Iris authentication through Gabor filter using DSP processor

BIOMETRICs is the measurement of one's physiological or behavioural characteristics for security purposes. There are many types of biometrics available including finger print, voice scanner, retinal, iris recognition. Among this biometric authentication Iris recognition offers great amount of s...

Full description

Saved in:
Bibliographic Details
Published in2013 IEEE Conference on Information and Communication Technologies pp. 568 - 571
Main Authors Saravanan, V., Sindhuja, R.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2013
Subjects
Online AccessGet full text
ISBN9781467357593
1467357596
DOI10.1109/CICT.2013.6558159

Cover

Abstract BIOMETRICs is the measurement of one's physiological or behavioural characteristics for security purposes. There are many types of biometrics available including finger print, voice scanner, retinal, iris recognition. Among this biometric authentication Iris recognition offers great amount of security and it has more advantages over other types of Biometric authentication methods. This paper analyses the iris biometric authentication as it have low error rates compared to other biometric authentication methods and its robustness of the algorithms provided. Various types of feature extraction are already available like Haar wavelet transform,1-d dyadic wavelet transform but they are limited to their application. This paper uses Gabor filters for feature extraction methods for iris authentication, which is more advantageous than already available methods. Matching algorithms such as binary Hamming distance and Euclidean distance is used in this paper for comparing the Feature extraction methods. After the Features are extracted it is implemented in Analog devices to achieve fast verification Performance.
AbstractList BIOMETRICs is the measurement of one's physiological or behavioural characteristics for security purposes. There are many types of biometrics available including finger print, voice scanner, retinal, iris recognition. Among this biometric authentication Iris recognition offers great amount of security and it has more advantages over other types of Biometric authentication methods. This paper analyses the iris biometric authentication as it have low error rates compared to other biometric authentication methods and its robustness of the algorithms provided. Various types of feature extraction are already available like Haar wavelet transform,1-d dyadic wavelet transform but they are limited to their application. This paper uses Gabor filters for feature extraction methods for iris authentication, which is more advantageous than already available methods. Matching algorithms such as binary Hamming distance and Euclidean distance is used in this paper for comparing the Feature extraction methods. After the Features are extracted it is implemented in Analog devices to achieve fast verification Performance.
Author Sindhuja, R.
Saravanan, V.
Author_xml – sequence: 1
  givenname: V.
  surname: Saravanan
  fullname: Saravanan, V.
  email: vsaravanan6683@gmail.com
  organization: Dept. of TIFACCORE in Pervasive Comput. Technol., Velammal Eng. Coll., Chennai, India
– sequence: 2
  givenname: R.
  surname: Sindhuja
  fullname: Sindhuja, R.
  email: sindhumekna89@gmail.com
  organization: Dept. of TIFACCORE in Pervasive Comput. Technol., Velammal Eng. Coll., Chennai, India
BookMark eNpVj81KxDAYRSMqqGMfQNzkBaYm-Zo_cCNVx8KAguN6SNpkGhmbIUkXvr2Cs3F1OYtz4F6hsylODqEbSmpKib5ru3ZTM0KhFpwryvUJqrRUtBESuORKnP5jDReoyvmTEPKrC6bgEt13KWRs5jK6qYTelBAnXMYU592IV8bGhH3YF5fwnMO0w4_vb_iQYu9yjukanXuzz6467gJ9PD9t2pfl-nXVtQ_rZaCSl2XTAGGykZp70xOjLB-EIaKXICzj1niviAVhhNTgLTAJA2PCD9px54xQsEC3f93gnNseUvgy6Xt7_Aw_DvZLhA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CICT.2013.6558159
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467357586
146735757X
1467357588
9781467357579
EndPage 571
ExternalDocumentID 6558159
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-4430274795fac0a8b5d6a06c736b25baff80b36a6793fb3273d226fd9e5eea683
IEDL.DBID RIE
ISBN 9781467357593
1467357596
IngestDate Wed Aug 27 02:49:04 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-4430274795fac0a8b5d6a06c736b25baff80b36a6793fb3273d226fd9e5eea683
PageCount 4
ParticipantIDs ieee_primary_6558159
PublicationCentury 2000
PublicationDate 2013-April
PublicationDateYYYYMMDD 2013-04-01
PublicationDate_xml – month: 04
  year: 2013
  text: 2013-April
PublicationDecade 2010
PublicationTitle 2013 IEEE Conference on Information and Communication Technologies
PublicationTitleAbbrev CICT
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001106283
Score 1.507832
Snippet BIOMETRICs is the measurement of one's physiological or behavioural characteristics for security purposes. There are many types of biometrics available...
SourceID ieee
SourceType Publisher
StartPage 568
SubjectTerms Biometric identification
Blackfin processor
Digital signal processing
Feature extraction
Gabor filters
Human iris and Gabor filter
Iris recognition
Signal processing algorithms
Transforms
Title Iris authentication through Gabor filter using DSP processor
URI https://ieeexplore.ieee.org/document/6558159
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXi0Xbv8aArepnMKk4Eb7DaS5kWG0I3RXvzrTdJsQ_HgremhJKThfXnv-96H0F2eUMkMNRa5pfaComgWydSeK80YWDQhJfXysckbH8_p64ItWuh-r4UBAE8-g9g9-lq-Xhe1S5X1OWPCht82ameCN1qtQz4ldWpA4rVbPCPOd5LvWjqFMQlVzTTJ-8OX4cwRu0gcPvrDXcUHl9Exmuym1XBKPuO6UnHx9atj43_nfYJ6Bxkfnu4D1ClqQdlFD85THktHbC-rkLDDwa0HP7tfApuVK6FjR4n_wI_vU7xp1ATrbQ_NR0-z4TgKFgrRyuKCKqKU-HtnzowsEikU01wmvMgIVwOmpDEiUYRLbo-pUcRiGW3xmNE5MADJBTlDnXJdwjnCIgFNBcgsy4CKHJTOuUVbErgr9ml9gbpu5ctN0yVjGRZ9-ffrK3Q08MYSjgNzjTrVtoYbG94rdev39RtlhKAo
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4QD3pSA8bf9uDRjY3-WJd4QxEUCImQcCPt-mqIySBkXPzrbbsh0Xjwtu6wtOma9_W973sfQndpRCUz1FjkFtsLiqJJIGN7rjRjYNGElNTLx4Yj3pvSlxmb1dD9txYGADz5DEL36Gv5epltXKqsxRkTNvzuoX1GKWWlWmuXUYmdHpB49RZPiHOe5NumTtWYVHXNOEpbnX5n4qhdJKw--8NfxYeX7hEabidWsko-wk2hwuzzV8_G_878GDV3Qj48_g5RJ6gGeQM9OFd5LB21PS-qlB2u_Hrws_spsFm4Ijp2pPh3_Pg2xqtST7BcN9G0-zTp9ILKRCFYWGRQBJQSf_NMmZFZJIVimsuIZwnhqs2UNEZEinDJ7UE1ilg0oy0iMzoFBiC5IKeoni9zOENYRKCpAJkkCVCRgtIpt3hLAnflPq3PUcOtfL4q-2TMq0Vf_P36Fh30JsPBfNAfvV6iw7a3mXCMmCtUL9YbuLbBvlA3fo-_AP8Bo3U
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+IEEE+Conference+on+Information+and+Communication+Technologies&rft.atitle=Iris+authentication+through+Gabor+filter+using+DSP+processor&rft.au=Saravanan%2C+V.&rft.au=Sindhuja%2C+R.&rft.date=2013-04-01&rft.pub=IEEE&rft.isbn=9781467357593&rft.spage=568&rft.epage=571&rft_id=info:doi/10.1109%2FCICT.2013.6558159&rft.externalDocID=6558159
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467357593/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467357593/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467357593/sc.gif&client=summon&freeimage=true