SlideShare a Scribd company logo
RashaTarawneh Omamah Thunibat
Presented to:
Dr Ahmad Alhassanat
Mutah university
Biometric course :
 Introduction
 What the iris?
 Why iris?
 History of iris Recognition
 Applications
 Methods of iris recognition system
 Image Acquisition
 Segmentation
 Normalization
 Iris Feature Encoding
 Iris code matching
 Applications
 Disadvantages
 Conclusion
 References
 It is considered to be the most accurate biometric
technology available today.
 Iris recognition is a method of
biometric identification and
authentication that use pattern-
recognition techniques based on
high resolution images of the
irises of an individual's eyes .
The colored ring around the pupil of the eye is called
the Iris
The iris is a thin circular diaphragm, which lies
between the cornea and the lens of the human eye.
The iris is perforated close to its centre by a circular
aperture known as the pupil.
The function of the iris is to control the amount of light
entering through the pupil.
The average diameter of the iris is 12 mm, and the
pupil size can vary from 10% to 80% of the iris
diameter [2].
 The iris consists of a number of layers, the lowest is
the epithelium layer, which contains dense
pigmentation cells.The stromal layer lies above the
epithelium layer, and contains blood vessels,
pigment cells and the two iris muscles.
 The density of stromal pigmentation determines the
colour of the iris.
The externally visible surface of the
multi-layered iris contains two zones,
which often differ in colour An outer
ciliary zone and an inner pupillary zone,
and these two zones are divided by the
collarette – which appears as a zigzag
pattern[3].
 Externally visible highly protected internal
organ.
 Unique patterns.
 Not genetically connected unlike eye color.
 Stable with age.
 Impossible to alter surgically.
 Living Password, Can not be forgotten or copied.
 Works on blind person.
 User needs not to touch appliances.
 Accurate , faster , and supports large data base.
Iris sem
Comparison between cost and accuracy
1997-1999
1987
1987
1980
The concept of Iris Recognition was first proposed by
Dr. Frank Burch in 1939.
It was first implemented in 1990
when Dr. John Daugman created the
algorithms for it.
These algorithms employ methods
of pattern recognition and some
mathematical calculations for iris
recognition.
 . ATMs
 .Computer login:The iris as a living
password.
 · National Border Controls
 · Driving licenses and other personal
certificates.
 · benefits authentication.
 ·birth certificates, tracking missing.
 · Credit-card authentication.
 · Anti-terrorism (e.g.:— suspect
Screening at airports)
 · Secure financial transaction (e-
commerce, banking).
 · Internet security, control of access to
privileged information.
 In identifying one’s iris, there are 2 methods for its
recognition and are:
1. Active
2. Passive
The active Iris system requires that a user be anywhere
from six to fourteen inches away from the camera.
The passive system allows the user to be anywhere
from one to three feet away from the camera that
locates the focus on the iris.
Image
Acquisition
Iris
Segmentation Normalization
Feature
Encoding
Feature
Matching
IrisTemplates
Database
Eye Image Iris Region
Feature points in the
iris region
IrisTemplate
Identify or Reject
Subject
 The first step, image acquisition
deals with capturing sequence of iris
images from the subject using
cameras and sensors with High
resolution and good sharpness.
 These images should clearly show
the entire eye especially iris and
pupil part, and then some
preprocessing operation may be
applied to enhance the quality of
image e.g. histogram equalization,
filtering noise removal etc.
(CASIA) eye image database
The first stage of iris segmentation
to isolate the actual iris region in a
digital eye image.
The iris region, can be
approximated by two circles, one
for the iris/sclera boundary and
another, interior to the first, for
the iris/pupil boundary.
the derivatives in the horizontal direction for detecting
the eyelids, and in the vertical direction for detecting the
outer circular boundary of the iris .
Taking only the vertical gradients for locating the iris
boundary will reduce influence of the eyelids when
performing circular Hough transform.
 The circular Hough transform can be employed to deduce the
radius and centre coordinates of the pupil and iris regions:
 Firstly, an edge map is generated by calculating the first
derivatives of intensity values in an eye image and then
thresholding the result.
