Sie sind auf Seite 1von 40

ABSTRACT

Identification and verification of authorised users in a military context can sometimes be


a matter of life or death and it is therefore essential that systems be accurate, reliable
and robust .the need for positive identification of user in a military context is well
recognised. The use of passwords or pass phrases comprising of various phases has the
potential for compromise. The use of different passwords for different systems, together
with requirement of change of passwords at regular interval often exacerbates the
problem, particularly when system is used infrequently or is widely dispersed. It is
widely accepted that recollection of long password is challenging within the office
environment, failure to recollect multiple passwords within the stressful battlefield
environment could risk of critical system failure.
Cost of management of forgotten passwords, lost or stolen passwords and smartcards,
coupled with deceasing cost of biometric equipment within the past five years, has meant
the biometric technologies are now a viable consideration.
Various biometric technologies have been considered for use within the military,
including facial reorganisation, iris scanning, finger scanning and voice Verification.
Iris scanning was deemed to be the most suitable current biometric technology to meet
battlefield requirements due to the wide variety of environments in which the military
operate , and the equipment and clothing that they are required to wear for protection
e.g. !C suits, flash masks, oxygen masks etc" an iris scanning system has already been
piloted in the #$.

1
CHAPTER - 1
INTRODUCTION
1.1 Introduction
"Biometrics is the development of statistical and mathematical methods
applicable to data analysis problems in the biological sciences Biometrics are
automated methods of recognizing a person based on a physiological or behavioral
characteristic. Biometrics is the term given to the use of biological traits or
behavioral characteristics to identify an individual. Their traits may be Fingerprints,
Hand geometry, Facial geometry, etina patterns, !ris patterns, "oice recognition,
and Hand#riting recognition as sho#n in figure 1.1
The biometric technologies are becoming the foundation of an e$tensive array of
highly secure identification, personal verification and access solutions.
% Biometrics system is basically a pattern recognition system, including all the
hard#are and associated soft#are and the interconnecting infrastructure, enabling
&
identification by matching a live sample to a stored pattern in a database.
Biometrics is irrevocably tied to the individual. %n important issue in designing a
practical biometric system is to determine ho# an individual is recognized.
1.2 Motivation
The pressure on today's system administrators to have secure system are
ever increasing. (ne area #here security can be improved is in authentication. !ris
ecognition, a biometric provides one of the most secure methods of authentication
and identification. Than)s to the uni*ue characteristics of !ris.
The main re*uirements of !ris ecognition system can be summarized as follo#s +
The recognition system is most secure system.
!t is a good method of %uthentication to replace the current methods of pass#ords,
to)en cards or ,!-s. !t is very useful in areas such as information security, physical
access security, %T.s and airport security.
!t is most accurate #ith very lo# false acceptance and false re/ection rates.
!ts ability is to perform one0to many search #ithout any limit on the database.
But, it is not easy tas) to cater the above re*uirements. The challenge
stems mainly to scan iris from a distance. !t is a moving target and can be obscured
by ob/ects such as eyelids and eyelashes. %lso, there is difficulty to read iris of
blind persons or persons #ho have cataracts.
1
CHAPTER - 2
BIOMETRICS

2.1 Deinition o BIOMETRICS
Biometrics is automated methods for identifying a person or verifying the identity of a
person based on psychological and characteristic behavioural.
Biometrics scanning is used for t#o ma/or purposes+ identification and authentification
%uthentification + do ! )no# #ho you are2 3 (ne to many
!dentification+ !s you #ho you claim to be2 (ne to (ne
Biometric scans are more accurate, ma)e it difficult to mas*uerade, and generally re*uire
less of the user than standard security measures such as pass#ord protection.
Biometric technology uses the measurements of a uni*ue attribute or feature in order to
distinguish that person from all others. 4haracteristic fall into t#o categories+
1. ,hysiological or
&. Behavioral
Behavioral biometric systems tend to be less e$pensive than physiological systems but
also less robust. Behavioral characteristic can be dra#n from the dynamic attributes of
the user5 ho#ever these features may not necessarily be uni*ue to one individual.
2.2 Dierent Bio!etric" Met#od"
Before going to the different Biometrics .ethods, some common terms re*uired are as
follo#s.
6ith all biometric systems there are to# error rates that need to be ta)en into
consideration.
7
2.2.1 So!e Co!!on Ter!"
$RR + False e/ect ate occurs #hen the biometric measurement ta)en from
the live sub/ect fails to match the template stored in the biometric system
$AR + False %ccept ate occurs #hen the measurement ta)en from the live
sub/ect is so close to another sub/ect's template that a correct match #ill be
declared by mista)e.
CER + 4rossover 8rror ate The point at #hich the F and F% are e*ual is
)no#n as the 4rossover 8rror ate.
The lo#er the 48, the more reliable and accurate the system.
Univer"a%it& + .eans that each person should have the biometric.
Di"tinctivene"" + #hich indicates that any t#o persons should be sufficiently
different
!n terms of their biometric identifiers.
Per!anence + #hich means that the biometric should be sufficiently invariant
over a period of time.
Co%%ect a'i%it& + 6hich indicates that the biometric can be measured
*uantitatively.
Peror!ance+ #hich refers to the achievable recognition
accuracy, speed, as #ell as operational or environmental factors that affect
the recognition accuracy and speed.
There are *uite a fe# different biometric identification methods available today.
These methods can be divided into t#o main categories, namely Behavioural0 and
,hysiological methods. Behavioural methods try to identify some sort of behaviour
that is typical for a user. !t could be the #ay someone uses a pen #hile #riting, the
#ay someone presses the )eys on a )eypad #hen entering a ,!- code etc.
,hysiological methods on the other hand, try to identify some sort of physical trait
that is typical for a user. 8$amples of these traits could be fingerprints, the iris, the
retina etc.
9
2.( P#&"io%o)ica% c#aracteri"tic
Biometric technologies #hich have been considered for military purposes include the
Follo#ing +0
,hysiological technologies+
1. Facial scanning 0&:, 1:, thermographic
&. etinal scanning
1. !ris scanning
7. Finger scanning ;fingertip, thumb, length, pattern
9. ,alm scanning ;print, topography
<. Hand geometry
2.* Be#aviora% c#aracteri"tic +

