AI Approach for Iris Biometric Recognition Using a Median Filter

Mar 2


Nidhi Dutt

Nidhi Dutt

  • Share this article on Facebook
  • Share this article on Twitter
  • Share this article on Linkedin

Privacy and Security being a major concern nowadays, Recognition Technique can find numerous applications. Such applications can be Biometric authentication, Security, and many more. Some factors possibly lead to flaws in the authentication. To prevent these flaws AI processed using a median filter. This filter is used to remove noise from an image so that accuracy should be maintained.


The Artificial Intelligence approach is used for Iris recognition by understanding the distinctive and measurable characteristics of the human body such as a person's face,AI Approach for Iris Biometric Recognition Using a Median Filter Articles iris, DNA, fingerprints, etc. AI methods analyzed the attributes like iris images. Each biometric authentication technique varies in the characteristic of a human being which it employs for identification. Based on various characteristics, different techniques for authentication are: Iris Recognition, Finger Print recognition, Face recognition, Palm recognition, etc.

Types of Biometric Authentication Systems

Biometric being considered the most acceptable, secure, and dependable system has captured a wide range of applications. Various biometric authentication techniques are:

1. Face recognition

2. Iris Recognition

3. Fingerprints recognition

4. Palm recognition

5. Face Recognition

Iris Recognition

Iris is the ring-shaped region in the human eye that inscribes the pupil of an eye. Iris recognition technique employs the detection and comparison of the unique patterns of iris for every individual. It is designated as the fastest and most efficient technique that is capable of producing intended results in the least duration of time.

Face recognition

Face recognition technique is rising to be the most acceptable and secure field in biometric authentication. It is employed in surveillance systems since it has the caliber to successfully execute its algorithm without object comparison. The most advantageous aspect of this technique as compared to other similar systems is individuality and attainability.

Palm Recognition

Palm recognition or Palm print recognition could be considered as an optimistic and assuring technique that employs palm characteristics for the identification and recognition of a person. The characteristics employed in fulfillment of recognition criteria are lines of a palm, wrinkles, and ridges on a hand, etc., where wrinkles of palm are identified as being thinner than the primary lines.

Fingerprint Recognition

When government organizations and agencies are taken into account, they demand high security; this requirement could be easily fulfilled using biometric systems, specifically by the fingerprint recognition technique. Every individual has a unique and distinguishable print of fingers.

Preprocessing the images using the median filter

A biometric system is designed to follow certain biometric recognition algorithms, defined specifically for each different mechanism. While processing authentication, various parameters are to be considered, such as sufficient lighting when the image is being captured, proper posture of the person, image superiority, and various others. Each biometric system employs several modes or processes to authorize, these are feature extraction, sensing, and matching modules. The filtration mechanism is applied to pre-process the input image of the iris. The pre-processing of the input image is done to remove the noisy content from it. This is achieved by applying the collaboration of median filters. After filtration, the feature from the processed image is extracted by using the LBP-LDA technique. After extracting the features, the Artificial Neural Network is used to perform pattern matching. For purpose of performance evaluation, the proposed iris recognition is implemented in MATLAB.


1. Surveillance

2. Logical Access Control

3. Physical Access Control

4. Time and Attendance

5. Law Enforcement

6. Border and airport control

7. Secured transaction banking and financial institutions

Final words

Security has become the main issue in today’s world. Various security and authentication methods or techniques are applied to secure the iris template. The proposed feature extraction and pattern recognition techniques on the preprocessed image so that the security and reliability of the system could be raised.

Source: Free Guest Posting Articles from