SlideShare a Scribd company logo
1 of 17
Presented by,
Himansu Parichha
   7th sem(IT)
   0801213054
  JITM(BPUT)
As per wikipedia,
“Biometrics consists of methods for uniquely
  recognizing humans based upon one or more
  intrinsic physical or behavioral traits”

The need for biometrics
  o   -> Rapid development in technology
  o   -> Globalization
1936
 • Idea was proposed by ophthalmologist Frank Burch

1980
 • Appeared in the Bond Films

1987
 • Aram Safir & leonard Flom patented the idea and asked John Doug
   man to create actual algorithms for that. John Dougman created this
   algorithm and patented that in the same year..
1987
 • Licensee Sensar deployed special cameras in ATMs of NCR corps and
   Diebold Corps
1997-1999
 • “Panasonic Authenticam” was ready for use in public places like
   airports
The iris is a Protective internal organ of the eye. It is easily visible from yards
away as a colored disk, behind the clear protective window of the cornea,
surrounded by the white tissue of the eye. It is the only internal organ of the
body normally visible externally. It is a thin diaphragm stretching across the
anterior portion of the eye and supported by lens.
                           Going the layman way the biometric identification of
the iris is called as “IRIS SCANNING”.But as per WIKIPEDIA,
 “Iris recognition is a method of biometric authentication that uses pattern-
recognition techniques based on high-resolution images of the irides of an
individual's eyes.”
The iris is a living password


Artificial duplication is virtually impossible


400 identifying features


Probability of matching of two irises is 1:1078


Genetic independency

Its inherent isolation and protection from
the external environment.
   The design and implementation of a system for
    automated iris recognition can be subdivided in to
    3 major parts:-

   1. IMAGE ACQUISITION
     To acquire images with sufficient          resolution   and
    sharpness to support recognition.

    2. IRIS LOCALIZATION
     To delemit the iris from the rest of the image.


   3. PATTERN MATCHING
     The Iris Code derived from this process is compared
    with previously generated Iris Code.

   · Highly protected, internal organ of the eye
   · Externally visible; patterns imaged from a
    distance
   · Iris patterns possess a high degree of
    randomness
     .Uniqueness: set by combinatorial complexity
    · Changing pupil size confirms natural
    physiology
   · Limited genetic penetrance of iris patterns
   · Patterns apparently stable throughout life
   · Small target (1 cm) to acquire from a distance
    (1m)
   · Located behind a curved, wet, reflecting
    surface
   · Obscured by eyelashes, lenses, reflections
   · Partially occluded by eyelids, often drooping
   · Deforms non-elastically as pupil changes size
   · Illumination should not be visible or bright
    . ATMs
    .Fugitive track record
    .Computer login: The iris as a living password.
   · National Border Controls: The iris as a living password.
   · Ticket less air travel.
   · Premises access control (home, office, laboratory etc.).
   · Driving licenses and other personal certificates.
   · Entitlements and benefits authentication.
   · Forensics, birth certificates, tracking missing or wanted person
   · Credit-card authentication.
   · Automobile ignition and unlocking; anti-theft devices.
   · Anti-terrorism (e.g.:— suspect Screening at airports)
   · Secure financial transaction (e-commerce, banking).
   · Internet security, control of access to privileged information.
Iris recognition system is also finding unexpected applications. The best know
example involved using iris recognition to confirm the identification of a mysterious
young afghan woman named Sharbat Gula originally photographed by Steve
McCurry in 1984.Some 18 years later, McCurry photographed Sharbat Gula in
Afghanistan .At the behest of National Geographic, Dr.John Dougman,developer of
the Iris recognition system, then compared the irises in the photographs using his
algorithms. He concluded that the eyes were a match.
   The technical performance capability of the iris recognition
    process far surpasses that of any biometric technology now
    available. Iridian process is defined for rapid exhaustive
    search for very large databases: distinctive capability
    required for authentication today. The extremely low
    probabilities of getting a false match enable the iris
    recognition algorithms to search through extremely large
    databases, even of a national or planetary scale. Iris-based
    biometric technology has always been an exceptionally
    accurate one, and it may soon grow much more prominent.
   · http://www.cl.cam.ac.uk
   ·http://en.wikipedia.org/wiki/Iris_recognitio
    n
    .www.seminars4u.com
   Daugman J (1999) "Biometric decision landscapes."
    Technical Report No TR482,
   University of Cambridge Computer Laboratory

                 etric decision landscapes." Technical
                 Report No TR482,
                 University of Cambridge Computer
                 Laboratory
Iris scanning

More Related Content

What's hot

THE THIRD EYE-Presentation
THE THIRD EYE-PresentationTHE THIRD EYE-Presentation
THE THIRD EYE-Presentation
Romil Shah
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 

What's hot (20)

Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
 
Screenless Display PPT Presentation
Screenless Display PPT PresentationScreenless Display PPT Presentation
Screenless Display PPT Presentation
 
