Iris Scanning - PowerPoint PPT Presentation

About This Presentation
Title:

Iris Scanning

Description:

Iris Scanning By, rahul vijay * * * * * * * * * * * * * * * * * * * * Introduction Biometrics provides a secure method of authentication and identification. – PowerPoint PPT presentation

Number of Views:7110
Avg rating:3.0/5.0
Slides: 23
Provided by: 123semina
Category:

less

Transcript and Presenter's Notes

Title: Iris Scanning


1
Iris Scanning
  • By,
  • rahul vijay

2
Introduction
  • Biometrics provides a secure method of
    authentication and identification.
  • Biometric identification utilises physiological
    and behavioural characteristics to authenticate a
    persons identity.
  • A biometric system can be divided into two
    stages
  • Enrolment module
  • Identification module
  • Biometric devices have three primary components
  • Automated mechanism
  • Processing, Storage and comparison of image
    with a stored data
  • Interfaces

3
  • Irises are one of the more accurate physiological
    characteristics that can be used.
  • The probability of finding two people with
    identical iris pattern is almost zero.
  • The iris-scan process begins with a photograph.

4
History
  • In 1936 By Frank Burch .
  • In 1987 By Aram Safir and Leonard
    Flom .
  • In 1987 By John Daugman .
  • In 1994 Basis for all iris
    recognition system products .
  • In 1996 By licensee sensar.
  • Bet 1997-1999 By NCR Corps Diebold Corp.

5
What is Iris?
  • The iris is a protective internal organ of a
    eye, which appear as a colored disc , behind
    clear protective window of cornea, surrounded by
    white tissue of the eye.

6
Iris as Powerful Identifier
  • The iris is called the living password because of
    its unique, random features.
  • The probability that any two irises would be
    alike is one in 10 to 78th power.
  • Iris artificial duplication is virtually
    impossible.

7
Working Of Iris Scanning
8
Image Acquisition
9
Image acquisition using visible light
  • Using visible light the texture information
    obtained is less.
  • The different layers are visible while using
    visible light .

10
Image acquisition using infrared light
  • A better texture information is obtained using
    infrared light.
  • It gives more precise data for comparison.

11
Iris Imaging
  • Position Your eye 10 to 15 centimetres from the
    iris scanner.
  • Make sure that you can only see one eye in the
    LCD display of the iris scanner.
  • If you feel that one eye is giving you more
    trouble than the other, always use the other
    eye.
  • Keep your eye still during the scan.
  • Stand still until the computer indicates
    identification is completed.

12
Iris localization
  • The process of obtaining picture of iris only is
    called localization.
  • Delimits the iris from the rest of the acquired
    image
  • To identify the approximately concentric circular
    outer boundaries of the iris and the pupil in a
    photo of an eye using DAUGMANS ALGORITHM
  • Exclude eyelids, eyelashes and pupil also .

13
Feature Encoding
  • After localization iris code is computed based on
    information received from GABOR WAVELETS.
  • GABOR WAVELETS are specialized filter banks that
    extract information from signal at various
    locations and scales.
  • The IRIS CODE is calculated using 8 circular
    bands that has been adjusted to iris and pupil
    boundary.
  • Iris recognition tech converts visible
    characteristic of iris into 512 bit iris code,
    these templates are stored for future
    verification attempts.

14
Pattern Matching
  • Live Iris code of the iris presented for
    authentication is compared with iris code stored
    in the database.
  • Bit by bit comparison is made between two irises
    no of non matching bits matching bits are
    found out.
  • Number of non matching bits are divided by number
    of bits to obtain Hamming distance.
  • Hamming distance gives degree of match or
    unmatch. For two identical iris code, hamming
    distance is zero, and for perfectly unmatch
    hamming distance is one.

15
Comparison with respect to cost Accuracy
  • Iris scanning is most expensive biometric
    security system when compared to other.
  • But the accuracy of this system is
    proportionately high.

16
Comparison of Iris Recognition with other
Biometrics
17
Applications
  • Computing environment.
  • Need for large throughput and queuing.
  • Tracking Prisoner Movement.

18
Future Applications
  • Computer login The iris as a living password.
  • National Border Controls The iris as a living
    password.
  • Telephone call charging without cash, cards or
    PIN numbers.
  • Premises access control (home, office, laboratory
    etc.).
  • Driving licenses and other personal certificates.
  • Entitlements and benefits authentication.
  • Forensics, birth certificates, tracking missing
    or wanted person
  • Automobile ignition and unlocking anti-theft
    devices.

19
Advantages
  • Sensing of the biometric is without physical
    contact .
  • Iris is an internal organ is well protected
    against damage .
  • Iris has a fine texture .
  • Highly stable .
  • Artificial eye can be detected .
  • Analysis of iris extremely fast .
  • Highly accurate .

20
Disadvantages
  • Requires much user cooperation.
  • Performance of iris authentication may be
    impaired by glasses .
  • Difficult to perform at a distance larger than a
    few meters
  • Susceptible to poor image quality .
  • Camera used in the process needs to have the
    correct amount of illumination.
  • Obscured by eyelashes, lenses, reflections .

21
Conclusion
  • The uniqueness of iris and the low probability of
    a false acceptance or false rejection all
    contribute to the benefits of using iris
    recognition technology.
  • Provides an accurate and secure method of
    authenticating users onto company systems .
  • The technical performance cabability of the iris
    recognition process far surpasses that of any
    biometric technology now available and it is the
    future of highly secure security system.

22
References
  • Daugman J (1999) "Biometric decision
    landscapes." Technical Report No TR482,University
    of Cambridge Computer Laboratory.
  • J. Daugman, The Importance of Being Random
    Statistical Principles of Iris Recognition,
    Pattern Recognition, vol. 36, no. 2, pp 279-291.
  • R. P. Wildes, Iris Recognition An Emerging
    Biometric Technology, Proc. of the IEEE, vol.
    85, no. 9, 1997, pp. 1348-1363.
  • Websites
  • http//www.iris-scan.com/iris_cautionary.htm
  • http//www.iriscan.com/basics.php
  • http//www.cl.cam.ac.uk
  • http//en.wikipedia.org/wiki/Iris_recognition
Write a Comment
User Comments (0)
About PowerShow.com