THE APPLICATION OF DIFFERETIAL BOX-COUNTING METHOD FOR IRIS RECOGNITION AHMAD AZFAR BIN MAHMAMI

Similar documents
BORANG PENGESAHAN STATUS TESIS

BORANG PENGESAHAN STATUS TESIS

DEVELOPMENT OF VENDING MACHINE WITH PREPAID PAYMENT METHOD AMAR SAFUAN BIN ALYUSI

HOME APPLIANCE CONTROL SYSTEM TAN WEI SYE

DESIGN ANALYSIS OF EXTERIOR CAR BODY PART BASTIAN WIBAR BIN MOMANG

ZIGBEE-BASED SMART HOME SYSTEM NURUL ILMI BINTI OMAR

PROTOTYPE OF POWER LINE INTERFACE SOCKET USING EMBEDDED CONTROLLER FOR DATA ACQUISITION AND CONTROL. LAI CHING HUAT

AN ANDROID-BASED SMART SECURITY TOURING SYSTEM FOR REAL-TIME DATA RECORDING USING NFC, GPS AND GSM TECHNOLOGY.

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI MALAYSIA PAHANG BORANG PENGESAHAN STATUS TESIS

PERFORMANCE EVALUATION OF LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS USING NS2 MUHAMAD FAIZ BIN RAMDZAN

PERFORMANCE ANALYSIS OF VIDEO TRANSMISSION OVER IEEE ARCHITECTURE NOOR HURUL-AIN BINTI MOHAMAD

PREDICTION OF SURFACE ROUGHNESS IN TURNING OPERATION OF LOW CARBON STEEL AISI 1018 FAKHRUR RAZI BIN BAHRIN UNIVERSITI MALAYSIA PAHANG

COORDINATION PROTECTION SYSTEM IN INDUSTRIAL PLANTS AHMAD TARMIZI BIN MD NOR

BORANG PENGESAHAN STATUS TESIS* TERHAD (Mengandungi maklumat TERHAD yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan)

HOME APPLIANCES MONITORING AND CONTROL USING SMARTPHONE APPLICATION AHMAD DANIAL BIN AHMAD NAZRI

IMPLEMENTATION OF DIAMOND SEARCH (DS) ALGORITHM FOR MOTION ESTIMATION USING MATLAB SITI HAJAR BINTI AHMAD

SMART PARKING SYSTEM USING LABVIEW MUHAMMAD NAZIR BIN MAT ISA

SESSION BASED ACTIVITY MONITORING APPLICATION FOR ANDROID TAN LEIK HO

SMART BODY MONITORING SYSTEM MOHAMAD KASYFUL AZIM BIN AHMAD

COMPARATIVE STUDY BETWEEN FEATURE EXTRACTION METHODS FOR FACE RECOGNITION

IRIS RECOGNITION USING ARTIFICIAL NEURAL NETWORK FATIN ZURIAH BINTI MOHAMMAD ZUHARY

UPGRADE FMS200: SHAFT SUPPLY MODULE THOUGH HUMAN MACHINE INTERFACE LEE HO CHUNG

HOME APPLIANCES AND SECURITY CONTROLLED VIA GSM SYSTEM NUR SYAFIQAH BINTI YUSOP

NUR FARAH DIYANA BINTI SABARUDIN

AUTO SILENT MODE FOR ANDROID SMARTPHONES MUHAMMAD AZLAN SHAHARIMAN BIN AHMAD

BORANG PENGESAHAN STATUS TESIS

LOW COST MP3 PLAYER USING SD CARD KHAIRIL AMRI BIN MUHAMAD UNIVERSITI TEKNIKAL MALAYSIA MELAKA

WEB-BASED DEVICE CONTROL AND COMMUNICATION VIA PARALLEL PORT MOHD RASHDAN BIN ABD RAHMAN UNIVERSITI TEKNIKAL MALAYSIA MELAKA

VIDEO DISTORTION MEASUREMENT USING PSNR IN WAVELET DOMAIN MOK YUNG LENG

SYSTEM MANAGEMENT AQIQAH AND QURBAN ONLINE (SMAQO)

