Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method using iris feature point position information

An authentication method and technology of location information, which are applied in the field of authentication using the location information of iris feature points, and can solve problems such as authentication failure, prolonged calculation time, and distortion of orbital sequence.

Active Publication Date: 2020-06-09
金虎林
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above-mentioned traditional iris recognition method has the following disadvantages. When an error occurs in the detection of the center of the pupil, the order of the track (Track) and the sector (sector) is distorted. For the feature vector, the zero-crossing point of the 1-dimensional iris image is used for image rotation or An error occurs during the extraction of the iris field, which is prone to authentication failure
In addition, the authentication performance will be significantly reduced when the iris area is small or the image resolution is low.
Calculation time will be significantly increased when moving orbits and sectors for authentication
In addition, it is easy to cause the probability of authentication failure to be significantly increased due to eyelids covering the iris or eyelashes image being added to the iris image to generate noise, so the inconvenience of the user's eyes widening during login or authentication will occur.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method using iris feature point position information
  • Authentication method using iris feature point position information
  • Authentication method using iris feature point position information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] The invention discloses an authentication method utilizing iris feature point position information, the authentication method comprising:

[0059] [Step S1] feature point classification step;

[0060] Classify the feature points on the fishbone pattern of the iris, and calculate the distance between each feature point and the pupil among the feature points extracted from the same fishbone pattern of the iris; Set it as the external end point, set the closer distance as the internal end point, and set the feature point between the external end point and the internal end point as the intersection point;

[0061] Set the internal end point as S, the external end point as E, the intersection point as M, and each set of iris feature points is represented as a set S of internal end points i (X i ,Y i ), the set E of external endpoints j (X j ,Y j ), the set M of intersection points k (N k ,X k ,Y k ); the relevant feature point information uses the internal end poin...

Embodiment 2

[0080] The black part in the middle of the image in Diagram 1 is the pupil, and the rest is the iris image where the fishbone pattern can be seen.

[0081] Diagram 2 is a part extracted from the iris image of Diagram 1, and image processing for thinning lines has been performed on it. The characteristic points of the herringbone pattern can be found in the thinned image.

[0082] Diagram 3 is a part of the herringbone pattern of the thinned iris in Fig. 2, and each herringbone pattern marks a schematic diagram of feature points. The method for classifying iris feature points and authenticating users through location information introduced in this invention is to calculate the distance from the pupils from the feature points extracted in the same fishbone pattern of the iris, and use the farther external end point (300-309) , the closer internal endpoint (310-316), and the intersection point (320-322) between the external endpoint and the internal endpoint for classification. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method using iris feature point position information, which is divided into internal end points, external end points, and intersecting feature points between connected internal end points and external end points from the distance of the pupils. Points are classified and authenticated by location information. The authentication method using the location information of iris feature points proposed by the invention can improve authentication efficiency and accuracy. The present invention extracts feature points from the iris image, and calculates through position information and feature point classification information, so the calculation speed is faster than iris codes or feature vectors, and even if the iris image is partially blocked by eyelids or noise is added by eyelashes, it can also be processed by the user. Authentication, so the user's convenience is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of electronic information and relates to an authentication method, in particular to an authentication method using iris feature point position information. Background technique [0002] The general method of user authentication through iris is to convert the iris image of the Cartesian coordinate system extracted by the camera into polar coordinates centered on the pupil, and then use Gabor filtering to generate a 256Byte iris code from the 512-pixel iris image, or use the Wavelet conversion method to generate The eigenvectors are saved. During user authentication, extract the iris code from the newly acquired iris image and calculate the Hamming Distance (Hamming Distance) with the saved iris code, and perform user authentication through similarity. The similarity between eigenvectors is also obtained by calculating the Hamming distance. [0003] The above-mentioned traditional iris recognition method has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/00
CPCG06V40/197
Inventor 金虎林
Owner 金虎林