skip to main content
10.1145/3289430.3289450acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdiotConference Proceedingsconference-collections
research-article

Design of Fast Iris Authentication System Based on Android Platform

Authors Info & Claims
Published:24 October 2018Publication History

ABSTRACT

In this paper, we propose a design scheme of fast iris authentication system based on Android platform. Specifically, in the proposed system, the iris image acquisition, processing, identification and certification are integrated, and a two-dimensional (2D) Log Gabor orthogonal filter is used to extract features from the normalized iris image. By comparing the Hamming Distance (HD), the matching between encodings can be implemented, so that the real-time processing and rapid recognition of iris can be achieved. Experiments reveal that this system has the advantages of high speed, high accuracy and high robustness.

References

  1. Raja, K. B, et al. 2015. Multi-modal authentication system for smartphones using face, iris and periocular. International Conference on Biometrics IEEE, 143--150.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bazrafkan, Shabab, and P. Corcoran. 2017. Enhancing Iris Authentication on Handheld Devices using Deep Learning derived segmentation techniques. IEEE International Conference on Consumer Electronics IEEE.Google ScholarGoogle Scholar
  3. Thavalengal, Shejin, P. Bigioi, and P. Corcoran. 2015. Evaluation of combined visible/NIR camera for iris authentication on smartphones. Computer Vision and Pattern Recognition Workshops IEEE, 42--49.Google ScholarGoogle Scholar
  4. Albadarneh, Aalaa, I. Albadarneh, and J. Alqatawna. 2015. Iris recognition system for secure authentication based on texture and shape features. Applied Electrical Engineering and Computing Technologies IEEE, 1--6.Google ScholarGoogle Scholar
  5. Vanthana, P. Steffi, and A. Muthukumar. 2015. Iris authentication using Gray Level Co-occurrence Matrix and Hausdorff Dimension. International Conference on Computer Communication and Informatics IEEE, 1--5.Google ScholarGoogle Scholar
  6. Shahriar, Hossain, H. Haddad and M. Islam. 2017. An Iris-Based Authentication Framework to Prevent Presentation Attacks. Computer Software and Applications Conference IEEE, 504--509.Google ScholarGoogle Scholar
  7. Guo, Qiaoli, and J. Zheng. 2018. An Iris Recognition Algorithm for Identity Authentication. International Conference on Intelligent Transportation, Big Data & Smart City IEEE Computer Society, 621--624.Google ScholarGoogle Scholar
  8. Sanderson, S. and J. H. Erbetta. 2000. Authentication for secure environments based on iris scanning technology. Visual Biometrics IET, 8/1--8/7.Google ScholarGoogle Scholar
  9. Chong, Siew Chin, A. B. J. Teoh and D. C. L. Ngo. 2006. Iris Authentication Using Privatized Advanced Correlation Filter. International Conference on Biometrics Springer, Berlin, Heidelberg, 382--388. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Venugopal Patnaik K R L M Prashanth C R K B Raja. 2012. Personal Authentication by Fusion of PCA and FFT Coefficients of Iris. International Conference on Artificial Intelligence and Soft Computing.Google ScholarGoogle Scholar
  11. Cui, Jiali, et al. 2004. A fast and robust iris localization method based on texture segmentation. Proceedings of SPIE - The International Society for Optical Engineering, 401--408.Google ScholarGoogle Scholar
  12. Proenca, Hugo, and L. A. Alexandre. 2009. Iris Recognition: An Analysis of the Aliasing Problem in the Iris Normalization Stage. International Conference on Computational Intelligence and Security IEEE, 1771--1774.Google ScholarGoogle Scholar
  13. Ko, Jong Gook, et al. 2007. A Novel and Efficient Feature Extraction Method for Iris Recognition. ETRI Journal, 399--401.Google ScholarGoogle Scholar
  14. Azizi, Amir, and H. R. Pourreza. 2009. Efficient IRIS Recognition through Improvement of Feature Extraction and subset Selection. Computer Science.Google ScholarGoogle Scholar
  15. Daugman, J. 2007. New methods in iris recognition. IEEE Transactions on Systems Man & Cybernetics Part B, 1167--1175. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Design of Fast Iris Authentication System Based on Android Platform

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      BDIOT '18: Proceedings of the 2018 2nd International Conference on Big Data and Internet of Things
      October 2018
      217 pages
      ISBN:9781450365192
      DOI:10.1145/3289430

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 October 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate75of136submissions,55%
    • Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader