Development of an advanced biometric authentication system using iris recognition based on a convolutional neural network

The development and evaluation of a neural network-based method for iris-based personal identification. Development of a new method for generating feature representations with using pre-trained convolutional neural networks for iris classification.

Рубрика Коммуникации, связь, цифровые приборы и радиоэлектроника
Вид статья
Язык английский
Дата добавления 08.12.2024
Размер файла 151,0 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru/

Kazakh-British Technical University

DEVELOPMENT OF AN ADVANCED BIOMETRIC AUTHENTICATION SYSTEM USING IRIS RECOGNITION BASED ON A CONVOLUTIONAL NEURAL NETWORK

Yergesh A.K.

Almaty

Annotation

neural network personal identification

accurate identification of individuals is crucial for security purposes in various domains, such as information security and public safety. Biometric methods have emerged as the most promising and relevant approaches for personal identification. This study focuses on the development and evaluation of a neural network-based methodfor iris-based personal identification. The proposed approach leverages convolutional neural networks to perform iris image segmentation and generate effective feature representations. The paper provides a comprehensive description of the dataset used for training the segmentation algorithms, including access to the segmentation masks for the entire dataset. Additionally, a novel method is proposedfor generating feature representations using pre-trained convolutional neural networks for iris classification. A comparative analysis is conducted to evaluate different approaches for feature representation, including both classical methods and neural network-based techniques. Furthermore, various classification methods, such as support vector machines, random forests, and k-nearest neighbors, are examined and compared. The experimental results demonstrate the high classification accuracy achieved by the proposed approach.

Key words biometric authentication, iris recognition, neural networks, convolutional neural networks, feature representation, image segmentation, classification algorithms, support vector machines, random forests, k-nearest neighbors, Gabor filters, iris dataset, machine learning, security systems.

Introduction

The task of personal identification based on biometric data is important and relevant in information security. The use of biometric data for identification significantly increases the reliability of the identification process. In recent years, identification methods based on the face [1], hand geometry [2], fingerprints [3] and other biometric data have become widespread.

Iris-based personal identification is one of the most promising biometric technologies. The prospects of using the iris as a biometric material are explained by the following characteristics [4]:

1. Almost every person has an iris.

2. The structure of the iris of the eye practically does not change with time.

3. The iris of the eye is a unique identifier, and the probability that the irises of two different personalities will match is extremely small [4], amounting to approximately ~10-78.

In the classical approach to the task of identifying a person by the iris, the following stages are distinguished: segmentation [5], normalization [6], formation of a characteristic representation and classification.

The segmentation stage in the task of identifying a person by the iris of the eye consists in highlighting the iris area in the image of the eye. This area is an annular structure that is located betw E En the pupil and the sclera. The purpose of segmentation is to accurately determine the boundaries of the iris for subsequent processing and analysis. This stage includes various methods and algorithms that allow -you to automatically or semi automatically highlight the iris in the image of the eye. This is an important step, since the quality of segmentation directly affects the accuracy of identification of a person based on the iris. Various methods are used in the works, such as the Hough transform for localization of circles [7], the Daugman integrodifferential operator [7] [8] [9] and methods based on the analysis of boundary points. However, these approaches are not always able to correctly localize noise caused by overlapping eyelashes, eyelids or the appearance of glare. In this regard, researchers are interested in developing segmentation methods that provide higher quality results.

In many studies, the normalization stage in the iris identification task is implemented using the Daugman normalization [7] [8] [9].

Various methods were used to form the characteristic representation of the iris, including Gabor filters [10], log-Gabor filters [10], discrete cosine/sine transform, wavelet transform and others. In some studies, the stage of feature representation formation is accompanied by a step of dimension reduction. These methods and algorithms help to identify the characteristic features of the iris, which are then used for classification and identification of personality.

In modern research, the classification stage in the task of identifying the iris is implemented using various methods. Among them are the random forest [11], the k- nearest neighbor classifier [12], the support vector machine, and the neural network approach [7]. These methods are popular in machine learning and have the ability to efficiently process and classify iris data. The use of these methods makes it possible to achieve high accuracy in the identification of a person based on the iris of the eye.

