SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 6 (Mar. - Apr. 2013), PP 64-68
www.iosrjournals.org

 A Study of various soft computing techniques for iris recognition
                    Gaganpreet kaur1, Dilpreet kaur2, Dr. Dheerendra Singh3
                         1
                          A.P., Deptt. Of C.S.E., SGGSWU, Fatehgarh Sahib, Punjab, India.
                2
                    Research Scholar, Deptt. Of C.S.E., SGGSWU, Fatehgarh Sahib, Punjab, India.
                                 3
                                   Prof & Head, SUSCET, Tangori, Punjab, India.

Abstract: Iris Recognition is considered as one of the best biometric method used for human identification and
verification, because of its unique feature that differ from one person to another, and its importance in the
security field. This paper introduced the two soft computing techniques of neural network which are used for
pattern matching in iris recognition. This paper represents iris recognition based Competitive neural network
Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM) with essential
redefinition of pattern similarity and also introduces the mixture model ARAM for the measurements of patterns.
Keywords - ARAM, Biometric, Iris Recognition, LVQ, and Mixture model ARAM, Neural Network.

                                               I.    INTRODUCTION
 Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high
resolution images of the irises of an individual's eyes. Not to be confused with another, less prevalent, ocular-
based technology, retina scanning, and iris recognition uses camera technology, with subtle infrared illumination
reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of
the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield
unambiguous positive identification of an individual. Iris recognition efficacy is rarely impeded by glasses or
contact lenses. Iris technology has the smallest outlier group of all biometric technologies. The only biometric
authentication technology designed for use in a one-to-many search environment, a key advantage of iris
recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.
Plemmons proposed different optimization methods for designing the optics and the image processing
algorithms, and provide laboratory and simulation results from applying these systems and results on restoring
the intermediate phase encoded images using both direct Wiener filter and iterative conjugate gradient method
[1].
     Christel-Loïc Tisse et al examined a new iris recognition system that implements (i) gradient decomposed
Hough transform / integral-differential operators combination for iris localization and (ii) the ―analytic image‖
concept to extract pertinent information from iris texture [2]. Li Ma et al proposed a new approach for personal
identification based on iris recognition. The body of their papers details the steps of iris recognition, including
image preprocessing, feature extraction and classifier design. The proposed algorithm uses a bank of Gabor
filters to capture both local and global iris characteristics to form a fixed length feature vector. Iris matching is
based on the weighted Euclidean distance between the two corresponding iris vectors and is therefore very fast
[3]. Narayanswamy et al employs an especially designed Wave front Coded lens customized for iris recognition.
They presented experimental results that show the benefits of this technology for biometric identification [4].
Zhuoshi Wei et al presented a framework to synthesize large realistic iris databases, providing an alternative to
iris database collection. Firstly, iris patch is used as a basic element to characterize visual primitive of iris
texture, and patch-based sampling is applied to create an iris prototype [5]. Czajka et al presents an original,
independent of typical cryptographic techniques, method of biometric replay attack prevention for iris
biometrics. The proposed solution takes advantage of appropriate enhancements of iris templates and relies on
appropriate data alteration within the image space resulting in significant changes of the resulting code in the iris
feature space [6].

                                         II.  IRIS PREPROCESSING
Iris preprocessing consider following stages:
2.1Localization




                                             www.iosrjournals.org                                          64 | Page
A Study of various soft computing techniques for iris recognition




                                            Fig1. Localization of iris

The first step in the localization process is pupil segmentation based on analysis of the histogram. It is assumed,
like in [7] that a pupil is the darkest area in the image and standard deviation of luminance in this area is
relatively low. It has to be emphasized that unwanted elements may appear in the threshold image. Nevertheless
pupil can be segmented by relatively simple method, based on image thresholding using the histogram analysis.

2.2 Segmentation
Segmentation is one of the important steps in preprocessing since it separates the input iris image into several
components making it feasible to extract features easily. The Segmentation process is defined as separating the
input iris image into several components, so it is very important step in preprocessing because it describes and
recognize the input image. One of the best ways to separate the pupil from the whole eye is using circular
Hough transformation in order to find the circle of the pupil [7]. The pupil is the largest black area in the
intensity image; its edge can be easily detected from the binary image by using a suitable threshold of the
intensity image.




                                      Fig2. Example of Edge Detection [7]

2.3 Normalization
The purpose of iris normalization is to get the same region of iris to do matching regardless pupil dilation and
the different iris size caused by the different distance between the eye and video zoom factor. Moreover, the
shift, accounting for the offsets of the eye in the plane parallel to the camera’s sensor, should also be eliminated
[8]. Wildes [9][10] used an image-registration technique to eliminate dilation, scaling and rotation. This
approach wraps a new iris image into alignment with a normal image according to a mapping function so that
the difference between the two iris images is minimal.

2.4 Feature Vector Extraction and Match
Feature selection and extraction is to find out the important features to do matching. The visible features of an
iris are ciliary processes, contraction furrows, crypts, rings, corona, and freckle [11] and so on. How to set a
model to extract the feature of different irises and match them is especially important for it determines the
results of the whole system directly [12] [13].

                                            1. NEURAL NETWORK
The term ―neural network‖ [15] was traditionally used to refer to a network or circuit of biological neurons. The
modern usage of the term often refers to artificial neural networks, which are composed of artificial neurons or
nodes. Thus the term has two distinct usages:

i) ―Biological neural networks‖ are made up of real biological neurons that are connected or functionally related
in the peripheral nervous system or the central nervous system. In the field of neuroscience, they are often
identified as groups of neurons that perform a specific physiological function in laboratory analysis.
ii) ―Artificial neural networks‖ are composed of interconnecting artificial neurons (programming constructs that
mimic the properties of biological neurons). Artificial neural networks may either be used to gain an

                                             www.iosrjournals.org                                         65 | Page
A Study of various soft computing techniques for iris recognition

understanding of biological neural networks, or for solving artificial intelligence problems without necessarily
creating a model of a real biological system. The real, biological nervous system is highly complex: artificial
neural network algorithms attempt to abstract this complexity and focus on what may hypothetically matter most
from an information processing point of view. Good performance or performance mimicking animal or human
error patterns, can then be used as one source of evidence towards supporting the hypothesis that the abstraction
really captured something important from the point of view of information processing in the brain. Another
incentive for these abstractions is to reduce the amount of computation required to simulate artificial neural
networks, so as to allow one to experiment with larger networks and train them on larger data sets.
     An artificial neural network usually called neural network [15], is a mathematical model or computational
model that is inspired by the structure and functional aspects of biological neural networks. A neural network
consists of an interconnected group of artificial neurons, and it processes information using a connectionist
approach to computation. In most cases an ANN is an adaptive system that changes its structure based on
external or internal information that flows through the network during the learning phase. Modern neural
networks are non-linear statistical data modeling tools. They are usually used to model complex relationships
between inputs and outputs or to find patterns in data.

3.1 Soft computing techniques of neural network
Following two approaches of the neural network are used for enhancing the security in iris recognition system:

3.1.1 Learning Vector Quantization (LVQ)
 Learning Vector Quantization is a prototype-based supervised classification algorithm. LVQ can be understood
as a special case of an artificial neural network. LVQ is one of the competitive neural networks. LVQ is a
pattern classification method; each output node is represented as a class. The weight vector of an output node is
called a reference or codebook vector (CV). The LVQ attempts to adjust the weights to approximate a
theoretical bayes classifier. The result obtained depends on the majority voting among several weak classifiers
Input vectors are classified by assigning them as a class label of the weight vector closest to the input vector[14]
[15]. The result obtained depends on the majority voting among several weak classifiers. The LVQ consisting of
two layers; the first layer is the input layer which contains the input neurons, while the second layer is the output
layer that contains output neurons.
     The final step is the pattern matching of the Iris image with the stored templates from the database. The
Following figure shows Pattern matching process. These patterns are used to create templates forIris
recognition. It will work fine for less number of users, but it is not recommended for large number of users since
it requires large storage memory.




                                         Fig3. Pattern matching process

3.1.2 Template matching result
The Iris recognition steps, feature extraction, Pattern matching are performed using NI Vision Assistant and NI
Lab VIEW. The NI vision script for iris recognition using template matching.




                                       Fig4. Result of template matching

3.1.3 Adaptive Resonance Associative Map (ARAM)
The Adaptive Resonance Associative Map (ARAM) [16] belongs to the family of Adaptive Resonance Theory
(ART) self-organizing neural networks. Like another member of the family, ART-MAP ARAM is capable of
incrementally learning recognition categories and multidimensional maps of patterns. Compared to ART-MAP,
ARAM contains as implified pattern matching and learning process. An ARAM network has two individual
                                             www.iosrjournals.org                                          66 | Page
A Study of various soft computing techniques for iris recognition

short term memory (STM) and a shared long term memory (LTM) l that encodes the associated knowledge from
the two feature fields. The learning of the network is guided by an orienting subsystem with two logical gates,
defined with two vigilance parameter. The logical gates conditionally switch and reset the network state
according to predefined rules, and hence affect knowledge encoding in the LTM. ARAM acquires its domain
knowledge through an online, hard competitive learning process.
     ARAM uses two functions (choice and match) to evaluate the similarity between the input and recognition
category. These two functions may or may not have same definition, optionally providing a different view to
conform the degree of pattern matching. Secondly, the use of vigilance thresholds ensures only significantly
similar patterns may be grouped together. On the other hand, the vigilance parameters primarily affect the
clustering process. Lower vigilance thresholds generally lead to fewer recognition categories, and hence rougher
clustering result. Lastly while most importantly, ARAM provides an effective infrastructure for learning of
associative knowledge from two different domains. Depending on the input signals, ARAM may be applied to
different learning tasks. Examples include text and document classification [17], clustering and personalized
knowledge management and association rule mining [18] [19].

3.1.4 Mixture Model ARAM for GO Annotation and Gene Expression Data
whereas Mixture Model ARAM is straightforward: for each gene product. In ARAM’s pattern field A to encode
its expression profile and B to encode its GO annotation. Following common practices, the expression profile is
presented in vector format, and the GO annotation is presented as a set of descriptive GO terms, denoted as: x =
(xa|xb) = (e−−x→p| {go terms}). The LTM recognition category encodes an associative pattern w = (wa|wb),
where wa and wb respectively are the expression pattern and GO annotation term(s) representative to the inputs
that form the corresponding category [20].

