Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Iris Authentication using SIFT with SVM

Print
PDF
IJCA Special Issue on International Conference on Electronics, Communication and Information systems
© 2012 by IJCA Journal
ICECI - Number 2
Year of Publication: 2012
Authors:
S. Arun Singh
A. Muthu Kumar
S. Kannan

Arun S Singh, Muthu A Kumar and S Kannan. Article: Iris Authentication using SIFT with SVM. IJCA Special Issue on International Conference on Electronics, Communication and Information systems ICECI(2):1-3, November 2012. Full text available. BibTeX

@article{key:article,
	author = {S. Arun Singh and A. Muthu Kumar and S. Kannan},
	title = {Article: Iris Authentication using SIFT with SVM},
	journal = {IJCA Special Issue on International Conference on Electronics, Communication and Information systems},
	year = {2012},
	volume = {ICECI},
	number = {2},
	pages = {1-3},
	month = {November},
	note = {Full text available}
}

Abstract

In this paper, the proposed system is Iris authentication using SIFT with SVM. This method provides best, accurate matching between two set of Iris. Iris authentication is one of the developing research fields in the biometrics. The features of the Iris image is extracted using SIFT algorithm. The features are perfectly extracted from eye image using this algorithm. Then the extracted features are given to the SVM classifier. The support vector machine is used as a classifier, it accurately matches the two set of iris features quickly.

References

  • L. Flom and A. Safir, "Iris recognition system," U. S. Patent 4641349, Feb. 3, 1987.
  • J. G. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 15, no. 11, pp. 1148–1161,Nov. 1993.
  • P. Wildes, "Iris recognition: An emerging biometric technology," Proc. IEEE, vol. 85,no. 9, pp. 1348–1363,Sep. 1997.
  • W. W. Boles and B. Boashash, "A human identification technique using images of the iris and wavelet transform," IEEE Trans. Signal Process. , vol. 46,no4,pp. 1185–1188,Apr. 1998. .
  • L. Ma, T. Tan, Y. Wang, and D. Zhang, "Personal identification based on iris texture analysis," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 25,no. 12, pp. 1519–1533,Dec. 2003. .
  • Z. Sun, T. Tan, and Y. Wang, "Robust encoding of local ordinal measures: A general framework of iris recognition," in Proc. ECCV WorkshopBioAW, 2004, pp. 270–282.
  • C. Sanchez-Avila and R. Sanchez-Reillo, "Two different approaches for iris recognition using Gabor filters and multiscalezerocrossingrepresentation,"PatternRecognit. ,vol. 38,no. 2,pp. 231–240,Feb. 2005.
  • K. Miyazawa, K. Ito, T. Aoki, K. Kobayashi, and H. Nakajima, "An effective approach for iris recognition using phase-based image matching,"IEEE Trans. Pattern Anal. Mach. Intell. , vol. 30, no. 10, pp. 1741–1756,Oct. 2008.
  • L. Birgale and M. Kokare, "Iris recognition without iris normalization,"J. Comput. Sci. ,vol. 6,no. 9,pp. 1042-1047,2010.
  • C. Belcher and Y. Du, "Region-based SIFT approach to iris recognition,"Opt. LasersEng. ,vol. 47,no. 1,pp. 139-147,Jan. 2009
  • L. Birgale and M. Kokare, "Iris recognition without iris normalization,"J. Comput. Sci. , vol. 6, no. 9, pp. 1042–1047, 2010.
  • S. Shah and A. Ross, "Iris segmentation using geodesic active contours,"IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 824–836, Dec. 2009.
  • K. Roy, P. Bhattacharya, and C. Y. Suen, "Towards nonideal iris recognition based on level set method, genetic algorithms and adaptive asymmetrical SVMs," Eng. Appl. Artif. Intell. , vol. 24, no. 3, pp. 458–475,Apr. 2011.
  • CASIA-Iris INTERVAL. [online],available:http://www. cbsr. ia. ac. in.
  • Web resource www. csie. ntu. edu. tw/~cj/in