BORANG PENGESAHAN STATUS TESIS*

PROJECT TITLE JARIPAH BINTI ADZHAR

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

DEVELOPMENT OF HOME ENERGY MANAGEMENT SYSTEM (HEMS) CHEA MENG HUAT UNIVERSITI TEKNIKAL MALAYSIA MELAKA

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

DESIGN OF ENERGY SAVING AIR CONDITIONING CONTROL SYSTEM MOHD KHUZAIRIE BIN MOHD TAUFIK

PLC APPLICATION FOR FLOOD DETECTION AND PROTECTION VIA COMMUNICATION SYSTEM MOHD AKMAL BIN ZAINAL ABIDIN

KARAOKE MACHINE TOOL MOHD AIEZATT DANIAL B RAMIZAN

LOCALIZING NON-IDEAL IRISES VIA CHAN-VESE MODEL AND VARIATIONAL LEVEL SET OF ACTIVE CONTOURS WITHTOUT RE- INITIALIZATION QADIR KAMAL MOHAMMED ALI

BORANG PENGESAHAN STATUS TESIS*

BORANG PENGESAHAN STATUS TESIS JUDUL: TAILOR SYSTEM (TailorSys) (HURUF BESAR)

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

EDUCATION PATH SYSTEM MOHD ZULHAFIZ BIN HUSSIN

REMOVING AL-QURAN ILLUMINATION AMIRUL RAMZANI BIN RADZID UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

FORCE ANALYSIS ON ROBOTIC DEBURRING PROCESS

SIT1 NURI-IAZA BINTI MOHD RAMLI

This item is protected by original copyright

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

THE DEVELOPMENT OF MODULAR PRODUCT DESIGN: FOLDABLE CHAIR

UNIVERSITI TEKNIKAL MALAYSIA MELAKA OPTIMIZATION OF MEASUREMENT PARAMETERS IN NON- CONTACT MEASURING SYSTEM

AUTOMATIC RAILWAY GATE CONTROLLERUSING ZIGBEE NURLIYANA HAZIRAH BINTI MOHD SAFEE (B )

NUR ZURAIN BT ZUBAIDI B

7 I I, BORANG PENGESAHAN STATUS TESIS* SESI PENGAnAN: 2012 I Saya MOHD FARID BIN MOHD YUSOF (B )

Performance of Real Time Traffic In The Ethernet And WLAN Using TCP And UDP Protocols. Punitha Subbramaniam

DEVELOPMENT OF TIMETABLING PROGRAM FONG WOON KEAT

HOME MAILBOX NOTIFICATION MOHD HAZWAN BIN MOHAMED HARITH

Study of Distributed Coordination Function (DCF) and Enhanced DCF (EDCF) in IEEE MAC Protocols for Multimedia Applications.

2D CUT-OUT ANIMATION "MAT TUNANGKU"

