Sie sind auf Seite 1von 3

Iris Biometrics

Important points to note: Iris formation is epigenetic (not determined by genetics) and is a physiological characteristic, meaning that there is less chance for FAR and FRR. Also it is accepted/believed the iris does not change as time passes, making this biometric a strong contender for identification. Has a high entropy Iris features such as the trabecular meshwork (a tissue which gives the appearance of dividing the iris in a radial fashion) freckles and colour among other features is used in generating a bit template which is stored in a database for future identification purposes. Iris biometrics uses mathematical formulas (2D Gabor wavelets) to locate the iris, using landmark features i.e. eyelids, pupil, sclera(white of eye). Once the iris image is verified, 8 concentric rings(like the renningan *anime reference) are created to segment the iris image and the algorithms are then used to convert each ring into a data stream of um bits? There are several ways to which a computer identifies a person. One such method was developed by pioneer John Daugman in which to perform recognition, the Hamming Distance(HD) between two IrisCodes are compared and if the HD indicates that less than 1/3 of the bites are different , then it fails the test of statistical significance and hence the two IrisCodes are the same.*statistical significance: the degree by which the iris data that was scanned is different to all the other iris templates stored. Verification method is made by hamming distance value(number of positions that are different).In which lower hamming distance = greater chance of validation. False match rate is extremely low using current commercial iris recognition algorithm(John Daugman's IrisCode). It should not be confused with retina scan/biometrics. Iris identification, unlike retina scan uses a non-intrusive camera image to capture the iris. It uses either Near Infrared Light(NIR 700 - 900 nm), Visual Wavelength(VW 400 - 700 nm) or a combination of both(an alternative approach to multi-modal systems) NIR advantage: non-intrusive and can penetrate dark coloured irides to obtain features and reduces contamination by blocking reflections off of the cornea. Disadvantage: pigmentation is not shown, black and white image VW reveals the pigmentation if the iris, providing rich details in the form of shape patterns To compensate for pupil dilation, the rubber sheet model is used to normalize the image

Needs for biometrics(general): Rapid development of technology Globalization Hardware: Digital camera using ISO/IEC Standard compliant enrollment/recognition image ranging from 1.2 mp to HD quality video capture. Also some cameras capture in both NIR and VW using its own light source.( ISO/IEC Standard: uses a polar image specification with specific segmentation and processing steps) Some systems come with embedded pc with interfaces while others connect directly to a computer Large systems are sometimes coupled with blade servers for faster iris matching/processing. In some cases such as mobile devices, memory cards are used to transferring data. FPGA boards are used in some cases for real time application.(speed and portability)

Software: Linux Custom sdk using patented iris recognition and matching algorithms eg: 1. IrisCaptureTM 2. EYEnessTM 3. FaceDetectTM 4. EyeDetectTM 5. Iris ID Velocity Measurement Databases such as SQL Lite

Advantages: Less likelihood of the iris getting damaged because it is situated behind the eyelid, cornea and the aqueous humor. Means that it is a good form of identification. No direct contact with the individual and the camera technology needed, which is acceptable in environments where gloves and other suits must be worn at all times. Non intrusive Speed of enrolling and verification is small(approx. 8 seconds for entering a new person and 2 seconds for authentication) Con be performed from a distance and even while an individual is in motion.

Shortcomings: Some systems, if shown an image of an iris will accept it as an actual person requesting authorization.(to over come this, the system may capture a video image and look for eye movement and pupil dilation as a means of verifying that it is an actual person.) May need a personnel overseeing operation to prevent above point Concerns about government using the technology to track people beyond their will.

Scientist have tricked scanners by obtaining digital codes of stored irises and producing an image from it. There is the possibility of poor image due to random factors FRR is increased if certain surgeries are done on the eye, eg cataract surgery.

Attacks: Spoofing:Attacks on the iris fall into the following categories: Attacking the physical iris Using artifacts Attacking the communication Compromising the template Attacking the fallback system

Applications: Contrasts: Unlike the retina the iris is not affected by diabetes, glaucoma or retinal degenerative diseases. Thus making iris biometric technology a more viable choice of ocular-based technologies. It is non-intrusive as with retinal scanning, in the fact that no light has to be directed to the inside of the eye to illuminate the posterior of the eye Iris scanning can be done from a larger distance and is non-intrusive as compared with other technologies It has a high entropy (not sure what the value is) the probability of finding 2 matching irises is estimated at 1 in 1078 chances. False acceptance rate is 1 in 1.2 million and no human interaction is needed to set the thresholds. Airports, as a form ad ID/Passport(implemented in some European countries such as Netherlands, Germany and England). High security facilities, such as defense ministries, government institutions and other institutions and handle sensitive materials and information. An alternative to token based forms of id, as in India for example, the Indian government is implementing the largest application of iris recognition as a form of id(1.2 billion people)

Comparisons: Like some other biometric technologies, it is physiological

Das könnte Ihnen auch gefallen