Fig. 1 Schematic representation of the iris identification procedure

This article describes a method for identifying a person by the iris, in which neural networks are used at the stages of segmentation and the formation of a feature representation. This means that specially designed neural networks are used to highlight the iris and create a characteristic description. This approach allows for automatic and efficient processing of iris images and extraction of information that is further used to identify a person. The use of neural networks at these stages can lead to an improvement in the accuracy and reliability of the identification process.

Methods

To use the iris identification method, an image of the human iris is required. This image can be obtained using various methods, such as using an infrared camera. Infrared captures details and features of the iris that might not be visible in conventional video images. The resulting image of the iris serves as input for the subsequent application of the identification method based on the analysis and classification of these characteristics. Thus, using a camera in the IR range is one of the ways to obtain the necessary images for the operation of the iris identification method.

As part of the image preprocessing stage, certain operations are performed in the iris identification method. First, the RGB image is converted to a grayscale image. This is necessary to unify the images and comply with the requirements of the segmentation algorithm, which usually works with one image format. After converting to a grayscale image, scaling is applied. It is performed to ensure that the images are of the same size and aspect ratio, allowing comparison and analysis of the irises in a single coordinate system.

It is important to note that in the task of identification by the iris, shooting in the IR range is often used. In this regard, color images are converted to grayscale due to the n E Ed to unify data processing and analysis. Converting to a grayscale image allows you to more effectively highlight and analyze the characteristics of the iris as part of the identification method.

The segmentation stage is a critical component of the iris identification system, since the accuracy of the entire system depends on its results. A pre-processed image is received at the input of this stage. The output of the segmentation algorithm is a binary mask, which indicates that each pixel belongs to the iris of the eye. In the mask, a value of 1 corresponds to pixels belonging to the iris of the eye, and a value of 0 indicates pixels that do not belong to the iris. By creating such a mask, the segmentation algorithm determines the boundaries of the iris in the image, which allows subsequent processing and analysis of the iris for identification.

The segmentation step is followed by a normalization step that transforms the localized area of the iris to a unified view. This is necessary to ensure the same spatial arrangement of the characteristic features of the iris. The goal of normalization is to standardize the size, shape, and position of the iris in the image. The normalization process ensures comparability betw E En different iris images and improves further analysis and iris identification.

After the normalization step, the normalized iris image is redundant for direct use in the classification algorithm. Therefore, it is necessary to carry out the stage of forming a feature representation of data. At this stage, the characteristic features are extracted from the normalized image, which uniquely describe each instance of a particular class. The result of this step is a feature vector, which is a compact and informative representation of the iris, ready to be used in a classification algorithm.

The resulting vector representation of the iris after the stage of feature formation is input to the classification algorithm. The classification algorithm uses this feature vector to decide whether a given instance belongs to a particular class or to identify an individual. The algorithm can be based on various classification methods -such as random forest, k nearest neighbor classifier, support vector machine or neural network approach. It analyzes the feature vector and makes a decision based on the trained models and the given classification criteria.

Gabor filter 2D.

The Gabor filter is a commonly employed tool in image processing for tasks such as texture analysis, edge detection, and feature extraction. Its application enables the detection of specific frequency and orientation components within an image by modulating a harmonic function with a Gaussian function. It works by detecting the presence of a given frequency and component direction in the vicinity of each image point. Applying the Gabor filter [10] allows you to highlight textural features and structures in the image.

In practical application, to improve the quality of recognition, a set of optimal Gabor filters is usually used. The optimal set consists of filters with different direction values that show the best recognition quality. This allows you to more effectively detect and describe various textural features and structures in the image, improving the results of analysis and classification.

Fig. 2 The original image (left) and the result of normalization after applying the transformation (right): a) Daugman transformation b) framing and scaling

In the spatial domain, the Gabor filter is a harmonic function that is modulated by a Gaussian function. The Gabor filter formula in the spatial domain is where the harmonic function specifies the fundamental frequency and direction, and the Gaussian function defines the modulation window and controls the energy distribution around the fundamental frequency. This combination of the harmonic function and the Gaussian function allows the Gabor filter to detect and analyze various textural features and structures in the image.

After generating a set of Gabor filters [10], the normalized iris image undergoes convolution with each filter in the set to obtain a feature representation of the data. The resulting output is determined based on the signs of the real and imaginary parts of a complex number as follows [13]:

1. If the real part is negative and the imaginary part is negative, the output is `00'.

2. If the real part is negative and the imaginary part is non-positive, the output is `01'.

3. I-f the real part is non negative and the imaginary part is negative, the output is `10.

4. If the real part is non-negative and the imaginary part is non-negative, the output is `11'.

Test and results

For experimental studies in this work, the open data set Kaggle Iris Database was chosen. This data set contains 700 images of the irises taken using a near infrared camera. The size of each image is 28x28 pixels.

