Vous êtes sur la page 1sur 4

University of Louisville Electrical and Computer Engineering ECE523: Introduction to Biometrics

Instructor: Dr. Aly A. Farag Fall 2009

Project # 3

EC E 52 3
Project Guidelines

Iris Recognition (Issued 10/20/09 Due 11/10/09)

Contents

Project Guidelines ............................................................................................................................ 1 Part 0 Iris Database ....................................................................................................................... 2 Part I Iris Segmentation ................................................................................................................ 3 Part II Iris Normalization .............................................................................................................. 3 Part III Feature Encoding ............................................................................................................. 3 Part IV Iris Comparisons .............................................................................................................. 3 Part V Noisy comparisons............................................................................................................. 4 References........................................................................................................................................ 4

The project can be done as an individual effort or in groups of 2 people. The topic of this project is Iris Recognition. Each group will develop and implement their algorithms to build an iris recognition system using a standard iris database. Competition based on recognition accuracy in a limited time will be held. Submission of the project include submitting zip-file containinmg your implementation with a readme file, a project report written in a paper format (preferred standard IEEE format, be sure to label each figure in your report) and brief class-room presentation. Students are encouraged to refer to whatever resources they use in their project, including papers, books, lecture notes, websites etc. Independent implementation of the algorithm(s) is necessary. The idea of using iris patterns for personal identification was originally proposed in 1936 by ophthalmologist Frank Burch. In the 1980's the idea appeared in James Bond movies, but it remained science fiction. It was not until 1987, two American ophthalmologists, Leonard Flom and Aran Safir patented Burch's concept but they were unable to develop such a process. So Instead they turned to John Daugman, who was teaching at Harvard University and now at Cambridge University, to develop actual algorithms for iris recognition[1-3]. These algorithms, which Daugman developed in 1994, are the basis for all current iris recognition systems. Figure (1) illustrates Daugmans model for iris recognition.

l0 al -F

9;

Pr
Page 1 of 4

e oj

ct

;D

r.

r Fa

ag

University of Louisville Electrical and Computer Engineering ECE523: Introduction to Biometrics

Instructor: Dr. Aly A. Farag Fall 2009

EC E 52
Recently Zhenan Sun [6,7] has published two papers for iris segementation and recognition, which is supposed to be the most up-to-date approaches in literature, in this lab, there will be group who will be assigned to implement Daugmans approach and the other groups will implement Suns approach. Daugman and Sun papers will be posted on the blackboard. In the following we will discuss the basic building blocks of a generic iris recognition system.

Part 0 Iris Database

You can download iris images from http://pesona.mmu.edu.my/~ccteo/. MMU1 iris database contributes a total number of 450 iris images which were taken using LG IrisAccess2200. This camera is semi-automated and it operates at the range of 7-25 cm. On the other hand, MMU2 iris database consists of 995 iris images. The iris images are collected using Panasonic BM-ET100US Authenticam and its operating range is even farther with a distance of 47-53 cm away from the user. These iris images are contributed by 100 volunteers with different age and nationality. They come from Asia, Middle East, Africa and Europe. Each of them contributes 5 iris images for each eye. There are 5 left eye iris images which are excluded from the database due to cataract disease. It is required to divid your database into training and testing images, if you have N iris images for each subject, you can put in your database 70% of them and use 30% for testing your recognition system.

3 l0 al -F
Figure 1 Daugmans model for iris recognition

9;

Pr
Page 2 of 4

e oj

ct

;D

r.

r Fa

ag

University of Louisville Electrical and Computer Engineering ECE523: Introduction to Biometrics

Instructor: Dr. Aly A. Farag Fall 2009

Part I Iris Segmentation


The first part of identifying irises is to segment the iris region. Segment each iris image, then display the output for each of the iris images, the following guidelines might help you: however you need to refer to your assigned paper (Daugmans or Suns) for more details [1-3,5]. 1. Extract the pupil boun dary, you may use image histogram to extract the threshold automatically that will extract the pupil region, median filtration can then be applied to remove noisy regions as a result of eyelashes, then connected component labeling can be applied to extract the pupil region to compute the centroid and radius of the pupil region. 2. Extract the iris boundary, image smoothing can be applied to have a clear edge map where the iris boundary is clearly visible, you might apply circular hough transform to extract the parameters of the circle which best fits the iris boundary. 3. Remove eyelids and eyelashes, you can use linear hough transform to approximate eyelids with lines. EXTRA CREDIT: Implement the snakes algorithm instead of circular hough transfrom for image segmentation, you can use the pupil boudary as the initial contour.

