Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program

A code generation and color code technology, applied in the field of personal authentication, can solve the problem of increasing the proportion of cameras, and achieve the effect of improving resolution

Active Publication Date: 2006-08-16
PANASONIC CORP
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] As a result, although it is the same person, the difference between the iridescent codes at the time of registration and at the time of authentication will be very large. When the difference exceeds a predetermined threshold, it will cause the so-called "rejection of the person" (FR: False Rejection, that is: false rejection) phenomenon
In other words, there is a problem that the ratio of personal rejections increases due to the performance of the camera

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program
  • Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program
  • Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment approach

[0049] figure 1 It is a flowchart showing a personal authentication method using iridescent recognition according to the first embodiment of the present invention. In this embodiment, the authenticatee uses figure 2 The kind of mobile phone with authentication function performs iridescent authentication.

[0050] figure 2 A mobile phone with an authentication function is equipped with a camera 11 for iridescent image photography on an ordinary mobile phone. In addition to the camera 11, a monitor 13, operation buttons 14, a speaker 15, a microphone 16, an antenna 17, and the like are provided. The monitor 13 displays the iridescent image being photographed and the authentication result.

[0051] image 3 yes means figure 2 A diagram of the internal structure of a mobile phone with authentication function. exist image 3 Among them, the camera control unit 22 and the monitor control unit 24 of the authentication unit 21 are connected to the main control unit 27 . Th...

no. 2 Embodiment approach

[0083] Figure 16 It is a flowchart showing a personal authentication method using iridescent recognition according to the second embodiment of the present invention. In this embodiment, for the plurality of iridescent images (S21-S23) that have undergone polar coordinate transformation, Gabor transformation is first performed for band limitation (S24), and then the transformed data, that is, the band-limited image Carry out rotation compensation (S25), accumulate after weighted addition (S26), and generate iridescent code (S27). exist Figure 16 In, steps S11~S23, S27, S28, respectively carry out and figure 1 S11 to S13, S17, and S18 are processed in the same manner. By steps S21-S27, the iridescent code generation method is constituted.

[0084] In step S25, to the Gabor transformation data of many (N) images obtained in step S24, such as Figure 17 Rotation compensation is performed as shown. That is, with one of the N pieces of Gabor transformed data (for example, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An iris image is obtained by inputting a plurality of images captured by imaging the same eye (S11) and cutting out an iris area (S12). Moreover, a single iris image is obtained (S15) by transforming the coordinate system of the iris images from the rectangular coordinate system to the polar coordinate system (S13), applying rotation compensation (S14), and adding the pixel values while weighting the pixel values for each polar coordinate. An iris code is generated from the obtained single iris image (S16 and S17).

Description

technical field [0001] The present invention relates to the technique of personal authentication using iridescent information, one of living body information. Background technique [0002] As a method of personal authentication, there are currently various proposals using living body (biometrics) information such as iridescence, fingerprints, and faces. Among them, in recent years, personal authentication technology using iridescent images has begun to be used in entry and exit management of important departments, ATM (Automated Teller Machine) in banks, etc., and PC entry. [0003] As a method of personal authentication using an iridescent image, for example, there is content described in Patent Document 1. In Patent Document 1, an iridescent code is generated according to the following procedure. [0004] 1) Get an iridescent image [0005] 2) Based on the obtained iridescent image, detect the outer edge of the pupil (the junction between the iridescence of the pupil) an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T7/00G06F21/32
CPCG06K9/00597G06K9/0061G06V40/193G06V40/18
Inventor 吾妻健夫近藤坚司若森正浩
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products