SlideShare a Scribd company logo
IRIS RECOGNITION
SUBMITTED BY
A.ARUNA [1]
V.ELAKKIYA
[2]
III-EEE-’A’
INTRODUCTION TO BIOMETRICS
 Biometric technologies is defined as automated method of identifying or
authenticating the identity of a person based on physiological or behavioural
characteristics.
 Physiological characteristics are more stable and few examples are,
1. Face recognition
2. Finger print recognition
3. Iris recognition
4. DNA recognition
Behavioural characteristics are the reflection of the make up and few examples are,
1. Signatures
2. Voices
IRIS RECOGNITION-WHAT? AND WHY?
 Iris recognition is a method of biometric authentication that uses
pattern recognition techniques based on high-resolution images of
the iris of an individual eyes.
As long as a person has an eye with iris, that eye can be identified
by iris recognition.
 Even the fingerprinting technology allows only 60 to 70 degrees
of freedom.
IRIS SCANNING
With video technology, a camera scans the iris pattern, which
consists of corona, pupil, etc.
 The system then digitizes unique information of the iris from the
photograph and is stored in a database.
To record an individual’s iris code, a black and white video
camera uses approximately 30 frames per second to zoom the eye
and “grab” a sharp and accurate image of the iris.
METHODS OF IRIS
 In identifying one’s iris, there are 2 methods for its recognition
and are,
1. Active
2. Passive
 The active Iris system requires that a user be anywhere from six
to fourteen inches away from the camera.
The passive system allows the user to be anywhere from one to
three feet away from the camera that locates the focus on the iris.
USAGE OF IRIS RECOGNITION IN THE
VOTING PROCESS
• The voting process consists of,
1. Enrolment of iris pattern
2. Iris scanning of individuals
3. Verification for the identity
4. Permission to vote
5. Voting process
BLOCK DIAGRAM OF IRIS
RECOGNITION IN VOTING PROCESS
ENROLMENT
 Before the election the people has to enrol their iris pattern at the
district head quarters, municipal office , etc.
 This registration can be done once throughout the life.
 The distance between the camera and the human eye can be 4 to
24 inches.
 In the entire process, the enrolment stage needs human work.
IRIS CODE GENERATION
The iris pattern is encoded after the unnecessary parts have been
discounted and this process is called as demodulation and it creates a
phase code.
 The phase sequence is called an iris code template, and it captures
the unique features of an that allows easy and rapid comparisons
against large databases of other templates and is encrypted.
VERIFICATION
 In less than few seconds, even on a database of millions of
records, the iris code template is generated from a live image is
compared to previously enrolled ones to see if it matches any of
them.
HOW INDIVIDUAL IRIS IS
IDENTIFIED?
PERMISSION AND VOTING PROCESS
PERMISSION::
 The server provided at the polling station will verify the iris code
with the database and then it verifies whether they had already
voted.
VOTING::
After getting the permission from the server the person can vote
by pressing the keys and the pre recorded voice message will help to
select the candidate.
FLOWCHART FOR PERMISSION TO
VOTE
SPECIALISATION OF IRIS OVER OTHER
RECOGNITION TECHNIQUE
 It uses camera technology, with suitable infra-red illumination
reducing reflection from the convex cornea, to create images of rich
structures of iris.
 Because of its speed of comparison, iris recognition is the only
biometric technology well-suited for one-to-many identification.
ADVANTAGES OF IRIS RECOGNITION
Time saving.
Election malpractices can be stopped.
 Imitation is not possible and pattern cannot be changed without
risking the eye.
 High accuracy rate.
DISADVANTAGES OF IRIS RECOGNITION
 Iris recognition is very difficult to perform at a distance larger
than a few meters.
 Irises are not typically deposited by people at crime scenes, and
so are not useful as fingerprints and DNA for forensic
identification.
 Optical readers are difficult to operate requiring advanced
training for employees.
APPLICATIONS OF IRIS RECOGNITION
 All foreign nationals who posses a visa to enter the UAE(United
Arab Emirates) are processed through iris cameras.
 One of the three biometric identification technologies
internationally standardized by ICAO for use in future passports (the
other two are finger print and face recognition).
 At Schiphol Airport, Netherlands, iris recognition has permitted
passport-free immigration since 2001.
APPLICATION OF IRIS SCANNING
FOR BAGHDAD REFUGEES
ADVANTAGES OVER FINGERPRINT SCANNING:
 There is no need for the person to be identified to touch any
equipment that has recently been touched by a stranger, thereby
eliminating an objection that has been raised in some cultures
against fingerprint scanners, where a finger has to touch a surface or
retinal scanning, where the eye can be brought very close to a lens
(like looking into a microscope lens).
NO TWO IRISES ARE ALIKE:
 No two irises are alike, not even in one individual or identical
twins.
 The iris consists of over 400 different characteristics.
 Compared to the 40 or 50 points of distinct finger print
characteristics, the iris has more than 250 distinct features.
 Hence, iris scanning is much more accurate than fingerprints
or even DNA analysis of the different features.
REFERENCES
1.S.Prabhakar, S.Pankanti and A.K.Jain,”Biomertric
recognition security and privacy concerns”, IEEE
security and privacy magazine, vol.1,No.2, pp.33-42,
2003.
2.D.Maltoni, D.Maio, A.K.Jain and S.Prabhakar,
Handbook of fingerprint recognition, springer. NY,
2003.
3.Electronics for you
4.Wikipedia
5. A.K.Jain, R.Bolle and S.Pankanti(editors),
Biometrics: personal identification in networked
society, kluwer academic publishers, 1999.
THANK YOU

