SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 5 (May 2014), PP.20-25
20
Iris Eye Segmentation and by multiple FCM
Ziad M. Abood Rafal Naser Salah Haeder Raad Hamed
Mustansiriyah University/ College of Education/ Iraq- Baghdad2014
Abstract:-In this research, the fuzzy c-means (FCM) technique applied toeye’s iris segmentation and with
multiple and evaluation the accuracy of results.
Keywords: FCM, Iris eye, Digital Image Processing, segmentation, Matlab.
I. INTRODUCTION
1- Biometrics
Biometrics (or biometric authentication) refers to the identification of humans by their characteristics
or traits. Biometrics is used in computer science as a form of identification and access control [1]. It is also used
to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable
characteristics used to label and describe individuals [2].
Biometric identifiers are often categorized as physiological versus behavioral characteristics
[3]. Physiological characteristics are related to the shape of the body. Examples include, but are not limited
to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, retina and
odor/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited
to: typing rhythm, gait, and voice [2]. Some researchers have coined the term behavior metrics to describe the
latter class of biometrics [4].
More traditional means of access control include token-based identification systems, such as a driver's license or
passport, and knowledge-based identification systems, such as a password or personal identification number
[2]. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token
and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about
the ultimate use of this information [2, 5].
II. IRIS RECOGNITION
The Iris is located behind the cornea and in front of the crystalline lens. The Iris divides the space
behind the cornea into the anterior and posterior chamber, which contains aqueous fluid. The Iris is a colored
tissue which extends from the ciliary body and is apparent at all times. The color of the Iris is determined
genetically. [6]
The purpose of the Iris is to constrict or enlarge the aperture of the pupil. By doing this it determines the amount
of light that enters the pupil. In bright light the muscles of the Iris constrict the amount of light entering the
pupil, and in low light the muscles enlarge the pupil to allow more light to enter[6]. Figure (1) shows structures
of the eye and iris, and examples of iris [7, 8, 9].
(a) (b)
Iris Eye Segmentation and by multiple FCM
21
(c) gray brown green blue
Figure (1) (a) Structures of the eye, (b) Iris, front view (c) An examples of a iris
III. IMAGE SEGMENTATION
Image Segmentation is the process of partitioning a digital image into multiple segments (sets of pixels,
also known as super pixels). The goal of segmentation is to simplify and/or change the representation of an
image into something that is more meaningful and easier to analyze. Image segmentation is typically used to
locate objects and boundaries (lines, curves, etc.) in images. More precisely, image segmentation is the process
of assigning a label to every pixel in an image such that pixels with the same label share certain visual
characteristics.
The result of image segmentation is a set of segments that collectively cover the entire image, or a set
of contours extracted from the image (edge detection). Each of the pixels in a region is similar with respect to
some characteristic or computed property, such as color, intensity, or texture. Adjacent regions are significantly
different with respect to the same characteristic(s). [10, 11]
IV. FUZZY C-MEANS (FCM) TECHNIQUE
The logic fuzzy and digital image processing techniques play an important role in the fields of
medicine types both in terms of diagnosis or treatment, with and put a lot of software to control over how the
performance of the means of science and technology that have become available to workers so as to provide the
amount bulk of the scientific potential in Stenographer Levy shortly purpose and it greatly facilitates the
diagnosis. [12]
The geometric center and the scope of each sub class are calculated adaptivelytoreducethecostfunction in fuzzy
c-means clustering [13].This method employs the membership function μmn to find the degree of membership of
nth object to them-th cluster. The cost function in fuzzyc-means clustering is [13]:
… (1)
Where, Nis the image pixel, is the center value of m-th cluster, presents the total number of image pixels and
denotes total clusters. (l>1) controls the fuzziness of the result ant segmentation. The membership function sare
accountable to the following constraints:
… (2)
The membership functions and the geometric centers can be updated in each iteration as follows:
… (3)
