SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 84-88
www.iosrjournals.org
www.iosrjournals.org 84 | Page
To Improve the Recognition Rate with High Security with
Ear/Iris Biometric Recognition Technique with feature
Extraction & Matching
Paridhi Agarwal1
, Dr. Naveen Hemrajani2
12
(Computer Science and Engineering Department, Suresh Gyan Vihar University, Jagatpura, Jaipur, India)
Abstract : Ears are the new biometric with major advantage in that they appear to maintain their structure
with increasing age. Contending that the ear is mainly a planar shape 2D images are used, which are consistent
with deployment in surveillance and other planar- image scenarios. In this paper, a new model-based approach
to ear biometrics is proposed. The model parts are derived by a stochastic clustering method on a set of scale
invariant features on a training set. The model description is extended by proposing a new wavelet-based
analysis with a specific aim of capturing information in the ear’s outer structures. The performance is evaluated
on test sets selected from the XM2VTS database. By results, both in modeling and recognition, the new model-
based approach does indeed appear to be a promising new approach to ear biometrics. The recognition
performance has improved notably by the incorporation of the new wavelet-based analysis. A model-based
approach has an advantage in handling noise and occlusion. A wavelet can offer performance advantages when
handling occluded data by localization. A robust matching technique is also added to restrict the influence of
corrupted wavelet projections. Furthermore, the automatic enrolment is tolerant of occlusion in ear samples.
The hybrid method obtains promising results recognizing occluded ears. The results have confirmed the validity
of this approach both in modeling and recognition. The new hybrid method does indeed appear to be a
promising new approach to ear biometrics, by guiding a model-based analysis via anatomical knowledge.
Keywords: hybrid method, model-based approach, stochastic clustering, XM2VTS database, wavelet-based
analysis
I. Introduction
Biometrics is the science in which an entity is distinguished on the basis of physiological features or
behavioral characteristics [1]. Physiological characteristics include finger print, iris scan, retina scan, face,
thermo grams of face, palm print, ear etc. whereas behavioral characteristics consist of gait recognition, odour,
voice recognition and signature verification. The results are obtained in biometrics by using single or multiple
means. The achieved results indicate that biometric techniques are much more precise and accurate than the
traditional techniques. Other than precision, there have always been certain problems which remain associated
with the existing traditional techniques. As an example consider possession and knowledge. Both can be shared,
stolen, forgotten, duplicated, misplaced or taken away. However the danger is minimized in case of biometric
means [2]. In this paper, I have evaluated and improved the Recognition Rate with High Security with Ear/Iris
Biometric Recognition Technique with feature Extraction & Matching.
II. Biometrics Architecture
Common Criteria Biometric Evaluation Methodology Working Group in their report Biometric
Evaluation Methodology published in 2002 divides a biometric system into four main components, as described
in the figure [1].
Submitted date 27 June 2013 Accepted Date: 02 July 2013
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique
www.iosrjournals.org 85 | Page
User
Figure1 Architecture of a Biometric System
III. Biometric Through An Eye
Biometric verification can be done through an eye which is considered as the most reliable
authentication procedure to date, almost with zero false accepting rates. It is relatively new technology as
compared to the other leading biometric techniques such as finger printing. Authentication in an eye can be done
through two means, that is, either iris or retina [4].
US Biometric.gov explains that before the image capture, localization of the landmark sights of an eye
should be made carefully by the system because the quality of the captured image extraction depends upon it
[5]. These landmark features allows the system to isolate the iris portion of an eye while capturing the image
and later extract the desired portion [5]. As per the Figure, localization of the eyelids boundaries and the iris is
marked by a white line.
1.1. Far And Frr Table
Iris Recognition Technology for Improved Authentication published at SANS Institute Reading Room
site that False Accepting Rate and False Rejecting Rate of Iris Recognition is:
Table 1. Hamming Distances and Error Probabilities
Hamming Distance False Accept Probability False Reject Probability
0.28 1 In 1012 1 in 11,400
0.29 1 In 1011 1 in 22,700
0.30 1 in 6.2 billion 1 in 46,000
0.31 1 In 665 million 1 in 95,000
0.32 1 In 81 million 1 in 201,000
0.35 1 In 295,000 1 in 2.12 million
0.37 1 In 12300 1 in 11.3 million
2. Ear Biometrics
Ear is a relatively new class of biometrics. Ear features have been used for many years in forensic
sciences for recognition. Ear is a stable biometric and does not vary with age. Ear has the properties that a
biometric trait should possess, i.e. permanence, uniqueness, universality and collectability.
IV. Methodology For Ear Bio-Metric Systems
4.1.1. Voronoi Diagrams
The sample ear image with the corresponding Voronoi diagram and neighborhood graph is presented in Figure .
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique
www.iosrjournals.org 86 | Page
Figure 2 shows Sample ear image with the constructed Voronoi diagram and the corresponding neighborhood
graph
The neighbour of pixel p is pixel q such that
d (p, q) = 1. If p = (xp, yp) and q = (xq, yq), then:
d (p, q) = max (| xp – xq| , | yp – yq|) (2)
Assuming that we have a contour given as an ordered set of points in the image plane
C = {ti | i = 1… n}, ti = (xi, yi). The contour is usually an open curve.
4.1.2. Concentric Circle Based Method – Ccm
The CCM method is based on concentric circles centered in the obtained centroid point
O = 



