N. PRASANTH IV TH YEAR, DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING,NEHRU INSTITUTE OF ENGINEERING AND TECHNOLOGY, COIMBATORE, TAMILNADU, INDIA.

Similar documents
A Design Method for Composition and Reuse Oriented Weaponry Model Architecture Meng Zhang1, a, Hong Wang1, Yiping Yao1, 2

Cell Phone Controlled Robotic Vehicle

International Journal of Advance Engineering and Research Development

The Global CBRN Defense Market

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking

Authentication: Beyond Passwords

Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS

Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

AiMT Advances in Military Technology

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology

Computer Science 1400: Part #2: Getting Here: The First Computers ( )

A Propitious Iris Pattern Recognition Using Neural Network Based FFDTD and HD Approach

BIOMETRIC PRINTER SECURITY SYSTEM

Advanced Biometric Access Control Training Course # :

Infrared Vein Detection System For Person Identification

A Survey on Feature Extraction Techniques for Palmprint Identification

Structural Analysis Tools. Modernization

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Digital Defence LiDAR based Smart 3D Geospatial Intelligence for Smart Defence

Bengaluru Space Expo 2010

Biometric Palm vein Recognition using Local Tetra Pattern

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication

Highly Secure Authentication Scheme: A Review

International Journal of Informative & Futuristic Research ISSN:

Legal, Ethical, and Professional Issues in Information Security

Employing Mobile Applications for Capability Enhancement

And it could take 18 months to restore the electricity grid and social order.

REQUEST FOR INFORMATION FOR PROCUREMENT OF ELECTRONIC FUZES FOR 105MM, 130MM AND 155MM CALIBRE GUNS

[Mule, 4(2), February, 2017] ISSN: IMPACT FACTOR

JTC 1 SC 37 Biometrics International Standards

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Research on motion tracking and detection of computer vision ABSTRACT KEYWORDS

Human Computer Interface Through Biometric Iris Recognition System

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Critical Information Infrastructure Protection Law

Implementation of IRIS recognition for Securing Online Payment

Oceanic Domain Awareness- A Concept Rear Admiral Dr. S Kulshrestha, retd

A quick guide to iris recognition. Click on blue squares to navigate

Examining Cooperative Strategies through Cyber Exercises

Keywords Palmprint recognition, patterns, features

Implementing Net-Centric Tactical Warfare Systems

Mingle Face Detection using Adaptive Thresholding and Hybrid Median Filter

Export Management System. Information Needed for an Export Controls License Assessment. June 2009

A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING.

Facial Feature Extraction Based On FPD and GLCM Algorithms

CeBIT Australia CIO Summary Report

Leveraging Smartphone Technology for Offender Monitoring. Technology in Corrections: Challenges for the Future, Prague 2017

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

Researched on Initiation Synchronization of Addressable

The Success of the AMRAAM DBMS/DAS

D. Jagadeesan Assistant Professor, Dept. of Computer Science and Engineering, Adhiparasakthi College of Engineering, Kalavai,

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1

Assessing Transition of Security Operations in Afghanistan

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017

Design And Implementation Of Ordering System For Restaurants

Re: Request for Access to Data (Minn. Stat , subd. 3) Law Enforcement Mobile Biometric Technologies

Electronic warfare, information and cyber

An Solution of Network Service Oriented Operator Network Intrusion Prevention

Electron Progress EAD

Modern Campaigns Order Of Battle Editor

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

Table of Contents. 1. Company Overview. 2. Changing Business Scenario. 3. Why TCM Maturity Model for BEL. 4. Experience and learning from TCM Model

Homepages of Indian Central Universities Websites: A Study

A Novel Approach to Improve the Biometric Security using Liveness Detection

Biometric Security Technique: A Review

Creating a Cybersecurity Culture: (ISC)2 Survey Responses

PALM VEIN TECHNOLOGY

True/False Indicate whether the statement is true or false. Bubble A for True and B for False

True/False Indicate whether the statement is true or false. Bubble A for True and B for False

Net-Centric Systems Design and Requirements Development in today s environment of Cyber warfare

GREEN DEFENCE FRAMEWORK

Effective Leadership, Role of Workers & Labor Organizations

SRS Overview. Dave Hepner. Looking toward the future of the Savannah River Site

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Design of Digital Signature Verification Algorithm using Relative Slopemethod

Embedded Systems Projects

INTERNAL SECURITY. Chapter 1: Internal Security Challenges. Global Indices and Measurement of Vulnerability of a State Towards such Non-State Actors

Identification or Verification? Advanced Identification Technology

TWIC Reader Technology Phase

Optimization of Bit Rate in Medical Image Compression

Evolution of thermal imaging

Palm Vein Technology

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Semi-Active GSM Monitoring System SCL-5020SE

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

Introductory Visualizing Technology

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14

An Improved Iris Segmentation Technique Using Circular Hough Transform

The NextGen cyber crime battlefield. Why organizations will always lose this battle

