全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

An Introduction to Information Sets with an Application to Iris Based Authentication

DOI: 10.4236/jmp.2020.111008, PP. 122-144

Keywords: Information Sets, Energy Feature (EF), Sigmoid Feature (SF), Hanman Trans-form (HT), Hanman Filter (HF), Hanman-Anirbanentropy Function

Full-Text   Cite this paper   Add to My Lib

Abstract:

This paper presents the information set which originates from a fuzzy set on applying the Hanman-Anirban entropy function to represent the uncertainty. Each element of the information set is called the information value which is a product of the information source value and its membership function value. The Hanman filter that modifies the information set is derived by using a filtering function. Adaptive Hanman-Anirban entropy is formulated and its properties are given. It paves the way for higher form of information sets called Hanman transforms that evaluate the information source based on the information obtained on it. Based on the information set six features, Effective Gaussian Information source value (EGI), Total Effective Gaussian Information (TEGI), Energy Feature (EF), Sigmoid Feature (SF), Hanman transform (HT) and Hanman Filter (HF) features are derived. The performance of the new features is evaluated on CASIA-IRIS-V3-Lamp database using both Inner Product Classifier (IPC) and Support Vector Machine (SVM). To tackle the problem of partially occluded eyes, majority voting method is applied on the iris strips and this enables better performance than that obtained when only a single iris strip is used.

