• Title/Summary/Keyword: Iris rotation invariance

Search Result 4, Processing Time 0.017 seconds

Development of Robust-to-Rotation Iris Feature Extraction Algorithms For Embedded System (임베디드 시스템을 위한 회전에 강인한 홍채특징 추출 알고리즘 개발)

  • Kim, Shik
    • The Journal of Information Technology
    • /
    • v.12 no.4
    • /
    • pp.25-32
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. It is important for the iris recognition system to extract the feature which is invariant to changes in iris patterns. Those changes can be occurred by the influence of lights, changes in the size of the pupil, and head tilting. This paper is appropriate for the embedded environment using local gradient histogram embedded system using iris feature extraction methods have implement. The proposed method enables high-speed feature extraction and feature comparison because it requires no additional processing to obtain the rotation invariance, and shows comparable performance to the well-known previous methods.

  • PDF

Robust-to-rotation Iris Recognition Using Local Gradient Orientation Histogram (국부적 그래디언트 방향 히스토그램을 이용한 회전에 강인한 홍채 인식)

  • Choi, Chang-Soo;Jun, Byoung-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3C
    • /
    • pp.268-273
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. It is important for the iris recognition system to extract the feature which is invariant to changes in iris patterns. Those changes can be occurred by the influence of lights, changes in the size of the pupil, and head tilting. In this paper, we propose a novel method based on local gradient orientation histogram which is robust to variations in illumination and rotations of iris patterns. The proposed method enables high-speed feature extraction and feature comparison because it requires no additional processing to obtain the rotation invariance, and shows comparable performance to the well-known previous methods.

Rotation-Invariant Iris Recognition Method Based on Zernike Moments (Zernike 모멘트 기반의 회전 불변 홍채 인식)

  • Choi, Chang-Soo;Seo, Jeong-Man;Jun, Byoung-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.31-40
    • /
    • 2012
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. It is important for the iris recognition system to extract the feature which is invariant to changes in iris patterns. Those changes can be occurred by the influence of lights, changes in the size of the pupil, and head tilting. In this paper, we propose a novel method based on Zernike Moment which is robust to rotations of iris patterns. we utilized a selection of Zernike moments for the fast and effective recognition by selecting global optimum moments and local optimum moments for optimal matching of each iris class. The proposed method enables high-speed feature extraction and feature comparison because it requires no additional processing to obtain the rotation invariance, and shows comparable performance to the well-known previous methods.

Study on Robustness of Communication Service : By the Cloning SIM Card in Chinese GSM (통신서비스의 건전성 연구 : 중국 GSM 카드복제를 통한 보안 취약성에 대하여)

  • Kim, Shik
    • The Journal of Information Technology
    • /
    • v.12 no.4
    • /
    • pp.1-10
    • /
    • 2009
  • The robustness of communication service should be guaranteed to validate its security of the whole service not just high performance. One kind of practical test-beds is the chinese communication service based on SIM Card and GSM. In paper, we try to experiment the possibility of SIM cards clone in various mobile communications using 2G in china, and hence discovered the security vulnerabilities such as the incoming outgoing, SMS service and additional services on the mobile phones using clone SIM cards. The experiments show that chinese communication service should be prepared the Fraud Management System against the cloning SIM card. and furthermore, regulations related to the communication service should be tuned the realistic security environments.

  • PDF