IRIS RECOGNITION SYSTEM USING HISTOGRAM ANALYSIS NORHUDA BINTI OTHMAN

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

MD RIDZUAN BIN TALIB DESIGN A MULTI-FUNCTION DIGITAL THERMOMETER

Signature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka

PERFORMANCE ANALYSIS OF SMARTPHONE BASED REAL-TIME DRIVER ASSIST SYSTEM OVER IEEE WIRELESS NETWORKS WONG CHEE YIN

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

PERPUSTAKAAN UTHM *

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

DEVELOPMENT OF MOBILE ROBOT CONTROLLER BASED ON BLUETOOTH COMMUNICATION SYSTEM MUHAMAD ROZAIMI BIN MUHAMAD SABRI B

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

SMART AQUARJUM (A UTOMATIC FEEDING MACHINE) SY AFINAZ ZURJATI BINTI BAHARUDDIN

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

KOLEJ UNIVERSITI TEKNOLOGI TUN HUSSEIN ONN

BORANG PENCALONAN HADIAH UNIVERSITI NOMINATION FORM FOR UNIVERSITY AWARD

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

PROCESS AND YIELD IMPROVEMENT FOR HSDPA MODEM COLLABORATION WITH CUBIC ELECTRONICS SDN BHD NORUL HUSNA BINTI KHOLIAH

BORANG PENGESAHAN STATUS TESIS ν

MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

SISTEM KA W ALAN AUTOMATIK MENGGUNAKAN PENGGESAN UL TRASONIK AZRINA BINTI MASTOR

INFORMATION TECHNOLOGY EQUIPMENT MANAGEMENT SYSTEM (ITEMS) MOHD NOR IRMAN BIN SULAIh4AN UNIVERSITI TEKNCKAL MALAYSIA MELAKA

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

FINITE ELEMENT ANALYSIS OF SEEPAGE FLOW UNDER A SHEET PILE LOH LING PING

THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

HARDWARE-ACCELERATED LOCALIZATION FOR AUTOMATED LICENSE PLATE RECOGNITION SYSTEM CHIN TECK LOONG UNIVERSITI TEKNOLOGI MALAYSIA

BORANG PANGESAHAII STATUS TESIS

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

A Novel Identification System Using Fusion of Score of Iris as a Biometrics

ELECTROMAGNETIC MODELLING OF ARTIFICIAL PACEMAKER. Emelia Anak Gunggu

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

Transcription:

i THE APPLICATION OF DIFFERETIAL BOX-COUNTING METHOD FOR IRIS RECOGNITION AHMAD AZFAR BIN MAHMAMI This Report Is Submitted In Partial Fulfillment of the Requirements for the Award Of Bachelor of Electronic Engineering (Computer Engineering) With Hounors Faculty of Electronic and Computer Engineering Universiti Teknikal Malaysia Melaka June 2015

ii UNIVERSTI TEKNIKAL MALAYSIA MELAKA FAKULTI KEJURUTERAAN ELEKTRONIK DAN KEJURUTERAAN KOMPUTER BORANG PENGESAHAN STATUS LAPORAN PROJEK SARJANA MUDA II Tajuk Projek : The Application of Differential Box-Counting Method for Iris Recognition Sesi Pengajian : 1 4 / 1 5 Saya AHMAD AZFAR BIN MAHMAMI mengaku membenarkan Laporan Projek Sarjana Muda ini disimpan di Perpustakaan dengan syarat-syarat kegunaan seperti berikut: 1. Laporan adalah hakmilik Universiti Teknikal Malaysia Melaka. 2. Perpustakaan dibenarkan membuat salinan untuk tujuan pengajian sahaja. 3. Perpustakaan dibenarkan membuat salinan laporan ini sebagai bahan pertukaran antara institusi pengajian tinggi. 4. Sila tandakan ( ) : SULIT* *(Mengandungi maklumat yang berdarjah keselamatan atau kepentingan Malaysia seperti yang termaktub di dalam AKTA RAHSIA RASMI 1972) TERHAD** **(Mengandungi maklumat terhad yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan) TIDAK TERHAD Disahkan oleh: (TANDATANGAN PENULIS) (COP DAN TANDATANGAN PENYELIA)

iii I hereby declare that this report is the result of my own work except for the quotes as cited in the references Signature : Author Name : Ahmad Azfar Bin Mahmami Date : 3 June 2014

iv I hereby declare that I have read this report and in my opinion this report is sufficient in terms of the scope and quality for the award of Bachelor of Electronic Engineering (Computer Engineering) With Honors Signature : Author Name : Norazlina Binti Abdul Razak Date : 3 June 2014

v A special dedication to my parents, Mr. Mahmami Bin Alias and Mrs. Azizah Binti Abdul Aziz for giving me a moral support, for my supervisor Puan Norazlina Binti Abdul Razak for supervise teaching me during my final year project studies, and thanks to my dearest friends.

