Spoofed Iris Recognition: Synthesis of Gabor and LBP descriptor using SPPC

Malathy, M.; Selvi, J. Arputha Vijaya
June 2014
Australian Journal of Basic & Applied Sciences;Jun2014, Vol. 8 Issue 9, p433
Academic Journal
Background: With the growing requirement of safety in everyday activities, identity management has quickly become an eminent concern. Biometrics using iris recognition systems are employed to scrutinizing an individual from a digital image or video source. In the proposed work, the robustness of iris recognition with spoofing attack is expounded. The dataset images are improved using image enhancement techniques. Multi-scale Local Binary Pattern (MLBP) algorithm is established for extracting the effective features to symbolize the images. This algorithm is a combination of Gabor wavelet followed by Local Binary Pattern (LBP) descriptor. The magnitude coefficients (real part) are isolated from Gabor wavelets and considered as an input for LBP which extracts the features of the given input image in various directional scales. Here, a supervised learning classifier especially spatial point pattern classifier is employed to check the verification process. Both dataset iris images and synthetically spoofed iris images are evaluated by the algorithm in order to increase a genuine acceptance ratio (GAR). The experimental result exhibits high efficiency and evaluates the better performance of the proposed approach. Objective: Spoofed Iris Recognition: Synthesis of Gabor and LBP descriptor using SPPC. Results: This section presents the result analysis for proposed work in which the spoofed iris image is detected by using the normalization method and feature extraction method. The classification accuracy and timing analysis of the algorithm are given in table I. In the presence of uncertainty, true positive rate or sensitivity is used to test the robustness of the results of a proposed system. Conclusion: In this paper, the robustness of iris recognition system with spoofing attack is explained. The dataset images are enhanced using image enhancement techniques. It is later subjected to multi-scale local binary pattern (MLBP) algorithm for extracting the efficient features to represent the images. This algorithm is a combination of Gabor wavelet followed by local binary pattern description (LBP) where the magnitude coefficient from Gabor wavelets takes as its input. A spatial point pattern classifier is used to check the verification process. Both dataset iris images and synthetically spoofed iris images are evaluated by the algorithm in order to increase a genuine acceptance ratio (GAR).


Related Articles


    Fingerprint recognition is being widely applied in the personal identification for the purpose of high degree of security by matching processes between two human fingerprints. Many different techniques have been proposed to have a satisfactory fingerprint identification. The widely used...

  • Optimized Discriminant Locality Preserving Projection of Gabor Feature for Biometric Recognition. Xi Chen; Jiashu Zhang // International Journal of Security & Its Applications;Apr2012, Vol. 6 Issue 2, p321 

    Discriminant locality preserving projection(DLPP) can not obtain optimal discriminant vectors which utmostly optimize the objective of DLPP. This paper proposed a Gabor based optimized discriminant locality preserving projections (ODLPP) algorithm which can directly optimize discriminant...

  • A New approach for fingerprint recognition using Earth Mover's Distance. Tripathy, B. K.; Chandramouli, P. V. S. S. R.; Ranajit, Bimalendu // International Journal of Advanced Research in Computer Science;May/Jun2012, Vol. 3 Issue 3, p223 

    Fingerprint recognition has been widely used in information security, personal identification etc. for its uniqueness and invariance. Efficient features extraction from input image is one of the important components of the fingerprint image recognition. Till now various algorithm have been...

  • Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm. Boukhari, Aissa; Chitroub, Salim; Bouraoui, Imen // International Journal of Communications, Network & System Scienc;Dec2011, Vol. 4 Issue 12, p778 

    The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another; governmental, commercial or even cybercriminal....

  • Identification of People by Iris Recognition. Chandel, Gajendra Singh; Bhargava, Ankesh // International Journal of Computer Science & Network Security;Mar2014, Vol. 14 Issue 3, p77 

    biometrics is a best medium of identification .iris recognition used to recognize people by iris. I present the new method of iris recognition "iris recognition by neural network". In this method first we collect the iris images and using image processing after this calculate the length of iris...

  • Multi-algorithmic IRIS Recognition. Sathish, G.; Saravanan, S.V.; Narmadha, S.; Maheswari, S. Uma // International Journal of Computer Applications;Jan2012, Vol. 38, p13 

    Modern societies give higher relevance to personal recognition system that contribute to the increase of security and reliability, essentially due to terrorism and other extremism or illegal activities. The objective of this work is to present a multi-algorithmic biometric authentication system...

  • RED Algorithm based Iris Recognition. Memane, Mayuri M.; Ganorkar, Sanjay R. // International Journal of Computer Technology & Applications;Jul-Aug2012, Vol. 3 Issue 4, p1605 

    Human iris is one of the most reliable biometric because of its uniqueness, stability and non-invasive nature. Biometrics based human authentication systems are becoming more important as government & corporations worldwide deploy them in such schemes as access & border control, time &...

  • Wavelet, Gabor Filters and Co-occurrence Matrix for Palmprint Verification. Khalifa, Anouar Ben; Rzouga, Lamia; BenAmara, Najoua Essoukri // International Journal of Image, Graphics & Signal Processing;Jun2013, Vol. 5 Issue 8, p1 

    Authentication through the palmprint is a field of biometrics. Palmprint-based personal verification has quickly entered the biometric family. It has become increasingly popular in the recent years due to its ease of acquisition, reliability and high user acceptance. In this paper, we present an...

  • A STATIONARY WAVELET TRANSFORM APPROACH FOR IMPROVED FINGERPRINT RECOGNITION SCHEME. Vishnuvi, K. B.; Sairam, N. // International Journal of Engineering & Technology (0975-4024);Apr/May2013, Vol. 5 Issue 2, p1134 

    Fingerprint recognition, a known biometrics for personal identification is used in securing confidential Data Contents. Fingerprint exhibits textured like patterns of whorls, loop etc in sector form which is then used for fingerprint matching. The existing method uses Gabor filter which does not...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics