Download presentation
Presentation is loading. Please wait.
Published byLora Daniel Modified over 9 years ago
1
Iris Recognition Sathya Swathi Mabbu Long N Vuong
2
Topics Technique of iris recognition Technique of iris recognition Attacks Attacks Implementation Implementation Advantages & Disadvantages Advantages & Disadvantages
3
Why Iris Recognition? Iris patterns are unique. Iris patterns are unique. Iris patterns do not change with age. Iris patterns do not change with age. Non Contact approach. Non Contact approach. Simplicity and ease of implementation. Simplicity and ease of implementation. Speed – the process of matching the iris patterns is very fast. Speed – the process of matching the iris patterns is very fast.
4
Technique Step 1: Capturing the image of the eye using a camera. Step 2: Differentiating the outline of the iris and the sclera, and the pupil from the iris. Step 3: Encoding the image using demodulation (also removes reflections, intrusion of eye lid lashes, contact lens outline etc.,). Code is 256 bytes. pupil iris sclera
5
Iris pattern - Comparison Test of Statistical Independence Test of Statistical Independence Compare the iris codes (256*8=2048 bits) of the eyes using the following formula Compare the iris codes (256*8=2048 bits) of the eyes using the following formula [Code A (XOR) Code B] AND Mask A AND Mask B [Code A (XOR) Code B] AND Mask A AND Mask B H.D = Mask A AND Mask B Mask A AND Mask B This is called Hamming Distance (H.D).
6
Speed Performance On a 300 MHz workstation, the execution times for the steps in iris recognition are listed below, On a 300 MHz workstation, the execution times for the steps in iris recognition are listed below, Operation Time Image focus 15 millisec Scrub specular reflections 56 millisec Localize eye and iris 90 millisec Fit pupillary boundary 12 millisec Detect both eyelids 93 millisec Remove lashes and contact lens edges 78 millisec Demodulation and IrisCode creation 102 millisec XOR comparison of two IrisCodes 10 micro sec 100,000 comparisons can be performed in a second. IrisCode is a registered trademark of Iridian Technologies
7
Attacks 1. Iris patterns printed on contact lens Countermeasure: 2D Fourier Transform Countermeasure: 2D Fourier Transform
8
Attacks cont… Digital Replay attack Digital Replay attack Countermeasure: Encryption of iris code, database security. Countermeasure: Encryption of iris code, database security. Example: Iridian Technologies has established Example: Iridian Technologies has established 3DES Encryption as the standard. 3DES Encryption as the standard.
9
Attacks cont… Picture of an iris Picture of an iris Countermeasure: Liveness test ( on command eye movement, pupillary light reflex, red eye effect, light absorption properties of living tissue, hippus etc.,) Countermeasure: Liveness test ( on command eye movement, pupillary light reflex, red eye effect, light absorption properties of living tissue, hippus etc.,) RED EYE EFFECT
10
IMPLEMENTATION OF THE IRIS RECOGNITION SYSTEM
11
The Process and Analysis Unit Each image is given to the P&A Unit for recognition: Each image is given to the P&A Unit for recognition: 1. Splits the colored image and tests the morphology 2. Transforms the image in a 3D image 3. Transforms the image in the frequencies domain 4. Transforms the image in a multidimensional objects, then the algorithm executes the last analysis to recognize a person
12
The Largest National Deployment Iris recognition border-crossing system in the United Arab Emirates (UAE) Iris recognition border-crossing system in the United Arab Emirates (UAE)
13
Advantages of the Iris for Identification Highly protected, internal organ of the eye Highly protected, internal organ of the eye Externally visible, patterns imaged from a distance Externally visible, patterns imaged from a distance Iris patterns possess a high degree of randomness Iris patterns possess a high degree of randomness Patterns apparently stable throughout life Patterns apparently stable throughout life Encoding and decision-making are tractable Encoding and decision-making are tractable
14
Disadvantages of the Iris for Identification Small target to acquire from a distance Small target to acquire from a distance Moving target…within another…on yet another Moving target…within another…on yet another Located behind a curved, wet, reflecting surface Located behind a curved, wet, reflecting surface Obscured by eyelashes, lenses, reflections Obscured by eyelashes, lenses, reflections Illumination should not be visible or bright Illumination should not be visible or bright
15
Why iris recognition is not so famous? Convenience Convenience Acceptance Acceptance Cost Cost
16
Q & A
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.