ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
نویسندگان
چکیده
A secure identification system based on human iris recognition has been an attractive goal for researchers for a long time. In this paper, we propose an efficient iris recognition scheme. To significantly reduce the computational time that is required for locating the iris boundaries in a captured eye image, only the 3and 9o’clock sides of the iris are considered in our scheme as a search area for finding the outer boundary of the iris. The donut-shape of the iris is then mapped into a rectangular region with constant dimensions to mitigate the problem of changing the iris size that may occur due to having variations in the image capturing conditions. Thenceforth, the lower half of the iris ring is considered as a region of interest for feature extraction. This region is slightly interfered by eyelids and eyelashes. The feature extraction process is performed by a proposed local binary quantization technique. This technique requires a lower computational time than that of other techniques that extract the features of an iris using wavelet analysis (i.e., such as Fourier and Gabor analysis). It should be borne in mind that the computational time of wavelet analysis could be a challenge in online applications. Furthermore, the parameters of wavelet analysis are set in advance and hence they may not adapt with some noises and changes in the iris image as a result of having variations in the image capturing conditions. However, the proposed local binary quantization technique is not affected by these variations. The CASIA iris database is used to conduct several experiments that show the performance of the proposed scheme. Compared to other schemes, the proposed scheme achieves a correct segmentation rate of 99% at a low segmentation time and a correct recognition rate of 99.34%.
منابع مشابه
ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
This paper describes a new two-task approach for extracting the centerline from simple 2D polygons. An algorithm of the first task, which generates a set of points for future centerline, is presented. The idea of the algorithm is to use the polygon hatching by parallel lines and creating paths from its middle points in different polygon rotations. The centerline is derived from the intersection...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
Abstract. In this work, we investigate a multi-risk model describing insurance business with two or more independent series of claim amounts. Each series of claim amounts consists of independent nonnegative random variables. Claims of each series occur periodically with some fixed inter-arrival time. Claim amounts occur until they can be compensated by a common premium rate and the initial insu...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
Speech recognition is one of the fundamental requirements for fully autonomous robotic systems nowadays. The objective of the presented work is to offer a smartphone based speech recognition system for ROS (Robot Operating System) based autonomous robotic systems. The proposed recognition process consists of three steps, namely acquisition, preprocessing, and result extraction. In the contribut...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA. Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure. Having motivated, we first define a forma...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
Certificate-based signature (CBS) is an attractive paradigm since it simultaneously solves the certificate revocation problem in conventional signatures and the key escrow problem in ID-based signatures. In particular, short certificate-based signatures are useful in bandwidth reduction for communication due to their short signature lengths. However, it is still a challenging and open problem t...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
We studied outlier document filtering (ODF) for extractive sentence summarization. Our results are superior compared to the average of the participant systems’ using DUC 2006. Furthermore, we add extractive paragraph summarization to the same system. It is surprising that the results are nearly the same for ROUGE metrics. Although extractive paragraph summarization has a better performance for ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014