0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
7 Ansichten40 Seiten
Biometric technologies have been considered for use within the military, including facial reorganisation, iris scanning, finger scanning and voice verification. Iris scanning was deemed to be the most suitable current biometric technology to meet battlefield requirements. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.
Biometric technologies have been considered for use within the military, including facial reorganisation, iris scanning, finger scanning and voice verification. Iris scanning was deemed to be the most suitable current biometric technology to meet battlefield requirements. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.
Biometric technologies have been considered for use within the military, including facial reorganisation, iris scanning, finger scanning and voice verification. Iris scanning was deemed to be the most suitable current biometric technology to meet battlefield requirements. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.
Identification and verification of authorised users in a military context can sometimes be
a matter of life or death and it is therefore essential that systems be accurate, reliable and robust .the need for positive identification of user in a military context is well recognised. The use of passwords or pass phrases comprising of various phases has the potential for compromise. The use of different passwords for different systems, together with requirement of change of passwords at regular interval often exacerbates the problem, particularly when system is used infrequently or is widely dispersed. It is widely accepted that recollection of long password is challenging within the office environment, failure to recollect multiple passwords within the stressful battlefield environment could risk of critical system failure. Cost of management of forgotten passwords, lost or stolen passwords and smartcards, coupled with deceasing cost of biometric equipment within the past five years, has meant the biometric technologies are now a viable consideration. Various biometric technologies have been considered for use within the military, including facial reorganisation, iris scanning, finger scanning and voice Verification. Iris scanning was deemed to be the most suitable current biometric technology to meet battlefield requirements due to the wide variety of environments in which the military operate , and the equipment and clothing that they are required to wear for protection e.g. !C suits, flash masks, oxygen masks etc" an iris scanning system has already been piloted in the #$.
1 CHAPTER - 1 INTRODUCTION 1.1 Introduction "Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological sciences Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometrics is the term given to the use of biological traits or behavioral characteristics to identify an individual. Their traits may be Fingerprints, Hand geometry, Facial geometry, etina patterns, !ris patterns, "oice recognition, and Hand#riting recognition as sho#n in figure 1.1 The biometric technologies are becoming the foundation of an e$tensive array of highly secure identification, personal verification and access solutions. % Biometrics system is basically a pattern recognition system, including all the hard#are and associated soft#are and the interconnecting infrastructure, enabling & identification by matching a live sample to a stored pattern in a database. Biometrics is irrevocably tied to the individual. %n important issue in designing a practical biometric system is to determine ho# an individual is recognized. 1.2 Motivation The pressure on today's system administrators to have secure system are ever increasing. (ne area #here security can be improved is in authentication. !ris ecognition, a biometric provides one of the most secure methods of authentication and identification. Than)s to the uni*ue characteristics of !ris. The main re*uirements of !ris ecognition system can be summarized as follo#s + The recognition system is most secure system. !t is a good method of %uthentication to replace the current methods of pass#ords, to)en cards or ,!-s. !t is very useful in areas such as information security, physical access security, %T.s and airport security. !t is most accurate #ith very lo# false acceptance and false re/ection rates. !ts ability is to perform one0to many search #ithout any limit on the database. But, it is not easy tas) to cater the above re*uirements. The challenge stems mainly to scan iris from a distance. !t is a moving target and can be obscured by ob/ects such as eyelids and eyelashes. %lso, there is difficulty to read iris of blind persons or persons #ho have cataracts. 1 CHAPTER - 2 BIOMETRICS
2.1 Deinition o BIOMETRICS Biometrics is automated methods for identifying a person or verifying the identity of a person based on psychological and characteristic behavioural. Biometrics scanning is used for t#o ma/or purposes+ identification and authentification %uthentification + do ! )no# #ho you are2 3 (ne to many !dentification+ !s you #ho you claim to be2 (ne to (ne Biometric scans are more accurate, ma)e it difficult to mas*uerade, and generally re*uire less of the user than standard security measures such as pass#ord protection. Biometric technology uses the measurements of a uni*ue attribute or feature in order to distinguish that person from all others. 4haracteristic fall into t#o categories+ 1. ,hysiological or &. Behavioral Behavioral biometric systems tend to be less e$pensive than physiological systems but also less robust. Behavioral characteristic can be dra#n from the dynamic attributes of the user5 ho#ever these features may not necessarily be uni*ue to one individual. 2.2 Dierent Bio!etric" Met#od" Before going to the different Biometrics .ethods, some common terms re*uired are as follo#s. 6ith all biometric systems there are to# error rates that need to be ta)en into consideration. 7 2.2.1 So!e Co!!on Ter!" $RR + False e/ect ate occurs #hen the biometric measurement ta)en from the live sub/ect fails to match the template stored in the biometric system $AR + False %ccept ate occurs #hen the measurement ta)en from the live sub/ect is so close to another sub/ect's template that a correct match #ill be declared by mista)e. CER + 4rossover 8rror ate The point at #hich the F and F% are e*ual is )no#n as the 4rossover 8rror ate. The lo#er the 48, the more reliable and accurate the system. Univer"a%it& + .eans that each person should have the biometric. Di"tinctivene"" + #hich indicates that any t#o persons should be sufficiently different !n terms of their biometric identifiers. Per!anence + #hich means that the biometric should be sufficiently invariant over a period of time. Co%%ect a'i%it& + 6hich indicates that the biometric can be measured *uantitatively. Peror!ance+ #hich refers to the achievable recognition accuracy, speed, as #ell as operational or environmental factors that affect the recognition accuracy and speed. There are *uite a fe# different biometric identification methods available today. These methods can be divided into t#o main categories, namely Behavioural0 and ,hysiological methods. Behavioural methods try to identify some sort of behaviour that is typical for a user. !t could be the #ay someone uses a pen #hile #riting, the #ay someone presses the )eys on a )eypad #hen entering a ,!- code etc. ,hysiological methods on the other hand, try to identify some sort of physical trait that is typical for a user. 8$amples of these traits could be fingerprints, the iris, the retina etc. 9 2.( P#&"io%o)ica% c#aracteri"tic Biometric technologies #hich have been considered for military purposes include the Follo#ing +0 ,hysiological technologies+ 1. Facial scanning 0&:, 1:, thermographic &. etinal scanning 1. !ris scanning 7. Finger scanning ;fingertip, thumb, length, pattern 9. ,alm scanning ;print, topography <. Hand geometry 2.* Be#aviora% c#aracteri"tic +
8$amples of behavioral biometric technologies include+ 1. "oice prints &. :ynamic signature verification 1. =eystro)e dynamics 2., C#oice o Bio!etric % biometric should al#ays be used as a supplement to traditional security policies and not as a replacement. 4hoice of biometric technology should also include consideration of the follo#ing parameters, ta)ing into consideration the operational re*uirements defined by .o:+ %ccuracy 8nvironment e.g. fully deployed battlefield 8rgonomics> ?ser0friendly @tability and uni*ueness of feature to be measured @ecure < @afety @peeds of enrolment of recognition -on0intrusiveness 4onvenience 4ost @ize of stored template obust Humans acceptance 4redible scientific bac)ground research (perational limitations e.g.. Finger and facial recoganisation through nuclear Biological chemical >chemical Biological radiation clothing e*uirement >ability to perform both identification and verification
%fter consideration of all above biometric technologies five biometric properties #ere further researched i.e. iris scanning , spea)er verification and authentication ,hand and finger scanning and facial reorganisation . 2.- .e&"tro/e D&na!ic" =eystro)e :ynamics is a pure soft#are solution and can be described as an e$tension to regular pass#ords and ,!- codes. 6hen the user enters a pass#ord or a ,!-, the dynamics of the typing can be used as a behavioral biometric. =eystro)e dynamics systems analyze the time it ta)es for a user to find the )eys on the )eypad, the amount of time the different )eys are pressed and the speed the user is typing #ith. This method is used mainly because it re*uires no e$tra hard#are and therefore is a lo#0cost alternative to other biometric systems for increased security. %s one can imagine, this method is very sensitive to changes in the mood of the user. For e$ample, if the user is stressed the typing dynamics #ill be a lot different to #hen the user is tired. %lso, the typing dynamics #ill change a lot over time as the users get more and more used to typing their pass#ords. %nother problem is that if the user enters the pass#ord less fre*uently, say once a #ee), the typing dynamics #ill also #ary very much bet#een the times. This type A of biometrics system is therefore most suitable for users that are #ell familiar #ith their pass#ords and are located in a stable environment. For e$ample, users #or)ing on their des)top computer every day. @ince the performance of this method is highly dependent on #hat the current application is and on the level of e$perience of user group, there are no relevant 48 values to report on )eystro)e dynamics systems. 2.0 Si)nature 1eriication @ignatures have been used to verify transactions for centuries and are therefore a #ell0 established method. %utomatic signature verification systems do not only e$amine the appearance of the signature, they also e$amines the dynamics of the #riting. Ho# hard is the pencil pressed against the surface during different phases of the signature2 Ho# fast are the different letters #ritten2 Ho# long time does it ta)e to #rite the #hole signature2 Ho# and #hen is the letter 3t crossed2 There are also several more behavioural biometrics that can be used to verify a user identity using signatures. 2.2 1oice 1eriication "oice verification systems analyze the #aveforms and air pressure patterns produced #hen a person tal)s into a microphone. "oice verification can be said to be a combination of a physiological and a behavioural method. ,hysiological because the construction of a persons vocal chords, vocal tract, palate, teeth, sinuses and tissue inside the mouth #ill effect the #ay a person's voice #ill sound. (ne of the problems #ith voice verification is bac)ground noise. !t is hard to separate the voice sample from the noise, especially in a mobile environment #here the bac)ground noise is very dynamic. (ne #ay to get around this problem is to ma)e the user hold the microphone close to the mouth by designing it li)e a phone handle. "oice verification has been used for several years and it has the advantage of being familiar to users. ,eople are used to tal)ing into microphones and are not intimidated by the thought of leaving voice samples in databases. There are several application areas for voice verification, one being mobile phones. The necessary hard#are is already available, so the cost #ill be minimal. %lso, the users are familiar #ith the concept of tal)ing into microphones so they should have a positive attitude to#ards the technology. B 2.3 $in)er4rint reco)nition Fingerprint identification has been in e$istence forever 1CC year. Finger scanning e$ploits the uni*ue characteristics of the fingerprint called .!-?T!%8 i.e. #horls, arches, loops, ridge and bifurcations D#here ridges splitE, ridge patterns, angles in the print and the distance bet#een specific sites. There are up to 1CC minutiae in a full fingerprint but most systems ta)e only 1& for verification >recognisation. it is these characteristic , and not the image that are than stored mathematically on the template .some )eyboards are no# supplied #ith the identification device embedded in the )eyboard . There are t#o categories of finger scanning systems+ %F!@ ;automatic finger identification systems and verification systems. %F!@ applications can be divided into t#o types+ forensic %F!@ systems, #hich optically capture the image of all ten digits Dpossibly in a hostile and uncooperative environmentE and civil %F!@ systems, #hich capture the image of a fe# digits on a flat surface. %lthough %F!@ systems use optical capture e*uipment there are actually three types of scanners to enable verification+ 1. (ptical scanning #hich captures the image of the print by of 44: sensor, and an arrangement of lenses and prisms. &. ?ltrasound scanning #hich is able to penetrate through solid ob/ect t o produces the re*uired image. 1. 4hip based finger scanning #hich re*uires the user to place their directly on the platen5 one techni*ue measures the electrical field, bet#een the finger and the e*uipment using a modified 4.(@ sensor array. F
2.15 Hand 6$in)er 7eo!etr& 1eriication Hand >Finger Geometry "erification can be divided into the three categories+ 1. Hand Geometry &. @ingle ;Finger Geometry 1. T#o0 Finger Geometry 8nrolment to use the hand geometry biometric involves positioning the hand on a platen #ith the assistance of five guide pegs and position lights. FC characteristics are included in the captures image, including the 1: shape of the hand, length, thic)ness, surface area, hand and finger #idth, and )nuc)le shape. % 1&CCC ;pi$el 44: digital camera captures the image of the top of the hand5 the side vie# is captures by virtue of a 790degree mirror. :etails such as fingerprints, lines, scars, nails and dirt are not included in the template. @ingle ;finger geometry involves placing the digit into a plunger and pushing for#ard into the scanner. ollers circulate the digit measuring 1& cross sections over a 1.9'' area. For t#o0finger geometry the user positions the inde$ and middle finger on the platen. The template is updated at each reading thereby accommodating gro#th and #eight and gro#th changes. 1C 2.11 $acia% Reco)nition &: facial recognition technology uses a 44T" camera to capture the image of the user's face, #hich is then stored as a &: barcode. The gro#th in video conferencing has brought do#n the price of standard video cameras5 some ,4s are produced #ith built0in cameras. To enable facial recognition the geometry of the face is analyzed5 e.g. the distance bet#een the eyes H nose, temple to temple H chin to hairline. @ystems can accept photographs, video Dlive>recordedE H digital video files. "endors claim the technology is able to locate a face in a live video stream using colour, motion and pattern matching algorithms5 that face is then compared to those stored in the databases. The technology claims to account for beards, glasses H hats although these variables together #ith severe head, tilting, can cause false re/ect. 1: facial recognition uses patterned light. .easurements of angles H distances bet#een features are ta)en e.g. distance bet#een eye H nose and the bone structure around the eyes. The 1: representation of the facial surface is built around the data captured H neural net#or)s enable the system to recognise changes in facial e$pression, the #earing of glasses H beard gro#th. Facial thermography is a relatively ne# biometric technology, 11 currently in the development. This technology uses an inferred camera to perform measurements on the uni*ue thermal pattern of blood flo# in arteries H veins. The camera is directed at an area of & by & on the face, #hich is termed a Ivascular tattoo'. Facial thermography technology is still in need of further development H #ill possibly be used for access control, smart surveillance, and computer security, medical imaging, long0range identification etc. Facial recognition #as considered as unsuitable disfigurement of facial features e.g. cuts H burns camouflage paint and protective clothing #ould not allo# recognition. 2.12 Retina% Scannin) !n 1F19, #hen studying eye diseases, doctors found that the vascular patterns of the human retina are relatively stable and uni*ue. @ubse*uently they published a paper suggesting the potential of using retinal photographs for identification purposes. The leading vendor of retinal scanning products started developing their products in the late 1FACs and has continued refining their products ever since. The retinal scanning devices are )no#n for their lo# F% and have therefore been used for years in very high security facilities. "endors report a 48 of 1+1C.CCC.CCC for retinal verification systems . The verification procedure #or)s by using a lo# intensity light source to ta)e a 1<C scan of the retina. The scan includes over 7CC readings. The scanned vascular patterns are then reduced to 1F& reference points from #hich in turn a template of F< bytes is produced. The #hole verification process ta)es about 1.9 seconds. The scanners are unfortunately not very user0friendly. The device is usually #all0 mounted, #hich in turn means that at least some of the users #ill be uncomfortable using it since there is no #ay to mount the device on a height that fits all. %lso, the user has to remove any spectacles before using the scanner, #hich in some situations can be a hassle. The first models also re*uired the user to be in physical contact #ith the device, but the ne#er ones have solved this problem. There are 1& also some problems #ith user acceptance, people in general could be afraid that the light source scanning the retina might damage their eye. 2.1( Co!4ari"on o Dierent Bio!etric" S&"te! Biometric !dentifier ?niversality :istinctiv eness ,ermanence 4ollect ability ,erformance =eystro)e J J J . J @ignature "erification J J J H J "oice . J J . J !ris H H H . H Fingerprint . H H . H Face H J . H J atina H H . J H H + High . +.edium J +Jo# CHAPTER - ( Iri" Scan" Tec#no%o)& Hi"tor& 11
(.1 Hi"tor& !n 1F19 an article appeared in the ew %ork &tate 'ournal of (edicine suggesting that the pattern of blood vessels on the retina could be used to identify an individual. @ince then, there has been e$tensive research dealing #ith the patterns and the uni*ueness of the human eye, particularly the iris and retina. !n 1FBA, :rs. Jeonard Flom and %ram @afir #ere a#arded the patent for researching and documenting the potential of using the iris as a uni*ue identifier, and three years later D1FFCE, they incorporated their company 0 !ris @can Dno# !ridian Technologies of .arlton, -e# Kersey and Geneva, @#itzerlandE. Ho#ever, the man responsible for the development of the actual iris scanning technology is credited to :r. Kohn :augman, #ho developed the mathematical formulas used to measure the varying characteristics of oneLs iris at 4ambridge ?niversity of 8ngland in 1FF7. (.2 Iri"-Scan+ Ho8 it 9or/" '& Dr. John Daugman's )r. 'ohn )augman*s work in iris recognition forms the basis of this information. Information and images found on his website, http+,,www.cl.cam.ac.uk,users,-gd.///, are presented below. !ris recognition leverages the uni*ue features of the human iris to perform identification and, in certain cases, verification.
M 17
(.( T#e Iri" !ris recognition is based on visible Dvia regular and>or infrared lightE *ualities of the iris. % primary visible characteristic is the trabecular mesh#or) Dpermanently formed by the Bth month of gestationE, a tissue that gives the appearance of dividing the iris in a radial fashion. (ther visible characteristics include rings, furro#s, frec)les, and the corona, to cite only the more familiar.
19 Iris scan technology is based on the algorithms developed and patented by :r. Kohn :augman. %n iris has more then 7CC distinguishing characteristics that can be used to authenticate someone's identity. %ppro$imately &<C of these characteristics are e$tracted from a captured iris, i.e. si$ times more then from a captured fingerprint. These characteristics are contraction furro#s, striations, pits, caliginous fibres, filaments, crypts Ddar)ened areas on the irisE, serpentine vasculature, rings, and frec)les. ,robability that t#o irises produce the same mathematical model is one in ten to the ABth po#er. There are t#o different iris scan systems+ manual and automatic. Manua% "&"te! re*uires the user to move a fe# inches for#ard and bac)#ard #ithin a predefined distance to enable the system to locate and focus an iris. %utomatic iris scan systems use a series of cameras to locate and focus an iris automatically. The user has only to be #ithin a predefined distance. %n iris recognition camera ta)es a blac) and #hite picture from 9 to &7 inches a#ay, depending on the type of camera. The camera uses non0invasive, near0infrared illumination Dsimilar to a T" remote controlE that is barely visible and very safe. ,roof ,ositive certified cameras are in compliance #ith all applicable international illumination safety standards, including %-@!>!8@-% ,0&A.10F< and !84 <CB&901 %mend.&, 4lass 1 J8:. These are the latest #orld#ide standards. ?nli)e other biometric technologies that can be used in surveillance mode, iris recognition is an opt0in technology. !n order to use the technology you must first glance at a camera. !ris recognition cannot ta)e place #ithout your permission. !n less than a fe# seconds, even on a database of millions of records, the !ris 4ode template generated from a live image is compared to previously enrolled ones to see if it matches any of them. The decision threshold is automatically ad/usted for the size of the search database to ensure that no false matches occur even #hen huge numbers of !ris 4ode templates are being compared #ith the live one. 1< @ome of the bits in an !ris 4ode template signify if some data is corrupted Dfor e$ample by reflections, or contact lens boundariesE, so that it does not influence the process, and only valid data is compared. :ecision thresholds ta)e account of the amount of visible iris data, and the matching operation compensates for any tilt of the iris. % )ey advantage of iris recognition is its ability to perform identification using a one0to0all search of a database, #ith no limitation on the number of !ris 4ode records and no re*uirement for a user first to claim an identity, for e$ample #ith a card. !ris recognition is the most po#erful biometric technology there is. -othing else comes close. -othing. .ost accurate @calable (pt0in -on0contact !nteroperable cameras
1A CHAPTER - * 9#at I" Iri" Scannin)
*.1 9#at i" Iri" Scannin) ? %n iris scanner is a camera that ta)es a picture of the surface of the eye.
*.2 Ho8 Doe" Iri" Scannin) 9or/ 2 The eye is illuminated by light0emitting diodes that surround the camera. The diodes emit in the visible light spectrum. The scanner is -(T a laser0retinal scanner so there are no laser eye hazards. !ris identification uses standard video cameras N the same )ind you #ould use to videotape your family N to ta)e a picture of the iris of your eye. !t does not use lasers and, therefore, has none of the inherent ris)s associated #ith lasers. *.( 9#ere i" Iri" Scannin) Done: !nitial enrolment is performed #ith an iris scanner in the .ain 4ontrol oom D.4E. !ris scan readers are located in the e$perimental halls and counting houses at H!4 e$perimental areas. (nce enrolled, you may use the local iris scanner in the counting house to obtain a )ey to enter the intersecting region D!E in 4ontrolled %ccess mode Dnote+ 4ontrolled %ccess mode is further e$plained in 4ollider0%ccelerator ?ser 1B TrainingE. !ris scanning technology has been used in this same #ay for the past t#o years in Building F1& by the -%@% e$perimenters at %G@. *.* 9#at i" Iri" Reco)nition+ 6hile recent advances in modeling and rendering have generally facilitated the production of realistic imagery, certain specialized modeling and rendering tas)s remain difficult. (ne such challenge is presented by the human eye, #hich e$hibits intricate detail in the iris that is comple$ enough to serve as an alternative to fingerprints for personal identification. (ne of the biggest challenges in realistic rendering )no#s #hat features of a model are important for realism, and #hat can be ignored.
!ris recognition is a procedure for physical iris synthesis that results in eyes #ith all the important appearance characteristics of real eyes. !n this, it presents an approach that enables users other than trained oculists to create a realistic loo)ing human eye, paying particular attention to the iris. Figure 1.1+ !ris 1F
!ris scan biometrics employs the uni*ue characteristics and features of the human iris in order to verify the identity of an individual. The iris is the area of the eye #here the pigmented or colored circle, usually bro#n or blue, rings the dar) pupil of the eye. !ris recognition is based on comparing patterns in the iris 0 the e$terior, visible colored part of the eye. The inner edge of the iris is located by an iris0scan algorithm, #hich maps the iris' distinct patterns and characteristics. %n algorithm is a series of directives that tell a biometric system ho# to interpret a specific problem. %lgorithms have a number of steps and are used by the biometric system to determine if a biometric sample and record is a match. The process is based on the uni*ue nature and the e$treme richness of the human iris. The multiple contraction furro#s, collagenous fibers, crypts, coronas, striations, serpentine vasculature, frec)les, rifts, and pits produce a non0duplicable organ #ith more than 7CC measurable variables !ris' are composed before birth and, e$cept in the event of an in/ury to the eyeball, remain unchanged throughout an individual's lifetime. !ris patterns are e$tremely comple$, carry an astonishing amount of information and have over &CC uni*ue spots. The fact that an individual's right and left eyes are different and that patterns are easy to capture, establishes iris0scan technology as one of the biometrics that is very resistant to false matching and fraud. The false acceptance rate for iris recognition systems is 1 in 1.& million, statistically better than the average fingerprint recognition system. The real benefit is in the false0re/ection rate, a measure of authenticated users #ho are re/ected $eature" o Iri" reco)nition S&"te! + .0 1ccurate+ The accuracy can be achieved using follo#ing characteristics+0 ?ni*ueness+ False acceptance ratio+ &C (ne iris template contain more data than is collected in creating templates for finger ,face and hand combine. %nd this is the main reason #hy iris recognition can authenticate #ith confidence even #hen significantly less than the #hole eye is visible. &E Stability+ The iris image remains stable from the age of about 1C months up until death. This means that an iris image need only be captured once and does not need to be updated. (ther biometric measures change over time. Hands and fingers gro#, our voices change, our s)in degrades and other biometric measures are sub/ect to labour, health, genetics, climate and age. 6hat this means is that the performance of such systems is unreliable and fre*uent re0 enrolments are re*uired to accommodate these changes. 4onversely, barring surgery or e$tensive trauma, the iris template does not change over time. 20 on3invasive+ ?sers #earing gloves, protective #ear, glasses, safety goggles and even contact lenses can operate iris recognition systems. -o contact is re*uired #ith a touch pad or screen meaning that iris recognition is ideal in environments #here hygiene is at a premium. !t is also important to note that iris recognition is a completely separate technology to retinal scanning. -o bright lights or lasers are beamed into the eye, only a digital photograph is ta)en. This means that not only is iris recognition the most accurate biometric technology, it is also the safest. 40 5lexibility+ 8asily integrates into e$isting security systems or operates as a stand alone. 60 7eliable+ The iris pattern is not susceptible to theft , loss or compromise. 80 &mallest outlier population+ There are relatively fe# people #ho don't have at least one eye so there are chances #here blind people have used iris recognition successfully. &1 90 #nparalleled+ (nce a sub/ect is enrolled the need to re0enrolled other biometrics in identification option. :0 ;ighly protected <0 Changing pupil si=e confirms natural physiology.
:oes it #or) #ith glasses and contact lenses2 ,erformance depends on ac*uiring a good image of the iris structure, for this reason it is recommended the users remove their glasses #hen registering their iris. 4ontact lenses and glasses do not obscure the iris so the system is able to perform through them. 8yeglasses and contact lenses present no problems to the *uality of the image and the iris0scan systems test for a live eye by chec)ing for the normal continuous fluctuation in pupil size. !s iris capture safe2 There are no health ris)s associated #ith iris recognition. !ris recognition simply uses a video camera to ta)e a blac)0and0#hite picture of your eye. There are no flashes or bright lights as the camera uses lo#0level infrared illumination. The lo#0level infrared illumination is similar to #hat is used in T" remote controls. The iris0scan process begins #ith a photograph. % specialized camera, typically very close to the sub/ect, no more than three feet, uses an infrared imager to illuminate the eye and capture a very high0resolution photograph. This process ta)es only one to t#o seconds and provides the details of the iris that are mapped, recorded and stored for future matching>verification. !ris identification uses standard video cameras N the same )ind you #ould use to videotape your family0 to ta)e a picture of the iris of your eye. !t does not use lasers Dli)e the ones used in bar code scanners you might see at the grocery storeE and therefore has none of the inherent ris)s associated #ith lasers. Typically, identification time averages about t#o seconds. % )ey differentiator for iris recognition is its ability to perform identification using a one0 && to0many search of a database, #ith no limitation on the number of !ris ,attern records contained therein. (nce in the database, a ,rocessed !ris ,atterns can be used as a basis for identification, enabling comparison bet#een an !ris ,attern captured at an access point or a des)top ,4 against ,rocessed !ris ,attern records stored in the database. &1 CHAPTER - , Iri" Scan"
Iri" "can"
%n iris0based biometric involves analyzing the features in the coloured ring of tissue that surrounds the pupil. !ris scanning is even less intrusive than retinal scans. They do not re*uire the individual to be in close contact #ith the reader. (ften considered an emerging technology, there are a fe# technical challenges. Jight, distance resolution, and contrast must be balanced to ensure accuracy and reliability. !f there is lo# light, the lens aperture of the camera must be opened #ider. This creates a depth of field problem #here precise focusing is re*uired. !f light is provided to overcome the problem the individual is sub/ected to intense light and might perceive the system as unfriendly. %nother problem associated #ith this technology is the iris itself. !t is relatively stable and immune to changes during adulthood, but it does vary some#hat during adolescence. The city hospital of Bad eichenhall in Bavaria uses iris scanning to control access to the infant care centres to prevent )idnappings. &7 !ris recognition is based on visible Dvia regular and>or infrared lightE *ualities of the iris. The iris is sampled using a conventional 44: camera. ,rimary visible characteristic is the trabecular mesh#or), a tissue that gives the appearance of dividing the iris in a radial fashion. (ther visible characteristics include rings, furro#s, frec)les, and the corona. !ris scans, at only 91& bytes in size, are an amazingly rich source of data, yielding 1.7 bits of data per s*uare mm from an 11 mm diameter iris. This density of information is such that each iris can be said to have &<< uni*ue "spots", as opposed to 110<C for traditional biometric technologies. 8ven after allo#ing for algorithmic correlation functions and screening criteria common to most human irises, there are 1A1 independent binary degrees of freedom usable to uni*uely identify an iris. ,.1 Ho8 Iri"6Retina% Scannin) 9or/" Though iris and retinal scans both deal #ith the human eye, the processes in #hich they are done are e$tremely different. The iris Dthe coloured portion of the eyeE consists of over 7CC distinguishing characteristics that can be *uantified and used to identify an individual. Ho#ever, only about &<C of those are captured in a "live" iris identification process by using such characteristics as contraction furro#s, striations, filaments, crypts Ddar)ened areas on the irisE and frec)les D/ust to name a fe#E. !n identifying oneLs iris, there are t#o types of methods that are used by iris identification systems that are defined as passive and active. The active iris system method re*uires that a user be any#here from si$ to 17 inches a#ay from the camera. !t also re*uires the user to move bac) and forth so that the camera can ad/ust and focus in on the userLs iris. The passive system differs in that it allo#s the user to be any#here from one to there feet a#ay from the incorporated series of cameras that locate and focus in on the iris. There are four simple steps that follo#+
1. % person stands in from of the iris identification system, bet#een one and three feet a#ay, #hile a #ide0angle camera calculates the position of they eye. &9 &. % second camera zooms in on the eye and ta)es a blac) and #hite image. 1. (nce the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dar) areas, li)e and "eye print". 7. The captured image, or "eye print" is chec)ed against a previously stored reference template in the database.
etinal @can technology maps the capillary pattern of the retina, a thin nerve on the bac) of the eye. The sub/ect is re*uired to )eep his or her head and eye motionless #ithin a half0inch of the device, focusing on a small rotation point of green light, because it ta)es a minimum of five scans to enrol D#hich ta)es about 79 secondsE. !nfrared light is used because blood vessels on the retina absorb the light faster than the surrounding eye tissue. % video camera captures the retinal pattern and translates it into data that is 19 bytes in size. ,.2 B%oc/ Dia)ra! o Iri" Reco)nition S&"te! &<
Figure + Bloc) :iagram (f !ris ecognition @ystem Bloc) :iagram :escription+ 1E !mages of an iris are ta)en from camera >database and are further recognized by !mage ,rocessing %lgorithms. &E Gray @caling+ 0 Gray0scaling is the process of converting a continuous0 tone image to an image that a computer can manipulate. 8ach pi$el location has a value. This value is the gray level of the pi$el. The gray level represents the brightness or dar)ness for the given pi$el. 1E 8dge :etection+ 0 8dges characterize boundaries and are therefore a problem of fundamental importance in image processing. 8dges in images are areas #ith strong intensity contrasts ; a /ump in intensity from one pi$el to the ne$t. &A I!a)e Ac;ui"ition 7RA< SCA=IN7 Pattern Matching Iris
THINNIN7 PROCESSE D IMAGE FROM DATABASE USER ACCESS 7RANTED6DENIED ED7E DETECTIO N 8dge detecting an image significantly reduces the amount of data and filters out useless information, #hile preserving the important structural properties in an image.
7E Thinning+ 0 Thinning is a morphological operation that is used to remove selected foreground pi$els from binary images. !n this mode it is commonly used to tidy up the output of edge detectors by reducing all lines to single pi$el thic)ness. Thinning is normally only applied to binary images, and produces another binary image as output. The thinning operation is related to the hit0and0miss transform 9E ,attern .atching+ 0 ,attern matching is a method of identifying features in an image that match a smaller template image. ,attern recognition is the research area that studies the operation and design of systems that recognize patterns in data. !t encloses sub disciplines li)e discriminant analysis, feature e$traction, error estimation, cluster analysis Dtogether sometimes called statistical pattern recognitionE, grammatical inference and parsing. Having localized the region of an ac*uired image that corresponds to the iris, the final tas) is to decide if this pattern matches a previously stored iris pattern &B ,.( $%o8 C#art o Iri" Reco)nition S&"te! + ,.* Identiication 1" Aut#entication ,.*.1 Bio!etric Identiication Biometric identification is a sophisticated variation on a to)en0based, single0factor security scheme. !n this case, the to)en is some physical attribute of the person00fingerprint, iris, retina, face, vein pattern, etc. Biometric identification systems typically follo# three high0level processing steps. First, the system must ac*uire an image of the attribute through an appropriate scanning techni*ue. D@pecific techni*ues are described in greater detail belo#.E (nce the scanned content is ac*uired, it must be localized for processing purposes. :uring this step, &F e$traneous informational content is discarded and minutiae are isolated and turned into a template> a sort of internal canonical form for matching attributes stored in a database. .inutiae are the uni*uely differentiating characteristics of the biometric attribute. 6horls and loops and their relationship to one another on a fingerprint are and e$ample of the minutiae that might be e$tracted. Finally, templates stored in the database are searched for a match #ith the one /ust presented. !f a match is found, the identification is a success and the succeeding steps of the security process can begin. Figure +Biometric !dentification ,rocess ,.*.2 Bio!etric Aut#entication Biometric authentication virtually eliminates the ris) of anonymity in a t#o0 factor security scenario by using a physical attribute of the person to authenticate a to)en. The process is similar to biometric identification. First, the re*uestor presents a to)en to assert identity. For e$ample, an %T. or credit card is inserted into a reader. D% number encoded on the card is actually the to)en5 the card is more li)e a container for the to)en, but treating the card, as a to)en is appropriate.E %s #ith identification, the system must ac*uire an image of the personal attribute. @econd, the attribute must be localized> minutiae e$tracted, and a matching template created. Finally, the value of the to)en is used to loo) up the template 1C previously stored for this individual. !f it matches the template presented on this occasion, the re*uestor is authenticated. Figure+ Biometric %uthentication ,rocess CHAPTER - - 11 Iri" Scan" I""ue" and =i!itation"
-.1 Conidentia%it& I""ue" -o video image of the iris is retained. !nstead the eye pattern is converted into a 91& byte !ris 4ode record. The !ris 4ode is hashed and encrypted as a security measure. The !ris 4ode and !ris 4ode records are under the control of a single individual in the 4ollider0 %ccelerator :epartment's D40%:E %ccess 4ontrols Group and are behind the fire#all. Bac)up 4:0 copies are loc)ed in a safe. There are no paper records. %n !ris 4odeO record is based on &7A independent variables that are measured for each iris. (nce the iris variables are measured, they are converted to a 91&0byte template, #hich is the patented !ris 4ode record. The !ris 4ode record is immediately encrypted, and cannot be reverse0 engineered into an image of the iris. @ince an !ris @can ecord cannot be used to re0construct an image of an iris, the only personal information being stored by B-J is a personLs name and guest>life number. =i!itation" 1. 8very user must be enrolled, &. 8ach des)top re*uiring security must be 6indo#s0based and have a 6eb camera. 1. Things such as dirty glasses and bad lighting can slo# authentication. These limitations ma)e the %uthenticam usable only on #or)stations for #hich administrators need the most intense protection. The %uthenticam is pac)aged to secure individual #or)stations, and installation #as fairly simple. 6e set up an %uthenticam on a 6indo#s &CCC system #ith 91&.B of %. and a 1GHz processor. ,anasonic recommends a ,entium0class 111.Hz or greater system running 6indo#s FB, 6indo#s .8 or 6indo#s &CCC, #ith at least <7.B of %.. 1& The camera plugs into a ?niversal @erial Bus port, and the soft#are and drivers should be loaded before installation of the hard#are. Beneit to Iri" Scannin) 4ontrolled %ccess mode is re*uested several times a #ee) during H!4 runs for tuning>repair of detector e*uipment or accelerator components. The use of an iris scanner #ill save hours of .4 operator time and increase overall machine running time. Beneit" o U"in) Iri" Tec#no%o)& The iris is a thin membrane on the interior of the eyeball. !ris patterns are e$tremely comple$. ,atterns are individual Deven in fraternal or identical t#insE. ,atterns are formed by si$ months after birth, stable after a year. They remain the same for life. !mitation is almost impossible. ,atterns are easy to capture and encode Re%ative Advanta)e" 4ompared to other biometric technologies, iris scanning+ is the least intrusive of the eye related biometrics, re*uiring no intimate contact bet#een user and reader has been demonstrated to #or) #ith spectacles #or)s on a variety of ethnic groups is highly accurate Dsee belo#E can #or) in identification mode Ddue to the data richnessE, potentially avoiding the need for any to)en identity claims %pplications are being developed by third party integrators, #hich should increase the use of iris scanning technology in the near future. Re%ative Di"advanta)e" 11 The main disadvantage of iris scanning is light sensitivity 0 changes in lighting significantly effect the scan. !n addition, iris scanning cannot be used to enrol a non0 #illing sub/ect Dthey must hold stillE. Finally, ease of use and system integration has not traditionally been strong points, but #e can e$pect to see improvements in these areas as ne# products are introduced. -.2 Tec#no%o)& Co!4ari"on Method Coded Pattern Misidentification rate Security Applications Iris Recognition Iris pattern 1/1,200,000 High High-security facilities Fingerprinting Fingerprints 1/1,000 Medium ni!ersal Hand "hape "i#e, length and thic$ness of hands 1/%00 &o' &o'-security facilities Facial Recognition (utline, shape and distri)ution of eyes and nose 1/100 &o' &o'-security facilities "ignature "hape of letters, 'riting order, pen pressure 1/100 &o' &o'-security facilities
CHAPTER ?0 A44%ication" 15.1 Air4ort" 17 !ris recognition technology simplifies passenger travel for tic)eting and boarding, secures access to the tarmac, and protects sensitive information at the control to#er for airports. ,roof ,ositive architecture ensures that certified cameras are compatible and that applications can al#ays be easily upgraded to support the latest cameras and technology. %msterdamLs @chiphol %irport is gearing up to introduce ne# technology to improve security chec)s on passengers and staff. % pilot0pro/ect is beginning that #ill assess !ris @can technology, starting #ith fre*uent flyers. But ho# useful can such measures be and #hat possible dangers are there in tightening security in the #a)e of the @eptember 11 th terrorist attac)s2 19 Iri"-Scan A44%ication" !ris0scan technology has traditionally been deployed in high0security employee0facing physical access implementations, although &CC& sa# a number of novels, high0profile iris0scan deployments in ne# applications. !ridian 0 the technology's primary developer 0 is dedicated to moving the technology to the des)top, and has had some success in small0 scale logical access deployments. The most prominent recent deployments of iris0scan technology have been passenger authentication programs at airports in the ?.@., ?.=., %msterdam, and !celand5 the technology is also used in corrections applications in the ?.@. to identify inmates. % number of developing countries are considering iris0scan technology for national !: and other large0scale 1+- applications, although to date it is still believed that the largest deployed !ridian database spans under 1CC,CCC enrolees. -otable iris0scan applications include the !ris0scan technology has traditionally been deployed in high0security employee0facing physical access implementations, although &CC& sa# a number of novels, high0profile iris0scan deployments in ne# applications. !ridian 0 the technology's primary developer 0 is dedicated to moving the technology to the des)top, and has had some success in small0scale logical access deployments. The most prominent recent deployments of iris0scan technology have been passenger authentication programs at airports in the ?.@., ?.=., %msterdam, and !celand5 the technology is also used in corrections applications in the ?.@. to identify inmates. % number of developing countries are considering iris0scan technology for national !: and other large0scale 1+- applications, although to date it is still believed that the largest deployed !ridian database spans fe#er than 1CC,CCC enrolees. 15.2 U"in) iri" "can" to un%oc/ #ote% roo!" 1< =ey cards at hotels are so &CC1. The -ine Pero hotel in Boston /ust installed a ne# system #hich uses iris scans to unloc) room doors. Qeah, it means you don't have to #orry about ever losing your room )ey, but the do#nside is that the hotel no# has a copy of your iris scan in their database. .aybe not a big deal no#, but if iris0scanning ever catches on as a more #idespread standard for authentication you're going to have to really hope that the hotel either deletes that file after you chec) out or that the ta)e some basic steps to ma)e sure it isn't ever stolen or abused. 8specially because if it gets s#iped you don't have to get you're irises replaced Ddo #e have to even have to bring up )emolition (an2E. 15.( Ne@t-)eneration ATM"+ Iri"Pa" " Built by Kapan's (=! 8lectric !ndustry, !ris,ass is currently integrating iris scanning in %T. machines in %sia and the ?@. !ris,ass #ill eliminate the need for ,!-s to ma)e identification of account o#nership. This technology may also be used for in0ban) teller stations for account verification. 1A E@ecutive Su!!ar& The purpose of iris recognition products is to provide real0time, high0confidence recognition of a person's !dentity through mathematical analysis of random patterns in the iris. !rises Dpigmented, round, contractile .embranes in the eyesE are uni*ue in each individual. The iris is a protected internal organ #hose andom te$ture is stable and unchanging, from about one year of age until death. !t is the most individually distinctive feature of the human body. -o t#o irises are ali)e, not even among t#ins. !n fact, left and right irises of one individual are not identical. The statistical probability that t#o irises #ould ever be e$actly the same is estimated at 1 in 1CA&. !ris recognition is statistically more accurate than :-% Testing. %ll iris recognition systems are based on the algorithms developed and patented by :r. Kohn :. :aughman, ,h.:., (B8, a noted computer scientist at 4ambridge ?niversity in 8ngland. This development allo#s one to read and map the rich data in a person's iris. This data includes rifts, pits, frec)les, striations, contraction furro#s, crypts, coronas, serpentine vasculature, and collagenous fibres and remains stable throughout a person's lifetime. !ris recognition begins #ith a video picture of the eye and iris #ithin it. %n onochrome 44: is the type of camera used. The boundaries of the pupil and limbus Dthe outer edge of the irisE are defined, eyelid occlusion and reflections are discounted, and the image is readied for processing. ecording &7C degrees of freedom D:(FE or independent characteristics of an iris distinguish one iris from another. 1B This !nformation is encoded into a 91& byte0digitized record from that glance at the camera. Typically both eyes are enrolled. The digital record can be stored in he$adecimal code in a data base li)e any other information. This recorded iris pattern can then be used for recognition #hen a live iris is presented for comparison. 8yeglasses and contact lenses, even coloured contacts, do not obscure the iris so the system is able to perform through them. 8nrolment in the system is usually accomplished in three minutes or less. :epending on the lens design and ambient illumination the sub/ects stand bet#een B to 1C inches from the (ptical ?nit. % po#erful search engine does an e$haustive search to compare the iris presented to ones encoded in the database. % recognition decision is made in real0 time, seconds, not days, hours, or minutes re*uired by other biometrics operations. 6ithout use of a person ma)ing a final /udgment a positive recognition :ecision can be made #ith 3impostor odds of 1 in 1C7B. @tated another #ay, the probability that a ecognition is #rong is an e$traordinarily lo# .CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC1. ,remise entry, access to privileged information, and computer login privileges can be secured through this technology. %nyplace that currently relies on )eys, cards, badges, documents, pass#ords, or ,!- numbers is a possible candidate for iris recognition use. @ome of these are financial transactions, 80commerce, entitlement payments, passport control, police, and forensic applications. 6ith escalating Treats of identity theft the need for accurate recognition decisions increases. 1F BIB=IO7RAPH<
A1B Co#n Dau)!an DIri" Scan Tec#no%o)&E> I "t edition A2B9e' "ite ?#tt4+66888.)oo)%e.co! A(B #tt4+66888.tur'o15.co! A*B #tt4+66888.a3.co! A,B#tt4+66888.iridian>co! A-B#tt4+66888.iridiantec#.co! A0B#tt4+66888.'iotec#.co! A2B C. Dau)!an> DCo#n Dau)!anF" 8e'4a)e> Ca!'rid)e Univer"it&> Co!4uter =a'orator&> Ca!'rid)e U..E A9e' 4a)eB 255*> ACited 255* Mar 23B Avai%a'%e at #tt4+66888.c%.ca!.ac.u/6u"er"6G)d15556 A3B C. Dau)!an> DAnato!&> P#&"io%o)&> and Deve%o4!ent o t#e Iri">E AOn%ine docu!entB 255*> Avai%a'%e at #tt4+66888.c%.ca!.ac.u/6u"er"6G)d15556anato!&.#t!% A15B C. Dau)!an> DHo8 Iri" Reco)nition 9or/">E IEEE Tran". CS1T 1*H1I> 255*> 44. 21 - (5. 7C