Implementation of Color based Android Shuffling Pattern Lock

Brunswic. Welcome. Network video Surveillance. Biometric Identification (Face Detection) Biometric Identification (Finger Print)

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

TECHNOLOGY FOR A SAFER WORLD

Ms. Aparna G. Gale 1, DR. S. S. Salankar 2

[Gaikwad *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

An Efficient Iris Recognition System using Phase Based Technique

Transcription:

Importance of Iris Recognition against Technology Failure N. PRASANTH IV TH YEAR, DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING,NEHRU INSTITUTE OF ENGINEERING AND TECHNOLOGY, COIMBATORE, TAMILNADU, INDIA. ABSTRACT: It is undeniable that among the science and technology the role and importance of iris recognition is most reliable and accurate biometric recognition process. Iris recognition captures the iris region in the particular portion of an eye. The capture of the iris pattern should be done accurately. In this paper I explained about the importance of iris recognition in Indian Armed Weapons specially used in artillery guns of Indian army against technology. The iris coded of artillery soldiers are encoded with biometric devices is attached to the artillery weapons. It seems that the artillery gun will be triggered only when the iris pattern is matched with iris codes. By applying this biometric methodology we can protect Indian Armed Weapons in highly secure manner and also Indian Armed Weapons are utilize only by Indian soldiers. Therefore choosing the iris recognition is highly efficient and secure level of Future Warfare. Keyword: Artillery, Biometrics,Computation, Iris Recognition,Image Processing. I. INTRODUCTION Iris recognition is the process of recognizing the individual of the personal by analyzing and examination of the random pattern in Iris. Iris recognition is the most advance and reliable fast access recognition technique used to achieve our task in limited period of time[4]. Applying the iris recognition approach to the Indian armed weapons is the most advance, at the same time it will leads our nation to the high level of security. Indian Armed services requires biometrics and bio informatics dependent identification of biological weapons, epidemiological and environmental monitoring and prevention early warning systems of agroterrorism. By analyzing the theatre activities of past wars in India is very challengeable and also is a battle wining factor. For example In 1999 kargil war, the war was fought and win by both infantry and artillery. My paper explains the importance of Iris recognition in one of reliable artillery weapons name as BOFORS FH77-FIELD HOWITZER [8]. BOFORS is the Light Firing Gun hold the extreme line of control in war situation. It can be switch over to any type of Fields or regions like Thar Desert of Rajasthan and Siachen Glacier of Jammu and Kashmir [8]. Also it will hold the Defense line very closer to Neighbor countries Defense forces which made easily to capture our weapons during the war time. Iris recognition made the Light Firing Gun to highly protective. BOFORS guns cannot able to see their target but they can achieve their target in high accuracy with help of artillery observation post.artilleryguns owing its capability of destroying the enemies with firing power [8].After Kargil War the Indian army was modernized. DRDO scientist and researchers combined with Military Engineers modernized the simulation and moralization of Light Firing Gun [7]. But my research paper used to secure these Firing weapons in Biometric computation for modern warfare. II. HISTORY AND EVOLUTION OF IRIS RECOGNITION The iris recognition was first proposed by Dr Frank Burch, an ophthalmologist in the year 1936. In 1985 Dr Leonard flom & Aran safir made further research [1]. In 1987 Dr John Daugman takes his research with some advance technologies. After completing his A.B and Ph.D degree from Harvard University, Cambridge in 1976 and 1983 respectively, he introduced more techniques whichreally interacted towards the Iris recognition [1]. He is the inventor of iris recognition for personal identification. In 1993, Defense Nuclear Agency started a research work with thesis of Dr John Daugman[1]. In 1995 the first Iris recognition commercial product is introduced. In 2005, Dr John International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 55 Page

Daugman and his team provided marketing opportunity to the peoples[1]. This shows that Iris recognition is very favorable with technology and applicable to the people for their day-to-day requirements [1]. Presidential directive calls for mandatory government wide personal identification card for all federal employees and contractors [1]. US patent on iris recognition concept expires2005 Iris on the Move is announced at Biometrics Consortium ConferenceThe Innovations and Thesis of Dr John Daugman in not expired until the year of 2011[1]. Dr John Daugman research work is an open platform to raise the research work of Iris recognition to younger generation scientists and innovators. III. PRICIPLES OF IRIS RECOGNITION Iris is the vascular filament which is present in the out bound layer of the retina. This is also a kind of muscular organism but generally it is the form of a filament with number of nerves patterns formed one another. Even then eye is the most important organ of a human being and iris is the important organ of the eye it seems as much like a retina pattern. Iris is decides the structure of the eye ball. The size, shape, visual capacity and colored region are to be identified by the cell random pattern of the iris. This sense is easily making us to identify the iris difference within the humans [3] [2]. The analyzing and implementing of iris recognition is examined by the infrared rays. The using of infrared rays are more sufficient energy and cause photo chemical effects [2]. The principle behind the iris recognition is based as same as capturing the picture, detecting using the X-rays as well. But the iris recognition is deals with the thinnest softest portion of the human organ. With the beam of IV rays, Iris recognition components are more harmful and sufficient to human eyes also it doesn t cause any serious injury to the eye. Fig.1 Internal structure of a Human eye IV. SIMULATION OF IRIS RECOGNITION The first process involves in the iris recognition is capturing of iris patterns of the related human then the capture patterns is converted into to computational frames by using Image processing which converts the patterns into bit coded digits (namely machine language). Image processing will converts the pattern in one form to another without changing its original structure and further it is extracted the iris pattern from the capture. The iris of n (counting may depends on the number of required persons) number of persons is have to be stored in Database which is suitable for retrieving process[5]. If the iris pattern is recognized stored in the database, then the database manager will indicates the matches of the iris pattern to visible [6]. Then the pattern will be authenticated or unauthenticated by the recognizer. International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 56 Page

