虹膜识别外文翻译文献

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

虹膜识别外文翻译文献
虹膜识别外文翻译文献
(文档含中英文对照即英文原文和中文翻译)
外文:
The first chapter
1.1 The research background of iris recognition
Biometrics is a technology for personal identification using physiological characteristics and behavior characteristics inherent in the human body. Can be used for the biological characteristics of biological recognition, fingerprint, hand type face, iris, retina, pulse, ear etc.. Behavior has the following characteristics: signature, voice, gait, etc.. Based on these characteristics, it has been the development of hand shape recognition, fingerprint recognition, facial recognition, iris recognition, signature recognition and other biometric technology, many techniques have been formed and mature to application of.
Biological recognition technology in a , has a long history, the ancient Egyptians through identification of each part of the body size measure to carry out identity may be the earliest human based on the earliest history of biometrics. But the modern biological recognition technology began in twentieth Century 70 time metaphase, as biometric devices early is relatively expensive, so only a higher security level atomic test, production base.due to declining cost of microprocessor and various electronic components, precision gradually improve, control device of a biological recognition technology has been gradually applied to commerce authorized, such as access control, attendance management, management system, safety certification field etc..
All biometric technology, iris recognition is currently used as a convenient and accurate.
Making twenty-first Century is information technology, network technology of the century, is also the human get rid of traditional technology, more and more freedom of the century. In the information, free for the characteristics of the century, biometric authentication technology, high-tech as the end of the twentieth Century began to flourish, will play a more and more important role in social life, fundamentally change the human way of life . Characteristics of the iris, fingerprint, DNA the body itself, will gradually existing password, key, become people lifestyle, instead of at the same time, personal data to ensure maximum safety, maximize the prevention of various types of crime, economic crime.
Iris recognition technology, because of its unique in terms of acquisition, accuracy and other advantages, will become the mainstream of biometric authentication technology in the future society. Application of safety control, the customs import and export inspection, e-commerce and other fields in the future, is also inevitable in iris recognition technology as the focus. This trend, now in various applications around the world began to appear in the.
1.2 Objective and significance of iris recognition
Iris recognition technology rising in recent years, because of its strong advantages and potential commercial value, driven by some international companies and institutions have invested a lot of manpower, financial resources and energy research. The concept of automatic iris identification is first proposed by Frown, then Daugman for the first time in the algorithm becomes feasible.
The iris is a colored ring in the pupil in the eye of fabric shape, each iris contains a structure like the one and only based on the crown, crystalline, filaments, spots, structure, concave point, ray, wrinkles and fringe characteristic. The iris is different from the retina, retinal is located in the fundus, difficult to image, iris can be seen directly, biometric identification technology can obtain the image of iris fine with camera equipment based on the following basis: Iris fibrous tissue details is rich and complicated, and the formation and embryonic tissue of iris details the occurrence stage of the environment, have great random the. The inherent characteristics of iris tissue is differ from man to man, even identical twins, there is no real possibility of characteristics of the same.
When the iris are fully developed, he changes in people's life and tiny. In the iris outer, with a layer of transparent corneal it is separated from the outside world. So mature iris less susceptible to external damage and change.
These characteristics of the iris has the advantages, the iris image acquisition, the human eye is not in direct contact with CCD, CMOS and other light sensor, uses a non technology acquisition invasion. So, as an important biometric identity verification system, iris recognition by virtue of the iris texture information, stability, uniqueness and non aggressive, more and more attention from both academic and industrial circles.
1.3 Status and application of domestic and foreign research on iris recognition
IDC (International Data Group) statistics show that: by the end of 2003, the global iris recognition technology and related products market capacity will reach the level of $2000000000. Predicted conserved survey China biometric authentication center: in the next 5 years, only in the Chinese, iris recognition in the market amounted to 4000000000 rmb. With the expansion of application of the iris recognition technology, and the application in the electronic commerce domain, this number will expand to hundreds of billions.
The development of iris recognition can be traced back to nineteenth Century 80's.. In 1885, ALPHONSE BERTILLON will use the criminal prison thoughts of the application of biometrics individual in Paris, including biological characteristics for use at the time: the size of the ears, feet in length, iris.
In 1987, ARAN SAFIR and LEONARD FLOM Department of Ophthalmology experts first proposed the concept, the use of automatic iris recognition iris image in 1991, USA Los ala Moss National Laboratory JOHNSON realized an automatic iris recognition system.
In 1993, JOHN DAUGMAN to achieve a high performance automatic iris recognition system.
In 1997, the first patent Chinese iris recognition is approved, the applicant, Wang Jiesheng.
In 2005, the Chinese Academy of Sciences Institute of automation, National Laboratory of pattern recognition, because of outstanding achievement "in recognition of" iris image acquisition and aspects, won the two "National Technology Invention Prize", the highest level represents the development of iris recognition technology in china.
In 2007 November, "requirements for information security technology in iris recognition system" (GB/T20979-2007) national standards promulgated and implemented, the drafting unit: Beijing arithen Information Technology Co., ltd..
Application of safety control, the customs import and export inspection, e-commerce and other fields in the future, is also inevitable in iris recognition technology as the focus. This trend, now in various applications around the world began to appear in the. In foreign countries, iris recognition products have been applied in a wide range.
In February 8, 2002, the British Heathrow Airport began to test an advanced security system, the new system can scan the passenger's eyes, instead of to check passports. It is reported, the pilot scheme for a period of five months, a British Airways and virgin Airlines passengers can participate in this test. The International Air Transport Association interested in the results of this study are, they encourage the Heathrow Airport to test, through the iris boarding passengers to determine its identity as a boarding pass.
Iris recognition system America "Iriscan" developed has been applied in the three business department of Union Bank of American Texas within. Depositors to be left with nothing whatsoever to banking, no bank card password, no more memories trouble. They get money from the A TM, a camera first eye of the user to scan, and then scan the image into digital information and data check, check the user's identity.
America Plumsted school in New Jersey has been in the campus installed device of iris recognition for security control of any school, students and staff are no longer use cards and certificates of any kind, as long as they passed in the iris camera before, their location, identity is system identification, all foreign workers must be iris data logging to enter the campus. At the
same time, through the central login and access control system to carry on the control to enter the scope of activities. After the installation of the system, various campus in violation of rules and infringement, criminal activity is greatly reduced, greatly reducing the campus management difficulty.
In Afghanistan, the United Nations (UN) and the United Nations USA federal agency refugee agency (UNHCR) using iris recognition system identification of refugees, to prevent the same refugee multiple receive relief goods. Use the same system in refugee camps in Pakistan and Afghanistan. A total of more than 2000000 refugees use iris recognition system, this system to a key role for the United Nations for distribution of humanitarian aid from.
In March 18, 2003, Abu Zabi (one of the Arabia and the United Arab Emirates) announced the iris recognition technology for expelled foreigners iris tracking and control system based on the borders opened the world's first set of national level, this system began construction from 2001, its purpose is to prevent all expelled by Abu Zabi tourists and other personnel to enter the Abu Zabi. Without this system in the past, due to the unique characteristics of the surface of the Arabs (Hu Xuduo), and the number of the expulsion of the numerous, customs inspection staff is very difficult to distinguish between what is a deported person. By using this system, illegal immigration, all be avoided, the maximum guarantee of national security.
Kennedy International Airport in New Jersey state (John F. Kennedy International Airport) of the iris recognition system installed on its international flights fourth boarding port, 300 of all 1300 employees have already started to use the system login control. By using this system, all can enter to the apron personnel must be after the system safety certification of personnel. Unauthorized want to break through, the system will automatically take emergency measures to try to force through personnel closed in the guard space. Using this system, the safety grade Kennedy International Airport rose from B+ to A+ grade. The Kennedy International Airport to travel to other parts of the passengers has increased by 18.7%.
Generally speaking, the iris recognition technology has already begun in all walks of life in various forms of application in the world. At the same time, to the application of their units of all had seen and what sorts of social benefits and economic benefits are not see. This trend is to enhance the high speed, the next 10 years will be gradually achieve the comprehensive application of iris recognition in each industry.
In China, due to the Chinese embargo and iris technology itself and the difficulty in domestic cannot develop products. So far, there has not been a real application of iris recognition system. However, many domestic units are expressed using strong intention, especially the "9 · 11" later, security anti terrorism consciousness has become the most concerned problems in the field of aviation, finance. Iris recognition system is a major airline companies, major financial institutions and other security mechanisms (such as aerospace bureau) become the focus of attention of object and other key national security agency. As with the trend of development in the world, iris recognition technology will in the near future in application China set off climax.
The second chapter of introduction of iris recognition technology
2.1 Technology of biological feature recognition based on
2.1.1 Present status and development of biological feature recognition
“9.11" event is an important turning point in the development of biometric identif ication technology in the world, the importance of it makes governments more clearly aware of the biological recognition technology. Traditional identity recognition technologies in the face of
defect anti terrorism has shown, the government began a large-scale investment in the research and application of biometric technology. At the same time, the public understanding of biological recognition technology with "9.11" exposure rate and greatly improve the.
The traditional method of individual identification is the identity of the people with knowledge, identity objects recognition. The so-called identity: knowledge refers to the knowledge and memory system of personal identification, cannot be stolen, and the system is easy to install, but once the identification knowledge stolen or forgotten, the identity of easily being fake or replaced, this method at present in a wide range of applications. For example: the user name and password. The so-called identity items: refers to the person, master items. Although it is stable and reliable, but mainly depend on the outer body, lost or stolen identification items once proof of identity, the identity of easily being fake or replaced, for example: keys, certificates, magnetic card, IC card etc..
Biometric identification technology is related to physical characteristics, someone using prior record of behavior, to confirm whether the facts. Biometric identification technology can be widely used in all fields of society. For example: a customer came into the bank, he did not take bank card, also did not remember the password directly drawing, when he was drawing in the drawing machine, a camera to scan on his eyes, and then quickly and accurately complete the user identification and deal with business. This is the application of the iris recognition system of modern biological identification technology. "".
America "9.11" after the incident, the anti terrorist activity has become the consensus of governments, it is very important to strengthen the security and defense security at the airport, some airports USA can in the crowd out a face, whether he Is it right? Wanted. This is the application of modern technology in biological feature recognition "facial recognition technology".
Compared with the traditional means of identity recognition, biometric identity recognition technology in general has the following advantages:
(1) the security performance is good, not easy to counterfeit or stolen.
(2) carry, whenever and wherever possible, therefore more safety and security and other identification method.
For the biological information of biometric recognition, its basic nature must meet the following three conditions: universality, uniqueness and permanency.
The so-called universality, refers to any individual has the. Uniqueness, is in addition to other than himself, other people did not have any, namely different. The so-called permanent, refers to the character does not change over time, namely, life-long.
Feature selection of organisms with more than three properties, is the first step of biological recognition.
In addition, there are two important indexes in biological recognition technology. The rejection rate and recognition rate. Adjusting the relation of these two values is very important. The reject rate, the so-called false rejection, this value is high, use frequency is low, the error recognition, its value is high, safety is relatively reduced. So in the biological identification of any adjustment, the two index is a can not abandon the process. The choice of range size, related to the biological identification is feasible and available .
And technology of identity recognition based on iris feature now appears, it is the development of biometric identification technology quickly, due to its uniqueness, stability,
convenience and reliability, so the formation of biometric identification technology has the prospects for development.
Generally speaking, the biological recognition system consists of 4 steps. The first step, the image acquisition system of collecting biometric image; the second step, the biological characteristics of image preprocessing (location, normalization, image enhancement and so on); the third step, feature information extraction, converted into digital code; the fourth step, the generation of test code and database template code to compare, make identification。

2.1.2 Currently several large biological feature recognition technology
(1)the fingerprint recognition technology
Fingerprint identification technology originally used in criminal field, after the twentieth Century, fingerprint recognition technology has been accepted by the whole world. At present, around the world have established the fingerprint automatic recognition system of fingerprint database and crime. The criminal investigation understanding opportunity now, fingerprint identification technology has been applied in facilities management requires a high degree of security, as the most traditional, biological feature recognition method is the most mature.
