SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1981
Study on: Advancement of Smartphone Security by using Iris
Scan Detection
Adesh. A. Potdukhe1, Prof. Sanket. S. Pawar2
1Student, BE Computer Science, Bharati Vidyapeeth College of Engineering, Lavale, India
2BE Computer Science, Bharati Vidyapeeth College of Engineering, Lavale, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Mankind usually invents new era to make
existence easier and better to stay. As a way to shield this
generation security devices performs a very critical function.
In this technology, the gadget includes biometrics in
conjunction with virtual code lock which response within the
way for matching or mismatching the code. The purpose of
these studies to have a look at human-computer interaction.
Eye monitoring turns into a more and more essential manner
to analyze human behavior. However, a right analysis of
statistics obtained from a watch tracker takes place to be a
difficult venture. For biometrical analysis, Iris scanner is
getting used in order to be monitored with the help of
microcontroller through the sensors of the biometric sensors.
This study targeted on growing an HCI era completely the use
of one of the telephone’s growing of onboard sensors. This
research supplied the implementation and evaluation of the
HCI prototype. Even though preliminary, studiesconsequences
imply that HCI is a promising approach to ridingcellpackages
in a hands-loose manner.
Key Words: Human computer interaction, Smartphone
security, Iris Scanner
1. INTRODUCTION
As far as we speak of humans all we have three such
things which differ in all of us, the first is 'DNA' second is our
'fingerprint' and the third is the 'pattern of our iris'. In
normal 'Fingerprint scanner' useforbiometric access,where
we have to give access to the selected person or not. The
'DNA' we use in forensic science, we do not use it in normal
life because it becomes quite complicated to use. The last
option that we have is 'IRIS SCANNING'. If we talk of normal
consumer product and day-to-day life, we can also do
fingerprint scanning and an iris scanning or even if we can
use both. Fingerprint scanning is quite simple enough to
come by the time we use it and it is very cheap, so we use it
even today and will continue to use it.
[1]Biometric system grants access to authorized users
by means of verifying their unique physical or behavioral
characteristics such as fingerprints, face recognition, voice
recognition, vein detector, iris scanner etc. [2] Eye
movements are unique behavioral responses that have not
only a reaction time and an accuracy, but also a location
(where one moves), an amplitude (how far one moves), and
a duration (how long one fixates a position). Researchers
looking to examine the effects of stimulus or condition
manipulations typically use a combination of these
measures. [3] Eye tracking becomes more and more
important way to analyse human behaviour. However, a
proper analysis of data obtained from an eye tracker occurs
to be a challenging task. Traditional visualizationtechniques
like scan paths or heat maps may reveal interesting
information, however much of useful information is still not
visible, especially when the temporal characteristics of eye
movement is taken into account. This paper introduces a
technique called gaze self-similarity plot (GSSP) that may be
applied to visualize bothspatial andtemporal eyemovement
features on one two-dimensional plot. The technique is an
extension of the idea of recurrence plots, commonly used in
time series analysis.
When we speak about IRIS scanner it is not so common
that it will see us in a little specific place. But this technology
is securer than the fingerprint scanner. It is quite faster and
more efficient as compared to fingerprint scanning. Now we
talk about how iris scanner work, see the pattern that we
have in the middle of our eyes, blue eyes, black eyes, or we
call it as an iris. This pattern and the fine granular dictates
inside it vary from person to person. This iris does not
change until the death of a particular person it is the same
for a lifetime.
The principle which is identical to fingerprint scanning
that we scanned iris once then we compared it to the result
that came on next scanning and system tell us the result of
scanning is a match or not. But fingerprint scanning consists
of at least 40 to 45 points to scan a single fingerprint. In the
case of iris scanner system scanner scans at least 200 to 250
points to identify. It matches with high-level securityuntil all
the requirements are not fulfilled.
Now see how a scanner work, it has an infraredcamera
and a normal camera both of them take a very high-
resolution photo of your iris and pick up an important data
like where we see diversions, arcs, and curve it identifies
everything. After scanning these 240 to 250 points, make a
code that we call the iris code. For example, If the person 'A’
did an Iris scan, the system makes the code for the person
