An efficient algorithm in extracting human iris Morphological features

The interface of computer technologies and biology is having a huge impact on society. Human recognition research projects promises new life to many security-consulting firms and personal identification system manufacturers. Iris recognition is considered to be the most reliable biometric authentication system. Very few iris recognition algorithms were commercialized. The method proposed in this paper differed from the existing work in the iris segmentation and feature extraction phase. Digitized grayscale images of Chinese Academy of Sciences—Institute of Automation (CASIA) database were used for determining the performance of the proposed system. The circular iris and pupil of the eye image were segmented using Morphological operators and Hough transform. The localized iris region was then normalized in to a rectangular block to account for imaging inconsistencies. This method provides accurate features as well as simple and fast iris analysis methods.

[1]  John C. Russ,et al.  The Image Processing Handbook , 2016, Microscopy and Microanalysis.

[2]  Michael Boyd,et al.  Iris Recognition , 2006 .

[3]  John Daugman,et al.  Demodulation by Complex-Valued Wavelets for Stochastic Pattern Recognition , 2003, Int. J. Wavelets Multiresolution Inf. Process..

[4]  Hugo Proença,et al.  Iris Recognition: An Analysis of the Aliasing Problem in the Iris Normalization Stage , 2006, 2006 International Conference on Computational Intelligence and Security.

[5]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Luís A. Alexandre,et al.  Iris segmentation methodology for non-cooperative recognition , 2006 .

[7]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[8]  Before Attackers Do,et al.  Iris Recognition Technology for Improved Authentication , 2002 .

[9]  Jafar M. H. Ali,et al.  An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory , 2003 .

[10]  S. Pizer,et al.  The Image Processing Handbook , 1994 .