Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program
A code generation and color code technology, applied in the field of personal authentication, can solve the problem of increasing the proportion of cameras and achieve the effect of improving resolution
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 Embodiment approach
[0049] FIG. 1 is a flowchart showing a personal authentication method using iridescent recognition according to the first embodiment of the present invention. In this embodiment, the authenticated person performs iridescent authentication using a mobile phone with an authentication function as shown in FIG. 2 .
[0050] The mobile phone with authentication function shown in Fig. 2 has a camera 11 for photographing iridescent images added to an ordinary mobile phone. In addition to the camera 11, a monitor 13, operation buttons 14, a speaker 15, a microphone 16, an antenna 17, and the like are provided. The monitor 13 displays the iridescent image being photographed and the authentication result.
[0051] FIG. 3 is a diagram showing an internal configuration of the mobile phone with an authentication function shown in FIG. 2 . In FIG. 3 , the camera control unit 22 and the monitor control unit 24 of the authentication unit 21 are connected to the main control unit 27 . The c...
no. 2 Embodiment approach
[0082] Fig. 16 is a flowchart showing a personal authentication method using iridescent recognition according to the second embodiment of the present invention. In this embodiment, for the plurality of iridescent images (S21-S23) that have undergone polar coordinate transformation, Gabor transformation is first performed for band limitation (S24), and then the transformed data, that is, the band-limited image Carry out rotation compensation (S25), accumulate after weighted addition (S26), and generate iridescent code (S27). In FIG. 16 , steps S11 to S23 , S27 , and S28 perform the same processes as those in S11 to S13 , S17 , and S18 in FIG. 1 , respectively. By steps S21-S27, the iridescent code generation method is constituted.
[0083] In step S25, rotation compensation is performed as shown in FIG. 17 on the Gabor transformed data which is a plurality of (N) images obtained in step S24. That is, with one of the N pieces of Gabor transformed data (for example, the first G...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 