R. J., Matey, J. R., & McBride, S. E. (1996). A machine-vision system for iris recognition. Machine vision and Applications, 9(1), 1-8. [34] Wildes, R. P. (1997). Iris recognition: an emerging biometric technology. Proceedings of the IEEE, 85(9), 1348-1363. [35] Wildes, R. P., Asmuth, J. C., Green, G. L., Hsu, S. C., Kolczynski, R. J., Matey, J. R., & McBride, S. E. (1994, December). A system for automated iris recognition. In Applications of Computer Vision, 1994., Proceedings of the Second IEEE Workshop on (pp. 121-128). IEEE. [36] Krichen, E., Mellakh, M. A., Garcia-Salicetti, S., & Dorizzi, B. (2004, August). Iris identification using wavelet packets. In Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on (Vol. 4, pp. 335-338). IEEE. [37] Boles, W. W., & Boashash, B. (1998). A human identification technique using images of the iris and wavelet transform. IEEE transactions on signal processing, 46(4), 1185-1188. [38] Ma, L., Tan, T., Wang, Y., & Zhang, D. (2004). Efficient iris recognition by characterizing key local variations. IEEE Transactions on Image processing, 13(6), 739-750.
  • 12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 1, February 2022 110 [39] Ko, J. G., Gil, Y. H., Yoo, J. H., & Chung, K. I. (2010). U.S. Patent No. 7,715,594. Washington, DC: U.S. Patent and Trademark Office. [40] Tajbakhsh, N., Misaghian, K., & Bandari, N. M. (2009, September). A region-based iris feature extraction method based on 2D-wavelet transform. In European Workshop on Biometrics and Identity Management (pp. 301-307). Springer, Berlin, Heidelberg. [41] Huang, Y. P., Luo, S. W., & Chen, E. Y. (2002). An efficient iris recognition system. In Machine Learning and Cybernetics, 2002. Proceedings. 2002 International Conference on (Vol. 1, pp. 450- 454). IEEE. [42] Radhika, K. R., Sheela, S. V., Venkatesha, M. K., & Sekhar, G. N. (2009, September). Multi-modal authentication using continuous dynamic programming. In European Workshop on Biometrics and Identity Management (pp. 228-235). Springer, Berlin, Heidelberg. [43] Al-Waisy, A. S., Qahwaji, R., Ipson, S., Al-Fahdawi, S., & Nagem, T. A. (2018). A multi-biometric iris recognition system based on a deep learning approach. Pattern Analysis and Applications, 21(3), 783-802. [44] Dua, M., Gupta, R., Khari, M., & Crespo, R. G. (2019). Biometric iris recognition using radial basis function neural network. Soft Computing, 23(22), 11801-11815. [45] Ahmadi, N., Nilashi, M., Samad, S., Rashid, T. A., & Ahmadi, H. (2019). An intelligent method for iris recognition using supervised machine learning techniques. Optics & Laser Technology, 120, 105701. AUTHORS Tara Othman Qadir is a PhD student in Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia (UTHM), 86400, Parit Raja, Johor, Malaysia. She is a lecturer at Department of Software and Informatics, College of Engineering, Salahaddin University, Erbil, Kurduistan, Iraq. She got her MSc in Security and BSc, in Computer Science in Baghdad and used to be a programmer in Iraqi Commission for Computer Informatics, Scientific Technology Information Center in Baghdad. Dr. Nik Shahidah Afifi Md Taujuddin is a senior lecturer at Electronic Engineering Department, Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia. She obtained her PhD in Image Processing from the Universiti Tun Hussein Onn Malaysia and her MSc and BSc (Hons) in Electrical and Electronic Engineering from the Universiti Teknologi Malaysia. She also used to be a visiting researcher at Nagaoka University of Technology, Japan. Her research area is Image Processing, Computer Security and Computer Networks. Sundas Naqeeb Khan is a PhD scholar at Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia. She obtained her MSCS degree with distinction from The University of Lahore, Pakistan and her MSc from Fatima Jinnah Women University, Pakistan. She also used to be a visiting lecturer in The University of Punjab, Pakistan, and Mirpur University of Science and Technology, Pakistan. Her research area is multi-disciplinary optimization, e-commerce, image processing, database management, data mining, text mining, and electrical engineering.