 From the edge map, votes are cast in Hough space for the
parameters of circles passing through each edge point,These
parameters are the centre coordinates xc and yc, and the radius r,
which are able to define any circle according to the equation :
A maximum point in the Hough space will correspond to the
radius and centre coordinates of the circle best defined by the
edge points.
 eyelashes are treated as belonging to two types :
1 -separable eyelashes:
which are isolated in the image .
2-multiple eyelashes:
which are bunched together and overlap in the eye image.
 Eyelids and Eyelashes are the main noise factor in the iris image.
 These noise factors can affect the accuracy of the iris recognition system.
 After applying circular Hough transform to iris, we are applying linear Hough
transform and we get line detected noise region in the iris image.

 We have to remove these detected eyelids and eyelashes from the iris image
Thresolding is used for the removal of eyelashes.Then, the noise free iris
image can be available for future use.
1- Edge Detector
2- HoughTransform
Smoothing
Finding
gradient
Double
thresholding Edge
LINEAR HOUGH TRANSFORM
CIRCULAR HOUGH TRANSFORM
Process of finding the iris in an image
a. Iris and pupil localization: Pupil and Iris are considered as
two circles using Circular HoughTransform .
b. Eye lid detection and Eye lash noise removal using linear Hough
Transform method.
 Various Normalisation methods :
1- Daugman’s Rubber sheet Model by
Daugman [2]
2- Image Registration modlyed byWildes et al
.[9]
3-Virtual Circles by Boles [14] .
 Once the iris segmented ,the next stage transform the iris
region so that it has fixed dimensions in order to allow
comparisons.
 Since variations in the eye like pupil dilation and the
inconsistence iris normalization is needed.
Pupil dilation inconsistence iris
 Normalization process involves unwrapping the iris and
converting it in to its polar equivalent .
 It is done using Daugman’s Rubber sheet model .
 The centre of the pupil was considered as the reference
point, and radial vectors pass through the iris region .
 A number of data points are selected along each radial line is
defined as the radial resolution.The number of radial lines
going around the iris region is defined as the angular
resolution.
 where displacement of the center of the pupil relative to the center of the iris is given by 𝑜 𝑥, 𝑜 𝑦 .
 r’ is the distance between the edge of the pupil and edge of the iris at an angle, θ around the region, and rIis the
radius of the iris.
 The remapping formula first gives the radius of the iris region as a function of the angle θ.
 Normalisation produces a 2D array with horizontal
dimensions of angular resolution and vertical dimensions of
radial resolution.
 Rubber sheet model does not compensate for rotational
inconsistencies
 Various feature encoding methods :
1-Gabor Filters employed by Daugman in [2] andTuama.[6]
2- Log-Gabor Filters employed by D. Field.[15]
.
3- HaarWavelet employed by Lim et al.. [16]
4- Zero –crossing of the 1D wavelet employed by Boles and
Boashash .[14]
5- Laplacian of gaussian filters employed byWildes et al[9]
 Feature Encoding : creating a template containing only the
most discriminating features of the iris .
 Extracted the features of the normalized iris by filtering the
normalized iris region . [6]
 a Gabor filter is a sine ( or cosine) wave modulated by a
Gaussian . it is applied on the entire image at once and
unique features are extracted from the image
 Feature encoding was implemented by convolving the
normalized iris with 1D Gabor wavelets.
 The Daugman system makes use of polar coordinates for
normalisation, therefore in polar form the filters are given as :
(r0, θ0) specify the centre frequency of the filter. (α,β) specify the effective width and length.
 The angular direction is taken rather than the radial one ,
since maximum independence occurs in the angular direction
.
 Daugman demodulates the output of the Gabor filters in
order to compress the data this is done by quantising the
phase information in to four levels , for each possible
quadrant in the complex plane . [7]
 The demodulation and phase Quantisation process can be
represented as
where h{Re, Im} can be regarded as a complex valued bit whose real and imaginary components are dependent
on the sign of the 2D integral, and I( ρ,θ ) is the raw iris image in a dimensionless polar coordinate system.
 Using real and imaginary values, the phase information is
extracted and encoded in a binary pattern .
 The total number of bits in the template will be the angular
resolution times the radial resolution , times 2, times number
of filters used .
 The number of filters,their centre frequencies and parameters
of the modulating Gaussian function must be detecting
according to the used data base .