THE THIRD EYE-Presentation
THE THIRD EYE-PresentationTHE THIRD EYE-Presentation
THE THIRD EYE-Presentation
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
E-PAPER TECHNOLOGY
E-PAPER TECHNOLOGYE-PAPER TECHNOLOGY
E-PAPER TECHNOLOGY
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Eye directive wheel chair
Eye directive wheel chairEye directive wheel chair
Eye directive wheel chair
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPT
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE
 

Viewers also liked

Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
Nilu Desai
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 

Viewers also liked (20)

Iris ppt
Iris pptIris ppt
Iris ppt
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Wallet
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Retina scan
Retina scanRetina scan
Retina scan
 
Data Compression Technique
Data Compression TechniqueData Compression Technique
Data Compression Technique
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 

Similar to Iris scanning

Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
ARUNASUJITHA
 

Similar to Iris scanning (20)

Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris print
Iris print Iris print
Iris print
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
14 5 b8
14 5 b814 5 b8
14 5 b8
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Mis biometrics version 2
Mis   biometrics version 2Mis   biometrics version 2
Mis biometrics version 2
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Iris scanning

  • 1. Presented by, Himansu Parichha 7th sem(IT) 0801213054 JITM(BPUT)
  • 2. As per wikipedia, “Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits” The need for biometrics o -> Rapid development in technology o -> Globalization
  • 3.
  • 4. 1936 • Idea was proposed by ophthalmologist Frank Burch 1980 • Appeared in the Bond Films 1987 • Aram Safir & leonard Flom patented the idea and asked John Doug man to create actual algorithms for that. John Dougman created this algorithm and patented that in the same year.. 1987 • Licensee Sensar deployed special cameras in ATMs of NCR corps and Diebold Corps 1997-1999 • “Panasonic Authenticam” was ready for use in public places like airports
  • 5. The iris is a Protective internal organ of the eye. It is easily visible from yards away as a colored disk, behind the clear protective window of the cornea, surrounded by the white tissue of the eye. It is the only internal organ of the body normally visible externally. It is a thin diaphragm stretching across the anterior portion of the eye and supported by lens. Going the layman way the biometric identification of the iris is called as “IRIS SCANNING”.But as per WIKIPEDIA, “Iris recognition is a method of biometric authentication that uses pattern- recognition techniques based on high-resolution images of the irides of an individual's eyes.”
  • 6. The iris is a living password Artificial duplication is virtually impossible 400 identifying features Probability of matching of two irises is 1:1078 Genetic independency Its inherent isolation and protection from the external environment.
  • 7.
  • 8. The design and implementation of a system for automated iris recognition can be subdivided in to 3 major parts:-  1. IMAGE ACQUISITION  To acquire images with sufficient resolution and sharpness to support recognition. 2. IRIS LOCALIZATION  To delemit the iris from the rest of the image.   3. PATTERN MATCHING  The Iris Code derived from this process is compared with previously generated Iris Code.
  • 9.
  • 10.
  • 11. · Highly protected, internal organ of the eye  · Externally visible; patterns imaged from a distance  · Iris patterns possess a high degree of randomness .Uniqueness: set by combinatorial complexity · Changing pupil size confirms natural physiology  · Limited genetic penetrance of iris patterns  · Patterns apparently stable throughout life
  • 12. · Small target (1 cm) to acquire from a distance (1m)  · Located behind a curved, wet, reflecting surface  · Obscured by eyelashes, lenses, reflections  · Partially occluded by eyelids, often drooping  · Deforms non-elastically as pupil changes size  · Illumination should not be visible or bright
  • 13. . ATMs  .Fugitive track record  .Computer login: The iris as a living password.  · National Border Controls: The iris as a living password.  · Ticket less air travel.  · Premises access control (home, office, laboratory etc.).  · Driving licenses and other personal certificates.  · Entitlements and benefits authentication.  · Forensics, birth certificates, tracking missing or wanted person  · Credit-card authentication.  · Automobile ignition and unlocking; anti-theft devices.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e-commerce, banking).  · Internet security, control of access to privileged information.
  • 14. Iris recognition system is also finding unexpected applications. The best know example involved using iris recognition to confirm the identification of a mysterious young afghan woman named Sharbat Gula originally photographed by Steve McCurry in 1984.Some 18 years later, McCurry photographed Sharbat Gula in Afghanistan .At the behest of National Geographic, Dr.John Dougman,developer of the Iris recognition system, then compared the irises in the photographs using his algorithms. He concluded that the eyes were a match.
  • 15. The technical performance capability of the iris recognition process far surpasses that of any biometric technology now available. Iridian process is defined for rapid exhaustive search for very large databases: distinctive capability required for authentication today. The extremely low probabilities of getting a false match enable the iris recognition algorithms to search through extremely large databases, even of a national or planetary scale. Iris-based biometric technology has always been an exceptionally accurate one, and it may soon grow much more prominent.
  • 16. · http://www.cl.cam.ac.uk  ·http://en.wikipedia.org/wiki/Iris_recognitio n  .www.seminars4u.com  Daugman J (1999) "Biometric decision landscapes." Technical Report No TR482,  University of Cambridge Computer Laboratory etric decision landscapes." Technical Report No TR482, University of Cambridge Computer Laboratory