You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Open Source Iris Recognition Hardware and Software with Presentation Attack Detection (https://arxiv.org/abs/2008.08220) Zhaoyuan Fang, Adam Czajka
Cite
If you find this repository useful for your research, please consider citing our work:
@article{fang2020osirishardsoft,
title={Open Source Iris Recognition Hardware and Software with Presentation Attack Detection},
author={Zhaoyuan Fang, Adam Czajka},
journal={IEEE International Joint Conference on Biometrics (IJCB)},
year={2020}
}
The code is written and tested with Python 3.5 and Raspberry Pi 3B+. The software can also be treated as an individual open-source method.
Required libraries: PyTorch, TensorFlow, OpenCV
All source codes of the PAD methods are in the PAD folder.
References to the PAD methods can be found here: OSPAD-2D and OSPAD-3D.
CC-Net Segmentation
We apply CC-Net for fast iris segmentation. All the codes are in the CCNet folder, as well as the segmentation model saved as a TensorFlow graph. Please check out CCNet/main.py for re-training / testing. The codes are straightforward to follow.
Hardware Assembly Instructions
The required components include: Raspberry Pi (tested on 3B+), NIR-sensitive Pi-compatible camera, NIR filter, NIR LEDs, resistors and wires. Some requirements on the hardware are:
The LEDs we used have emission wavelengths of 850nm, but any LED with emission wavelength between 700nm and 900nm would suffice.