More Related Content

What's hot

Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
Iris ppt
Iris pptIris ppt
Iris ppt
Sri Harati K
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
Mazin Alwaaly
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Iris scanning
Iris scanningIris scanning
Iris scanning
himansupaichha
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
Anjali Awasthi
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
Ankit Kumar
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
NARAHARISRUTHI1
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
Olivia Moran
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
shyamalaramesh2
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation System
Mohamed Refaei
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
Centerix Co., Ltd.
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
Ahmed Tememe
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
dswazalwar
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
DexterChess
 
Iris scanning
Iris scanningIris scanning
Iris scanning
NikithaME
 

What's hot (20)

Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation System
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 

Viewers also liked

Mobile voting by using biometrics
Mobile  voting  by  using biometricsMobile  voting  by  using biometrics
Mobile voting by using biometrics
JEEVA ARAVINTH
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)vasim hasina
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
Aniruddha Banerjee
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
Gautam Kumar
 
Online votinh
Online votinh Online votinh
Online votinh
Richa Pandey
 
The Inbuilt Password Iris Final
The Inbuilt Password Iris FinalThe Inbuilt Password Iris Final
The Inbuilt Password Iris FinalSwarupKulkarni
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Waqas Tariq
 
Cryptography and Voting
Cryptography and VotingCryptography and Voting
Cryptography and Voting
Ben Adida
 
Idea or opportunity?
Idea or opportunity?Idea or opportunity?
Idea or opportunity?
Grow America
 
Simha_23_REFFIT_Biochar_ICT_Published Version
Simha_23_REFFIT_Biochar_ICT_Published VersionSimha_23_REFFIT_Biochar_ICT_Published Version
Simha_23_REFFIT_Biochar_ICT_Published VersionPrithvi Simha
 
When Ideas and Opportunities Collide
When Ideas and Opportunities CollideWhen Ideas and Opportunities Collide
When Ideas and Opportunities CollideGrow America
 
Thotcon2013
Thotcon2013Thotcon2013
Thotcon2013
Philip Polstra
 
The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012
Philip Polstra
 
CERTH @ MediaEval 2012 Social Event Detection Task
CERTH @ MediaEval 2012 Social Event Detection TaskCERTH @ MediaEval 2012 Social Event Detection Task
CERTH @ MediaEval 2012 Social Event Detection TaskMediaEval2012
 
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012MediaEval2012
 
Working Notes for the Placing Task at MediaEval 2012
Working Notes for the Placing Task at MediaEval 2012Working Notes for the Placing Task at MediaEval 2012
Working Notes for the Placing Task at MediaEval 2012MediaEval2012
 
Mentor Strategy Session: Business Plan and Video
Mentor Strategy Session: Business Plan and VideoMentor Strategy Session: Business Plan and Video
Mentor Strategy Session: Business Plan and Video
Grow America
 