vi ACKNOWLEDGEMENT I would like to express my grateful to Allah S.W.T for blessing me with a good health, knowledge and strength to finish my thesis writing and final year project successfully. My special thanks to my supervisor, Puan Norazlina Binti Abdul Razak for conducting me during this final year project studies. A lots of help, guidance and knowledge provided by her, helping me a lot during my final year project studies. I would like to thanks to my parents for their support especially moralty support throughout my studies. They have been my inspiration since I started my degree studies in Universiti Teknikal Malaysia Melaka. This thesis is a part of their contribution. Lastly, I would like to thanks to Universiti Teknikal Malaysia Melaka for giving me the very best facilities during my studies, and my dearest friends who helped me a lot to complete this thesis writing. May god bless your life.

vii ABSTRACT Biometrics technology is a part of technology which controlling the personal identification and verification systems, which use to secure any important informations. One of the biometrics technology is the iris recognition system. Iris recognition system is technology that recognize the human eye as the person identification in the verification system. The uniqueness of the iris, makes this iris recognition system is one of the most secure verification system. The possibilities of human having the same irises pattern is almost to zero. It is also non-hackable system if compares with PIN based identification. Therefore, in this project the Differential Box-Counting Method was introduced in feature extraction process in order to evaluate the performance of this method in iris recognition system. A neural network tool in MATLAB is used to evaluate the performance of the system. The performance of this method is expected to achieve 80% of recognizable.

viii ABSTRAK Teknologi biometrik adalah sebahagian daripada teknologi yang mengawal identiti dan pengesahan untuk sistem peribadi, dan ia juga digunakan untuk melindung segala maklumat yang penting. Salah satu teknologi biometrik adalah sistem pengesan mata. Sistem ini menggunakan keunikan mata sebagai pengecam identiti manusia. Keunikan mata menjadikan sistem ini salah satu sistem pengesahan yang paling selamat diantara system lain yang sedia ada. Kebarangkalian manusia mempunyai corak mata yang sama hampir kepada sifar, menjadikan sistem ini antara system yang selamat untuk digunakan. Ia juga merupakan sistem yang tidak boleh digodam dengan mudah, jika dibandingkan dengan sistem yang berasaskan nombor PIN. Oleh itu, dalam projek ini teknik Differential Box-Counting digunakan dalam proses pengekstrakan ciri untuk menilai prestasi teknik ini dalam sistem pengesanan mata. Alat rangkaian neural dalam MATLAB digunakan untuk menilai prestasi system ini. Prestasi kaedah ini dijangka mencapai 80 % dapat dikenali.

ix TABLE OF CONTENT CHAPTER TITLE PAGE TITLE SUPERVISOR CONFIRMATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENT LIST OF FIGURES i ii vi vii viii x xi I INTRODUCTION 1.1 PROJECT INTRODUCTION 1 1.2 OBJECTIVES 2 1.3 PROBLEM STATEMENT 2 1.4 SCOPE OF PROJECT 3 1.5 PROJECT LIMITATION 3 1.6 REPORT STRUCTURE II LITERATURE REVIEW 2.1 INTRODUCTION 5 2.2 IRIS RECOGNITION SYSTEM 7 2.2.1 IMAGE ACQUISITION 7 2.2.2 SEGMENTATION 8 2.2.3 NORMALIZATION 9 2.2.4 FEATURE ENCODING 10 2.2.5 MATCHING 11 2.3 FRACTAL DIMENSION 11

x 2.4 DIFFERENTIAL BOX-COUNTING METHOD 13 III RESEARCH METHODOLOGY 3.1 PROJECT PLANNING 18 3.2 GANTT CHART 19 3.3 PROJECT FLOWCHART 20 3.4 IMAGE PREPROCESSING 21 3.5 FEATURE EXTRACTION 21 3.6 NEURAL NETWORK CLASSIFICATION 21 3.7 MATLAB SIMULATION 21 IV RESULT & DISCUSSION 4.1 AUTOMATIC IRIS SEGMENTATION 26 4.2 FEATURE EXTRACTION 33 4.3 NEURAL NETWORK 36 4.4 ANALYZE PERFORMANCE 39 V CONCLUSION & RECOMMENDATION 5.1 CONCLUSION 41 5.2 RECOMMENDATION 42 REFERENCES 44 APPENDIX A 45 APPENDIX B 61

