Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Technical Computer Science

Design and Implementation of Iris Pattern Recognition Based on Wireless Network Systems

Title: Design and Implementation of Iris Pattern Recognition Based on Wireless Network Systems

Master's Thesis , 2016 , 103 Pages , Grade: 81

Autor:in: Thura Ali Khalaf (Author)

Computer Science - Technical Computer Science
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

The goal of this thesis is to propose a fast and accurate iris pattern recognition system based on wireless network system. This thesis presents three parts; in the first part, Libor Masek algorithm is enhanced to achieve higher recognition rate. Another method of iris pattern recognition is proposed which named genetic algorithm. The two used iris pattern recognition methods are compared according to their accuracy and execution time.

When testing persons of the Chinese Academy of Sciences Institute of Automation (CASIA) database, both methods achieved 100% recognition rates because there is at least one image sample for each person, which is correct matched and there is no person that is false matched. But when testing image samples per persons of CASIA database, the genetic algorithm achieved higher recognition rates and lower error rates than Libor Masek algorithm. It has been found, that the recognition time of genetic algorithm is less than Masek algorithm.

The second part presents an iris image compression/decompression by using Principal Component Analysis (PCA) for compression process and Inverse Principal Component Analysis (IPCA) for decompression process. It has been proven that PCA is the most suitable method for compressing iris images because of its ability to reduce their size while maintaining the good quality of the reconstructed images.

Reconstructed images using IPCA have low compression ratios (CRs) and high Peak to Signal Ratios (PSNRs), which leads to good quality. For more security, a multi-stage image compression is performed in order to protect network’s transmitted data from hackers because hackers cannot guess how much the image has been compressed.

The third part, includes wireless network system consisting of one central Personal Computer (PC) and four Personal Computers (PCs) that communicate with each other through router device. The central PC takes the responsibility of monitoring and controlling the PCs of the whole network. All network PCs communicate with each other by using Transmission Control Protocol /Internet Protocol (TCP/IP) protocol suite that use client-server sockets to transfer images between PCs on the network.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Abstract
  • Table of Contents
  • List of Abbreviations
  • List of Symbols
  • List of Figures
  • List of Tabels
  • Chapter One: Introduction
    • General Introduction
    • Literature Survey
    • Aim of the Work
    • Thesis Layout
  • Chapter Two: Theoretical Background
    • Introduction
    • Biometrics and Human Iris
    • Iris Recognition System
      • Capturing Sample
      • Iris Segmentation
      • Iris Normalization
      • Feature Encoding
Excerpt out of 103 pages  - scroll top

Details

Title
Design and Implementation of Iris Pattern Recognition Based on Wireless Network Systems
Grade
81
Author
Thura Ali Khalaf (Author)
Publication Year
2016
Pages
103
Catalog Number
V470009
ISBN (eBook)
9783668951884
ISBN (Book)
9783668951891
Language
English
Tags
design implementation iris pattern recognition based wireless network systems
Product Safety
GRIN Publishing GmbH
Quote paper
Thura Ali Khalaf (Author), 2016, Design and Implementation of Iris Pattern Recognition Based on Wireless Network Systems, Munich, GRIN Verlag, https://www.grin.com/document/470009
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  103  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint