The Artificial Intelligence approach is used for Iris recognition by understanding the distinctive and measurable characteristics of the human body such as a person’s face, iris, DNA, fingerprints, etc. AI methods analyzed the attributes like iris images. Privacy and Security being a major concern nowadays, Recognition Technique can find numerous applications.
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
AI Approach for Iris Biometric Recognition Using a Median Filter
1. Creating New Era of Latest technology
https://dailytechnologyblog.weebly.com/
2. Privacy and Security being the major concern now-a-days, Recognition Technique could find a
variety of applications. Such applications could be: Biometric authentication, Security and many
more. Some factors possibly lead to flaws in authentication. While processing authentication,
various parameters are to be considered, such as sufficient lighting when image is being captured,
proper posture of the person, image superiority and various other. The adequate examination and
experimentation of all the above mentioned parameters could produce acceptable and desirable
results. The technique of Pre-processing (processing of data for having its comparison prior to its
transmission to the database) could provide an enhanced probability of acquiring the correct
matches .
Every individual have uniqueness in their appearance, face or certain body characteristics
minimizing the chances of duplicity in biometric system. This makes biometric recognition or
biometric systems as most widespread and highly reliable technique for providing highest
security. Digital representation of the data of an individual provides uniqueness to the individual,
biometric sensors employ these digital data to check authenticity of the user or the authorized
person. Examples of such sensors are: fingerprint sensor, digital camera for face extract, etc
https://dailytechnologyblog.weebly.com/
3. Types of Biometric Authentication Systems
Biometric being considered the most acceptable, secure, and dependable system has
captured a wide range of applications. Various biometric authentication techniques are:
1. Face recognition
2. Iris Recognition
3. Fingerprints recognition
4. Palm recognition
5. Face Recognition
Iris Recognition
Iris is the ring-shaped region in the human eye that inscribes the pupil of an eye. Iris
recognition technique employs the detection and comparison of the unique patterns of
iris for every individual. It is designated as the fastest and most efficient technique that
is capable of producing intended results in the least duration of time.
Face recognition
Face recognition technique is rising to be the most acceptable and secure field in
biometric authentication. It is employed in surveillance systems since it has the caliber
to successfully execute its algorithm without object comparison. The most advantageous
aspect of this technique as compared to other similar systems is individuality and
attainability.
https://dailytechnologyblog.weebly.com/
4. Palm Recognition
Palm recognition or Palm print recognition could be considered as an optimistic and
assuring technique that employs palm characteristics for the identification and
recognition of a person. The characteristics employed in fulfillment of recognition
criteria are lines of a palm, wrinkles, and ridges on a hand, etc., where wrinkles of
palm are identified as being thinner than the primary lines.
Fingerprint Recognition
When government organizations and agencies are taken into account, they demand
high security; this requirement could be easily fulfilled using biometric systems,
specifically by the fingerprint recognition technique. Every individual has a unique
and distinguishable
print of fingers
https://dailytechnologyblog.weebly.com/
5. Preprocessing the images using the median filter
A biometric system is designed to follow certain biometric recognition algorithms,
defined specifically for each different mechanism. While processing authentication,
various parameters are to be considered, such as sufficient lighting when the image is
being captured, proper posture of the person, image superiority, and various others.
Each biometric system employs several modes or processes to authorize, these are
feature extraction, sensing, and matching modules. The filtration mechanism is applied
to pre-process the input image of the iris.
The pre-processing of the input image is done
to remove the noisy content from it. This is
achieved by applying the collaboration of
median filters. After filtration, the feature
from the processed image is extracted by using
the LBP-LDA technique. After extracting the features, the Artificial Neural Network
is used to perform pattern matching. For purpose of performance evaluation, the
proposed iris recognition is implemented in MATLAB.
https://dailytechnologyblog.weebly.com/
6. Application
1. Surveillance
2. Logical Access Control
3. Physical Access Control
4. Time and Attendance
5. Law Enforcement
6. Border and airport control
7. Secured transaction banking and financial institutions
Final words
Security has become the main issue in today’s world. Various security and
authentication methods or techniques are applied to secure the iris template. The
proposed feature extraction and pattern recognition techniques on the preprocessed
image so that the security and reliability of the system could be raised.
https://dailytechnologyblog.weebly.com/
7. Contact Us
About Us
Address: 333-334, Second Floor, Himalaya
Marg, Sub. City Center, Sector 35 -B,
Chandigarh, 160035 India.
Email: careers@klevvrtechcar.com
Phone: 0172 400 7083, +91-7717427009
Dailylatestblog delivers the
finest information about Latest
Technology Gadgets. Electronics Gadgets
are playing a vital role in our daily life
activities. Gadgets help us to stay
connected with one another by providing
access to email, SMS, phone services,
video call, and social media. We can easily
use them to make new connections, in the
real world. According to the needs of
human beings to make life easier
technological up-gradation is very
important.
Social Media Platform
facebook Instagram
Twitter
https://dailytechnologyblog.weebly.com/