In order to incorporate the spatial information in to the fuzzy clustering technique, Chuang et al. [14] proposed
the following fuzzy membership functions:
Iris Eye Segmentation and by multiple FCM
22
… (4)
Where p and q control the respective contributions and the variable hmn includes the spatial information.
V. RESULTS AND DISCUSSION
1. Algorithm and Results
Figure (2) show the general algorithm of present study.
Figure (2) Algorithm scheme illustrates the current study
Figure (3) show the results of FCM application with the images samples of irises human eye.
No. Original image FCM1 FCM2 FCM3
1.
2.
3.
Image acquisition
ROI Image
FCM
Image segmentation
Iris Eye Segmentation and by multiple FCM
23
4.
5.
6.
7.
8.
9.
10.
Figure (3) Algorithm scheme illustrates the current study
Table (2) shows the Results of the application of FCM segmentational gorithm with (25) images representing
the irises. Our FCM algorithm was implemented in MATLAB.
Iris Eye Segmentation and by multiple FCM
24
Table (2)
No.
image
FCM1 FCM2 FCM3
Iteration
count
obj. fcn Iteration
count
obj. fcn Iteration
count
obj. fcn
1. 1 2937.982714 12 414.274014 25 412.490762
2. 1 11791.860070 16 2999.116295 33 2993.763293
3. 1 1208.573425 20 372.052345 41 371.983357
4. 1 751.624070 20 228.584372 41 228.425655
5. 1 3405.280719 11 775.337023 23 773.764884
6. 1 4383.128560 17 1074.919033 34 1074.792780
7. 1 1153.563214 15 487.215489 30 391.254801
8. 1 5672.197708 15 1227.396679 31 1227.121581
9. 1 9402.423147 21 2350.188146 42 2349.677084
10. 1 3283.185220 17 2190.148270 34 2004.185220
The outputs of segmentation and classifies ofimages with one representing weed stem and
zerorepresenting other objects. Performances of the classifierswere evaluated using the misclassification rate
(MCR). The MCR is defined as the ratio between thenumber of non-stem pixels misclassified as stem pixels
andthe total number of non-stem pixels in the image. [15]
To measure the segmentation accuracy, we also apply the quantitative evaluation of performance by defining the
misclassification ratio (MCR), which isgiven by:[15]
Table (3) shows the value of MCR of FCM level for images.
Table (3)
No.
image
FCM1 FCM2 FCM3
1. 28.25% 10.01% 6.11%
2. 21.35% 9.21% 6.45%
3. 19.78% 11.74% 4.86%
4. 19.56% 12.89% 5.03%
5. 27.45% 10.23% 4.89%
6. 28.01% 9.41% 6.01%
7. 28.30% 9.11% 5.79%
8. 36.25% 12.78% 4.89%
9. 30.56% 11.54% 4.23%
10. 17.78% 10.89% 4.78%
VI. CONCLUSIONS
In this paper, the fuzzy C-means technique applied to segmentation of iris image, given good results
with level increases.
From the results show the process, the color of iris has a clear impact in the process of segmentation.
Blue color of iris shows a clearer segmentation of other colors.
REFERENCES
[1] Zetter, Kim (2012-07-25). "Reverse-Engineered Irises Look So Real, They Fool Eye-Scanners". Wired
Magazine.Retrieved 25 July 2012.
[2] Jain, A., Hong, L., Pankanti, S. (2000). "Biometric Identification".Communications of the ACM, 43(2),
p. 91-98.
[3] Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK;
[4] Weaver, A. C. (2006). "Biometric Authentication". Computer, 39 (2), p. 96-97.
[5] Sahoo, SoyujKumar; MahadevaPrasanna, SR, Choubisa, Tarun (2012). "Multimodal Biometric Person
Authentication : A Review". IETE Technical Review 29 (1): 54.
[6] A look at the Structure of The Eye, Help & Information, SelectSpecs.com, 2014.
pixelsofnumbertotal
pixelsdmisclassfeofnumber
=MCR
Iris Eye Segmentation and by multiple FCM
25
[7] "eye, human”. Encyclopedia Britannica from Encyclopedia Britannica 2006.
[8] Gold, Daniel H; Lewis, Richard; "Clinical Eye Atlas," pp. 396-397.
[9] Sensory Reception,“Human Vision: Structure and function of the Human Eye", vol. 27, p. 175
Encyclopedia Britannica, 1987.
[10] Linda G. Shapiro and George C. Stockman: “Computer Vision”, pp 279-325, New Jersey, Prentice-
Hall, ISBN 0-13-030796-3.2001.
[11] Barghout, Lauren, and Lawrence W. Lee. "Perceptual information processing system".Paravue Inc.
U.S. Patent Application 10/618,543, filed July 11, 2003.
[12] Nedeljkovic I., Image Classification Based On Fuzzy Logic, The International Archives of the
Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 34, Part XXX.
[13] B. Li, C. Chui, S. Chang, and S. Hong, “Integrating spatial fuzzy clustering with levelset methods for
automated medical image segmentation”, Comp. in Biology and Medicine, vol. 11, pp. 1-10, 2011.
[14] K. Chuang, H. Hzeng, S. Chen, J. Wu, and T. Chen, “Fuzzy c-means clustering with spatial
information for image segmentation,” Computerized Medical Imaging, and Graphics, vol. 30, pp. 9–15,
2006.
[15] Lei Jiang, Wenhui Yang A Modified Fuzzy C-Means Algorithm for Segmentation of Magnetic
Resonance Images, Proc. VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot
H., Ourselin S. and Adriaansen T. (Eds.), 10-12 Dec. 2003, Sydney.
‫الخالصة‬:

