The interest in Biometrics from both governments and industry has lead to the emergence of multiple Biometric technologies all with their own strengths and flaws. One currently at the forefront of Biometrics is iris scanning.
The process involved in the identification and verification of people using iris scanning is examined in this paper. The advantages and disadvantages associated with the utilisation of such a technology are also explored. A number of legal and ethical issues are highlighted. Iris scanning is looked at in comparison to other forms of Biometric technologies. Future work in the area of Biometrics is also considered in light of current developments.
Iris recognition is an automated method of bio metric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.
Retinal scanning is a different, ocular-based bio metric technology that uses the unique patterns on a person's retina blood vessels and is often confused with iris recognition. Iris recognition uses video camera technology with subtle near infrared illumination to acquire images of the detail-rich, intricate structures of the iris which are visible externally.
Eye tracking is the process of measuring either the point of gaze or the motion of an eye relative to the head. An eye tracker is a device for measuring eye positions and eye movement.
This presentation covers the introduction to augmented reality in iOs apps using Apple's ARKit framework. what are its uses in banking/finance sector.
It has a link to a sample code demonstrating how ARKit works.
Iris recognition is an automated method of bio metric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.
Retinal scanning is a different, ocular-based bio metric technology that uses the unique patterns on a person's retina blood vessels and is often confused with iris recognition. Iris recognition uses video camera technology with subtle near infrared illumination to acquire images of the detail-rich, intricate structures of the iris which are visible externally.
Eye tracking is the process of measuring either the point of gaze or the motion of an eye relative to the head. An eye tracker is a device for measuring eye positions and eye movement.
This presentation covers the introduction to augmented reality in iOs apps using Apple's ARKit framework. what are its uses in banking/finance sector.
It has a link to a sample code demonstrating how ARKit works.
Seminar report of 3D Holographic Projection Technology (Hologram).SafwanSadi
This is the seminar report on widely used Technology based on Hologram named 3D Holographic Projection Technology.
In this report, almost all important topics covered related to Holographic projection and representation such as Reflection or reflex hologram, transmission, computer-generated holography and some advanced hologram used in real life.
Lecture 8 of the COMP 4010 course taught at the University of South Australia. This lecture provides and introduction to VR technology. Taught by Mark Billinghurst on September 14th 2021 at the University of South Australia.
Hi guys , here is new presentation which is related to password authentication named as Graphical Password Authentication.Here i have covered all the topics which are related to GPA .I will also provide a documentation regarding this topic if u need .So please comment below for the document and fallow @shobha rani
Eye Tracking Based Human - Computer InteractionSharath Raj
This Presentation aims at explaining how eye tracking works and the usage of Houghman Circle Detection Algorithm in order to detect the iris.
https://www.picostica.com
iris recognition system as means of unique identification Being Topper
Project Done and submitted by Students Of final year CBP Government Engineering College
student name : vipin kumar khutail , Krishnanad Mishra , Jaswant kumar, Rahul Vashisht
Project Description :
Iris recognition is an automated method of bio-metric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex random patterns are unique, stable, and can be seen from some distance
Seminar report of 3D Holographic Projection Technology (Hologram).SafwanSadi
This is the seminar report on widely used Technology based on Hologram named 3D Holographic Projection Technology.
In this report, almost all important topics covered related to Holographic projection and representation such as Reflection or reflex hologram, transmission, computer-generated holography and some advanced hologram used in real life.
Lecture 8 of the COMP 4010 course taught at the University of South Australia. This lecture provides and introduction to VR technology. Taught by Mark Billinghurst on September 14th 2021 at the University of South Australia.
Hi guys , here is new presentation which is related to password authentication named as Graphical Password Authentication.Here i have covered all the topics which are related to GPA .I will also provide a documentation regarding this topic if u need .So please comment below for the document and fallow @shobha rani
Eye Tracking Based Human - Computer InteractionSharath Raj
This Presentation aims at explaining how eye tracking works and the usage of Houghman Circle Detection Algorithm in order to detect the iris.
https://www.picostica.com
iris recognition system as means of unique identification Being Topper
Project Done and submitted by Students Of final year CBP Government Engineering College
student name : vipin kumar khutail , Krishnanad Mishra , Jaswant kumar, Rahul Vashisht
Project Description :
Iris recognition is an automated method of bio-metric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex random patterns are unique, stable, and can be seen from some distance
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Multi-User Virtual Environment Platforms for English as a Second Language Edu...Max Lieberman
A draft of a literature review I'm working on.
