We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security System based on Viola Jones Detection

by Sheeba Jeya Sophia. S, Anitha. S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 15
Year of Publication: 2013
Authors: Sheeba Jeya Sophia. S, Anitha. S
10.5120/11003-6186

Sheeba Jeya Sophia. S, Anitha. S . Security System based on Viola Jones Detection. International Journal of Computer Applications. 65, 15 ( March 2013), 33-38. DOI=10.5120/11003-6186

@article{ 10.5120/11003-6186,
author = { Sheeba Jeya Sophia. S, Anitha. S },
title = { Security System based on Viola Jones Detection },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 15 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number15/11003-6186/ },
doi = { 10.5120/11003-6186 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:18:56.273198+05:30
%A Sheeba Jeya Sophia. S
%A Anitha. S
%T Security System based on Viola Jones Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 15
%P 33-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. This paper illustrates techniques to improve performance of iris recognition system based on stationary images using NI LabVIEW (Vision Module). Region of interest segmentation and localization of iris using canny edge detection is performed. And normalization of iris is performed using the Gabor filter. Local Binary Pattern (LBP) is used for feature vectors extraction and Learning Vector Quantization (LVQ) performs classification. Here, matching is performed using the hamming distance. Also we create a LabVIEW database for storing the information of the users. All the images used in this paper were collected from the Chinese Academy Of Sciences Institute of Automation (CASIA) iris database VI. 0 with 108 subjects in it.

References
  1. Adams W. K. Kong, Member, IEEE, David Zhang, Fellow, IEEE, and Mohamed S. Kamel, Fellow, IEEE, "An Analysis of Iriscode", IEEE transactions on image processing, vol. 19, no. 2, (2010).
  2. Amol D. Rahulkar and Raghunath S. Holambe, "Half-Iris Feature Extraction and Recognition Using a New Class of Biorthogonal Triplet Half-Band Filter Bank and Flexible k-out-of-n:A Postclassifier", IEEE Trans. on information forensics and security, vol. 7, no. 1, (2012),
  3. Boles . W and Boashash . B , "A human identification technique using images of the iris and wavelet transform", IEEE Trans. Signal Processing, vol. 46, pp. 1185–1188, (1998).
  4. Daugman. J, "High confidence visual recognition of persons by a test of statistical independence",, IEEE Trans. Pattern Analy. Machine Intell. , vol. 15, pp. 1148–1161, (1993).
  5. --------, "Statistical richness of visual phase information: update on recognizing persons by iris patterns", Int. J. Comput. Vis. , vol. 45, no. 1, pp. 25–38, (2001).
  6. --------, "Demodulation by complex-valued wavelets for stochastic pattern recognition", Int. J. Wavelets, Multi-Res. and Info. Processing, vol. 1, no. 1, pp. 1–17, (2003).
  7. Flom . L and Safir . A, "Iris Recognition system", (1987), U. S. Patent 4 641 394, (1987).
  8. Havlicek . J, Harding . D, and Bovik . A, "The mutli-component AM-FM image representation",, IEEE Trans. Image Processing, vol. 5, pp. 1094–1100, (1996).
  9. Karen P. Hollingsworth, Kevin W. Bowyer, Fellow, IEEE, and Patrick J. Flynn, Senior Member, IEEE, "The Best Bits in an Iris Code", IEEE Trans. on pattern analysis and machine intelligence, vol. 31, no. 6. , (2009).
  10. Kumar . B, Xie . C, and Thornton . J, "Iris verification using correlation filters", in Proc. 4th Int. Conf. Audio- and Video-Based Biometric Person Authentication, pp. 697–705, (2003).
  11. Ma. L, Tan. T, Wang. Y, and Zhang. D, "Efficient iris recognition by characterizing key local variations", IEEE Trans. Image Process. , vol. 13, no. 6, pp. 739–750, (2004).
  12. Monro. D, Rakshit. S, and Zhang. D, "DCT-based iris recognition", IEEE Trans. Pattern Anal. Mach. Intell. , vol. 29, no. 4, pp. 586-595, (2007).
  13. Natalia A. Schmid, Member, IEEE, Manasi V. Ketkar, Harshinder Singh, and Bojan Cukic, Member IEEE, "Performance Analysis of Iris-Based Identification System at the Matching Score Level", IEEE Trans. on inf. forensics and security, vol. 1, no. 2, (2006).
  14. Yulin Si, Jiangyuan Mei, and Huijun Gao,Senior Member, IEEE, "Novel Approaches to Improve Robustness, Accuracy and Rapidity of Iris Recognition Systems", IEEE Trans. on Ind. Inf. , Vol. 8, no. 1, (2012).
  15. Park . C, Lee . J, Smith . M, and Park . K, "Iris- based personal authentication using a normalized directional energy feature", in Proc. 4th Int. Conf. Audio- and Video-Based Biometric Person Authentication, pp. 224–232, (2003).
  16. Sanchez-Avila . C and Sanchez-Reillo . R, "Iris-based biometric recognition using dyadic wavelet transform," IEEE Aerosp. Electron. Syst. Mag. , vol. 17, pp. 3–6, (2002).
  17. Tangsukson . T and Havlicek . J, "AM-FM image segmentation", in Proc. EEE Int. Conf. Image Processing, pp. 104–107, (2000).
  18. Tisse . C, Martin . L , Torres . L , and Robert . M, "Person identification technique using human iris recognition", (2002), in Proc. Vision Interface, pp. 294–299, (2002).
  19. Paigwar Shikha and Shukla Shailja," Neural Network based Offline Signature Recognition and verification system", Research Journal of Engineering Science 2(2) 11-15, (2013).
  20. Singh Amarendra and Verma Nupur,"Ear Recognition for automated Human Identification " , Research Journal of Engineering Science 1(5) 44-46, (2012).
  21. Yadav Sunil Kumar and Rizvi Syed Azhar Abbas, "Cybernetics Security Requirements and Reuse for Improving Information Systems Security" Research Journal of Engineering Sci. , 1(5), 51-54,(2012).
Index Terms

Computer Science
Information Sciences

Keywords

Canny Edge Detection Gabor Filter Local Binary Pattern (LBP) Learning Vector Quantization (LVQ)