Más contenido relacionado

La actualidad más candente

IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
 
Multi modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresMulti modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresijcga
 
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...IRJET Journal
 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...eSAT Journals
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESijcsit
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...IJECEIAES
 
Robust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofRobust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofijfcstjournal
 
A Spectral Domain Local Feature Extraction Algorithm for Face Recognition
A Spectral Domain Local Feature Extraction Algorithm for Face RecognitionA Spectral Domain Local Feature Extraction Algorithm for Face Recognition
A Spectral Domain Local Feature Extraction Algorithm for Face RecognitionCSCJournals
 
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...journalBEEI
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...IJECEIAES
 
Human Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierHuman Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierIJERA Editor
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGcsandit
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...IRJET Journal
 
PERIOCULAR RECOGNITION USING REDUCED FEATURES
PERIOCULAR RECOGNITION USING REDUCED FEATURESPERIOCULAR RECOGNITION USING REDUCED FEATURES
PERIOCULAR RECOGNITION USING REDUCED FEATURESijcsit
 
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...IJCSIS Research Publications
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPCSCJournals
 

La actualidad más candente (19)

IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
LazarusPatent2
LazarusPatent2LazarusPatent2
LazarusPatent2
 
Multi modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresMulti modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet features
 
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
A Survey on Retinal Area Detector From Scanning Laser Ophthalmoscope (SLO) Im...
 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...
 
Robust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofRobust 3 d face recognition in presence of
Robust 3 d face recognition in presence of
 
Ijetcas14 315
Ijetcas14 315Ijetcas14 315
Ijetcas14 315
 
A Spectral Domain Local Feature Extraction Algorithm for Face Recognition
A Spectral Domain Local Feature Extraction Algorithm for Face RecognitionA Spectral Domain Local Feature Extraction Algorithm for Face Recognition
A Spectral Domain Local Feature Extraction Algorithm for Face Recognition
 
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
 
Human Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierHuman Segmentation Using Haar-Classifier
Human Segmentation Using Haar-Classifier
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
IRJET- Performance Analysis of Learning Algorithms for Automated Detection of...
 
PERIOCULAR RECOGNITION USING REDUCED FEATURES
PERIOCULAR RECOGNITION USING REDUCED FEATURESPERIOCULAR RECOGNITION USING REDUCED FEATURES
PERIOCULAR RECOGNITION USING REDUCED FEATURES
 
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
 

Similar a Iris Eye Segmentation Using Fuzzy C-Means

Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...IAESIJAI
 
Quality assessment for online iris
Quality assessment for online irisQuality assessment for online iris
Quality assessment for online iriscsandit
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIJECEIAES
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
Iris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIRJET Journal
 
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINAAN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINAijait
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPIRJET Journal
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...CSCJournals
 
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...IRJET Journal
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSAM Publications
 
Prediction of Cognitive Imperiment using Deep Learning
Prediction of Cognitive Imperiment using Deep LearningPrediction of Cognitive Imperiment using Deep Learning
Prediction of Cognitive Imperiment using Deep LearningIRJET Journal
 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...ijcsit
 
IRJET- Brain Tumor Detection using Image Processing, ML & NLP
IRJET- Brain Tumor Detection using Image Processing, ML & NLPIRJET- Brain Tumor Detection using Image Processing, ML & NLP
IRJET- Brain Tumor Detection using Image Processing, ML & NLPIRJET Journal
 
IRJET - Brain Tumor Detection using Image Processing, ML & NLP
IRJET - Brain Tumor Detection using Image Processing, ML & NLPIRJET - Brain Tumor Detection using Image Processing, ML & NLP
IRJET - Brain Tumor Detection using Image Processing, ML & NLPIRJET Journal
 
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET Journal
 

Similar a Iris Eye Segmentation Using Fuzzy C-Means (20)

Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...
 
Quality assessment for online iris
Quality assessment for online irisQuality assessment for online iris
Quality assessment for online iris
 
Iris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filterIris recognition based on 2D Gabor filter
Iris recognition based on 2D Gabor filter
 
E0543135
E0543135E0543135
E0543135
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
Iris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning Technique
 
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINAAN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINA
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
 
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
Augmentation of Multimodal 3D Magnetic Resonance Imaging using Generative Adv...
 
K0966468
K0966468K0966468
K0966468
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
 
Prediction of Cognitive Imperiment using Deep Learning
Prediction of Cognitive Imperiment using Deep LearningPrediction of Cognitive Imperiment using Deep Learning
Prediction of Cognitive Imperiment using Deep Learning
 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
 
IRJET- Brain Tumor Detection using Image Processing, ML & NLP
IRJET- Brain Tumor Detection using Image Processing, ML & NLPIRJET- Brain Tumor Detection using Image Processing, ML & NLP
IRJET- Brain Tumor Detection using Image Processing, ML & NLP
 
IRJET - Brain Tumor Detection using Image Processing, ML & NLP
IRJET - Brain Tumor Detection using Image Processing, ML & NLPIRJET - Brain Tumor Detection using Image Processing, ML & NLP
IRJET - Brain Tumor Detection using Image Processing, ML & NLP
 
