SlideShare a Scribd company logo
Biometrics is the science of measuring physical or
anatomical characteristics of individuals.
It performs automatic identification of a person based on
his/her physiological characteristics.
Among the features measured are face, fingerprints,
handwriting, iris, retinal, vein, and voice. Biometric
technologies are becoming the foundation of an extensive
array of highly secure identification and personal verification
solutions.
INTRODUCTION TO IRIS
 Iris is the area of the eye where the pigmented or
colored circle, usually brown, blue, rings the dark pupil
of the eye.
 It is the colored portion of the eye that regulates the size
of the pupil.
 Has unique complex and random patterns which can
be seen from some distance.
 Iris recognition is an automated method of biometric
identification that uses mathematical pattern-
recognition techniques on the images of the irises of an
individual's eyes, whose complex random patterns are
Steps followed In
A person stands in front of the iris identification system,
between one or three feet away, while a wide angle
camera calculates the position of their eye.
A second camera zooms in on the eye and takes a black
and white image.
Once the iris is in focus, it overlays a circular grid on the
image of the iris and identifies the light and dark areas,
like an “eye print”.
To prevent a fake eye from being used to fool system,
these devices may vary the light shine into the eye and
watch for pupil dilation
DEVICES USED FOR IRIS
SCANNING
Working Of Iris Technology
The iris identification program may be
divided into four main functional
blocks:
1.Image Acquisition.
2.Preprocessing.
3.Image Analysis.
merits
Externally visible highly protected internal organ.
Unique patterns.
Not genetically connected unlike eye color.
Probability of matching of iris pattern is 1:10^78.
Stable with age.
Impossible to alter surgically.
Living Password, Can not be forgotten or copied.
Works on blind person.
User needs not to touch appliances.
Accurate faster and supports large data base.
Disadvantages
Accuracy changes with user’s height ,illumination ,image
quality etc.
Person needs to be still, difficult to scan if not co-operated.
Risk of fake Iris lenses.
Alcohol consumption causes deformation in Iris pattern
Easily fooled by presenting a high-quality photograph of a
face instead of a real face; unsuitable for unsupervised
applications.
Need of live tissue verification technology.
Expensive
APPLICATIONS
Computer login: the iris as a living password.
National border controls: the iris as a living passport.
Driving licenses and personal certificates.
Internet security, control of access to privileged
information.
Premises access control (Home, Office, Laboratory).
Anti-terrorism (e.g. security screening at airports)
Financial Transactions (electronic commerce and
banking).
Secure accesses to bank cash machine accounts.
Credit-card authentication.
Automobile ignition and unlocking; anti-theft devices
CONCLUSION
Highly accurate but easy
Fast
Has some drawbacks
Needs some developments
Experiments are going on
Will become day to day technology
very soon.
Iris ppt

More Related Content

What's hot

Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
Mazin Alwaaly
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
Anjali Awasthi
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
Alisha Korpal
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
Mukta Gupta
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
Mazin Alwaaly
 
Eye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer InteractionEye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer Interaction
Sharath Raj
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
Being Topper
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
Ahmed Tememe
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
Vivek Kumar
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 

What's hot (20)

Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Eye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer InteractionEye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer Interaction
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 

Viewers also liked

Iris scanning
Iris scanningIris scanning
Iris scanning
himansupaichha
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
mahesh123slideshre
 
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi MkindiImmune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
Mkindi Mkindi
 
Anatomy of iris
Anatomy of irisAnatomy of iris
Anatomy of iris
DARSHAN S M
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Blue brain
Blue brainBlue brain
Blue brain
Sri Harati K
 
TB-HIV Co-infection Treatment
TB-HIV Co-infection TreatmentTB-HIV Co-infection Treatment
TB-HIV Co-infection Treatment
HopkinsCFAR
 
Anatomy of uvea
Anatomy of uveaAnatomy of uvea
Anatomy of uvea
Barun Garg
 
Uveal tract anatomy
Uveal tract anatomyUveal tract anatomy
Uveal tract anatomy
Othman Al-Abbadi
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
dswazalwar
 
The Bermuda triangle
 The Bermuda triangle The Bermuda triangle
The Bermuda triangle
Sri Harati K
 
oppurtunistic infection in HIV/AIDS AND IRIS
oppurtunistic infection in HIV/AIDS AND  IRISoppurtunistic infection in HIV/AIDS AND  IRIS
oppurtunistic infection in HIV/AIDS AND IRIS
Bhupendra Shah
 
Anatomy of Uvea track
Anatomy of Uvea trackAnatomy of Uvea track
Anatomy of Uvea track
Lhacha
 
