Iris Recognition Slides adapted from Natalia Schmid and John Daugman.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Dr. Marc Valliant, VP & CTO
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Iris Recognition Under Various Degradation Models Hans Christian Sagbakken.
BIOMETRIC AUTHENTICATION
L 31 Light and Optics-3 Images formed by mirrors
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
ANKUSH KUMAR (M.Tech(CS))
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
Emerging biometrics Presenter : Shao-Chieh Lien Adviser : Wei-Yang Lin.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Edge detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the image can be encoded.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Object Detection and Tracking Mike Knowles 11 th January 2005
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Smart Traveller with Visual Translator. What is Smart Traveller? Mobile Device which is convenience for a traveller to carry Mobile Device which is convenience.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Edge detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the image can be encoded.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
THE SIGHT. INDEX Characteristics Parts of the sight What is each part How the eye works Photos End.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Iris Recognition Sathya Swathi Mabbu Long N Vuong.
ECE 472/572 – Digital Image Processing Lecture 2 – Elements of Visual Perception and Image Formation 08/25/11.
Automated Eye-Pattern Recognition Systems
Following the work of John Daugman University of Cambridge
EADS DS / SDC LTIS Page 1 7 th CNES/DLR Workshop on Information Extraction and Scene Understanding for Meter Resolution Image – 29/03/07 - Oberpfaffenhofen.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Sensing for Robotics & Control – Remote Sensors R. R. Lindeke, Ph.D.
Eye- Eye Captain!.
Video Based Palmprint Recognition Chhaya Methani and Anoop M. Namboodiri Center for Visual Information Technology International Institute of Information.
March 10, Iris Recognition Instructor: Natalia Schmid BIOM 426: Biometrics Systems.
IRIS RECOGNITION. CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION.
Automated Eye-Pattern Recognition Systems 1. What is Iris?.  The colored part of the eye is called the iris.  Its color comes from microscopic pigment.
Edge detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the image can be encoded.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
IRIS RECOGNITION SYSTEM
PRESENTATION ON BIOMETRICS
1 Machine Vision. 2 VISION the most powerful sense.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
By Nicolás Martín 6ºA The sight is the sense that lets you see things with your eyes. Your eyes can detect information of the things around you.
Intelligent Vision Systems Image Geometry and Acquisition ENT 496 Ms. HEMA C.R. Lecture 2.
Iris Recognition.
Iris-based Authentication System Daniel Schonberg and Darko Kirovski, “Iris Compression for Cryptographically Secure Person Identification”, in Proceedings.
ANITHA L ROLL NO :4 M.TECH[CSE]. LITERATURE SURVEY PROPOSED SYSTEM PERFORMANCE STUDY INTRODUCTION OBJECTIVE.
WLD: A Robust Local Image Descriptor Jie Chen, Shiguang Shan, Chu He, Guoying Zhao, Matti Pietikäinen, Xilin Chen, Wen Gao 报告人:蒲薇榄.
Over the recent years, computer vision has started to play a significant role in the Human Computer Interaction (HCI). With efficient object tracking.
IRIS RECOGNITION 1 CITY ENGINEERING COLLEGE Technical Seminar On “IRIS RECOGNITION” By NANDAN.T.MURTHY 1CE06EC043.
Hand Geometry Recognition
PRESENTED BY Yang Jiao Timo Ahonen, Matti Pietikainen
Iris Recognition.
Iris Biometric Presentation Including Iris/Ear algorithm
Edge Detection CS 678 Spring 2018.
Following the work of John Daugman University of Cambridge
Edge detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the image can be encoded.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

Iris Recognition Slides adapted from Natalia Schmid and John Daugman

Outline Anatomy Iris Recognition System Image Processing (John Daugman) - iris localization - encoding Measure of Performance Results Pros and Cons References

Anatomy of the Human Eye Eye = Camera Cornea bends, refracts, and focuses light. Retina = Film for image projection (converts image into electrical signals). Optical nerve transmits signals to the brain.

Structure of Iris Iris = Aperture Different types of muscles: - the sphincter muscle (constriction) - radial muscles (dilation) Iris is flat Color: pigment cells called melanin The color texture, and patterns are unique.

Individuality of Iris Left and right eye irises have distinctive pattern.