ABSTRACT:
Interest in the use of online virtual worlds for education continues to grow, but the research literature to date is composed largely of small-scale case studies. This review interprets the results of these studies in order to answer questions about competing virtual world technologies. Questions considered include whether there are clear advantages common to all virtual world technologies; whether some programs work better than others; whether students respond better to massively multiplayer online games (MMOGs) or to non-game MUVEs; and whether the literature is sufficient to define a set of best practices for working with virtual worlds. This review focuses on English as a Second Language (ESL) education using virtual worlds in order to minimize problems of content alignment, but supplementary materials on other educational uses of virtual world technology are included for background and to fill gaps in the literature.
Abstract
The advancement in new technologies has significantly resulted more perfection in authentication issues. In ATM machine, access
permission is usually taking personal identification numbers (PIN) for authentication. Through this paper, this old method is
being exhausted by introducing a combination of embedded 3 layered bio-metric molding to setup an ATM simulator. Finger print
scanner, retina scanner followed by the onetime password (OTP) will help the user for smart and secured tractions. It will
reduced the duplication and makes the ATM machine more secured compare to current version.
Keywords: ATM, Biometric Security, OTP, Duplication Free, Retina Scanner.
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
Presente diseño para la elaboración del history board
Si algún docente se ánima por el proyecto de fotonovela; este es un paso importante en el desarrollo de ese proyecto.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Introduction
The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing. Many of these new automated techniques, however, are based on ideas that were originally conceived hundreds, even thousands of years ago.
One of the oldest and most basic examples of a characteristic that is used for recognition by humans is the face. Since the beginning of civilization, humans have used faces to identify known (familiar) and unknown (unfamiliar) individuals. This simple task became increasingly more challenging as populations increased and as more convenient methods of travel introduced many new individuals into- once small communities. The concept of human-to-human recognition is also seen in behavioral-predominant biometrics such as speaker and gait recognition. Individuals use these characteristics, somewhat unconsciously, to recognize known individuals on a day-to-day basis.
A Novel Approach for Detecting the IRIS CryptsIJERDJOURNAL
ABSTRACT:- The iris is a stable biometric trait that has been widely used for human recognition in various applications. However, deployment of iris recognition in forensic applications has not been reported. A primary reason is the lack of human friendly techniques for iris comparison. To further promote the use of iris recognition in forensics, the similarity between irises should be made visualizable and interpretable. Recently, a human-in-the-loop iris recognition system was developed, based on detecting and matching iris crypts. Building on this framework, we propose a new approach for detecting and matching iris crypts automatically. Our detection method is able to capture iris crypts of various sizes. Our matching scheme is designed to handle potential topological changes in the detection of the same crypt in different images. Our approach outperforms the known visible-feature-based iris recognition method on three different data sets. After iris Crypts detection, Iris images were taken before and after the treatment of eye disease and the output shows the mathematical difference obtained from treatment. Gabor filter is used to extract the features. This iris recognition was effectively withstood with most ophthalmic disease like corneal oedema, iridotomies and conjunctivitis. This proposed iris recognition should be used to solve the potential problems that could cause in key biometric technology and medical diagnosis
This is a Fingerprint based class attendance system in higher institutions, The implementation take attendance of student in a class and give output of student eligibility status at the end of the semester or term
Abstract— A biometric feature provides a high security access system. Traditional method uses PIN number, password, key, and etc to identify a person is unreliable and provide a low level security. It provides more reliable feature than the password based authentication system as biometric characteristic cannot be lost or forgotten, biometric feature are difficult to replicate, and require the person to be present for the authentication process. Many biometric such as face , finger print, iris and voice have been developed. But here verification using vein pattern is less developed. Biometric authentication is perform in insecure because of information leakage issue, so overcome this the implementation of biometric hand vein authentication Hand vein patterns are the vast network of blood vessels underneath a person’s skin.