In this work, the iris segmentation stage was implemented using d E Ep learning methods, in particular, convolutional neural networks were trained. To train these networks, it was required to have pairs of original eye images (input instances) and corresponding segmentation mask images (true outputs). In this regard, the entire data set was subjected to manual segmentation, and the prepared set of segmentation masks is available in the public domain at the link [14].

As part of the study, a series of experiments was carried out, as a result of which the following tasks were performed:

1. The best way to normalize has b E En determined data.

2. The best method of indicative data representation was chosen.

3. The best size of the feature vectors input to the machine learning algorithms described above was determined.

4. The best algorithm for classification has b E En determined.

As the first method of forming a feature representation of data, a twodimensional Gabor filter was used. After normalization by the Daugman method and the formation of a feature representation, the number of principal components was enumerated and the classifiers were trained.

In the course of the study, a neural network approach was considered for the formation of an indicative representation of data. In particular, a modified pre-trained convolutional neural network with the DenseNet121 architecture was used.

To normalize the data in this approach, framing followed by scaling was applied. Cropping made it possible to highlight the area of interest of the iris in the image. Then, scaling was performed to bring the resulting area to the same size required to enter the convolutional neural network.

Thus, in this neural network approach, a modified DenseNet121 convolutional neural network was used, and data normalization was performed by framing and scaling.

The results of the conducted studies showed that the approach based on the use of the DenseNet convolutional neural network to form a feature representation of data demonstrates the best classification. In this approach, a normalization method based on framing followed by scaling was applied.

When adjusting parameters such as the number of principal components and the choice of classifier, a classification accuracy of 99.78% was achieved. This value exc E Eds the results of classification obtained using other combinations of methods for generating a feature representation, the number of principal components, and classifiers.

Thus, the DenseNet convolutional neural network with the framing and scaling normalization method showed the highest results in classification accuracy in the framework of the studies.

Table 1

Classification accuracy (%) obtained using various modifications of the Gabor filter and neural networks as a way to form a feature representation of data

The size of the final sequence of feature vectors

Machine learning algorithm

Random forest

Method k-

NN (k=1)

SVM

(linear)

SVM (rbf)

SVM (sigmoid)

2D Gabor filter, Daugman normalization

32

90.22

95.01

96.23

95.04

93.45

644

93.68

96.87

97.01

96.01

95.38

128

96.00

97.33

97.33

97.78

97.29

256

95.23

94.56

97.33

91.07

97.56

DenseNet121 framing with scaling

32

97.11

99.11

99.56

99.33

99.56

64

98.00

98.89

99.33

99.33

99.56

128

98.89

99.33

99.33

99.33

99.78

256

99.11

99.33

99.56

99.33

99.56

Conclusion

In this article, a study was made of the method of identifying a person by the iris of the eye using a neural network approach at the stages of segmentation and the formation of an indicative representation of data.

At the segmentation stage, a method based on convolutional neural networks was proposed to solve the iris segmentation problem. A database was formed, which was used to train convolutional neural networks. This database is available in the public domain. Comparative analysis with other works using the Kaggle Iris Database dataset showed that the proposed neural network approach achieves better accuracy in the segmentation problem.

Next, a comparative analysis of the methods for forming the feature representation of the iris was carried out. Including the classical approach based on various modifications of the Gabor filter and the neural network approach. The results of the study showed that the use of the proposed approach to the formation of a feature representation of data together with a classifier based on a support vector machine with a sigmoidal kernel achieves the highest classification accuracy for 45 classes - 99.78%. This means that the proposed method is highly effective in identifying a person by the iris.

