Unlock instant, AI-driven research and patent intelligence for your innovation.

Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program

A code generation and color code technology, applied in the field of personal authentication, can solve the problem of increasing the proportion of cameras and achieve the effect of improving resolution

Active Publication Date: 2008-03-12
PANASONIC CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] As a result, although it is the same person, the difference between the iridescent codes at the time of registration and at the time of authentication will be very large. When the difference exceeds a predetermined threshold, it will cause the so-called "rejection of the person" (FR: False Rejection, that is: false rejection) phenomenon
In other words, there is a problem that the ratio of personal rejections increases due to the performance of the camera

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program
  • Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program
  • Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment approach

[0049] FIG. 1 is a flowchart showing a personal authentication method using iridescent recognition according to the first embodiment of the present invention. In this embodiment, the authenticated person performs iridescent authentication using a mobile phone with an authentication function as shown in FIG. 2 .

[0050] The mobile phone with authentication function shown in Fig. 2 has a camera 11 for photographing iridescent images added to an ordinary mobile phone. In addition to the camera 11, a monitor 13, operation buttons 14, a speaker 15, a microphone 16, an antenna 17, and the like are provided. The monitor 13 displays the iridescent image being photographed and the authentication result.

[0051] FIG. 3 is a diagram showing an internal configuration of the mobile phone with an authentication function shown in FIG. 2 . In FIG. 3 , the camera control unit 22 and the monitor control unit 24 of the authentication unit 21 are connected to the main control unit 27 . The c...

no. 2 Embodiment approach

[0082] Fig. 16 is a flowchart showing a personal authentication method using iridescent recognition according to the second embodiment of the present invention. In this embodiment, for the plurality of iridescent images (S21-S23) that have undergone polar coordinate transformation, Gabor transformation is first performed for band limitation (S24), and then the transformed data, that is, the band-limited image Carry out rotation compensation (S25), accumulate after weighted addition (S26), and generate iridescent code (S27). In FIG. 16 , steps S11 to S23 , S27 , and S28 perform the same processes as those in S11 to S13 , S17 , and S18 in FIG. 1 , respectively. By steps S21-S27, the iridescent code generation method is constituted.

[0083] In step S25, rotation compensation is performed as shown in FIG. 17 on the Gabor transformed data which is a plurality of (N) images obtained in step S24. That is, with one of the N pieces of Gabor transformed data (for example, the first G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An iris image is obtained by inputting a plurality of images captured by imaging the same eye (S11) and cutting out an iris area (S12). Moreover, a single iris image is obtained (S15) by transforming the coordinate system of the iris images from the rectangular coordinate system to the polar coordinate system (S13), applying rotation compensation (S14), and adding the pixel values while weighting the pixel values for each polar coordinate. An iris code is generated from the obtained single iris image (S16 and S17).

Description

technical field [0001] The present invention relates to the technique of personal authentication using iridescent information, one of living body information. Background technique [0002] As a method of personal authentication, there are currently various proposals using living body (biometrics) information such as iridescence, fingerprints, and faces. Among them, in recent years, personal authentication technology using iridescent images has begun to be used in entry and exit management of important departments, ATM (Automated Teller Machine) in banks, etc., and PC entry. [0003] As a method of personal authentication using an iridescent image, for example, there is content described in Patent Document 1. In Patent Document 1, an iridescent code is generated according to the following procedure. [0004] 1) Obtain an iridescent image [0005] 2) Based on the obtained iridescent image, detect the outer edge of the pupil (the junction between the iridescence of the pupil)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T7/00G06F21/32
CPCG06K9/00597G06K9/0061G06V40/193G06V40/18
Inventor 吾妻健夫近藤坚司若森正浩
Owner PANASONIC CORP