HIV and TB coinfection
HIV and TB coinfectionHIV and TB coinfection
HIV and TB coinfection
swati2084
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
Chaitanya Ram
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
Sandeep Kumar Panda
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation HadoopVarun Narang
 

Viewers also liked (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi MkindiImmune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Anatomy of iris
Anatomy of irisAnatomy of iris
Anatomy of iris
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Blue brain
Blue brainBlue brain
Blue brain
 
TB-HIV Co-infection Treatment
TB-HIV Co-infection TreatmentTB-HIV Co-infection Treatment
TB-HIV Co-infection Treatment
 
Anatomy of uvea
Anatomy of uveaAnatomy of uvea
Anatomy of uvea
 
Uveal tract anatomy
Uveal tract anatomyUveal tract anatomy
Uveal tract anatomy
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
The Bermuda triangle
 The Bermuda triangle The Bermuda triangle
The Bermuda triangle
 
oppurtunistic infection in HIV/AIDS AND IRIS
oppurtunistic infection in HIV/AIDS AND  IRISoppurtunistic infection in HIV/AIDS AND  IRIS
oppurtunistic infection in HIV/AIDS AND IRIS
 
Anatomy of Uvea track
Anatomy of Uvea trackAnatomy of Uvea track
Anatomy of Uvea track
 
HIV and TB coinfection
HIV and TB coinfectionHIV and TB coinfection
HIV and TB coinfection
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 

Similar to Iris ppt

Iris scanning
Iris scanningIris scanning
Iris scanning
NikithaME
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
Shubham Chopra
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
AdityaTakePatil
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
naghamallella
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
Poooi2
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
NARAHARISRUTHI1
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
Dr-mahmoud Algamel
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
Rupinder Saini
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
iamsanjayk
 
Iris print
Iris print Iris print
Biometrics
BiometricsBiometrics
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
shams tabrez
 
Iris scanning
Iris scanningIris scanning
Iris scanning
Ankit Kumar
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
'Femi Akin-Laguda
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
Ravi Kumar
 

Similar to Iris ppt (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Iris print
Iris print Iris print
Iris print
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 

Recently uploaded

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Iris ppt

  • 1.
  • 2. Biometrics is the science of measuring physical or anatomical characteristics of individuals. It performs automatic identification of a person based on his/her physiological characteristics. Among the features measured are face, fingerprints, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.
  • 3. INTRODUCTION TO IRIS  Iris is the area of the eye where the pigmented or colored circle, usually brown, blue, rings the dark pupil of the eye.  It is the colored portion of the eye that regulates the size of the pupil.  Has unique complex and random patterns which can be seen from some distance.  Iris recognition is an automated method of biometric identification that uses mathematical pattern- recognition techniques on the images of the irises of an individual's eyes, whose complex random patterns are
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Steps followed In A person stands in front of the iris identification system, between one or three feet away, while a wide angle camera calculates the position of their eye. A second camera zooms in on the eye and takes a black and white image. Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like an “eye print”. To prevent a fake eye from being used to fool system, these devices may vary the light shine into the eye and watch for pupil dilation
  • 9. DEVICES USED FOR IRIS SCANNING
  • 10. Working Of Iris Technology The iris identification program may be divided into four main functional blocks: 1.Image Acquisition. 2.Preprocessing. 3.Image Analysis.
  • 11. merits Externally visible highly protected internal organ. Unique patterns. Not genetically connected unlike eye color. Probability of matching of iris pattern is 1:10^78. Stable with age. Impossible to alter surgically. Living Password, Can not be forgotten or copied. Works on blind person. User needs not to touch appliances. Accurate faster and supports large data base.
  • 12. Disadvantages Accuracy changes with user’s height ,illumination ,image quality etc. Person needs to be still, difficult to scan if not co-operated. Risk of fake Iris lenses. Alcohol consumption causes deformation in Iris pattern Easily fooled by presenting a high-quality photograph of a face instead of a real face; unsuitable for unsupervised applications. Need of live tissue verification technology. Expensive
  • 13. APPLICATIONS Computer login: the iris as a living password. National border controls: the iris as a living passport. Driving licenses and personal certificates. Internet security, control of access to privileged information. Premises access control (Home, Office, Laboratory). Anti-terrorism (e.g. security screening at airports) Financial Transactions (electronic commerce and banking). Secure accesses to bank cash machine accounts. Credit-card authentication. Automobile ignition and unlocking; anti-theft devices
  • 14. CONCLUSION Highly accurate but easy Fast Has some drawbacks Needs some developments Experiments are going on Will become day to day technology very soon.