Iris sem
 Various feature matching methods :
1- Hamming distance employed by Daugman [2]
2-Weighted Euclidean Distance employed by Zhu et al[17] .
3- Normalised correlation employed byWildes [9] .
 The Hamming Distance was chosen as a matching metric ,
which gave a measure of how many bits disagreed between
two templates .
 When the hamming distance of two templates is calculated ,
one template is shifted left and right bit-wise and a number
of hamming distance values are calculated from successive
shifts , in order to account for rotational inconsistencies .
 The actual number of shifts required to normalise rotational
inconsistencies will be determined by the maximum angle
difference between two images of the same eye .
 One shift is defined as one shift to the left , followed by one
shift to the right .
 This method is suggested by Daugman . [7]
Iris sem
 The Chines Academy of Sciences – Institute of Automation
(CASIA) eye image database contains 756 greyscale eye
images with 108 unique eyes or class are taken from two
sessions .[8]
Threshold FAR (%) FRR (%)
0.20 0.000 99.047
0.25 0.000 82.787
0.30 0.000 37.880
0.35 0.000 5.181
0.40 0.005 0.238
0.45 7.599 0.000
0.50 99.499 0.000
Table 1 – False accept and false reject rates for the ‘CASIA-a’ data set with
different separation points using the optimum parameters.
 Accuracy changes with user’s height ,illumination , Image
quality etc.
 Person needs to be still, difficult to scan if not co-operated.
 Risk of fake Iris lenses.
 Alcohol consumption causes deformation in Iris pattern
 Expensive .
 Highly accurate but easy
 Fast
 Needs some developments
 Experiments are going on
 Will become day to day technology very soon
 [1] · http://www.cl.cam.ac.uk
 [2] J. Daugman. How iris recognition works. Proceedings of 2002 International
Conference on Image Processing,Vol. 1, 2002.
 [3]E.Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976.
 [4] L.Flom and A. Safir : Iris Recognition System .U.S. atent No.4641394(1987).
 [5]T. Chuan Chen K . Liang Chung : An Efficient Randomized Algorithm for
Detecting Circles.
Computer vision and Image UnderstandingVol.83(2001) 172-191.
 [6] Amel saeedTuama “ It is Image Segmentation and RecognitionTechnology”
vol-3 No.2 April 2012 .
 [7] S. Sanderson, J. Erbetta. Authentication for secure environments based on iris
scanning technology. IEEColloquium onVisual Biometrics, 2000 .
 [8] E.Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976 .
 [9] R.Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride. A system for
automated iris recognition. Proceedings IEEE Workshop on Applications of Computer Vision,
Sarasota, FL, pp. 121-128, 1994.
 [10] W. Kong, D. Zhang. Accurate iris segmentation based on novel reflection and eyelash
detection model. Proceedings of 2001 International Symposium on Intelligent Multimedia, Video
and Speech Processing, Hong Kong, 2001.
 [11] C.Tisse, L. Martin, L.Torres, M. Robert. Person identification technique using human iris
recognition. International Conference onVision Interface, Canada, 2002.
 [12] L. Ma,Y. Wang,T.Tan. Iris recognition using circular symmetric filters. National Laboratory of
Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002.
 [13] N. Ritter. Location of the pupil-iris border in slit-lamp images of the cornea. Proceedings of
the International Conference on Image Analysis and Processing, 1999.
 [14] W. Boles, B. Boashash. A human identification technique using images of the
iris and wavelet transform. IEEETransactions on Signal Processing,Vol. 46, No. 4,
1998.
 [15] D. Field. Relations between the statistics of natural images and the response
properties of cortical cells. Journal of the Optical Society of America, 1987.
 [16] S. Lim, K. Lee, O. Byeon,T. Kim. Efficient iris recognition through
improvement of feature vector and classifier. ETRIJournal,Vol. 23, No. 2, Korea,
2001.
 [17]Y. Zhu,T.Tan,Y.Wang. Biometric personal identification based on iris
patterns. Proceedings of the 15th International Conference on Pattern Recognition,
Spain,Vol. 2, 2000.


