By Topic

Biometric personal identification based on iris pattern recognition using Wavelet Packet Transform

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
S. Hariprasath ; Saranathan College of Engineering Venkateswara Nagar, Panchapur, Trichy ; V. Mohan

A new iris recognition system based on Wavelet Packet Analysis and Morlet wavelet is described. Morlet wavelet calculations are easy compared to Gabor wavelets. Moreover Gabor wavelet based iris recognition system is patented which blocks its further development. The most unique phenotypic feature visible in a person's face is the detailed texture of each eye's iris. The visible texture of a person's iris is encoded into a compact sequence of 2-D Morlet wavelet coefficients, which generate an “iris code” of 4096-bits. Two different iris codes are compared using exclusively OR comparisons. In this paper, we propose a novel multi-resolution approach based on Wavelet Packet Transform (WPT) for iris texture analysis and recognition. The development of this approach is motivated by the observation that dominant frequencies of iris texture are located in the low and middle frequency channels. With an adaptive threshold, WPT sub images coefficients are quantized into 1, 0 or -1 as iris signature. This signature presents the local information of different irises. The signature of the new iris pattern is compared against the stored pattern after computing the signature of new iris pattern and identification is performed.

Published in:

Computing Communication and Networking Technologies (ICCCNT), 2010 International Conference on

Date of Conference:

29-31 July 2010