The Watershed-based Social Events Detection Method with Support from External...
The Watershed-based Social Events Detection Method with Support from External...The Watershed-based Social Events Detection Method with Support from External...
The Watershed-based Social Events Detection Method with Support from External...MediaEval2012
 
MediaEval 2012 Opening
MediaEval 2012 OpeningMediaEval 2012 Opening
MediaEval 2012 OpeningMediaEval2012
 

Viewers also liked (20)

Mobile voting by using biometrics
Mobile  voting  by  using biometricsMobile  voting  by  using biometrics
Mobile voting by using biometrics
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
Online votinh
Online votinh Online votinh
Online votinh
 
The Inbuilt Password Iris Final
The Inbuilt Password Iris FinalThe Inbuilt Password Iris Final
The Inbuilt Password Iris Final
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
 
Cryptography and Voting
Cryptography and VotingCryptography and Voting
Cryptography and Voting
 
Idea or opportunity?
Idea or opportunity?Idea or opportunity?
Idea or opportunity?
 
Simha_23_REFFIT_Biochar_ICT_Published Version
Simha_23_REFFIT_Biochar_ICT_Published VersionSimha_23_REFFIT_Biochar_ICT_Published Version
Simha_23_REFFIT_Biochar_ICT_Published Version
 
When Ideas and Opportunities Collide
When Ideas and Opportunities CollideWhen Ideas and Opportunities Collide
When Ideas and Opportunities Collide
 
Thotcon2013
Thotcon2013Thotcon2013
Thotcon2013
 
The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012
 
CERTH @ MediaEval 2012 Social Event Detection Task
CERTH @ MediaEval 2012 Social Event Detection TaskCERTH @ MediaEval 2012 Social Event Detection Task
CERTH @ MediaEval 2012 Social Event Detection Task
 
Closing
ClosingClosing
Closing
 
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
 
Working Notes for the Placing Task at MediaEval 2012
Working Notes for the Placing Task at MediaEval 2012Working Notes for the Placing Task at MediaEval 2012
Working Notes for the Placing Task at MediaEval 2012
 
Mentor Strategy Session: Business Plan and Video
Mentor Strategy Session: Business Plan and VideoMentor Strategy Session: Business Plan and Video
Mentor Strategy Session: Business Plan and Video
 
The Watershed-based Social Events Detection Method with Support from External...
The Watershed-based Social Events Detection Method with Support from External...The Watershed-based Social Events Detection Method with Support from External...
The Watershed-based Social Events Detection Method with Support from External...
 
MediaEval 2012 Opening
MediaEval 2012 OpeningMediaEval 2012 Opening
MediaEval 2012 Opening
 

Similar to Iris by @run@$uj! final

Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
AdityaTakePatil
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
Dr-mahmoud Algamel
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
Mohamed Safraz
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
Kumar Goud
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
Sai Divya
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
 
Iris print
Iris print Iris print
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
Rupinder Saini
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Dharmendrasingh417
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
YUSRA FERNANDO
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
Manoj Kumar
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
Ravi Kumar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 

Similar to Iris by @run@$uj! final (20)

Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Iris print
Iris print Iris print
Iris print
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Iris by @run@$uj! final

  • 1. IRIS RECOGNITION SUBMITTED BY A.ARUNA [1] V.ELAKKIYA [2] III-EEE-’A’
  • 2. INTRODUCTION TO BIOMETRICS  Biometric technologies is defined as automated method of identifying or authenticating the identity of a person based on physiological or behavioural characteristics.  Physiological characteristics are more stable and few examples are, 1. Face recognition 2. Finger print recognition 3. Iris recognition 4. DNA recognition Behavioural characteristics are the reflection of the make up and few examples are, 1. Signatures 2. Voices
  • 3. IRIS RECOGNITION-WHAT? AND WHY?  Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the iris of an individual eyes. As long as a person has an eye with iris, that eye can be identified by iris recognition.  Even the fingerprinting technology allows only 60 to 70 degrees of freedom.
  • 4. IRIS SCANNING With video technology, a camera scans the iris pattern, which consists of corona, pupil, etc.  The system then digitizes unique information of the iris from the photograph and is stored in a database. To record an individual’s iris code, a black and white video camera uses approximately 30 frames per second to zoom the eye and “grab” a sharp and accurate image of the iris.
  • 5. METHODS OF IRIS  In identifying one’s iris, there are 2 methods for its recognition and are, 1. Active 2. Passive  The active Iris system requires that a user be anywhere from six to fourteen inches away from the camera. The passive system allows the user to be anywhere from one to three feet away from the camera that locates the focus on the iris.
  • 6. USAGE OF IRIS RECOGNITION IN THE VOTING PROCESS • The voting process consists of, 1. Enrolment of iris pattern 2. Iris scanning of individuals 3. Verification for the identity 4. Permission to vote 5. Voting process
  • 7. BLOCK DIAGRAM OF IRIS RECOGNITION IN VOTING PROCESS
  • 8. ENROLMENT  Before the election the people has to enrol their iris pattern at the district head quarters, municipal office , etc.  This registration can be done once throughout the life.  The distance between the camera and the human eye can be 4 to 24 inches.  In the entire process, the enrolment stage needs human work.
  • 9. IRIS CODE GENERATION The iris pattern is encoded after the unnecessary parts have been discounted and this process is called as demodulation and it creates a phase code.  The phase sequence is called an iris code template, and it captures the unique features of an that allows easy and rapid comparisons against large databases of other templates and is encrypted.
  • 10. VERIFICATION  In less than few seconds, even on a database of millions of records, the iris code template is generated from a live image is compared to previously enrolled ones to see if it matches any of them.
  • 11. HOW INDIVIDUAL IRIS IS IDENTIFIED?
  • 12. PERMISSION AND VOTING PROCESS PERMISSION::  The server provided at the polling station will verify the iris code with the database and then it verifies whether they had already voted. VOTING:: After getting the permission from the server the person can vote by pressing the keys and the pre recorded voice message will help to select the candidate.
  • 14. SPECIALISATION OF IRIS OVER OTHER RECOGNITION TECHNIQUE  It uses camera technology, with suitable infra-red illumination reducing reflection from the convex cornea, to create images of rich structures of iris.  Because of its speed of comparison, iris recognition is the only biometric technology well-suited for one-to-many identification.
  • 15. ADVANTAGES OF IRIS RECOGNITION Time saving. Election malpractices can be stopped.  Imitation is not possible and pattern cannot be changed without risking the eye.  High accuracy rate.
  • 16. DISADVANTAGES OF IRIS RECOGNITION  Iris recognition is very difficult to perform at a distance larger than a few meters.  Irises are not typically deposited by people at crime scenes, and so are not useful as fingerprints and DNA for forensic identification.  Optical readers are difficult to operate requiring advanced training for employees.
  • 17. APPLICATIONS OF IRIS RECOGNITION  All foreign nationals who posses a visa to enter the UAE(United Arab Emirates) are processed through iris cameras.  One of the three biometric identification technologies internationally standardized by ICAO for use in future passports (the other two are finger print and face recognition).  At Schiphol Airport, Netherlands, iris recognition has permitted passport-free immigration since 2001.
  • 18. APPLICATION OF IRIS SCANNING FOR BAGHDAD REFUGEES
  • 19. ADVANTAGES OVER FINGERPRINT SCANNING:  There is no need for the person to be identified to touch any equipment that has recently been touched by a stranger, thereby eliminating an objection that has been raised in some cultures against fingerprint scanners, where a finger has to touch a surface or retinal scanning, where the eye can be brought very close to a lens (like looking into a microscope lens).
  • 20. NO TWO IRISES ARE ALIKE:  No two irises are alike, not even in one individual or identical twins.  The iris consists of over 400 different characteristics.  Compared to the 40 or 50 points of distinct finger print characteristics, the iris has more than 250 distinct features.  Hence, iris scanning is much more accurate than fingerprints or even DNA analysis of the different features.
  • 21. REFERENCES 1.S.Prabhakar, S.Pankanti and A.K.Jain,”Biomertric recognition security and privacy concerns”, IEEE security and privacy magazine, vol.1,No.2, pp.33-42, 2003. 2.D.Maltoni, D.Maio, A.K.Jain and S.Prabhakar, Handbook of fingerprint recognition, springer. NY, 2003. 3.Electronics for you 4.Wikipedia 5. A.K.Jain, R.Bolle and S.Pankanti(editors), Biometrics: personal identification in networked society, kluwer academic publishers, 1999.