iris scaner


Published on

Iris Scanner

Published in: Education
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

iris scaner

  1. 1. Iris Scanner Ravi P. Agrahari (Science & Technology)
  2. 2. • Iris cameras perform recognition detection of a person’s  identity by mathematical analysis of the random patterns  that are visible within the iris of an eye from some  distance.  It combines computer vision, pattern  recognition, statistical inference and optics.• Of all the biometric devices and scanners available today,  it is generally conceded that iris recognition is the most  accurate.  The automated method of iris recognition is  relatively young, existing in patent since only 1994.
  3. 3. • The iris is the coloured ring around the pupil of  every human being and like a snowflake, no two  are alike.  Each are unique in their own way,  exhibiting a distinctive pattern that forms randomly  in utero,  n a process called chaotic  morphogenesis.  The iris is a muscle that regulates  the size of the pupil, controlling the amount of light  that enters the eye.• Iris recognition is rarely impeded by glasses or  contact lenses and can be scanned from 10cm to a  few meters away.  The iris remains stable over time  as long as there are no injuries and a single 
  4. 4. • The iris is the colorful part of the eye between the white sclera and the pupil.• Iris is the only internal organ of the human body that is normally externally visible.
  5. 5. The iris identification program may be divided into four main functional blocks:1.Image Acquisition.2.Preprocessing.3.Image Analysis.4.Image Recognition.
  6. 6. • The acquired image always not only “useful” parts (IRIS), but also some “irrelevant” parts e.g. eyelid, pupil• So the preprocessing is composed of two steps:1.Iris Localization2. Edge Detection
  7. 7. • In this stage, we should determine iris part of the image by localizing the position of the image derived from inside the limbus (outer boundary) and outside the pupil (inner boundary), and finally convert the iris part into a suitable representation.
  8. 8. • It is used to find complex object boundaries by marking potential edge point corresponding to places in an image where rapid change in brightness occurs.• In other words, edge is defined by the discontinuity in gray values. An edge separates two distinct objects.
  9. 9. • The features of the iris are then analyzed and digitized into a 512 byte (4096 bits) Iris Code record.• In this iris code half of the describes the features and another half of the describes the control the comparison process.
  10. 10. • Iris code record is stored in the database for future comparison• During a recognition attempt, when an iris is presented at a recognition point, the same process is repeated ; however the resulting Iris Code record is not stored but is compared to every file in the database.
  11. 11. 1. A person stands in front of the iris identification system, between one and three feet away, while a wide angle camera calculates the position of their eye.2. A second camera zooms in on the eye and takes a black and white image.3. Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like an “eye print”.4. To prevent a fake eye from being used to fool system, these devices may very the light shone into the eye and watch for pupil dilation.
  12. 12. 1.Highly Protected Internal Organ Of The Eye.2.Externally Visible Patterns Imaged From A Distance.3.Pattern Apparently Stable Throughout The Life.4.Image Analysis And Encoding Time: 1 Seconds.5.Search Speed: 1,00,000 Iris Code Per Second.
  13. 13. 1. Computer login: the iris as a living password.2. National border controls: the iris as a living passport.3. Driving licenses and personal certificates.4. Internet security.5. Premises access control (Home, Office, Laboratory).6. Anti-terrorism (e.g. security screening at airports)7. Financial Transactions (electronic commerce and banking).8. Secure accesses to bank cash machine accounts.