'A'. After encryption, it will name it as codefortheperson 'A'.
After that next time when person 'A'goesforirisscanning on
the same system or mobile then both cameras take pictures
of the iris again, this information is converted into the code
again then system check all scanned code and compare this
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1982
code with other saved scanned until itmatcheswiththecode
of the person 'A' or not.
If the code does not match with the savedscannedcode
system shows an error message.
2. METHOD & MATERIAL
An Iris scanner is much creative in naturebut it is just simply
a charged coupled device that is a mobile camera which uses
infrared light to capture a desolated high-definition photo of
a person’s Iris. The main use of this close infrared light is to
separate the pupil and the Iris of a person as the pupil part is
extremely dark in nature and it moreover making simple for
the computer to detect.
When we check or investigate an Iris scanner the camera
takes the photo which 3 to 10 from the person’s eyes. Now
here starts the work of the mobile system it collects the data
such as the focal point of the pupil, the edge of the pupil, the
edge of the Iris and the eyelids and eyelashes, now in that
point, discrete the example in the Iris and make an
interpretation of them into a layout. With the modern
improvisation of technologies,Irisscannersareturningintoa
wellspring of confirmation of individuality, as we know that
Iris is unique in nature and is much secured biometric and
this doesn’t change time to time. Even an Iris remains
unaltered after a serious eye operation has been done. Even
blind people can also use this Iris scanner system.
In thissystem, the nearness of the spectacle or contactlenses
focal point is not going to show some serious issue. Here the
equipment that is going to be used in this Iris
acknowledgment framework is Iris acknowledgment
checking module, a control module, and a screen or LCD for
display. Here Microcontroller interface throughtransmitting
and getting information parcel using thehelpofasystemthat
is present. The LCD shows the verification is confirmed or
not that is demonstrated in figure.
2.1 Figure:
2.2 PROPOSED ALGORITHM
 Step 1: Take Input_Data: Biometric data of human
Iris.
 Step 2: Begin
 Step3:Input_Data=Request_Data(Users(Biometric_Ir
is))
 Step4:Valid_Data=Retrive_Data (databased
(Users(Biometric_Iris)))
 Step 5: If Input_Data = valid_Data Then Access(
Iris_matched)
 Step 6: Get_ready_for_Next_Process
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1983
2.3 PROPOSED FLOW MODEL BASED ON
ALGORITHM
This starts with the Iris scanner where, the Iris of the person
is reviewed usinganextraordinarymachine,whichcompares
with the record that is store in the database at the time of the
opening the locker.
At last when required verification is done this result is
interfaced with microcontroller which checks the
authenticity. In this way the smartphone is kept safe.
2.4 RESULT & DISCUSSION
In this proposed system there are merits and as well as
demerits as the flow of the proposed system starts with the
Iris scanning mechanism as we know its unique and can’t be
forged but a person needs to be in closedistance withtheiris
scanning device to be enrolled on the system properly. In
some cases, it is hard to perform an iris scanning due to the
presence of reflections and it is expensive.
3. CONCLUSION
General operation was both smooth and successful enough
to serve as an additional mean for human computer
interaction. This study has focused on developing an HCI
technology solely using one of the phone’s growing of on-
board sensors. Study presented the implementation and
evaluation of the HCI prototype. Although preliminary,
study results indicate that HCI is promising approach to
driving mobile applications in a hand-free manner.
ACKNOWLEDGEMENT
Authors of this research paper express their deep sense of
gratitude to Dr. R. N. Patil (The Principal of Bharati
Vidyapeeth College of EngineeringLavale),Prof.UdayPatkar
(Department Head), Prof. Prajakta Pawar and Prof. Sanket
Pawar for his keen interest in promoting research in
Savitribai Phule university and have always been an
inspiration for achieving great heights.
REFERENCES
[1] Meera Mathew, Divya R S “Survey on Various Door Lock
Access Control Mechanisms,” International Conference
on circuits Power and Computing Technologies
[ICCPCT], 2017.
[2] 2. N. C. Anderson, W. F. Bischof, K. E. Laidlaw, E. F.
Risko, and A. Kingstone. Recurrence quantification
analysis of eye movements.BehaviorResearchMethods,
45(3):842–856, 2013.
[3] M. Vidal, A. Bulling, and H. Gellersen. Detection of
smooth pursuits using eye movement shape features.In
Proceedings of the symposium on eye tracking research
and applications, pages 177–180. ACM, 2012.
[4] https://www.interaction-design.org
[5] https://science.howstuffworks.com/biometrics4.ht
m
[6] Mobile Interaction Design 1st Edition by Matt
Jones.
[7] Fast Normalized Cross Correlation – By J Lewis.