3.1.5 Pattern Field for Gene Expression
Appropriate normalization of gene expression data prevents category proliferation without compromising their
biological representation. Variations of normalization techniques are adopted in different conditions [21][22].
Thus the Mixture Model ARAM network does not contain a fixed normalization link to alter the original input
gene expression. Input expressions are assumed and they are properly pre-normalized, and define the link
between Fa0 and Fb1 as a simple feed forward copy operation: xa = Ia. The measurement of the similarity
between two GO terms as the information content of their minimal subsumer. A so-called minimal subsumer of
two terms ti and t j, denoted as ∇ (ti, t j), is the subsumer that has the minimal likelihood. To formalize:

                                            Sim (ti, t j) ≡ℑ (∇ (ti, t j))
                                     = −log (min {p (t) |t ∈ S (ti, t j)})          (1)

Where S (ti, t j) is the subsumer set of term ti and t j, essentially being their common ancestor terms.

   Similarity between GO Annotations of two Genes while equation 1 measures the semantic similarity between
two GO terms, it is common that a gene product may be annotated with multiple GO terms, which will lead to
multiple term-to-term similarities between two genes. To formalize, suppose the multiple GO annotations of two
genes products gi and gj are denoted as: Ai = {ti1, ti2. . . tiP} and Aj = {t j1, t j2. . . t jQ} respectively, their
similarity is then calculated as:

                          Sim (Ai, Aj) = max {sim (tix, tjy) |x ∈ [1, P], y ∈ [1, Q]} (2)


   By applying the maximal term-to-term similarity as the similarity between to GO annotations, we essentially
identify their subsume that has the maximal information content, i.e. the maximal common factor.

                                            III.    CONCLUSION
This paper concluded that there are two important soft computing approaches of neural network which are used
for pattern matching in iris recognition to enhance the performance. Learning Vector Quantization is a
prototype-based supervised classification algorithm in which each output node is represented as a class.
Codebook vector (CV) is used for output node. It uses bayes classifier for adjusting the weight. The result
obtained depends on the majority voting among several weak classifiers. The patterns matching of the Iris image
is to be done with the stored templates from the database. Templates are created with these patterns but it will
work fine for less number of users; it is not recommended for large number of users since it requires large
storage memory whereas the Adaptive Resonance Associative Map (ARAM) belongs to the family of Adaptive
Resonance Theory (ART) self-organizing neural networks. It is capable of incrementally learning recognition
                                             www.iosrjournals.org                                          67 | Page
A Study of various soft computing techniques for iris recognition

categories and multidimensional maps of patterns. It contains a simplified pattern matching and learning. To
improve the pattern matching process mixture model ARAM is used which used gene ontology (GO) and gene
expression for checking the similarities and measurements of various pattern. This approach reduced the noise
from the whole data and provides the expression between various patterns. As compared Learning Vector
Quantization, the Adaptive Resonance Associative map is more recommended for large numbers of users.