Literature

1. Z. Rui and Z. Yan, “A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification, ” I E E E Access, vol. 7, 2019;

2. S. Prasad, G. V K, and S. P S, “Bimodal personal recognition using hand images,” pp. 403-409, 01 2009;

3. E. Marasco and A. Ross, “A survey on antispoofing schemes for fingerprint recognition systems,” ACM Comput. Surv., vol. 47, no. 2, nov 2014. [Online]. Available: https://doi.org/10.1145/2617756;

4. D. P. Benalcazar, J. E. Zambrano, D. Bastias, C. A. Perez, and K. W. Bowyer, “A 3D Iris Scanner From a Single Image Using Convolutional Neural Networks,” I E E E Access, vol. 8, pp. 98 584-98 599, 2020;

5. F. Jan, “Segmentation and localization schemes for nonideal iris biometric systems,” Signal Processing, vol. 133, pp. 192-212, 2017. [Online]. Available: https://www. sciencedirect.com/ science/ article/pii/S01651684163 03206;

6. M. Eskandari and O. Toygar, “Fusion of face and iris biometrics using local and global feature extraction methods,” Signal, Image and Video Processing, vol. 8, no. 6, pp. -95-1006, 2014. [Online]. Available: https://doi.org/10.1007/s11760-012-0411-4;

7. Y. Zhuang, J. H. Chuah, C. O. Chow, and M. G. Lim, “Iris recognition using convolutional neural network,” in 2020 I E E E 10th International Conference on System Engin E Ering and Technology (ICSET), 2020, pp. 134-138;

8. E. Jalilian and A. Uhl, “Iris Segmentation Using Fully Convolutional EncoderDecoder Networks.” Cham: Springer International Publishing, 2017, pp. 133-155;

A. K. Nsaef, A. Jaafar, and K. N. Jassim, “Enhancement segmentation technique for iris recognition system based on daugman's integro-differential operator,” in 2012 International Symposium on Instrumentation Measurement, Sensor Network and Automation (IMSNA), vol. 1, 2012, pp. 71-75;

9. P Yao, J. Li, X. Ye, Z. Zhuang, and B. Li, “Iris recognition algorithm using modified log-gabor filters, ” in 18th International Conference on Pattern Recognition (ICPR'06), vol. 4, 2006, pp. 461-464;

10. H. Bayrakc ;, A. B. Kes kekc i, and R. Arslan, “Classification of iris flower by random forest algorithm,” Advances in Artificial Intelligence Research, pp. 7 - 14, 2022;

11. Y. Liao and V. Vemuri, “Use of k-nearest neighbor classifier for intrusion detection11an earlier version of this paper is to appear in the proc E Edings of the 11th usenix security symposium, san francisco, ca, august 2002,” Computers Security, vol. 21, no. 5, pp. 439-448, 2002. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S016740480200514X;

12. L. Masek et al., “Recognition of human iris patterns for biometric identification,” 2003; https://www.kaggle.com/code/arbazkhan971/image-classification-using-cnn-94-accuracy

Размещено на Allbest.ru

...

Подобные документы

  • Signals, channels and communication networks. Enabling Any-to-Any Communication. Next-Generation Mobile Networks. Challenges of Reinventing the Networking Infrastructure. Leading the Way by Providing Innovative Solutions. The review of similar schemes.

    курсовая работа [629,0 K], добавлен 07.12.2015

  • Analyses o the current situation on the project and the development of their technical realization. Brief description of the existing zonal area network. Basic requirements for communication lines. Calculation of the required number of channels.

    дипломная работа [771,0 K], добавлен 20.09.2016

  • The lines of communication and the basic properties of the fiber optic link. Comparison of characteristics and selection of the desired type of optical cable. The concept of building a modern transmission systems. The main function module SDH networks.

    дипломная работа [2,1 M], добавлен 16.08.2016

  • Общие сведения о сети Integrated Services Digital Network: история создания, компоненты, инкапсуляция, использование. Типы пользовательского интерфейса, которые поддерживает технология. Адресация в сетях, стек протоколов. Подключение оборудования к сети.

    курсовая работа [223,8 K], добавлен 21.07.2012

  • Сравнительная характеристика телекоммуникационных сервисов - обычной телефонной связи (POTS), выделенных линий, Switched 56, ISDN, frame relay, SMDS, ATM и Synchronous Optical Network (SONET), их достоинства и недостатки. Основные преимущества сетей X.25.

    курсовая работа [1,1 M], добавлен 21.11.2009

  • Развитие и структура стека TCP/IP. Прикладной, транспортный, сетевой и канальный уровень. Гибкий формат заголовка. Поддержка резервирования пропускной способности. Протокол SNMP (Simple Network Management Protocol) для организации сетевого управления.