More Related Content

What's hot

IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
IRJET- Iris Authentication System using Hybrid Technique – IDS
IRJET-  	  Iris Authentication System using Hybrid Technique – IDSIRJET-  	  Iris Authentication System using Hybrid Technique – IDS
IRJET- Iris Authentication System using Hybrid Technique – IDSIRJET Journal
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its applicationArnab Podder
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security systemeSAT Journals
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication techniqueViraj Rajopadhye
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 

What's hot (20)

C6524029320
C6524029320C6524029320
C6524029320
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
IRJET- Iris Authentication System using Hybrid Technique – IDS
IRJET-  	  Iris Authentication System using Hybrid Technique – IDSIRJET-  	  Iris Authentication System using Hybrid Technique – IDS
IRJET- Iris Authentication System using Hybrid Technique – IDS
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 
IriCore SW Brochure
IriCore SW BrochureIriCore SW Brochure
IriCore SW Brochure
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Smart eye
Smart eyeSmart eye
Smart eye
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Retina scan
Retina scanRetina scan
Retina scan
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 

Similar to IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection

A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVIRJET Journal
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
IRJET - Smart E – Cane for the Visually Challenged and Blind using ML Con...
IRJET -  	  Smart E – Cane for the Visually Challenged and Blind using ML Con...IRJET -  	  Smart E – Cane for the Visually Challenged and Blind using ML Con...
IRJET - Smart E – Cane for the Visually Challenged and Blind using ML Con...IRJET Journal
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
Eye tracking – an innovative monitor
Eye tracking – an innovative monitorEye tracking – an innovative monitor
Eye tracking – an innovative monitorSakthi Sivaraman S
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 

Similar to IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection (20)

A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
50120130406045
5012013040604550120130406045
50120130406045
 