                                                        REFERENCES
[1]    R. Plemmonsa, M. Horvatha, E. Leonhardta, P. Paucaa, S. Prasad, ―Computational Imaging Systems for Iris Recognition‖,
       Processing of Spiel 2004.
[2]    C. L. Tisse, L. Martin, L. Torres, M. Robert, "Person identification technique using human iris recognition", ST Journal of System
       Research Current Issue 2003.
[3]    L. Ma, U. Wang, T. Tan, "Iris Recognition Based on Multichannel Gabor Filtering", The 5th Asian Conference on Computer
       Vision, pp.23—25, Melbourne, Australia, January 2002.
[4]    R. Narayanswamy, P. E. X. Silveir, "Extended Depth-of-Field Iris Recognition System for a Workstation Environment",
       Proceedings of the Spied Biometric Technology for Human Identification II,Vol. 5779, pp. 41-50, Orlando, FL, 2005.
[5]    Z. Wei, T. Tan and Z. Sun, "Synthesis of Large Realistic Iris Databases Using Patch-based Sampling‖, IEEE, 2008.
[6]    A. Czajka, A. Pacut, "Replay Attack Prevention for Iris Biometrics", IEEE, ICCST 2008.
[7]    C. Teo and H. Ewe, "An Efficient One-Dimensional Fractal Analysis for Iris Recognition", Proceedings of the 13-
       thWSCGInternational Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 157-160,
       Plzen-Bory, Czech Republic, January 31 – February 4, 2005.
[8]    Daugman J G., ―High confidence visual recognition of persons by a test of statistical independence‖, IEEE Trans. Pattern Anal.
       Machine Intel. 1993, vol.15, no.11, pp.1148-1161.
[9]    Wildes R P., ―Iris Recognition: An Emerging Biometric Technology‖, In Proceeding of the IEEE, Piscataway, NJ, vol. 85, pp.1348-
       1363, 1997.
[10]   Daugman J G., ―Recognition persons by their pattern‖, Information Security Technical report, vol.13, no.1, pp. 33-39, 1998.
[11]   Daugman J G., ―High confidence visual recognition of persons by a test of statistical independence‖, IEEE Trans. Pattern Anal.
       Machine Intel, 1993, vol.15, no.11, pp. 1148-1161.
[12]   Daugman J G. ―High Confidence Recognition of Person by Rapid Video Analysis of Iris Texture‖, European Convection on
       Security Detection and Brighton, Brighton, UK, pp. 244-251, 1995.
[13]   Daugman J G. ―Recognition persons by their pattern‖, Information Security Technical report, vol.13, no.1, pp.33-39, 1998.
[14]   CBSR, 2005.Center for biometrics and security research. http://www.cbsr.ia.ac.cn/english/Databases.asp
[15]   Zhou Zhiping, Hui Maomao, Sun Ziwen, ―An iris recognition based on 2DWPCA and neural network‖, pp.9781-4244-2723,
       9/09/$25.00© 2009, IEEE.
[16]   Tan A.H., ―Adaptive Resonance Associative Map for Neural Networks‖, Vol.8, No.3, pp. 437–446, 1995.
[17]   Tan A.H., ―Predictive self-organizing networks for text categorization‖, Proceedings of the Pacific-Asia Conference on Knowledge
       Discovery and Data Mining (PAKDD), pp. 66–77, 2001.
[18]   Tan A.H., Ong H.L., Pan H., Ng J., Li Q.X., ―Towards personalized web intelligence‖, Knowledge and Information Systems, Vol.6,
       No.5, pp.595–616, 2004.
[19]   Tan A.H., Pan H., ―Predictive neural networks for gene expression data analysis‖, Neural Networks, Vol.18, No.3, pp. 297–306,
       2005.
[20]   Carpenter G., Gross berg S., Rosen D., ―ART 2-A: An adaptive resonance algorithm for rapid category learning and recognition‖,
       Neural Networks, Vol.4, pp. 493–504, 1991.
[21]   The Gene Ontology Consortium, ―Gene ontology: tool for the unification of biology‖, Nature Genetics, Vol.25, No.1, pp. 25–29,
       2000.
[22]   Ms. Gaganpreet Kaur, Mr. Akshay Girdhar and Ms. Manvjeet Kaur, " Article: Enhanced Iris Recognition System - an Integrated
       Approach to Person Identification", International Journal of Computer Applications, vol.8, no.1, pp.1–5, Published by Foundation
       of Computer Science, October 2010.




                                                    www.iosrjournals.org                                                     68 | Page

Weitere ähnliche Inhalte

Was ist angesagt?

Microscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural networkMicroscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural networkjournalBEEI
 
Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...IJECEIAES
 
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONTRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONijaia
 
A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONsipij
 
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...IRJET Journal
 
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Techniqueijsc
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means Clustering
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means ClusteringAn Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means Clustering
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means ClusteringIRJET Journal
 
Secure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognitionijsrd.com
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKijaia
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationIOSR Journals
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security systemeSAT Publishing House
 

Was ist angesagt? (18)

Microscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural networkMicroscopy images segmentation algorithm based on shearlet neural network
Microscopy images segmentation algorithm based on shearlet neural network
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
109 115
109 115109 115
109 115
 
Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...
 
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONTRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
 
A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
 
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
 
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means Clustering
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means ClusteringAn Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means Clustering
An Ameliorate Technique for Brain Lumps Detection Using Fuzzy C-Means Clustering
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
Secure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognition
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person Authentication
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 

Andere mochten auch

Development and Validation of prediction for estimating resting energy expend...
Development and Validation of prediction for estimating resting energy expend...Development and Validation of prediction for estimating resting energy expend...
Development and Validation of prediction for estimating resting energy expend...IOSR Journals
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...IOSR Journals
 
Wireless Speed Control of an Induction Motor Using Pwm Technique with Gsm
Wireless Speed Control of an Induction Motor Using Pwm Technique with GsmWireless Speed Control of an Induction Motor Using Pwm Technique with Gsm
Wireless Speed Control of an Induction Motor Using Pwm Technique with GsmIOSR Journals
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityIOSR Journals
 
Hybrid Algorithm for Clustering Mixed Data Sets
Hybrid Algorithm for Clustering Mixed Data SetsHybrid Algorithm for Clustering Mixed Data Sets
Hybrid Algorithm for Clustering Mixed Data SetsIOSR Journals
 
Leadership and the Climate Change Challenge (Work in Progress)
Leadership and the Climate Change Challenge (Work in Progress)Leadership and the Climate Change Challenge (Work in Progress)
Leadership and the Climate Change Challenge (Work in Progress)Duncan Noble
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Heart Attack Prediction System Using Fuzzy C Means Classifier
Heart Attack Prediction System Using Fuzzy C Means ClassifierHeart Attack Prediction System Using Fuzzy C Means Classifier
Heart Attack Prediction System Using Fuzzy C Means ClassifierIOSR Journals
 
Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...IOSR Journals
 
Présentation de la formation à l'édition en France
Présentation de la formation à l'édition en FrancePrésentation de la formation à l'édition en France
Présentation de la formation à l'édition en FranceAsfored
 