EC E

52

Part II Iris Normalization


For Daugman group: Implement Daugmans rubber sheet model to extract fixed number of feature points in the segmented iris region, apply this model to all irises in the database. Associate to each rubber sheet a noise mask to exclude eyelids and eyelashes from the iris region. Refer to lecture notes for more details. For Sun group: Implement Suns approach to mimic Daugmans rubber sheet model to extract fixed number of feature points from the segmented iris region[6].

Part III Feature Encoding

For Daugman group: The next step is to implement Daugmans algorithm to create an iris code [1-3] for each of the normalized iris region and display the output. Refer to lecture notes for more details. For Sun group: Implement Suns algorithm (Cardinal measures) to create an iris code[7] for each of the normalized iris region and display the output.

Part IV Iris Comparisons

For Daugman group: Now use the normalized Hamming Distance formula [5] to compare each of the testing iris images to the iris images in your database (training part). Report the Hamming Distance Score for each comparison. Based on the score, which images are matches? Report your findings in a tabular format.

For Sun group: Implement Suns feature matching algorithm to compare each of the testing iris images to the iris images in your database (training part). Report the distance score for each comparison. Based on the score, which images are matches? Report your findings in a tabular format.

l0 al -F

9;

Pr
Page 3 of 4

e oj

ct

;D

r.

r Fa

ag

University of Louisville Electrical and Computer Engineering ECE523: Introduction to Biometrics

Instructor: Dr. Aly A. Farag Fall 2009

Part V Noisy comparisons


An iris recognition system is supposed to perform well when the comparison images are out-offocus or with some occluded areas of the iris (such as eyelashes or a partially open eyelid). To simulate the iris being out of focus, take one of each of the testing images corresponding to a database image, and implement a 9x9 ordinary blur filter (may be average filter) on each of the testing images. Then perform Parts I-IV and report on the matching score. To simulate the iris being out occluded, take one of each of the testing images corresponding to a database image, then add salt-and-pepper noise to each of the testing images. Then perform Parts IIV and report on the matching score.

EC E

52

References

[0] Lecture notes. [1] Daugman, J. How iris recognition works. IEEE Trans. CSVT 14(1), 2004. pp. 21-30. Available at: http://www.cl.cam.ac.uk/users/jgd1000/irisrecog.pdf [2] John Daugmans webpage, Cambridge Univ., Computer Lab. http://www.cl.cam.ac.uk/~jgd1000/ [3] Masek, L.; Iris Recognition Source Code. http://www.csse.uwa.edu.au/~pk/studentprojects/libor/sourcecode.html [4] MATLAB Cental. Active Contour Toolbox. http://www.mathworks.com/matlabcentral/fileexchange/loadFile.do?objectId=11643 [5] Daugman, J. Probing the Uniqueness and Randomness of IrisCodes. http://www.cl.cam.ac.uk/~jgd1000/ProcIEEEnov2006Daugman.pdf [6] Zhaofeng He, Tieniu Tan, Zhenan Sun, Xianchao Qiu, "Toward Accurate and Fast Iris Segmentation for Iris Biometrics," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 9, pp. 1670-1684, July 2009 [7] Zhenan Sun, Tieniu, Cardinal Measures for Iris Recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, September 2009

l0 al -F

9;

Pr
Page 4 of 4

e oj

ct

# ;D r. r Fa

ag

Vous aimerez peut-être aussi