Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 16

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  iris recognition
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Iris based authentication methods are popular due to their reliability and dependability. This paper proposes the method of the iris recognition that instead uses only two fragments of the pattern. The presented method allows for a simpler iris extraction, as it does not use a complex conversion of an iris pattern from a circular to rectangular shape. The results obtained from this experiment show similarities to other previous ones. Importantly, the proposed method may be treated as an alternative solution. The experiment confirmed the validity of the concept for the proposed iris recognition method. Moreover, this method is quicker in comparison to the others. The additional merit of the proposed solution is the elimination of the distortion which comes from the eyelids and eyelashes at the beginning of the iris image processing. Moreover, this method does not require using additional techniques to eliminate disturbances.
PL
Artykuł prezentuje projekt systemu realizującego identyfikację biometryczną na podstawie zdjęcia tęczówki. Akwizycja obrazu w podczerwieni odbywa się na stoliku okulistycznym z wykorzystaniem dedykowanej kamery uzupełnionej o specjalny oświetlacz oraz obiektyw. Prezentowane oprogramowanie zostało przygotowane dla platformy Raspberry Pi 3 model B, zarządzanej przez system Linux. Do przygotowania oprogramowania wykorzystano projekt USIT oraz biblioteki OpenCV. Przeprowadzone eksperymenty pozwoliły na dobranie parametrów systemu, przy których uzyskuje się najlepszą skuteczność identyfikacji i jednocześnie największą szybkość przetwarzania danych.
EN
The paper presents a project of a system implementing the biometric identification based on the iris image. Infrared image acquisition takes place on an ophthalmic table using a dedicated camera supplemented by a special illuminator and lens. The presented software has been prepared for the Raspberry Pi 3 platform, managed by the Linux system. The USIT project and Open-CV libraries were used to prepare the software. The conducted experiments allowed to choose the system parameters for the best identification efficiency and simultaneously the highest data processing speed.
EN
With the recent shift towards mobile computing, new challenges for biometric authentication appear on the horizon. This paper provides a comprehensive study of cross-spectral iris recognition in a scenario, in which high quality color images obtained with a mobile phone are used against enrollment images collected in typical, near-infrared setups. Grayscale conversion of the color images that employs selective RGB channel choice depending on the iris coloration is shown to improve the recognition accuracy for some combinations of eye colors and matching software, when compared to using the red channel only, with equal error rates driven down to as low as 2%. The authors are not aware of any other paper focusing on cross-spectral iris recognition is a scenario with near-infrared enrollment using a professional iris recognition setup and then a mobile-based verication employing color images.
EN
This paper proposes and evaluates a watermarking-based approach to certify the authenticity of iris images when they are captured by a genuine equipment. In the proposed method, the iris images are secretly signed before being used in biometric processes, and the resulting signature is embedded into the JPEG carrier image in the DCT domain in a data-dependent way. Any alteration of the original (certified) image makes the signature no longer corresponding to this image and this change can be quickly identified at the receiver site. Hence, it is called fragile watermarking to differentiate this method from regular watermarking that should present some robustness against image alterations. There is no need to attach any auxiliary signature data, hence the existing, already standardized transmission channels and storage protocols may be used. The embedding procedure requires to remove some part of the original information. But, by using the BATH dataset comprising 32 000 iris images collected for 1 600 distinct eyes, we verify that the proposed alterations have no impact on iris recognition reliability, although statistically significant, small differences in genuine score distributions are observed when the watermark is embedded to both the enrollment and verification iris images. This is a unique evaluation of how the watermark embedding of digital signatures into the ISO CROPPED iris images (during the enrollment, verification or both) influences the reliability of a well-established, commercial iris recognition methodology. Without loss in generality, this approach is targeted to biometric-enabled ID documents that deploy iris data to authenticate the holder of the document.
5
Content available remote Cross Entropy Clustering Approach to Iris Segmentation for Biometrics Purpose
EN
This work presents the step by step tutorial for how to use cross entropy clustering for the iris segmentation. We present the detailed construction of a suitable Gaussian model which best fits for in the case of iris images, and this is the novelty of the proposal approach. The obtained results are promising, both pupil and iris are extracted properly and all the information necessary for human identification and verification can be extracted from the found parts of the iris.
6
Content available remote Weryfikacja użytkownika na podstawie obrazu tęczówki oka
PL
W artykule przedstawiono autorski algorytm weryfikacji tożsamości na podstawie obrazu tęczówki oka. Algorytm weryfikacji tęczówki składa się z czterech etapów – segmentacji obrazu tęczówki, normalizacji obszaru tęczówki, ekstrakcji cech obszaru tęczówki i klasyfikacji. Etap ekstrakcji cech wyodrębnia informacje na temat histogramu obrazu tęczówki. Algorytm został przetestowany w celu ustalenia współczynników błędnej analizy FAR i FRR. Algorytm zaimplementowano wykorzystując wybrane funkcje przetwarzania obrazu biblioteki OpenCv.
EN
The article presents author's identity verification algorithm based on image of the iris. Iris verification algorithm consists of four modules – segmentation of iris image, normalization of the iris region, features extraction of the iris region, features classification. Features extraction of the iris region extracts information about the histogram of the image. The algorithm has been tested to find performance metrics. The algorithm was implemented using selected image processing functions of OpenCv library.
PL
Artykuł przedstawia badania dotyczące analizy zagadnień związanych z akwizycją zdjęcia tęczówki oka ludzkiego. Prawidłowy obraztęczówki jest kluczowym elementem systemu identyfikacji biometrycznej. Pokazano problemy pojawiające się przy wykonywaniu zdjęć z zastosowaniem prostych i stosunkowo niedrogich rozwiązań, dokonujących akwizycji zarówno w świetle dziennym, jak i bardziej popularnym rozwiązaniu, które wykorzystuje podczerwień. Odniesiono się do wymagań określonych w normach europejskich ISO/IEC WD 19794-6 oraz IEC EN 60825-1.
EN
This paper presents an analysis of issues related to the acquisition of human iris images. Proper acquisition of iris picture is a key element of the biometric identification system. We analyze problems that arise when taking photos using simple and relatively inexpensive solutions, wchich can be widely used as popular biometric test standard. We have designed and built an experimental iris acquisition system with impulsive infrared lightning. In our experiments we performed acquisitions both in daylight and infrared light. The experiments and the investigations were prepared according to the requirements of the European standards ISO / IEC WD 19794-6 and IEC EN 60825-1.
EN
This paper describes an application of the Zak-Gabor-based iris coding to build a secure biometric verification station (SBS), consisting of a professional iris capture camera, a processing unit with specially designed iris recognition and communication software, as well as a display (LCD). Specially designed protocol controls the access to the station and secures the communication between the station and the external world. Reliability of the Zak-Gabor-based coding, similarly to other wavelet-based methods, strongly depends on appropriate choice of the wavelets employed in image coding. This choice cannot be arbitrary and should be adequate to the employed iris image quality. Thus in this paper we propose an automatic iris feature selection mechanism employing, among others, the minimum redundancy, maximum relevance (mRMR) methodology as one, yet important, step to assess the optimal set of wavelets used in this iris recognition application. System reliability is assessed with approximately 1000 iris images collected by the station for 50 different eyes.
EN
The iris biometrics is considered one of the most accurate and robust methods of the identity verification. The unique iris features of an individual can be presented in a compact binary form which can be easily compared with the reference template to confirm identity. However in contrast to passwords and PINs biometric authentication factors cannot be revoked and changed as they are inherently connected to our characteristics. Once the biometric information is compromised or disclosed it became useless for the purpose of authentication. Therefore there is a need to perform iris features matching without revealing the features itself and the reference template. We propose an extension of the standard irisbased verification protocol which introduces a features and template locking mechanism, which guarantee that no sensitive information is exposed. Presented solutions can be easily integrated into authentication mechanisms used in modern computer networks.
10
Content available remote Iris Recognition Using Genetic Algorithms and Asymmetrical SVMs
EN
With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognition algorithms are focused on preprocessing iris images, important new directions have been identified recently in iris biometrics research. These include optimal feature selection and iris pattern classification. In this paper, we propose an iris recognition scheme based on Genetic Algorithms (GAs) and asymmetrical Support Vector Machines (SVMs). Instead of using the whole iris region, we elicit the iris information between the collarette and the pupillary boundaries to suppress effects of eyelids and eyelashes occlusions, and pupil dilation, and to minimize the matching error. To select the optimal feature subset together with increasing the overall recognition accuracy, we apply GAs with a new fitness function. The traditional SVMs are modified into asymmetrical SVMs to handle: (1) highly unbalanced sample proportion between two classes, and 2) different types of misclassification error that lead to different misclassification losses. Furthermore, the parameters of SVMs are optimized in order to improve the generalization performance. The proposed technique is computationally effective, with recognition rates of 97.80% and 95.70% on the Iris Challenge Evaluation (ICE) and the West Virginia University (WVU) iris datasets, respectively.
EN
Efficient and robust segmentation of iris images captured in the uncontrolled environments is one of the challenges of non-cooperative iris recognition systems. We address this problem by proposing a novel iris segmentation algorithm, which is suitable both for monochrome and color eye images. The method presented use modified Hough transform to roughly localize the possible iris and pupil boundaries, approximating them by circles. A voting mechanisms is applied to select a candidate iris regions. The detailed iris boundary is approximated by the spline curve. Its shape is determined by minimizing introduced boundary energy function. The described algorithm was submitted to the NICE.I iris image segmentation contest, when it was ranked 11th and 10th out of total 97.
EN
The paper proposes a new iris coding method based on Zak-Gabor wavelet packet transform. The essential component of the iris recognition methodology design is an effective adaptation of the transformation parameters that makes the coding sensitive to the frequencies characterizing ones eye. We thus propose to calculate the between-to-within class ratio of weakly correlated Zak-Gabor transformation coefficients allowing for selection the frequencies the most suitable for iris recognition. The Zak-Gabor-based coding is non-reversible, i.e., it is impossible to reconstruct the original iris image given the iris template. Additionally, the inference about the iris image properties from the Zak-Gabor-based code is limited, providing a possibility to embed the biometric replay attack prevention methodology into the coding. We present the final prototype system design, including the hardware, and evaluate its performance using the database of 720 iris images.
13
Content available remote Iris Features Extraction Using Beamlets and Wedgelets
EN
A new approach to iris feature extraction using geometrical wavelets is presented. Iris code is generated by using representation of the wavelet coefficients based on a wedgelet dictionary. The accuracy of identification in the case of head inclination by a certain angle for different ranges of possibilities of shifting the iris code is shown. Experimental results on the CASIA iris database show that the proposed method is effective and exhibits encouraging performance.
PL
Niniejszy artykuł opisuje systemy kontroli dostępu bazujące na technologiach biometrycznych, znajdujące się w ofercie Polskich Sieci Elektroenergetycznych - INFO Sp. z o.o. Biometryczne systemy kontroli dostępu gwarantują najwyższy poziom bezpieczeństwa w powiązaniu z wygodą użytkowania (brak konieczności posiadania kart zbliżeniowych). W chwili obecnej systemy biometryczne mogą być używane jako kontrola dostępu do pomieszczeń, zabezpieczenie komputerów, systemy rejestracji czasu pracy. W artykule zostały opisane techniki identyfikacji użytkowników bazujące na rozpoznawaniu tęczówki oka, geometrii dłoni i linii papilarnych. Przedstawione zostały również urządzenia wykonujące identyfikację każdą w wyżej wymienionych technik.
EN
The following article describes biometric access control systems that are offered by Polskie Sieci Elektroenergetyczne - INFO Sp. z o.o. These systems guarantees the highest security level in connection with usage convenience (there is no need to posses ID cards). At present, biometric solutions are used as access control systems, IT security, time-attendance solutions. This article introduces techniques of people identification based on iris recognition, hand geometry and fingerprint recognition. There are also described products that are used in mentioned above identification methods.
PL
Celem prezentowanych w artykule badań było opracowanie i zweryfikowanie algorytmu segmentacji obrazu oka, przeznaczonego do systemu identyfikacji osób przy wykorzystaniu wzoru tęczówki. Pierwsza część artykułu stanowi wprowadzenie do biometrii oraz przegląd znanych w literaturze metod segmentacji obrazu oka. Zaproponowany algorytm, przedstawiony w drugiej części artykułu, został zaimplementowany w języku C++, a następnie zweryfikowany na dostępnych bazach danych pozwolił uzyskać wysoki poziom skuteczności segmentacji.
EN
The aim of the presented researches was to perform and verify algorithm for eye image segmentation that would be applied in iris recognition system. The first part of the paper contains introduction to biometry and literature survey. Proposed algorithm, described in the second part of this paper, has been implemented in the C++ programming language and verified on available databases, for which the authors have achieved high level of segmentation effectiveness.
EN
In this paper the Iris Finder program is presented for the first time. It is software for reliable iris localisation in images taken under visible light. The program is intended for researches on a system for automatic persons identification based on iris pattern. Performance of the software was verified on two databases. For the first database the program correctly localises iris for all 141 images. For the second database the iris was incorrectly localised only for 4 images from the entire database containing 1205 units.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.