Fingerprint identification is the fingerprint of the rugged finger end positive skin texture. Each fingerprint texture in the pattern, the breakpoint and cross point on each are not identical, is the only, and the same for life. Fingerprint can be broadly divided into two categories: the general features and local features. Overall features can be directly observed with the naked eye grain pattern: ring (loop), arch type (arch), spiral type (whorl), namely we commonly known as the bucket, dustpan, double skip. But those basic pattern classification and recognition is still far from enough. In practical applications, often someone fingerprint extraction nodes (often appear in the interrupt, fingerprint ridge bifurcation or turning) the local feature information, identity authentication. Information features of fingerprint minutiae of up to more than 150, but some details are extremely rare, there are 7 types of nodes: common endpoint (a line end here), bifurcation point (a stripe on the split into two or more lines), bifurcation points (from two parallel lines on this), isolated point (a special short lines, so that it has become a point (a), ring lines split into two, immediately merged into one, a loop formed), short lines (the shorter end but does not become a bit lines). One of the most typical and the most commonly used is the endpoint and bifurcation points, in the automatic fingerprint identification technology, generally only to detect the number of these two types of nodes, and combined with the curvature position, direction and regional lines node, get fingerprint feature only. The quality of fingerprint recognition accuracy and the input fingerprint image has a very important relationship. Due to noise, uneven contact and other reasons, may lead to fingerprint image acquisition has many distortion, deformation. In the analysis of fingerprint, feature a lot of suspicious will produce, flooded the real feature point, so the smoothing, filtering, binarization, thinning, two image processing methods to improve the grain clarity, and delete a lot of noise damage area. Fingerprint image enhancement generally use the following link, normalizing, orientation image estimation, frequency estimation, template, filter.
Fingerprint identification has universality, uniqueness, permanence and high security advantages, the development of the technology to the mature period, the false rejection rate and false acceptance rate of compliance, even on the part of the incomplete fingerprint can also be identified, it is insufficient, because the fingerprint recognition technology originally used in the
field of crime investigation, some people are afraid of "the fingerprint record". In addition, the biological feature identification, the most fundamental is the counterfeiting problem, such as the left finger mark user fingerprint, and these finger mark is used to copy the fingerprint can.
(2)Face recognition technology
Facial recognition technology analyzes face images with computer, extracts effective recognition information from, a technique used to "identify" the identity. Facial recognition technology that is caused by the strong interest to researchers in the early 60's of the twentieth Century, some prior knowledge but early face recognition requires people. Entered in twentieth Century after 90 years, high performance computer, face recognition method is a major breakthrough, to enter the real machine automatic recognition stage.
Compared with fingerprint recognition, iris recognition, face recognition is more direct and friendly, has a broad application prospect in the identification, file management, video retrieval etc.. Now, domestic and foreign had the automatic face recognition system of the product, such as a German company developed Siemens "and visual access control system (FaceV ACS)", for the security access control system, the recognition rate is close to 100%. However, the accuracy of face recognition is easily affected by illumination, pose, expression, occlusion, age and other factors.
Engineering facial recognition technology American DoD has shown that: the image collection and recognition in the constraint conditions of rate can reach more than 95%, but in the non restraint environment, the recognition rate dropped sharply. Therefore, we from the constraint and non restraint environment two approaches to the study of face recognition.
Face recognition in constrained environments, generally focused on 2D facial image recognition still. The main research direction of research methods based on the whole and the research method based on feature analysis.
The overall research approach based on considering the overall attribute of the model, it not only preserves the topology relation between face components, but also retain the component itself, including the commonly used methods: eigenface method, SVD decomposition method, matching method, elastic graph matching method, a hidden Markov model method and neural network analysis of face density contour analysis.
Method based on feature analysis is presented through the local contour information and gray level information, relative ratios of the facial reference point and other face facial feature shape eraser book or category parameters together constitute the feature vector. Based on the feature vectors such as eyes, mouth and other parts and the extraction of.
Facial recognition of unconstrained environment, pose and illumination variations is the main factor affecting recognition. Usually use some special methods to improve the robustness of system identification. Such as the deformation model method, multi angle method, 3D model method, image care method. Among them, 3D face recognition and attention, the 3D face reconstruction, head tracking, three face recognition, facial expression analysis and synthesis of 4 levels. At present, face three face recognition algorithm problem is image data are difficult to obtain, the problem is too large, the mass storage data modeling time.
(3) recognition of hand shape
America aviation brigade Bureau of air pilots at the start of the aircraft, precision instrument to measure the hand shaped pocket by palm feature (finger length, width and thickness of the palm)
recognition is the pilot in the operation, it as a biological feature recognition technology is developing, because must wear the instrument in the hands of large size only use, America, participating enterprises less, the price is higher, all these problems need to be further studied. (4) the voice recognition technology
Speaker recognition is the difference between personal voice to automatically determine whether the person is. Each sound is influenced by their physical, dialect, environment. The advantage of voiceprint recognition without prior registration, with small psychological recognition, and the device is simple, general computer can deal with weak voice; for easy collection, can be used for public communication line monitoring by the state security department's attention. The shortage is the change of tone or ambient noise is changing the sound may, rejection rate, error rate is high.
(5)handwriting recognition technology
Handwriting recognition is one of the personal identification technology. Handwriting itself only static information, to be the same as when it is necessary to consider the static information, also want to consider the order of strokes, pen pressure dynamic information. People in writing may not be exactly the same behavior, it is influenced by physiological, psychological and other factors, there are corresponding points, there are also differences. Therefore, samples and materials can not be 100% identical, there is also the possibility to identify. Handwriting recognition compared with other methods, the users' psychological resistance of small, high successful rate, low price; combining with other handwriting recognition with the existing financial system and to some extent also the attention. But the recognition accuracy is affected by handwriting influence, it is very difficult to automatically identify essential differences and non essential differences.
2.2 Iris recognition technology based on the brief introduction
Biometric identification inevitable rejection and error identification problem. Therefore, in order to improve the matching accuracy, to provide supplementary scheme on many occasions, in order to prevent this from happening, but many professional believes that this issue is not important, compared with the traditional methods, biological feature recognition technology is more safe and reliable.
Some biological feature recognition technology generally need to better signal acquisition device and the computing platform, although some years their prices have declined significantly, but they are still more expensive than traditional means, of course, such expensive also no return, it brings more security.
So far, there is not a single biometric technology can meet the requirements of be the pink of perfection. According to the comparison, based on biometrics we found that, regardless of the accuracy, or from the acquisition and anti fake and permanent, iris recognition and so in own higher advantage in several the identification, iris recognition has become, was studied in most countries and scientific research personnel problems, along with the the development of Computer Science and technology, iris recognition technology has risen to a higher level.
Based on the feature of iris recognition and other image based recognition, there are four main components: and recognition of iris image acquisition, image preprocessing, iris feature extraction, matching.
(1) the acquisition of iris images, the process appears to be very simple, but it is very difficult step. On the one hand because the human eye is a camera, many independent stray light
will want to be in the eyes of the people, so as to be ingested into the iris image; on the other hand, because the iris diameter of only 10 mm, there is a big difference between the different races of iris color. Iris color, white light, texture significantly; and iris yellow people are mostly dark brown, texture is very obvious, in the premise of shielding stray light, using near infrared light source stability, incident angle adjustable light source, in order to obtain 8 grayscale image of high quality.
(2) the iris image preprocessing. Including the localization of the iris image, normalization and enhancement. Iris localization is the removal of acquisition to the eyelids, eyelashes, the whites of the eyes, to find the center and radius of the iris, in order to eliminate the influence of translation, rotation, scaling and other geometric transform for iris recognition, iris image must be to adjust the original to the same size and the corresponding position, because the ring pattern iris feature, decided iris image to the polar coordinate transformation form of the normalized iris image in the collection process, the non-uniform illumination effect to texture analysis results, enhanced generally adopts the method of histogram equalization image, reduce uneven illumination distribution.
(3) and matching method was first proposed by Dr. John Daugman of University of Cambridge to extract iris feature, after many iris recognition technology is the basis to launch, Dr. Daugman Gabor filter is used for iris image coding, an arbitrary iris feature codes and other different iris feature codes to generate uncorrelated this based on characteristics, is a poetic couplet iris feature codes Hamming distance implementation of iris recognition.
With the further development of research and application of iris recognition technology, iris recognition system increasingly high degree of automation, neural network algorithm, the algorithm of fuzzy recognition is gradually applied to the iris recognition.
2.3Summary this chapter
With the rapid development of computer technology and modern science and technology, the biological feature recognition for the technical characteristics of the technology is more accurate, more rapidly, higher security performance aspects of development, this chapter mainly introduces several biometric identification technology based on, such as face recognition, retina identification, note recognition, hand shape recognition technology, focuses on the iris recognition accuracy higher performance, this paper introduces the composition and Research on iris recognition system based on.
Present research status of iris location algorithm
3.1 common location algorithm
Currently has 4 kinds of iris location method of representative: Daugman positioning method, Hough transform method, geometric feature location method and active contour mapping, and point out the advantages and disadvantages of these methods in practical applications.
3.1.1 Hough transform method
Specific process is the first through the edge detection method to get the pupil and iris and iris and sclera edge, the iris is circular, Hough transform is applied to get the radius circle, which divide the iris. Hough transformation goal is to find a transformation from the boundary of the region to the parameter space, with most boundary points satisfy the corresponding parameter to describe the boundary of the region.
Circle positioning Hough transform equation,。

相关文档
最新文档