- Open Access
- Total Downloads : 381
- Authors : Anuradha.M, B.Chinna Rao, P.M.Francis
- Paper ID : IJERTV1IS6282
- Volume & Issue : Volume 01, Issue 06 (August 2012)
- Published (First Online): 30-08-2012
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Iris Biomertic Design For Embedded System Using Fwt Technique
IRIS BIOMERTIC DESIGN FOR EMBEDDED SYSTEM USING FWT TECHNIQUE
Anuradha.M |
B.Chinna rao |
P.M.Francis |
M.tech(PG student) |
Prof.&Head,Dept.of ECE |
Asst.Prof. in Dept. of ECE |
GITAS |
GITAS |
GITAS |
AbstractIn many applications user authentication has to be carried out by portable devices. Usually these devices are personal tokens carried by users, which have many constraints regarding their computational performance, occupied area, and power consumption. These kinds of devices must deal with such constraints, while also maintaining high performance rates in the authentication process. This paper provides solutions to designing such personal tokens where biometric authentication is required. In this paper, iris biometrics have been chosen to be implemented due to the low error rates and the robustness their algorithms provide. Several design alternatives are presented, and their analyses are reported. With these results, most of the needs required for the development of an innovative identification product are covered. Results indicate that the architectures proposed herein are faster (up to 20 times), and are capable of obtaining error rates equivalent to those based on computer solutions. Simultaneously, the security and cost for large quantities are also improved.
Index TermsAuthentication, embedded systems, hamming distance, image processing, iris biometrics, segmentation
-
INTRODUCTION
the most secure and reliable technologies [2], [4], [6], [5]; however, while matching algorithms in iris recognition are straightforward, the signal processing prior to matching requires a significant amount of processing power.Biometric applications can be classified into two major groups: identification and authentication. Identification is performed when the user identity is not provided, wherein the system must find the user from a database of biometric data from all enrolled users. In contrast, authentication, is the process of checking the identity of the user using provided biometric data. Currently, both applications are ubiquitously used; however, this paper will focus on authentication, as this application is where personal tokens play an important role. Biometric authentication applications can be designed by following two key approaches [7]: online, which requires communication with central databases to access biometric data and offline, wherein biometric data is stored on personal tokens. The online approach must deal with serious security and privacy issues, as the communication between the system and the central database can be attacked, and the identity may be stolen or altered. For this reason, offline systems are recommended, as long as the data is kept securely in the personal token. Two different strategies are followed in offline biometric authentication systems:
1) the token provides the biometric template and 2) the token performs the verification tasks and supplies the result, avoiding external access to the users personal template. This paper recommends the second strategy for security and privacy motivations. Thus, different architecture approaches to build personal tokens will be described. These tokens are designed as tamper-proof devices, maintaining not only internal
data security, but also a secure communications channel with the external world. After initial results by the authors [7], where only the matching part of the algorithm was included in the token (Match-on- Card technology), this paper will develop the work that will be included in the token to improve parts of the algorithm, achieving a higher level of simplicity in the verification
devices.
Fig 1 Block diagram of Biometric system
In order to show this, Section II will introduce iris biometrics technology, and will discuss the state of the art for this modality. The implementations realized in this work will be described in the following section. For this purpose, Section III will briefly describe the selected algorithm, followed by details of the implementation of two potential platforms. Section IV presents the results obtained from these platforms, including a performance comparison, processing time, and the hardware area required for each platform. This paper concludes and discusses possible future work in this area.
-
STATE OF THE ART IN IRIS BIOMETRICS
From a conceptual point of view, most iris recognition systems have the same block diagram as any other biometric modality (see Fig. 1). After capturing an image of the eye, the iris is located and segmented to extract its features; these features are then compared to a previously stored template [6]. This section describes each of these blocks in detail, providing information on the approaches found in previous publications.
-
Iris Acquisition
Contrary to popular belief, iris biometrics systems do not use laser-scans to capture the image of the human eye. Instead, an infrared photo or video camera is used at a set distance to capture a high quality image of the iris. Working in the infrared range provides many advantages when compared to the visible range:
iris ridges, nerves, and crypts are more evident [31]; the border between the iris and the pupil is more pronounced; and users are
not exposed to annoying flashes. Currently, most of the work performed in this area has been dedicated to improving user-system interaction by developing cameras where the focusing system is automatic, such that users are not required to remain steady at a fixed point in front of the camera [8][10].
