SlideShare a Scribd company logo
1 of 34
IRIS RECOGNITION
The need for biometrics
As per wikipedia,
“Biometrics consists of methods for uniquely recognizing humans
based upon one or more intrinsic physical or behavioral traits”
The need for biometrics
o -> Rapid development in technology
o -> Globalization
Biometrics and Iris Scanning
Anatomy of the Human Eye

• Eye = Camera
• Cornea bends, refracts,
and focuses light.

• Retina = Film for image
projection (converts image
into electrical signals).
• Optical nerve transmits
signals to the brain.
What is Iris?
5

 The coloured ring around the pupil of the eye is called the iris






,like a snowflake.
Controls light levels inside the eye.
Tiny muscles that dilate and constrict the pupil size.
Divides the front of the eye from the back of the eye.
Color comes from melanin.

brown or black in colour
Individuality of Iris

Left and right eye irises have distinctive pattern.
Characteristics of Iris
7

 Has highly distinguishing texture.
 Right eye differs from left eye.
 Twins have different iris texture.
 Iris pattern remains unchanged after the age of two and does not

degrade overtime or with the environment.
 Iris patterns are extremely complex than other biometric patterns.
What Is It?
.

Going the layman way the biometric identification of the iris is called as
―IRIS SCANNING‖.
But as per WIKIPEDIA,
“Iris recognition is a method of biometric authentication that uses
pattern-recognition techniques based on high-resolution images of the
irides of an individual's eyes.”
WHY ?
400 identifying features
The iris is a living password
Artificial duplication is virtually impossible
Probability of matching of two irises is 1:1078
Genetic independency
Its inherent isolation and protection from
the external environment.
WHEN
1936
• Idea was proposed by ophthalmologist Frank Burch
1980
• Appeared in the Bond Films
1987
• Aram Safir & leonard Flom patented the idea and asked John
Dougman to create actual algorithms for that. John Dougman created
this algorithm and patented that in the same year..
1987
• Licensee Sensar deployed special cameras in ATMs of NCR corps and
Diebold Corps
1997-1999
• “Panasonic Authenticam‖ was ready for use in public places like airports
HOW : THE SCIENCE BEHIND IT
Iris on the Move: Acquisition of
Images
To acquire images with sufficient resolution and sharpness to support recognition.

A. Optics and Camera:
Human heads are on the order of 15 cm wide.
In case of a portal, we needed a capture volume width on the order of 20–30 cm.
More than 200 pixels or more across the iris- Good quality.
Of 150–200 pixels across the iris – Acceptable quality
Of 100–150 pixels to be of- Marginal quality.
B. Illumination:
The shutter is only open during the strobe to reduce the effect of
ambient light.
C. Coarse Segmentation:
Daugman algorithm expects 640 x 480 images.
Iris Localization
13

Both the inner boundary and the outer boundary of a typical iris can be taken
as circles.
 But the two circles are usually not co-centric.
The inner boundary between the pupil and the iris is detected.
 The outer boundary of the iris is more difficult to detect because of the low
contrast between the two sides of the boundary.
 The outer boundary is detected by maximizing changes of the perimeternormalized along the circle.

Iris Normalization
14

 The size of the pupil may change due to the variation of the illumination and the

associated elastic deformations in the iris texture may interfere with the results of
pattern matching.
 Since both the inner and outer boundaries of the iris have been detected, it is easy to
map the iris ring to a rectangular block of texture of a fixed size.
Pattern Matching
How closely the produced code matches the encoded features stored in the
database.
One technique for comparing two IrisCodes is to use the Hamming distance,
which is the number of corresponding bits that differ between the two IrisCodes.
Recording of Identities
Image Processing
John Daugman (1994)
• Pupil detection: circular edge detector

• Segmenting sclera

max G (r )

r , x0 , y 0

r r , x0 , y 0

I ( x, y )
ds
2 r
Rubbersheet Model
θ
r
0

1

Each pixel (x,y) is mapped into
polar pair (r, ). θ

r

θ
Circular band is divided into 8
Sub-bands of equal thickness for a
given angle θ .
Measure of Performance
• Off-line and on-line modes of operation.

Hamming distance: standard measure for comparison of binary strings.

D

1
n

n

xk
k 1

x and y are two IrisCodes
is the notation for exclusive OR (XOR)
Counts bits that disagree.

yk
Observations
• Two IrisCodes from the same eye
form genuine pair => genuine Hamming
distance.
• Two IrisCodes from two different eyes
form imposter pair => imposter Hamming
distance.
• Bits in IrisCodes are correlated (both
for genuine pair and for imposter pair).
• The correlation between IrisCodes
from the same eye is stronger.
Iris Recognition System
Acquisition

IrisCode

Gabor Filters

Image

Localization

Polar Representation
Demarcated Zones
22
Imaging Systems

http://www.iridiantech.com/
Merits
 · Highly protected, internal organ of the eye
 · Externally visible; patterns imaged from a distance
 · Iris patterns possess a high degree of randomness

.Uniqueness: set by combinatorial complexity
· Changing pupil size confirms natural physiology
 · Limited genetic penetrance of iris patterns
 · Patterns apparently stable throughout life.
 A key advantage of iris recognition is its stability, or
template
longevity, as, barring trauma, a single enrollment can last a lifetime.
Demerits
 · Small target (1 cm) to acquire from a distance (1m)
 · Located behind a curved, wet, reflecting surface
 · Obscured by eyelashes, lenses, reflections
 · Partially occluded by eyelids, often drooping
 · Deforms non-elastically as pupil changes size

 · Illumination should not be visible or bright.
Applications
 . ATMs
 .Fugitive track record

 .Computer login: The iris as a living password.
 · National Border Controls: The iris as a living password.
 · Ticket less air travel.
 · Premises access control (home, office, laboratory etc.).

 · Driving licenses and other personal certificates.
 · Entitlements and benefits authentication.
 · Forensics, birth certificates, tracking missing or wanted person
 · Credit-card authentication.
 · Automobile ignition and unlocking; anti-theft devices.
 · Anti-terrorism (e.g.:— suspect Screening at airports)
 · Secure financial transaction (e-commerce, banking).
 · Internet security, control of access to privileged information.
National Geographic: 1984 and
2002
Sharbat Gula
 The remarkable story of Sharbat

Gula, first photographed in 1984
aged 12 in a refugee camp in
Pakistan by National Geographic
(NG)
photographer
Steve
McCurry, and traced 18 years
later to a remote part of
Afghanistan where she was
again photographed by McCurry.

 So the NG turned to the inventor

of automatic iris recognition,
John Daugman at the University
of Cambridge.

 The numbers Daugman got left

no question in his mind that the
eyes of the young Afghan
refugee and the eyes of the adult
Sharbat Gula belong to the
same person.
John Daugman and the Eyes of
Sharbat Gula
Iris is seen as the saviour of the UID project in India.

A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the
Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and
U.S. service members.
Comparison
Method

Iris

Coded Pattern

Iris pattern
fingerprints

Fingerprint
voice
Signature

Face

Palm

Voice
characteristics
Shape of letters,
writing
Order, pen pressure
Outline, shape &
distribution of eyes, nose
size, length, &
thickness hands

MisIdentific
--ation rate

Security

1/1,200,0
00

High

1/1,000

Medium

Universal

1/30

Low

Telephone service

1/10
0

Low

Low-security

1/100

Low

Low-security

1/700

Low

Low-security

Applications

high-security
Conclusion
32

 Iris recognition has proven to be a very useful and versatile

security measure.
 It is a quick and accurate way of identifying an individual with no
chance for human error.
 Iris recognition is widely used in the transportation industry and
can have many applications in other fields where security is
necessary.
 Iris recognition will prove to be a widely used security measure
in the future.
References
 · http://www.cl.cam.ac.uk
 ·http://en.wikipedia.org/wiki/Iris_recognition
 .www.seminars4u.com
 Daugman J (1999) "Biometric decision landscapes."

Technical Report No TR482, University of Cambridge
Computer Laboratory.
 International Journal of Computer Technology and
Electronics Engineering (IJCTEE) Volume 2, Issue
1
 THANK YOU

More Related Content

What's hot

Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 

What's hot (20)

Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 

Similar to Iris recognition seminar

technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdfPoooi2
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptnaghamallella
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognitionManish Kumar
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognitionAhmed Tememe
 
IRIS RECOGNISATION
IRIS RECOGNISATION IRIS RECOGNISATION
IRIS RECOGNISATION dont
 
Seminar internasional Universitas Negeri Surakarta
Seminar internasional Universitas Negeri SurakartaSeminar internasional Universitas Negeri Surakarta
Seminar internasional Universitas Negeri SurakartaRizkyFaundra
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
Iris Recognition .pptx
Iris Recognition .pptxIris Recognition .pptx
Iris Recognition .pptxSOMESHJADHWANI
 

Similar to Iris recognition seminar (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Iris sem
Iris semIris sem
Iris sem
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
IRIS RECOGNISATION
IRIS RECOGNISATION IRIS RECOGNISATION
IRIS RECOGNISATION
 
E010222124
E010222124E010222124
E010222124
 
Seminar internasional Universitas Negeri Surakarta
Seminar internasional Universitas Negeri SurakartaSeminar internasional Universitas Negeri Surakarta
Seminar internasional Universitas Negeri Surakarta
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Iris Recognition .pptx
Iris Recognition .pptxIris Recognition .pptx
Iris Recognition .pptx
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Iq3116211626
Iq3116211626Iq3116211626
Iq3116211626
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Iris recognition seminar

  • 2. The need for biometrics As per wikipedia, “Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits” The need for biometrics o -> Rapid development in technology o -> Globalization
  • 4. Anatomy of the Human Eye • Eye = Camera • Cornea bends, refracts, and focuses light. • Retina = Film for image projection (converts image into electrical signals). • Optical nerve transmits signals to the brain.
  • 5. What is Iris? 5  The coloured ring around the pupil of the eye is called the iris     ,like a snowflake. Controls light levels inside the eye. Tiny muscles that dilate and constrict the pupil size. Divides the front of the eye from the back of the eye. Color comes from melanin. brown or black in colour
  • 6. Individuality of Iris Left and right eye irises have distinctive pattern.
  • 7. Characteristics of Iris 7  Has highly distinguishing texture.  Right eye differs from left eye.  Twins have different iris texture.  Iris pattern remains unchanged after the age of two and does not degrade overtime or with the environment.  Iris patterns are extremely complex than other biometric patterns.
  • 8. What Is It? . Going the layman way the biometric identification of the iris is called as ―IRIS SCANNING‖. But as per WIKIPEDIA, “Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes.”
  • 9. WHY ? 400 identifying features The iris is a living password Artificial duplication is virtually impossible Probability of matching of two irises is 1:1078 Genetic independency Its inherent isolation and protection from the external environment.
  • 10. WHEN 1936 • Idea was proposed by ophthalmologist Frank Burch 1980 • Appeared in the Bond Films 1987 • Aram Safir & leonard Flom patented the idea and asked John Dougman to create actual algorithms for that. John Dougman created this algorithm and patented that in the same year.. 1987 • Licensee Sensar deployed special cameras in ATMs of NCR corps and Diebold Corps 1997-1999 • “Panasonic Authenticam‖ was ready for use in public places like airports
  • 11. HOW : THE SCIENCE BEHIND IT
  • 12. Iris on the Move: Acquisition of Images To acquire images with sufficient resolution and sharpness to support recognition. A. Optics and Camera: Human heads are on the order of 15 cm wide. In case of a portal, we needed a capture volume width on the order of 20–30 cm. More than 200 pixels or more across the iris- Good quality. Of 150–200 pixels across the iris – Acceptable quality Of 100–150 pixels to be of- Marginal quality. B. Illumination: The shutter is only open during the strobe to reduce the effect of ambient light. C. Coarse Segmentation: Daugman algorithm expects 640 x 480 images.
  • 13. Iris Localization 13 Both the inner boundary and the outer boundary of a typical iris can be taken as circles.  But the two circles are usually not co-centric. The inner boundary between the pupil and the iris is detected.  The outer boundary of the iris is more difficult to detect because of the low contrast between the two sides of the boundary.  The outer boundary is detected by maximizing changes of the perimeternormalized along the circle. 
  • 14. Iris Normalization 14  The size of the pupil may change due to the variation of the illumination and the associated elastic deformations in the iris texture may interfere with the results of pattern matching.  Since both the inner and outer boundaries of the iris have been detected, it is easy to map the iris ring to a rectangular block of texture of a fixed size.
  • 15. Pattern Matching How closely the produced code matches the encoded features stored in the database. One technique for comparing two IrisCodes is to use the Hamming distance, which is the number of corresponding bits that differ between the two IrisCodes.
  • 17. Image Processing John Daugman (1994) • Pupil detection: circular edge detector • Segmenting sclera max G (r ) r , x0 , y 0 r r , x0 , y 0 I ( x, y ) ds 2 r
  • 18. Rubbersheet Model θ r 0 1 Each pixel (x,y) is mapped into polar pair (r, ). θ r θ Circular band is divided into 8 Sub-bands of equal thickness for a given angle θ .
  • 19. Measure of Performance • Off-line and on-line modes of operation. Hamming distance: standard measure for comparison of binary strings. D 1 n n xk k 1 x and y are two IrisCodes is the notation for exclusive OR (XOR) Counts bits that disagree. yk
  • 20. Observations • Two IrisCodes from the same eye form genuine pair => genuine Hamming distance. • Two IrisCodes from two different eyes form imposter pair => imposter Hamming distance. • Bits in IrisCodes are correlated (both for genuine pair and for imposter pair). • The correlation between IrisCodes from the same eye is stronger.
  • 21. Iris Recognition System Acquisition IrisCode Gabor Filters Image Localization Polar Representation Demarcated Zones
  • 22. 22
  • 24. Merits  · Highly protected, internal organ of the eye  · Externally visible; patterns imaged from a distance  · Iris patterns possess a high degree of randomness .Uniqueness: set by combinatorial complexity · Changing pupil size confirms natural physiology  · Limited genetic penetrance of iris patterns  · Patterns apparently stable throughout life.  A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.
  • 25. Demerits  · Small target (1 cm) to acquire from a distance (1m)  · Located behind a curved, wet, reflecting surface  · Obscured by eyelashes, lenses, reflections  · Partially occluded by eyelids, often drooping  · Deforms non-elastically as pupil changes size  · Illumination should not be visible or bright.
  • 26. Applications  . ATMs  .Fugitive track record  .Computer login: The iris as a living password.  · National Border Controls: The iris as a living password.  · Ticket less air travel.  · Premises access control (home, office, laboratory etc.).  · Driving licenses and other personal certificates.  · Entitlements and benefits authentication.  · Forensics, birth certificates, tracking missing or wanted person  · Credit-card authentication.  · Automobile ignition and unlocking; anti-theft devices.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e-commerce, banking).  · Internet security, control of access to privileged information.
  • 28. Sharbat Gula  The remarkable story of Sharbat Gula, first photographed in 1984 aged 12 in a refugee camp in Pakistan by National Geographic (NG) photographer Steve McCurry, and traced 18 years later to a remote part of Afghanistan where she was again photographed by McCurry.  So the NG turned to the inventor of automatic iris recognition, John Daugman at the University of Cambridge.  The numbers Daugman got left no question in his mind that the eyes of the young Afghan refugee and the eyes of the adult Sharbat Gula belong to the same person.
  • 29. John Daugman and the Eyes of Sharbat Gula
  • 30. Iris is seen as the saviour of the UID project in India. A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and U.S. service members.
  • 31. Comparison Method Iris Coded Pattern Iris pattern fingerprints Fingerprint voice Signature Face Palm Voice characteristics Shape of letters, writing Order, pen pressure Outline, shape & distribution of eyes, nose size, length, & thickness hands MisIdentific --ation rate Security 1/1,200,0 00 High 1/1,000 Medium Universal 1/30 Low Telephone service 1/10 0 Low Low-security 1/100 Low Low-security 1/700 Low Low-security Applications high-security
  • 32. Conclusion 32  Iris recognition has proven to be a very useful and versatile security measure.  It is a quick and accurate way of identifying an individual with no chance for human error.  Iris recognition is widely used in the transportation industry and can have many applications in other fields where security is necessary.  Iris recognition will prove to be a widely used security measure in the future.
  • 33. References  · http://www.cl.cam.ac.uk  ·http://en.wikipedia.org/wiki/Iris_recognition  .www.seminars4u.com  Daugman J (1999) "Biometric decision landscapes." Technical Report No TR482, University of Cambridge Computer Laboratory.  International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 1