SlideShare a Scribd company logo
1 of 19
Download to read offline
1
Mentor Name
Mr. Gulzar Ahmad(ASST.
PROF.)
KRISHNA NAND MISHRA
RAHUL VASHISHT
JASWANT KUMAR
VIPIN KUMAR
Content
1. Motivation
2. History
3. Introduction to Iris Recognition
4. Why Iris Recognition
5. Structure of Eye
6. Stages
7. Advantages
8. Status of Project
2
Motivation
 Authentication – the process of verifying that a
user requesting a resource is who he, she, or it
claims to be, and vice versa.
 Conventional authentication methods
„something that you have“ – key, magnetic card
or smartcard
„something that you know“ – PIN or password
 Biometric authentication uses personal features
„something that you are“
3
History
 Iris Recognition system was first proposed
by Flom and Safir in 1987. [1][3][4]
 In the year 1994, John Daugman patented
his "biometrics personal identification
system based on iris analysis"[1][3][4].
4
INTRODUCTION TO IRIS RECOGNITION
John Daugman, University of
Cambridge – Pioneer in Iris
Recognition.
Sharbat Gula – aged 12 at
Afghani refugee camp.
18 years later at a remote
location in Afghanistan.
5
Why Iris Recognition?
 Iris patterns are unique.
 Iris patterns do not change with age.
 Non Contact approach.
 Simplicity and ease of implementation.
 Speed – the process of matching the iris
patterns is very fast.
6
Structure of Eye
 Iris is the area of the eye where the pigmented
or colored circle, usually brown, blue, rings the
dark pupil of the eye.
 The iris is embedded with tiny muscles that
control the amount of light entering into eye
through the pupil.
7
8
Stages
[2]
Stages of iris based recognition algorithm
Stage 1
Image Acquisition:
The purpose of this stage is to capture a high-quality
image of the eye.
9System for active iris recognition by IrisScan
System for passive iris recognition by Sensar
Stage 2
Iris Localization:
The Purpose of this stage to localize that
portion of the acquired image that corresponds
to an iris.
10
Stage 3
Iris Normalization:
The normalisation process will produce iris regions, which have
the same constant dimensions, so that two photographs of the
same iris under different conditions will have characteristic
features.
11
Stage 4
Feature Extraction:
In this stage, we generate a template code along with a
mask code.
Stage 5
Pattern matching:
Compare two iris templates using Hamming
distances.Shifting of Hamming distances: To counter
rotational inconsistencies.
12
Advantages
 Uniqueness of iris patterns hence improved
accuracy.
 Highly protected, internal organ of the eye
 Stability : Persistence of iris patterns.
 Non-invasive : Relatively easy to be
acquired.
 Speed : Smaller template size so large
databases can be easily stored and
checked.
 Cannot be easily forged or modified.
14
 The project is currently in iris localization phase.
 Eye image dataset used is of Chinese University
of Hong Kong.
15
Some of localized iris images are
16
Captured image
[5]
Eye image with circles
for localization of iris
17
Captured image Eye image with circles
for localization of iris
[5]
REFERENCES
[1]J. Daugman , How iris recognition works, IEEE Trans. On Circuits and Systems for Video
Technology., Vol. 14, No. 1, pp. 21-30, January 2004.
[2]Gargi Amoli, Nitin Thapliyal, Nidhi Sethi, “Iris Preprocessing “, International Journal of Advanced
Research in Computer Science and Software Engineering . ,Volume 2, Issue 6, June 2012 ISSN:
2277 128X page 301-304.
[3] J. Daugman, ―High Confidence Visual Recognition of Persons by a Test of Statistical
Independence , IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 15, No.11,‖
pp.1148-1161, 1993.
[4] John Daugman, ―The importance of being random: statistical principles of iris recognition ,‖
Pattern Recognition 36 (2003) 279 – 291, 21 December 2001
[5] Dataset, Chinese University of Hong Kong, “http://www.mae.cuhk.edu.hk/~cvl/main_database.htm”
18
THANK YOU!!!
19

More Related Content

What's hot

Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION Ankit Kumar
 
A fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties methodA fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties methodjournalBEEI
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
 

What's hot (19)

Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
A fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties methodA fast specular reflection removal based on pixels properties method
A fast specular reflection removal based on pixels properties method
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Iris print
Iris print Iris print
Iris print
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 

Similar to 12

Animal identification using machine learning techniques
Animal identification using machine learning techniquesAnimal identification using machine learning techniques
Animal identification using machine learning techniquesAboul Ella Hassanien
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique ijsc
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Techniqueijsc
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
Effective Biometric system with using of iris detection.pptx
Effective Biometric system with using of iris detection.pptxEffective Biometric system with using of iris detection.pptx
Effective Biometric system with using of iris detection.pptxinan7496
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationIOSR Journals
 