Index Terms— Biometric, Hand vein structure, Authentication
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Protection of Patient Identity and Privacy Using Vascular BiometricsCSCJournals
Biometric systems are being used in hospitals to streamline patient registration and identification, as an effective measure to protect patient privacy and prevent identity theft. Many Hospitals and Healthcare institutions are turning towards Vascular Biometrics which complement the biometric recognition with hygiene and improved accuracy. In this paper, a multimodal hand vein system and a multibiometric fingerprint-hand vein biometric system are proposed. The multimodal hand vein system is a non-invasive, contactless and fast system, which uses two different feature sets extracted from each hand vein image. The multibiometric system captures both the fingerprint as well as the hand vein of the patient and hence offers even more improved performance though the speed and the cost of the system as well as the hygiene are reduced. We have used the Euclidean classifier to calculate the performance rates namely the False Rejection Rate (FRR) and False Acceptance Rate (FAR) of the Vein System and the Fingerprint-Vein System. We have performed this analysis using a volunteer crew of 74 persons. The FRR and FAR were 0.46% and 0.7% in the former case and 0% and 0.01% in the latter case respectively. The multimodal or the multibiometric system could be used based of the Hospital‘s requirements.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
Biometric Iris Recognition Based on Hybrid Technique ijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
An part of my role at work, I worked on the E-Learning @ The Library pilot scheme for Sligo, Leitrim and Donegal.
This was a project which was an initiative between FÁS and participating local county libraries which enabled people to up skill and train for free in their local libraries and online.
The E-Tutor can be a little like a jack of all trades. An E-Tutor's role can vary greatly and include functions such as administrator, facilitator, mentor, assessor and subject matter expert.
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Olivia Moran
This document will explore the technologies used for pervasiveness in an attempt to determine whether or not the technology infrastructure needed to implement the pervasive vision is really there yet. The different hardware and software used by professionals to create pervasive solutions will be examined.
It will focus on the limitations of mobile devices, the operating systems they will use, Wireless Application Protocol (W.A.P.), Transmission Control Protocol and the Internet Protocol (TCP/IP). Also examined is the over use of ad hoc solutions. Wireless networks and protocols as well as the software used for pervasive application development will be examined.
It will illustrate how seamless communication occurs and the role that network operators and the handover process play in the achievement of this goal. It will consider how a lack of standards is impacting on the success and growth of the pervasive industry as well as the issue of user acceptance.
Self Organisation: Inspiring Neural Network & IT DesignOlivia Moran
In an attempt to build more sophisticated neural networks and other Information Technology (I.T.) products, the industry constantly turns to the world of Biology for inspiration. The most advanced
computers in the World today, are of course humans.
This paper looks at Self Organisation in the Human Nervous System and aims to highlight the means by which the understanding gained, from the study of this issue, can influence and inspire the design of Neural Networks and I.T. products and services.
Project Management: A Critical Examination of the PPARS ProjectOlivia Moran
This document explores the different aspects of Project Management and critically examines
the management of the recent PPARS project. This was a project which involved the development of a personnel and recruitment system for the HSE in Ireland.
It will also highlight the traps and obstacles
associated with the management of this project.
Knowledge Management: A Literature ReviewOlivia Moran
Is technology the key critical factor, which determines the success or failure of a
Knowledge Management (KM) implementation initiative? Are there other factors,
which contribute to its success or failure?
KM is concerned with sharing and managing information. People need to be seen as
the primary key to its success, as they play a very crucial role. People hold substantial
amounts of information and they need to be encouraged to share it. Technology is
available to support knowledge sharing, but this does not mean that people will
automatically give it up.
This paper examines the human element of knowledge management
This document will examine issues pertaining to feature extraction, classification and prediction. It will
consider the application of these techniques to unlabelled Electroencephalogram (E.E.G.) data in an
attempt to discriminate between left and right hand imagery movements
Complexity Versus Comprehendability: Simplifying Wireless SecurityOlivia Moran
This paper will follow the use of unsecured wireless networks in the city of Derry. Derry established a city wide open access network in 2008, thereby providing ideal conditions for the study of security issues pertaining to unsecured open access networks.