More Related Content

PPT
Study and development of Iris Segmentation and Normalization Technique
PPTX
Iris recognition seminar
PDF
Iris Recognition
PDF
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
PPTX
Iris biometrics
PPTX
IRIS RECOGNITION
PPTX
Iris recognition
PPT
Final iris recognition
Study and development of Iris Segmentation and Normalization Technique
Iris recognition seminar
Iris Recognition
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
Iris biometrics
IRIS RECOGNITION
Iris recognition
Final iris recognition

What's hot (20)

PPTX
Iris recognition
PPTX
Iris recognition
PPTX
Pattern recognition IRIS recognition
PPTX
Iris Recognition Technology
PDF
Iris recognition system
PPTX
Iris scanning
PPTX
Iris Scan
PPTX
Biometrics iris recognition
PPTX
Iris ppt
PPT
iris recognition system as means of unique identification
PPTX
Seminar
PPT
Iris recognition
PPT
Iris Biometric for Person Identification
PPTX
Iris segmentation analysis using integro differential operator and hough tran...
PDF
Iris feature extraction
PDF
Biometrics Iris Scanning: A Literature Review
PPTX
IRIS &RETINAL SCANNING PPT
PPT
Retina recognition biometrics drishtysharma
DOC
8 g iris-recognition_system
PPT
Retinal Recognition
Iris recognition
Iris recognition
Pattern recognition IRIS recognition
Iris Recognition Technology
Iris recognition system
Iris scanning
Iris Scan
Biometrics iris recognition
Iris ppt
iris recognition system as means of unique identification
Seminar
Iris recognition
Iris Biometric for Person Identification
Iris segmentation analysis using integro differential operator and hough tran...
Iris feature extraction
Biometrics Iris Scanning: A Literature Review
IRIS &RETINAL SCANNING PPT
Retina recognition biometrics drishtysharma
8 g iris-recognition_system
Retinal Recognition
Ad

Viewers also liked (9)

PPTX
Iris & Peri-ocular Recognition
DOCX
Pengolahan Citra Digital (Resume materi kuliah)
PPTX
Pengolahan Citra Digital - Bab15 - Pengenalan Pola
DOCX
Modul praktikum pengolahan citra digital
PPTX
Centerix Iris-Presentation
PPT
An atm with an iris recognition
PDF
Pengolahan Citra Digital
PPT
Biometric's final ppt
PDF
Iris data analysis example in R
Iris & Peri-ocular Recognition
Pengolahan Citra Digital (Resume materi kuliah)
Pengolahan Citra Digital - Bab15 - Pengenalan Pola
Modul praktikum pengolahan citra digital
Centerix Iris-Presentation
An atm with an iris recognition
Pengolahan Citra Digital
Biometric's final ppt
Iris data analysis example in R
Ad

Similar to Iris sem (20)

PDF
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
PDF
E017443136
PDF
Iris Recognition Using Support Vector Machine and ANN.pdf
PDF
Ijcse13 05-01-001
PDF
Ijcse13 05-01-001
PDF
Efficient Small Template Iris Recognition System Using Wavelet Transform
PDF
Pupil Detection Based on Color Difference and Circular Hough Transform
PDF
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
PDF
A New Approach of Iris Detection and Recognition
PDF
Iris recognition for personal identification using lamstar neural network
PDF
PDF
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
PDF
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
PDF
A robust iris recognition method on adverse conditions
PDF
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
PDF
International Journal of Computer Science, Engineering and Information Techno...
PDF
PDF
IRJET- Survey of Iris Recognition Techniques
PDF
E010222124
PDF
Iris Segmentation: a survey
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
E017443136
Iris Recognition Using Support Vector Machine and ANN.pdf
Ijcse13 05-01-001
Ijcse13 05-01-001
Efficient Small Template Iris Recognition System Using Wavelet Transform
Pupil Detection Based on Color Difference and Circular Hough Transform
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
A New Approach of Iris Detection and Recognition
Iris recognition for personal identification using lamstar neural network
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
A robust iris recognition method on adverse conditions
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
International Journal of Computer Science, Engineering and Information Techno...
