SlideShare a Scribd company logo
1 of 28
IRIS RECOGNITION 
 Presented by:- 
 Name:-Anurag anand 
 Roll no:-1109633010 
 Branch:-E.T. (7th sem.)
The need for biometrics 
Biometrics consists of methods for uniquely recognizing humans based 
upon one or more intrinsic physical or behavioral traits. 
The need for biometrics: 
o Rapid development in technology 
o Globalization
Biometrics and Iris Scanning
Anatomy of the Human Eye 
• Eye = Camera 
• Cornea bends, refracts, 
and focuses light. 
• Retina = Film for image 
projection (converts image 
into electrical signals). 
• Optical nerve transmits 
signals to the brain.
What is Iris? 
 The coloured ring around the pupil of the eye is called the iris 
,like a snowflake. 
 Controls light levels inside the eye. 
 Tiny muscles that dilate and constrict the pupil size. 
 Divides the front of the eye from the back of the eye. 
 Color comes from melanin. 
brown or black in colour
Individuality of Iris 
Left and right eye irises have distinctive pattern.
Characteristics of Iris 
 Has highly distinguishing texture. 
 Right eye differs from left eye. 
 Twins have different iris texture. 
 Iris pattern remains unchanged after the age of two and does not 
degrade overtime or with the environment. 
 Iris patterns are extremely complex than other biometric patterns.
What Is It? 
. 
Going the layman way the biometric identification of the iris is called as 
“IRIS SCANNING”. 
“Iris recognition is a method of biometric authentication that uses 
pattern-recognition techniques based on high-resolution images of the 
irides of an individual's eyes.”
WHY ? 
400 identifying features 
The iris is a living password 
Artificial duplication is virtually impossible 
Probability of matching of two irises is 1:1078 
Genetic independency 
Its inherent isolation and protection from 
the external environment.
WHEN? 
1936 
• Idea was proposed by ophthalmologist Frank Burch 
1980 
• Appeared in the Bond Films 
1987 
• Aram Safir & leonard Flom patented the idea and asked John 
Dougman to create actual algorithms for that. John Dougman created 
this algorithm and patented that in the same year.. 
1987 
• Licensee Sensar deployed special cameras in ATMs of NCR corps 
1997-1999 
• “Panasonic Authenticam” was ready for use in public places like airports
HOW : THE SCIENCE BEHIND IT
Iris on the Move: Acquisition of 
Images 
To acquire images with sufficient resolution and sharpness to support recognition. 
A. Optics and Camera: 
Human heads are on the order of 15 cm wide. 
In case of a portal, we needed a capture volume width on the order of 20–30 cm. 
More than 200 pixels or more across the iris- Good quality. 
Of 150–200 pixels across the iris – Acceptable quality 
Of 100–150 pixels to be of- Marginal quality. 
B. Illumination: 
The shutter is only open during the strobe to reduce the effect of 
ambient light. 
C. Coarse Segmentation: 
Daugman algorithm expects 640 x 480 images.
Iris Localization 
 Both the inner boundary and the outer boundary of a typical iris can be taken 
as circles. 
 But the two circles are usually not co-centric. 
The inner boundary between the pupil and the iris is detected. 
 The outer boundary of the iris is more difficult to detect because of the low 
contrast between the two sides of the boundary. 
 The outer boundary is detected by maximizing changes of the perimeter-normalized 
along the circle.
Iris Normalization 
 The size of the pupil may change due to the variation of the illumination and the 
associated elastic deformations in the iris texture may interfere with the results of 
pattern matching. 
 Since both the inner and outer boundaries of the iris have been detected, it is 
easy to map the iris ring to a rectangular block of texture of a fixed size. 
14
Pattern Matching 
How closely the produced code matches the encoded features stored in the 
database. 
One technique for comparing two Iris Codes is to use the Hamming distance, 
which is the number of corresponding bits that differ between the two Iris Codes.
Recording of Identities
Iris Recognition System 
Image 
Acquisition Localization 
IrisCode Gabor Filters Polar Representation 
Demarcated Zones
18
Merits 
 Highly protected, internal organ of the eye 
 Externally visible; patterns imaged from a distance 
 Iris patterns possess a high degree of randomness 
Uniqueness: set by combinatorial complexity 
Changing pupil size confirms natural physiology 
 Limited genetic penetrance of iris patterns 
 Patterns apparently stable throughout life. 
 A key advantage of iris recognition is its stability, or template 
longevity, as, barring trauma, a single enrollment can last a lifetime.
Demerits 
 Small target (1 cm) to acquire from a distance (1m) 
 Located behind a curved, wet, reflecting surface 
 Obscured by eyelashes, lenses, reflections 
 Partially occluded by eyelids, often drooping 
 Deforms non-elastically as pupil changes size 
 Illumination should not be visible or bright.
Applications 
 . ATMs 
 .Fugitive track record 
 .Computer login: The iris as a living password. 
 · National Border Controls: The iris as a living password. 
 · Ticket less air travel. 
 · Premises access control (home, office, laboratory etc.). 
 · Driving licenses and other personal certificates. 
 · Entitlements and benefits authentication. 
 · Forensics, birth certificates, tracking missing or wanted person 
 · Credit-card authentication. 
 · Automobile ignition and unlocking; anti-theft devices. 
 · Anti-terrorism (e.g.:— suspect Screening at airports) 
 · Secure financial transaction (e-commerce, banking). 
 · Internet security, control of access to privileged information.
National Geographic: 1984 and 2002
Sharbat Gula 
 The remarkable story of Sharbat Gula, first 
photographed in 1984 aged 12 in a refugee 
camp in Pakistan by National Geographic (NG) 
photographer Steve McCurry, and traced 18 
years later to a remote part of Afghanistan 
where she was again photographed by 
McCurry. 
 So the NG turned to the inventor of automatic 
iris recognition, John Daugman at the 
University of Cambridge. 
 The numbers Daugman got left no question in 
his mind that the eyes of the young Afghan 
refugee and the eyes of the adult Sharbat Gula 
belong to the same person.
John Daugman and the Eyes of 
Sharbat Gula
Iris is seen as the saviour of the UID project in India. 
A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the 
Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and 
U.S. service members.
Comparison 
Method Coded Pattern 
MisIdentific 
--ation rate 
Security Applications 
Iris Iris pattern 1/1,200,0 
00 
High high-security 
Fingerprint fingerprints 
1/1,000 Medium Universal 
voice 
Signature 
Face 
Palm 
Voice 
characteristics 1/30 Low 
Low 
Low 
Low 
Telephone service 
Low-security 
Low-security 
Low-security 
1/10 
0 
1/100 
1/700 
Shape of letters, 
writing 
Order, pen pressure 
Outline, shape & 
distribution of eyes, nose 
size, length, & 
thickness hands
THANK 
YOU
IRIS RECOGNITION

More Related Content

What's hot

Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
Sunil Kumar Chawla
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 

What's hot (20)

Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 
Biometrics
BiometricsBiometrics
Biometrics
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 

Viewers also liked

Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
Shashank Dhariwal
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
argoncillo
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Viewers also liked (20)

Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
 
Crypt
CryptCrypt
Crypt
 
Edge detection using evolutionary algorithms new
Edge detection using evolutionary algorithms newEdge detection using evolutionary algorithms new
Edge detection using evolutionary algorithms new
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to IRIS RECOGNITION

The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
SwarupKulkarni
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
ARUNASUJITHA
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
Karthika Krishna
 

Similar to IRIS RECOGNITION (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
14 5 b8
14 5 b814 5 b8
14 5 b8
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Iris print
Iris print Iris print
Iris print
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Iris/Retina Identification System
Iris/Retina Identification SystemIris/Retina Identification System
Iris/Retina Identification System
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Dh24703708
Dh24703708Dh24703708
Dh24703708
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 

Recently uploaded

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 

IRIS RECOGNITION

  • 1. IRIS RECOGNITION  Presented by:-  Name:-Anurag anand  Roll no:-1109633010  Branch:-E.T. (7th sem.)
  • 2. The need for biometrics Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. The need for biometrics: o Rapid development in technology o Globalization
  • 4. Anatomy of the Human Eye • Eye = Camera • Cornea bends, refracts, and focuses light. • Retina = Film for image projection (converts image into electrical signals). • Optical nerve transmits signals to the brain.
  • 5. What is Iris?  The coloured ring around the pupil of the eye is called the iris ,like a snowflake.  Controls light levels inside the eye.  Tiny muscles that dilate and constrict the pupil size.  Divides the front of the eye from the back of the eye.  Color comes from melanin. brown or black in colour
  • 6. Individuality of Iris Left and right eye irises have distinctive pattern.
  • 7. Characteristics of Iris  Has highly distinguishing texture.  Right eye differs from left eye.  Twins have different iris texture.  Iris pattern remains unchanged after the age of two and does not degrade overtime or with the environment.  Iris patterns are extremely complex than other biometric patterns.
  • 8. What Is It? . Going the layman way the biometric identification of the iris is called as “IRIS SCANNING”. “Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes.”
  • 9. WHY ? 400 identifying features The iris is a living password Artificial duplication is virtually impossible Probability of matching of two irises is 1:1078 Genetic independency Its inherent isolation and protection from the external environment.
  • 10. WHEN? 1936 • Idea was proposed by ophthalmologist Frank Burch 1980 • Appeared in the Bond Films 1987 • Aram Safir & leonard Flom patented the idea and asked John Dougman to create actual algorithms for that. John Dougman created this algorithm and patented that in the same year.. 1987 • Licensee Sensar deployed special cameras in ATMs of NCR corps 1997-1999 • “Panasonic Authenticam” was ready for use in public places like airports
  • 11. HOW : THE SCIENCE BEHIND IT
  • 12. Iris on the Move: Acquisition of Images To acquire images with sufficient resolution and sharpness to support recognition. A. Optics and Camera: Human heads are on the order of 15 cm wide. In case of a portal, we needed a capture volume width on the order of 20–30 cm. More than 200 pixels or more across the iris- Good quality. Of 150–200 pixels across the iris – Acceptable quality Of 100–150 pixels to be of- Marginal quality. B. Illumination: The shutter is only open during the strobe to reduce the effect of ambient light. C. Coarse Segmentation: Daugman algorithm expects 640 x 480 images.
  • 13. Iris Localization  Both the inner boundary and the outer boundary of a typical iris can be taken as circles.  But the two circles are usually not co-centric. The inner boundary between the pupil and the iris is detected.  The outer boundary of the iris is more difficult to detect because of the low contrast between the two sides of the boundary.  The outer boundary is detected by maximizing changes of the perimeter-normalized along the circle.
  • 14. Iris Normalization  The size of the pupil may change due to the variation of the illumination and the associated elastic deformations in the iris texture may interfere with the results of pattern matching.  Since both the inner and outer boundaries of the iris have been detected, it is easy to map the iris ring to a rectangular block of texture of a fixed size. 14
  • 15. Pattern Matching How closely the produced code matches the encoded features stored in the database. One technique for comparing two Iris Codes is to use the Hamming distance, which is the number of corresponding bits that differ between the two Iris Codes.
  • 17. Iris Recognition System Image Acquisition Localization IrisCode Gabor Filters Polar Representation Demarcated Zones
  • 18. 18
  • 19. Merits  Highly protected, internal organ of the eye  Externally visible; patterns imaged from a distance  Iris patterns possess a high degree of randomness Uniqueness: set by combinatorial complexity Changing pupil size confirms natural physiology  Limited genetic penetrance of iris patterns  Patterns apparently stable throughout life.  A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.
  • 20. Demerits  Small target (1 cm) to acquire from a distance (1m)  Located behind a curved, wet, reflecting surface  Obscured by eyelashes, lenses, reflections  Partially occluded by eyelids, often drooping  Deforms non-elastically as pupil changes size  Illumination should not be visible or bright.
  • 21. Applications  . ATMs  .Fugitive track record  .Computer login: The iris as a living password.  · National Border Controls: The iris as a living password.  · Ticket less air travel.  · Premises access control (home, office, laboratory etc.).  · Driving licenses and other personal certificates.  · Entitlements and benefits authentication.  · Forensics, birth certificates, tracking missing or wanted person  · Credit-card authentication.  · Automobile ignition and unlocking; anti-theft devices.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e-commerce, banking).  · Internet security, control of access to privileged information.
  • 23. Sharbat Gula  The remarkable story of Sharbat Gula, first photographed in 1984 aged 12 in a refugee camp in Pakistan by National Geographic (NG) photographer Steve McCurry, and traced 18 years later to a remote part of Afghanistan where she was again photographed by McCurry.  So the NG turned to the inventor of automatic iris recognition, John Daugman at the University of Cambridge.  The numbers Daugman got left no question in his mind that the eyes of the young Afghan refugee and the eyes of the adult Sharbat Gula belong to the same person.
  • 24. John Daugman and the Eyes of Sharbat Gula
  • 25. Iris is seen as the saviour of the UID project in India. A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and U.S. service members.
  • 26. Comparison Method Coded Pattern MisIdentific --ation rate Security Applications Iris Iris pattern 1/1,200,0 00 High high-security Fingerprint fingerprints 1/1,000 Medium Universal voice Signature Face Palm Voice characteristics 1/30 Low Low Low Low Telephone service Low-security Low-security Low-security 1/10 0 1/100 1/700 Shape of letters, writing Order, pen pressure Outline, shape & distribution of eyes, nose size, length, & thickness hands