8$amples of behavioral biometric technologies include+
1. "oice prints
&. :ynamic signature verification
1. =eystro)e dynamics
2., C#oice o Bio!etric
% biometric should al#ays be used as a supplement to traditional security policies and
not as a replacement. 4hoice of biometric technology should also include consideration
of the follo#ing parameters, ta)ing into consideration the operational re*uirements
defined by .o:+
%ccuracy
8nvironment e.g. fully deployed battlefield
8rgonomics> ?ser0friendly
@tability and uni*ueness of feature to be measured
@ecure
<
@afety
@peeds of enrolment of recognition
-on0intrusiveness
4onvenience
4ost
@ize of stored template
obust
Humans acceptance
4redible scientific bac)ground research
(perational limitations e.g.. Finger and facial recoganisation through nuclear
Biological chemical >chemical Biological radiation clothing
e*uirement >ability to perform both identification and verification

%fter consideration of all above biometric technologies five biometric properties #ere
further researched i.e. iris scanning , spea)er verification and authentication ,hand and
finger scanning and facial reorganisation .
2.- .e&"tro/e D&na!ic"
=eystro)e :ynamics is a pure soft#are solution and can be described as an e$tension to
regular pass#ords and ,!- codes. 6hen the user enters a pass#ord or a ,!-, the
dynamics of the typing can be used as a behavioral biometric. =eystro)e dynamics
systems analyze the time it ta)es for a user to find the )eys on the )eypad, the amount of
time the different )eys are pressed and the speed the user is typing #ith. This method is
used mainly because it re*uires no e$tra hard#are and therefore is a lo#0cost alternative
to other biometric systems for increased security. %s one can imagine, this method is very
sensitive to changes in the mood of the user. For e$ample, if the user is stressed the
typing dynamics #ill be a lot different to #hen the user is tired. %lso, the typing
dynamics #ill change a lot over time as the users get more and more used to typing their
pass#ords. %nother problem is that if the user enters the pass#ord less fre*uently, say
once a #ee), the typing dynamics #ill also #ary very much bet#een the times. This type
A
of biometrics system is therefore most suitable for users that are #ell familiar #ith their
pass#ords and are located in a stable environment. For e$ample, users #or)ing on their
des)top computer every day. @ince the performance of this method is highly dependent
on #hat the current application is and on the level of e$perience of user group, there are
no relevant 48 values to report on )eystro)e dynamics systems.
2.0 Si)nature 1eriication
@ignatures have been used to verify transactions for centuries and are therefore a #ell0
established method. %utomatic signature verification systems do not only e$amine the
appearance of the signature, they also e$amines the dynamics of the #riting. Ho# hard is
the pencil pressed against the surface during different phases of the signature2 Ho# fast
are the different letters #ritten2 Ho# long time does it ta)e to #rite the #hole signature2
Ho# and #hen is the letter 3t crossed2 There are also several more behavioural
biometrics that can be used to verify a user identity using signatures.
2.2 1oice 1eriication
"oice verification systems analyze the #aveforms and air pressure patterns produced
#hen a person tal)s into a microphone. "oice verification can be said to be a
combination of a physiological and a behavioural method. ,hysiological because the
construction of a persons vocal chords, vocal tract, palate, teeth, sinuses and tissue inside
the mouth #ill effect the #ay a person's voice #ill sound. (ne of the problems #ith
voice verification is bac)ground noise. !t is hard to separate the voice sample from the
noise, especially in a mobile environment #here the bac)ground noise is very dynamic.
(ne #ay to get around this problem is to ma)e the user hold the microphone close to the
mouth by designing it li)e a phone handle. "oice verification has been used for several
years and it has the advantage of being familiar to users. ,eople are used to tal)ing into
microphones and are not intimidated by the thought of leaving voice samples in
databases. There are several application areas for voice verification, one being mobile
phones. The necessary hard#are is already available, so the cost #ill be minimal. %lso,
the users are familiar #ith the concept of tal)ing into microphones so they should have a
positive attitude to#ards the technology.
B
2.3 $in)er4rint reco)nition
Fingerprint identification has been in e$istence forever 1CC year. Finger scanning e$ploits
the uni*ue characteristics of the fingerprint called .!-?T!%8 i.e. #horls, arches, loops,
ridge and bifurcations D#here ridges splitE, ridge patterns, angles in the print and the
distance bet#een specific sites. There are up to 1CC minutiae in a full fingerprint but most
systems ta)e only 1& for verification >recognisation. it is these characteristic , and not the
image that are than stored mathematically on the template .some )eyboards are no#
supplied #ith the identification device embedded in the )eyboard .
There are t#o categories of finger scanning systems+ %F!@ ;automatic finger
identification systems and verification systems. %F!@ applications can be divided into
t#o types+ forensic %F!@ systems, #hich optically capture the image of all ten digits
Dpossibly in a hostile and uncooperative environmentE and civil %F!@ systems, #hich
capture the image of a fe# digits on a flat surface.
%lthough %F!@ systems use optical capture e*uipment there are actually three types of
scanners to enable verification+
1. (ptical scanning #hich captures the image of the print by of 44: sensor, and an
arrangement of lenses and prisms.
&. ?ltrasound scanning #hich is able to penetrate through solid ob/ect t o produces
the re*uired image.
1. 4hip based finger scanning #hich re*uires the user to place their directly on the
platen5 one techni*ue measures the electrical field, bet#een the finger and the
e*uipment using a modified 4.(@ sensor array.
F

2.15 Hand 6$in)er 7eo!etr& 1eriication
Hand >Finger Geometry "erification can be divided into the three categories+
1. Hand Geometry
&. @ingle ;Finger Geometry
1. T#o0 Finger Geometry
8nrolment to use the hand geometry biometric involves positioning the hand on a platen
#ith the assistance of five guide pegs and position lights. FC characteristics are included
in the captures image, including the 1: shape of the hand, length, thic)ness, surface area,
hand and finger #idth, and )nuc)le shape.
% 1&CCC ;pi$el 44: digital camera captures the image of the top of the hand5 the side
vie# is captures by virtue of a 790degree mirror. :etails such as fingerprints, lines, scars,
nails and dirt are not included in the template.
@ingle ;finger geometry involves placing the digit into a plunger and pushing for#ard
into the scanner. ollers circulate the digit measuring 1& cross sections over a 1.9'' area.
For t#o0finger geometry the user positions the inde$ and middle finger on the platen. The
template is updated at each reading thereby accommodating gro#th and #eight and
gro#th changes.
1C
2.11 $acia% Reco)nition
&: facial recognition technology uses a 44T" camera to capture the image of the user's
face, #hich is then stored as a &: barcode. The gro#th in video conferencing has brought
do#n the price of standard video cameras5 some ,4s are produced #ith built0in cameras.
To enable facial recognition the geometry of the face is analyzed5 e.g. the distance
bet#een the eyes H nose, temple to temple H chin to hairline. @ystems can accept
photographs, video Dlive>recordedE H digital video files.
"endors claim the technology is able to locate a face in a live video stream using colour,
motion and pattern matching algorithms5 that face is then compared to those stored in the
databases. The technology claims to account for beards, glasses H hats although these
variables together #ith severe head, tilting, can cause false re/ect.
1: facial recognition uses patterned light. .easurements of angles H distances bet#een
features are ta)en e.g. distance bet#een eye H nose and the bone structure around the
eyes. The 1: representation of the facial surface is built around the data captured H
neural net#or)s enable the system to recognise changes in facial e$pression, the #earing
of glasses H beard gro#th. Facial thermography is a relatively ne# biometric technology,
11
currently in the development. This technology uses an inferred camera to perform
measurements on the uni*ue thermal pattern of blood flo# in arteries H veins.
The camera is directed at an area of & by & on the face, #hich is termed a Ivascular
tattoo'. Facial thermography technology is still in need of further development H #ill
possibly be used for access control, smart surveillance, and computer security, medical
imaging, long0range identification etc.
Facial recognition #as considered as unsuitable disfigurement of facial features e.g. cuts
H burns camouflage paint and protective clothing #ould not allo# recognition.
2.12 Retina% Scannin)
!n 1F19, #hen studying eye diseases, doctors found that the vascular patterns of the
human retina are relatively stable and uni*ue. @ubse*uently they published a paper
suggesting the potential of using retinal photographs for identification purposes.
The leading vendor of retinal scanning products started developing their products in
the late 1FACs and has continued refining their products ever since. The retinal
scanning devices are )no#n for their lo# F% and have therefore been used for
years in very high security facilities. "endors report a 48 of 1+1C.CCC.CCC for
retinal verification systems .
The verification procedure #or)s by using a lo# intensity light source to ta)e a 1<C
scan of the retina. The scan includes over 7CC readings. The scanned vascular
patterns are then reduced to 1F& reference points from #hich in turn a template of
F< bytes is produced. The #hole verification process ta)es about 1.9 seconds.
The scanners are unfortunately not very user0friendly. The device is usually #all0
mounted,
#hich in turn means that at least some of the users #ill be uncomfortable
using it since there is no #ay to mount the device on a height that fits all. %lso, the
user has to remove any spectacles before using the scanner, #hich in some
situations can be a hassle. The first models also re*uired the user to be in physical
contact #ith the device, but the ne#er ones have solved this problem. There are
1&
also some problems #ith user acceptance, people in general could be afraid that the
light source scanning the retina might damage their eye.
2.1( Co!4ari"on o Dierent Bio!etric" S&"te!
Biometric
!dentifier
?niversality :istinctiv
eness
,ermanence 4ollect
ability
,erformance
=eystro)e J J J . J
@ignature
"erification
J J J H J
"oice . J J . J
!ris H H H . H
Fingerprint . H H . H
Face H J . H J
atina H H . J H
H + High . +.edium J +Jo#
CHAPTER - (
Iri" Scan" Tec#no%o)& Hi"tor&
11

(.1 Hi"tor&
!n 1F19 an article appeared in the ew %ork &tate 'ournal of (edicine suggesting that the
pattern of blood vessels on the retina could be used to identify an individual. @ince then,
there has been e$tensive research dealing #ith the patterns and the uni*ueness of the
human eye, particularly the iris and retina. !n 1FBA, :rs. Jeonard Flom and %ram @afir
#ere a#arded the patent for researching and documenting the potential of using the iris as
a uni*ue identifier, and three years later D1FFCE, they incorporated their company 0 !ris
@can Dno# !ridian Technologies of .arlton, -e# Kersey and Geneva, @#itzerlandE.
Ho#ever, the man responsible for the development of the actual iris scanning technology
is credited to :r. Kohn :augman, #ho developed the mathematical formulas used to
measure the varying characteristics of oneLs iris at 4ambridge ?niversity of 8ngland in
1FF7.
(.2 Iri"-Scan+ Ho8 it 9or/" '& Dr. John Daugman's
)r. 'ohn )augman*s work in iris recognition forms the basis of this
information. Information and images found on his website,
http+,,www.cl.cam.ac.uk,users,-gd.///, are presented below.
!ris recognition leverages the uni*ue features of the human iris to perform identification
and, in certain cases, verification.

M
17

(.( T#e Iri"
!ris recognition is based on visible Dvia regular and>or infrared lightE *ualities of the iris.
% primary visible characteristic is the trabecular mesh#or) Dpermanently formed by the
Bth month of gestationE, a tissue that gives the appearance of dividing the iris in a radial
fashion. (ther visible characteristics include rings, furro#s, frec)les, and the corona, to
cite only the more familiar.

19
Iris scan technology is based on the algorithms developed and patented by :r. Kohn
:augman. %n iris has more then 7CC distinguishing characteristics that can
be used to authenticate someone's identity. %ppro$imately &<C of these characteristics
are e$tracted from a captured iris, i.e. si$ times more then from a captured fingerprint.
These characteristics are contraction furro#s, striations, pits, caliginous fibres, filaments,
crypts Ddar)ened areas on the irisE, serpentine vasculature, rings, and frec)les.
,robability that t#o irises produce the same mathematical model is one in ten to the ABth
po#er. There are t#o different iris scan systems+ manual and automatic. Manua% "&"te!
re*uires the user to move a fe# inches for#ard and bac)#ard #ithin a predefined
distance to enable the system to locate and focus an iris. %utomatic iris scan systems use
a series of cameras to locate and focus an iris automatically. The user has only to be
#ithin a predefined distance.
%n iris recognition camera ta)es a blac) and #hite picture from 9 to &7 inches a#ay,
depending on the type of camera. The camera uses non0invasive, near0infrared
illumination Dsimilar to a T" remote controlE that is barely visible and very safe. ,roof
,ositive certified cameras are in compliance #ith all applicable international illumination
safety standards, including %-@!>!8@-% ,0&A.10F< and !84 <CB&901 %mend.&, 4lass 1
J8:. These are the latest #orld#ide standards.
?nli)e other biometric technologies that can be used in surveillance mode, iris
recognition is an opt0in technology. !n order to use the technology you must first glance
at a camera. !ris recognition cannot ta)e place #ithout your permission. !n less than a fe#
seconds, even on a database of millions of records, the !ris 4ode template generated from
a live image is compared to previously enrolled ones to see if it matches any of them. The
decision threshold is automatically ad/usted for the size of the search database to ensure
that no false matches occur even #hen huge numbers of !ris 4ode templates are being
compared #ith the live one.
1<
@ome of the bits in an !ris 4ode template signify if some data is corrupted Dfor e$ample
by reflections, or contact lens boundariesE, so that it does not influence the process, and
only valid data is compared. :ecision thresholds ta)e account of the amount of visible
iris data, and the matching operation compensates for any tilt of the iris. % )ey advantage
of iris recognition is its ability to perform identification using a one0to0all search of a
database, #ith no limitation on the number of !ris 4ode records and no re*uirement for a
user first to claim an identity, for e$ample #ith a card. !ris recognition is the most
po#erful biometric technology there is. -othing else comes close. -othing.
.ost accurate
@calable
(pt0in
-on0contact
!nteroperable cameras

1A
CHAPTER - *
9#at I" Iri" Scannin)

*.1 9#at i" Iri" Scannin) ?
%n iris scanner is a camera that ta)es a picture of the surface of the eye.

*.2 Ho8 Doe" Iri" Scannin) 9or/ 2
The eye is illuminated by light0emitting diodes that surround the camera. The diodes emit
in the visible light spectrum. The scanner is -(T a laser0retinal scanner so there are no
laser eye hazards. !ris identification uses standard video cameras N the same )ind you
#ould use to videotape your family N to ta)e a picture of the iris of your eye. !t does not
use lasers and, therefore, has none of the inherent ris)s associated #ith lasers.
*.( 9#ere i" Iri" Scannin) Done:
!nitial enrolment is performed #ith an iris scanner in the .ain 4ontrol oom D.4E. !ris
scan readers are located in the e$perimental halls and counting houses at H!4
e$perimental areas. (nce enrolled, you may use the local iris scanner in the counting
house to obtain a )ey to enter the intersecting region D!E in 4ontrolled %ccess mode
Dnote+ 4ontrolled %ccess mode is further e$plained in 4ollider0%ccelerator ?ser
1B
TrainingE. !ris scanning technology has been used in this same #ay for the past t#o years
in Building F1& by the -%@% e$perimenters at %G@.
*.* 9#at i" Iri" Reco)nition+
6hile recent advances in modeling and rendering have generally facilitated the
production of realistic imagery, certain specialized modeling and rendering tas)s remain
difficult. (ne such challenge is presented by the human eye, #hich e$hibits intricate
detail in the iris that is comple$ enough to serve as an alternative to fingerprints for
personal identification. (ne of the biggest challenges in realistic rendering )no#s #hat
features of a model are important for realism, and #hat can be ignored.

!ris recognition is a procedure for physical iris synthesis that results in eyes #ith all the
important appearance characteristics of real eyes. !n this, it presents an approach that
enables users other than trained oculists to create a realistic loo)ing human eye, paying
particular attention to the iris.
Figure 1.1+ !ris
1F

!ris scan biometrics employs the uni*ue characteristics and features of the
human iris in order to verify the identity of an individual. The iris is the area of the
eye #here the pigmented or colored circle, usually bro#n or blue, rings the dar)
pupil of the eye. !ris recognition is based on comparing patterns in the iris 0 the
e$terior, visible colored part of the eye. The inner edge of the iris is located by an
iris0scan algorithm, #hich maps the iris' distinct patterns and characteristics. %n
algorithm is a series of directives that tell a biometric system ho# to interpret a
specific problem. %lgorithms have a number of steps and are used by the biometric
system to determine if a biometric sample and record is a match. The process is
based on the uni*ue nature and the e$treme richness of the human iris. The multiple
contraction furro#s, collagenous fibers, crypts, coronas, striations, serpentine
vasculature, frec)les, rifts, and pits produce a non0duplicable organ #ith more than
7CC measurable variables
!ris' are composed before birth and, e$cept in the event of an in/ury to the
eyeball, remain unchanged throughout an individual's lifetime. !ris patterns are
e$tremely comple$, carry an astonishing amount of information and have over &CC
uni*ue spots. The fact that an individual's right and left eyes are different and that
patterns are easy to capture, establishes iris0scan technology as one of the
biometrics that is very resistant to false matching and fraud. The false acceptance
rate for iris recognition systems is 1 in 1.& million, statistically better than the
average fingerprint recognition system. The real benefit is in the false0re/ection
rate, a measure of authenticated users #ho are re/ected
$eature" o Iri" reco)nition S&"te! +
.0 1ccurate+
The accuracy can be achieved using follo#ing characteristics+0
?ni*ueness+
False acceptance ratio+
&C
(ne iris template contain more data than is collected in creating templates for
finger ,face and hand combine. %nd this is the main reason #hy iris recognition can
authenticate #ith confidence even #hen significantly less than the #hole eye is
visible.
&E Stability+
The iris image remains stable from the age of about 1C months up until death. This
means that an iris image need only be captured once and does not need to be updated.
(ther biometric measures change over time. Hands and fingers gro#, our voices change,
our s)in degrades and other biometric measures are sub/ect to labour, health, genetics,
climate and age.
6hat this means is that the performance of such systems is unreliable and fre*uent re0
enrolments are re*uired to accommodate these changes. 4onversely, barring surgery or
e$tensive trauma, the iris template does not change over time.
20 on3invasive+
?sers #earing gloves, protective #ear, glasses, safety goggles and even contact
lenses can operate iris recognition systems. -o contact is re*uired #ith a touch pad or
screen meaning that iris recognition is ideal in environments #here hygiene is at a
premium. !t is also important to note that iris recognition is a completely separate
technology to retinal scanning. -o bright lights or lasers are beamed into the eye, only a
digital photograph is ta)en. This means that not only is iris recognition the most accurate
biometric technology, it is also the safest.
40 5lexibility+
8asily integrates into e$isting security systems or operates as a stand alone.
60 7eliable+
The iris pattern is not susceptible to theft , loss or compromise.
80 &mallest outlier population+
There are relatively fe# people #ho don't have at least one eye so there are
chances #here blind people have used iris recognition successfully.
&1
90 #nparalleled+
(nce a sub/ect is enrolled the need to re0enrolled other biometrics in
identification option.
:0 ;ighly protected
<0 Changing pupil si=e confirms natural physiology.

:oes it #or) #ith glasses and contact lenses2
,erformance depends on ac*uiring a good image of the iris structure, for
this reason it is recommended the users remove their glasses #hen registering their
iris. 4ontact lenses and glasses do not obscure the iris so the system is able to
perform through them. 8yeglasses and contact lenses present no problems to the
*uality of the image and the iris0scan systems test for a live eye by chec)ing for the
normal continuous fluctuation in pupil size.
!s iris capture safe2
There are no health ris)s associated #ith iris recognition. !ris recognition
simply uses a video camera to ta)e a blac)0and0#hite picture of your eye. There are
no flashes or bright lights as the camera uses lo#0level infrared illumination. The
lo#0level infrared illumination is similar to #hat is used in T" remote controls.
The iris0scan process begins #ith a photograph. % specialized camera, typically
very close to the sub/ect, no more than three feet, uses an infrared imager to
illuminate the eye and capture a very high0resolution photograph. This process
ta)es only one to t#o seconds and provides the details of the iris that are mapped,
recorded and stored for future matching>verification. !ris identification uses
standard video cameras N the same )ind you #ould use to videotape your family0
to ta)e a picture of the iris of your eye. !t does not use lasers Dli)e the ones used in
bar code scanners you might see at the grocery storeE and therefore has none of the
inherent ris)s associated #ith lasers.
Typically, identification time averages about t#o seconds. % )ey
differentiator for iris recognition is its ability to perform identification using a one0
&&
to0many search of a database, #ith no limitation on the number of !ris ,attern
records contained therein.
(nce in the database, a ,rocessed !ris ,atterns can be used as a basis for
identification, enabling comparison bet#een an !ris ,attern captured at an access
point or a des)top ,4 against ,rocessed !ris ,attern records stored in the database.
&1
CHAPTER - ,
Iri" Scan"

Iri" "can"

%n iris0based biometric involves analyzing the features in the coloured ring of tissue that
surrounds the pupil. !ris scanning is even less intrusive than retinal scans. They do not
re*uire the individual to be in close contact #ith the reader. (ften considered an
emerging technology, there are a fe# technical challenges. Jight, distance resolution, and
contrast must be balanced to ensure accuracy and reliability. !f there is lo# light, the lens
aperture of the camera must be opened #ider. This creates a depth of field problem #here
precise focusing is re*uired. !f light is provided to overcome the problem the individual is
sub/ected to intense light and might perceive the system as unfriendly.
%nother problem associated #ith this technology is the iris itself. !t is relatively stable
and immune to changes during adulthood, but it does vary some#hat during adolescence.
The city hospital of Bad eichenhall in Bavaria uses iris scanning to control access to the
infant care centres to prevent )idnappings.
&7
!ris recognition is based on visible Dvia regular and>or infrared lightE *ualities of the iris.
The iris is sampled using a conventional 44: camera.
,rimary visible characteristic is the trabecular mesh#or), a tissue that gives the
appearance of dividing the iris in a radial fashion. (ther visible characteristics include
rings, furro#s, frec)les, and the corona.
!ris scans, at only 91& bytes in size, are an amazingly rich source of data, yielding 1.7 bits
of data per s*uare mm from an 11 mm diameter iris. This density of information is such
that each iris can be said to have &<< uni*ue "spots", as opposed to 110<C for traditional
biometric technologies. 8ven after allo#ing for algorithmic correlation functions and
screening criteria common to most human irises, there are 1A1 independent binary
degrees of freedom usable to uni*uely identify an iris.
,.1 Ho8 Iri"6Retina% Scannin) 9or/"
Though iris and retinal scans both deal #ith the human eye, the processes in #hich they
are done are e$tremely different. The iris Dthe coloured portion of the eyeE consists of
over 7CC distinguishing characteristics that can be *uantified and used to identify an
individual. Ho#ever, only about &<C of those are captured in a "live" iris identification
process by using such characteristics as contraction furro#s, striations, filaments, crypts
Ddar)ened areas on the irisE and frec)les D/ust to name a fe#E. !n identifying oneLs iris,
there are t#o types of methods that are used by iris identification systems that are defined
as passive and active. The active iris system method re*uires that a user be any#here
from si$ to 17 inches a#ay from the camera. !t also re*uires the user to move bac) and
forth so that the camera can ad/ust and focus in on the userLs iris. The passive system
differs in that it allo#s the user to be any#here from one to there feet a#ay from the
incorporated series of cameras that locate and focus in on the iris. There are four simple
steps that follo#+

1. % person stands in from of the iris identification system, bet#een one and three
feet a#ay, #hile a #ide0angle camera calculates the position of they eye.
&9
&. % second camera zooms in on the eye and ta)es a blac) and #hite image.
1. (nce the iris is in focus, it overlays a circular grid on the image of the iris and
identifies the light and dar) areas, li)e and "eye print".
7. The captured image, or "eye print" is chec)ed against a previously stored
reference template in the database.

etinal @can technology maps the capillary pattern of the retina, a thin nerve on the bac)
of the eye. The sub/ect is re*uired to )eep his or her head and eye motionless #ithin a
half0inch of the device, focusing on a small rotation point of green light, because it ta)es
a minimum of five scans to enrol D#hich ta)es about 79 secondsE. !nfrared light is used
because blood vessels on the retina absorb the light faster than the surrounding eye tissue.
% video camera captures the retinal pattern and translates it into data that is 19 bytes in
size.
,.2 B%oc/ Dia)ra! o Iri" Reco)nition S&"te!
&<

Figure + Bloc) :iagram (f !ris ecognition @ystem
Bloc) :iagram :escription+
1E !mages of an iris are ta)en from camera >database and are further
recognized by !mage ,rocessing %lgorithms.
&E Gray @caling+ 0 Gray0scaling is the process of converting a continuous0
tone image to an image that a computer can manipulate.
8ach pi$el location has a value. This value is the gray level of the pi$el. The
gray level represents the brightness or dar)ness for the given pi$el.
1E 8dge :etection+ 0 8dges characterize boundaries and are therefore a
problem of fundamental importance in image processing. 8dges in images are areas
#ith strong intensity contrasts ; a /ump in intensity from one pi$el to the ne$t.
&A
I!a)e
Ac;ui"ition
7RA< SCA=IN7
Pattern
Matching
Iris

THINNIN7
PROCESSE
D IMAGE
FROM
DATABASE
USER ACCESS
7RANTED6DENIED
ED7E
DETECTIO
N
8dge detecting an image significantly reduces the amount of data and filters out
useless information, #hile preserving the important structural properties in an
image.

7E Thinning+ 0 Thinning is a morphological operation that is used to remove
selected foreground pi$els from binary images. !n this mode it is commonly used to
tidy up the output of edge detectors by reducing all lines to single pi$el thic)ness.
Thinning is normally only applied to binary images, and produces another binary
image as output.
The thinning operation is related to the hit0and0miss transform
9E ,attern .atching+ 0 ,attern matching is a method of identifying features
in an image that match a smaller template image. ,attern recognition is the research
area that studies the operation and design of systems that recognize patterns in data.
!t encloses sub disciplines li)e discriminant analysis, feature e$traction, error
estimation, cluster analysis Dtogether sometimes called statistical pattern
recognitionE, grammatical inference and parsing.
Having localized the region of an ac*uired image that corresponds to the
iris, the final tas) is to decide if this pattern matches a previously stored iris pattern
&B
,.( $%o8 C#art o Iri" Reco)nition S&"te! +
,.* Identiication 1" Aut#entication
,.*.1 Bio!etric Identiication
Biometric identification is a sophisticated variation on a to)en0based,
single0factor security scheme. !n this case, the to)en is some physical attribute of
the person00fingerprint, iris, retina, face, vein pattern, etc. Biometric identification
systems typically follo# three high0level processing steps. First, the system must
ac*uire an image of the attribute through an appropriate scanning techni*ue.
D@pecific techni*ues are described in greater detail belo#.E (nce the scanned
content is ac*uired, it must be localized for processing purposes. :uring this step,
&F
e$traneous informational content is discarded and minutiae are isolated and turned
into a template> a sort of internal canonical form for matching attributes stored in a
database. .inutiae are the uni*uely differentiating characteristics of the biometric
attribute. 6horls and loops and their relationship to one another on a fingerprint are
and e$ample of the minutiae that might be e$tracted. Finally, templates stored in
the database are searched for a match #ith the one /ust presented. !f a match is
found, the identification is a success and the succeeding steps of the security
process can begin.
Figure +Biometric !dentification ,rocess
,.*.2 Bio!etric Aut#entication
Biometric authentication virtually eliminates the ris) of anonymity in a t#o0
factor security scenario by using a physical attribute of the person to authenticate a
to)en. The process is similar to biometric identification. First, the re*uestor
presents a to)en to assert identity. For e$ample, an %T. or credit card is inserted
into a reader. D% number encoded on the card is actually the to)en5 the card is more
li)e a container for the to)en, but treating the card, as a to)en is appropriate.E %s
#ith identification, the system must ac*uire an image of the personal attribute.
@econd, the attribute must be localized> minutiae e$tracted, and a matching
template created. Finally, the value of the to)en is used to loo) up the template
1C
previously stored for this individual. !f it matches the template presented on this
occasion, the re*uestor is authenticated.
Figure+ Biometric %uthentication ,rocess
CHAPTER - -
11
Iri" Scan" I""ue" and =i!itation"

-.1 Conidentia%it& I""ue"
-o video image of the iris is retained. !nstead the eye pattern is converted into a 91& byte
!ris 4ode record. The !ris 4ode is hashed and encrypted as a security measure. The !ris
4ode and !ris 4ode records are under the control of a single individual in the 4ollider0
%ccelerator :epartment's D40%:E %ccess 4ontrols Group and are behind the fire#all.
Bac)up 4:0 copies are loc)ed in a safe. There are no paper records. %n !ris 4odeO
record is based on &7A independent variables that are measured for each iris. (nce the iris
variables are measured, they are converted to a 91&0byte template, #hich is the patented
!ris 4ode record. The !ris 4ode record is immediately encrypted, and cannot be reverse0
engineered into an image of the iris.
@ince an !ris @can ecord cannot be used to re0construct an image of an iris, the only
personal information being stored by B-J is a personLs name and guest>life number.
=i!itation"
1. 8very user must be enrolled,
&. 8ach des)top re*uiring security must be 6indo#s0based and have a 6eb camera.
1. Things such as dirty glasses and bad lighting can slo# authentication.
These limitations ma)e the %uthenticam usable only on #or)stations for #hich
administrators need the most intense protection.
The %uthenticam is pac)aged to secure individual #or)stations, and installation #as
fairly simple. 6e set up an %uthenticam on a 6indo#s &CCC system #ith 91&.B of
%. and a 1GHz processor. ,anasonic recommends a ,entium0class 111.Hz or greater
system running 6indo#s FB, 6indo#s .8 or 6indo#s &CCC, #ith at least <7.B of
%..
1&
The camera plugs into a ?niversal @erial Bus port, and the soft#are and drivers should be
loaded before installation of the hard#are.
Beneit to Iri" Scannin)
4ontrolled %ccess mode is re*uested several times a #ee) during H!4 runs for
tuning>repair of detector e*uipment or accelerator components. The use of an iris scanner
#ill save hours of .4 operator time and increase overall machine running time.
Beneit" o U"in) Iri" Tec#no%o)&
The iris is a thin membrane on the interior of the eyeball. !ris patterns are
e$tremely comple$.
,atterns are individual Deven in fraternal or identical t#insE.
,atterns are formed by si$ months after birth, stable after a year. They remain the
same for life.
!mitation is almost impossible.
,atterns are easy to capture and encode
Re%ative Advanta)e"
4ompared to other biometric technologies, iris scanning+
is the least intrusive of the eye related biometrics, re*uiring no intimate contact
bet#een user and reader
has been demonstrated to #or) #ith spectacles
#or)s on a variety of ethnic groups
is highly accurate Dsee belo#E
can #or) in identification mode Ddue to the data richnessE, potentially avoiding the
need for any to)en identity claims
%pplications are being developed by third party integrators, #hich should increase the
use of iris scanning technology in the near future.
Re%ative Di"advanta)e"
11
The main disadvantage of iris scanning is light sensitivity 0 changes in lighting
significantly effect the scan. !n addition, iris scanning cannot be used to enrol a non0
#illing sub/ect Dthey must hold stillE. Finally, ease of use and system integration has not
traditionally been strong points, but #e can e$pect to see improvements in these areas as
ne# products are introduced.
-.2 Tec#no%o)& Co!4ari"on
Method Coded Pattern
Misidentification
rate
Security Applications
Iris
Recognition
Iris pattern 1/1,200,000 High
High-security
facilities
Fingerprinting Fingerprints 1/1,000 Medium ni!ersal
Hand "hape
"i#e, length and
thic$ness of hands
1/%00 &o'
&o'-security
facilities
Facial
Recognition
(utline, shape and
distri)ution of eyes
and nose
1/100 &o'
&o'-security
facilities
"ignature
"hape of letters,
'riting order, pen
pressure
1/100 &o'
&o'-security
facilities

