Karthika krishna ethical hacking slides


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Karthika krishna ethical hacking slides

  1. 1. VIDYA BHARATHI INSTITUTE OF TECHNOLOGY PAPER PRESENTATION ON Iris Recognition of a Biometric Technique BY D.MADHAVI, B.SRAVANI, ECE II yr, ECE II yr,madhavi.donthi@yahoo.com bobbalasravani@yahoo.com
  2. 2. Topics of Discussion Introduction IRIS identification process IRIS identification system Method of IRIS identification Function of IRIS scanner properties of IRIS Applications of IRIS recognition Advantages and Disadvantages Conclusion
  3. 3. INTRODUCTION:The colored part of the eye
  5. 5. IRIS identification process Acquisition Image LocalizationIrisCode Gabor Filters Polar Representation Demarcated Zones
  6. 6. IRIS IDENTIFICATIONSYSTEM: There are two types of methods 1. Active iris system: requires that a user be anywhere from six to 14 inches away from the camera. 2. Passive iris system: allows the user to be anywhere from one to three feet away from the camera.
  7. 7. FUNCTION OF IRIS SCANNER: The user places himself so that he can see his own eyes reflection in the device. Verification time is generally less than 5 seconds, though the user will only need to look into the device for a couple moments. A template iris pattern code contains between 256 and 512 bytes of data depending upon the manufacturer. Using a camera it converts the small details in the iris stromal pattern into a bit pattern.
  8. 8. IRIS IDENTIFICATION STEPSThere are four simple steps that follow: A person stands in from of the iris identification system, between one and three feet away, while a wide-angle camera calculates the position of they eye. A second camera zooms in on the eye and takes a black and white image. Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like and "eyeprint". The captured image, or "eyeprint" is checked against a previously stored reference template in the database.
  9. 9.  Hamming code a Hamming code is a linear error-correcting code named after its inventor, Richard Hamming. Hamming codes can detect and correct single-bit errors, and can detect (but not correct) double-bit errors. In other words, the Hamming distance between the transmitted and received code-words must be zero or one for reliable communication.
  10. 10. Properties of the iris Has highly distinguishing texture Right eye differs from left eye Twins have different iris texture Not trivial to capture quality image + Works well with cooperative subjects + Used in many airports in the world
  11. 11. ADVANTAGES: Each iris is unique. High recognition performance and high reliability. Fast authentication within seconds. The iris remains stable throughout ones life. Medical advances such as refractive surgery, cataract surgery and cornea transplants do not change the iris characteristics.
  12. 12. DISADVANTAGES:× Iris scanning is incompatible with the substantial investment.× Iris recognition is very difficult to perform at a larger distance .× Iris recognition is susceptible to poor image quality, with associated failure to enroll rates.
  13. 13. APPLICATIONS: Database access and computer login. The iris-recognition software is implemented for security purposes around the airport terminal ,which was designed to allow only authorized people to enter certain areas. To stop this practice- the first door opens upon iris recognition and then closes behind the person, leaving them in a small portal. The next door will only open upon confirming there is just one person in the portal.
  14. 14. CONCLUSION: Iris recognition is shown to be a reliable and accurate biometric technology. The biometric iris recognition serves as one of the best processes for safe guarding our personal profiles and can be applied to any of the access control systems requiring high security,hence reducing the crime of using others profiles by another person illegally.
  15. 15. References: www.wikipedia.com www.techcrunch.comwww.howstuffworks.com