Wednesday, 10 December 2014

Unraveling the Effect of Textured Contact Lenses on Iris Recognition

Unraveling the Effect of Textured Contact Lenses on Iris Recognition

Abstract:
The experimental results shows that biometric templates, including iris and users attributes, produced by different recognition methods can be matched through the central rays in their convex polyhedral cones and that templates protected by a method extended from Iris-templates can be broken into. These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. In this paper, The presence of a contact lens, particularly a textured cosmetic lens, poses a challenge to iris recognition as it obfuscates the natural iris patterns. Many types and colors of lenses are available from a number of different manufacturers. To analyze the effect of these parameters on iris recognition. The proposed approach outperforms other lens detection algorithms on the two databases and shows improved iris recognition performance. Detection of the presence of a contact lens is the first step to improving the usability and reliability of iris recognition for contact lens wearers. The extraordinary market success of Iris-templates relies heavily on its computational advantages, including extremely high matching speed for large-scale identification and automatic threshold adjustment based on image quality many methods modified from Iris-templates were proposed for iris and user attributes based recognition.


Existing System:

1)      The Biometric Features is basically used to identify the            individuals Face, Fingerprint, Handprint, Voice and etc. If one            tries to identify the people’s image using face, it will take some            serious and tedious parts. Such as the skin may get shrinks as           time goes, so the unique identification gets changed and may           show some false-positive results.
2)                One can take different parts of a face and analyze the presence     of the person.
3)                If we consider the Hand print, it will also be unique for each and every person but even that gets similar between people.           Basically the Hand print is also unable to believe it to be true or           fake.
4)          And finally voice recognition is also said to be one of the           Biometric Feature to recognize the person, but still it also creates the bottle neck problems and couldn’t be able to assured. 
5)          Iris Code Generation technique also has a Error False report.

Disadvantages:
1)    In this approach the iris images will occupy more memory space the in the database.
2)    In early things the eye has to match exactly with the database as if we stored the image. Even a small distraction also will not be allowed.
3)    One can take different parts of a face and analyze the presence of the person.

Proposed system:
1)                Fourier transform to detect periodic fake iris patterns that were prevalent in textured lenses manufactured at that time.
2)                IRIS is one of the most promising biometric modalities, and is in regular use in large-scale applications such as UAE port of entry and India’s UIDAI (Aadhar) projects.
3)                Median filters, which influence the distributions of the bits to identify  the Hamming distance  of phase .
4)                Wearing of contact lenses, both soft contacts and textured “cosmetic" soft contacts, degrades the accuracy of iris recognition.
5)                Our post-processing techniques are Normalization, Segmentation using phase-based , texture analysis methods.
Advantages:
Ø Using this technique, the user will have the unique identification for his personal details.
Ø Two different contact lens iris image datasets have been collected, independently in different countries, using different iris sensors and sampling different brands of contact lenses.
Ø We can have more efficiency and security to the applications and also there will less memory usage while storing in the data base.
Ø Instead of storing the iris image, the iris code is going to store in the database.

Software Requirements:

Platform                                  : JDK 1.5

Program Language                            : JAVA
 IDE                                        : Net beans
Data Base                                   : MySQL
Operating System                              : Microsoft   Windows XP

Hardware Requirements:

Processor                                 : Pentium IV Processor

RAM                                       : 512 MB

Hard Drive                              : 10GB

Monitor                                  : 14” VGA COLOR MONITOR


Project Demo:

Saturday, 6 December 2014

CS2071 computer architecture notes

SYLLABUS


CS2071  -  COMPUTER ARCHITECTURE
UNIT I                        INSTRUCTION SET ARCHITECTURE                                                                    9
Introduction to computer architecture - Review of digital design – Instructions and addressing – procedures and data – assembly language programs – instruction set variations
UNIT II                       ARITHMETIC/LOGIC UNIT                                                                                   9
Number representation – design of adders – design of simple ALUs – design of Multipliers and dividers – design of floating point arithmetic unit
UNIT III                      DATA PATH AND CONTROL                                                                                 9
Instruction execution steps – control unit synthesis – microprogramming – pipelining – pipeline performance
UNIT IV                      MEMORY SYSTEM                                                                                               9
Main Memory concepts – types of memory – cache memory organization – secondary storage –virtual memory – paging
UNIT V                       I/O AND INTERFACES                                                                                          9
I/O devices – I/O programming – polling – interrupts – DMA – buses – links – interfacing – context  switching – threads and multithreading
                                                                                                                                              TOTAL : 45 PERIODSTEXT BOOKS
 1.    1.B. Parhami, “Computer Architecture”, Oxford University Press, 2005.
2.Carl Hamacher, Zvonko Vranesic and Safwat Zaky, “Computer Organization”, Fifth Edition, Tata McGraw Hill, 2002.REFERENCES
1.             1.  David A. Patterson and John L. Hennessy, “Computer Organization and Design: The Hardware/Software interface”, Third Edition, Elsevier, 2004.
2.             2.  William Stallings, “Computer Organization and Architecture – Designing for  Performance”, Seventh Edition, Pearson Education, 2006.
3.               3.Miles Murdocca “Computers Architecture and Organization An Integrated approach”,  Wiley India pvt Ltd, 2007
4.           4.John D. Carpinelli, “Computer systems organization and Architecture”, Pearson Education, 2001.


UNIT 1: DOWNLOAD

UNIT 2: DOWNLOAD

UNIT 3: DOWNLOAD

UNIT 4: DOWNLOAD

UNIT 5: DOWNLOAD