Font Size: a A A

The Study, Based On Iris Recognition Authentication System Algorithm

Posted on:2010-10-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:1118360302965216Subject:Optical Engineering
Abstract/Summary:PDF Full Text Request
This paper mainly discusses the algorithm of iris recognition system. Iris is a circle region between the pupil and the sclera. Because iris recognition has better security than the fingerprint, it has become a key point in the field of biometric in recent years. This paper deeply analyzes four aspects of the algorithm of iris recognition, that is, iris location, feature extraction, iris classification and security of the iris system.First , In the research of iris location ,this paper proposes "Asymmetry Canny Edge Extraction Operator" ,which has the functions of direction controlling and adjustable asymmetric of standard deviation . By the controlling of the direction switch, it can selectively extract the interested edge of iris, and avoid the interference of ruleless edge to finish the iris pre-processing work, including the iris location, eyelids location, eyelashes interference shield etl.Second, In feature extraction, the paper constructs a rectangular filter channel which has the characters of clear border and relatively ideal transition band. It could accurately extract the wanted frequency information, get rid of noise interference, and provide reliable data for iris recognition. In addition, the paper fully analyzes the effective frequency and direction for the spectrum of the iris by experiment, which can provide available experimental reference for the filter parameter design.Third, For the iris classification, the paper proposes an adjustable weight of phase correlation classification algorithm, which is based on the iris full phase information. The experiment shows that classification distance is proposed in this paper, it can extend double space than the Hamming distance of Daugman, remain even more original features of the iris information and reflect the difference between features in a more effective way. So the experiment is better, and the robust is strong. Fourth,For the security of iris recognition system, this paper proposes two kinds of chaos encryption system. One is 'Iris character code chaos encryption system', and another is 'Composite chaos encryption system'. The purpose of the first system is to save the resources of network, and the second system is convenient for algorithm upgrading and equipment maintenance. The experiment shows that the algorithms analyzed above have large key space, better attack resistance and better encryption performance.In the last part, the paper concluded the achievements that had bee(?) made in iris recognition , which includes the theory and application, and also analyses the key points that the iris recognition system needed to further develop and improve.All of the work which had been done is not only the useful attempt ion to improve the performance of iris recognition system, but also the rich and reinforcement to the existing iris recognition algorithm. All of the algorithms which had been mentioned in the paper have been tested in experiment, and achieve a better result.
Keywords/Search Tags:biometric identification, iris recognition, Asymmetry Canny, complete phase correlation, Kaiser filters, rectangular receptive field, weight phase correlation chaos encryption system
PDF Full Text Request
Related items