Transport go green
Transport   go greenTransport   go green
Transport go greenAralc Eiob
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...IOSR Journals
 
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...IOSR Journals
 
Scalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management SystemsScalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management SystemsIOSR Journals
 
Dynamic AI-Geo Health Application based on BIGIS-DSS Approach
Dynamic AI-Geo Health Application based on BIGIS-DSS ApproachDynamic AI-Geo Health Application based on BIGIS-DSS Approach
Dynamic AI-Geo Health Application based on BIGIS-DSS ApproachIOSR Journals
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingIOSR Journals
 

Andere mochten auch (20)

G01114650
G01114650G01114650
G01114650
 
Development and Validation of prediction for estimating resting energy expend...
Development and Validation of prediction for estimating resting energy expend...Development and Validation of prediction for estimating resting energy expend...
Development and Validation of prediction for estimating resting energy expend...
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
 
Wireless Speed Control of an Induction Motor Using Pwm Technique with Gsm
Wireless Speed Control of an Induction Motor Using Pwm Technique with GsmWireless Speed Control of an Induction Motor Using Pwm Technique with Gsm
Wireless Speed Control of an Induction Motor Using Pwm Technique with Gsm
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
 
Hybrid Algorithm for Clustering Mixed Data Sets
Hybrid Algorithm for Clustering Mixed Data SetsHybrid Algorithm for Clustering Mixed Data Sets
Hybrid Algorithm for Clustering Mixed Data Sets
 
Leadership and the Climate Change Challenge (Work in Progress)
Leadership and the Climate Change Challenge (Work in Progress)Leadership and the Climate Change Challenge (Work in Progress)
Leadership and the Climate Change Challenge (Work in Progress)
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Heart Attack Prediction System Using Fuzzy C Means Classifier
Heart Attack Prediction System Using Fuzzy C Means ClassifierHeart Attack Prediction System Using Fuzzy C Means Classifier
Heart Attack Prediction System Using Fuzzy C Means Classifier
 
Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...
 
Présentation de la formation à l'édition en France
Présentation de la formation à l'édition en FrancePrésentation de la formation à l'édition en France
Présentation de la formation à l'édition en France
 
Transport go green
Transport   go greenTransport   go green
Transport go green
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
 
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...
 
Scalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management SystemsScalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management Systems
 
Dynamic AI-Geo Health Application based on BIGIS-DSS Approach
Dynamic AI-Geo Health Application based on BIGIS-DSS ApproachDynamic AI-Geo Health Application based on BIGIS-DSS Approach
Dynamic AI-Geo Health Application based on BIGIS-DSS Approach
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
 

Ähnlich wie K0966468

A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Transfer Learning with Convolutional Neural Networks for IRIS Recognition
Transfer Learning with Convolutional Neural Networks for IRIS RecognitionTransfer Learning with Convolutional Neural Networks for IRIS Recognition
Transfer Learning with Convolutional Neural Networks for IRIS Recognitiongerogepatton
 
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION gerogepatton
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique ijsc
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsEditor IJMTER
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIJECEIAES
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...aciijournal
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)aciijournal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsijcseit
 

Ähnlich wie K0966468 (20)

A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Transfer Learning with Convolutional Neural Networks for IRIS Recognition
Transfer Learning with Convolutional Neural Networks for IRIS RecognitionTransfer Learning with Convolutional Neural Networks for IRIS Recognition
Transfer Learning with Convolutional Neural Networks for IRIS Recognition
 
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition Systems
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris RecognitionComparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filter
 
23-02-03[1]
23-02-03[1]23-02-03[1]
23-02-03[1]
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditions
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Kürzlich hochgeladen (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

