SlideShare a Scribd company logo
Iris Recognition
Shubham Chopra
CSE_CSF(IBM)
Roll no-1/15/FET/BCF/1/006
Introduction
 “Biometrics consists of methods for uniquely recognizing humans
based upon one or more intrinsic physical or behavioral traits .
Biometrics provides a secure method of authentication and
identification.
Biometric identification utilises physiological and behavioural
characteristics to authenticate a person’s identity.
TheThe need for biometrics is:
o -> Rapid development in technology
o -> Globalization
What is IRIS Scanning
The iris is a Protective internal organ of the eye. It is easily visible as
a colored disk, behind the clear protective window of the cornea,
surrounded by the white tissue of the eye. It is the only internal
organ of the body normally visible externally. It is a thin diaphragm
stretching across the anterior portion of the eye and supported by
lens.
Going the layman way the biometric identification of the iris is called
as “IRIS SCANNING”.
“Iris recognition is a method of biometric authentication that uses
pattern-recognition techniques based on high-resolution images of
the irides of an individual's eyes.”
Why Iris Recognition?
• Iris patterns are unique.
• Iris patterns do not change with age.
• Artificial duplication is impossible
• Probability of matching two ireses is
1:10^78
• Simplicity and ease of implementation.
• Speed – the process of matching the iris
patterns is very fast.
Basic Technique
Step 1: Capturing the image of the eye using a camera.
Step 2: Differentiating the outline of the iris and the sclera,
and the pupil from the iris.
Step 3: Encoding the image using demodulation (also
removes reflections, intrusion of eye lid lashes, contact
lens outline etc.,). Code is 256 bytes.
pupil
iris
sclera
Recording iris:
The design and implementation of a system for
automated iris recognition can be subdivided in to
3 major parts:-
1. IMAGE ACQUISITION : To acquire images with
sufficient resolution and sharpness to support
recognition.
2. IRIS LOCALIZATION : To delemit the iris from
the rest of the image.
3. PATTERN MATCHING : The Iris Code derived
from this process is compared with previously
generated Iris Code..
Image Acquisition Using Visible Light
 Using visible light the
texture information
obtained is less.
 The different layers
are visible while
using visible light .
Image Acquisition Using Infrared Light
 A better texture
information is
obtained using
infrared light.
 It gives more precise
data for comparison.
Iris Localisation
 The process of obtaining picture
of iris only is called localization.
 Delimits the iris from the rest of
the acquired image
 To identify the approximately
concentric circular outer
boundaries of the iris and the
pupil in a photo of an eye using
DAUGMAN’S ALGORITHM
 Exclude eyelids, eyelashes and
pupil also .
Pattern Matching
 Live Iris code of the iris presented for authentication is
compared with iris code stored in the database.
 Bit by bit comparison is made between two irises & no
of non matching bits & matching bits are found out.
 Number of non matching bits are divided by number of
bits to obtain Hamming distance.
 Hamming distance gives degree of match or unmatch.
For two identical iris code, hamming distance is zero,
and for perfectly unmatch hamming distance is one
Advantages
 Sensing of the biometric is without physical contact .
 Iris is an internal organ is well protected against damage
.
 Iris has a fine texture .
 Highly stable .
 Artificial eye can be detected .
 Analysis of iris extremely fast .
 Highly accurate .
Disadvantages
 Requires much user cooperation.
 Performance of iris authentication may be impaired by glasses .
 Difficult to perform at a distance larger than a few meters
 Susceptible to poor image quality .
 Camera used in the process needs to have the correct amount of
illumination.
 Obscured by eyelashes, lenses, reflections .
Why iris recognition is not so famous?
• Convenience
• Acceptance
• Cost
Current Trends And Applications
 .Fugitive track record
 .Computer login: The iris as a living password.
 · National Border Controls: The iris as a living password.
 · Ticket less air travel.
 · Premises access control (home, office, laboratory etc.).
 · Driving licenses and other personal certificates.
 · Entitlements and benefits authentication.
 · Forensics, birth certificates, tracking missing or wanted person
 · Credit-card authentication.
 · Automobile ignition and unlocking; anti-theft devices.
 . Anti-terrorism (e.g.:— suspect Screening at airports)
 . Secure financial transaction (e-commerce, banking).
 . Internet security, control of access to privileged information.
Current Use Of Iris Recognition
• Samsung Galaxy Note 7 : It works alongside an infrared LED and
is programmed to recognize the pattern in your iris, and that's pretty much it.
It has no other function aside from that. the scanner uses an infrared sensor
to detect patterns in a user's iris. Simply pointing it at a registered user's
eyes unlocks the phone, and does so incredibly quickly.
• Nokia Lumia 950 Xl : there's an infrared camera as well as a
secondary camera. The infrared sensor lights up the user's eye, so that the
secondary camera can snap a good image and record the data, then turn it
in to an encrypted piece of information stored on the device.
Future :
• Keep Officers Safe On Street:
During routine traffic stops or when handling disturbance
calls, officers may have to identify and approach
belligerent or intoxicated people. Officers will perform a
quick iris scan to identify individuals from a distance,
providing a critical layer of safety. Wireless, lightweight,
and portable, the iris scanner is operated with one hand,
leaving the other hand free for fast reaction. Shared
databases—similar to the Automated Fingerprint
Identification System (AFIS)—will grow to create broad
collaboration across enforcement agencies, giving
officers in the field rapid understanding of their situation.
 Improve patient care:
New, ambulatory patients will enroll in the iris
recognition database during admission. Previously
enrolled patients will identify themselves at any of the
networked scanning stations throughout the facility. Non-
ambulatory and emergency patients—and those who
don’t know who they are,such as dementia patients—will
be identified or enrolled without interrupting the critical
time to treatment. Even before the patient reaches the
ER, iris recognition is providing critical information. As
the ambulance travels, EMTs and paramedics can
identify patients, gather their medical history, and start
procedures and medication right away
Conclusion
 The uniqueness of iris and the low probability of a false
acceptance or false rejection all contribute to the benefits
of using iris recognition technology.
 Provides an accurate and secure method of
authenticating users onto company systems .
 The technical performance cabability of the iris
recognition process far surpasses that of any biometric
technology now available and it is the future of highly
secure security system.
Qr codes
• IRISID
• FINDBIOMETRICS
• PPT
• Research Paper:
• Iris Biometrics Technologies Article In HAKIN9 Magazine
• IRIS Biomteric Recognition for Person IdentificationIn SeuritySystem
• REPORT :

