StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Iris recognition system using principal component analysis - Dissertation Example

Cite this document
Summary
Iris recognition system using principal component analysis Abstract Iris recognition has been a challenge in the past with the recognition accuracy being low. This project has implemented an iris recognition system using image processing. The hardware arrangement consists of Raspberry Pi arm processor and the software used is MATLAB…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Iris recognition system using principal component analysis
Read Text Preview

Extract of sample "Iris recognition system using principal component analysis"

Download file to see previous pages

This gives a fine demarcation between the inter class and intra class irises and hence the recognition becomes easier. Principal component analysis has been used to reduce the dimensionality. This enables choice of appropriate features from the iris templates and improves classification. The iris recognition accuracy has been described in terms of False Reject Ratio and False Accept Ratio. Table of contents Chapter 1 – Introduction of Project 1.1. Introduction 1.2. Project background 1.3. Problem Statement 1.4. Project aim and objectives 1.5. Significance of the project 1.6. Scope of project 1.7. Overview of project 2.

Chapter - 2 Review of Literature 2.1. Introduction 2.2. Human Iris System 2.2.1. Iris and Biometrics 2.2.2. Artificial Intelligence for Iris recognition 2.3. Scanning the Iris 2.3.1 Localization of Landmarks 2.3.2 Digital Imaging 2.4. statistical dependence 2.5. Principal Component Analysis 2.5.1 Covariance 2.5.2 Normality and Residuals 2.6. Chapter summary Chapter 3 – Methodology and framework of the Project 3.1. Introduction 3.2. Method 3.3. Requirements 3.4. Project Design 3.5. Hardware Design 3.6. Software Design 3.7. Chapter summary Chapter 4 – Project implementation and testing 4.1. Introduction 4.2. Image Segmentation 4.3. Image Normalisation 4.4. Feature extraction and encoding 4.5. Dimensionality Reduction 4.6. Iris matching Chapter 5 – Analysis and Discussion of Results 5.1. Introduction 5.2. Effect of the Parameters 5.3. Analysis of Hamming Distance 5.4. Recognition performance Chapter 6 – Project Management 6.1. Introduction 6.2. Project scheduling 6.3. Time management 6.4. Risk management 6.5. Quality management 6.6. Cost Management Chapter 7 - Critical Appraisal 7.1. Achievements 7.2. Future Research Chapter 8 – Conclusion Chapter 9 – Student Reflection References Appendices List of Figures Fig. 2.1.

The Iris marking process. Fig. 2.2. Iris Localization/ Hough Transform Figure 2.3. Iris Recognition Method Fig. 2.4. Iris Recognition in Java Fig.3.1. Sample eye images from CASIA database Fig. 3.2. Waterfall diagram Fig. 3.3. The UML Class diagram for the project in Smart Draw tool. Fig. 3.4. UML activity diagram for this project in Smart Draw. Fig. 4.1. Segmented eye image. Fig.4.2. Eye image with isolated iris region. Fig.5.1. Variation of intra class Standard deviation with number of shifts. Fig.5.2. Histogram of Hamming distance (intra class) without shifting of bits. Fig.5.3. Histogram of Hamming distance (intra class) with 8 times shifting of bits. Fig. 5.

4 Histogram of the hamming distances (inter class) with 8 times shifting of bits. Fig.6.1. The Gantt chart for project schedule. List of Tables Table 2.2. Characteristics Index of Biometric Variations Table 2.1 False Rejection Rate Table 6.1. Risk Management Chapter 1 – Introduction of Project 2.3. Introduction This chapter presents a brief introduction about the project in terms of the project background, the scope of the project, the aim and objectives of the project and the overview. Researchers have developed several methods to develop Biometric tools.