K0966468

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 6 (Mar. - Apr. 2013), PP 64-68 www.iosrjournals.org A Study of various soft computing techniques for iris recognition Gaganpreet kaur1, Dilpreet kaur2, Dr. Dheerendra Singh3 1 A.P., Deptt. Of C.S.E., SGGSWU, Fatehgarh Sahib, Punjab, India. 2 Research Scholar, Deptt. Of C.S.E., SGGSWU, Fatehgarh Sahib, Punjab, India. 3 Prof & Head, SUSCET, Tangori, Punjab, India. Abstract: Iris Recognition is considered as one of the best biometric method used for human identification and verification, because of its unique feature that differ from one person to another, and its importance in the security field. This paper introduced the two soft computing techniques of neural network which are used for pattern matching in iris recognition. This paper represents iris recognition based Competitive neural network Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM) with essential redefinition of pattern similarity and also introduces the mixture model ARAM for the measurements of patterns. Keywords - ARAM, Biometric, Iris Recognition, LVQ, and Mixture model ARAM, Neural Network. I. INTRODUCTION Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high resolution images of the irises of an individual's eyes. Not to be confused with another, less prevalent, ocular- based technology, retina scanning, and iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual. Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier group of all biometric technologies. The only biometric authentication technology designed for use in a one-to-many search environment, a key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime. Plemmons proposed different optimization methods for designing the optics and the image processing algorithms, and provide laboratory and simulation results from applying these systems and results on restoring the intermediate phase encoded images using both direct Wiener filter and iterative conjugate gradient method [1]. Christel-Loïc Tisse et al examined a new iris recognition system that implements (i) gradient decomposed Hough transform / integral-differential operators combination for iris localization and (ii) the ―analytic image‖ concept to extract pertinent information from iris texture [2]. Li Ma et al proposed a new approach for personal identification based on iris recognition. The body of their papers details the steps of iris recognition, including image preprocessing, feature extraction and classifier design. The proposed algorithm uses a bank of Gabor filters to capture both local and global iris characteristics to form a fixed length feature vector. Iris matching is based on the weighted Euclidean distance between the two corresponding iris vectors and is therefore very fast [3]. Narayanswamy et al employs an especially designed Wave front Coded lens customized for iris recognition. They presented experimental results that show the benefits of this technology for biometric identification [4]. Zhuoshi Wei et al presented a framework to synthesize large realistic iris databases, providing an alternative to iris database collection. Firstly, iris patch is used as a basic element to characterize visual primitive of iris texture, and patch-based sampling is applied to create an iris prototype [5]. Czajka et al presents an original, independent of typical cryptographic techniques, method of biometric replay attack prevention for iris biometrics. The proposed solution takes advantage of appropriate enhancements of iris templates and relies on appropriate data alteration within the image space resulting in significant changes of the resulting code in the iris feature space [6]. II. IRIS PREPROCESSING Iris preprocessing consider following stages: 2.1Localization www.iosrjournals.org 64 | Page
  • 2. A Study of various soft computing techniques for iris recognition Fig1. Localization of iris The first step in the localization process is pupil segmentation based on analysis of the histogram. It is assumed, like in [7] that a pupil is the darkest area in the image and standard deviation of luminance in this area is relatively low. It has to be emphasized that unwanted elements may appear in the threshold image. Nevertheless pupil can be segmented by relatively simple method, based on image thresholding using the histogram analysis. 2.2 Segmentation Segmentation is one of the important steps in preprocessing since it separates the input iris image into several components making it feasible to extract features easily. The Segmentation process is defined as separating the input iris image into several components, so it is very important step in preprocessing because it describes and recognize the input image. One of the best ways to separate the pupil from the whole eye is using circular Hough transformation in order to find the circle of the pupil [7]. The pupil is the largest black area in the intensity image; its edge can be easily detected from the binary image by using a suitable threshold of the intensity image. Fig2. Example of Edge Detection [7] 2.3 Normalization The purpose of iris normalization is to get the same region of iris to do matching regardless pupil dilation and the different iris size caused by the different distance between the eye and video zoom factor. Moreover, the shift, accounting for the offsets of the eye in the plane parallel to the camera’s sensor, should also be eliminated [8]. Wildes [9][10] used an image-registration technique to eliminate dilation, scaling and rotation. This approach wraps a new iris image into alignment with a normal image according to a mapping function so that the difference between the two iris images is minimal. 2.4 Feature Vector Extraction and Match Feature selection and extraction is to find out the important features to do matching. The visible features of an iris are ciliary processes, contraction furrows, crypts, rings, corona, and freckle [11] and so on. How to set a model to extract the feature of different irises and match them is especially important for it determines the results of the whole system directly [12] [13]. 1. NEURAL NETWORK The term ―neural network‖ [15] was traditionally used to refer to a network or circuit of biological neurons. The modern usage of the term often refers to artificial neural networks, which are composed of artificial neurons or nodes. Thus the term has two distinct usages: i) ―Biological neural networks‖ are made up of real biological neurons that are connected or functionally related in the peripheral nervous system or the central nervous system. In the field of neuroscience, they are often identified as groups of neurons that perform a specific physiological function in laboratory analysis. ii) ―Artificial neural networks‖ are composed of interconnecting artificial neurons (programming constructs that mimic the properties of biological neurons). Artificial neural networks may either be used to gain an www.iosrjournals.org 65 | Page
