Iris Recognition: An Emerging Security Environment For Human Identification
Iris Recognition: An Emerging Security Environment For Human Identification
Iris Recognition: An Emerging Security Environment For Human Identification
M Daris Femila et al, Int. J. Comp. Tech. Appl., Vol 2 (6), 3023-3028
Abstract
Unlike other biometrics such as fingerprints and face, the identification and personal verification technologies is
distinct aspect of iris comes from randomly distributed becoming apparent. Biometrics involves using the different
features. This leads to its high reliability for personal parts of the body, such as the fingerprint or the eye, as a
identification and at the same time, the difficulty in password or form of identification. Currently, in crime
effectively representing such details in an image. Iris is a Investigations fingerprints from a crime scene are being used
protected internal organ whose random texture is stable to find a criminal. However, biometrics is becoming more
throughout life, it can serve as a kind of living password that public. Iris scans are used in United Kingdom at ATM's
one need not remember but one always carries along. instead of the normal codes. In Andhra Pradesh Iris
Because the randomness of iris patterns has very high recognition is being used to issue house hold ration cards.
dimensionality, recognition decisions are made with
confidence levels high enough to support rapid and reliable Practically all biometric systems work in the same
exhaustive searches through national-sized databases. Iris manner. First, a person is enrolled into a database using the
recognition has shown to be very accurate for human specified method. Information about a certain characteristic of
identification. This paper proposes a technique for iris the human is captured. This information is usually placed
pattern extraction utilizing the graph cut method where the through an algorithm that turns the information into a code
pupilary boundary of the iris is determined. The limbic that the database stores. When the person needs to be
boundary is identified by adaptive thresholding method. The identified, the system will take the information about the
iris normalization was invariant for translation, rotation and person again, translates this new information with the
scale after mapping into polar coordinates. The proposed algorithm, and then compares the new code with the ones in
method has an encouraging performance, success rate of the database to discover a match and hence, identification.
localization and normalization and reduces the system
operation time. The proposed method involves Graph cut Biometrics works by unobtrusively matching
method, Adaptive thresholding, Normalization modules. patterns of live individuals in real time against enrolled
records. Leading examples are biometric technologies that
Keywords: iris, pattern, identification, thresholding, pupilary, recognize and authenticate faces, hands, fingers, signatures,
normalization irises, voices, and fingerprints. Biometric data are separate and
distinct from personal information. Biometric templates
1. Introduction. cannot be reverse-engineered to recreate personal information
and they cannot be stolen and used to access personal
Biometrics is the science of measuring physical information.
properties of living beings. It is a collection of automated
methods to recognize an individual person based upon a
physiological or behavioral characteristic. The characteristics 2. Iris
measured are face, fingerprints, hand geometry, handwriting,
iris, retinal, vein, voice etc. In present technology scenario The iris has been historically recognized to possess
biometric technologies are becoming the foundation of an characteristics unique to each individual. In the mid 1980s,
extensive array of highly secure identification and personal two ophthalmologists „Dr. Leonard Flom‟ and „Aran Safir‟
verification solutions. As the level of security breaches and proposed the concept that no two irises are alike[6]. They
transaction fraud increases, the need for highly secure researched and documented the potential of using the iris for
identifying people and were awarded a patent in 1987. Soon the iris. The externally visible surface of the multilayered iris
after, the intricate and sophisticated algorithm that brought the contains two zones, which often differ in color. An outer
concept to reality and it was developed by Dr. John Daugman ciliary zone and an inner pupillary zone, and these two zones
and patented in 1994[3]. are divided by the collarette – which appears as a zigzag
pattern.
2.1. Features of the Iris
The iris is the plainly visible, colored ring that
The human iris is rich in features, can be used to surrounds the pupil. It is a muscular structure that controls the
quantitatively to distinguish one eye from another. The iris amount of light entering the eye, with intricate details that can
contains many colleagues fibers, contraction furrows, coronas, be measured, such as striations, pits, and furrows. The iris is
crypts, color, serpentine, vasculature, striations, freckles, rifts, not to be confused with the retina, which lines the inside of the
and pits. Measuring the patterns of these features and their back of the eye. Figure1 shows human eye characteristics. No
spatial relationships to each other provides other quantifiable two irises are alike. There is no detailed correlation between
parameters for identification process. The statistical analyses the iris patterns of even identical twins, or the right and left
indicated that the Iridian Technologies IRT process eye of an individual. The amount of information that can be
independent measures of variation to distinguish one iris from measured in a single iris is much greater than fingerprints, and
another. It allows iris recognition to identify persons with an the accuracy is greater than DNA.
accuracy with a magnitude greater than any other biometric
systems. Iris: This is the colored part of the eye: brown, green, blue,
etc. It is a ring of muscle fibers located behind the cornea and
2.2.Uniqueness of the Iris in front of the lens.
The iris is unique due to the chaotic morphogenesis Pupil: Pupil is the hole in the center of the iris that light
of that organ. Dr. John Daugman stated that “An advantage passes through. The iris muscles control its size.
the iris shares with fingerprints is the chaotic morphogenesis
of its minutiae. The iris texture has chaotic dimension Sclera: The sclera is the white, tough wall of the eye. It along
because its details depend on initial conditions in embryonic with internal fluid pressure keeps the eyes shape and protects
genetic expression; yet, the limitation of partial genetic its delicate internal parts.
penetrance (beyond expression of form, function, color and
general textural quality), ensures that even identical twins
have uncorrelated iris minutiae. Thus the uniqueness of every
iris, including the pair possessed by one individual, parallels
the uniqueness of every fingerprint regardless of whether there
is a common genome”.
3. Methodology.
This paper deals with the generation of stable key
from iris image and it is carried over using iris database. The
input image was subjected to segmentation to detect the two
circles i.e., iris/sclera boundary and the iris/pupil boundary.
The resultant image is normalized to produce iris regions. The
proposed method involves three modules namely i)Graph cut
method, ii)Adaptive thresholdingand iii) Normalization.
graph is shown in figure 3. We define two terminals for the representing the sink or background pixels. The goal is to find
graph – a source (s) and a sink (t). These two terminals are the a cut or a set of edges that separates the object and the
main nodes in the graph and are defined by the user. The background sets in a way that the cut has the minimum cost.
maximum cost (weight) in the graph will be given to these To perform the minimization process the cost or energy
terminal nodes. Nodes other than the terminals are assigned function is defined. The general form of the energy function is
nonnegative weights being less than or equal to the weights of as follows
the two terminals. Subset C (C ʗ E) is called a cut if it can
divide V into two separate sets S and (where T is equal to V -
S) in a way that s ϵ S and t ϵ T (s and t are the two terminals
of the graph). The cost of a cut is defined as the sum of the
costs of its edges. The minimum cut problem or the problem The Dp cost is defined as
of minimizing the cost function is performed by finding the
cut with minimum cost or energy. Cost is defined as
To segment the image, the terms of a graph such as Figure 4:Original image
the vertices, source, etc. are defined for the image. The pixels
of the image are defined as the vertices of the graph. All The described graph cut segmentation algorithm is
neighboring pairs of pixels of the image are assumed to be applied to eye images that are taken for iris recognition
connected to each other with a link and these links are called purposes to segment the image and detect the pupil boundary
the edges. Capacity of each link is defined in terms of the precisely. Knowing the fact that pupil is a dark region in any
sharpness of the edge existing between the pixels. The eye, one can assume the gray level of its pixels to be close to
sharpness of an edge is defined by the difference between zero. Since all regions of the image, except for the eyelashes
their intensity values. The label O or “object” can be assigned and the pupil, have high gray values, there is need for the
to a set of pixels to specify the source or object terminal and effect eyelashes in the picture. The pixels with small gray
the label B or “background” can be assigned to another set level values are marked as potential vertices to be labeled as
9EC6C5DB
4.4.Pattern Matching
4.2.Iris normalization
where I(x,y) is the iris region images (x,y) are the orginal
Cartesian coordinates (r, ø) are the corresponding normalized 5. Conclusion
polar coordinates and Xp,Yp and Xi,Yi are the coordinates of
pupil and iris boundary along o direction . Iris boundaries are recognized by using simple
methods and the less complex and faster algorithms than
Note : ø varies from 0 t0 360 previous algorithms and it eliminates pupilary noises and
r varies from 0 to Ri-Rp where reflections. Homogenization removes specularities of the
pupil., A method based on graph cuts was presented to
Ri=Radius of Iris, Rp=radius of pupil segment the pupil region in an eye image for iris recognition
purposes and thus we can recognize pupilary boundary (inner
boundary) accurately.
Adaptive threshold method can find the limbic radius [10] W.W.Boles and B.Boashash ,”A Human Identification
and limbic mid-point. By solving these parameters in circle Technique Using Images of the Iris and Wavelet Transform”, Signal
equation, we can recognize limbic boundary (outer boundary) Processing, IEEE Transactions on, Vol.46,No.4,1998.
accurately. The region between inner and outer boundary is
[11] Y.-P. Huang, S.-W. Luo E.-Y. Chen, ”An Efficient Iris
iris, it is in the polar form and converted into linear form by Recognition System”, Proceedings of the First International
converting the polar coordinate system to cartesian coordinate Conference on Machine Learning and Cybernetics
system, then converting the iris region from Cartesian
coordinates to the normalized nonconcentric polar [12]Ma, Y. Wang, and T. Tan, “Iris Recognition Using Circular
representation we get normalized image. By doing Symmetric Filters”, Pattern Recognition, 16th International
enhancement, the logical image with 360 in length and Conference on Vol.2,pp.414-417,2002.
breadth is the difference between the outer and inner boundary
is produced. The texture near the limbic and pupilary [13] Daugman, John G.”Biometric Personal Identification System
boundary inside the iris has some noises due to eyelashes and Based on Iris Analysis”, U.S.Patent 5,291,560.1994.
eyelids, by taking the middle row of the enhanced image a [14] Gonzalez, Rafael C., R. E. Woods, and Steven L. Eddins.
secret code is extracted from it. The secret code is converted “Digital Image Processing using MATLAB.” Prentice Hall,Upper
into Hexadecimal code of length 90. Hamming code distance Saddle River, NJ.20044
is being used for pattern matching. It can give the 1690
different iris codes . It can overcome the noises caused by [15] Boykov, Y. and Kolmogorov, V., "An Experimental
pupil in the image. In this graph cut method only the gray Comparison of Min-Cut/Max-Flow Algorithms for Energy
level information of the images was used to perform the Minimization in Vision," in IEEE Trans. on Patt. Anal. and Machine
segmentation. For future work the method can be expanded to Intel. (PAMI), vol. 26, no.9, pp.1124-1137, Sept. 2004.
evaluate color images.
[16] Boykov, Y. and Jolly, M.P., "Interactive Graph Cuts for
Optimal Boundary and Region Segmentation of Objects in N-D
Images," Proc. Intl. Conf. on Comp. Vision, Vol. I, pp. 105-112,
2001.
REFERENCES
[17] H. Mehrabian, A. Poursaberi, B. N. Araabi, “Iris boundary
[1] R.C.Gonzalez, Richard E. Woods, Digital Image Processing, detection for iris recognition using Laplacian mask and Hough
Pearson Education. transform”, 4th Machine Vision and Image Processing conference,
Iran, 2007.
[2] J.Forrester , A. Dick , P.McMenamin , and W.lee , The Eye :
Basic Scieences in Practice , W B Saunder , London , 2001. [18].A. J. Bron, R. C. Tripathi, and B. J. Tripathi. “Wolff‟s Anatomy
of the Eye and Orbit, 8th Edition.” Chapman and Hall
[3] J.Daugman ,” How Iris Rcognitioin Works “ ,IEEE Transaction Medical,London.1997.
on Circuits and System for Video Technology , Vol . 14, N0 . 1,pp .
21-30 ,2004