IRJET- Survey of Iris Recognition Techniques
E010222124
Iris Segmentation: a survey

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Computing-Curriculum for Schools in Ghana
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
master seminar digital applications in india
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Computing-Curriculum for Schools in Ghana
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPH.pptx obstetrics and gynecology in nursing
human mycosis Human fungal infections are called human mycosis..pptx
O7-L3 Supply Chain Operations - ICLT Program
Basic Mud Logging Guide for educational purpose
Pharmacology of Heart Failure /Pharmacotherapy of CHF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
master seminar digital applications in india
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Supply Chain Operations Speaking Notes -ICLT Program
01-Introduction-to-Information-Management.pdf
Microbial diseases, their pathogenesis and prophylaxis
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Microbial disease of the cardiovascular and lymphatic systems
VCE English Exam - Section C Student Revision Booklet
O5-L3 Freight Transport Ops (International) V1.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf

Iris sem

  • 1. RashaTarawneh Omamah Thunibat Presented to: Dr Ahmad Alhassanat Mutah university Biometric course :
  • 2.  Introduction  What the iris?  Why iris?  History of iris Recognition  Applications  Methods of iris recognition system  Image Acquisition  Segmentation  Normalization  Iris Feature Encoding  Iris code matching  Applications  Disadvantages  Conclusion  References
  • 3.  It is considered to be the most accurate biometric technology available today.  Iris recognition is a method of biometric identification and authentication that use pattern- recognition techniques based on high resolution images of the irises of an individual's eyes .
  • 4. The colored ring around the pupil of the eye is called the Iris
  • 5. The iris is a thin circular diaphragm, which lies between the cornea and the lens of the human eye. The iris is perforated close to its centre by a circular aperture known as the pupil. The function of the iris is to control the amount of light entering through the pupil. The average diameter of the iris is 12 mm, and the pupil size can vary from 10% to 80% of the iris diameter [2].
  • 6.  The iris consists of a number of layers, the lowest is the epithelium layer, which contains dense pigmentation cells.The stromal layer lies above the epithelium layer, and contains blood vessels, pigment cells and the two iris muscles.
  • 7.  The density of stromal pigmentation determines the colour of the iris. The externally visible surface of the multi-layered iris contains two zones, which often differ in colour An outer ciliary zone and an inner pupillary zone, and these two zones are divided by the collarette – which appears as a zigzag pattern[3].
  • 8.  Externally visible highly protected internal organ.  Unique patterns.  Not genetically connected unlike eye color.  Stable with age.  Impossible to alter surgically.  Living Password, Can not be forgotten or copied.  Works on blind person.  User needs not to touch appliances.  Accurate , faster , and supports large data base.
  • 10. Comparison between cost and accuracy
  • 11. 1997-1999 1987 1987 1980 The concept of Iris Recognition was first proposed by Dr. Frank Burch in 1939. It was first implemented in 1990 when Dr. John Daugman created the algorithms for it. These algorithms employ methods of pattern recognition and some mathematical calculations for iris recognition.
  • 12.  . ATMs  .Computer login:The iris as a living password.  · National Border Controls  · Driving licenses and other personal certificates.  · benefits authentication.  ·birth certificates, tracking missing.  · Credit-card authentication.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e- commerce, banking).  · Internet security, control of access to privileged information.
  • 13.  In identifying one’s iris, there are 2 methods for its recognition and are: 1. Active 2. Passive The active Iris system requires that a user be anywhere from six to fourteen inches away from the camera. The passive system allows the user to be anywhere from one to three feet away from the camera that locates the focus on the iris.
  • 14. Image Acquisition Iris Segmentation Normalization Feature Encoding Feature Matching IrisTemplates Database Eye Image Iris Region Feature points in the iris region IrisTemplate Identify or Reject Subject
  • 15.  The first step, image acquisition deals with capturing sequence of iris images from the subject using cameras and sensors with High resolution and good sharpness.  These images should clearly show the entire eye especially iris and pupil part, and then some preprocessing operation may be applied to enhance the quality of image e.g. histogram equalization, filtering noise removal etc. (CASIA) eye image database
  • 16. The first stage of iris segmentation to isolate the actual iris region in a digital eye image. The iris region, can be approximated by two circles, one for the iris/sclera boundary and another, interior to the first, for the iris/pupil boundary.
  • 17. the derivatives in the horizontal direction for detecting the eyelids, and in the vertical direction for detecting the outer circular boundary of the iris . Taking only the vertical gradients for locating the iris boundary will reduce influence of the eyelids when performing circular Hough transform.
  • 18.  The circular Hough transform can be employed to deduce the radius and centre coordinates of the pupil and iris regions:  Firstly, an edge map is generated by calculating the first derivatives of intensity values in an eye image and then thresholding the result.  From the edge map, votes are cast in Hough space for the parameters of circles passing through each edge point,These parameters are the centre coordinates xc and yc, and the radius r, which are able to define any circle according to the equation : A maximum point in the Hough space will correspond to the radius and centre coordinates of the circle best defined by the edge points.
  • 19.  eyelashes are treated as belonging to two types : 1 -separable eyelashes: which are isolated in the image . 2-multiple eyelashes: which are bunched together and overlap in the eye image.  Eyelids and Eyelashes are the main noise factor in the iris image.  These noise factors can affect the accuracy of the iris recognition system.  After applying circular Hough transform to iris, we are applying linear Hough transform and we get line detected noise region in the iris image.   We have to remove these detected eyelids and eyelashes from the iris image Thresolding is used for the removal of eyelashes.Then, the noise free iris image can be available for future use.
  • 20. 1- Edge Detector 2- HoughTransform Smoothing Finding gradient Double thresholding Edge LINEAR HOUGH TRANSFORM CIRCULAR HOUGH TRANSFORM
  • 21. Process of finding the iris in an image a. Iris and pupil localization: Pupil and Iris are considered as two circles using Circular HoughTransform . b. Eye lid detection and Eye lash noise removal using linear Hough Transform method.
  • 22.  Various Normalisation methods : 1- Daugman’s Rubber sheet Model by Daugman [2] 2- Image Registration modlyed byWildes et al .[9] 3-Virtual Circles by Boles [14] .
  • 23.  Once the iris segmented ,the next stage transform the iris region so that it has fixed dimensions in order to allow comparisons.  Since variations in the eye like pupil dilation and the inconsistence iris normalization is needed. Pupil dilation inconsistence iris  Normalization process involves unwrapping the iris and converting it in to its polar equivalent .
  • 24.  It is done using Daugman’s Rubber sheet model .  The centre of the pupil was considered as the reference point, and radial vectors pass through the iris region .  A number of data points are selected along each radial line is defined as the radial resolution.The number of radial lines going around the iris region is defined as the angular resolution.
  • 25.  where displacement of the center of the pupil relative to the center of the iris is given by 𝑜 𝑥, 𝑜 𝑦 .  r’ is the distance between the edge of the pupil and edge of the iris at an angle, θ around the region, and rIis the radius of the iris.  The remapping formula first gives the radius of the iris region as a function of the angle θ.
  • 26.  Normalisation produces a 2D array with horizontal dimensions of angular resolution and vertical dimensions of radial resolution.  Rubber sheet model does not compensate for rotational inconsistencies
  • 27.  Various feature encoding methods : 1-Gabor Filters employed by Daugman in [2] andTuama.[6] 2- Log-Gabor Filters employed by D. Field.[15] . 3- HaarWavelet employed by Lim et al.. [16] 4- Zero –crossing of the 1D wavelet employed by Boles and Boashash .[14] 5- Laplacian of gaussian filters employed byWildes et al[9]
  • 28.  Feature Encoding : creating a template containing only the most discriminating features of the iris .  Extracted the features of the normalized iris by filtering the normalized iris region . [6]  a Gabor filter is a sine ( or cosine) wave modulated by a Gaussian . it is applied on the entire image at once and unique features are extracted from the image  Feature encoding was implemented by convolving the normalized iris with 1D Gabor wavelets.
  • 29.  The Daugman system makes use of polar coordinates for normalisation, therefore in polar form the filters are given as : (r0, θ0) specify the centre frequency of the filter. (α,β) specify the effective width and length.  The angular direction is taken rather than the radial one , since maximum independence occurs in the angular direction .
  • 30.  Daugman demodulates the output of the Gabor filters in order to compress the data this is done by quantising the phase information in to four levels , for each possible quadrant in the complex plane . [7]  The demodulation and phase Quantisation process can be represented as where h{Re, Im} can be regarded as a complex valued bit whose real and imaginary components are dependent on the sign of the 2D integral, and I( ρ,θ ) is the raw iris image in a dimensionless polar coordinate system.
  • 31.  Using real and imaginary values, the phase information is extracted and encoded in a binary pattern .  The total number of bits in the template will be the angular resolution times the radial resolution , times 2, times number of filters used .  The number of filters,their centre frequencies and parameters of the modulating Gaussian function must be detecting according to the used data base .
  • 33.  Various feature matching methods : 1- Hamming distance employed by Daugman [2] 2-Weighted Euclidean Distance employed by Zhu et al[17] . 3- Normalised correlation employed byWildes [9] .
  • 34.  The Hamming Distance was chosen as a matching metric , which gave a measure of how many bits disagreed between two templates .  When the hamming distance of two templates is calculated , one template is shifted left and right bit-wise and a number of hamming distance values are calculated from successive shifts , in order to account for rotational inconsistencies .
  • 35.  The actual number of shifts required to normalise rotational inconsistencies will be determined by the maximum angle difference between two images of the same eye .  One shift is defined as one shift to the left , followed by one shift to the right .  This method is suggested by Daugman . [7]
  • 37.  The Chines Academy of Sciences – Institute of Automation (CASIA) eye image database contains 756 greyscale eye images with 108 unique eyes or class are taken from two sessions .[8]
  • 38. Threshold FAR (%) FRR (%) 0.20 0.000 99.047 0.25 0.000 82.787 0.30 0.000 37.880 0.35 0.000 5.181 0.40 0.005 0.238 0.45 7.599 0.000 0.50 99.499 0.000 Table 1 – False accept and false reject rates for the ‘CASIA-a’ data set with different separation points using the optimum parameters.
  • 39.  Accuracy changes with user’s height ,illumination , Image quality etc.  Person needs to be still, difficult to scan if not co-operated.  Risk of fake Iris lenses.  Alcohol consumption causes deformation in Iris pattern  Expensive .
  • 40.  Highly accurate but easy  Fast  Needs some developments  Experiments are going on  Will become day to day technology very soon
  • 41.  [1] · http://www.cl.cam.ac.uk  [2] J. Daugman. How iris recognition works. Proceedings of 2002 International Conference on Image Processing,Vol. 1, 2002.  [3]E.Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976.  [4] L.Flom and A. Safir : Iris Recognition System .U.S. atent No.4641394(1987).  [5]T. Chuan Chen K . Liang Chung : An Efficient Randomized Algorithm for Detecting Circles. Computer vision and Image UnderstandingVol.83(2001) 172-191.  [6] Amel saeedTuama “ It is Image Segmentation and RecognitionTechnology” vol-3 No.2 April 2012 .  [7] S. Sanderson, J. Erbetta. Authentication for secure environments based on iris scanning technology. IEEColloquium onVisual Biometrics, 2000 .
  • 42.  [8] E.Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976 .  [9] R.Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride. A system for automated iris recognition. Proceedings IEEE Workshop on Applications of Computer Vision, Sarasota, FL, pp. 121-128, 1994.  [10] W. Kong, D. Zhang. Accurate iris segmentation based on novel reflection and eyelash detection model. Proceedings of 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing, Hong Kong, 2001.  [11] C.Tisse, L. Martin, L.Torres, M. Robert. Person identification technique using human iris recognition. International Conference onVision Interface, Canada, 2002.  [12] L. Ma,Y. Wang,T.Tan. Iris recognition using circular symmetric filters. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002.  [13] N. Ritter. Location of the pupil-iris border in slit-lamp images of the cornea. Proceedings of the International Conference on Image Analysis and Processing, 1999.
  • 43.  [14] W. Boles, B. Boashash. A human identification technique using images of the iris and wavelet transform. IEEETransactions on Signal Processing,Vol. 46, No. 4, 1998.  [15] D. Field. Relations between the statistics of natural images and the response properties of cortical cells. Journal of the Optical Society of America, 1987.  [16] S. Lim, K. Lee, O. Byeon,T. Kim. Efficient iris recognition through improvement of feature vector and classifier. ETRIJournal,Vol. 23, No. 2, Korea, 2001.  [17]Y. Zhu,T.Tan,Y.Wang. Biometric personal identification based on iris patterns. Proceedings of the 15th International Conference on Pattern Recognition, Spain,Vol. 2, 2000. 