IRIS RECOGNITION. CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

IRIS/RETINA BIOMETRICS. Retina The retina is a thin layer of cells at the back of the eyeball of vertebrates. eyeballvertebrates eyeballvertebrates It.
Konica Minolta VIVID D non-contact digitizing instrument By Afshan Hina.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BIOMETRICS. SCOPE Biometrics – Still an Evolving Technology Biometrics – Past and Present How It Works? Machines for Bio Measurements Future Aspects Benefits.
Multimedia for the Web: Creating Digital Excitement Multimedia Element -- Graphics.
Introduction to Fingerprint Biometrics By Tamar Bar.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
The Role of Computers in Surveillance ~ Katie Hatland.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Iris localization algorithm based on geometrical features of cow eyes Menglu Zhang Institute of Systems Engineering
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Facial Recognition CSE 391 Kris Lord.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Iris Recognition Sathya Swathi Mabbu Long N Vuong.
Karthiknathan Srinivasan Sanchit Aggarwal
Following the work of John Daugman University of Cambridge
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
IRIS RECOGNITION SYSTEM
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
By Prof. Stelmark. Digital Imaging In digital imaging, the latent image is stored as digital data and must be processed by the computer for viewing on.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
IRIS RECOGNITION 1 CITY ENGINEERING COLLEGE Technical Seminar On “IRIS RECOGNITION” By NANDAN.T.MURTHY 1CE06EC043.
A Seminar Report On Face Recognition Technology
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometric Security Fujitsu Palm Vein Technology
Iris Recognition.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Following the work of John Daugman University of Cambridge
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

IRIS RECOGNITION

CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION  6. IRIS LOCALISATION  7. PATTERN MATCHING  8. ADVANTAGES  9. DISADVANTAGES  10. APPLICATIONS  11. IRIS RECOGNITION: ISSUES  12. CONCLUSION

INTRODUCTION  Conventional methods of identification based on possession of ID cards or exclusive knowledge like social security number or a password are not altogether reliable.  ID cards can be almost lost, forged or misplaced: passwords can be forgotten. Biometric technology has now become a viable alternative to traditional identification systems because of its tremendous accuracy and speed.  This paper explores the concept of Iris recognition which is one of the most popular biometric techniques. This technology finds applications in diverse fields.

IRIS RECOGNITION  Iris recognition is the process of recognizing a person by analyzing the random pattern of the iris. Iris scan biometrics employs the unique characteristics and features of the human iris in order to verify the identity of an individual.  The iris is the area of the eye where it is pigmented or colored circle, usually brown or blue. Iris recognition systems use small, high-quality cameras to capture a black and white high-resolution photograph of the iris. This process takes only one to two seconds and provides the details of the iris that are mapped, recorded and stored for future matching/verification.  This technology is considered to be one of the safest, fastest, and most accurate, noninvasive biometric technologies.

Iris

HISTORY AND DEVELOPMENT  The idea of using patterns for personal identification was originally proposed in 1936 by ophthalmologist Frank Burch. By the 1980’s the idea had appeared in James Bond films, but it still remained as a science fiction.  The algorithm which Daugman developed in 1994 is the basis for all current iris recognition systems. Daugman algorithm is owned by Iridian technologies and the process is licensed to several other Companies.  One active imaging system developed in 1996 by licensee Sensar deployed special cameras in bank ATM to capture IRIS images at a distance of up to 1 meter. This active imaging system was installed in cash machines both by NCR Corps and by Diebold Corp in successful public trials in several countries during I997 to 1999.

SCIENCE BEHIND THE TECHNOLOGY  The design and implementation of a system for automated iris recognition can be subdivided in to 3.  1. Image Acquisition  2. Iris Localization and  3. Pattern Matching.

BLOCK DIAGRAM

IMAGE ACQUISITION  a) The iris recognition process begins with image acquisition. Image acquisition is a process which deals with the capturing of a high quality image of the iris with the help of a digital camera. a) It is desirable to acquire images of the iris with sufficient resolution and sharpness to support recognition.  b) It is important to have good contrast in the interior iris pattern without any distraction in the image.  c) These images must be well framed. The widely used recognition system is the Daugman system which captures images with the iris diameter typically between 100 and 200 pixels from a distance of 15,46 cm using a 330 mm lens.

IRIS LOCALISATION  Iris localization is a process that delimits the iris from the rest of the acquired image.  After the camera situates the eye, it narrows in from the right and left of the iris to locate its outer edge. It simultaneously locates the inner edge of the iris.  Conversion of an iris image into a numeric code that can be easily manipulated is essential to its use. This process was developed by John Daugman with the help of an algorithm developed by him.

PATTERN MATCHING  The Iris Code derived from this process is compared with previously generated Iris Code. This process is called pattern matching.  Using integer XOR logic, a long vector of each iris code can be XORed to generate a new integer. Each of whose bits represent mismatch between the vectors being compared.  The total number of 1s represents the total number of mismatches between the two binary codes.  For two identical Iris Codes, the hamming distance is Zero. For perfectly unmatched Iris Codes, the hamming distance is 1

ADVANTAGES  1. Highly protected, internal organ of the eye.  2. Externally visible; patterns imaged from a distance.  3. Iris patterns possess a high degree of randomness.  4. Even iris patterns of identical twins differ.  5. It gives high security for the sensitive information.

DISADVANTAGES  1. The person should be present at the spot.  2. Small target (1 cm) to acquire from a distance (1m)  3. Obscured by eyelashes and lenses.  4. Flash of camera should not become so bright.

APPLICATIONS a. ATM’s and iris recognition b. Tracking Prisoners and criminals c. Highly secured systems

IRIS RECOGNITION: ISSUES  There are some issues which affect the functionality and applicability of iris recognition technology in particular. The technology requires a certain amount of user interaction. The enroller must hold still in a certain spot.  Any unusual lighting situation may affect the ability of the camera to acquire its subject and it may also affect the human eye.  Though these issues do not reduce the exceptional effectiveness of iris recognition technology, they must be kept in mind while implementing this technology.

CONCLUSION  The technical performance capability of the iris recognition process far efficient than that of any biometric technology now available today. Biometric technology has now become a viable alternative to traditional identification systems because of its tremendous accuracy and speed. As iris technology grows less expensive, it could very likely unseat a large portion of the biometric industry. Its technological superiority has already allowed it to make significant inroads into identification and security venues which had been dominated by other biometrics. Iris-based biometric technology has always been an exceptionally accurate one, and it may soon grow much more prominent.

THANK YOU!