SlideShare a Scribd company logo
PRESENTATION ON
IRIS SCANNER
TECHNOLOGY
BY
SHAMS
CONTENT
 Introduction
 What the IRIS?
 Why IRIS?
 History of IRIS Recognition
 Applications
 Methods of IRIS recognition system
IRIS pattern - Comparison
 Advantages
 Disadvantages
 Conclusion
 References
IRIS SCANNER TECHNOLOGY
IRIS Recognition is Fast Developing to be a Fool Proof
And Fast Identification Technique. It is a classic
Biometrics Application that is in an Advanced stage of
Research all Over the world.
INTRODUCTION
IRIS SCANNER TECHNOLOGY
The colored ring around the pupil of the eye is called the IRIS
.
The IRIS is a Thin Circular Diaphragm, which lies between
the cornea and the lens of the human eye.
The function of the Iris is to control to the amount of light
entering through the pupil.
The Average Diameter of the Iris is 12 mm ,and the pupil Size
Can Vary from 10% to 80% Of the Iris Diameter.
What is IRIS?
IRIS SCANNER TECHNOLOGY
 Unique patterns.
 Stable with age.
 Living Password, Can not be
forgotten or copied.
 Works on blind person.
 User needs not to touch
appliances.
 Accurate , faster , and supports
large data base.
Why IRIS?
IRIS SCANNER TECHNOLOGY
The concept of Iris Recognition was first
Proposed by Dr. Frank Burch in 1939.
It was first implemented in 1990 when Dr. John
Daugman created the algorithms for it
These algorithms employ methods of pattern
recognition and some mathematical calculations
for iris recognition.
HISTORY OF IRIS RECOGNITION
IRIS SCANNER TECHNOLOGY
Step 1: Capturing the image of the eye using a camera.
Step 2: Differentiating the outline of the iris and the sclera, and the pupil from the
iris.
sclera
iris
pupil
Step 3: Encoding the image using demodulation (also removes reflections, intrusion
of eye lid lashes, contact lens outline etc.,). Code is 256 bytes.
Technique:
IRIS SCANNER TECHNOLOGY
 ATMs
 Computer login: The iris as a living password.
 National Border Controls
 Driving licenses and other personal certificates.
 benefits authentication.
 birth certificates, tracking missing.
 Credit-card authentication.
 Anti-terrorism (e.g.:— suspect Screening at airports)
 Secure financial transaction (e-commerce, banking).
 Internet security, control of access to privileged
information.
APPLICATION
IRIS SCANNER TECHNOLOGY
 In identifying one’s iris, there are 2 methods for its recognition and are:
Active
Passive
 The active Iris system requires that a user be anywhere from six to
fourteen inches away from the camera.
 The passive system allows the user to be anywhere from one to three feet
away from the camera that locates the focus on the iris.
Methods Of IRIS Recognition System
IRIS SCANNER TECHNOLOGY
IRIS Recognition Diagram
Image
Acquisition
IRIS Segmentation Normalization
Feature EncodingFeature Matching
Identify or
Reject
Subject
IrisTemplates
Database
Eye Image Iris Region
Feature points in the iris region
IrisTemplate
IRIS SCANNER TECHNOLOGY
Test of Statistical Independence
Compare the iris codes (256*8=2048 bits) of the eyes using the
following formula.
[Code A (XOR) Code B] AND Mask AAND Mask B
H.D= ---------------------------------------------------------------------------------------------------------------------
Mask AAND Mask B
This is called Hamming Distance (H.D).
Iris pattern - Comparison
IRIS SCANNER TECHNOLOGY
 Highly protected, internal organ of the eye
 Externally visible, patterns imaged from a distance
 Iris patterns possess a high degree of randomness
 Patterns apparently stable throughout life
 Encoding and decision-making are tractable
Advantages
IRIS SCANNER TECHNOLOGY
 Small target to acquire from a distance
 Moving target…within another…on yet another
 Located behind a curved, wet, reflecting surface
 Obscured by eyelashes, lenses, reflections
 Illumination should not be visible or bright
Disadvantages of the Iris for Identification
IRIS SCANNER TECHNOLOGY
 Highly accurate but easy
 Fast
 Needs some developments
 Experiments are going on
 Will become day to day technology very soon
conclusion
IRIS SCANNER TECHNOLOGY
www.google.com
www.Wikipedia.com
http://www.cl.cam.ac.uk
References
IRIS SCANNER TECHNOLOGY
Iris scanner technology

More Related Content

What's hot

Screenless displays ppt
Screenless displays ppt Screenless displays ppt
Screenless displays ppt
Jeevan Kumar D
 
iMouse
iMouseiMouse
iMouseeeshak
 
automatic number plate recognition
automatic number plate recognitionautomatic number plate recognition
automatic number plate recognition
Sairam Taduvai
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
Vishnu Mysterio
 
Smart Blind Walking Stick Using Arduino
Smart Blind Walking Stick Using ArduinoSmart Blind Walking Stick Using Arduino
Smart Blind Walking Stick Using Arduino
ijtsrd
 
Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systems
Ashok Behuria
 
Pill Camera
Pill CameraPill Camera
Pill Camera
Aakanksh Nath
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
Santu Chall
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
shyamalaramesh2
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
Anandhuas
 
Iris ppt
Iris pptIris ppt
Iris ppt
Sri Harati K
 
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEMEYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
International Journal of Technical Research & Application
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Iris Scan
Iris ScanIris Scan
Iris Scan
Matang Saxena
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
Vashishth Narayan Kumar
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
Artificial Eye For The Blind
Artificial Eye For The BlindArtificial Eye For The Blind
Artificial Eye For The Blind
Vineeth Sundar
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 

What's hot (20)

Screenless displays ppt
Screenless displays ppt Screenless displays ppt
Screenless displays ppt
 
iMouse
iMouseiMouse
iMouse
 
automatic number plate recognition
automatic number plate recognitionautomatic number plate recognition
automatic number plate recognition
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 
Smart Blind Walking Stick Using Arduino
Smart Blind Walking Stick Using ArduinoSmart Blind Walking Stick Using Arduino
Smart Blind Walking Stick Using Arduino
 
Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systems
 
Pill Camera
Pill CameraPill Camera
Pill Camera
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEMEYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Artificial Eye For The Blind
Artificial Eye For The BlindArtificial Eye For The Blind
Artificial Eye For The Blind
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 

Viewers also liked

Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
Centerix Co., Ltd.
 
Iris project-and-more
Iris project-and-moreIris project-and-more
Iris project-and-more
Hung Ton
 
Lenovo SHAREit
Lenovo SHAREit Lenovo SHAREit
Lenovo SHAREit
sopruamkt
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
Tien Hoang
 
Step by step IRIS clip
Step by step IRIS clipStep by step IRIS clip
Step by step IRIS clip
Laxmi Eye Institute
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
Shubham Chopra
 
Printer & its types Mahesh Garg
Printer  & its types Mahesh GargPrinter  & its types Mahesh Garg
Printer & its types Mahesh Garg
Guru Jambheshwar University
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
uday kiran
 
Printers,types ,working and use.
Printers,types ,working and use.Printers,types ,working and use.
Printers,types ,working and use.
RosaDemalo
 
Keyboards and Mice
Keyboards and MiceKeyboards and Mice
Keyboards and Mice
Amir Villas
 
Scanner
ScannerScanner
Scanner
Nikhil Jha
 
Printer and its type
Printer and its typePrinter and its type
Printer and its type
3962
 
Types of Printers
Types of PrintersTypes of Printers
Types of Printers
Navdeep Kumar
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
Eldad Lieberman
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
Chaitanya Ram
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 

Viewers also liked (20)

Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
Iris project-and-more
Iris project-and-moreIris project-and-more
Iris project-and-more
 
Lenovo SHAREit
Lenovo SHAREit Lenovo SHAREit
Lenovo SHAREit
 
The dildo diary's
The dildo diary'sThe dildo diary's
The dildo diary's
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
 
Step by step IRIS clip
Step by step IRIS clipStep by step IRIS clip
Step by step IRIS clip
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Printer & its types Mahesh Garg
Printer  & its types Mahesh GargPrinter  & its types Mahesh Garg
Printer & its types Mahesh Garg
 
IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
 
Printers,types ,working and use.
Printers,types ,working and use.Printers,types ,working and use.
Printers,types ,working and use.
 
Keyboards and Mice
Keyboards and MiceKeyboards and Mice
Keyboards and Mice
 
Scanner
ScannerScanner
Scanner
 
Printers
 Printers Printers
Printers
 
Printer and its type
Printer and its typePrinter and its type
Printer and its type
 
Types of Printers
Types of PrintersTypes of Printers
Types of Printers
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
face recognition
face recognitionface recognition
face recognition
 

Similar to Iris scanner technology

Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Iris scanning
Iris scanningIris scanning
Iris scanning
NikithaME
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
Mazin Alwaaly
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
AdityaTakePatil
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
naghamallella
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
Sadan Khan
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
Dr-mahmoud Algamel
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
AmbikaM8
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
 
biometrics-ppt pdf
biometrics-ppt pdfbiometrics-ppt pdf
biometrics-ppt pdf
VinayChaudhary83
 
Biometric unit 1.pptx
Biometric unit 1.pptxBiometric unit 1.pptx
Biometric unit 1.pptx
Mythilymanivannan1
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
rachit00008
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
MuhammedNihadP
 

Similar to Iris scanner technology (20)

Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
biometrics-ppt pdf
biometrics-ppt pdfbiometrics-ppt pdf
biometrics-ppt pdf
 
Biometric unit 1.pptx
Biometric unit 1.pptxBiometric unit 1.pptx
Biometric unit 1.pptx
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Explaining iris
Explaining irisExplaining iris
Explaining iris
 
Iris
IrisIris
Iris
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 

Iris scanner technology

  • 2. CONTENT  Introduction  What the IRIS?  Why IRIS?  History of IRIS Recognition  Applications  Methods of IRIS recognition system IRIS pattern - Comparison  Advantages  Disadvantages  Conclusion  References IRIS SCANNER TECHNOLOGY
  • 3. IRIS Recognition is Fast Developing to be a Fool Proof And Fast Identification Technique. It is a classic Biometrics Application that is in an Advanced stage of Research all Over the world. INTRODUCTION IRIS SCANNER TECHNOLOGY
  • 4. The colored ring around the pupil of the eye is called the IRIS . The IRIS is a Thin Circular Diaphragm, which lies between the cornea and the lens of the human eye. The function of the Iris is to control to the amount of light entering through the pupil. The Average Diameter of the Iris is 12 mm ,and the pupil Size Can Vary from 10% to 80% Of the Iris Diameter. What is IRIS? IRIS SCANNER TECHNOLOGY
  • 5.  Unique patterns.  Stable with age.  Living Password, Can not be forgotten or copied.  Works on blind person.  User needs not to touch appliances.  Accurate , faster , and supports large data base. Why IRIS? IRIS SCANNER TECHNOLOGY
  • 6. The concept of Iris Recognition was first Proposed by Dr. Frank Burch in 1939. It was first implemented in 1990 when Dr. John Daugman created the algorithms for it These algorithms employ methods of pattern recognition and some mathematical calculations for iris recognition. HISTORY OF IRIS RECOGNITION IRIS SCANNER TECHNOLOGY
  • 7. Step 1: Capturing the image of the eye using a camera. Step 2: Differentiating the outline of the iris and the sclera, and the pupil from the iris. sclera iris pupil Step 3: Encoding the image using demodulation (also removes reflections, intrusion of eye lid lashes, contact lens outline etc.,). Code is 256 bytes. Technique: IRIS SCANNER TECHNOLOGY
  • 8.  ATMs  Computer login: The iris as a living password.  National Border Controls  Driving licenses and other personal certificates.  benefits authentication.  birth certificates, tracking missing.  Credit-card authentication.  Anti-terrorism (e.g.:— suspect Screening at airports)  Secure financial transaction (e-commerce, banking).  Internet security, control of access to privileged information. APPLICATION IRIS SCANNER TECHNOLOGY
  • 9.  In identifying one’s iris, there are 2 methods for its recognition and are: Active Passive  The active Iris system requires that a user be anywhere from six to fourteen inches away from the camera.  The passive system allows the user to be anywhere from one to three feet away from the camera that locates the focus on the iris. Methods Of IRIS Recognition System IRIS SCANNER TECHNOLOGY
  • 10. IRIS Recognition Diagram Image Acquisition IRIS Segmentation Normalization Feature EncodingFeature Matching Identify or Reject Subject IrisTemplates Database Eye Image Iris Region Feature points in the iris region IrisTemplate IRIS SCANNER TECHNOLOGY
  • 11. Test of Statistical Independence Compare the iris codes (256*8=2048 bits) of the eyes using the following formula. [Code A (XOR) Code B] AND Mask AAND Mask B H.D= --------------------------------------------------------------------------------------------------------------------- Mask AAND Mask B This is called Hamming Distance (H.D). Iris pattern - Comparison IRIS SCANNER TECHNOLOGY
  • 12.  Highly protected, internal organ of the eye  Externally visible, patterns imaged from a distance  Iris patterns possess a high degree of randomness  Patterns apparently stable throughout life  Encoding and decision-making are tractable Advantages IRIS SCANNER TECHNOLOGY
  • 13.  Small target to acquire from a distance  Moving target…within another…on yet another  Located behind a curved, wet, reflecting surface  Obscured by eyelashes, lenses, reflections  Illumination should not be visible or bright Disadvantages of the Iris for Identification IRIS SCANNER TECHNOLOGY
  • 14.  Highly accurate but easy  Fast  Needs some developments  Experiments are going on  Will become day to day technology very soon conclusion IRIS SCANNER TECHNOLOGY