Accurate iris boundary detection in iris-based biometric authentication process

被引:0
|
作者
Dey, Somnath [1 ]
Samanta, Debasis [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
关键词
iris recognition; biometric authentication; image segmentation; image processing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents an efficient; technique for accurate de, tection of iris boundary, which is an important issue for any iris-based biometric identification system. Our proposed technique follows scaling, histogram equalization, edge detection and finally removal of unnecessary edges present in the eye image. Scaling and removing unnecessary edges enables us to reduce the search space for iris boundary. Experimental results show that with our approach it is possible to detect iris boundary as much as 98% of the eye images in CASIA database accurately and it needs only 25% time compared to the existing approaches.
引用
收藏
页码:600 / 607
页数:8
相关论文
共 50 条
  • [1] Adoption of Iris-Based Authentication
    Mohammadi, S.
    Kaldi, A.
    [J]. IEEM: 2008 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-3, 2008, : 1582 - 1586
  • [2] Fusion of biometric systems using Boolean combination: an application to iris-based authentication
    Granger, Eric
    Khreich, Wael
    Sabourin, Robert
    Gorodnichy, Dmitry O.
    [J]. INTERNATIONAL JOURNAL OF BIOMETRICS, 2012, 4 (03) : 291 - 315
  • [3] GA-based iris/sclera boundary detection for biometric iris identification
    Tambouratzis, Tatiana
    Masouris, Michael
    [J]. ADAPTIVE AND NATURAL COMPUTING ALGORITHMS, PT 2, 2007, 4432 : 457 - +
  • [4] An Iris-Based Authentication Framework to Prevent Presentation Attacks
    Shahriar, Hossain
    Haddad, Hisham
    Islam, Mahbubul
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 504 - 509
  • [5] Iris-based authentication system with template protection and renewability
    Ercole, Chiara
    Campisi, Patrizio
    Neri, Alessandro
    [J]. OPTICS AND PHOTONICS FOR COUNTERTERRORISM AND CRIME FIGHTING III, 2007, 6741
  • [6] Attacks and Mitigation Techniques for Iris-based Authentication Systems
    Etienne, Laeticia
    Shahriar, Hossain
    [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1101 - 1102
  • [7] Iris-based biometric recognition using dyadic wavelet transform
    Sanchez-Avila, C
    Sanchez-Reillo, R
    de Martin-Roche, D
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2002, 17 (10) : 3 - 6
  • [8] Effective Combination of Iris-based Cancelable Biometrics and Biometric Cryptosystems
    Ouda, Osama
    Tsumura, Norimichi
    Nakaguchi, Toshiya
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 658 - 668
  • [9] Iris-based continuous authentication in mobile ad hoc network
    Ramkumar, D.
    Annadurai, C.
    Nelson, I
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (08):
  • [10] The Acceptability of Iris-based Authentication for Public Domain: An Instrumental Design
    Jimoh, R. G.
    Shiratuddin, Norshuhada
    [J]. PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 669 - 673