Iris Recognition System

Iris Imaging Distance up to 1 meter Near-infrared camera

Imaging Systems

Imaging Systems

Image Processing John Daugman (1994) Pupil detection: circular edge detector Segmenting sclera

Rubbersheet Model Each pixel (x,y) is mapped into polar pair (r, ). Circular band is divided into 8 subbands of equal thickness for a given angle. Subbands are sampled uniformly in and in r. Sampling = averaging over a patch of pixels.

Encoding 2-D Gabor filter in polar coordinates:

IrisCode Formation Intensity is left out of consideration. Only sign (phase) is of importance. 256 bytes 2,048 bits

Measure of Performance Off-line and on-line modes of operation. Hamming distance: standard measure for comparison of binary strings. x and y are two IrisCodes is the notation for exclusive OR (XOR) Counts bits that disagree.

Observations Two IrisCodes from the same eye form genuine pair => genuine Hamming distance. Two IrisCodes from two different eyes form imposter pair => imposter Hamming distance. Bits in IrisCodes are correlated (both for genuine pair and for imposter pair). The correlation between IrisCodes from the same eye is stronger.

Observations The fact that this distribution is uniform indicates that different irises do not systematically share any common structure. For example, if most irises had a furrow or crypt in the 12-o'clock position, then the plot shown here would not be flat. URL:

Degrees of Freedom Imposter matching score: - normalized histogram - approximation curve - Binomial with 249 degrees of freedom Interpretation: Given a large number of imposter pairs. The average number of distinctive bits is equal to 249.

Histograms of Matching Scores Decidability Index d-prime: d-prime = The cross-over point is Compute FMR and FRR for every threshold value.

Decision Non-ideal conditions: The same eye distributions depend strongly on the quality of imaging. - motion blur - focus - noise - pose variation - illumination

Decision Ideal conditions: Imaging quality determines how much the same iris distribution evolves and migrates leftwards. d-prime for ideal imaging: d-prime = 14.1 d-prime for non-ideal imaging (previous slide): d-prime = 7.3

Error Probabilities Biometrics: Personal Identification in Networked Society, p. 115

False Accept Rate For large database search: - FMR is used in verification - FAR is used in identification Adaptive threshold: to keep FAR fixed:

Test Results The results of tests published in the period from 1996 to Be cautious about reading these numbers: The middle column shows the number of imposter pairs tested (not the number of individuals per dataset).

Performance Comparison UK National Physical Laboratory test report,

Cons §There are few legacy databases. Though iris may be a good biometric for identification, large-scale deployment is impeded by lack of installed base. §Since the iris is small, sampling the iris pattern requires much user cooperation or complex, expensive input devices. §The performance of iris authentication may be impaired by glasses, sunglasses, and contact lenses; subjects may have to remove them. §The iris biometric, in general, is not left as evidence on the scene of crime; no trace left.

Pros §Iris is currently claimed and perhaps widely believed to be the most accurate biometric, especially when it comes to FA rates. Iris has very few False Accepts (the important security aspect). §It maintains stability of characteristic over a lifetime. §Iris has received little negative press and may therefore be more readily accepted. The fact that there is no criminal association helps. §The dominant commercial vendors claim that iris does not involve high training costs.

Future of Iris

National Geographic: 1984 and 2002

Sharbat Gula §The remarkable story of Sharbat Gula, first photographed in 1984 aged 12 in a refugee camp in Pakistan by National Geographic (NG) photographer Steve McCurry, and traced 18 years later to a remote part of Afghanistan where she was again photographed by McCurry. §So the NG turned to the inventor of automatic iris recognition, John Daugman at the University of Cambridge. §The numbers Daugman got left no question in his mind that the eyes of the young Afghan refugee and the eyes of the adult Sharbat Gula belong to the same person.

John Daugman and the Eyes of Sharbat Gula

References 1.J. Daugman’s web site. URL: 2. J. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp – 1161, J. Daugman, United States Patent No. 5,291,560 (issued on March 1994). Biometric Personal Identification System Based on Iris Analysis, Washington DC: U.S. Government Printing Office, J. Daugman, “The Importance of Being Random: Statistical Principles of Iris Recognition,” Pattern Recognition, vol. 36, no. 2, pp R. P. Wildes, “Iris Recognition: An Emerging Biometric Technology,” Proc. of the IEEE, vol. 85, no. 9, 1997, pp