ABSTRACT
In this paper, we propose a design scheme of fast iris authentication system based on Android platform. Specifically, in the proposed system, the iris image acquisition, processing, identification and certification are integrated, and a two-dimensional (2D) Log Gabor orthogonal filter is used to extract features from the normalized iris image. By comparing the Hamming Distance (HD), the matching between encodings can be implemented, so that the real-time processing and rapid recognition of iris can be achieved. Experiments reveal that this system has the advantages of high speed, high accuracy and high robustness.
- Raja, K. B, et al. 2015. Multi-modal authentication system for smartphones using face, iris and periocular. International Conference on Biometrics IEEE, 143--150.Google ScholarCross Ref
- Bazrafkan, Shabab, and P. Corcoran. 2017. Enhancing Iris Authentication on Handheld Devices using Deep Learning derived segmentation techniques. IEEE International Conference on Consumer Electronics IEEE.Google Scholar
- Thavalengal, Shejin, P. Bigioi, and P. Corcoran. 2015. Evaluation of combined visible/NIR camera for iris authentication on smartphones. Computer Vision and Pattern Recognition Workshops IEEE, 42--49.Google Scholar
- Albadarneh, Aalaa, I. Albadarneh, and J. Alqatawna. 2015. Iris recognition system for secure authentication based on texture and shape features. Applied Electrical Engineering and Computing Technologies IEEE, 1--6.Google Scholar
- Vanthana, P. Steffi, and A. Muthukumar. 2015. Iris authentication using Gray Level Co-occurrence Matrix and Hausdorff Dimension. International Conference on Computer Communication and Informatics IEEE, 1--5.Google Scholar
- Shahriar, Hossain, H. Haddad and M. Islam. 2017. An Iris-Based Authentication Framework to Prevent Presentation Attacks. Computer Software and Applications Conference IEEE, 504--509.Google Scholar
- Guo, Qiaoli, and J. Zheng. 2018. An Iris Recognition Algorithm for Identity Authentication. International Conference on Intelligent Transportation, Big Data & Smart City IEEE Computer Society, 621--624.Google Scholar
- Sanderson, S. and J. H. Erbetta. 2000. Authentication for secure environments based on iris scanning technology. Visual Biometrics IET, 8/1--8/7.Google Scholar
- Chong, Siew Chin, A. B. J. Teoh and D. C. L. Ngo. 2006. Iris Authentication Using Privatized Advanced Correlation Filter. International Conference on Biometrics Springer, Berlin, Heidelberg, 382--388. Google ScholarDigital Library
- Venugopal Patnaik K R L M Prashanth C R K B Raja. 2012. Personal Authentication by Fusion of PCA and FFT Coefficients of Iris. International Conference on Artificial Intelligence and Soft Computing.Google Scholar
- Cui, Jiali, et al. 2004. A fast and robust iris localization method based on texture segmentation. Proceedings of SPIE - The International Society for Optical Engineering, 401--408.Google Scholar
- Proenca, Hugo, and L. A. Alexandre. 2009. Iris Recognition: An Analysis of the Aliasing Problem in the Iris Normalization Stage. International Conference on Computational Intelligence and Security IEEE, 1771--1774.Google Scholar
- Ko, Jong Gook, et al. 2007. A Novel and Efficient Feature Extraction Method for Iris Recognition. ETRI Journal, 399--401.Google Scholar
- Azizi, Amir, and H. R. Pourreza. 2009. Efficient IRIS Recognition through Improvement of Feature Extraction and subset Selection. Computer Science.Google Scholar
- Daugman, J. 2007. New methods in iris recognition. IEEE Transactions on Systems Man & Cybernetics Part B, 1167--1175. Google ScholarDigital Library
Index Terms
- Design of Fast Iris Authentication System Based on Android Platform
Recommendations
Iris recognition: an emerging biometric technology
ISPRA'07: Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and AutomationIn this paper, iris recognition as one of the important method of biometrics-based identification systems and iris recognition algorithm is described. As technology advances and information and intellectual properties are wanted by many unauthorized ...
Segmentation and localization schemes for non-ideal iris biometric systems
Contemporary surveys focus on the ideal iris biometric systems, which are generally used for overt applications: e.g., border crossing control. Notably, these systems perform well for ideal data, but poorly for non-ideal data. It is because that their ...
Iris recognition: an emerging biometric technology
ISPRA'07: Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and AutomationIn this paper, iris recognition as one of the important method of biometrics-based identification systems and iris recognition algorithm is described. As technology advances and information and intellectual properties are wanted by many unauthorized ...
Comments