Abstract

Retinal biometric trait is one of the safest and most secure biometric traits that can be used for personal identification and authentication. The poor contrast in captured retinal images initially requires the adoption of a preprocessing technique, especially when the vessel segmentation is required. As a result, an effective preprocessing technique is employed before the feature extraction process. The reliability of the segmentation depends on the consistency of the contrast across the images. Due to the complexity of the retinal vascular patterns, segmenting the vessels manually is a time-consuming task that also requires extensive training and abilities to distinguish the thinner blood vessel pixels from the background of the retinal images. We present a unique blood vessel segmentation technique based on Radial Chebyshev Moments (RCMs) shape descriptors. Moment-based shape descriptors are typically strong, concise, and simple to compute. They are also insensitive to the object’s scale, rotation, and translation. Furthermore, to eliminate the eye movement and to overcome the various lighting problems, the following multiple features are extracted in the feature extraction stage to accurately authenticate a person: statistical (gray-level) features, shape-based (RCM) features, and structural features, such as minutiae, bifurcation points, optical disc, and enclosed regions. The principal components analysis methodology is used to optimize the feature vector, and the target image is identified using the support vector machine classifier. This step helps to determine whether the test image belongs to the authorized person or not. RIDB and VARIA are the two standard retinal authentication databases and DRIVE and STARE are the two general retinal databases that are used for evaluating the performance of the system. The system yielded a high identification rate of 98%, 97.5%, 97.2% and 94.4% with average processing time of 0.987 s, 0.40 s, 1.262 s and 0.65 s, respectively. From the results, it is evident that the proposed method is more effective and efficient for authenticating individuals.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.