2004
DOI: 10.1109/tip.2004.827237
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Iris Recognition by Characterizing Key Local Variations

Abstract: Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly distributed features. This leads to its high reliability for personal identification, and at the same time, the difficulty in effectively representing such details in an image. This paper describes an efficient algorithm for iris recognition by characterizing key local variations. The basic idea is that local sharp variation points, denoting the appearing or vanishing of an important image structure, are util… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
438
0
3

Year Published

2005
2005
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 780 publications
(450 citation statements)
references
References 23 publications
0
438
0
3
Order By: Relevance
“…Wildes [26] proposes iris segmentation through a gradient based binary edge map construction followed by circular Hough transform. This methodology is the most widely used, being proposed with minor several variants in [3], [11], [14], [17], [19], [18] and [20]. [16] proposes one simple method based on thresholds and function maximization in order to obtain two ring parameters corresponding to iris inner and outer borders.…”
Section: Related Workmentioning
confidence: 99%
“…Wildes [26] proposes iris segmentation through a gradient based binary edge map construction followed by circular Hough transform. This methodology is the most widely used, being proposed with minor several variants in [3], [11], [14], [17], [19], [18] and [20]. [16] proposes one simple method based on thresholds and function maximization in order to obtain two ring parameters corresponding to iris inner and outer borders.…”
Section: Related Workmentioning
confidence: 99%
“…In order to apply biometric authentication we use our own implementation of the algorithm of Ma et al [16]. In their approach the iris texture is treated as a kind of transient signal which is processed using a 1-D wavelet transform.…”
Section: Iris Recognition Systemmentioning
confidence: 99%
“…We used N = 10 and M = 5 for our 512x64 pixel textures (only the 50 rows close to the pupil are used from the 64 rows, as suggested in [16] is then performed on each of the resulting 10 signals, and two fixed subbands are selected from each transform. This leads to a total of 20 subbands.…”
Section: Iris Recognition Systemmentioning
confidence: 99%
“…Some use edge information [2] whereas others utilize thresholding [8]. Since the problem is trivial, most methods work well enough.…”
Section: Detecting the Pupilmentioning
confidence: 99%
“…Despite the difficulties, transform-based techniques have been applied to iris detection in recognition [8,9]. Even though they can sometimes be quite efficiently implemented, a novel iterative approach is introduced to overcome the afroementioned difficulties.…”
Section: Introductionmentioning
confidence: 99%