Fig.2 Actual Identification of an Iris pattern The captured iris patterns are recognized by iris recognizer and examined whether pattern is authenticated or imposter. The iris recognizer will recognize and computes the iris patterns even the eye ball will be affected with eye diseases and infections. IRIS IMAGE CAPTURING IMAGE PROCESSING EXTRACTED TO UNIQUE BINARY CODE TEMPLATE MATCHING Yes ANALYSING NN THE DATABASE IMPOSTER No AUTHENTICATE Fig.3 Simulation of Iris recognition Only authenticate iris pattern is converted into Unique Binary code representation by process of image processing. Fig.4. Iris pattern with its Unique Binary code representation V. SECURE TRIGGERING OF LIGHT FIRING GUN BY IRIS RECOGNITION In artillery regiment of Indian army three Light firing guns are more important during the war namely, 1.1. 105mm Indian Field gun Targeting the destination within 10kms of ranging. 5.2. 130mm MK-46 Towed Field Guns Targeting the destination of 20kms of ranging 5.3. 155mm - BOFORS FH-77 FIELD HOWITZER- Targeting the destination of 20km, 30km and beyond. International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 57 Page

My paper is the triggering the iris the BOFORS guns by iris recognition through layering regions. BOFORS are the light firing guns used in high attitude, reliable war situation mainly to destroy the aircrafts, missiles and airvehicles around their surveillance. The Biometrics device which has the iris pattern is fitted with the ignition button. When the iris pattern of an Indian soldier is fired the gun. The iris recognition is fitted with the layeringsection as Recuperator is preferable. An every Light Firing Gun must have five soldiers. So iris pattern of five soldiers are recognized and stored it in the biometric device. The iris pattern is to be changed as per the soldiers. Fig.5. 155mm - BOFORS FH-77 FIELD HOWITZER in Indian Army VI. IRIS RECOGNITION A SOLUTION FOR TECHNOLOGY FAILURE IN INDIAN ARMED FORCES Nowadays Indian Armed Forces, Military Engineering Corps are using modernized and highly reliable weapons. So it s our duty to protect our weapons & weapons system from the countries and other anti social activities[7]. The accurate and securable war weapons are authenticate and protected only by the means of Biometric System as Iris recognition when compared with other finger, palm, and speech recognition process. In future the iris recognition will be the global protection for Indian armed forces in future warfare. International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 58 Page

Fig.6. Iris recognition technique in layering region of an Artillery Weapon VII. CONCLUSION IRIS RECOGNITION has been widely used as a form of identification of iris pattern for many years and is well established in defense technology to empower the Nation security. The biometric applications of iris recognition continue to increase the growth of armed weaponry more securable and also it would be a prices fall. The supporting systems enhanced for the promotion of iris recognition should be taking charged and upgrade as per the generation. This paper is useful for the engineering corps and defence scientist for their references and implementation iris technology in defence weapon system. IRIS RECOGNITION is the only security concerns with biometric identification and authentication systems against the other technology recognition failures. Iris recognition is more important to secure our weapons in future information warfare, cyber warfare and also protective measure for technological warfare. REFERENCES [1]NSTCSubcommittee on Biometrics, can be found at http://www.biometricscatalog.org/nstcsubcommittee [2] InternationalJournal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 6, June 2012)DAUGHMAN S ALGORITHMMETHOD FOR IRIS RECOGNITION-A BIOMETRIC APPROACH. [3]IEEE Transaction On Circuits and systems for Technology, VOL. 14, NO. 1, JANUARY 2004 How Iris Recognition Works John Daugman [4]Artificial Intelligence A Modern Approach Third Edition Stuart J. Russell and Peter Norvig Copyright c_ 2010, 2003, 1995 by Pearson Education, Inc., Upper Saddle River, New Jersey 07458. [5] BIOINFOMATICS: New Technology Models for Research, Education and Science [6]MARK GERSTEIN, 1999, Yale, bioinfo.mbb.yale.edu [7] www.indianarmy.nic.in/notification/future Technology Requirements of the Indian Army. [8]www.indianarmy.nic.in International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 59 Page