r
rl max
For rl = l *Δr, (l = 1,….., o), basing on the record T we store the number of elements ll, for which Rl = p and
we create the vectors:
Vl = {(l1) 1 …(l1) s …, (l1) o},
VZ = {(i1,j1,ρ,φ1),…, (is,js,ρ,φs),…, (iu,ju,ρ,φu)}
The feature vector that is created on the basis of presented feature extraction algorithm can be formulated as:
V= {V1, D1,…, Vl, Dl,…., Vo ,Do }
Figure 3 shown the Symbolic representation of algorithm for Nr = 3
4.1.3. Contour Tracking Method – Ctm
Let go, denote the current point of the contour line, so that go = g(i,j) = 1. Contour line points are
classified on the basis of the coefficient Nc8
Nc8 = 

sk
gkgkgkgk )21(
Where S = (1, 3, 5, 7)
Figure 4. Symbolic presentation of the points extracted by tracing contour method, Ending points E and
bifurcations B are marked in the contour, as well as the intersection points with the consecutive radii rl (right).
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique
www.iosrjournals.org 87 | Page
For C contour in the image we obtain:
4.1.4. Angle – Based Contour Representation Method Abm
Each extracted contour is treated as an independent open curve. Each contour is represented by two sets
of angles [3]:
  wwww 1;;1;
Figure 5. shown the Visualization of the ABM method for a chosen ear contour and 2 radii (concentric circles)
with a centre in p0
Having assumed that there are C contours in the ear contour image, and that each contour is analyzed
by concentric circles, the feature vector is given by:
W= {(Φw, Ψw − 1)1,…., (Φw, Ψw − 1)c,…, (Φw − 1)c }
4.1.5. Geometrical Parameters Method – Gpm
Extraction of the longest contour Lemax within the ear image, contour length is calculated
according to:
Where:
Q- Number of contour points;
c- Number of contours, for c = 1 …. C;
(x,y)- coordinates of contour points;
q - Indexation of the current contour point.
The feature vector computed by the proposed method GPM containing the parameters is given by:
FV = {(Lc, dkp,kk, d, b, db, cc)c}
4.1.6. Proposed Algorithm:-
A. Algorithm for Database
Step 1: Declaration of the Empty Vector in accordance with the size of image data
Step 2: Reshape the matrix into the vector whose elements are collected from the various images.
Step 3: Provide the Space for each separate image into the dataset
B. Algorithm for Recognition
Step 1: Mean and variance of the collected iris/ear images are made almost equal using mean and variance
normalization technique. Mean and variance of one of the image from the collections is treated as desired mean
and desired variance.
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique
www.iosrjournals.org 88 | Page
Step 2: Reshape the matrix into the vector whose elements are collected column by column from the matrix.
Step 3: Co-variance matrix of the collected vectors is computed. Eigen values of the co-variance matrix and the
Eigen vectors corresponding to the significant Eigen vectors are computed
Step 4: Eigen vectors are reshaped into the matrix of the original size. They are called Eigen iris/ ears.
Step 5: The Eigen iris/ears are orthogonal to each other. They can be made orthonormal to each other by
normalizing the vectors.
Step 6: For every iris/ear image matrix, feature vectors are obtained as the inner product of eigen basis vectors
and the reshaped iris/ear image matrix.
Step 7: Mean vector of the feature vectors collected from the same person is treated as the template assigned to
that corresponding person. This is repeated for other persons also. Thus one template is assigned to every person
and they are stored in the database.
Step 8: To classify the unknown iris/ear image as one among the four categories, template is computed as the
inner product of Eigen basis vectors (Eigen iris/ ears) with reshaped normalized unknown ear image. The
template thus obtained is compared with the group of templates stored in the database using Euclidean distance.
Step 9: Template corresponding to the minimum Euclidean distance is selected and the person corresponding to
that template is declared as the identified person.
V. Tools Used
For the analysis of the proposed method MATLAB on a PC with 2.0 GHz Dual Core Intel processor
and 2GB RAM is to be used. The MATLAB is widely used scientific tool. This provide wide tool for the
scientific and research tools to the user for simulation and for real time data processing. The MATLAB scripting
is user friendly and easy to debug tool, and ideal for the scientific, complex modeling.
VI. Results
Hamming Distance Vector Method is used for Identification. In this method we have used statistical
analysis for Distribution of the frames. Point to point scheme as well as Contour scheme is used for the
Implementation of this method. Aside from the number of subjects in each database, the main
difference is that while the iris images are of very high quality, ear images are of somewhat lower quality.
We have used Database of IIT Delhi for Ear Recognition & Iris Database CASIA v2.
The verification rate of the standalone iris classifier is very high. The FAR and FRR rates at various
thresholds are zero. It is difficult to compare and show the FAR and FRR rates using the ROC curve. Therefore,
we simply calculated the total error rate (i.e., FAR+FRR). The outputs of RBF neural network are near 0 or 1, so
it is not appropriate to express it as FAR and FRR at every threshold.. It is apparent from the distribution of
matching distances that fusion improves the separation of genuine scores from the impostor scores. As the ROC
curves cannot be compared, we analyze the range of threshold values that result in high accuracy. The threshold
values range that can be selected for high verification rates is larger for the fused matcher compared to the
individual matchers.
Table 2: Feature vs FAR & FRR Analysis
Feature/ Analysis FAR FRR
Iris 99.2% 0.8 %
Ear 98.5% 1.5%
Fusion 96.3% 3.7%
VII. Conclusions
The results obtained from the multimodal experiments suggest that the ear is a very suitable biometric
as a noninvasive technique to be combined with other noninvasive techniques like face recognition, or gait. The
novel approach using spatial segmentation for dividing the recognition problem and recognizing segments of the
ear proved to be successful and yielded higher recognition rates than the base eigen-ear experiment. The
segmentation technique is very useful for dealing with occlusions. The segmentation technique also gives
flexibility to the system which makes it possible to recognize individuals with whatever segment of the ear that
is available. The segmentation of the ear makes the calculations for the PCA faster since the images are divided
to smaller images where the PCA calculations are done independently for every segment.
The approach of combining images post PCA calculations or in the PCA space for the multimodal
experiments, so that each combination of images will be represented by two points instead of one point in the
PCA space, makes the system even more flexible. The multimodality could be applied whenever the appropriate
information from the biometrics involved is available or could be ignored and each system will work on its own
without the need to have more than one implementation to accommodate each case.
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique
www.iosrjournals.org 89 | Page
References
[1] Basit, A., Javed, M. Y. and Anjum, M. A., “Efficient iris recognition method for human identification”, ENFORMATIKA, pp. 24-
26, vol 1, 2005.
[2] Moreno, B., Sanchez, A., Velez, J., F., “On the Use of Outer Ear Images for PersonalIdentification in Security Applications”, IEEE
33rd Annual International Carnahan Conference on Security Technology, pp. 469-476, 1999.
[3] M. Ali, M. Y. Javed, A. Basit, „Ear Recognition Using Wavelets‟, Proceedings of Image and Vision Computing New Zealand
2007, pp. 83–86, Hamilton, New Zealand, December 2007
[4] Cesar Santos, Edson J.R, Justino, Flavio Bertolozzi, Robert Sabaourin, “An offline Signature Verification Method Based on the
questioned document expert‟s Approach and a Neural Network Classifier”, Catolica do Parana, Rua Imaculada
onceicao,1155,Curitiba, PR, Brazil.
[5] John .G. Daugman, “How Iris Recognition Works”, IEEE Trans, Circuit and Syst for Video Tech., vol.14, no.1, pp213, Jan
2004

Weitere ähnliche Inhalte

Was ist angesagt?

