• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Caiyong, Sun Zhenan. A Benchmark for Iris Segmentation[J]. Journal of Computer Research and Development, 2020, 57(2): 395-412. DOI: 10.7544/issn1000-1239.2020.20190092
Citation: Wang Caiyong, Sun Zhenan. A Benchmark for Iris Segmentation[J]. Journal of Computer Research and Development, 2020, 57(2): 395-412. DOI: 10.7544/issn1000-1239.2020.20190092

A Benchmark for Iris Segmentation

Funds: This work was supported by the National Natural Science Foundation of China (U1836217, 61427811) and the National Key Research and Development Program of China (2017YFC0821602).
More Information
  • Published Date: January 31, 2020
  • Iris recognition has been considered as one of the most stable and reliable biometric identification technologies. In the whole process of iris recognition, iris segmentation is in the preprocessing stage, so the quality of iris segmentation can directly affect the accuracy of iris recognition. Since Daugman first proposed a high-performance iris recognition system in 1993, a variety of iris segmentation algorithms have been proposed. Especially in recent years, deep learning based iris segmentation algorithms have greatly improved the accuracy of iris segmentation. However, due to the lack of unified databases and evaluation protocols, the comparisons of different iris segmentation algorithms are messy and absence of fairness, hence an open iris segmentation evaluation benchmark is proposed. First, the definition and challenges of iris segmentation are briefly introduced. Second, a comprehensive summary of three representative, open iris segmentation databases including the characteristics and challenges is given. Next, evaluation protocols of iris segmentation are defined. Then the traditional iris segmentation algorithms and deep learning based iris segmentation algorithms are elaborated on and compared by extensive experiments. The experimental results show that deep learning based iris segmentation methods outperform the traditional approaches in terms of accuracy. Finally, we make in-depth discussions about open questions of deep learning based iris segmentation algorithms.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605
    [3]Yang Ningbin, Zhou Quan, Xu Shumei. Public-Key Authenticated Encryption with Keyword Search Without Pairings[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135. DOI: 10.7544/issn1000-1239.2020.20200318
    [4]Guo Lifeng, Li Zhihao, Hu Lei. Efficient Public Encryption Scheme with Keyword Search for Cloud Storage[J]. Journal of Computer Research and Development, 2020, 57(7): 1404-1414. DOI: 10.7544/issn1000-1239.2020.20190671
    [5]Xu Guangwei, Shi Chunhong, Wang Wentao, Pan Qiao, Li Feng. Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension[J]. Journal of Computer Research and Development, 2019, 56(10): 2193-2206. DOI: 10.7544/issn1000-1239.2019.20190378
    [6]Li Yuxi, Zhou Fucai, Xu Jian, Xu Zifeng. Multiple-Keyword Encrypted Search with Relevance Ranking on Dual-Server Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2149-2163. DOI: 10.7544/issn1000-1239.2018.20180433
    [7]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [8]Han Jun, Fan Ju, Zhou Lizhu. Semantic-Enhanced Spatial Keyword Search[J]. Journal of Computer Research and Development, 2015, 52(9): 1954-1964. DOI: 10.7544/issn1000-1239.2015.20140686
    [9]Guo Lifeng and Lu Bo. Efficient Proxy Re-encryption with Keyword Search Scheme[J]. Journal of Computer Research and Development, 2014, 51(6): 1221-1228.
    [10]Tang Mingzhu, Yang Yan, Guo Xuequan, Shen Zhonghui, Zhong Yingli. KWSDS: A Top-k Keyword Search System in Relational Databases[J]. Journal of Computer Research and Development, 2012, 49(10): 2251-2259.

Catalog

    Article views (1370) PDF downloads (407) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return