Literature Survey

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

CHAPTER 2

LITERATURE SURVEY

2.1 INTRODUCTION

Most traditional methods of security require a person to possess some type of physical
possession, such as a key, or to know certain information, such as a password. These
techniques are not as secure as organizations may desire. In recent years, the increasing
capabilities of computers have allowed more sophisticated and intelligent personal
identification methods. Biometric techniques, which use uniquely identifiable physical or
behavioural characteristics to identify individuals, are one such method. Commonly used
biometric features are the face, fingerprints, voice, DNA, retina, and the iris. Iris recognition
is thought to be one of the most reliable methods of biometric identification. It involves using
photographs of a person’s eye to determine the identity of the individual. The iris contains
unique features, such as stripes, freckles, coronas, etc. [4], collectively referred to as the
texture of the iris. This texture is analyzed and compared to a database of images to obtain a
match. The probability of a false match is close to zero, which makes iris recognition a very
reliable method of personal identification.

In segmentation, it is desired to distinguish the iris texture from the rest of the image.
An iris is normally segmented by detecting its inner (pupil) and outer (limbus) boundaries.
Well-known methods such as the Integro differential, Hough transform and active contour
models have been successful techniques in detecting the boundaries. In the following, these
methods are described and some of their weaknesses are pointed out.

2.2 EXISTING SYSTEM

Edge detector which returns a one pixel thick m-connected binary boundary image.
this is followed by our chain encoding method to detect corners on the extracted edges. the
algorithm works on all types of images (i.e. binary, gray level and color images).
2.3 DISADVANTAGES OF EXISTING SYSTEM

Edges and corners are regions of interest where there is a sudden change in intensity.
These features play an important role in object identification methods used in machine vision
and image processing systems.

2.4 PROPOSED SYSTEM

A comparative study of different edge detection techniques like Sobel, Canny,


Prewitt, Roberts with the proposed technique is presented. The new technique gives better
results in terms of smoothness, sharpness with the execution time much faster than the
conventional edge detection techniques.
The new technique gives better results in terms of smoothness, sharpness with the
execution time much faster than the conventional edge detection techniques.

You might also like