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 

Último (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 

Iris Eye Segmentation Using Fuzzy C-Means

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 5 (May 2014), PP.20-25 20 Iris Eye Segmentation and by multiple FCM Ziad M. Abood Rafal Naser Salah Haeder Raad Hamed Mustansiriyah University/ College of Education/ Iraq- Baghdad2014 Abstract:-In this research, the fuzzy c-means (FCM) technique applied toeye’s iris segmentation and with multiple and evaluation the accuracy of results. Keywords: FCM, Iris eye, Digital Image Processing, segmentation, Matlab. I. INTRODUCTION 1- Biometrics Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control [1]. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals [2]. Biometric identifiers are often categorized as physiological versus behavioral characteristics [3]. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, retina and odor/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to: typing rhythm, gait, and voice [2]. Some researchers have coined the term behavior metrics to describe the latter class of biometrics [4]. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number [2]. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information [2, 5]. II. IRIS RECOGNITION The Iris is located behind the cornea and in front of the crystalline lens. The Iris divides the space behind the cornea into the anterior and posterior chamber, which contains aqueous fluid. The Iris is a colored tissue which extends from the ciliary body and is apparent at all times. The color of the Iris is determined genetically. [6] The purpose of the Iris is to constrict or enlarge the aperture of the pupil. By doing this it determines the amount of light that enters the pupil. In bright light the muscles of the Iris constrict the amount of light entering the pupil, and in low light the muscles enlarge the pupil to allow more light to enter[6]. Figure (1) shows structures of the eye and iris, and examples of iris [7, 8, 9]. (a) (b)
  • 2. Iris Eye Segmentation and by multiple FCM 21 (c) gray brown green blue Figure (1) (a) Structures of the eye, (b) Iris, front view (c) An examples of a iris III. IMAGE SEGMENTATION Image Segmentation is the process of partitioning a digital image into multiple segments (sets of pixels, also known as super pixels). The goal of segmentation is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. Image segmentation is typically used to locate objects and boundaries (lines, curves, etc.) in images. More precisely, image segmentation is the process of assigning a label to every pixel in an image such that pixels with the same label share certain visual characteristics. The result of image segmentation is a set of segments that collectively cover the entire image, or a set of contours extracted from the image (edge detection). Each of the pixels in a region is similar with respect to some characteristic or computed property, such as color, intensity, or texture. Adjacent regions are significantly different with respect to the same characteristic(s). [10, 11] IV. FUZZY C-MEANS (FCM) TECHNIQUE The logic fuzzy and digital image processing techniques play an important role in the fields of medicine types both in terms of diagnosis or treatment, with and put a lot of software to control over how the performance of the means of science and technology that have become available to workers so as to provide the amount bulk of the scientific potential in Stenographer Levy shortly purpose and it greatly facilitates the diagnosis. [12] The geometric center and the scope of each sub class are calculated adaptivelytoreducethecostfunction in fuzzy c-means clustering [13].This method employs the membership function μmn to find the degree of membership of nth object to them-th cluster. The cost function in fuzzyc-means clustering is [13]: … (1) Where, Nis the image pixel, is the center value of m-th cluster, presents the total number of image pixels and denotes total clusters. (l>1) controls the fuzziness of the result ant segmentation. The membership function sare accountable to the following constraints: … (2) The membership functions and the geometric centers can be updated in each iteration as follows: … (3) In order to incorporate the spatial information in to the fuzzy clustering technique, Chuang et al. [14] proposed the following fuzzy membership functions:
