Sie sind auf Seite 1von 21

SWATI NEGI 06-ECE-152 Gurgaon Institute of Technology and Management,Bilaspur, Gurgaon EMAIL: negiswati@yahoo.

com

CONTENTS
Introduction Biometrics - Future Of Identity Human eye Iris Recognition How it works Advantages and Disadvantages Technology comparison Iris recognition in fiction Applications Retinal scans

INTRODUCTION
In today's information age it is not difficult to collect data about an individual and use that information to exercise control over the individual. Data security has become an inevitable feature. ID cards can be almost lost, forged or misplaced: passwords can be forgotten. If you lose your keys or jot your password on a piece of paper, someone else can find them and use them as though they were you. Biometric system automatically verifies or recognizes the identity of a living person based on physical or behavioral characteristics.

Instead of using something you have (like a key) or something you know (like a password), biometrics uses who you are to identify you. Biometrics can use physical characteristics, like your face, fingerprints, irises or veins, or behavioral characteristics like your voice, handwriting or typing rhythm. Unlike keys and passwords, your personal traits are extremely difficult to lose or forget. They can also be very difficult to copy. For this reason, many people consider them to be safer and more secure than keys or passwords

A Biometric system can be divided into 2 systems: 1. The enrollment module 2. The identification module. The enrollment module is responsible for the training the system to identify the person. Biometric sensor scans persons physiognomy to create digital representation. Feature extractor processes the representation to generate more expressive representation-template. Template for each user is stored in a biometric system database.

BIOMETRICS - FUTURE OF IDENTITY

The identification module is responsible for recognizing the person. Biometric sensor captures characteristics of person to be identified. Converts into same digital format as template. Resulting template is fed to feature matcher. Which compares it against stored template to determine the match!

Biometric systems can seem complicated, but they all use the same three steps:
Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait. Storage: Contrary to what you may see in movies, most systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart card that you carry with you.

Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be .

HUMAN EYE
The pupil is the central transparent area (shown as black). The blue area surrounding it is iris. The white outer area is the sclera, the central transparent part of which is the cornea.

HUMAN EYE

IRIS RECOGNITION
Iris scanning measures patterns on the colored part of eye-the iris. The tissue has a unique pattern of markings which does not change and is different for each eye. Iris scanners read from the outer edge towards the pupil, detecting and plotting the markings. Data is saved and stored on a chip, on a passport or ID card which will be verified when the eye is scanned in.

HOW IT WORKS
First step : Position Correctly 3-10 inches max 3 feet Camera focuses automatically or, You Use mirror Second step: Photograph is taken by Specialized digital camera in iris scanner: a) uses visible light b) uses near infrared light To take a clear high contrast picture of a persons iris. PROCESS TAKES LESS THAN 2 SECONDS

Computer locates: Centre of pupil Edge of pupil Edge of iris (IRIS SCAN ALGORITHM ) Eye lids and eye lashes

It provides detail of the iris mapped , recorded, stored future matching/verification. Analyses of patterns in iris, Translating into code.(512 byte iris code)

Matching of codes and hence verification takes place.

ADVANTAGES
Iris is ideal for biometric identification. Imitation is impossible. Recognition not impeded by glasses or contact lenses. Stable i.e. remain same better than fingerprints. Predictable shape than face. Fast / quick scan. (little more than second) High security. Misidentification rate is less.(1 in 1.2 million) Many wide applications. More than 200 unique points of reference for comparison. Even blind people can use it as long as they have irides.

DISADVANTAGES
Incompatible with authorities. (investment) Poor image quality. Difficult to perform at large distance Difficulty arises if the person to be identified is not cooperating by holding the head still, and not looking into camera.

Is there any way to fool the system?


Researchers attempted to do this by creating contact lenses with irides printed on them. The system had no trouble spotting the fakes. Some of the newer drug treatments for glaucoma include changes in iris pigmentation among their side effects. This should not be a problem since iris recognition systems rely on monochrome images, the developers say.

TECHNOLOGY COMPARISON
Method Iris Recogni tion Fingerprin ting Hand Shape Facial Recogni tion Signature Voice printing Coded Pattern Misidentifica tion rate Secur ity Application s Highsecurity facilities Universal

Iris pattern

1/1,200,000

High
Medi u m Low

Fingerprints Size, length and thickness of hands Outline, shape and distribution of eyes and nose Shape of letters, writing order, pen pressure Voice characteristics

1/1,000

1/700

Lowsecurity facilities
Lowsecurity facilities Lowsecurity facilities Telephone service

1/100

Low

1/100 1/30

Low Low

IRIS RECOGNITION IN FICTION


Demolition Man (1993) Character played by Wesley Snipes uses the Warden's gouged eye to gain access through security door. In Dan Brown's 2000 novel Angels and Demons, an assassin gains access to a top secret CERN laboratory using a scientist's eye. Steven Spielberg's 2002 science fiction film Minority Report depicts a society in which what appears to be a form of iris recognition has become daily practice. The principal character undergoes an eye transplant in order to change his identity but continues to use his original eyes to gain access to restricted locations. The Simpsons Movie (2007) features a scene that illustrates the difficulty of image acquisition in iris recognition.

Numb3rs features a scene where a robber gets into the CalSci facility by cracking the code assigned to a specific iris.
NCIS uses an Iris scanner in the garage, where forensic vehicle investigations are carried out and evidence is stored.

APPLICATIONS
Substituting for passports (automated international border crossing); Aviation security and controlling access to restricted areas at airports; Database access and computer login; premises access control; Hospital settings including mother-infant pairing in maternity wards; Door lock system. ATM machines. It is under consideration for biometrically enabled National Identity Cards.

Airports have begun to use iris-scanning for such diverse functions as employee identification/verification for movement through secure areas and allowing registered frequent airline passengers a system that enables fast and easy identity verification in order to expedite their path through passport control Projects designed to authenticate on-line purchasing on-line banking on-line voting on-line stock trading. Iris-scan offers a high level of user security, privacy and general peace of mind for the consumer.

RETINAL SCANS
Not to be confused with another less prevalent ocularbased technology, retina scanning, Some people confuse iris scans with retinal scans. Retinal scans, however, are an older technology that required a bright light to illuminate a person's retina. The sensor would then take a picture of the blood vessel structure in the back of the person's eye. Some people found retinal scans to be uncomfortable and invasive. People's retinas also change as they age, which could lead to inaccurate readings.

THANKS AND QUERIES!

Das könnte Ihnen auch gefallen