8 research outputs found

    Biometry based on iris images

    Get PDF
    Biometrické techniky jsou v současné době velmi rozšířené vědní odvětví. Biometrií je myšleno automatizované rozpoznávání osob na základě jejich anatomických rysů, v případě této diplomové práce duhovky oka. Rozpoznání pomocí duhovky se jeví jako nejslibnější z důvodu neinvazivního přístupu a nízké chybovosti. Zakladatelem biometrie oka je John G. Daugman. Z jeho prací vycházejí téměř všechny současné publikace. Tato diplomová práce se zabývá biometrií s využitím snímků duhovky. V úvodní části jsou popsány principy metod z oblasti biometrie na základě snímků duhovky. Následuje první praktická část věnovaná návrhu a realizaci dvou vybraných metod pro detekci vnitřní hranice duhovky. Třetí část této práce uvádí návrh a realizaci metody zpracování snímků duhovky za účelem klasifikace osob. Poslední kapitola je věnovaná vyhodnocení dosažených výsledků a jejich porovnání s publikovanými metodami.The biometric techniques are well known and widespread nowadays. In this context biometry means automated person recognition using anatomic features. This work uses the iris as the anatomic feature. Iris recognition is taken as the most promising technique of all because of its non-invasiveness and low error rate. The inventor of iris recognition is John G. Daugman. His work underlies almost all current public works of this technology. This final thesis is concerned with biometry based on iris images. The principles of biometric methods based on iris images are described in the first part. The first practical part of this work is aimed at the proposal and realization of two methods which localize the iris inner boundary. The third part presents the proposal and realization of iris image processing in order to classifying persons. The last chapter is focus on evaluation of experimental results and there are also compared our results with several well-known methods.

    Building a Strong Undergraduate Research Culture in African Universities

    Get PDF
    Africa had a late start in the race to setting up and obtaining universities with research quality fundamentals. According to Mamdani [5], the first colonial universities were few and far between: Makerere in East Africa, Ibadan and Legon in West Africa. This last place in the race, compared to other continents, has had tremendous implications in the development plans for the continent. For Africa, the race has been difficult from a late start to an insurmountable litany of problems that include difficulty in equipment acquisition, lack of capacity, limited research and development resources and lack of investments in local universities. In fact most of these universities are very recent with many less than 50 years in business except a few. To help reduce the labor costs incurred by the colonial masters of shipping Europeans to Africa to do mere clerical jobs, they started training ―workshops‖ calling them technical or business colleges. According to Mamdani, meeting colonial needs was to be achieved while avoiding the ―Indian disease‖ in Africa -- that is, the development of an educated middle class, a group most likely to carry the virus of nationalism. Upon independence, most of these ―workshops‖ were turned into national ―universities‖, but with no clear role in national development. These national ―universities‖ were catering for children of the new African political elites. Through the seventies and eighties, most African universities were still without development agendas and were still doing business as usual. Meanwhile, governments strapped with lack of money saw no need of putting more scarce resources into big white elephants. By mid-eighties, even the UN and IMF were calling for a limit on funding African universities. In today‘s African university, the traditional curiosity driven research model has been replaced by a market-driven model dominated by a consultancy culture according to Mamdani (Mamdani, Mail and Guardian Online). The prevailing research culture as intellectual life in universities has been reduced to bare-bones classroom activity, seminars and workshops have migrated to hotels and workshop attendance going with transport allowances and per diems (Mamdani, Mail and Guardian Online). There is need to remedy this situation and that is the focus of this paper

    Simple and secured access to networked home appliances via internet using SSL, BioHashing and single Authentication Server

    Get PDF
    This thesis describes a web-based application that will enable users to access their networked home appliances over the Internet in an easy, secured, accessible and cost effective manner, using the user's iris image only for authentication. As Internet is increasingly gaining significance and popularity in our daily lives, various home networking technologies also started gaining importance from consumers, which helped in facilitating interoperability, sharing of services and exchange of information between different electronic devices at home. As a result, the demand to be able to access home appliances or security cameras over the Internet gradually grew. In this research, we propose an efficient, secured, low-cost and user-friendly method to access networked home appliances over the Internet, providing strong, well integrated, three levels of security to the whole application and user data. According to our design, the user's iris data after hashing (using BioHashing) is sent through a secure communication channel utilizing Secure Sockets Layer v-3.0. The deterministic feature sequence from the iris image is extracted using 1D log-Gabor filters and while performing BioHashing, the orthonormalization of the pseudorandom number is implemented employing Gram-Schmidt orthonormalization algorithm. In addition to this protected data transfer mechanism, we propose the design of an Authentication Server that can be shared among multiple homes, allowing numerous users to access their home appliances in a trouble-free and secured manner. It can also bring down the cost of commercial realization of this endeavor and increase its accessibility without compromising on system security. We demonstrate that the recognition efficiency of this system is computationally effective with equal error rate (EER) of 0% and 6.75% (average) in two separate conditions on CASIA 1 and CASIA 2 iris image datasets

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications

    Sistema de reconocimiento de personas mediante su patrón de Iris Basado en la Transformada Wavelet

    Get PDF
    En el presente proyecto se exponen los fundamentos de la biometría, una de las más novedosas tecnologías, desarrolladas con el objetivo de mejorar la seguridad a nivel general de diversos aspectos presentes en la sociedad actual. En particular, se centra en la técnica de reconocimiento biométrico de iris, quizás la que mayor proyección de futuro tiene, dentro de las numerosas existentes dentro de la biometría (huella, geometría de la mano, retina, cara,…), y que presenta unas prestaciones muy propicias para formar parte de un sistema de seguridad altamente fiable. Uno de los fundamentos en los que se basa el diseño de este sistema, es el uso de la transformada wavelet, que permite el análisis de las señales unidimensionales, obtenidas a partir de las imágenes del iris, y que precisan de una explicación exhaustiva para conocer sus fundamentos. A lo largo de la memoria aquí expuesta, se proponen diversos aspectos relacionados con este sistema, que permiten conocer, la base sobre la que se fundamentan así como, desarrollar aspectos relacionados directamente con el mismo, y dar una visión del estado del arte de esta tecnologí
    corecore