-
Iris Segmentation
The main purpose of this process is to locate the iris on the image and isolate it from the rest of the eye image for further processing. Some other important tasks that are also performed in this iris segmentation block include image quality enhancement, noise reduction, and emphasis of the ridges of the iris. Several proposals have been made by different authors for iris location and segmentation, wherein most consider iris detection as finding two circumferences that model the iris boundaries. Daugman [11] has proposed an integro-differencial operator, which works by examining the difference in pixel levels between circles drawn in the image. Sanchez-Avila et al. [12] have used a similar operator, but search for the maximum difference in lines drawn crossing the entire image. Other authors [13][16] use the Hough transform for circle detection. Recently, Daugman has proposed a new method for seeking the iris boundary by using active contour models [19]. Here, the iris location varies depending on preset external and internal forces until an equilibrium state is reached. Similar solutions have also been used by Ritter in [20] and Ross et al. in [21].
-
Feature Extraction
In the feature extraction block, different authors have presented a wide variety of proposals. The majority of these begin with a normalization of the segmented iris image. This normalization becomes necessary when considering that the pupil varies in size for different light intensities. The normalization method varies from changes to the polar coordinate system, as Daugman [11] proposed, to only considering a virtual line drawn around the pupil, known as the iris signature [12]. After normalization, Daugman has studied the phase information by applying different
Gabor filters. This was followed by the codificatin of this information in terms of the quadrant where the phase belongs [11]; however, Wildes, performs the extraction using Laplacian or Gaussian filters by obtaining several images of different scales for posterior comparison [14]. SanchezAvila et al. have proposed in [12] two different feature
extraction approaches: one using Gabor filters weighting for small portions of the segmented iris image and another one based on the use of dyadic wavelet transformations and their zero-crossing representation. Li Ma et al. [13] have proposed a similar approach, but applies the dyadic wavelet transformation on a 1-D intensity signal instead of the iris signature approach used by SanchezAvila et al. Boles et al. [22] have also based their proposal on the dyadic wavelet transform, but on a normalized iris image (as proposed by Daugman), i.e., by using a 2-D wavelet transform on the polar scale representation of the iris, as opposed to the two previous algorithms that work in 1-D.
-
Matching
Although some authors have studied other matching algorithms [12], [14], [15], the most employed matching algorithm has been the Hamming distance, as was initially proposed by Daugman [11]. The Hamming distance is described by the following equation:
where L is the vector length and Pi and Yi are the i th component of the template and sample vector, respectively, which are XORed in the equation. If the distance obtained is below a predefined threshold level, the studied sample is considered to belong to the user whose template is being studied. Selection of the threshold level usually depends on the final application.
achieved, and security is improved. The terminal, in the proposed architecture, should perform the following tasks.
Image Acquisition: The iris is captured with an infrared camera, as previously mentioned. The cost and size of the electronics and lens required for this task are not commercially viable for insertion into the personal token.
-
Image Segmentation: This preprocessing block is related to the image acquisition. The non-detection of the iris or the quality of the captured images are typical reasons for rejection of the acquired image, thus, requiring a new capture process. If this block were included in the token, many images would have to be transferred from the terminal to the token, increasing data communication and therefore the verification time. The personal token should have the following characteristics.
-
It should perform the rest of the biometric processes, i.e., feature extraction, comparison, and the matching result processing.
-
It is highly recommended to be reconfigurable. Possible token robberies or user accidents would require changes in biometric data or internal token processes to avoid security holes.
-
-
IMPLEMENTATION
Previous studies have shown the viability of creating match-on-token solutions by including the comparison algorithm within the token, providing an answer that deals with the matching result [7]. In this paper, these studies have been extended to analyze the viability of integrating the feature extraction block within the personal token. With this solution, simplification of the point of service terminal is
Fig 2 Terminal and platform functionalities
The token should be able to build and handle a secure communication channel with the terminal.
-
The token should be designed as a tamper-proof device.
-
As it has to be portable, the occupied electronic area should be as small as possible.
-
Although token size is limited, the processing time must be minimal to reduce user waiting time.
-
Finally, the device must be cost effective, as large quantities of these devices will be manufactured.
In order to study different implementation proposals, this section is organized as follows. First, we will center on the chosen algorithm from a signal processing viewpoint. This is followed by the different implementations developed.
-
Chosen Algorithm
Iris Segmentation: The iris chosen segmentation algorithm is based on the Hough transform as proposed in [14]. This transformation works on the edge image, as information related to textures or colors is not considered. From all the different edge operators, the Canny method is used due to the shape of the edge to be detected [30]. In this application, the Hough transform is used considering a circular shape to detect the iris boundary
Fig 3 FWT. The wavelet transform is computed by a hierarchical structure of filter applications.
Filters G and H define which wavelet functions are used within the sclera. Once the iris boundary is detected, the pupil boundary is found in a similar way. Finally, eyelid detection is carried out by using a separate Hough transform for elliptical figures. Reflections are eliminated during the first stages of the preprocessing block through erosion and dilation operators. These reflections have to be removed as soon as possible, as they can cause erroneous decisions in the circle detection. After the iris segmentation has been finished, a quality algorithm is applied [23] and rejects images for the following reasons: low quality images;
-
-
distance between the pupil and the iris is not higher than a percentage of the iris radius; if such distance is lower than the specified threshold, the information contained in the segmented iris is not considered to be enough to obtain a reliable feature vector;
-
pupil parts are not detected within the iris area;
-
eccentricity between the pupil and iris circumferences is above a certain threshold.
Feature Extraction: In this paper, the feature extraction method proposed by SanchezAvila et al. in [12] was selected. Here, the iris is first normalized to a virtual circle around the pupil, which is named the iris signature. Thus, the iris signature will represent the gray level values on the contour of a virtual circle, which is centered at the centroid of the pupil, with a fixed radium r and considering angular increments of 2/Ls being Ls = 256 the length of the iris signature (previouslyfixed); i.e.,
Is = Ie (xc+r cos,yc+r sin ) (2)
Being 2n/ls2(n+1)/Ls,nINU{0} ,r a fixed radium, and (xc, yc)the centroid of the pupil.
Afterwards, a 1-D dyadic wavelet transform is applied to the iris signature. The vector resulting for each scale is concatenated in a unique vector for computation of the zero-crossing representation, which leads to the feature vector. For computation of the wavelet transformation, Mallats fast wavelet transform (FWT) approach has been considered [24]. Unfortunately, the down-sampling stage that follows each filter provides the worst performance results when compared to a zero-insertion in intermediate vectors. Therefore, the resulting vector does not have the same length as the initial vector, wherein its length is the initial length multiplied by the number of levels the transformation performs. Once the dyadic wavelet is computed, the resulting vector is simplified by using its zero-crossing representation. The zero crossing representation converts the vector into a binary representation, wherein 1 represents a positive value and 0 represents a negative value, for each vector component. The number of levels used for the wavelet transform is a critical parameter, as it greatly influences the authentication performance results. Eight levels are used in this paper, as a
tradeoff among processing time, hardware area, and vector size.
Matching: As already mentioned, the Hamming distance is used for comparing vectors. This distance, as shown in [12], offers the best results for this biometric modality and the selected algorithm.
Fig 4 Abstraction layers in a computer system and its relationship for biometric system implementation platforms.
-
Platforms Considered
When designing identification tokens, several approachesmay be studied. Current authentication algorithms have primarily been implemented in personal computers; however, these devices are not suitable for tokens due to their reduced size and cost. Nevertheless, the authors consider this platform as the initial stage for this study. Computers are not the only devices that can be used to implement biometric systems. Fig. 4 represents several different approaches that have been considered.
-
Microprocessor: As Fig. 4 demonstrates, a computer is based on one or several microprocessors. Above these, several logical layers provide the user a transparent control of the electronics, which are based on an Operating System. Although this architecture eases the development of applications, these programs are not optimally translated to microprocessor instructions. Therefore, our first proposed implementation consists of a platform based on a microprocessor, which makes reasonable and optimal use of the peripherals and instructions for the functions that are to be developed (see Fig. 5). In order to develop a biometric personal token, this platform is composed of the following peripherals.
-
-
Serial Interface: Serial interface will be used so that the token can communicate with the terminal for data transfer and commands. The choice of physical interface is not crucial, i.e., from RS-232 to a USB
2.0 port.
-
RAM Memory: As in any microprocessor system temporary memory storage is required. This memory will be used for storing data such as the segmented iris image, computational variables, etc.
-
ROM Memory: For storing executable code and programming constants.
-
EEPROM Memory: This stores the user template, allowing any changes if necessary. Other verification parameters, the different threshold levels can also be stored here. The point of service terminal acquires the users eye image and performs the described segmentation. The resulting image, together with other information, such as the inner and outer boundary parameters, is transmitted through the serial interface. As the token platform receives these data, it stores these data in the RAM. Once the transmission is finished, the token will begin
Fig 5 Architecture of the microprocessor platform.
Fig 6 Architecture of dedicated hardware implementation.
its role by calling the normalization block. Afterwards, the feature extraction block based on the zero-crossing representation of the wavelet transform is executed. The resulting vector is then compared with the internally stored template and makes a decision on the matching result. Such decisions are transmitted back to the terminal by the serial interface. Once all of the processes are finished, the RAM is completely erased for later use. Benefits from this approach when considering the computer platform are, as already mentioned, the optimization of all resources, no extra memory and overhead computations due to the presence of operating systems. A standalone execution is carried out, and only required functions are implemented, which is not the case with general purpose computers. The main drawbacks of this approach are related to the development and maintenance of the application. Another important issue to consider is that most microprocessors are intended for use in embedded systems, and do not use floating-point arithmetic, wherein the truncation needed for implementing these algorithms in a fixedpoint arithmetic unit can cause error accumulation.
-
Dedicated Hardware: A more optimized solution than that using a commercial microprocessor previously described is to develop a specific purpose processor for the biometric personal token. This solution is implemented by developing dedicated hardware, which reduces processing time and the required electronics area. The use of dedicated hardware permits simultaneous computing processes, i.e., several processes can be computed at the same time; however, the main disadvantage of this solution is a reduction in accuracy due to the use of reduced fixed-point arithmetic, as well as the developmental costs, in terms of both time and money. When designing dedicated hardware, several considerations should be made. First, the achievable level of parallelism needs to be evaluated, and second, the available hardware resources need to be used as efficiently as possible. For the first consideration,
the designer must study the systems detailed block diagram and check which blocks require others to be finished so as to start operating, and which blocks can work in parallel. After that, the second development
stage is devoted to considering which resources can be reused, so as to reduce hardware area. The architecture of this implementation is shown in Fig. 6. Several differences between this and the previous platform can be observed.
-
-
The communication with the terminal is still carried out using the serial interface. The segmented iris is stored in
RAM, but all parameters computed in the iris segmentation block related to the inner and outer boundaries are transferred directly to the iris signature block.
-
RAM is only used to store initial data.
-
There is no ROM for storing executable code. The hardware is directly designed to perform all biometric functions.
-
EEPROM is directly accessed by the matching block, as the control logic is only in charge of block timing.
The most interesting characteristic of this implementation is the concurrent functioning among blocks. This can be observed in Fig. 7, wherein it is shown that, in the first time slot, only the iris signature computation is performed, as this result is necessary for later nodes. Once this is computed and considering the fast wavelet implementation previously mentioned, H- and G-filtering can be executed in parallel. This concurrence can be clearly observed in the following time slot, where filtering of the second scale can be computed at the same time as the zero-crossing conversion is carried out for the first scale result. The forth slot will go further: filtering from the third scale, zero-crossing from the second scale, and matching from the feature vector corresponding from the first scale filtering. The iris signature computation block consists of the accessing those memory addresses that are related to the iris signature and the storage of the values corresponding to these addresses. These addresses can be calculated as (2). In this formula, , values are fixed, and the computation of trigonometric functions has been substituted by lookup tables, which store the corresponding values to the sine and cosine functions. Authors have also considered using a cordic algorithm, where similar hardware areas have been used, but LUTs have been selected because they
provide better processing time. Iris signature computation is shown in Fig. 8. In regard to the fast wavelet transformation block, filters H and G are both implemented as multipliers followed by accumulators with previous shift registers. The register associated to the vector is an addressable shift register, so it allows, before filtering, reordering of the elements of the vector and the introduction of zeros required for each level [24]. The matching algorithm implementation has been thoroughly investigated by the authors [25]. Although the best results in
Fig 7 Matching implementation.
time and hardware are obtained from a pipeline structure, the authors have selected a different solution, which is slower but smaller. The reason for this is that filtering takes much longer than matching; no improvement is achieved here by speeding up the matching process. Thus, better results are obtained by reducing the area of each of the matching blocks, resulting in longer computations that are still short when compared to the filtering process. Fig. 7 illustrates the matching implementation chosen for the dedicated hardware.