xi LIST OF FIGURE NO TITLE PAGE 2.1 Example of iris pattern 6 2.2 Iris recognition system 7 2.3 Sample of iris imeges from CASIA 8 2.4 Iris segmentation 8 2.5 Rectangular representation of an iris 9 2.6 Feature encoding 10 2.7 Example of iris image has been transformed into fractal image 12 2.8 Index value between Euclidean and fractal 12 2.9 Example of DBC method application for determining the 13 number of boxes 2.10 Example of DBC method application with boxes 14 2.11 Example of Richardson s Plot 16 2.12 Example of comparing the complexity between three 16 methods (DBC, Gangepain and Keller) 2.13 Example of comparing the number of computations 17 between five methods 3.1 Gantt chart 19 3.2 Project flowchart 20 3.3 Step to use the neural network classification in MATLAB 22 4.1 Original eye and the find circle eye 27 4.2 Iris circle converted into a rectangular pattern 27 4.3 The good and the poor segmentation result 28 4.4 Correct iris region 29

xii 4.5 Fail iris region 30 4.6 Correct iris segmentation 31 4.7 Fail iris segmentation 32 4.8 Selecting the iris region to be calculated 33 4.9 Value of Fractal Dimension for an image 34 4.10 Input data stored in Excel 34 4.11 Output target in Excel 35 4.12 Import the input and output data 36 4.13 Data used for validation, training and testing 37 4.14 Neural Network architecture 37 4.15 Training, validation and testing results 38 4.16 Confusion plot 39 4.17 Performance plot 40

1 CHAPTER 1 INTRODUCTION 1.1 Project Introduction Private information is normally provided by using passwords or Personal Identification Numbers (PINs) for authentication, which are easy to implement, but it is exposed to probability that user forgotten their password. Biometric technology, which is uses human physiological character for personal identification, is a more effective alternative to replace the PIN based authentication techniques [1]. In biometrics nowadays, iris recognition is a type of physical identification that is based on the personal and unique characteristics of the iris, the colored ring around the pupil of an eye. Similar to the more common fingerprint recognition, iris recognition is based on scanning a person's iris and comparing the scan to a stored photograph or template to make an identification match [2]. Current iris recognition systems perform the iris identification matching with high computational complexity. This new iris recognition system is very effective because it can reduce the searching time and computational complexity, and it is also can increase the accuracy of the recognition system [3]. However, the potential requirement of obtaining high accuracy is that users supply iris images of good quality. Current iris recognition systems require only frontal view images of good quality and remove poor quality images by evaluating qualities of images [4].

2 The iris image database will be computed in order to find the estimation fractal dimension of the image. The methods that can be used for image fractal dimension estimation are such as Hausdorff dimension, box-counting dimension, differential boxcounting method and many more. The box-counting method is widely used because of it's computability and conveniently. In those methods based on box-counting dimension estimation, the main methods are the differential box-counting method (DBCM) and probability method (PM), while differential box-counting method is more widely applied [5]. 1.2 Objectives of this project The main goal of this project is to use the differential box-counting method in the iris recognition system. Specifically, the main objectives of this project are: a) To apply the application of differential box-counting method in iris recognition b) To evaluate the performance and the accuracy of the differential boxcounting method by using neural network. 1.3 Problem Statement There are several problems that occur in iris recognition such as inaccurate in capturing the image pattern, texture analysis and segmentation, and shape measurement. This differential box-counting method is the easiest method to use in image recognition because of its simplicity, automatic computability and more accurate in image processing [5]. The normal box-counting method has the disabilities in capturing or measuring the gray scale image because it is mainly measuring the binary image rather than gray scale image. So, the differential box-counting method offers the solution in measuring a grayscale image and it is also more effective than the box-counting method [6].

3 1.4 Scope of Project The scope of this project is to perform the neural network classification and measure the performance of the classification. The neural network classification should result an 80% of accuracy. The iris image database will be obtained at CASIA website. The MATLAB software will be used to program the algorithm to compute the fractal dimension for iris image. To compute the fractal dimension of iris images, the differential box-counting method will be used. About 50-100 iris image database will be computed and also about 10 of humans irises will involve in this research. 1.5 Project Limitation This project has a limitation of the study. In this project, only about 50-100 iris images and about 10 human irises will be used to perform the neural network classification and fractal dimension. Only MATLAB software will use to perform the neural network classification. For the fractal dimension estimation, only differential boxcounting method will be used. 1.6 Report Structure This thesis is a combination of five chapters that contain the introduction, literature review, methodology, result and discussion and the last chapter is the conclusion and recommendation of the project. Chapter 1 is an introduction to the project. In this chapter, we will explain the background and objectives of the project. The concept behind the project and an overall overview of the project also will be discussed within this chapter. Chapter 2 tells about the literature review of the application of differential box-counting method based upon previous research done.

4 Chapter 3 will explain about the project methodologies of the project. This chapter will show the steps and flow for problem solving in such a specific method used to estimate the fractal dimension or feature extraction using the differential box-counting method and the neural network classification in order to find the 80% of accuracy will be focused on. Chapters 4 describe the expected result from this project and justify its performance to make sure it meets the objectives of the research. Finally, Chapter 5 concludes the whole research and proposes the future progress of the project.

5 CHAPTER 2 LITERATURE REVIEW This chapter will explain and discuss about the literature which is related to iris recognition and the implementation method that has been studied from different resources to perform this project. 2.1 Introduction Biometric identification or verification of identity is currently a very effective system for recognition. Many applications that require the personal identification for authentication, such as banking, computer network access, or physical access to a private facility, are replacing the current system such as a PIN number or access card. These PIN numbers and card access are easy to exploit or hackable [1]. A higher degree of confidence can be achieved by using unique physical or behavioral characteristics to identify a person, this is biometrics. A physical characteristics such as iris pattern, fingerprint, facial feature, is a very stable characteristics and very suitable to use for identification system because the probability of having the same physical characteristic is almost to zero [8].

6 Figure 2.1: Example of iris pattern As a vital and different trademark for status, the iris has numerous focal points, for example, uniqueness, steadiness, and many more. Non-contacting biometrics are the unavoidable pattern of the examination and the advancement of status identification. The error rate of iris distinguish is the most minimal in all the biometrics as indicated by the statistic [7]. To enhance the accuracy, the vast majority of the biometric verification system store numerous templates for every user to record for varieties in biometric information. Consequently, these systems may experience the problem of not enough storage room and computational overheads. With a specific end goal to address these issues, the system must be monitored and upgrade if needed and optimize the computational by making a solid example, an iris format for every user instead of keeping up numerous templates [9]. Thus, there are many methods that have been produced and proposed by researchers in order to increase the performance iris recognition system. Those methods are believed to be the most effective methods to be approachable in the iris recognition system.

7 2.2 Iris Recognition System The iris recognition process consists of 5 major steps. The first step is the image acquisition of a person's eye at enrollment time or check the time. The second step is to segment the iris out of the image containing the eye and part of the face, which localizes the iris pattern. Step three is the normalization; here the iris pattern will be extracted and scaled to a predefined size. Step four is the template generation, here the details of the iris are filtered, extracted and represented in an iris code. The last step is the matching phase, where two iris codes will be compared and a similarity score are computed [9] [10]. These steps are shown schematically in Figure 2.2. Figure 2.2: Iris recognition system 2.2.1. Image acquisition Acquisition of the eye image includes the lighting system, positioning system and the physical capture system. During this process, the iris image in the input sequence must be clear and sharp. A high quality image must be selected for iris recognition [13]. This image database can be downloaded from the internet such as CASIA website. The sample of the iris images is shown as figure below.