Bayesain Hypothesis of Selective Attention - Raw 2011 poster
Bayesain Hypothesis of Selective Attention - Raw 2011 posterBayesain Hypothesis of Selective Attention - Raw 2011 poster
Bayesain Hypothesis of Selective Attention - Raw 2011 posterGiacomo Veneri
 
Image Processing of Panoramic Dental X-Ray for Identifying Proximal Caries
Image Processing of Panoramic Dental X-Ray for Identifying Proximal CariesImage Processing of Panoramic Dental X-Ray for Identifying Proximal Caries
Image Processing of Panoramic Dental X-Ray for Identifying Proximal CariesTELKOMNIKA JOURNAL
 
Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform IJECEIAES
 
3차원 인공지능 의료영상 소프트웨어 응용 (KIST 김영준)
3차원 인공지능 의료영상 소프트웨어 응용 (KIST 김영준)3차원 인공지능 의료영상 소프트웨어 응용 (KIST 김영준)
3차원 인공지능 의료영상 소프트웨어 응용 (KIST 김영준)Youngjun Kim
 
VR / AR for Medical Application (가상현실 / 증강현실의 의료 응용)
VR / AR for Medical Application (가상현실 / 증강현실의 의료 응용)VR / AR for Medical Application (가상현실 / 증강현실의 의료 응용)
VR / AR for Medical Application (가상현실 / 증강현실의 의료 응용)Youngjun Kim
 
NEURAL NETWORK APPROACH FOR EYE DETECTION
NEURAL NETWORK APPROACH FOR EYE DETECTIONNEURAL NETWORK APPROACH FOR EYE DETECTION
NEURAL NETWORK APPROACH FOR EYE DETECTIONcscpconf
 
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
 
project report
project reportproject report
project reportWeston Wei
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET- Retinal Health Diagnosis using Image Processing
IRJET- Retinal Health Diagnosis using Image ProcessingIRJET- Retinal Health Diagnosis using Image Processing
IRJET- Retinal Health Diagnosis using Image ProcessingIRJET Journal
 
Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...IJECEIAES
 
Various cataract detection methods-A survey
Various cataract detection methods-A surveyVarious cataract detection methods-A survey
Various cataract detection methods-A surveyIRJET Journal
 
FPGA Implementation of Glaucoma Detection using Neural Networks
FPGA Implementation of Glaucoma Detection using Neural NetworksFPGA Implementation of Glaucoma Detection using Neural Networks
FPGA Implementation of Glaucoma Detection using Neural NetworksIRJET Journal
 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...eSAT Journals
 
Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...
Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...
Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...IJECEIAES
 

Was ist angesagt? (17)

Bayesain Hypothesis of Selective Attention - Raw 2011 poster
Bayesain Hypothesis of Selective Attention - Raw 2011 posterBayesain Hypothesis of Selective Attention - Raw 2011 poster
Bayesain Hypothesis of Selective Attention - Raw 2011 poster
 
Image Processing of Panoramic Dental X-Ray for Identifying Proximal Caries
Image Processing of Panoramic Dental X-Ray for Identifying Proximal CariesImage Processing of Panoramic Dental X-Ray for Identifying Proximal Caries
Image Processing of Panoramic Dental X-Ray for Identifying Proximal Caries
 
Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform
 
3D Reconstruction of Peripheral Nerves Based on Calcium Chloride Enhanced Mic...
3D Reconstruction of Peripheral Nerves Based on Calcium Chloride Enhanced Mic...3D Reconstruction of Peripheral Nerves Based on Calcium Chloride Enhanced Mic...
3D Reconstruction of Peripheral Nerves Based on Calcium Chloride Enhanced Mic...
 
3차원 인공지능 의료영상 소프트웨어 응용 (KIST 김영준)
3차원 인공지능 의료영상 소프트웨어 응용 (KIST 김영준)3차원 인공지능 의료영상 소프트웨어 응용 (KIST 김영준)
3차원 인공지능 의료영상 소프트웨어 응용 (KIST 김영준)
 
VR / AR for Medical Application (가상현실 / 증강현실의 의료 응용)
VR / AR for Medical Application (가상현실 / 증강현실의 의료 응용)VR / AR for Medical Application (가상현실 / 증강현실의 의료 응용)
VR / AR for Medical Application (가상현실 / 증강현실의 의료 응용)
 
NEURAL NETWORK APPROACH FOR EYE DETECTION
NEURAL NETWORK APPROACH FOR EYE DETECTIONNEURAL NETWORK APPROACH FOR EYE DETECTION
NEURAL NETWORK APPROACH FOR EYE DETECTION
 
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
 
project report
project reportproject report
project report
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET- Retinal Health Diagnosis using Image Processing
IRJET- Retinal Health Diagnosis using Image ProcessingIRJET- Retinal Health Diagnosis using Image Processing
IRJET- Retinal Health Diagnosis using Image Processing
 
Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...Automated fundus image quality assessment and segmentation of optic disc usin...
Automated fundus image quality assessment and segmentation of optic disc usin...
 
G01114650
G01114650G01114650
G01114650
 
Various cataract detection methods-A survey
Various cataract detection methods-A surveyVarious cataract detection methods-A survey
Various cataract detection methods-A survey
 
FPGA Implementation of Glaucoma Detection using Neural Networks
FPGA Implementation of Glaucoma Detection using Neural NetworksFPGA Implementation of Glaucoma Detection using Neural Networks
FPGA Implementation of Glaucoma Detection using Neural Networks
 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...
 
Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...
Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...
Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...
 

Andere mochten auch

Comparison of the Formal Specification Languages Based Upon Various Parameters
Comparison of the Formal Specification Languages Based Upon Various ParametersComparison of the Formal Specification Languages Based Upon Various Parameters
Comparison of the Formal Specification Languages Based Upon Various ParametersIOSR Journals
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsIOSR Journals
 
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...IOSR Journals
 
Efficient Record De-Duplication Identifying Using Febrl Framework
Efficient Record De-Duplication Identifying Using Febrl FrameworkEfficient Record De-Duplication Identifying Using Febrl Framework
Efficient Record De-Duplication Identifying Using Febrl FrameworkIOSR Journals
 
Smart Data Server for Smart Shops
Smart Data Server for Smart ShopsSmart Data Server for Smart Shops
Smart Data Server for Smart ShopsIOSR Journals
 
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingIOSR Journals
 
EIDER Catalogo verano 2012
EIDER Catalogo verano 2012EIDER Catalogo verano 2012
EIDER Catalogo verano 2012rarbos
 
Design and MATLAB Simulation of a Fuel Cell Based Interleaved Buck Converter ...
Design and MATLAB Simulation of a Fuel Cell Based Interleaved Buck Converter ...Design and MATLAB Simulation of a Fuel Cell Based Interleaved Buck Converter ...
Design and MATLAB Simulation of a Fuel Cell Based Interleaved Buck Converter ...IOSR Journals
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...IOSR Journals
 
Transport go green
Transport   go greenTransport   go green
Transport go greenAralc Eiob
 
Synchronization of Photo-voltaic system with a Grid
Synchronization of Photo-voltaic system with a GridSynchronization of Photo-voltaic system with a Grid
Synchronization of Photo-voltaic system with a GridIOSR Journals
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
A practical approach for model based slicing
A practical approach for model based slicingA practical approach for model based slicing
A practical approach for model based slicingIOSR Journals
 

Andere mochten auch (20)

Rutinas
RutinasRutinas
Rutinas
 
Comparison of the Formal Specification Languages Based Upon Various Parameters
Comparison of the Formal Specification Languages Based Upon Various ParametersComparison of the Formal Specification Languages Based Upon Various Parameters
Comparison of the Formal Specification Languages Based Upon Various Parameters
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination Systems
 
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
 
Efficient Record De-Duplication Identifying Using Febrl Framework
Efficient Record De-Duplication Identifying Using Febrl FrameworkEfficient Record De-Duplication Identifying Using Febrl Framework
Efficient Record De-Duplication Identifying Using Febrl Framework
 
Smart Data Server for Smart Shops
Smart Data Server for Smart ShopsSmart Data Server for Smart Shops
Smart Data Server for Smart Shops
 
Sfware educativos
Sfware educativosSfware educativos
Sfware educativos
 
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
 
Needle stick
Needle stickNeedle stick
Needle stick
 
EIDER Catalogo verano 2012
EIDER Catalogo verano 2012EIDER Catalogo verano 2012
EIDER Catalogo verano 2012
 
Design and MATLAB Simulation of a Fuel Cell Based Interleaved Buck Converter ...
Design and MATLAB Simulation of a Fuel Cell Based Interleaved Buck Converter ...Design and MATLAB Simulation of a Fuel Cell Based Interleaved Buck Converter ...
Design and MATLAB Simulation of a Fuel Cell Based Interleaved Buck Converter ...
 
B0520710
B0520710B0520710
B0520710
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
 
E0362232
E0362232E0362232
E0362232
 
Transport go green
Transport   go greenTransport   go green
Transport go green
 
Dank u
Dank uDank u
Dank u
 
Synchronization of Photo-voltaic system with a Grid
Synchronization of Photo-voltaic system with a GridSynchronization of Photo-voltaic system with a Grid
Synchronization of Photo-voltaic system with a Grid
 
Media genre
Media genreMedia genre
Media genre
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
A practical approach for model based slicing
A practical approach for model based slicingA practical approach for model based slicing
A practical approach for model based slicing
 

Ähnlich wie To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique with feature Extraction & Matching

Adopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human earAdopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human earIJCI JOURNAL
 
Feature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyFeature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyShashank Dhariwal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
Overview of Image Based Ear Biometric with Smartphone App
Overview of Image Based Ear Biometric with Smartphone AppOverview of Image Based Ear Biometric with Smartphone App
Overview of Image Based Ear Biometric with Smartphone AppIRJET Journal
 
An exploration of periocular region with reduced region for authentication re...
An exploration of periocular region with reduced region for authentication re...An exploration of periocular region with reduced region for authentication re...
An exploration of periocular region with reduced region for authentication re...csandit
 
AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...
AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...
AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...cscpconf
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...journalBEEI
 
Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013ijcsbi
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Ähnlich wie To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique with feature Extraction & Matching (20)

Adopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human earAdopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human ear
 
Feature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyFeature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A Survey
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
Overview of Image Based Ear Biometric with Smartphone App
Overview of Image Based Ear Biometric with Smartphone AppOverview of Image Based Ear Biometric with Smartphone App
Overview of Image Based Ear Biometric with Smartphone App
 
E0543135
E0543135E0543135
E0543135
 
An exploration of periocular region with reduced region for authentication re...
An exploration of periocular region with reduced region for authentication re...An exploration of periocular region with reduced region for authentication re...
An exploration of periocular region with reduced region for authentication re...
 
AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...
AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...
AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...
 
A010320106
A010320106A010320106
A010320106
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
 
Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Kürzlich hochgeladen (20)

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 

To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique with feature Extraction & Matching

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 84-88 www.iosrjournals.org www.iosrjournals.org 84 | Page To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique with feature Extraction & Matching Paridhi Agarwal1 , Dr. Naveen Hemrajani2 12 (Computer Science and Engineering Department, Suresh Gyan Vihar University, Jagatpura, Jaipur, India) Abstract : Ears are the new biometric with major advantage in that they appear to maintain their structure with increasing age. Contending that the ear is mainly a planar shape 2D images are used, which are consistent with deployment in surveillance and other planar- image scenarios. In this paper, a new model-based approach to ear biometrics is proposed. The model parts are derived by a stochastic clustering method on a set of scale invariant features on a training set. The model description is extended by proposing a new wavelet-based analysis with a specific aim of capturing information in the ear’s outer structures. The performance is evaluated on test sets selected from the XM2VTS database. By results, both in modeling and recognition, the new model- based approach does indeed appear to be a promising new approach to ear biometrics. The recognition performance has improved notably by the incorporation of the new wavelet-based analysis. A model-based approach has an advantage in handling noise and occlusion. A wavelet can offer performance advantages when handling occluded data by localization. A robust matching technique is also added to restrict the influence of corrupted wavelet projections. Furthermore, the automatic enrolment is tolerant of occlusion in ear samples. The hybrid method obtains promising results recognizing occluded ears. The results have confirmed the validity of this approach both in modeling and recognition. The new hybrid method does indeed appear to be a promising new approach to ear biometrics, by guiding a model-based analysis via anatomical knowledge. Keywords: hybrid method, model-based approach, stochastic clustering, XM2VTS database, wavelet-based analysis I. Introduction Biometrics is the science in which an entity is distinguished on the basis of physiological features or behavioral characteristics [1]. Physiological characteristics include finger print, iris scan, retina scan, face, thermo grams of face, palm print, ear etc. whereas behavioral characteristics consist of gait recognition, odour, voice recognition and signature verification. The results are obtained in biometrics by using single or multiple means. The achieved results indicate that biometric techniques are much more precise and accurate than the traditional techniques. Other than precision, there have always been certain problems which remain associated with the existing traditional techniques. As an example consider possession and knowledge. Both can be shared, stolen, forgotten, duplicated, misplaced or taken away. However the danger is minimized in case of biometric means [2]. In this paper, I have evaluated and improved the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique with feature Extraction & Matching. II. Biometrics Architecture Common Criteria Biometric Evaluation Methodology Working Group in their report Biometric Evaluation Methodology published in 2002 divides a biometric system into four main components, as described in the figure [1]. Submitted date 27 June 2013 Accepted Date: 02 July 2013