-
-
RESULTS
To present the obtained results, this, implemenation details of both platforms chosen to carry out the process will be given. Finally, the results obtained from both platforms will be compared considering several viewpoints, such as performance, processing time, occupied area, cost, and security level.
A. Implementation Details for the Chosen Platforms Several solutions for microprocessor platforms or dedicated hardware are commercially available. The decisions made on choosing the hardware have been based on several characteristics, such as cost and ease
of integration. The microprocessor
Fig 8 Images from created Database
chosen for the first implementation was a ARM7TDMI. This microprocessor is a 16/32-bit RISC CPU designed by ARM [32]. Due to its high computational power and reduced cost, it is widely used in several commercial applications.
C. Performance
Although computer and microprocessor platforms do not operate using the same type of arithmetic, mistakes arising from using 32-bit fixed point arithmetic (microprocessor) are not noticeable; hence, results obtained from both platforms are the same. Unfortunately, using reduced fixed-point arithmetic in a dedicated hardware platform provides errors due to rounding. This rounding problem appears in the first stages of the system, such as during iris signature computation. The values of the trigonometric functions used in iris signature computation do not provide accurate values due to the length limitation in the number of bits used; however, the errors committed are not very limiting, as they refer to minimal changes in the row selection. Fig. 8 demonstrates the difference obtained from computing the address of the iris signature. When considering an image 400X 400 pixels in size, values between 400 to 400 refer to errors in the same row; however, values outside of these boundaries report errors in different rows. These errors have been produced by the lookup table used for computing the trigonometric functions in the iris signature computation. The impact of these errors is further increased value due to posterior multiplication with other parameters. As Fig. 10 shows, these errors are primarily located in the areas
surrounding the values of 350 and 100, demonstrating an approximate symmetry about 150 on
Fig 9 ROC curve
Fig 10 Histogram of the different between values obtained with different
hardware implementation of wavelet transformation and PC computation.
the abscissa. This symmetry and error figure are caused by two phenomena: first, the accuracy of the LUT used for the trigonometric functions, since we have fixed the output value of these LUT to 16 bits, and second, the posterior truncation performed in the iris signature computation after multiplying those LUT values with the pupil radium. Considering wavelet transformation, several tests have been performed according to the different data input
lengths for the filters and the number of bits dedicated to the binary point values has been modified.We have considered three values: 10, 13, and 16 bits, fixing the integer part to 10 bits. The histogram of the differences found between the obtained PC values and hardware values can be observed in Fig. 9. As it can be seen, using integer arithmetic (red line, 10-bit width with no bits dedicated to the binary point) produces errors with
Microprocessor platform area
Data size
(bytes)
Constant size
(bytes)
Code size
(bytes)
5031
324
2640
values that range from 4 to 4, thus leading to errors in the feature computation; however, in the case of using 13 or 16 bits, these errors are reduced to less than unity, and the feature vectors obtained, due to the algorithms robustness, are the same as those obtained from the software. In addition, it can be seen in this figure that using 13 or 16 bits does not improve results, as the deviation from the software results in both cases is the same. In biometrics, the most common parameters used for evaluating system performance include the false acceptance rate (FAR), which is a measure of the number of potential intruders that access the system, and the false rejection rate (FRR), which measures the number of authorized users who will be rejected by the system. These two parameters are usually expressed in a single curve called the receiver operating characteristic (ROC). Fig. 9 depicts the obtained ROC curve for the proposed system. As it can be observed, the differences between the software curve and the hardware implementation curve are minimal. These differences are provoked by the LUT granularity used in the iris signature computation, which, as Fig. 9 points out, provokes some errors in this addressing, as well as by the wavelet transformation.
Security
An indirect advantage of both proposed platforms is the achieved level of security. When comparing the
microprocessor to the computer-based solution, less potential attack points are accessible. The microprocessor does not have an open operating system that can be programmed with new applications; hence, no malicious code can be programmed into the system. Furthermore, when using the hardware-based solutions, no programs exist, which again reduces potential attack points when compared to the microprocessor-based solution. Obviously, all of the solutions proposed herein do not provide a 100% level of security. Potential attack points still exist, excluding reverse engineering and tempest attacks, which are primarily solved by manufacturing processes (pseudo-random
memory organization, Faraday cases, tamper-proof techniques, etc.). Major attacks arise from the exploitation of the data transferred between the token and the external world. This can be solved by using cryptographic solutions (ciphering, authentication, time stamping, etc.). All of these solutions are not included within the scope of this paper, but certainly may be recommended for future investigation.
-
CONCLUSION AND FUTURE WORK Different platforms were studied for biometric authentication scenarios. Two platforms have been designed and developed: a microprocessor-based architecture and a dedicated hardware design. Each platform exhibits benefits when compared to general purpose computer systems. Selecting one of these platforms depends on system and authentication application requirements. In the case of high security environments, where low error rates are extremely important, the microprocessor solution is recommended, especially when the number of users in the system is relatively high; however, if the number of users is lowor size and execution times are significant constraints, the dedicated hardware solution should be chosen. The obtained processing times exhibit the best results for the dedicated hardware solution, improving by over 200 times over microprocessor-based solutions, and the request of a clock rate two times faster. The results obtained in this study direct future research into the integration of cryptographic modules that would secure all data transmission. Another research area would explore optimal hardware solutions for identification tokens
that combine the benefits of both platforms developed herein (i.e., using HW/SW codesign).
REFERENCES
-
A. Jain, R. Bolle, and S. Pankanti, , S. P. A. Jain and R. Bolle, Eds.,Biometrics: Personal Identification in a Networked Society. Norwell,
MA: Kluwer, 1999.
-
M. Faundez-Zanuy, Biometric security technology, IEEE A&E Syst. Mag., vol. 21, no. 6, pp. 1526, Jun. 2006.
-
J. Mansfield and J. L. Wayman, Best practices in testing and reporting performance of biometric devices U.K. Goverment Biometrics
Working Group, 2002. [Online]. Available: http://www.npl.co.uk/upload/ pdf/biometrics_bestprac_v2_1.pdf
-
P. Phillips, W. T. Scruggs, A. J. OToole, P. J. Flynn, K. W. Bowyer, C. L. Schott, and M. Sharpe, FRVT 2006 and ICE 006 large-scale results, Nat. Inst. Standards Technol., 2007. [Online]. Available: http://www.frvt.org/FRVT2006/docs/ FRVT2006andICE2006LargeScaleReport.pdf
-
Independent Biometric Group, Comparative biometric testing round 6 public report, 2006 [Online]. Available: http://www.biometricgroup. com/reports/public/comparative_biometric_testing.ht ml [6] K. Bowyer, K. Hollingsworth, and P. Flynn, Image understanding for iris biometrics: A survey, Comput. Vision Image Understand., vol. 110, no. 2, pp. 281307, 2008.
-
R. Sanchez-Reillo, J. Liu-Jimenez, and L. Entrena, Architectures for biometric match-on-token solutions, in Proc. ECCVWorkshop BioAW,
2004, pp. 195204.
-
K. Ryoung Park and J. Kim, A real-time focusing algorithm for iris recogntion camera, IEEE Trans. Syst., Man Cybern. C, Cybern., vol.
35, no. 3, pp. 441444, Aug. 2005.
-
Y. He, J. Cui, T. Tan, and Y. Wang, Key techniques and methods for imaging iris in focus, in Proc. 18th Int. Conf. Pattern Recog., Aug.
2006, vol. 4, pp. 557561.
-
J. R. Matey, O. Naroditsky, K. Hanna, R. Kolczynski, D. J. LoIacono, S. Mangru, M. Tinker, T.
M. Zappia, and W. Y. Zhao, Iris on the
move: Acquision on images for iris recognation in less contrained enviroments, Proc. IEEE, vol. 94, no. 11, pp. 19361947, Nov. 2006.