8 Figure 2.3: Sample of iris images from CASIA 2.2.2. Segmentation A good segmentation algorithm should involve two procedures, iris localization and noise reduction. The iris localization processes take the acquired image and find both the boundary between the pupil and iris, and the boundary between the iris and the sclera. The noise reduction process refers to localizing the iris from the noise (non-iris parts) in the image. These noises include the pupil, sclera, eyelids, eyelashes, and artifacts. Figure 2.4 shows the iris segmentation step [9] [10]. Figure 2.4: Iris segmentation

9 2.2.3. Normalization Once the iris region has been duly segmented from a given image, it becomes important to organize its information to enable future comparisons. For the processing of an accurate match, it is essential to have in one database, images which contain the same dimensions. However, some factors contribute to dimensional inconsistencies such as varying imaging distance and also the stretching of the iris caused by pupil dilatation from varying levels of illumination. Other sources of inconsistency include a possible rotation of the camera, head tilt, and rotation of the eye within the eye socket. Another point to note is that the pupil region is not always concentric within the iris. Normally the pupil presents a slightly nasal position, that is, the pupil s center is at a lower position than that of the iris center and closer to the nose. The normalization process is responsible for the generation of images with fixed dimensions, and so, images of the same iris captured under different conditions will have characteristic features at the same spatial location. John Daugman has proposed a method to generate a rectangular representation of the ring shaped iris region through a dimensional polar coordinates. This representation shows in the figure 2.5 [9] [10]. Figure 2.5: Rectangular representation of an iris The center of the pupil is considered as the reference point, and radial vectors pass through the iris region. A number of data points are selected along each radial line. This number of points represent the radial resolution and defines

10 the vertical dimension of the rectangular representation. The number of radial lines represents the angular resolution and defines the horizontal dimension of the rectangular representation. This method takes into account pupil dilatation, imaging distance and non-concentric pupil displacement [9] [10]. 2.2.4. Feature Encoding In the feature encoding step, a template representing iris pattern information is created using a Gabor filter, log Gabor filter or zero-crossing of the wavelet transform. The differences in lighting between two different images cause error when directly comparing the pixel intensity of two different iris images. To alleviate this difficulty, Duagman extracted the features from the normalized iris image by using convolution with 2-D Gabor filters. In that system, the filters are multiplied by the raw image pixel data and integrated over their domain of support to generate coefficients which describe, extract, and encode image texture information. A noise mask associated with the feature template is generated to mark the corrupted bits in the template, Figure 2.6 [9] [10]. Figure 2.6: Feature encoding

11 2.2.5. Matching The goal of matching is to evaluate the similarity of two iris representations. Created templates are compared using the Hamming distance or Euclidean distance. The normalized Hamming distance used by Daugman measures the fraction of bits in which two iris codes disagree. A low normalized Hamming distance implies strong similarity of the iris codes. If parts of the irises are occluded, the normalized Hamming distance is the fraction of bits that disagree in the areas that are not occluded on either image. To account for rotation, a comparison between a pair of images involves computing the normalized Hamming distance for several different orientations that correspond to circular permutations of the code in the angular coordinate. The minimum computed normalized Hamming distance is assumed to correspond to the correct alignment of the two images [9] [10]. 2.3 Fractal Dimension Fractal Dimension is an index that uses for texture segmentation, shape classification and graphic analysis. One of the frequent technique that use to estimate the fractal dimension and to improve the accuracy is a differential box-counting method [5]. The differential box-counting dimension is the most frequently used for measurements in various application fields. The reason for its dominance lies in its simplicity and automatic computability. Precisely, the fractal dimension offers the ability to describe and to characterize the complexity of the images or more precisely of their texture composition. Fractal dimension index represented in non-integer value, unlike the Euclidean dimension which it represents the index in in the integer value depends on the shape. The shape represents the index value is given in figure 2.8 below.

12 Figure 2.7: Example of iris images has been transformed into fractal image Figure 2.8: Index value between Euclidean and fractal dimension In Euclidean dimension, index 0 describing the points (0-dimensional sets), index 1 is for sets describing lines (1-dimensional sets having length only), index 2 for sets describing the surfaces (2-dimensional sets having length and width), and index 3 for sets describing the volumes (3-dimensional sets having length, width, and height). But this change for fractal sets. If the theoretical fractal dimension of a set exceeds its topological dimension, the set is considered to have fractal geometry.