Template reduction in human iris patterns recognition
Template reduction in human iris patterns recognitionTemplate reduction in human iris patterns recognition
Template reduction in human iris patterns recognitionKashyap Aishwarya
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 

Similar to 12 (20)

Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Human Retina Identification
Human Retina IdentificationHuman Retina Identification
Human Retina Identification
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
Animal identification using machine learning techniques
Animal identification using machine learning techniquesAnimal identification using machine learning techniques
Animal identification using machine learning techniques
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Effective Biometric system with using of iris detection.pptx
Effective Biometric system with using of iris detection.pptxEffective Biometric system with using of iris detection.pptx
Effective Biometric system with using of iris detection.pptx
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person Authentication
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Template reduction in human iris patterns recognition
Template reduction in human iris patterns recognitionTemplate reduction in human iris patterns recognition
Template reduction in human iris patterns recognition
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
K0966468
K0966468K0966468
K0966468
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

12

  • 1. 1 Mentor Name Mr. Gulzar Ahmad(ASST. PROF.) KRISHNA NAND MISHRA RAHUL VASHISHT JASWANT KUMAR VIPIN KUMAR
  • 2. Content 1. Motivation 2. History 3. Introduction to Iris Recognition 4. Why Iris Recognition 5. Structure of Eye 6. Stages 7. Advantages 8. Status of Project 2
  • 3. Motivation  Authentication – the process of verifying that a user requesting a resource is who he, she, or it claims to be, and vice versa.  Conventional authentication methods „something that you have“ – key, magnetic card or smartcard „something that you know“ – PIN or password  Biometric authentication uses personal features „something that you are“ 3
  • 4. History  Iris Recognition system was first proposed by Flom and Safir in 1987. [1][3][4]  In the year 1994, John Daugman patented his "biometrics personal identification system based on iris analysis"[1][3][4]. 4
  • 5. INTRODUCTION TO IRIS RECOGNITION John Daugman, University of Cambridge – Pioneer in Iris Recognition. Sharbat Gula – aged 12 at Afghani refugee camp. 18 years later at a remote location in Afghanistan. 5
  • 6. Why Iris Recognition?  Iris patterns are unique.  Iris patterns do not change with age.  Non Contact approach.  Simplicity and ease of implementation.  Speed – the process of matching the iris patterns is very fast. 6
  • 7. Structure of Eye  Iris is the area of the eye where the pigmented or colored circle, usually brown, blue, rings the dark pupil of the eye.  The iris is embedded with tiny muscles that control the amount of light entering into eye through the pupil. 7
  • 8. 8 Stages [2] Stages of iris based recognition algorithm
  • 9. Stage 1 Image Acquisition: The purpose of this stage is to capture a high-quality image of the eye. 9System for active iris recognition by IrisScan System for passive iris recognition by Sensar
  • 10. Stage 2 Iris Localization: The Purpose of this stage to localize that portion of the acquired image that corresponds to an iris. 10
  • 11. Stage 3 Iris Normalization: The normalisation process will produce iris regions, which have the same constant dimensions, so that two photographs of the same iris under different conditions will have characteristic features. 11
  • 12. Stage 4 Feature Extraction: In this stage, we generate a template code along with a mask code. Stage 5 Pattern matching: Compare two iris templates using Hamming distances.Shifting of Hamming distances: To counter rotational inconsistencies. 12
  • 13. Advantages  Uniqueness of iris patterns hence improved accuracy.  Highly protected, internal organ of the eye  Stability : Persistence of iris patterns.  Non-invasive : Relatively easy to be acquired.  Speed : Smaller template size so large databases can be easily stored and checked.  Cannot be easily forged or modified.
  • 14. 14
  • 15.  The project is currently in iris localization phase.  Eye image dataset used is of Chinese University of Hong Kong. 15
  • 16. Some of localized iris images are 16 Captured image [5] Eye image with circles for localization of iris
  • 17. 17 Captured image Eye image with circles for localization of iris [5]
  • 18. REFERENCES [1]J. Daugman , How iris recognition works, IEEE Trans. On Circuits and Systems for Video Technology., Vol. 14, No. 1, pp. 21-30, January 2004. [2]Gargi Amoli, Nitin Thapliyal, Nidhi Sethi, “Iris Preprocessing “, International Journal of Advanced Research in Computer Science and Software Engineering . ,Volume 2, Issue 6, June 2012 ISSN: 2277 128X page 301-304. [3] J. Daugman, ―High Confidence Visual Recognition of Persons by a Test of Statistical Independence , IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 15, No.11,‖ pp.1148-1161, 1993. [4] John Daugman, ―The importance of being random: statistical principles of iris recognition ,‖ Pattern Recognition 36 (2003) 279 – 291, 21 December 2001 [5] Dataset, Chinese University of Hong Kong, “http://www.mae.cuhk.edu.hk/~cvl/main_database.htm” 18