The paper will attempt to uncover the
reasoning behind the failure of individuals to take suitable security measures in light of threats that exist.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Biometrics Iris Scanning: A Literature Review
1. 1 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
BIOMETRICS: IRIS SCANNING
A Literature Review
WWW.OLIVIAMORAN.ME
2. 2 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
ABOUT THE
AUTHOR
Olivia Moran is a training specialist who specialises in E-Learning instructional design and is a
certified Moodle expert. She has been working as a trainer and course developer for 3 years
developing and delivery training courses for traditional classroom, blended learning and E-
learning.
Biometrics, Iris Scanning: A Literature Review was written as part of a group collaboration with
Barry Feehily and Eric Nichols.
WWW.OLIVIAMORAN.ME
3. 3 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
Abstract
The interest in Biometrics from both governments and industry has lead to the emergence of
multiple Biometric technologies all with their own strengths and flaws. One currently at the
forefront of Biometrics is iris scanning. The process involved in the identification and verification
of people using iris scanning is examined in this paper. The advantages and disadvantages
associated with the utilisation of such a technology are also explored. A number of legal and
ethical issues are highlighted. Iris scanning is looked at in comparison to other forms of Biometric
technologies. Future work in the area of Biometrics is also considered in light of current
developments.
Introduction
Over the past number of years, identity theft has evolved into a billion dollar industry. Pin
numbers and passwords just do not cut it anymore. They are no match against shoulder surfing
and card scanning. Developing new ways to protect information has become critical. Many have
turned to Biometrics making it one of the more popular alternatives. Biometric testing means
identifying a person on the basis of physiological and behavioural characteristics. According to
Prabhakar et al (2003) it enables “automatic personal recognition based on physiological or
behavioural characteristics”. The advances in technology in terms of processing power and cheaper
memory have also fueled interest in this area.
This article will examine Biometrics placing particular emphasis on remote iris scanning. It will take
an in-depth look at how such technology functions. The advantages and disadvantages that are
associated with it will also be highlighted. Ethical and legal considerations are addressed. A
comparison of iris scanning is made with other kinds of Biometrics. Possible areas for future
research and development are proposed.
How it Works
With the current state of iris recognition technology, Kanda (2005) states “Up to 20 people can be
recognised per minute if the scanning distance is within three metres and the subjects walking
speed is less than one metre per second”. There are various algorithms for iris scanning. Plemmons
et al (2004) describe eight different algorithms and write that they all share the same basic steps;
obtain the iris image, extract the features and compare to a database for a match.
Daugman (2004) algorithms are used in places such as British Telecom, US Sandia Labs, UK National
Physical Lab, NBTC, Panasonic, LG, Oki, EyeTicket, IBM SchipholGroup, Joh.Enschede, IriScan,
Iridian, and Sensar. He reports that while using his algorithms, “all testing organizations have
reported a false match rate of 0 in their tests, some of which involved millions of iris pairing”.
Daugmans’ algorithms in the context of the above three steps will now be examined.
4. 4 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
Step one involves obtaining the image. This step can only be successfully performed when people
being scanned look in the general direction of the scanner without blinking. Obtaining the iris
image involves scanning the eye for the iris boundary, the pupil boundary, and the upper and
lower eyelid boundaries, as shown in Figure 1. From these localisations the iris can be removed
from the rest of the eye and encoded.
Figure 1: Obtaining the iris image
(Daugman 2004, p.1)
Step two entails extracting the necessary features (i.e. encoding). It is done by scanning over the
entire iris “with many wavelet sizes, frequencies, and orientations, to extract 2,048 bits” Daugman
(2004). Each discrete item of extracted data contains two bits. Therefore there are 1,024 different
items of information encoded. This includes not only the iris, but also masking items such as
eyelashes that fall over the iris. As such, each eye is encoded with only 256 bytes.
