CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Iris Biometric Recognition for Person Identification in Security Systems

by Vanaja Roselin.E.Chirchi, Dr.L.M.Waghmare, E.R.Chirchi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 24 - Number 9
Year of Publication: 2011
Authors: Vanaja Roselin.E.Chirchi, Dr.L.M.Waghmare, E.R.Chirchi
10.5120/2986-4002

Vanaja Roselin.E.Chirchi, Dr.L.M.Waghmare, E.R.Chirchi . Iris Biometric Recognition for Person Identification in Security Systems. International Journal of Computer Applications. 24, 9 ( June 2011), 1-6. DOI=10.5120/2986-4002

@article{ 10.5120/2986-4002,
author = { Vanaja Roselin.E.Chirchi, Dr.L.M.Waghmare, E.R.Chirchi },
title = { Iris Biometric Recognition for Person Identification in Security Systems },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 24 },
number = { 9 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume24/number9/2986-4002/ },
doi = { 10.5120/2986-4002 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:30.194476+05:30
%A Vanaja Roselin.E.Chirchi
%A Dr.L.M.Waghmare
%A E.R.Chirchi
%T Iris Biometric Recognition for Person Identification in Security Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 24
%N 9
%P 1-6
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control and provides strong e-security. Security systems having realized the value of biometrics for two basic purposes: to verify or identify users. In this paper we focus on an efficient methodology for identification and verification for iris detection, even when the images have obstructions, visual noise and different levels of illuminations and we use the CASIA iris database it will also work for UBIRIS Iris database which has images captured from distance while moving a person. Efficiency is acquired from iris detection and recognition when its performance evaluation is accurate.

References
  1. Christel-loïc TISSE1, Lionel MARTIN1, Lionel TORRES 2, Michel ROBERT “Person identification technique using human iris recognition”.
  2. D.E.Benn, M.S.Nixon and J.N.Carter, “Robust eye Extraction using H.T. “ AVBPA’99
  3. Shimaa M.Elsherief, Mhamoud E.Allam and Mohamed W.Fakhr,”Biometric Personal Identification based on Iris Recognition”,IEEE,2006.
  4. A.Poursaberi and B.N.Araabi, “iris recognition for partially occluded images: methodology and sensitivity Analysis” Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2007, Article ID 36751, 12 pages…
  5. Verieye iris recognition concept for performance evaluation ,http:// www.neurotechnology.com
  6. John Daugman. “Recognizing persons by their iris patterns “Cambridge University, Cambridge, UK.
  7. L.M. Waghmare, S. P. Narote, A.S. Narote, “Biometric Personal Identification Using IRIS”, Proceedings of International Conference on Systemic, Cybernetics and Informatics, ICSCI - 2006, Pentagram Research Centre – Hyderabad, pp. 679-682, Jan 2006
  8. E. Wolff, Anatomy of the eye and orbit, H. K. Lewis, London, UK, 7th edition, 1976.
  9. John Daugman,”How Iris works” IEEE Transaction on circuit and systems for Video Technology, VOL.14, No.1, January 2004.
  10. D.Zang Automated biometrics technologies and systems Klumer Academics, Boston, Mass, USA, 2000.
  11. A.S.Narote, S.P.Narote, M.B. Kokare, L.M. Waghmare, “An Iris Recognition Based on Dual Tree Complex Wavelet Transform” published in the proceedings of IEEE International Conference TENCON 2007, Taiwan during Oct. 30-Nov. 02, 2007.
  12. R.Kevin, “E-Security for E-Government” A Kyberpass Technical White Paper, April 2001, www.kyberpass.com.
  13. Proença,H. and Alexander, {L.A.},” {UBIRIS}: A noisy iris image database”, 13th International Conference on Image Analysis and Processing - ICIAP 2005,Springer, VOL. LNCS3617,pages 970-977,address Cagliari, Italy, September-2005.
  14. A.Poursaberi and B.N.Araabi,”Half eye wavelet based method for iris recognition” proceeding of the 2005 5th International Conference on Intelligent Systems Design and Applications (ISDA’05) 0-7695-2286-06/05 © 2005 IEEE.
  15. Sandipan P. Narote, Abhilasha S. Narote and Laxman. M. Waghmare, “Iris based recognition system using Wavelet transfer”, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.11, November 2009.
  16. Jafar M. H. Ali, Aboul Ella Hassanien,” An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory”, AMO - Advanced Modeling and Optimization, Volume 5, Number 2, 2003
  17. CASIA–Iris V3,http://www.cbsr.ia.ac.cn/IrisDatabase.htm
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Iris identification occluded images UBIRIS Iris database