  • 3. A Study of various soft computing techniques for iris recognition understanding of biological neural networks, or for solving artificial intelligence problems without necessarily creating a model of a real biological system. The real, biological nervous system is highly complex: artificial neural network algorithms attempt to abstract this complexity and focus on what may hypothetically matter most from an information processing point of view. Good performance or performance mimicking animal or human error patterns, can then be used as one source of evidence towards supporting the hypothesis that the abstraction really captured something important from the point of view of information processing in the brain. Another incentive for these abstractions is to reduce the amount of computation required to simulate artificial neural networks, so as to allow one to experiment with larger networks and train them on larger data sets. An artificial neural network usually called neural network [15], is a mathematical model or computational model that is inspired by the structure and functional aspects of biological neural networks. A neural network consists of an interconnected group of artificial neurons, and it processes information using a connectionist approach to computation. In most cases an ANN is an adaptive system that changes its structure based on external or internal information that flows through the network during the learning phase. Modern neural networks are non-linear statistical data modeling tools. They are usually used to model complex relationships between inputs and outputs or to find patterns in data. 3.1 Soft computing techniques of neural network Following two approaches of the neural network are used for enhancing the security in iris recognition system: 3.1.1 Learning Vector Quantization (LVQ) Learning Vector Quantization is a prototype-based supervised classification algorithm. LVQ can be understood as a special case of an artificial neural network. LVQ is one of the competitive neural networks. LVQ is a pattern classification method; each output node is represented as a class. The weight vector of an output node is called a reference or codebook vector (CV). The LVQ attempts to adjust the weights to approximate a theoretical bayes classifier. The result obtained depends on the majority voting among several weak classifiers Input vectors are classified by assigning them as a class label of the weight vector closest to the input vector[14] [15]. The result obtained depends on the majority voting among several weak classifiers. The LVQ consisting of two layers; the first layer is the input layer which contains the input neurons, while the second layer is the output layer that contains output neurons. The final step is the pattern matching of the Iris image with the stored templates from the database. The Following figure shows Pattern matching process. These patterns are used to create templates forIris recognition. It will work fine for less number of users, but it is not recommended for large number of users since it requires large storage memory. Fig3. Pattern matching process 3.1.2 Template matching result The Iris recognition steps, feature extraction, Pattern matching are performed using NI Vision Assistant and NI Lab VIEW. The NI vision script for iris recognition using template matching. Fig4. Result of template matching 3.1.3 Adaptive Resonance Associative Map (ARAM) The Adaptive Resonance Associative Map (ARAM) [16] belongs to the family of Adaptive Resonance Theory (ART) self-organizing neural networks. Like another member of the family, ART-MAP ARAM is capable of incrementally learning recognition categories and multidimensional maps of patterns. Compared to ART-MAP, ARAM contains as implified pattern matching and learning process. An ARAM network has two individual www.iosrjournals.org 66 | Page
  • 4. A Study of various soft computing techniques for iris recognition short term memory (STM) and a shared long term memory (LTM) l that encodes the associated knowledge from the two feature fields. The learning of the network is guided by an orienting subsystem with two logical gates, defined with two vigilance parameter. The logical gates conditionally switch and reset the network state according to predefined rules, and hence affect knowledge encoding in the LTM. ARAM acquires its domain knowledge through an online, hard competitive learning process. ARAM uses two functions (choice and match) to evaluate the similarity between the input and recognition category. These two functions may or may not have same definition, optionally providing a different view to conform the degree of pattern matching. Secondly, the use of vigilance thresholds ensures only significantly similar patterns may be grouped together. On the other hand, the vigilance parameters primarily affect the clustering process. Lower vigilance thresholds generally lead to fewer recognition categories, and hence rougher clustering result. Lastly while most importantly, ARAM provides an effective infrastructure for learning of associative knowledge from two different domains. Depending on the input signals, ARAM may be applied to different learning tasks. Examples include text and document classification [17], clustering and personalized knowledge management and association rule mining [18] [19]. 3.1.4 Mixture Model ARAM for GO Annotation and Gene Expression Data whereas Mixture Model ARAM is straightforward: for each gene product. In ARAM’s pattern field A to encode its expression profile and B to encode its GO annotation. Following common practices, the expression profile is presented in vector format, and the GO annotation is presented as a set of descriptive GO terms, denoted as: x = (xa|xb) = (e−−x→p| {go terms}). The LTM recognition category encodes an associative pattern w = (wa|wb), where wa and wb respectively are the expression pattern and GO annotation term(s) representative to the inputs that form the corresponding category [20]. 