References

[1]  Zadeh, L.A. (1965) Information and Control, 8, 338-353.
https://doi.org/10.1016/S0019-9958(65)90241-X
[2]  Yager, R.R. (2008) Fuzzy Sets and Systems, 159, 2193-2210.
https://doi.org/10.1016/j.fss.2007.12.026
[3]  Yager, R.R. (1992) Fuzzy Sets and Systems, 50, 279-292.
https://doi.org/10.1016/0165-0114(92)90226-T
[4]  Shannon, C.E. (1948) Bell System Technical Journal, 27, 379-423.
https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
[5]  Pal, N.R. and Pal, S.K. (1992) Information Sciences, 66, 113-117.
https://doi.org/10.1016/0020-0255(92)90090-U
[6]  Hanmandlu, M. and Das, A. (2011) Defence Science Journal, 61, 415-430.
https://doi.org/10.14429/dsj.61.1177
[7]  Mamta and Hanmandlu, M. (2013) Expert Systems with Applications, 40, 6478-6490.
https://doi.org/10.1016/j.eswa.2013.05.020
[8]  Hanmandlu, M., Jha, D. and Sharma, R. (2003) Pattern Recognition Letters, 24, 81-87.
https://doi.org/10.1016/S0167-8655(02)00191-5
[9]  Mamta and Hanmandlu, M. (2014) Expert Systems with Applications, 36, 269-286.
https://doi.org/10.1016/j.engappai.2014.06.028
[10]  Daugman, J. (1993) IEEE Transactions on Pattern Analysis and Machine Intelligence, 15, 1148-1161.
https://doi.org/10.1109/34.244676
[11]  Wildes, R.P. (1997) Proceedings of the IEEE, 85, 1348-1363.
https://doi.org/10.1109/5.628669
[12]  Daugman, J. (1998) IEEE Transactions on Acoustics Speech and Signal Processing, 36, 1169-1179.
https://doi.org/10.1109/29.1644
[13]  He, Z., Tan, T., Sun, Z. and Qiu, X. (2009) IEEE Transactions on Pattern Analysis and Machine Intelligence, 31, 1670-1684.
https://doi.org/10.1109/TPAMI.2008.183
[14]  Bowyer, K.W., Hollingsworth, K. and Flynn, P.J. (2008) Computer Vision and Image Understanding, 110, 281-307.
https://doi.org/10.1016/j.cviu.2007.08.005
[15]  Daugman, J. (1998) Journal of the Optical Society of America A, 2, 1160-1170.
https://doi.org/10.1364/JOSAA.2.001160
[16]  Bonney, B., Ive, R., Etter, D. and Du, Y. (2004) Iris Pattern Extraction Using Bit Planes and Standard Deviations. 38th Asilomar Conference on Signals, Systems, and Computers, Vol. 1, 582-586.
[17]  Lili, P. and Mei, X. (2005) The Algorithm of Iris Image Processing. 4th IEEE Workshop on Automatic Identification Advanced Technologies, Vol. 1, 134-138.
[18]  Camus, T.A. and Wildes, R.P. (2002) Reliable and Fast Eye Finding in Close-Up Images. 16th International Conference on Pattern Recognition, Quebec, Vol. 1, 389-394.
[19]  Du, Y., Bonney, B., Ives, R., Etter, D. and Schultz, R. (2005) Analysis of Partial Iris Recognition Using a 1-D Approach. International Conference on Acoustics, Speech, Signal Processing, Philadelphia, Vol. 2, 961-964.
[20]  Pillai, J.K., Patel, V.M., Chellappa, R. and Ratha, N.K. (2011) IEEE Transactions on Pattern Analysis and Machine Intelligence, 33, 1877-1893.
https://doi.org/10.1109/TPAMI.2011.34
[21]  Abhyankar, A., Hornak, L. and Schuckers, S. (2005) Off-Angle Iris Recognition Using Bi-Orthogonal Wavelet Network System. 4th IEEE Workshop Automatic Identification Advanced Technologies, Buffalo, 16-18 October 2005, 239-244.
[22]  Vatsa, M., Singh, R. and Noore, A. (2008) IEEE Transactions on Systems, Man, and Cybernetic B, 38, 1021-1035.
https://doi.org/10.1109/TSMCB.2008.922059
[23]  Daugman, J. (2207) IEEE Transactions on Systems, Man, and Cybernetic B, 37, 1167-1175.
https://doi.org/10.1109/TSMCB.2007.903540
[24]  Ma, L., Wang, Y. and Tan, T. (2002) Iris Recognition Based on Multichannel Gabor Filtering. Proceedings of the 5th Asian Conference on Computer Vision, Vol. 1, 279-283.
[25]  Tisse, C., Martin, L., Torres, L. and Robert, M. (2002) Person Identification Technique Using Human Iris Recognition. 15th International Conference on Vision Interface, Calgary, 27-29 May 2002, 294-299.
[26]  Huang, H. and Hu, G. (2005) Iris Recognition Based on Adjustable Scale Wavelet Transform. 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Shanghai, 1-4 September 2005, 7533-7536.
[27]  Miyazawa, K., Ito, K., Aoki, T., Kobayashi, K. and Nakajima, H. (2005) An Efficient Iris Recognition Algorithm Using Phase-Based Image Matching. International Conference on Image Processing, Genoa, Vol. 2, 49-52.
https://doi.org/10.1109/ICIP.2005.1529988
[28]  Roy, K. and Bhattacharya, P. (2006) Iris Recognition with Support Vector Machines. Lecture Notes in Computer Science Vol. 3832, International Conference on Biometrics, Hong Kong, 5-7 January 2006, 486-492.
https://doi.org/10.1007/11608288_65
[29]  Rakvic, R.N., Ulis, B.J., Broussard, R.P., Ives, R.W. and Steiner, N. (2009) IEEE Transactions on Information Forensics and Security, 4, 812-823.
https://doi.org/10.1109/TIFS.2009.2032012
[30]  Venugopalan, S. and Savvides, M. (2011) IEEE Transactions on Information Forensics and Security, 6, 385-396.
https://doi.org/10.1109/TIFS.2011.2108288
[31]  Proença, H. (2011) IEEE Transactions on Information Forensics and Security, 6, 82-95.
https://doi.org/10.1109/TIFS.2010.2086446
[32]  Daugman, J. and Downing, C. (2008) IEEE Transactions on Information Forensics and Security, 3, 52-62.
https://doi.org/10.1109/TIFS.2007.916009
[33]  Belcher, C. and Du, Y. (2008) IEEE Transactions on Information Forensics and Security, 3, 572-578.
https://doi.org/10.1109/TIFS.2008.924606
[34]  Velisavljevic, V. (2009) IEEE Transactions on Information Forensics and Security, 4, 410-418.
https://doi.org/10.1109/TIFS.2009.2024025
[35]  Park, U., Jillela, R.R., Ross, A. and Jain, A.K. (2011) IEEE Transactions on Information Forensics and Security, 6, 96-106.
https://doi.org/10.1109/TIFS.2010.2096810
[36]  Hollingsworth, K., Peters, T., Bowyer, K.W. and Flynn, P.J. (2009) IEEE Transactions on Information Forensics and Security, 4, 837-849.
https://doi.org/10.1109/TIFS.2009.2033759
[37]  Masek, L. and Kovesi, P. (2003) MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. The University of Western Australia, Crawley.
[38]  Canny, J.F. (1986) IEEE Transactions on Pattern Analysis and Machine Intelligence, 8, 679-697.
https://doi.org/10.1109/TPAMI.1986.4767851
[39]  CASIA-IrisV3-Lamp.
[40]  Burges, C.J.C. (1998) Data Mining and Knowledge Discovery, 2, 121-167.
https://doi.org/10.1023/A:1009715923555
[41]  Hollingsworth, P.K., Bowyer, K.W. and Flynn, P.J. (2009) IEEE Transactions on Pattern Analysis and Machine Intelligence, 31, 964-973.
https://doi.org/10.1109/TPAMI.2008.185
[42]  Narasimhamurthy, A. (2005) IEEE Transactions on Pattern Analysis and Machine Intelligence, 27, 1988-1995.
https://doi.org/10.1109/TPAMI.2005.249
[43]  Monwar, M.M. and Gavrilova, M.L. (2009) IEEE Transaction on system Man and Cybernetics B, 39, 867-878.
https://doi.org/10.1109/TSMCB.2008.2009071
[44]  Sayeed, F., Hanmandlu, M., Ansari, A.Q. and Vasikarla, S. (2011) Iris Recognition Using Segmental Euclidean Distances. 8th International Conference on Information Technology: New Generations, Las Vegas, 11-13 April 2011, 520-525.
https://doi.org/10.1109/ITNG.2011.96
[45]  Wang, Y. and Han, J.-Q. (2005) Iris Recognition Using Independent Component Analysis. Proceedings of the 4th International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August 2005, 18-21.
[46]  Sun, Z., Tan, T. and Qiu, X. (2006) Graph Matching Iris Image Blocks with Local Binary Pattern. International Conference on Biometrics, Hong Kong, 5-7 January 2006, 366-372.
https://doi.org/10.1007/11608288_49
[47]  Seif, A., Zewail, R., Saeb, M. and Hamdy, N. (2003) Iris Identification Based on Log-Gabor Filtering. IEEE 46th Midwest Symposium on Circuits and Systems, Vol. 1, 333-336.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133