Step three involves comparing the collected data to a database for a match. This comparison is
done with a fractional Hamming Distance. Daugmans’ (2004) version of the Hamming Distance
(HD) involves taking a scanned eye and applying an Exclusive OR to it and an item from the
database. The masking bits from the scanned eye and the eye in the database are the ANDed. They
are then ANDed with the items that were applied an Exclusive OR. The result is made positive and
then is divided by positive ANDed masking bits to produce the Hamming distance, as shown in the
following equation by Daugman in Figure 2:
Figure 2: Hamming Distance
(Daugman 2004, p.4)
When the HD is 0, then there is a perfect match between two irises. When the DH is 1, there is an
absolute mismatch. There must be a target for the comparator to resolve whether a match has
been made. Table 1 shows that a lower matching target results in less chance there will be a false
match:
Table 1: HD target result to false match (Daugman 2004, p.7)
5. 5 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
If a system were only concerned with false matches, then a target at or near zero for positive
identification would be desired. However, if a subject’s iris is more or less dilated, or if the subject’s
eye is slightly more closed or open, the mask will be different which will make the HD higher than
zero – even for the same iris. As such, a target HD of less than 0.30 on a world-wide scale would be
advised as this would ensure a positive match for the same iris while keeping the false matches at
less than 1 in 13 billion.
Advantages of Iris Scanning
There are a number of advantages associated with iris scanning. These include the following.
Uniqueness of the Iris
The iris of each person has a unique nature. Unlike with DNA “An iris image is independent of an
identical genetic makeup” Horst (2006). Take for example, identical twins that come from the
same embryo. Both will share the same DNA, yet evidence from research into iris imaging show
that “even irises of identical twins are different” Jain et al (2000). Some people even go as far as
to claim that “The iris is the most personally distinct feature of the human body” Kirsch (2006).
Red Herring (2006) report, “The odds of being misidentified by an iris scan, assuming both eyes are
used, are less than a trillion to one”.
Robustness
Iris scanning systems are more robust than other authentication methods such as face and voice
recognition. These systems can find it hard to cope with changes in the environment or the
person. For example, voice recognition may not work if the user is suffering from laryngitis or if
there is excessive background noise. Irish scanning eliminates this problem.
Accuracy
Accuracy is of crucial importance. People will not trust a system that gives wrong results. “An
inaccurate system could falsely identify a traveler as a terrorist, or give a false sense of security
while failing to identify a real terrorist” (Bryant 2001). Recently in a report entitled National
Institute of Justice Research Report on Entry-Control Technologies, it has been claimed, “iris
pattern scanners are considered the most accurate of all Biometrics” (Jarvis 2006). The accuracy of
iris scans is higher than that of its contemporaries.
Ease of Use
Remote iris scanning systems are relatively simple to use. While the user has to undergo enrolment
it is short and easy to complete. The acquisition of the iris image does not involve any intrusive
procedure. The user is not really required to interact with the system. The characteristics of the iris
are captured by simply glancing into a digital camera for a fraction of a second. Ease of use is
extremely important when it comes to gaining acceptance. If people feel that controls are too
annoying or time consuming they will simple override them. It is this ease of use that has proven a
huge success in US airports for both access control as well as passenger ticketing. It has also been
successful in use for ticketing at sporting events.
6. 6 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
Security
Remote iris scanning is more secure than other methods of identification such as pins and
passwords. These can be guessed and there exists the danger that someone could ‘shoulder surf’
you while you type it in. These identification methods also run the risk of been stolen should they
be written down and fall into the wrong hands. Fooling an iris scanning system is almost
impossible as it is “extremely difficult to surgically tamper iris texture information and it is easy to
detect artificial irises” Jain et al (2000). No other biometric technology can rival the combined
attributes of mathematical certainty.
Speed
Iris recognition is widely accepted as the fastest form of biometric testing and is suitable for use
where a large number of people are involved. Iris Scanning has been successfully deployed at
seventeen air, land and seaports in the United Arab Emirates (UAE). Border officials have scanned
the irises of 900,000 people whose visas have expired or who have been asked to leave the country.
Using those scans to screen arrivals has uncovered 650,000 illegal aliens trying to re-enter the UAE
using false passports. At Amsterdam Schiphol Airport, frequent travelers have been using iris scans
to speed up entry and immigration checks since 2001. There is no question that iris scanning is the
best choice where huge volumes of people need to be processed quickly.
Disadvantage of Iris Scanning
There are multiple weaknesses associated with iris scanning which need to be improved upon in
the future. These include the following.
