2017
DOI: 10.11591/ijece.v7i5.pp2530-2536
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach of Iris Detection and Recognition

Abstract: This paper proposes an IRIS recognition and detection model for measuring the e-security. This proposed model consists of the following blocks: segmentation and normalization, feature encoding and feature extraction, and classification. In first phase, histogram equalization and canny edge detection is used for object detection. And then, Hough Transformation is utilized for detecting the center of the pupil of an IRIS. In second phase, Daugmen’s Rubber Sheet model and Log Gabor filter is used for normalizatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…The accuracy of this method reaches to 100%. Rubel Biswas et al [15] presented a method for iris detection and recognition, the proposed method consisted of many steps segmentation, normalization, feature encoding, feature extraction, and classification. Hough Transform used for detecting the center of the pupil of an iris, the accuracy of this method reaches to 92%.…”
Section: Introductionmentioning
confidence: 99%
“…The accuracy of this method reaches to 100%. Rubel Biswas et al [15] presented a method for iris detection and recognition, the proposed method consisted of many steps segmentation, normalization, feature encoding, feature extraction, and classification. Hough Transform used for detecting the center of the pupil of an iris, the accuracy of this method reaches to 92%.…”
Section: Introductionmentioning
confidence: 99%
“…For the feature extraction process, different methodologies were used to retrieve features in previous studies and these included Sample Entropy [9], Autoregressive (AR) Model [10], Discrete Wavelet Transform (DWT) [11], and Fast Fourier Transformation (FFT) [12]. Classification of these extracted features was done using various classifiers by the researchers such as Support Vector Machine (SVM) [13,14], Neural Network [15], and k-nearest neighbor (KNN) [16].…”
Section: Introductionmentioning
confidence: 99%
“…This lead to less computational cost and thus increased the efficiency of the algorithms used in our technique [19]. Existing methods, working with frequency bands, extracted all the five types of frequency bands, namely delta (0.5-4 Hz), theta (4-7 Hz), alpha (7-13 Hz), beta (13)(14)(15)(16)(17)(18)(19)(20)(21)(22)(23)(24)(25)(26)(27)(28)(29)(30), and gamma [20]. According to the state-of-the-art methods, the emotional and cognitive activities of the brain can be well signified using the alpha, beta, and theta frequency bands [8], [21].…”
Section: Introductionmentioning
confidence: 99%
“…Biometric system such as Rhythmprint authentication, which combines an advantage of the traditional password-based authentication and a multi-touch innovation based on a touchpad on a computer or a screen of a smartphone [5] provides high security and can mitigate shoulder-surfing. Face recognition system [6], iris detection and recognition [7], ear recognition method [8], electrocardiogram (ECG) signal waveform [9], etc presents recent innovations in biometrics that can be applied to reinforce the biometric security of ATM system. However, most of this technology are in their infancy and have not been applied for the security of ATM machines.…”
Section: Introductionmentioning
confidence: 99%
“…Our approach is different from other approach found in the literature because it does not mitigate shoulder-surfing but it eradicates the possibility of shoulder-surfing, eavesdropping, and man-in-the-middle attack. The inspiration behind this research relies on the hypothesis that iris identification technology is widely accepted and is gaining ground as the best authentication system as it has high reliability, unique and distinctive (even identical twins do not share the same pattern of iris) [7]. The verification process is swift, the iris texture remains stable (it does not change), it can be captured from a distance without harm to the eye.…”
Section: Introductionmentioning
confidence: 99%