  • 2. To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique www.iosrjournals.org 85 | Page User Figure1 Architecture of a Biometric System III. Biometric Through An Eye Biometric verification can be done through an eye which is considered as the most reliable authentication procedure to date, almost with zero false accepting rates. It is relatively new technology as compared to the other leading biometric techniques such as finger printing. Authentication in an eye can be done through two means, that is, either iris or retina [4]. US Biometric.gov explains that before the image capture, localization of the landmark sights of an eye should be made carefully by the system because the quality of the captured image extraction depends upon it [5]. These landmark features allows the system to isolate the iris portion of an eye while capturing the image and later extract the desired portion [5]. As per the Figure, localization of the eyelids boundaries and the iris is marked by a white line. 1.1. Far And Frr Table Iris Recognition Technology for Improved Authentication published at SANS Institute Reading Room site that False Accepting Rate and False Rejecting Rate of Iris Recognition is: Table 1. Hamming Distances and Error Probabilities Hamming Distance False Accept Probability False Reject Probability 0.28 1 In 1012 1 in 11,400 0.29 1 In 1011 1 in 22,700 0.30 1 in 6.2 billion 1 in 46,000 0.31 1 In 665 million 1 in 95,000 0.32 1 In 81 million 1 in 201,000 0.35 1 In 295,000 1 in 2.12 million 0.37 1 In 12300 1 in 11.3 million 2. Ear Biometrics Ear is a relatively new class of biometrics. Ear features have been used for many years in forensic sciences for recognition. Ear is a stable biometric and does not vary with age. Ear has the properties that a biometric trait should possess, i.e. permanence, uniqueness, universality and collectability. IV. Methodology For Ear Bio-Metric Systems 4.1.1. Voronoi Diagrams The sample ear image with the corresponding Voronoi diagram and neighborhood graph is presented in Figure .
  • 3. To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique www.iosrjournals.org 86 | Page Figure 2 shows Sample ear image with the constructed Voronoi diagram and the corresponding neighborhood graph The neighbour of pixel p is pixel q such that d (p, q) = 1. If p = (xp, yp) and q = (xq, yq), then: d (p, q) = max (| xp – xq| , | yp – yq|) (2) Assuming that we have a contour given as an ordered set of points in the image plane C = {ti | i = 1… n}, ti = (xi, yi). The contour is usually an open curve. 4.1.2. Concentric Circle Based Method – Ccm The CCM method is based on concentric circles centered in the obtained centroid point O =     r rl max For rl = l *Δr, (l = 1,….., o), basing on the record T we store the number of elements ll, for which Rl = p and we create the vectors: Vl = {(l1) 1 …(l1) s …, (l1) o}, VZ = {(i1,j1,ρ,φ1),…, (is,js,ρ,φs),…, (iu,ju,ρ,φu)} The feature vector that is created on the basis of presented feature extraction algorithm can be formulated as: V= {V1, D1,…, Vl, Dl,…., Vo ,Do } Figure 3 shown the Symbolic representation of algorithm for Nr = 3 4.1.3. Contour Tracking Method – Ctm Let go, denote the current point of the contour line, so that go = g(i,j) = 1. Contour line points are classified on the basis of the coefficient Nc8 Nc8 =   sk gkgkgkgk )21( Where S = (1, 3, 5, 7) Figure 4. Symbolic presentation of the points extracted by tracing contour method, Ending points E and bifurcations B are marked in the contour, as well as the intersection points with the consecutive radii rl (right).
  • 4. To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique www.iosrjournals.org 87 | Page For C contour in the image we obtain: 4.1.4. Angle – Based Contour Representation Method Abm Each extracted contour is treated as an independent open curve. Each contour is represented by two sets of angles [3]:   wwww 1;;1; Figure 5. shown the Visualization of the ABM method for a chosen ear contour and 2 radii (concentric circles) with a centre in p0 Having assumed that there are C contours in the ear contour image, and that each contour is analyzed by concentric circles, the feature vector is given by: W= {(Φw, Ψw − 1)1,…., (Φw, Ψw − 1)c,…, (Φw − 1)c } 4.1.5. Geometrical Parameters Method – Gpm Extraction of the longest contour Lemax within the ear image, contour length is calculated according to: Where: Q- Number of contour points; c- Number of contours, for c = 1 …. C; (x,y)- coordinates of contour points; q - Indexation of the current contour point. The feature vector computed by the proposed method GPM containing the parameters is given by: FV = {(Lc, dkp,kk, d, b, db, cc)c} 4.1.6. Proposed Algorithm:- A. Algorithm for Database Step 1: Declaration of the Empty Vector in accordance with the size of image data Step 2: Reshape the matrix into the vector whose elements are collected from the various images. Step 3: Provide the Space for each separate image into the dataset B. Algorithm for Recognition Step 1: Mean and variance of the collected iris/ear images are made almost equal using mean and variance normalization technique. Mean and variance of one of the image from the collections is treated as desired mean and desired variance.
