Sie sind auf Seite 1von 6

1.

INTRODUCTION
1.1 Introduction In the past, much research has been performed in the field of Authentication system. This problem has received attention from people in many different disciplines such as medicine, engineering, computer vision, artificial intelligence and databases. One reason why researchers have spent time in this field is that there has been a high demand from security services, such as police, army and customs, for a system that is able to recognize people. A biometric system provides automatic recognition of an individual based on some sort of unique feature or characteristic possessed by individuals. various biometrics systems have been developed based on fingerprints,voice,hand geometry, handwriting, the retina,and the one which is presented in this is iris recognition. These days, most people in the western world have several access codes and credit cards with pin numbers, as well as login names for computer systems. In a security survey done by Price Waterhouse Coopers in the United Kingdom, they discovered that the average employee in British companies must remember three different usernames and passwords to be able to do his or her job. Personal access codes are not included in these figures. Although some of these codes are necessary for security reasons, people tend to forget them, which lead to extra work or cost in getting a new one. In order not to forget these codes people may compromise security, e.g. by writing their pin numbers on their credit cards or using the same code for everything. As a result, the security that was supposed to stem from all these numbers is lost. To counter the lack of security associated with pin numbers, iris recognition has been proposed as a means to authenticate persons. The advantages are that no numbers of authentication units are needed, only the iris. most biometric systems allow two modes of operation .an enrolment mode for adding templates to a database and an identification mode where a template is created for an individual and then a match is searched for in

the database of pre-enrolled template. This determines its colour. Due to the epigenetic nature of iris patterns, the two eyes of an individual contain completely independent iris patterns, and identical twins possess uncorrelated iris patterns. Iris recognition security system is one of the most reliable leading technologies that most people are related [1].because iris is protected internal organ whose random texture is stable throughout life. Artificial neural Network is used which based on simulated nerve cells or neurons which are joined with each other.

1.2Necessity In recent years, the demand for iris recognition systems has increased very much. Many researchers have tried to make reliable and accurate iris recognition systems and developed many methods to do iris recognition. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Although some of these codes are necessary for security reasons, people tend to forget them, which lead to extra work or cost in getting a new one. In order not to forget these codes people may compromise security, e.g. by writing their pin numbers on their credit cards or using the same code for everything. As a result, the security that was supposed to stem from all these numbers is lost. To counter the lack of security associated with pin numbers, iris recognition has been proposed as a means to authenticate persons. The advantages are that no numbers of authentication units are needed, only the iris.

1.3Objectives Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. A biometric system is essentially a pattern recognition system that operates by acquiring biometric. Data from an individual, extracting a feature set from the acquired data, and comparing this feature set against the template set in the database. Depending on the application context, a biometric system may operate either in verification mode or identification mode: In the verification mode, the system validates a persons identity by comparing the captured biometric data with her own biometric template(s) stored system database. In such a system, an individual who desires to be recognized claims an identity, usually via a PIN (Personal Identification Number), a user name, a smart card, etc., and the system conducts a one-to one comparison to determine whether the claim is true or not.

In the identification mode, the system recognizes an individual by searching the templates of all the users in the database for a match. Therefore, the system conducts a one-to-many comparison to establish an individuals identity. We are using biometric in identification mode.

1.4 Theme In todays information technology world, security for systems is becoming more and more important. The number of systems that have been compromised is ever increasing and authentication plays a major role as a first line of defense against intruders. The three main types of authentication are something you know (such as a password), something you have (such as a card or token), and something

you are (biometric). Passwords are notorious for being weak and easily crack able due to human nature and our tendency to make passwords easy to remember or writing them down somewhere easily accessible. Cards and tokens can be presented by anyone and although the token or card is recognizable, there is no way of knowing if the person presenting the card is the actual owner. Biometrics, on the other hand, provides a secure method of authentication and identification, as they are difficult to replicate and steal. If biometrics is used in conjunction with something you know, then this achieves what is known as twofactor authentication. Two-factor authentication is much stronger as it requires both components before a user is able to access anything. Biometric identification utilises physiological and behavioural characteristics to authenticate a persons identity. Some common physical characteristics that may be used for identification include fingerprints, palm prints, hand geometry, retinal patterns and iris patterns. Behavioural characteristics include signature, voice pattern and keystroke dynamics. A biometric system works by capturing and storing the biometric information and then comparing the scanned biometric with what is stored in the repository. The diagram below demonstrates the process followed when using a biometric system for security

Figure 1: Biometric System Process1

Out of all the various physical characteristics available, irises are one of the more accurate physiological characteristics that can be used.

.5 Organization The dissertation report is organized in five chapters. Chapter 1: The contents of chapter one include introduction, necessity, objective and theme of dissertation. Chapter 2: Includes literature survey and explains the different types of iris recognition techniques. Chapter 3: This chapter is devoted to system development. It contains basic information about implementation details used to develop the iris recognition system. Hough transform is used for feature extraction, and

artificial neural network is used for training and testing.

Chapter 4: Includes performance analysis. In experimental analysis, Histogram method using mean of the bean values for face recognition is mentioned. In statistical analysis, Adjacent pixel intensity difference quantization method is mentioned, comparison of experimental and statistical methods of analysis and justification of difference. Chapter 5: Presents conclusion and future scope and applications.

Das könnte Ihnen auch gefallen