Skip to main content
Top
Published in: Soft Computing 22/2019

08-01-2019 | Methodologies and Application

Biometric iris recognition using radial basis function neural network

Authors: Megha Dua, Rashmi Gupta, Manju Khari, Ruben González Crespo

Published in: Soft Computing | Issue 22/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The consistent and efficient method for the identification of biometrics is the iris recognition in view of the fact that it has richness in texture information. A good number of features performed in the past are built on handcrafted features. The proposed method is based on the feed-forward architecture and uses k-means clustering algorithm for the iris patterns classification. In this paper, segmentation of iris is performed using the circular Hough transform that realizes the iris boundaries in the eye and isolates the region of iris with no eyelashes and other constrictions. Moreover, Daugman’s rubber sheet model is used to transform the resultant iris portion into polar coordinates in the process of normalization. A unique iris code is generated by log-Gabor filter to extract the features. The classification is achieved using neural network structures, the feed-forward neural network and the radial basis function neural network. The experiments have been conducted using the Chinese Academy of Sciences Institute of Automation (CASIA) iris database. The proposed system decreases computation time, size of the database and increases the recognition accuracy as compared to the existing algorithms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abhyankar A, Hornak L, Schuckers S (2005) Off-angle iris recognition using bi-orthogonal wavelet network system. In: Fourth IEEE workshop on automatic identification advanced technologies, 2005. IEEE, Washington, pp 239–244 Abhyankar A, Hornak L, Schuckers S (2005) Off-angle iris recognition using bi-orthogonal wavelet network system. In: Fourth IEEE workshop on automatic identification advanced technologies, 2005. IEEE, Washington, pp 239–244
go back to reference Abiyev RH, Altunkaya K (2008) Personal iris recognition using neural network. Int J Secur Appl 2(2):41–50 Abiyev RH, Altunkaya K (2008) Personal iris recognition using neural network. Int J Secur Appl 2(2):41–50
go back to reference Basit A, Javed MY, Anjum MA (2005) Biometric-enabled authentication machines: a survey of open-set real-world applications. WEC 2:24–26 Basit A, Javed MY, Anjum MA (2005) Biometric-enabled authentication machines: a survey of open-set real-world applications. WEC 2:24–26
go back to reference Boles WW, Boashash B (1998) A human identification technique using images of the iris and wavelet transform. IEEE Trans Signal Process 46(4):1185–1188CrossRef Boles WW, Boashash B (1998) A human identification technique using images of the iris and wavelet transform. IEEE Trans Signal Process 46(4):1185–1188CrossRef
go back to reference Chawla S, Oberoi A (2011) A robust algorithm for iris segmentation and normalization using hough transform. Glob J Bus Manag Inf Technol 1(2):69–76 Chawla S, Oberoi A (2011) A robust algorithm for iris segmentation and normalization using hough transform. Glob J Bus Manag Inf Technol 1(2):69–76
go back to reference Chen X (2017) An effective synchronization clustering algorithm. Appl Intell 46(1):135–157CrossRef Chen X (2017) An effective synchronization clustering algorithm. Appl Intell 46(1):135–157CrossRef
go back to reference Cho DH, Park KR, Rhee DW (2005) Real-time iris localization for iris recognition in cellular phone. In: Sixth international conference on software engineering, artificial intelligence, networking and parallel/distributed computing, 2005 and first ACIS international workshop on self-assembling wireless networks. SNPD/SAWN 2005. IEEE, Washington, pp 254–259 Cho DH, Park KR, Rhee DW (2005) Real-time iris localization for iris recognition in cellular phone. In: Sixth international conference on software engineering, artificial intelligence, networking and parallel/distributed computing, 2005 and first ACIS international workshop on self-assembling wireless networks. SNPD/SAWN 2005. IEEE, Washington, pp 254–259
go back to reference Daouk CH, El-Esber LA, Kammoun FD, Al Alaoui MA (2002) Iris recognition. In: IEEE ISSPIT, pp 558–562 Daouk CH, El-Esber LA, Kammoun FD, Al Alaoui MA (2002) Iris recognition. In: IEEE ISSPIT, pp 558–562
go back to reference Daugman J (1992) High confidence personal identification by rapid video analysis of iris texture. In: International Carnahan conference on security technology, 1992 Crime countermeasures, proceedings. Institute of electrical and electronics engineers. IEEE, Washington, pp 50–60 Daugman J (1992) High confidence personal identification by rapid video analysis of iris texture. In: International Carnahan conference on security technology, 1992 Crime countermeasures, proceedings. Institute of electrical and electronics engineers. IEEE, Washington, pp 50–60
go back to reference Daugman JG (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15(11):1148–1161CrossRef Daugman JG (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15(11):1148–1161CrossRef
go back to reference Daugman JG (1994) U.S. Patent No. 5,291,560. Washington, DC: U.S. Patent and Trademark Office. In: Jain A, Bolle R, Pankanti S (eds) Biometrics: personal identification in a networked society. Kluwer, Norwell Daugman JG (1994) U.S. Patent No. 5,291,560. Washington, DC: U.S. Patent and Trademark Office. In: Jain A, Bolle R, Pankanti S (eds) Biometrics: personal identification in a networked society. Kluwer, Norwell
go back to reference Daugman J (2001) Statistical richness of visual phase information: update on recognizing persons by iris patterns. Int J Comput Vis 45(1):25–38CrossRef Daugman J (2001) Statistical richness of visual phase information: update on recognizing persons by iris patterns. Int J Comput Vis 45(1):25–38CrossRef
go back to reference Daugman J (2004) How iris recognition works. IEEE Trans Circuits Syst Video Technol 14(1):21–30CrossRef Daugman J (2004) How iris recognition works. IEEE Trans Circuits Syst Video Technol 14(1):21–30CrossRef
go back to reference Daugman J (2007) New methods in iris recognition. IEEE Trans Syst Man Cybern Part B Cybern 37(5):1167–1175CrossRef Daugman J (2007) New methods in iris recognition. IEEE Trans Syst Man Cybern Part B Cybern 37(5):1167–1175CrossRef
go back to reference Daugman J (2016) Information theory and the iris code. IEEE Trans Inf Forensics Secur 11(2):400–409CrossRef Daugman J (2016) Information theory and the iris code. IEEE Trans Inf Forensics Secur 11(2):400–409CrossRef
go back to reference Eastwood SC, Shmerko VP, Yanushkevich SN, Drahansky M, Gorodnichy DO (2016) Biometric-enabled authentication machines: a survey of open-set real-world applications. IEEE Trans Hum Mach Syst 46(2):231–242CrossRef Eastwood SC, Shmerko VP, Yanushkevich SN, Drahansky M, Gorodnichy DO (2016) Biometric-enabled authentication machines: a survey of open-set real-world applications. IEEE Trans Hum Mach Syst 46(2):231–242CrossRef
go back to reference Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprints, and face recognition. IEEE Trans Image Process 23(2):710–724MathSciNetCrossRef Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprints, and face recognition. IEEE Trans Image Process 23(2):710–724MathSciNetCrossRef
go back to reference Gupta K, Gupta R (2014) Iris recognition system for smart environments. In: 2014 international conference on data mining and intelligent computing (ICDMIC). IEEE, Washington, pp 1–6 Gupta K, Gupta R (2014) Iris recognition system for smart environments. In: 2014 international conference on data mining and intelligent computing (ICDMIC). IEEE, Washington, pp 1–6
go back to reference Gupta R, Gupta K (2016) Iris recognition using templates fusion with weighted majority voting. Int J Image Data Fus 7(4):325–338CrossRef Gupta R, Gupta K (2016) Iris recognition using templates fusion with weighted majority voting. Int J Image Data Fus 7(4):325–338CrossRef
go back to reference Haddouch K, Elmoutaoukil K, Ettaouil M (2016) Solving the weighted constraint satisfaction problems via the neural network approach. IJIMAI 4(1):56–60CrossRef Haddouch K, Elmoutaoukil K, Ettaouil M (2016) Solving the weighted constraint satisfaction problems via the neural network approach. IJIMAI 4(1):56–60CrossRef
go back to reference Hu Y, Sirlantzis K, Howells G (2017) Optimal generation of iris codes for iris recognition. IEEE Trans Inf Forensics Secur 12(1):157–171CrossRef Hu Y, Sirlantzis K, Howells G (2017) Optimal generation of iris codes for iris recognition. IEEE Trans Inf Forensics Secur 12(1):157–171CrossRef
go back to reference Hurtado MF, Langreo MH, De Miguel PM, Villanueva VD (2010) Biometry, the safe key. Int J Interact Multimed Artif Intell 1(3):33–37 Hurtado MF, Langreo MH, De Miguel PM, Villanueva VD (2010) Biometry, the safe key. Int J Interact Multimed Artif Intell 1(3):33–37
go back to reference Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20CrossRef Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20CrossRef
go back to reference Kushwaha P, Welekar RR (2016) Feature selection for image retrieval based on genetic algorithm. IJIMAI 4(2):16–21CrossRef Kushwaha P, Welekar RR (2016) Feature selection for image retrieval based on genetic algorithm. IJIMAI 4(2):16–21CrossRef
go back to reference Kyaw KSS (2009) Iris recognition system using statistical features for biometric identification. In: 2009 international conference on electronic computer technology. IEEE, Washington, pp 554–556 Kyaw KSS (2009) Iris recognition system using statistical features for biometric identification. In: 2009 international conference on electronic computer technology. IEEE, Washington, pp 554–556
go back to reference Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115CrossRef Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115CrossRef
go back to reference López FRJ, Beainy CEP, Mendez OEU (2013) Biometric iris recognition using Hough transform. In: 2013 XVIII symposium of image, signal processing, and artificial vision (STSIVA). IEEE, Washington, pp 1–6 López FRJ, Beainy CEP, Mendez OEU (2013) Biometric iris recognition using Hough transform. In: 2013 XVIII symposium of image, signal processing, and artificial vision (STSIVA). IEEE, Washington, pp 1–6
go back to reference Ma L, Tan T, Wang Y, Zhang D (2004) Efficient iris recognition by characterizing key local variations. IEEE Trans Image Process 13(6):739–750CrossRef Ma L, Tan T, Wang Y, Zhang D (2004) Efficient iris recognition by characterizing key local variations. IEEE Trans Image Process 13(6):739–750CrossRef
go back to reference Mock K, Hoanca B, Weaver J, Milton M (2012) Real-time continuous iris recognition for authentication using an eye tracker. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, New York, pp 1007–1009 Mock K, Hoanca B, Weaver J, Milton M (2012) Real-time continuous iris recognition for authentication using an eye tracker. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, New York, pp 1007–1009
go back to reference Nguyen Thanh K, Fookes CB, Sridharan S (2010) Fusing shrinking and expanding active contour models for robust IRIS segmentation. In: Proceedings of 10th international conference on information science, signal processing and their applications. IEEE, Washington, pp 185–188 Nguyen Thanh K, Fookes CB, Sridharan S (2010) Fusing shrinking and expanding active contour models for robust IRIS segmentation. In: Proceedings of 10th international conference on information science, signal processing and their applications. IEEE, Washington, pp 185–188
go back to reference Njikam ANS, Zhao H (2016) A novel activation function for multilayer feed-forward neural networks. Appl Intell 45(1):75–82CrossRef Njikam ANS, Zhao H (2016) A novel activation function for multilayer feed-forward neural networks. Appl Intell 45(1):75–82CrossRef
go back to reference Poursaberi A, Yanushkevich S, Gavrilova M, Shmerko V, Wang PSP (2013) Situational awareness through biometrics. IEEE Comput Spec Issue Cut Edge Res Vis 46(5):102–104 Poursaberi A, Yanushkevich S, Gavrilova M, Shmerko V, Wang PSP (2013) Situational awareness through biometrics. IEEE Comput Spec Issue Cut Edge Res Vis 46(5):102–104
go back to reference Punyani P, Gupta R (2015) Iris recognition system using morphology and sequential addition-based grouping. In: 2015 international conference on futuristic trends on computational analysis and knowledge management (ABLAZE). IEEE, Washington, pp 159–164 Punyani P, Gupta R (2015) Iris recognition system using morphology and sequential addition-based grouping. In: 2015 international conference on futuristic trends on computational analysis and knowledge management (ABLAZE). IEEE, Washington, pp 159–164
go back to reference Roh MC, Fazli S, Lee SW (2016) Selective temporal filtering and its application to hand gesture recognition. Appl Intell 45(2):255–264CrossRef Roh MC, Fazli S, Lee SW (2016) Selective temporal filtering and its application to hand gesture recognition. Appl Intell 45(2):255–264CrossRef
