摘要:
Image data of an image including an eye is input (S1), and band limitation is performed (S2). Then, a predetermined feature such as moment is extracted from the band-limited image data (S3), and recognition as to whether the eye projected in the image is a counterfeit eye or a living eye is performed based on the extracted feature (S4).
摘要:
Image data of an image including an eye is input (S1), and band limitation is performed (S2). Then, a predetermined feature such as moment is extracted from the band-limited image data (S3), and recognition as to whether the eye projected in the image is a counterfeit eye or a living eye is performed based on the extracted feature (S4).
摘要:
A plurality of images that include the same eye is input (S11) and iris regions are extracted therefrom to obtain iris images (S12). After the plural iris images are subjected to transformation from a rectangular coordinate system to a polar coordinate system (S13) and rotational compensation (S14), the images are added together while a weight is attached to a pixel value in each coordinate of the polar coordinate system, to accumulate them as a single iris image (S15). An iris code is generated from the thus obtained single iris image (S16, S17).
摘要:
A plurality of iris images are acquired (SA0), and aggregation of iris images of which distribution of pupil openings is uniform is acquired from the plurality of iris images by duplication and/or deletion (SA1). Features are generated from the respective iris images that belong to the aggregation (SA2), and a predetermined number of registration features are selected from the features, using authentication performance as an evaluation index.
摘要:
A plurality of iris images are acquired (SA0), and aggregation of iris images of which distribution of pupil openings is uniform is acquired from the plurality of iris images by duplication and/or deletion (SA1). Features are generated from the respective iris images that belong to the aggregation (SA2), and a predetermined number of registration features are selected from the features, using authentication performance as an evaluation index.
摘要:
A plurality of images that include the same eye is input (S11) and iris regions are extracted therefrom to obtain iris images (S12). After the plural iris images are subjected to transformation from a rectangular coordinate system to a polar coordinate system (S13) and rotational compensation (S14), the images are added together while a weight is attached to a pixel value in each coordinate of the polar coordinate system, to accumulate them as a single iris image (S15). An iris code is generated from the thus obtained single iris image (S16, S17).
摘要:
A plurality of iris images are acquired (SA0), and aggregation of iris images of which distribution of pupil openings is uniform is acquired from the plurality of iris images by duplication and/or deletion (SA1). Features are generated from the respective iris images that belong to the aggregation (SA2), and a predetermined number of registration features are selected from the features, using authentication performance as an evaluation index.
摘要:
A plurality of iris codes are registered for each registrant in an iris database (12) together with pupil diameter-iris diameter ratio R. At the time of authentication, an iris code is obtained from a captured iris image by feature extraction while pupil diameter-iris diameter ratio R is obtained. Ratio R obtained at the time of registration and ratio R obtained at the time of authentication are compared to specify an appropriate iris code from the iris database (12) as an item to be collated before authentication.
摘要:
A plurality of iris images are acquired (SA0), and aggregation of iris images of which distribution of pupil openings is uniform is acquired from the plurality of iris images by duplication and/or deletion (SA1). Features are generated from the respective iris images that belong to the aggregation (SA2), and a predetermined number of registration features are selected from the features, using authentication performance as an evaluation index.
摘要:
In iris authentication, iris regions are extracted from a plurality of images (2a, 2b). The extracted iris regions are subjected to polar coordinate transformation (3a, 3b) and band limitation (4a, 4b). Thereafter, an iris code is generated from the coordinate-transformed, band-limited iris regions (5a, 5b). The iris code is subjected to rotational compensation (6a, 6b). A plurality of resultant iris codes are synthesized into a single iris code by determining the bit value of each bit based on a majority rule (7a, 7b).