-
J. G. Daugman, High confidence visual recognition of persons by a test of statistical independece, IEEE Trans. Patt. Anal. Mach. Intell., vol. 15, no. 11, pp. 11481161, Nov. 1993.
-
C. Sanchez-Avila and R. Sanchez-Reillo, Two different approaches for iris recognition using gabor filters and multiscale zero-crossing,
Patt. Recog., vol. 38, no. 2, pp. 231240, 2005.
-
L. Ma, T. Tan, Y.Wang, and D. Zhang, Efficient iris recognition based characterizing key local variations, IEEE Trans. Image Process., vol. 13, no. 16, pp. 739750, Jun. 2004.
-
R. P. Wildes, Iris recognition: An emerging biometric technology, Proc. IEEE, vol. 85, no. 9, pp. 13481363, Sep. 1997.
-
C. Tisse, L. Martin, L. Torres, and M. Robert, Personal identification on technique using human iris recognition, in Proc. Vision Interface,
2002, pp. 294299.
-
L. Masek, Recognition of human iris patterns for biometric identification, Masters thesis, Sch. Comput. Sci. Softw. Eng., Univ.Western
Australia, Perth, 2003.
-
J. Daugman, Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparison, Proc. IEEE, vol. 94,
no. 11, pp. 19271935, Nov. 2006.
-
J. Daugman, Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparison, Proc. IEEE, vol. 94,
no. 11, pp. 19271935, Nov. 2006.
-
J. Daugman, Newmethods in iris recognition, IEEE Trans. Syst., Man Cybern. B, Cybern., vol. 37, no. 5, pp. 11671175, Oct. 2007.
-
N. Ritter, R. Owens, J. Cooper, and P. P. Van Saarloos, Location of the pupil-iris boder in slit- lamp images of the cornea, in Proc. Int. Conf.Image Anal. Process., Sep. 1999, pp. 740745.
-
A. Ross and S. Shah, Segmenting non-ideal irises using geodesic active contours, in Proc. Biometr. Symp., 2006, pp. 16.
-
W. W. Boles and B. Boashash, A human identification technique unisg images of the iris and wavelet transform, IEEE Trans. Signal Process.,vol. 46, no. 4, pp. 11851188, Apr. 1998.
-
B. Fernandez-Saavedra, J. Liu-Jimenez, and C. Sanchez-Avila, Quality measurements for iris images for biometrics, in Proc. IEEE
EUROCON Int. Conf. Computer as a Tool, Sep. 2007, pp. 759764.
-
S. Mallat, Zero-crossing of wavelet transform, IEEE Trans. Inf Theory, vol. 37, no. 4, pp. 1019 1033, Jul. 1991.
-
J. Liu-Jimenez, R. Sanchez-Reillo, A. Lindoso, and O. Miguel-Hurtado, FPGA implementation for an iris biometric processor, in Proc.
IEEE Int. Conf. Field Program. Technol., Dec. 2006, pp. 265268.
-
Center for Biometrics and Security Research, Beijing, China, Casia database, 2005. [Online]. Available: ttp://www.cbsr.ia.ac.cn/irisdatabase. htm
-
Dept. Comput. Sci., Palacky University in Olomouc, Czech Republic, Upol database, 2005. [Online]. Available: http://phoenix.inf.upol.cz/
iris/
-
National Institute of Standards and Technology, Arlington, VA, Nist ice database, 2005. [Online].
Available: http://iris.nist.gov/ice/
-
J. Zuo, N. A. Schmid, and X. Chen, On generation and analysis of syntetic eyes iris images, IEEE Trans. Inf. Forensics Security, vol. 2,
no. 1, pp. 7790, Mar. 2007.
-
R. E. Gonzalez and R. C. Woods, Digital Image Processing, 3rd ed.Reading, MA: Addison-Wesley, 1992.
-
H. Davson, The Physiology of the Eye. New York: Little, Brown and Company, 1963.
-
ARM, Ltd., U.K., ARM LTD website, 2005. [Online]. Available: http://www.arm.com/
-
Xilinx, San Jose, CA, Xilinx website, 1984. [Online]. Available:http://www.xilinx.com/