go back to reference Schlett T, Rathgeb C, Busch C (2018) Multi-spectral iris segmentation in visible wavelengths. In: 2018 international conference on biometrics (ICB). IEEE, Washington Schlett T, Rathgeb C, Busch C (2018) Multi-spectral iris segmentation in visible wavelengths. In: 2018 international conference on biometrics (ICB). IEEE, Washington
go back to reference Sharma K, Monga H (2014) Efficient biometric iris recognition using hough transform with secret key. Int J Adv Res Comput Sci Softw Eng 4(7):104–109 Sharma K, Monga H (2014) Efficient biometric iris recognition using hough transform with secret key. Int J Adv Res Comput Sci Softw Eng 4(7):104–109
go back to reference Shylaja SS, Murthy KB, Natarajan S, Muthuraj R, Ajay S (2011) Feed forward neural network based eye localization and recognition using Hough transform. IJACSA Editorial Shylaja SS, Murthy KB, Natarajan S, Muthuraj R, Ajay S (2011) Feed forward neural network based eye localization and recognition using Hough transform. IJACSA Editorial
go back to reference Sundaram RM, Dhara BC (2011) Neural network-based Iris recognition system using Haralick features. In: 2011 3rd international conference on electronics computer technology (ICECT), vol 3. IEEE, Washington, pp 19–23 Sundaram RM, Dhara BC (2011) Neural network-based Iris recognition system using Haralick features. In: 2011 3rd international conference on electronics computer technology (ICECT), vol 3. IEEE, Washington, pp 19–23
go back to reference Tripathi BK (2017) On the complex domain, deep machine learning for face recognition. Appl Intell 47:382–396CrossRef Tripathi BK (2017) On the complex domain, deep machine learning for face recognition. Appl Intell 47:382–396CrossRef
go back to reference Vatsa M, Singh R, Noore A (2007) Integrating image quality in 2ν-SVM biometric match score fusion. Int J Neural Syst 17(05):343–351CrossRef Vatsa M, Singh R, Noore A (2007) Integrating image quality in 2ν-SVM biometric match score fusion. Int J Neural Syst 17(05):343–351CrossRef
go back to reference Wang Y, Tan T, Jain AK (2003) Combining face and iris biometrics for identity verification. In: International conference on audio-and video-based biometric person authentication. Springer, Berlin, pp 805–813 Wang Y, Tan T, Jain AK (2003) Combining face and iris biometrics for identity verification. In: International conference on audio-and video-based biometric person authentication. Springer, Berlin, pp 805–813
go back to reference Wildes RP, Asmuth JC, Green GL, Hsu SC, Kolczynski RJ, Matey JR, MBride SE (1994) A system for automated iris recognition. In: Proceedings of the applications of computer vision, 1994 Wildes RP, Asmuth JC, Green GL, Hsu SC, Kolczynski RJ, Matey JR, MBride SE (1994) A system for automated iris recognition. In: Proceedings of the applications of computer vision, 1994
go back to reference Xiao Q (2007) Technology review-biometrics-technology, application, challenge, and computational intelligence solutions. IEEE Comput Intell Mag 2(2):5–25MathSciNetCrossRef Xiao Q (2007) Technology review-biometrics-technology, application, challenge, and computational intelligence solutions. IEEE Comput Intell Mag 2(2):5–25MathSciNetCrossRef
go back to reference Yu Q, Luo Y, Chen C, Ding X (2016) Outlier-eliminated k-means clustering algorithm based on differential privacy preservation. Appl Intell 45(4):1179–1191CrossRef Yu Q, Luo Y, Chen C, Ding X (2016) Outlier-eliminated k-means clustering algorithm based on differential privacy preservation. Appl Intell 45(4):1179–1191CrossRef
go back to reference Zhu Y, Tan T, Wang Y (2000) Biometric personal identification based on iris patterns. In: ICPR. IEEE, p 2801 Zhu Y, Tan T, Wang Y (2000) Biometric personal identification based on iris patterns. In: ICPR. IEEE, p 2801
Metadata
Title
Biometric iris recognition using radial basis function neural network
Authors
Megha Dua
Rashmi Gupta
Manju Khari
Ruben González Crespo
Publication date
08-01-2019
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 22/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-03731-4

Other articles of this Issue 22/2019

Soft Computing 22/2019 Go to the issue

Premium Partner