Abstract

The iris is used as a reference for the study of unique biometric marks in people. The analysis of how to extract the iris characteristic information represents a fundamental challenge in image analysis, due to the implications it presents: detection of relevant information, data coding schemes, etc. For this reason, in the search for extraction of useful and characteristic information, approximations have been proposed for its analysis. In this article, it is presented a scheme to extract the relevant information based on the Hough transform. This transform helps to find primitive geometries in the irises, which are used to characterize each one of these. The results of the implementation of the algorithm of the Hough transform applied to the location and segmentation of the iris by means of its circumference are presented in the paper. Two public databases of iris images were used: UBIRIS V2 and CASIA-IrisV4, which were acquired under the same conditions and controlled environments. In the pre-processing stage the edges are found from the noise elimination in the image through the Canny detector. Subsequently, to the images of the detected edges, the Hough transform is applied to the disposition of the geometries detected.

Highlights

  • The analysis of how to extract the iris characteristic information represents a fundamental challenge in image analysis, due to the implications it presents: detection of relevant information, data coding schemes, etc

  • It is presented a scheme to extract the relevant information based on the Hough transform

  • The Hough transform can be used for iris detection due to its circular structure

Read more

Summary

Introduction

The iris recognition has become one of the most used methods in biometric recognition systems due to the unique characteristics of the iris and for its steady behavior throughout the life of the human being [1]. Recognition of face, fingers, voice and iris are among the most used characteristics for recognition [2]. Iris recognition is used in different security systems, and recently, in clinical application systems

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call