    реферат [404,3 K], добавлен 02.06.2016

  • Цифровая сеть с интеграцией услуг (Integrated Services Digital Network), создание технологии с возможностью одновременной передачи голоса и данных. Области применения сетей ISDN, эффективность использования, преимущества, возможности; телефонная связь.

    контрольная работа [27,1 K], добавлен 29.04.2011

  • Эффективные пути развития сетевой инфраструктуры. Внедрение сетевых решений на базе технологий сетей Passive Optical Network. Основные топологии построения оптических систем. Сравнение технологий APON, EPON, GPON. Сущность и виды оптического волокна.

    дипломная работа [3,3 M], добавлен 01.11.2013

  • Next Generation Network - новая концепция построения сетей связи. Техническая характеристика ЦСК EWSD. Цифровой абонентский блок DLU. Линейные группы LTG. Оценка интенсивности телефонной нагрузки. Расчет станционного оборудования проектируемой АТС.

    курсовая работа [312,4 K], добавлен 26.12.2011

  • История использования подводных лодок ВМФ США. Описание боевых информационно-управляющих систем (БИУС) на их борту как комплекса электронно-вычислительной аппаратуры для управления и эффективного использования боевых и технических возможностей оружия.

    презентация [896,8 K], добавлен 23.12.2013

  • Initial data for the term paper performance. Order of carrying out calculations. Analyze uncompensated system. Synthesize the real PD-compensator ( ) which would guarantee desired phase margin at gain crossover frequency . Analyze compensated system.

    курсовая работа [658,7 K], добавлен 20.08.2012

  • История создания сенсорных экранов и понятие их технологии в наши дни. Суть технологий IntelliTouch и Acoustic Pulse Recognition (APR). Взаимодействие экрана и оператора ввода, принцип действия устройства. Преимущества и недостатки сенсорных экранов.

    реферат [1,9 M], добавлен 10.05.2013

  • История образования и раскол в Microsoft, обзор GNU/Linux-подобных систем Fedora, Slackware. Обзор BSD-подобных систем OpenBSD, Frenzy. Unix-подобные операционные системы Extended File System ext. XFS и Unix File System, ядро linux-kernelи Emacs.

    реферат [135,9 K], добавлен 07.12.2010

  • Ознайомлення з технологією 4G та її комунікативна характеристика, можливості та особливості, вимоги IMT-Advanced. Карта покриття України та перспективи. Зростання пристроїв з підтримкою LTE. Порівняльна характеристика 4G і 3G, використовуване обладнання.

    реферат [1,4 M], добавлен 06.11.2016

  • Характеристика оборудования применяемого на сети Next Generation Networks. Функции шлюзов. Описание уровня управления коммутацией, обслуживанием вызова. Расчет транспортного ресурса для передачи сигнального трафика. Определение числа маршрутизаторов сети.

    дипломная работа [1,8 M], добавлен 22.02.2014

  • Обзор технологий LTE, действующих в мире. Параметры стандарта LTE Advanced (Rel.10). Основные положения радио доступа. Расширения, добавленные в стандарт. Разделение контрольной информации и данных. Расчёт зоны покрытия базовых станций сети LTE Rel.8.

    курсовая работа [2,4 M], добавлен 25.02.2015

  • Смартфоны и мобильные телефоны: история происхождения. Simon Personal Communicator. Операционные системы. Смартфоны и вредоносные программы. Программное обеспечение. Выход в Интернет. Клавиатура QWERTY. Обмен сообщениями. Обзор производителей смартфонов.

    реферат [44,0 K], добавлен 31.01.2017

  • Signal is a carrier of new information for the observer. Concept and classification detector signals, their variety and functional features. The detection abilities of different detector’s types, methodology and milestones of their determination.

    контрольная работа [1,1 M], добавлен 27.04.2014

  • Использование для построения модели сети сухопутной подвижной связи технологии IMT Advanced, которая относится к четвертому поколению мобильной связи. Расчет частотно-территориального планирования, построение модели блока системы подвижной связи.

    курсовая работа [871,7 K], добавлен 16.02.2013

  • Построение технологии ОКС-7 "сигнализация-маршрутизация-сообщение". Стандарты систем общеканальной сигнализации: CCITT Signalling System No.6 и No.7. Взаимодействие цифровых сетей. Виды систем сигнализации: абонентская, внутристанционная и межстанционная.

    курсовая работа [228,0 K], добавлен 30.05.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.