Iris Movement Detection by Morphological Operations for Robotic Control
نویسنده
چکیده
The main aim of this paper is to develop an efficient interface to track the iris movement and to use this information to control the direction of robotic vehicle. Interacting with real or virtual objects with help of a human eye is gaining popularity. This paper gives information about morphological operations to detect eyeball movement and how we can use it to move a robot in direction of the line of sight of the user. Through a web camera, we continuously capture the photographs of either the left or the right eye. Since the target eye is stationary with respect to the camera, so accurate and fast movement is detected in the eye region of the photograph. Then performing the morphological operations on the captured eye images, we are generated digital codes. Then send this information to the robotic vehicle by wireless link. The robotic vehicle receives the digital data and performs some operation on it. According to the digital data the robotic vehicle controls its direction. The eye blinking feature is also used by the algorithm to control the starting and stopping of robotic vehicle. A high speed and accuracy tracking scheme using Evolutionary Video Processing for eye detection and tracking is proposed. One of the future challenges in the development of iris recognition systems is their incorporation into devices such as personal computers, digital camera and embedded devices. In such applications, the computational complexity and noise tolerance of the recognition algorithm play an important role. This paper addresses the computational complexity of the necessary first step in iris recognition, namely iris detection. High resolution images not only provide high recognition rate but also useful in safeguarding the iris recognition system from fake iris attack . Index Terms -Iris detection, Morphological Operations, MATLAB, Hardware Implementation.
منابع مشابه
A New IRIS Segmentation Method Based on Sparse Representation
Iris recognition is one of the most reliable methods for identification. In general, itconsists of image acquisition, iris segmentation, feature extraction and matching. Among them, iris segmentation has an important role on the performance of any iris recognition system. Eyes nonlinear movement, occlusion, and specular reflection are main challenges for any iris segmentation method. In thi...
متن کاملA New IRIS Segmentation Method Based on Sparse Representation
Iris recognition is one of the most reliable methods for identification. In general, itconsists of image acquisition, iris segmentation, feature extraction and matching. Among them, iris segmentation has an important role on the performance of any iris recognition system. Eyes nonlinear movement, occlusion, and specular reflection are main challenges for any iris segmentation method. In thi...
متن کاملControl of a Robotic Wheel-Chair Prototype for People with Walking Disabilities
In this paper we present a system that could be used to help people with walking disabilities. A system consists of a prototype mobile robot platform equipped with a control board and a remote computer system, running with image processing algorithms, was used to develop a system for physically disabled human to move freely in an environment. We used a camera to get visual information by a huma...
متن کاملGenetic Variation within Iranian Iris Species Using Morphological Traits
Iris belongs toIridaceae family and it is monocotyledon. Iris is one of the important ornamental and medicinal plants. 34 iris genotypes (14 species) collected from different provinces of Iran were planted at National Institute of Ornamental Plants (NIOP) Iran. All of the species evaluated for 15 quantitative traits and 30 qualitative traits. Results showed that the highest positive correlation...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کامل