“A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual” (Majumder, Ray, & Singh, 2009). Among the various biometrics the Iris Recognition System uses

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Iris recognition system using principal component analysis Dissertation”, n.d.)
Retrieved from https://studentshare.org/engineering-and-construction/1480695-iris-recognition-system-using-principal-component
(Iris Recognition System Using Principal Component Analysis Dissertation)
https://studentshare.org/engineering-and-construction/1480695-iris-recognition-system-using-principal-component.
“Iris Recognition System Using Principal Component Analysis Dissertation”, n.d. https://studentshare.org/engineering-and-construction/1480695-iris-recognition-system-using-principal-component.
  • Cited: 0 times

CHECK THESE SAMPLES OF Iris recognition system using principal component analysis

The Security of Payments in E-Commerce

According to National Consumers League statistics for the year 2007; millions of dollars were lost in e-shopping transactions and have exposed the weakness of the credit card payment system [5].... From the paper "The Security of Payments in E-Commerce" it is clear that generally speaking, encryption techniques should be promoted and improved so that relevant information of the customers are not sniffed or extracted by any unauthorized individuals....
8 Pages (2000 words) Research Paper

The Use of Biometrics and Bio-Information to Support New Systems Integration

Biometric is mainly secure as well as a suitable authentication system.... Biometric recognition, or basically biometrics, that is foundational on behavioral and physiological features of a person, is being more and more acceptable and mapped to quickly for rising person recognition applications.... Different from documents based identification, biometric traits (for example face, fingerprint and iris) are not able to be stolen, lost or simply forged; they are as well recognized as to be more and more constant and distinctive....
19 Pages (4750 words) Annotated Bibliography

A Survey of Advances in Biometric Security

The research paper primarily emphasizes upon the analysis of the advancement that has been seen in the field of biometrics over the years, which has widened its implementation and popularity in the recent time.... It is believed that the technology assure utmost accuracy while executing the process of data accumulation and data analysis further ensuring the proper identification of any individuals.... There are several forms of biometric security solutions, such DNA identification, fingerprint analysis, face recognition and etc....
10 Pages (2500 words) Research Paper

Biometric Authentication Systems

Biometrics ranges from DNA matching, chemical biometric, visual biometric, eyes biometrics ( iris recognition, retina recognition ), finger geometry recognition, Hand geometry recognition, signature recognition, and behavioral biometrics (typing recognition), vein recognition, and gait.... practical biometric system should consider the following before it can be effected.... ircumvention – it refers to the ease with which the biometric system can be fraudulently accessed or altered....
10 Pages (2500 words) Essay

Linking Performance to Success

In an effort to minimize dependency on this obligation, the CSSO considers the PEST analysis to drive training, compensation, and increase the level of customer service.... PEST analysis, an acronym for political, economic, social, and technological influences, has served in the capacity to enhance methods designed for the implementation of training programs.... The purpose of the PEST analysis is to identify strengths versus weaknesses in adapting to the external demands placed on the CSSO....
16 Pages (4000 words) Term Paper

Human Resources and Information Technology in OTD Inc

Old, rather outdated concepts such as Theory X suggest high control environments and a more rigid management system are the most effective in driving performance.... These include personal recognition, a need for esteem both self-driven and motivated by the external environment, and demand for affiliation (Gambrel & Cianci, 145)....
8 Pages (2000 words) Case Study

The Use of Biometrics and Bio-Information to Support New Systems Integration

This research paper "The Use of Biometrics and Bio-Information to Support New Systems Integration" presents an analysis of biometrics systems.... A biometric system is based on an automatic process initiated to identify people based on their physiological or behavioral features.... In this scenario, biometric recognition or simply biometrics systems, which are based on human identification through their behavioral and physiological features, are being more and more implemented and mapped to quickly growing human recognition tools and applications....
20 Pages (5000 words) Research Paper

Security Design for the Smith-Brooks Corporation

The analysis will then be used to address security issues from a stakeholder requirements specification and protection needs perspective.... This means before the design phase, an in-depth analysis of the site should be conducted identifying both the strengths of the location as well as the vulnerabilities.... However, the Smith-Brooks Corporation deems it necessary to equip a reliable modern-day security system in addition to using guards to safeguard their property....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us