1. Introduction
Biometrics provides a secure method of authentication and identification.
Biometric identification utilises physiological and behavioural characteristics
to authenticate a person’s identity.
A biometric system can be divided into two stages:
Enrolment module
Identification module
Biometric devices have three primary components :
Automated mechanism
Processing, Storage and comparison of image with a stored data
Interfaces
1
2. Irises are one of the more accurate physiological characteristics that
can be used.
The probability of finding two people with identical iris pattern is
almost zero.
The iris-scan process begins with a photograph.
2
3. What is Iris?
3
The iris is a protective internal organ of a eye, which appear
as a colored disc , behind clear protective window of cornea,
surrounded by white tissue of the eye.
4. Iris Imaging
Position Your eye 10 to 15 centimetres
from the iris scanner.
Make sure that you can only see one
eye in the LCD display of the iris
scanner.
If you feel that one eye is giving you
more trouble than the other, always
use the other eye.
Keep your eye still during the scan.
Stand still until the computer indicates
identification is completed.
Iris Imaging
• Distance up to 1 meter
• Near-infrared camera
4
5. Iris localization
The process of obtaining picture
of iris only is called localization.
Delimits the iris from the rest of
the acquired image
To identify the approximately
concentric circular outer
boundaries of the iris and the
pupil in a photo of an eye using
DAUGMAN’S ALGORITHM
Exclude eyelids, eyelashes and
pupil also .
5
6. Feature Encoding
After localization iris code is computed based on information
received from GABOR WAVELETS.
GABOR WAVELETS are specialized filter banks that extract
information from signal at various locations and scales.
The IRIS CODE is calculated using 8 circular bands that has
been adjusted to iris and pupil boundary.
Iris recognition tech converts visible characteristic of iris into
512 bit iris code, these templates are stored for future
verification attempts.
6
7. Pattern Matching
Live Iris code of the iris presented for authentication is
compared with iris code stored in the database.
Bit by bit comparison is made between two irises & no of non
matching bits & matching bits are found out.
Number of non matching bits are divided by number of bits to
obtain Hamming distance.
Hamming distance gives degree of match or unmatch. For two
identical iris code, hamming distance is zero, and for perfectly
unmatch hamming distance is one.
7
8. Comparison with respect to cost &
Accuracy
Iris scanning is most expensive biometric security system when compared to other.
But the accuracy of this system is proportionately high.
8
11. Future Applications
Computer login: The iris as a living password.
National Border Controls: The iris as a living password.
Telephone call charging without cash, cards or PIN numbers.
Premises access control (home, office, laboratory etc.).
Driving licenses and other personal certificates.
Entitlements and benefits authentication.
Forensics, birth certificates, tracking missing or wanted person
Automobile ignition and unlocking; anti-theft devices.
11
12. Advantages
Sensing of the biometric is without physical contact .
Iris is an internal organ is well protected against damage .
Iris has a fine texture .
Highly stable .
Artificial eye can be detected .
Analysis of iris extremely fast .
Highly accurate .
12
13. Disadvantages
Requires much user cooperation.
Performance of iris authentication may be impaired by glasses .
Difficult to perform at a distance larger than a few meters
Susceptible to poor image quality .
Camera used in the process needs to have the correct amount of
illumination.
Obscured by eyelashes, lenses, reflections .
13
14. Conclusion
The uniqueness of iris and the low probability of a false acceptance or false
rejection all contribute to the benefits of using iris recognition technology.
Provides an accurate and secure method of authenticating users onto
company systems .
The technical performance cabability of the iris recognition process far
surpasses that of any biometric technology now available and it is the future
of highly secure security system.
14