Costs
One of the main reasons for slow adoption of Iris Scanning is the high cost currently associated
with the installation and maintenance of such technology. It is expected however, as the industry
matures and use of iris scanning becomes more wide spread, that costs will be reduced
significantly. As outlined by Torbet et al (1995), “Many biometric devices could be integrated with
the existing system, with the exception of the input sensor. This will reduce the cost and make
wide-scale adoption more likely”.
Acceptability
Users generally don’t like the unfamiliar. People are slow to adopt new technologies especially
when they see them as interfering with their privacy and confidentially. In order for iris scanning
to be acceptable its operation must be perceived by its potential users to be “at least as well, or
better, than any currently available alternative” Torbet et al (1995).
Fraudulent Use
Although the risk is relatively low the data collected during the iris scans could be used for fraud.
“Such fraud can occur at the enrolment stage as well as well as the verification stage” (Bennett
2000). During the enrolment phase someone may be able to set up a false template. Fraud can
also take place during the verification or identification stage. When the system scans the users iris
7. 7 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
the resulting data must be compared against the relevant template. This template is usually stored
in a central database. Therefore, data must be transmitted at this point. If this transmission is not
secure it is possible for others to intercept the information. They can then use it for whatever
purpose they wish.
Security
No system is one hundred percent accurate and that includes Biometrics. Although iris scanning
reduces the risks, there is always room for error. From the research conducted it is highlighted that
there is a False Rejection Rate, where the system rejects the right person and the False Acceptance
Rate, where the wrong person is accepted. The levels of these errors however are deemed to be
well under the acceptable level.
Industry Standards
As outlined by Emory (2002) “The development and acceptance of a primary standard is critical for
the growth and applicability of the biometrics industry”. While industry standards do exist, they
do leave room for improvement and are few and far between. The bigger more powerful
companies such as Microsoft refuse to conform in order to build a better product and they create
their own set of standards. The adoption of global standards would limit and minimise the abuse
of data collected. However, the adoption of standards is voluntary and not legally binding.
Legal Considerations
The rapid progression of the use of Biometrics and Iris Scanning has raised concerns from a legal
point of view, especially the legislation concerning privacy and the protection of data. From this
article it is clear that all Biometrics involves working with and processing data. As a result
Biometrics must comply with legal requirements that are currently in place. Take for example ‘The
Data Protection Act (1998)’ in Ireland. According to this act personal data should be collected for a
specific purpose and should be adequate, relevant and not excessive for the purpose for which it is
collected and processed. In addition it must be accurate and up to date. Appropriate security
measures must be in place to protect it. If a company is found to be in breech of the requirements
of this act they can be prosecuted.
Ethical Considerations
Disabled Users
Advocates of iris scanning market it as being the only system needed for authentication. This is
fine for most but what about the small group of people who do not have an iris? Obviously these
people cannot undergo iris scans. The exclusion of users with disabilities is not ethical nor is it
legal. We claim to be an inclusive modern society and yet little consideration is given to this
group. Using a mulitmodal system could overcome this limitation. Users could carry a smart card,
which would contain information about their lack of iris. The system could then permit an
override for this individual. Authentication could be done by some other means such as
8. 8 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
fingerprint or facial recognition. Such a multimodal system “offers higher and more consistent
performance levels” (Bennett 2000).
Privacy Concerns
One of the major concerns associated with the use of any Biometric system is privacy. There is a
threat to privacy and civil liberties because of potential for a wide range of people to cross-
reference information. People wish to keep their confidential information exactly that,
confidential. If we give all our information to a bank what is stopping them from selling this
information to a third party such as a marketing agency. Even worse what could the “Potential
impact that government might use of these technologies might have on personal freedom ... The
government could use some unforeseen technological advances to compile biometric records for
the real-time tracking of individuals” Wayman (2000). Currently such technologies are utilised in
many countries to find and track criminals. This could however be extended to cover the wider law
abiding population.
Up until now fingerprinting has been collected mainly for the use of law enforcement e.g.
criminals and this is a very sensitive issue for many people. However, it must be acknowledged that
iris scanning reduces the quantity of personal information that needs to be created and stored.