IRJET - Smart E – Cane for the Visually Challenged and Blind using ML Con...
IRJET -  	  Smart E – Cane for the Visually Challenged and Blind using ML Con...IRJET -  	  Smart E – Cane for the Visually Challenged and Blind using ML Con...
IRJET - Smart E – Cane for the Visually Challenged and Blind using ML Con...
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Eye tracking – an innovative monitor
Eye tracking – an innovative monitorEye tracking – an innovative monitor
Eye tracking – an innovative monitor
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1981 Study on: Advancement of Smartphone Security by using Iris Scan Detection Adesh. A. Potdukhe1, Prof. Sanket. S. Pawar2 1Student, BE Computer Science, Bharati Vidyapeeth College of Engineering, Lavale, India 2BE Computer Science, Bharati Vidyapeeth College of Engineering, Lavale, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Mankind usually invents new era to make existence easier and better to stay. As a way to shield this generation security devices performs a very critical function. In this technology, the gadget includes biometrics in conjunction with virtual code lock which response within the way for matching or mismatching the code. The purpose of these studies to have a look at human-computer interaction. Eye monitoring turns into a more and more essential manner to analyze human behavior. However, a right analysis of statistics obtained from a watch tracker takes place to be a difficult venture. For biometrical analysis, Iris scanner is getting used in order to be monitored with the help of microcontroller through the sensors of the biometric sensors. This study targeted on growing an HCI era completely the use of one of the telephone’s growing of onboard sensors. This research supplied the implementation and evaluation of the HCI prototype. Even though preliminary, studiesconsequences imply that HCI is a promising approach to ridingcellpackages in a hands-loose manner. Key Words: Human computer interaction, Smartphone security, Iris Scanner 1. INTRODUCTION As far as we speak of humans all we have three such things which differ in all of us, the first is 'DNA' second is our 'fingerprint' and the third is the 'pattern of our iris'. In normal 'Fingerprint scanner' useforbiometric access,where we have to give access to the selected person or not. The 'DNA' we use in forensic science, we do not use it in normal life because it becomes quite complicated to use. The last option that we have is 'IRIS SCANNING'. If we talk of normal consumer product and day-to-day life, we can also do fingerprint scanning and an iris scanning or even if we can use both. Fingerprint scanning is quite simple enough to come by the time we use it and it is very cheap, so we use it even today and will continue to use it. [1]Biometric system grants access to authorized users by means of verifying their unique physical or behavioral characteristics such as fingerprints, face recognition, voice recognition, vein detector, iris scanner etc. [2] Eye movements are unique behavioral responses that have not only a reaction time and an accuracy, but also a location (where one moves), an amplitude (how far one moves), and a duration (how long one fixates a position). Researchers looking to examine the effects of stimulus or condition manipulations typically use a combination of these measures. [3] Eye tracking becomes more and more important way to analyse human behaviour. However, a proper analysis of data obtained from an eye tracker occurs to be a challenging task. Traditional visualizationtechniques like scan paths or heat maps may reveal interesting information, however much of useful information is still not visible, especially when the temporal characteristics of eye movement is taken into account. This paper introduces a technique called gaze self-similarity plot (GSSP) that may be applied to visualize bothspatial andtemporal eyemovement features on one two-dimensional plot. The technique is an extension of the idea of recurrence plots, commonly used in time series analysis. When we speak about IRIS scanner it is not so common that it will see us in a little specific place. But this technology is securer than the fingerprint scanner. It is quite faster and more efficient as compared to fingerprint scanning. Now we talk about how iris scanner work, see the pattern that we have in the middle of our eyes, blue eyes, black eyes, or we call it as an iris. This pattern and the fine granular dictates inside it vary from person to person. This iris does not change until the death of a particular person it is the same for a lifetime. The principle which is identical to fingerprint scanning that we scanned iris once then we compared it to the result that came on next scanning and system tell us the result of scanning is a match or not. But fingerprint scanning consists of at least 40 to 45 points to scan a single fingerprint. In the case of iris scanner system scanner scans at least 200 to 250 points to identify. It matches with high-level securityuntil all the requirements are not fulfilled. Now see how a scanner work, it has an infraredcamera and a normal camera both of them take a very high- resolution photo of your iris and pick up an important data like where we see diversions, arcs, and curve it identifies everything. After scanning these 240 to 250 points, make a code that we call the iris code. For example, If the person 'A’ did an Iris scan, the system makes the code for the person 'A'. After encryption, it will name it as codefortheperson 'A'. After that next time when person 'A'goesforirisscanning on the same system or mobile then both cameras take pictures of the iris again, this information is converted into the code again then system check all scanned code and compare this