CHAPTER ?0
A44%ication"
15.1 Air4ort"
17
!ris recognition technology simplifies passenger travel for tic)eting and boarding, secures
access to the tarmac, and protects sensitive information at the control to#er for airports.
,roof ,ositive architecture ensures that certified cameras are compatible and that
applications can al#ays be easily upgraded to support the latest cameras and
technology.
%msterdamLs @chiphol %irport is gearing up to introduce ne# technology to improve
security chec)s on passengers and staff. % pilot0pro/ect is beginning that #ill assess !ris
@can technology, starting #ith fre*uent flyers. But ho# useful can such measures be and
#hat possible dangers are there in tightening security in the #a)e of the @eptember 11
th
terrorist attac)s2
19
Iri"-Scan A44%ication"
!ris0scan technology has traditionally been deployed in high0security employee0facing
physical access implementations, although &CC& sa# a number of novels, high0profile
iris0scan deployments in ne# applications. !ridian 0 the technology's primary developer 0
is dedicated to moving the technology to the des)top, and has had some success in small0
scale logical access deployments. The most prominent recent deployments of iris0scan
technology have been passenger authentication programs at airports in the ?.@., ?.=.,
%msterdam, and !celand5 the technology is also used in corrections applications in the
?.@. to identify inmates. % number of developing countries are considering iris0scan
technology for national !: and other large0scale 1+- applications, although to date it is
still believed that the largest deployed !ridian database spans under 1CC,CCC enrolees.
-otable iris0scan applications include the !ris0scan technology has traditionally been
deployed in high0security employee0facing physical access implementations, although
&CC& sa# a number of novels, high0profile iris0scan deployments in ne# applications.
!ridian 0 the technology's primary developer 0 is dedicated to moving the technology to
the des)top, and has had some success in small0scale logical access deployments. The
most prominent recent deployments of iris0scan technology have been passenger
authentication programs at airports in the ?.@., ?.=., %msterdam, and !celand5 the
technology is also used in corrections applications in the ?.@. to identify inmates. %
number of developing countries are considering iris0scan technology for national !: and
other large0scale 1+- applications, although to date it is still believed that the largest
deployed !ridian database spans fe#er than 1CC,CCC enrolees.
15.2 U"in) iri" "can" to un%oc/ #ote% roo!"
1<
=ey cards at hotels are so &CC1. The -ine Pero hotel in Boston /ust installed a ne#
system #hich uses iris scans to unloc) room doors. Qeah, it means you don't have to
#orry about ever losing your room )ey, but the do#nside is that the hotel no# has a copy
of your iris scan in their database. .aybe not a big deal no#, but if iris0scanning ever
catches on as a more #idespread standard for authentication you're going to have to
really hope that the hotel either deletes that file after you chec) out or that the ta)e some
basic steps to ma)e sure it isn't ever stolen or abused. 8specially because if it gets s#iped
you don't have to get you're irises replaced Ddo #e have to even have to bring up
)emolition (an2E.
15.( Ne@t-)eneration ATM"+ Iri"Pa" "
Built by Kapan's (=! 8lectric !ndustry, !ris,ass is currently integrating iris scanning in
%T. machines in %sia and the ?@. !ris,ass #ill eliminate the need for ,!-s to ma)e
identification of account o#nership. This technology may also be used for in0ban) teller
stations for account verification.
1A
E@ecutive Su!!ar&
The purpose of iris recognition products is to provide real0time, high0confidence
recognition of a person's !dentity through mathematical analysis of random patterns in
the iris. !rises Dpigmented, round, contractile .embranes in the eyesE are uni*ue in each
individual. The iris is a protected internal organ #hose andom te$ture is stable and
unchanging, from about one year of age until death. !t is the most individually distinctive
feature of the human body. -o t#o irises are ali)e, not even among t#ins. !n fact, left and
right irises of one individual are not identical. The statistical probability that t#o irises
#ould ever be e$actly the same is estimated at 1 in 1CA&. !ris recognition is statistically
more accurate than :-% Testing.
%ll iris recognition systems are based on the algorithms developed and patented by :r.
Kohn :. :aughman, ,h.:., (B8, a noted computer scientist at 4ambridge ?niversity in
8ngland. This development allo#s one to read and map the rich data in a person's iris.
This data includes rifts, pits, frec)les, striations, contraction furro#s, crypts, coronas,
serpentine vasculature, and collagenous fibres and remains stable throughout a person's
lifetime.
!ris recognition begins #ith a video picture of the eye and iris #ithin it. %n onochrome
44: is the type of camera used. The boundaries of the pupil and limbus Dthe outer edge
of the irisE are defined, eyelid occlusion and reflections are discounted, and the image is
readied for processing. ecording &7C degrees of freedom D:(FE or independent
characteristics of an iris distinguish one iris from another.
1B
This !nformation is encoded into a 91& byte0digitized record from that glance at the
camera. Typically both eyes are enrolled. The digital record can be stored in he$adecimal
code in a data base li)e any other information. This recorded iris pattern can then be used
for recognition #hen a live iris is presented for comparison. 8yeglasses and contact
lenses, even coloured contacts, do not obscure the iris so the system is able to perform
through them.
8nrolment in the system is usually accomplished in three minutes or less. :epending on
the lens design and ambient illumination the sub/ects stand bet#een B to 1C inches from
the (ptical ?nit. % po#erful search engine does an e$haustive search to compare the
iris presented to ones encoded in the database. % recognition decision is made in real0
time, seconds, not days, hours, or minutes re*uired by other biometrics operations.
6ithout use of a person ma)ing a final /udgment a positive recognition :ecision can be
made #ith 3impostor odds of 1 in 1C7B. @tated another #ay, the probability that a
ecognition is #rong is an e$traordinarily lo#
.CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC1.
,remise entry, access to privileged information, and computer login privileges can be
secured through this technology. %nyplace that currently relies on )eys, cards, badges,
documents, pass#ords, or ,!- numbers is a possible candidate for iris recognition use.
@ome of these are financial transactions, 80commerce, entitlement payments, passport
control, police, and forensic applications. 6ith escalating Treats of identity theft the need
for accurate recognition decisions increases.
1F
BIB=IO7RAPH<

A1B Co#n Dau)!an DIri" Scan Tec#no%o)&E> I
"t
edition
A2B9e' "ite ?#tt4+66888.)oo)%e.co!
A(B #tt4+66888.tur'o15.co!
A*B #tt4+66888.a3.co!
A,B#tt4+66888.iridian>co!
A-B#tt4+66888.iridiantec#.co!
A0B#tt4+66888.'iotec#.co!
A2B C. Dau)!an> DCo#n Dau)!anF" 8e'4a)e> Ca!'rid)e Univer"it&>
Co!4uter =a'orator&> Ca!'rid)e U..E A9e' 4a)eB 255*>
ACited 255* Mar 23B Avai%a'%e at
#tt4+66888.c%.ca!.ac.u/6u"er"6G)d15556
A3B C. Dau)!an> DAnato!&> P#&"io%o)&> and Deve%o4!ent o t#e Iri">E
AOn%ine docu!entB 255*> Avai%a'%e at
#tt4+66888.c%.ca!.ac.u/6u"er"6G)d15556anato!&.#t!%
A15B C. Dau)!an> DHo8 Iri" Reco)nition 9or/">E IEEE Tran". CS1T
1*H1I> 255*> 44. 21 - (5.
7C

Das könnte Ihnen auch gefallen