Sie sind auf Seite 1von 22

Presented By, Manosij Nandy 1MJ08CS041 Dept.

Of CSE, MVJ College Of Engineering, Bangalore

INTRODUCTION
In today's world it is not difficult to collect data about an individual. Earlier there were two ways for identifying a person.
1. Possession-based: Using one specific "token" such as a security tag. 2. Knowledge-based: Use of a code or password. Conventional methods of identification based on possession of ID cards or exclusive knowledge like password are not reliable. ID cards can be lost, forged or misplaced and passwords can be forgotten. In computer security, biometrics refers to authentication techniques that rely on measurable physical, behavioral characteristics.

BIOMETRICS
Iris recognition is a method of biometric authentication that uses pattern
recognition techniques based on high-resolution images of the irides of an individual's eyes. Biometrics deals with the study of measurable biological characteristics. Biometrics (Greek: bios ="life", metron ="measure").

IRIS
The iris is a protective internal organ of the eye. It is easily visible from yards away as a colored disk, behind the clear protective window of the cornea, surrounded by the white tissue of the eye. It is the only internal organ of the body normally visible externally. The iris is called the living password because of its unique, random features. It is always with us and can not be stolen or faked. The iris of each eye is unique, even among identical twins. Even the left and right irrides of a single person seem to be highly distinct.

IRIS SCAN
A biometric iris recognition system can be divided into two stages: 1. Enrollment module. 2. Identification module.

ENROLLMENT MODULE
The Enrollment module is responsible to identify a given person. During an enrolment stage, a biometric sensor scans the person's physiognomy to create a digital representation.

ENROLLMENT MODULE
Acquire iris image

Preprocessing Establish co-ordinate system

Mask generation

Adaptive threshold

Iris signature

db

IMAGE ACQUISITION

Camera Lens

Beam splitter

LCD display

Frame grabber

Light

PREPROCESSING

a) Original iris image

b) size iris image

c) Edges of the iris image

ESTABLISH COORDINATE SYSTEM

a) Rectangular to polar transformation

b) After boundary detection

c)Iris image in polar coordinates

MASK GENERATION

ADAPTIVE THRESHOLD

IRIS SIGNATURE
For an iris pattern to be recognizable in the system, we first need to enroll it in the database. It takes iris images to register and generate the enrollment iris signature.

IDENTIFICATION MODULE
The iris identification system is basically dependent on the following:
1. The Hamming Distance. 2. The Identification.

IDENTIFICATION MODULE
Acquire iris image

Preprocessing Establish coordinate system

Mask generation

Adaptive threshold

Iris signature

db

Hamming distance

Display result

Hamming Distance:
The iris pattern is processed and encoded into 512 byte Iris Code. The Iris Code derived from this process is compared with previously generated Iris Code. This pattern matching evaluates the goodness of match between the newly acquired iris pattern and the candidates data base entry. Pattern matching is performed as shown in the following slide.

HAMMING DISTANCE
ENROLLMENT IDENTIFICATION XOR

00100100 00100001 00000101

HAMMING DISTANCE=2

APPLICATIONS
1. In France, the technology is used in the newly built Country Jail as a security check for employees.
2. Aadhar, India's recent UID project uses Iris scan along with fingerprints to uniquely identify people and allocate a Unique Identification Number. 3. The Charlotte International Airport in North Carolina and the Flughafen Frankfort Airport in Germany allow frequent passengers to register their iris scans in an effort to streamline boarding procedures. 4. Birth certificates, tracking missing or wanted person. 5. Credit-card authentication.

6. Anti-terrorism .

ADVANTAGES
1. Iris is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane (the cornea) distinguishing it from fingerprints, which can be difficult to recognize after years of certain types of manual labor.
2. The iris is mostly flat, and its geometric configuration is only controlled by

two complementary muscles (the sphincter pupillae and dilator pupillae). This makes the iris shape far more predictable than, for instance, that of the face.
3. While there are some medical and surgical procedures that can affect the color and overall shape of the iris, the fine texture remains remarkably stable over many decades. Some iris identifications have succeeded over a period of

about 30 years.

DISADVANTAGES
1. Iris scanners are significantly more expensive than some other forms of biometrics, password or card security systems.
2. Iris scanning is a relatively new technology and is incompatible with the very substantial investment that the law enforcement and immigration authorities of some countries have already made into fingerprint recognition.

3. The scanners are often tough to adjust and can become bothersome for multiple people of different heights to use in succession.

CONCLUSION
The technical performance capability of the iris recognition process far surpasses that of any biometric technology now available. The extremely low probabilities of getting a false match enable the iris recognition algorithms to search through extremely large databases. Iris-based biometric technology has always been an exceptionally accurate one, and it may soon grow much more prominent.

THANK YOU

Das könnte Ihnen auch gefallen