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1982 code with other saved scanned until itmatcheswiththecode of the person 'A' or not. If the code does not match with the savedscannedcode system shows an error message. 2. METHOD & MATERIAL An Iris scanner is much creative in naturebut it is just simply a charged coupled device that is a mobile camera which uses infrared light to capture a desolated high-definition photo of a person’s Iris. The main use of this close infrared light is to separate the pupil and the Iris of a person as the pupil part is extremely dark in nature and it moreover making simple for the computer to detect. When we check or investigate an Iris scanner the camera takes the photo which 3 to 10 from the person’s eyes. Now here starts the work of the mobile system it collects the data such as the focal point of the pupil, the edge of the pupil, the edge of the Iris and the eyelids and eyelashes, now in that point, discrete the example in the Iris and make an interpretation of them into a layout. With the modern improvisation of technologies,Irisscannersareturningintoa wellspring of confirmation of individuality, as we know that Iris is unique in nature and is much secured biometric and this doesn’t change time to time. Even an Iris remains unaltered after a serious eye operation has been done. Even blind people can also use this Iris scanner system. In thissystem, the nearness of the spectacle or contactlenses focal point is not going to show some serious issue. Here the equipment that is going to be used in this Iris acknowledgment framework is Iris acknowledgment checking module, a control module, and a screen or LCD for display. Here Microcontroller interface throughtransmitting and getting information parcel using thehelpofasystemthat is present. The LCD shows the verification is confirmed or not that is demonstrated in figure. 2.1 Figure: 2.2 PROPOSED ALGORITHM  Step 1: Take Input_Data: Biometric data of human Iris.  Step 2: Begin  Step3:Input_Data=Request_Data(Users(Biometric_Ir is))  Step4:Valid_Data=Retrive_Data (databased (Users(Biometric_Iris)))  Step 5: If Input_Data = valid_Data Then Access( Iris_matched)  Step 6: Get_ready_for_Next_Process
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1983 2.3 PROPOSED FLOW MODEL BASED ON ALGORITHM This starts with the Iris scanner where, the Iris of the person is reviewed usinganextraordinarymachine,whichcompares with the record that is store in the database at the time of the opening the locker. At last when required verification is done this result is interfaced with microcontroller which checks the authenticity. In this way the smartphone is kept safe. 2.4 RESULT & DISCUSSION In this proposed system there are merits and as well as demerits as the flow of the proposed system starts with the Iris scanning mechanism as we know its unique and can’t be forged but a person needs to be in closedistance withtheiris scanning device to be enrolled on the system properly. In some cases, it is hard to perform an iris scanning due to the presence of reflections and it is expensive. 3. CONCLUSION General operation was both smooth and successful enough to serve as an additional mean for human computer interaction. This study has focused on developing an HCI technology solely using one of the phone’s growing of on- board sensors. Study presented the implementation and evaluation of the HCI prototype. Although preliminary, study results indicate that HCI is promising approach to driving mobile applications in a hand-free manner. ACKNOWLEDGEMENT Authors of this research paper express their deep sense of gratitude to Dr. R. N. Patil (The Principal of Bharati Vidyapeeth College of EngineeringLavale),Prof.UdayPatkar (Department Head), Prof. Prajakta Pawar and Prof. Sanket Pawar for his keen interest in promoting research in Savitribai Phule university and have always been an inspiration for achieving great heights. REFERENCES [1] Meera Mathew, Divya R S “Survey on Various Door Lock Access Control Mechanisms,” International Conference on circuits Power and Computing Technologies [ICCPCT], 2017. [2] 2. N. C. Anderson, W. F. Bischof, K. E. Laidlaw, E. F. Risko, and A. Kingstone. Recurrence quantification analysis of eye movements.BehaviorResearchMethods, 45(3):842–856, 2013. [3] M. Vidal, A. Bulling, and H. Gellersen. Detection of smooth pursuits using eye movement shape features.In Proceedings of the symposium on eye tracking research and applications, pages 177–180. ACM, 2012. [4] https://www.interaction-design.org [5] https://science.howstuffworks.com/biometrics4.ht m [6] Mobile Interaction Design 1st Edition by Matt Jones. [7] Fast Normalized Cross Correlation – By J Lewis.