An Efficient Iris Segmentation Model Based On Eyelids and Eyelashes Detection in Iris Recognition System
An Efficient Iris Segmentation Model Based On Eyelids and Eyelashes Detection in Iris Recognition System
Abstract— This paper presents an efficient noise reduction structure is conferred. Related works on iris recognition
scheme to remove localized high frequency information from systems have been discussed in the fourth section. The
segmented iris region for personal authentication based on radial proposed methods have been discussed with the necessary
suppression. Eyelash and eyelids of localized iris area is algorithm in the fifth section. The sixth and seventh section
considered as noisy information. Accuracy of iris recognition illustrates the feature extraction and matching process whereas
system generally depends on accurate segmentation and noise the experimental results have been focused in the eighth section.
deduction. Proposed method not only removes eyelash and Finally, conclusions are given in Section IX.
eyelids by suppressing localized frequency using radial
suppression but also detects the pupil and iris center accurately II. BIOMETRIC TECHNOLOGY
as well as localizes the iris and pupil region. Finally, this paper
also designates a prototype of automated iris recognition system The word Bios means to life and metric means to measure.
for personnel authentication. For iris feature extraction purpose, Biometric system normally measures physiological and
one dimensional Log Gabor wavelet has been used where the behavioral characteristics.
feature vector length has been reduced without less loss of
A. Verification vs. Identification
Information. It has also been showed here that the proposed
detection model has a stable matching score. The proposed The most common use of biometric systems is
automated iris recognition system with maximum suppression of authentication and verification [1]. Identification mode means
eyelashes has less equal error rate which indicates the superiority one’s to many match. On the other hand, Verification mode
of the performance compared to the other existing methods. means one’s to one match.
Keywords- eyelashes detection; edge detection; image B. Biometric error analysis
acquisition; iris normalization; iris template; hough transform Two types of error mainly occur in a biometric system:
I. INTRODUCTION false acceptance rate (FAR) and false rejection rate (FRR) [1],
[3]. FAR happens when the biometric system authenticates an
In the modern age, Security is always an important issue in imposter. FRR occurs when the biometric system has rejected
any sectors like bank, International airport, internet based
a valid user. Iris recognition has low false accepted rates. Iris
marketing etc. Accurate and reliable personal identification
pattern is unique and it is stable.
arrangement and biometrics have become an important
technology for the security in the modern advanced world. III. STRUCTURE OF IRIS
Automatic recognition and verification of an individual person
based on some sort of distinctive features or characteristics is The iris is a sensitive part comprising of a number of layers.
offered in a biometric system. There are several types of The epithelium layer makes the iris opaque because of its
Biometrics system available like fingerprints, face recognition, pigmented characteristics.
voice recognition, hand geometry, handwriting, the retina and
the iris. Most of the existing methods have limited capabilities
in recognizing relatively complex features in realistic real-
world situations. Iris recognition has been contemplated as one
of the most trustworthy biometrics technologies in recent years
[1], [2]. The iris has distinctive features. It is composite
sufficient to be used as a biometric signature [3]. This means
that the probability of finding two people with identical iris
patterns is almost zero [4]. This paper can be arranged as
follows. The next section familiarizes the basic concepts of (a) (b)
biometric technology. In the third section the internal iris Figure 1. Iris structure
___________________________________
978-1-4799-6805-3/15/$31.00 ©2015 IEEE
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on February 14,2024 at 09:28:16 UTC from IEEE Xplore. Restrictions apply.
2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015, Coimbatore, INDIA
On the other hand, the stromal surface containing blood V. FLOW DIAGRAM OF THE PROPOSED METHOD
vessels, pigment tissue and two iris muscles contracts the pupil The proposed method can be described in figure 3 where an
[5]. There is two zones i.e. outer ciliary zone and inner
iris template can be generated by performing the stated
pupillary zone that are divided by the Collarette – which looks
as a zigzag pattern. The eye image is shown in figure 1(a) and necessary steps of iris identification and later it will be
1(b). Many differentiated and idiosyncratic features can be matched with the stored database of iris templates of many
contained in its compound and multiplex arrangement such as persons. The iris identification is basically divided in four
arching ligaments, furrows, ridges, crypts, rings, corona, steps shown in figure 2.
freckles etc. The features of the iris are random in nature. 1. Iris image acquisition
IV. RELATED WORKS 2. Iris image pre-processing: Segmentation, normalization and
Enhancement
The concept of automated iris recognition system was first
proposed by Flom and Safir in 1987. Daugman proposed 3. Feature extraction
complex valued wavelets to demodulate the texture phase 4. Matching
structure information of the iris and integro-differential
operator for iris inner and outer boundary localization [2], [3].
Many researchers used wavelets for iris encoding and some of
them reported that it has excellent performance of a diverse
database of many images [8], [9]. In [4], zero crossing of the
wavelet transform at multi resolution levels was calculated. In
[16], an iris recognition approach based on characterizing key
local intensity variations was proposed. Wildes [10], Kong and
Zhang [11], Tisse et al. [12], and Ma et al. [13] described an
automatic iris recognition system for personal verification. All
these algorithms are based on grey images, and color
information was not used. A new algorithm has been proposed
for locating the iris inner boundary and outer boundary by
modifying the existing algorithm so that the iris area can be
segmented very smoothly with less detection of eyelids and
eyelash. Then for feature extraction Gabor wavelets have been
applied. But the encoded binary iris template that has been
obtained gives better result than the previous research work.
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on February 14,2024 at 09:28:16 UTC from IEEE Xplore. Restrictions apply.
2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015, Coimbatore, INDIA
Algorithm 1: Iris Inner and Outer boundary localization Algorithm 2: Radial non maxima suppression
Step 1. Coarse localization of the Pupil Centre of the Input: A (the modulus image) and (xc,yc)(the approximate
eye; center point of the edge).
Step 2. Choose a small block of the input image and Output: m (the modulus image after applying radial non-
extract edge information based on edge detection maxima suppression).
operator like Canny operator; 1. for all points Pj of the modulus image A do
Step 3. Apply Hough transform for pupil area 2. determine the radial direction of point Pj means the
localization means inner boundary localization ; direction from approximate center point to Pj.
Step 4. Extract edge information from a small image 3. determine two points X1 and X2 in the eight pixel
block based on line’s grey gradient value; neighborhood of Pj along the radial direction;
Step 5. Radon transformation is used to localize Iris 4. if A(Pj)>A(X1) and A(Pj)>A(X2) then m(Pj)←A(Pj)
outer boundary.
5. else m(Pj)←0
Step 6. Apply Radial non maxima suppression
technique to detect and remove the eyelids and 6. end if
eyelash which increase the segmentation accuracy 7. end for
because the radial edges are always noises (such as 8. return m.
edges of eyelash, eyelids).
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on February 14,2024 at 09:28:16 UTC from IEEE Xplore. Restrictions apply.
2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015, Coimbatore, INDIA
Step 4: Select the Centre of the pupil as pole. In polar normalized iris pattern that resemble to ‘0’ bits in noise masks
coordinates . For iris outer boundary, of both iris pattern templates are used in the calculation.
For computing the distance, only the noise masks of both
normalized iris pattern templates are used in the calculation. If
A and B are two bitwise iris templates then the hamming
distance (HD) formula can be stated as the summation of
exclusive-OR between A and B, where m defines the total
Step 5: Every pixel’s grey values of the normalization iris number of bits that constitute the template.
can be obtained by those grey of (x,y) positions, applying
the following equations:
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on February 14,2024 at 09:28:16 UTC from IEEE Xplore. Restrictions apply.
2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015, Coimbatore, INDIA
(b) Iris
Boundary
Localization
Figure 7. Illustration of the Iris segmentation and normalization process Figure 8. Illustration of the image enhancement process
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on February 14,2024 at 09:28:16 UTC from IEEE Xplore. Restrictions apply.
2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015, Coimbatore, INDIA
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on February 14,2024 at 09:28:16 UTC from IEEE Xplore. Restrictions apply.
2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015, Coimbatore, INDIA
[4] W. Boles and B. Boashash, “A human identification technique using [11] W. Kong and D. Zhang, “Accurate iris segmentation based on novel
images of the iris and wavelet transform,” IEEE Transactions on Signal reflection and eyelash detection model,” Proceedings of International
Processing, Vol. 46, No. 4, pp. 1185-1188, 1998. Symposium on Intelligent Multimedia, Video and Speech Processing,
[5] Haeng-kon Kim, Tai-hoon Kim and Akingbehin Kium , “Advances in Hong Kong, 2001.
Security Technology, ” International Conference, SecTech 2008, and Its [12] C. Tisse, L. Martin, L. Torres and M. Robert, “Person identification
Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. technique using human iris recognition,” International Conference on
[6] Y. Zhu, T. Tan and Y. Wang, “Biometric personal identification based Vision Interface, Canada, 2002.
on iris patterns,” Proceedings of the 15th International Conference on [13] Li Ma, Tieniu Tan, Yunhong Wang and Dexin Zhang, “Personal
Pattern Recognition, Spain, Vol. 2, pp. 801-804, 2000. identification based on iris texture analysis,” IEEE Transactions on
[7] “Chinese Academy of Sciences – Institute of Automation. Database of Pattern Analysis and Machine Intelligence, Vol. 25, No.12, pp. 1519–33,
756 Greyscale Eye Images,” http://www.sinobiometrics.com 2003.
Version 1.0, 2003. [14] Hanho Sung, Jaekyung Lim, Ji-hyun Park and Yillbyung Lee, “Iris
[8] M. Jafar, M. H. Ali and Abclul Ella Hassanien, “An Iris Recognition Recognition Using Collarette Boundary Localization,” Proceedings of
System to Enhance E-security Environment Based on Wavelet Theory,” the 17th International Conference on Pattern Recognition, Vol.4, pp.
AM0 - Advanced Modeling and Optimization, Vol. 5, No. 2, pp. 93-104, 857-860, 2004.
2003. [15] Mark S. Nixon and Alberto S. Aguado, “Feature extraction and image
[9] S. Liu and M. Silverman, “A practical guide to biometric security processing,” Academic Press, 2008.
technology,” IT Professional, Vol. 3, pp. 27-32, 2001. [16] Li Ma, Tieniu Tan, Yunhong Wang and Dexin Zhang, “Efficient iris
[10] R. Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey and S. recognition by characterizing key local variations,” IEEE Transactions
McBride, “A system for automated iris recognition,” IEEE Workshop on on Image Processing, Vol. 13, No.6, pp. 739–50, 2004.
Applications of Computer Vision, Sarasota, FL, pp. 121-128, 1994.
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on February 14,2024 at 09:28:16 UTC from IEEE Xplore. Restrictions apply.