  • 5. To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique www.iosrjournals.org 88 | Page Step 2: Reshape the matrix into the vector whose elements are collected column by column from the matrix. Step 3: Co-variance matrix of the collected vectors is computed. Eigen values of the co-variance matrix and the Eigen vectors corresponding to the significant Eigen vectors are computed Step 4: Eigen vectors are reshaped into the matrix of the original size. They are called Eigen iris/ ears. Step 5: The Eigen iris/ears are orthogonal to each other. They can be made orthonormal to each other by normalizing the vectors. Step 6: For every iris/ear image matrix, feature vectors are obtained as the inner product of eigen basis vectors and the reshaped iris/ear image matrix. Step 7: Mean vector of the feature vectors collected from the same person is treated as the template assigned to that corresponding person. This is repeated for other persons also. Thus one template is assigned to every person and they are stored in the database. Step 8: To classify the unknown iris/ear image as one among the four categories, template is computed as the inner product of Eigen basis vectors (Eigen iris/ ears) with reshaped normalized unknown ear image. The template thus obtained is compared with the group of templates stored in the database using Euclidean distance. Step 9: Template corresponding to the minimum Euclidean distance is selected and the person corresponding to that template is declared as the identified person. V. Tools Used For the analysis of the proposed method MATLAB on a PC with 2.0 GHz Dual Core Intel processor and 2GB RAM is to be used. The MATLAB is widely used scientific tool. This provide wide tool for the scientific and research tools to the user for simulation and for real time data processing. The MATLAB scripting is user friendly and easy to debug tool, and ideal for the scientific, complex modeling. VI. Results Hamming Distance Vector Method is used for Identification. In this method we have used statistical analysis for Distribution of the frames. Point to point scheme as well as Contour scheme is used for the Implementation of this method. Aside from the number of subjects in each database, the main difference is that while the iris images are of very high quality, ear images are of somewhat lower quality. We have used Database of IIT Delhi for Ear Recognition & Iris Database CASIA v2. The verification rate of the standalone iris classifier is very high. The FAR and FRR rates at various thresholds are zero. It is difficult to compare and show the FAR and FRR rates using the ROC curve. Therefore, we simply calculated the total error rate (i.e., FAR+FRR). The outputs of RBF neural network are near 0 or 1, so it is not appropriate to express it as FAR and FRR at every threshold.. It is apparent from the distribution of matching distances that fusion improves the separation of genuine scores from the impostor scores. As the ROC curves cannot be compared, we analyze the range of threshold values that result in high accuracy. The threshold values range that can be selected for high verification rates is larger for the fused matcher compared to the individual matchers. Table 2: Feature vs FAR & FRR Analysis Feature/ Analysis FAR FRR Iris 99.2% 0.8 % Ear 98.5% 1.5% Fusion 96.3% 3.7% VII. Conclusions The results obtained from the multimodal experiments suggest that the ear is a very suitable biometric as a noninvasive technique to be combined with other noninvasive techniques like face recognition, or gait. The novel approach using spatial segmentation for dividing the recognition problem and recognizing segments of the ear proved to be successful and yielded higher recognition rates than the base eigen-ear experiment. The segmentation technique is very useful for dealing with occlusions. The segmentation technique also gives flexibility to the system which makes it possible to recognize individuals with whatever segment of the ear that is available. The segmentation of the ear makes the calculations for the PCA faster since the images are divided to smaller images where the PCA calculations are done independently for every segment. The approach of combining images post PCA calculations or in the PCA space for the multimodal experiments, so that each combination of images will be represented by two points instead of one point in the PCA space, makes the system even more flexible. The multimodality could be applied whenever the appropriate information from the biometrics involved is available or could be ignored and each system will work on its own without the need to have more than one implementation to accommodate each case.
  • 6. To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique www.iosrjournals.org 89 | Page References [1] Basit, A., Javed, M. Y. and Anjum, M. A., “Efficient iris recognition method for human identification”, ENFORMATIKA, pp. 24- 26, vol 1, 2005. [2] Moreno, B., Sanchez, A., Velez, J., F., “On the Use of Outer Ear Images for PersonalIdentification in Security Applications”, IEEE 33rd Annual International Carnahan Conference on Security Technology, pp. 469-476, 1999. [3] M. Ali, M. Y. Javed, A. Basit, „Ear Recognition Using Wavelets‟, Proceedings of Image and Vision Computing New Zealand 2007, pp. 83–86, Hamilton, New Zealand, December 2007 [4] Cesar Santos, Edson J.R, Justino, Flavio Bertolozzi, Robert Sabaourin, “An offline Signature Verification Method Based on the questioned document expert‟s Approach and a Neural Network Classifier”, Catolica do Parana, Rua Imaculada onceicao,1155,Curitiba, PR, Brazil. [5] John .G. Daugman, “How Iris Recognition Works”, IEEE Trans, Circuit and Syst for Video Tech., vol.14, no.1, pp213, Jan 2004