2. The need for biometrics
Biometrics consists of methods for uniquely recognizing humans based
upon one or more intrinsic physical or behavioral traits.
The need for biometrics:
o Rapid development in technology
o Globalization
4. Anatomy of the Human Eye
• Eye = Camera
• Cornea bends, refracts,
and focuses light.
• Retina = Film for image
projection (converts image
into electrical signals).
• Optical nerve transmits
signals to the brain.
5. What is Iris?
The coloured ring around the pupil of the eye is called the iris
,like a snowflake.
Controls light levels inside the eye.
Tiny muscles that dilate and constrict the pupil size.
Divides the front of the eye from the back of the eye.
Color comes from melanin.
brown or black in colour
7. Characteristics of Iris
Has highly distinguishing texture.
Right eye differs from left eye.
Twins have different iris texture.
Iris pattern remains unchanged after the age of two and does not
degrade overtime or with the environment.
Iris patterns are extremely complex than other biometric patterns.
8. What Is It?
.
Going the layman way the biometric identification of the iris is called as
“IRIS SCANNING”.
“Iris recognition is a method of biometric authentication that uses
pattern-recognition techniques based on high-resolution images of the
irides of an individual's eyes.”
9. WHY ?
400 identifying features
The iris is a living password
Artificial duplication is virtually impossible
Probability of matching of two irises is 1:1078
Genetic independency
Its inherent isolation and protection from
the external environment.
10. WHEN?
1936
• Idea was proposed by ophthalmologist Frank Burch
1980
• Appeared in the Bond Films
1987
• Aram Safir & leonard Flom patented the idea and asked John
Dougman to create actual algorithms for that. John Dougman created
this algorithm and patented that in the same year..
1987
• Licensee Sensar deployed special cameras in ATMs of NCR corps
1997-1999
• “Panasonic Authenticam” was ready for use in public places like airports
12. Iris on the Move: Acquisition of
Images
To acquire images with sufficient resolution and sharpness to support recognition.
A. Optics and Camera:
Human heads are on the order of 15 cm wide.
In case of a portal, we needed a capture volume width on the order of 20–30 cm.
More than 200 pixels or more across the iris- Good quality.
Of 150–200 pixels across the iris – Acceptable quality
Of 100–150 pixels to be of- Marginal quality.
B. Illumination:
The shutter is only open during the strobe to reduce the effect of
ambient light.
C. Coarse Segmentation:
Daugman algorithm expects 640 x 480 images.
13. Iris Localization
Both the inner boundary and the outer boundary of a typical iris can be taken
as circles.
But the two circles are usually not co-centric.
The inner boundary between the pupil and the iris is detected.
The outer boundary of the iris is more difficult to detect because of the low
contrast between the two sides of the boundary.
The outer boundary is detected by maximizing changes of the perimeter-normalized
along the circle.
14. Iris Normalization
The size of the pupil may change due to the variation of the illumination and the
associated elastic deformations in the iris texture may interfere with the results of
pattern matching.
Since both the inner and outer boundaries of the iris have been detected, it is
easy to map the iris ring to a rectangular block of texture of a fixed size.
14
15. Pattern Matching
How closely the produced code matches the encoded features stored in the
database.
One technique for comparing two Iris Codes is to use the Hamming distance,
which is the number of corresponding bits that differ between the two Iris Codes.
19. Merits
Highly protected, internal organ of the eye
Externally visible; patterns imaged from a distance
Iris patterns possess a high degree of randomness
Uniqueness: set by combinatorial complexity
Changing pupil size confirms natural physiology
Limited genetic penetrance of iris patterns
Patterns apparently stable throughout life.
A key advantage of iris recognition is its stability, or template
longevity, as, barring trauma, a single enrollment can last a lifetime.
20. Demerits
Small target (1 cm) to acquire from a distance (1m)
Located behind a curved, wet, reflecting surface
Obscured by eyelashes, lenses, reflections
Partially occluded by eyelids, often drooping
Deforms non-elastically as pupil changes size
Illumination should not be visible or bright.
21. Applications
. ATMs
.Fugitive track record
.Computer login: The iris as a living password.
· National Border Controls: The iris as a living password.
· Ticket less air travel.
· Premises access control (home, office, laboratory etc.).
· Driving licenses and other personal certificates.
· Entitlements and benefits authentication.
· Forensics, birth certificates, tracking missing or wanted person
· Credit-card authentication.
· Automobile ignition and unlocking; anti-theft devices.
· Anti-terrorism (e.g.:— suspect Screening at airports)
· Secure financial transaction (e-commerce, banking).
· Internet security, control of access to privileged information.
23. Sharbat Gula
The remarkable story of Sharbat Gula, first
photographed in 1984 aged 12 in a refugee
camp in Pakistan by National Geographic (NG)
photographer Steve McCurry, and traced 18
years later to a remote part of Afghanistan
where she was again photographed by
McCurry.
So the NG turned to the inventor of automatic
iris recognition, John Daugman at the
University of Cambridge.
The numbers Daugman got left no question in
his mind that the eyes of the young Afghan
refugee and the eyes of the adult Sharbat Gula
belong to the same person.
25. Iris is seen as the saviour of the UID project in India.
A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the
Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and
U.S. service members.
26. Comparison
Method Coded Pattern
MisIdentific
--ation rate
Security Applications
Iris Iris pattern 1/1,200,0
00
High high-security
Fingerprint fingerprints
1/1,000 Medium Universal
voice
Signature
Face
Palm
Voice
characteristics 1/30 Low
Low
Low
Low
Telephone service
Low-security
Low-security
Low-security
1/10
0
1/100
1/700
Shape of letters,
writing
Order, pen pressure
Outline, shape &
distribution of eyes, nose
size, length, &
thickness hands