  • 3. Iris Eye Segmentation and by multiple FCM 22 … (4) Where p and q control the respective contributions and the variable hmn includes the spatial information. V. RESULTS AND DISCUSSION 1. Algorithm and Results Figure (2) show the general algorithm of present study. Figure (2) Algorithm scheme illustrates the current study Figure (3) show the results of FCM application with the images samples of irises human eye. No. Original image FCM1 FCM2 FCM3 1. 2. 3. Image acquisition ROI Image FCM Image segmentation
  • 4. Iris Eye Segmentation and by multiple FCM 23 4. 5. 6. 7. 8. 9. 10. Figure (3) Algorithm scheme illustrates the current study Table (2) shows the Results of the application of FCM segmentational gorithm with (25) images representing the irises. Our FCM algorithm was implemented in MATLAB.
  • 5. Iris Eye Segmentation and by multiple FCM 24 Table (2) No. image FCM1 FCM2 FCM3 Iteration count obj. fcn Iteration count obj. fcn Iteration count obj. fcn 1. 1 2937.982714 12 414.274014 25 412.490762 2. 1 11791.860070 16 2999.116295 33 2993.763293 3. 1 1208.573425 20 372.052345 41 371.983357 4. 1 751.624070 20 228.584372 41 228.425655 5. 1 3405.280719 11 775.337023 23 773.764884 6. 1 4383.128560 17 1074.919033 34 1074.792780 7. 1 1153.563214 15 487.215489 30 391.254801 8. 1 5672.197708 15 1227.396679 31 1227.121581 9. 1 9402.423147 21 2350.188146 42 2349.677084 10. 1 3283.185220 17 2190.148270 34 2004.185220 The outputs of segmentation and classifies ofimages with one representing weed stem and zerorepresenting other objects. Performances of the classifierswere evaluated using the misclassification rate (MCR). The MCR is defined as the ratio between thenumber of non-stem pixels misclassified as stem pixels andthe total number of non-stem pixels in the image. [15] To measure the segmentation accuracy, we also apply the quantitative evaluation of performance by defining the misclassification ratio (MCR), which isgiven by:[15] Table (3) shows the value of MCR of FCM level for images. Table (3) No. image FCM1 FCM2 FCM3 1. 28.25% 10.01% 6.11% 2. 21.35% 9.21% 6.45% 3. 19.78% 11.74% 4.86% 4. 19.56% 12.89% 5.03% 5. 27.45% 10.23% 4.89% 6. 28.01% 9.41% 6.01% 7. 28.30% 9.11% 5.79% 8. 36.25% 12.78% 4.89% 9. 30.56% 11.54% 4.23% 10. 17.78% 10.89% 4.78% VI. CONCLUSIONS In this paper, the fuzzy C-means technique applied to segmentation of iris image, given good results with level increases. From the results show the process, the color of iris has a clear impact in the process of segmentation. Blue color of iris shows a clearer segmentation of other colors. REFERENCES [1] Zetter, Kim (2012-07-25). "Reverse-Engineered Irises Look So Real, They Fool Eye-Scanners". Wired Magazine.Retrieved 25 July 2012. [2] Jain, A., Hong, L., Pankanti, S. (2000). "Biometric Identification".Communications of the ACM, 43(2), p. 91-98. [3] Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK; [4] Weaver, A. C. (2006). "Biometric Authentication". Computer, 39 (2), p. 96-97. [5] Sahoo, SoyujKumar; MahadevaPrasanna, SR, Choubisa, Tarun (2012). "Multimodal Biometric Person Authentication : A Review". IETE Technical Review 29 (1): 54. [6] A look at the Structure of The Eye, Help & Information, SelectSpecs.com, 2014. pixelsofnumbertotal pixelsdmisclassfeofnumber =MCR
  • 6. Iris Eye Segmentation and by multiple FCM 25 [7] "eye, human”. Encyclopedia Britannica from Encyclopedia Britannica 2006. [8] Gold, Daniel H; Lewis, Richard; "Clinical Eye Atlas," pp. 396-397. [9] Sensory Reception,“Human Vision: Structure and function of the Human Eye", vol. 27, p. 175 Encyclopedia Britannica, 1987. [10] Linda G. Shapiro and George C. Stockman: “Computer Vision”, pp 279-325, New Jersey, Prentice- Hall, ISBN 0-13-030796-3.2001. [11] Barghout, Lauren, and Lawrence W. Lee. "Perceptual information processing system".Paravue Inc. U.S. Patent Application 10/618,543, filed July 11, 2003. [12] Nedeljkovic I., Image Classification Based On Fuzzy Logic, The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 34, Part XXX. [13] B. Li, C. Chui, S. Chang, and S. Hong, “Integrating spatial fuzzy clustering with levelset methods for automated medical image segmentation”, Comp. in Biology and Medicine, vol. 11, pp. 1-10, 2011. [14] K. Chuang, H. Hzeng, S. Chen, J. Wu, and T. Chen, “Fuzzy c-means clustering with spatial information for image segmentation,” Computerized Medical Imaging, and Graphics, vol. 30, pp. 9–15, 2006. [15] Lei Jiang, Wenhui Yang A Modified Fuzzy C-Means Algorithm for Segmentation of Magnetic Resonance Images, Proc. VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot H., Ourselin S. and Adriaansen T. (Eds.), 10-12 Dec. 2003, Sydney. ‫الخالصة‬: