Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC AUTHENTICATION
IRIS/RETINA BIOMETRICS. Retina The retina is a thin layer of cells at the back of the eyeball of vertebrates. eyeballvertebrates eyeballvertebrates It.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
ANKUSH KUMAR (M.Tech(CS))
Emerging biometrics Presenter : Shao-Chieh Lien Adviser : Wei-Yang Lin.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
Iris Recognition Slides adapted from Natalia Schmid and John Daugman.
PALM VEIN TECHNOLOGY.
Iris localization algorithm based on geometrical features of cow eyes Menglu Zhang Institute of Systems Engineering
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Iris Recognition Sathya Swathi Mabbu Long N Vuong.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Automated Eye-Pattern Recognition Systems
Following the work of John Daugman University of Cambridge
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
March 10, Iris Recognition Instructor: Natalia Schmid BIOM 426: Biometrics Systems.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Biometrics Authentication Technology
IRIS RECOGNITION. CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Automated Eye-Pattern Recognition Systems 1. What is Iris?.  The colored part of the eye is called the iris.  Its color comes from microscopic pigment.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
IRIS RECOGNITION SYSTEM
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Iris Recognition.
ATM WITH AN EYE. An automated teller machine (ATM) or automatic banking machine (ABM) is a computerised telecommunications device that provides the clients.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
An Introduction to Biometrics
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
IRIS RECOGNITION 1 CITY ENGINEERING COLLEGE Technical Seminar On “IRIS RECOGNITION” By NANDAN.T.MURTHY 1CE06EC043.
Black Ice Security Services
ATM WITH AN EYE Suresh kumar.
Hand Geometry Recognition
A Seminar Report On Face Recognition Technology
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Presented By Sapin.M.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Iris Recognition.
Jenna Lutton February 26th, 2007
Following the work of John Daugman University of Cambridge
Biometric technology.
CS 265 Fall 2003 Biometrics Iris Recognition By Jagadha Ganesan
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

Iris Scanning By, rahul vijay 1

Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises physiological and behavioural characteristics to authenticate a person’s identity.  A biometric system can be divided into two stages: Enrolment module Identification module  Biometric devices have three primary components : Automated mechanism Processing, Storage and comparison of image with a stored data Interfaces 2

 Irises are one of the more accurate physiological characteristics that can be used.  The probability of finding two people with identical iris pattern is almost zero.  The iris-scan process begins with a photograph. 3

History  In 1936 By Frank Burch.  In 1987 By Aram Safir and Leonard Flom.  In 1987 By John Daugman.  In 1994 Basis for all iris recognition system & products.  In 1996 By licensee sensar.  Bet By NCR Corps & Diebold Corp. 4

What is Iris? 5  The iris is a protective internal organ of a eye, which appear as a colored disc, behind clear protective window of cornea, surrounded by white tissue of the eye.

Iris as Powerful Identifier  The iris is called the living password because of its unique, random features.  The probability that any two irises would be alike is one in 10 to 78th power.  Iris artificial duplication is virtually impossible. 6

Working Of Iris Scanning 7

Image Acquisition 8

Image acquisition using visible light: 9  Using visible light the texture information obtained is less.  The different layers are visible while using visible light.

Image acquisition using infrared light:  A better texture information is obtained using infrared light.  It gives more precise data for comparison. 10

Iris Imaging  Position Your eye 10 to 15 centimetres from the iris scanner.  Make sure that you can only see one eye in the LCD display of the iris scanner.  If you feel that one eye is giving you more trouble than the other, always use the other eye.  Keep your eye still during the scan.  Stand still until the computer indicates identification is completed. 11

Iris localization  The process of obtaining picture of iris only is called localization.  Delimits the iris from the rest of the acquired image  To identify the approximately concentric circular outer boundaries of the iris and the pupil in a photo of an eye using DAUGMAN’S ALGORITHM  Exclude eyelids, eyelashes and pupil also. 12

Feature Encoding  After localization iris code is computed based on information received from GABOR WAVELETS.  GABOR WAVELETS are specialized filter banks that extract information from signal at various locations and scales.  The IRIS CODE is calculated using 8 circular bands that has been adjusted to iris and pupil boundary.  Iris recognition tech converts visible characteristic of iris into 512 bit iris code, these templates are stored for future verification attempts. 13

Pattern Matching  Live Iris code of the iris presented for authentication is compared with iris code stored in the database.  Bit by bit comparison is made between two irises & no of non matching bits & matching bits are found out.  Number of non matching bits are divided by number of bits to obtain Hamming distance.  Hamming distance gives degree of match or unmatch. For two identical iris code, hamming distance is zero, and for perfectly unmatch hamming distance is one. 14

Comparison with respect to cost & Accuracy  Iris scanning is most expensive biometric security system when compared to other.  But the accuracy of this system is proportionately high. 15

Comparison of Iris Recognition with other Biometrics: 16

Applications CComputing environment. NNeed for large throughput and queuing. TTracking Prisoner Movement. 17

Future Applications  Computer login: The iris as a living password.  National Border Controls: The iris as a living password.  Telephone call charging without cash, cards or PIN numbers.  Premises access control (home, office, laboratory etc.).  Driving licenses and other personal certificates.  Entitlements and benefits authentication.  Forensics, birth certificates, tracking missing or wanted person  Automobile ignition and unlocking; anti-theft devices. 18

Advantages  Sensing of the biometric is without physical contact.  Iris is an internal organ is well protected against damage.  Iris has a fine texture.  Highly stable.  Artificial eye can be detected.  Analysis of iris extremely fast.  Highly accurate. 19

Disadvantages  Requires much user cooperation.  Performance of iris authentication may be impaired by glasses.  Difficult to perform at a distance larger than a few meters  Susceptible to poor image quality.  Camera used in the process needs to have the correct amount of illumination.  Obscured by eyelashes, lenses, reflections. 20

Conclusion  The uniqueness of iris and the low probability of a false acceptance or false rejection all contribute to the benefits of using iris recognition technology.  Provides an accurate and secure method of authenticating users onto company systems.  The technical performance cabability of the iris recognition process far surpasses that of any biometric technology now available and it is the future of highly secure security system. 21

References  Daugman J (1999) "Biometric decision landscapes." Technical Report No TR482,University of Cambridge Computer Laboratory.  J. Daugman, “The Importance of Being Random: Statistical Principles of Iris Recognition,” Pattern Recognition, vol. 36, no. 2, pp  R. P. Wildes, “Iris Recognition: An Emerging Biometric Technology,” Proc. of the IEEE, vol. 85, no. 9, 1997, pp Websites:     22