SlideShare a Scribd company logo
1
A TECHNICAL SEMINAR ON
AUTOMATIC IRIS RECOGNITION AND TRACKING OF EYE
CONTENTS
Abstract
Existing Technology
Disadvantages of Existing Technology
Proposed Technology
Working of Proposed Technology
Advantages
Applications
Future scope
Conclusion
Reference
2
ABSTRACT
The main purpose of this Technology is provide the high security. For
iris recognition first of all database will be created in MATLAB using
webcam. Then iris localization is done, after localization normalization
and segmentation will performed, for that hough transform algorithm
implemented. In last binarization of image is performed. Then binary
output is compared with database image’s binary value. From
comparison recognition is done, we can identify whether person is
authorized or not.Eye trackers are used in research on the visual
system, in psychology, marketing, as an input device for human-
computer interaction, and in product design. The most popular variant
uses video images (frames of images) from which the eye position is
extracted.
3
EXISTINGTECHNOLOGY
Biometrics is the science and technology of measuring and analyzing
biological data. It refers to technologies that measure and analyze human
body
Characteristics.
FINGERPRINT TECHNOLOGY :
A Fingerprint is the feature pattern of one finger.
Each individual has unique fingerprints so the uniqueness of a
fingerprint is exclusively determined by local ridge characteristics
and their relationships.
It is the process of comparing known fingerprint against another
fingerprint to determine if the is authorised or not.
4
DISADVANTAGES
Dirt , grime and wounds.
Placement of finger.
Can be spoofed.
5
PROPOSED SYSTEM
Characteristics of the iris make it very attractive for use as a biometric .
The unique iris pattern from a digitised image of the eye is encoded into a
biometric template , and then stored in database.
A Biometric template contains objective mathematical representation of
the unique information stored in the iris and allows comparisons between
templates.
John daugman patented and implemented a first working , automated iris
recognition system.
6
Structure for BiometricIdentificationSystem
Enrollent system
Enroll
Authentication system
Data
base
7
WORKING METHODOLOGY
Image scanned using webcam
Data base created in matlab
Iris localization and segmentation using
hough transform
Sampling and binarization using
haarwavelet transform
Iris code comparision and identification
8
ACQUISITION OF IMAGE
Iris localization :
Both the inner and outer boundary of a typical iris can be taken as
circles.
The inner boundary between the pupil and iris can be detected
The outer boundary of the iris is more difficult to detect .
The outer boundary can be detected by maximizing changes of the
parameters normalized along the circle.
Iris Normalization :
The size of the pupil may change due to the variation of the
illumination and the associated elastic deformation in the iris texture
may interface with the results of pattern matching
Since both the inner and outer boundaries of the iris have been
detected, it is easy to map the iris ring to rectangular block of texture
of a fixed size using hough transform.
9
PatternMatching:
How closely the produced code matches the encoded features stored
in the database.
One technique for comparing two iris codes is to use the hamming
distance, which is the number of corresponding bits that differ
between the two iris codes.
In hamming distance 30% of the bits in two iris codes are allowed to
disagree due to imaging noise, reflections ,etc ., while still declaring
them to be match.
10
ADVANTAGES
Highly protected , internal organ of the eye
Externally visible patterns imaged from a distance
Iris shape is far more predictable than that of the face
No need for a person to touch any equipment
11
APPLICATIONS
ATMs
Computer login : The iris as a living password.
Credit –card authentication.
Secure financial transaction (e-commerce , banking)
Internet security, control of access to privileged information.
National Border Controls : The iris as a living password.
12
FUTURE SCOPE
Improve Patient Care:
New , ambulatory patients will enroll in this iris
recognition database during admission. Previously enrolled patients will
be identify themselves at any of the networked scanning stations
throughout the facility. Non –ambulatory and emergency patients and
those who don’t know who they are , such as dementia patients will be
identified or enrolled without interrupting the critical time to treatment.
Keep Officers Safe On Street :
Officers will perform a quick iris scan to identify
individual from a distance, providing a critical layer of safety. Wireless ,
lightweight , and portable , the iris scanner is operated with one hand ,
leaving the other hand free for fast reaction.
13
CONCLUSION
After understanding importance of Iris detection and localization stage
different detection techniques are implemented. For video frame pupil
detection circular Hough transform, histogram equalization and
thresholding are used. After measuring hamming distance iris of
authorized person is identified.
14
REFERENCES
• K. Yiu-ming Cheung, Senior Member, IEEE, and Qinmu Peng,
• Member, IEEE “Eye Gaze Tracking With a Web Camera in a
Desktop Environment” IEEE TRANSACTIONS ON HUMAN-
MACHINE SYSTEMS, VOL. 45, NO. 4, AUGUST 2015.
• Tanvir Zaman Khan, Prajoy Podder and Md. Foisal Hossain “Fast
and Efficient Iris Segmentation Approach Based on Morphology and
Geometry Operation” vol.4 ,IEEE 2014.
• Yahya and M. Nordin, “A New Technique for Iris Localization”,
15
16

More Related Content

What's hot

Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation System
Mohamed Refaei
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
Olivia Moran
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
shams tabrez
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
Alexander Decker
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
Centerix Co., Ltd.
 
Iris scanning
Iris scanningIris scanning
Iris scanning
Ankit Kumar
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
Drishty Sharma
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
dswazalwar
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 
The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password IrisSwarupKulkarni
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
DexterChess
 
Human Retina Identification
Human Retina IdentificationHuman Retina Identification
Human Retina Identification
Kalyani Government Engineering College
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
csitconf
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
YUSRA FERNANDO
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
eSAT Journals
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
Alexandru Dorobantu
 
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Editor IJCATR
 

What's hot (20)

Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation System
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Human Retina Identification
Human Retina IdentificationHuman Retina Identification
Human Retina Identification
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 

Similar to Iris ppt

IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
 
Iris scanning
Iris scanningIris scanning
Iris scanning
NikithaME
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
AdityaTakePatil
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
ijsc
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
ijsc
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
IRJET Journal
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
aciijournal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
aciijournal
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
aciijournal
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
aciijournal
 

Similar to Iris ppt (20)

IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Iris ppt

  • 1. 1 A TECHNICAL SEMINAR ON AUTOMATIC IRIS RECOGNITION AND TRACKING OF EYE
  • 2. CONTENTS Abstract Existing Technology Disadvantages of Existing Technology Proposed Technology Working of Proposed Technology Advantages Applications Future scope Conclusion Reference 2
  • 3. ABSTRACT The main purpose of this Technology is provide the high security. For iris recognition first of all database will be created in MATLAB using webcam. Then iris localization is done, after localization normalization and segmentation will performed, for that hough transform algorithm implemented. In last binarization of image is performed. Then binary output is compared with database image’s binary value. From comparison recognition is done, we can identify whether person is authorized or not.Eye trackers are used in research on the visual system, in psychology, marketing, as an input device for human- computer interaction, and in product design. The most popular variant uses video images (frames of images) from which the eye position is extracted. 3
  • 4. EXISTINGTECHNOLOGY Biometrics is the science and technology of measuring and analyzing biological data. It refers to technologies that measure and analyze human body Characteristics. FINGERPRINT TECHNOLOGY : A Fingerprint is the feature pattern of one finger. Each individual has unique fingerprints so the uniqueness of a fingerprint is exclusively determined by local ridge characteristics and their relationships. It is the process of comparing known fingerprint against another fingerprint to determine if the is authorised or not. 4
  • 5. DISADVANTAGES Dirt , grime and wounds. Placement of finger. Can be spoofed. 5
  • 6. PROPOSED SYSTEM Characteristics of the iris make it very attractive for use as a biometric . The unique iris pattern from a digitised image of the eye is encoded into a biometric template , and then stored in database. A Biometric template contains objective mathematical representation of the unique information stored in the iris and allows comparisons between templates. John daugman patented and implemented a first working , automated iris recognition system. 6
  • 7. Structure for BiometricIdentificationSystem Enrollent system Enroll Authentication system Data base 7
  • 8. WORKING METHODOLOGY Image scanned using webcam Data base created in matlab Iris localization and segmentation using hough transform Sampling and binarization using haarwavelet transform Iris code comparision and identification 8
  • 9. ACQUISITION OF IMAGE Iris localization : Both the inner and outer boundary of a typical iris can be taken as circles. The inner boundary between the pupil and iris can be detected The outer boundary of the iris is more difficult to detect . The outer boundary can be detected by maximizing changes of the parameters normalized along the circle. Iris Normalization : The size of the pupil may change due to the variation of the illumination and the associated elastic deformation in the iris texture may interface with the results of pattern matching Since both the inner and outer boundaries of the iris have been detected, it is easy to map the iris ring to rectangular block of texture of a fixed size using hough transform. 9
  • 10. PatternMatching: How closely the produced code matches the encoded features stored in the database. One technique for comparing two iris codes is to use the hamming distance, which is the number of corresponding bits that differ between the two iris codes. In hamming distance 30% of the bits in two iris codes are allowed to disagree due to imaging noise, reflections ,etc ., while still declaring them to be match. 10
  • 11. ADVANTAGES Highly protected , internal organ of the eye Externally visible patterns imaged from a distance Iris shape is far more predictable than that of the face No need for a person to touch any equipment 11
  • 12. APPLICATIONS ATMs Computer login : The iris as a living password. Credit –card authentication. Secure financial transaction (e-commerce , banking) Internet security, control of access to privileged information. National Border Controls : The iris as a living password. 12
  • 13. FUTURE SCOPE Improve Patient Care: New , ambulatory patients will enroll in this iris recognition database during admission. Previously enrolled patients will be identify themselves at any of the networked scanning stations throughout the facility. Non –ambulatory and emergency patients and those who don’t know who they are , such as dementia patients will be identified or enrolled without interrupting the critical time to treatment. Keep Officers Safe On Street : Officers will perform a quick iris scan to identify individual from a distance, providing a critical layer of safety. Wireless , lightweight , and portable , the iris scanner is operated with one hand , leaving the other hand free for fast reaction. 13
  • 14. CONCLUSION After understanding importance of Iris detection and localization stage different detection techniques are implemented. For video frame pupil detection circular Hough transform, histogram equalization and thresholding are used. After measuring hamming distance iris of authorized person is identified. 14
  • 15. REFERENCES • K. Yiu-ming Cheung, Senior Member, IEEE, and Qinmu Peng, • Member, IEEE “Eye Gaze Tracking With a Web Camera in a Desktop Environment” IEEE TRANSACTIONS ON HUMAN- MACHINE SYSTEMS, VOL. 45, NO. 4, AUGUST 2015. • Tanvir Zaman Khan, Prajoy Podder and Md. Foisal Hossain “Fast and Efficient Iris Segmentation Approach Based on Morphology and Geometry Operation” vol.4 ,IEEE 2014. • Yahya and M. Nordin, “A New Technique for Iris Localization”, 15
  • 16. 16