3.1.5 Pattern Field for Gene Expression Appropriate normalization of gene expression data prevents category proliferation without compromising their biological representation. Variations of normalization techniques are adopted in different conditions [21][22]. Thus the Mixture Model ARAM network does not contain a fixed normalization link to alter the original input gene expression. Input expressions are assumed and they are properly pre-normalized, and define the link between Fa0 and Fb1 as a simple feed forward copy operation: xa = Ia. The measurement of the similarity between two GO terms as the information content of their minimal subsumer. A so-called minimal subsumer of two terms ti and t j, denoted as ∇ (ti, t j), is the subsumer that has the minimal likelihood. To formalize: Sim (ti, t j) ≡ℑ (∇ (ti, t j)) = −log (min {p (t) |t ∈ S (ti, t j)}) (1) Where S (ti, t j) is the subsumer set of term ti and t j, essentially being their common ancestor terms. Similarity between GO Annotations of two Genes while equation 1 measures the semantic similarity between two GO terms, it is common that a gene product may be annotated with multiple GO terms, which will lead to multiple term-to-term similarities between two genes. To formalize, suppose the multiple GO annotations of two genes products gi and gj are denoted as: Ai = {ti1, ti2. . . tiP} and Aj = {t j1, t j2. . . t jQ} respectively, their similarity is then calculated as: Sim (Ai, Aj) = max {sim (tix, tjy) |x ∈ [1, P], y ∈ [1, Q]} (2) By applying the maximal term-to-term similarity as the similarity between to GO annotations, we essentially identify their subsume that has the maximal information content, i.e. the maximal common factor. III. CONCLUSION This paper concluded that there are two important soft computing approaches of neural network which are used for pattern matching in iris recognition to enhance the performance. Learning Vector Quantization is a prototype-based supervised classification algorithm in which each output node is represented as a class. Codebook vector (CV) is used for output node. It uses bayes classifier for adjusting the weight. The result obtained depends on the majority voting among several weak classifiers. The patterns matching of the Iris image is to be done with the stored templates from the database. Templates are created with these patterns but it will work fine for less number of users; it is not recommended for large number of users since it requires large storage memory whereas the Adaptive Resonance Associative Map (ARAM) belongs to the family of Adaptive Resonance Theory (ART) self-organizing neural networks. It is capable of incrementally learning recognition www.iosrjournals.org 67 | Page
  • 5. A Study of various soft computing techniques for iris recognition categories and multidimensional maps of patterns. It contains a simplified pattern matching and learning. To improve the pattern matching process mixture model ARAM is used which used gene ontology (GO) and gene expression for checking the similarities and measurements of various pattern. This approach reduced the noise from the whole data and provides the expression between various patterns. As compared Learning Vector Quantization, the Adaptive Resonance Associative map is more recommended for large numbers of users. REFERENCES [1] R. Plemmonsa, M. Horvatha, E. Leonhardta, P. Paucaa, S. Prasad, ―Computational Imaging Systems for Iris Recognition‖, Processing of Spiel 2004. [2] C. L. Tisse, L. Martin, L. Torres, M. Robert, "Person identification technique using human iris recognition", ST Journal of System Research Current Issue 2003. [3] L. Ma, U. Wang, T. Tan, "Iris Recognition Based on Multichannel Gabor Filtering", The 5th Asian Conference on Computer Vision, pp.23—25, Melbourne, Australia, January 2002. [4] R. Narayanswamy, P. E. X. Silveir, "Extended Depth-of-Field Iris Recognition System for a Workstation Environment", Proceedings of the Spied Biometric Technology for Human Identification II,Vol. 5779, pp. 41-50, Orlando, FL, 2005. [5] Z. Wei, T. Tan and Z. Sun, "Synthesis of Large Realistic Iris Databases Using Patch-based Sampling‖, IEEE, 2008. [6] A. Czajka, A. Pacut, "Replay Attack Prevention for Iris Biometrics", IEEE, ICCST 2008. [7] C. Teo and H. Ewe, "An Efficient One-Dimensional Fractal Analysis for Iris Recognition", Proceedings of the 13- thWSCGInternational Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 157-160, Plzen-Bory, Czech Republic, January 31 – February 4, 2005. [8] Daugman J G., ―High confidence visual recognition of persons by a test of statistical independence‖, IEEE Trans. Pattern Anal. Machine Intel. 1993, vol.15, no.11, pp.1148-1161. [9] Wildes R P., ―Iris Recognition: An Emerging Biometric Technology‖, In Proceeding of the IEEE, Piscataway, NJ, vol. 85, pp.1348- 1363, 1997. [10] Daugman J G., ―Recognition persons by their pattern‖, Information Security Technical report, vol.13, no.1, pp. 33-39, 1998. [11] Daugman J G., ―High confidence visual recognition of persons by a test of statistical independence‖, IEEE Trans. Pattern Anal. Machine Intel, 1993, vol.15, no.11, pp. 1148-1161. [12] Daugman J G. ―High Confidence Recognition of Person by Rapid Video Analysis of Iris Texture‖, European Convection on Security Detection and Brighton, Brighton, UK, pp. 244-251, 1995. [13] Daugman J G. ―Recognition persons by their pattern‖, Information Security Technical report, vol.13, no.1, pp.33-39, 1998. [14] CBSR, 2005.Center for biometrics and security research. http://www.cbsr.ia.ac.cn/english/Databases.asp [15] Zhou Zhiping, Hui Maomao, Sun Ziwen, ―An iris recognition based on 2DWPCA and neural network‖, pp.9781-4244-2723, 9/09/$25.00© 2009, IEEE. [16] Tan A.H., ―Adaptive Resonance Associative Map for Neural Networks‖, Vol.8, No.3, pp. 437–446, 1995. [17] Tan A.H., ―Predictive self-organizing networks for text categorization‖, Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), pp. 66–77, 2001. [18] Tan A.H., Ong H.L., Pan H., Ng J., Li Q.X., ―Towards personalized web intelligence‖, Knowledge and Information Systems, Vol.6, No.5, pp.595–616, 2004. [19] Tan A.H., Pan H., ―Predictive neural networks for gene expression data analysis‖, Neural Networks, Vol.18, No.3, pp. 297–306, 2005. [20] Carpenter G., Gross berg S., Rosen D., ―ART 2-A: An adaptive resonance algorithm for rapid category learning and recognition‖, Neural Networks, Vol.4, pp. 493–504, 1991. [21] The Gene Ontology Consortium, ―Gene ontology: tool for the unification of biology‖, Nature Genetics, Vol.25, No.1, pp. 25–29, 2000. [22] Ms. Gaganpreet Kaur, Mr. Akshay Girdhar and Ms. Manvjeet Kaur, " Article: Enhanced Iris Recognition System - an Integrated Approach to Person Identification", International Journal of Computer Applications, vol.8, no.1, pp.1–5, Published by Foundation of Computer Science, October 2010. www.iosrjournals.org 68 | Page