Iris Scanning Versus Other Forms of
Biometric Testing
Retina recognition relies on the retina’s blood vessel pattern. Unlike iris scanning, this technology
is personally invasive and requires skilled operators and time. Facial recognition examines
characteristics such as eyes, nose and mouth positioning taking into account the distances between
them. To date attempts to get computers to recognise faces have had only limited success. The
challenge here is producing hardware that will map the features of the face reliably and
accurately. Voice Recognition based on vocal characteristics is not intrusive, however, it is sensitive
to background noise and vulnerable to attack.
Today the fingerprinting is probably the most common form of Biometric technology used. This
involves matching minute features such as ridge and endings. While it is a widely accepted form of
Biometric testing it also has its drawbacks. The success of this process is highly sensitive to image
quality. Failure of this system can result from dirt and scars on the fingers along with poor finger
positioning. According to Matsumoto (2002) “Biometric samples or even templates may be
constructed, for instance artificial fingers may be used by attackers”.
As a result it is quite evident Iris Scanning offers advantages over alternative biometric techniques.
9. 9 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
Future Work
While iris scanning has been successful in providing a false match rate of zero, it has a weakness
that must be addressed. The system needs direct visual contact with every subjects’ iris for it to
operate. A person turning his or her head while talking to another could be a common occurrence
in a system that scans many people at once. People could also take advantage of this weakness.
An example is a locked door that needs iris identification in order for it to unlock. A person with
authority to pass could unlock the door with an iris scan. Before the door re-locks, people without
authority to pass through the door could close their eyes and also pass through before the door is
re-locked. The system would not be aware that an unauthorised person had breeched the security.
An additional security system such as a guard at the scanner would therefore be required. This is a
problem inherent in iris scanning.
In order to implement a better system technology would have to be utilised that could allow for
the remote identification of individuals. Such a system would not depend upon actions from those
individuals. Brainwave biometrics would provide this solution. Lawson (2002) notes that people
“cannot alter what is referred to as their baseline brainwave pattern”. Every person’s baseline
brainwave pattern is unique. From birth until death people broadcast unchanging and unique
waves from their brain. Technology that could receive and decode these waves would provide a
foolproof means of personal identification.
Future work in this area is needed from various fields. For instance, hardware would be needed
that is capable of receiving baseline brainwaves. The issue of storing individual’s brainwaves on
databases will need to be addressed. Algorithms would have to be developed to convert these
waves into a binary format. A way to compare the brainwaves so that a match can be immediately
found will also need to be implemented. There is plenty of future work to be done in this area.
Once such work is completed the best possible system of personal identification will have been
available for use.
Conclusion
In this document the area of Biometrics was critically examined focusing on iris scanning. The way
in which the entire iris scanning process works was illustrated. The benefits and shortcomings of
this particularly technology were addressed as well as the legal and ethical problems arising from
the use of such technology. Iris scanning was considered in relation to other technologies and
comparisons were made. Lastly, areas for future research and development were put forward.
Two important issues globally affecting the world today are identification and authentication of
an individual. Identification says who you are and authentication specifies that you are who you
say you are. From the research conducted it is quite evident that the use of Biometrics and iris
scanning for the above purpose is fast gaining worldwide recognition.
10. 10 Biometrics: Iris Scanning – A Literature Review [www.oliviamoran.me]
It is clear to see that Iris Scanning is a highly accurate and speedy form of Biometric Testing and is
suitable for use in many different situations especially where speed is essential e.g. airports.
However, the one major drawback at this time is its high implementation costs. With the
development of a more cost-effective system, it is anticipated that iris scanning will be used more
wide spread and it will gain a higher level of recognition in the future.
Biometric Technology also raises privacy-related concerns. Biometric systems must comply with the
principles of data protection legislation, since they create and process data, however, as Biometric
Technology is been widely implemented across the world, it is anticipated that countries will
update their laws to facilitate surveillance of this new technology.
Overall, especially after the tragic events of the attacks of the 11th of September 2001 and the
current fight against terrorism, it is likely that Biometrics and iris scanning will increasingly become
part of everyone’s life but like all other data collection and processing systems, it must be handled
with care. It will only be useful if the processes surrounding it are safe and secure.