More Related Content

What's hot

Iris scanning
Iris scanningIris scanning
Iris scanning
himansupaichha
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
Ankit Kumar
 
Iris ppt
Iris pptIris ppt
Iris ppt
Sri Harati K
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
Mazin Alwaaly
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
NARAHARISRUTHI1
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
Being Topper
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
Ausaf khan
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
Rudra Prasad Maiti
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
Aalaa Khattab
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
rajarose89
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
SwatiNarkhede1
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
Ahmed Tememe
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
Arnab Podder
 
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 

What's hot (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
face recognition
face recognitionface recognition
face recognition
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
idescitation
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
Tien Hoang
 
Maneesh p
Maneesh pManeesh p
Step by step IRIS clip
Step by step IRIS clipStep by step IRIS clip
Step by step IRIS clip
Laxmi Eye Institute
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
shams tabrez
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
uday kiran
 
073 the iris diaphragm
073 the iris diaphragm073 the iris diaphragm
073 the iris diaphragm
simpletasksgreatconcepts
 
Data structure & its types
Data structure & its typesData structure & its types
Data structure & its types
Rameesha Sadaqat
 
8 queens problem using back tracking
8 queens problem using back tracking8 queens problem using back tracking
8 queens problem using back trackingTech_MX
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Snapdragon
SnapdragonSnapdragon
Snapdragon
Kaushal Kabra
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
Abhishek Manwal
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
rr140688
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G
Bharathi Ravi
 

Viewers also liked (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
 
The dildo diary's
The dildo diary'sThe dildo diary's
The dildo diary's
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
Step by step IRIS clip
Step by step IRIS clipStep by step IRIS clip
Step by step IRIS clip
 
IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
 
073 the iris diaphragm
073 the iris diaphragm073 the iris diaphragm
073 the iris diaphragm
 
Data structure & its types
Data structure & its typesData structure & its types
Data structure & its types
 
8 queens problem using back tracking
8 queens problem using back tracking8 queens problem using back tracking
8 queens problem using back tracking
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Snapdragon
SnapdragonSnapdragon
Snapdragon
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G
 

Similar to Iris scan.ppt 1

49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
AdityaTakePatil
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Iris Scan
Iris ScanIris Scan
Iris Scan
Matang Saxena
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Iris print
Iris print Iris print
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
Dr-mahmoud Algamel
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
naghamallella
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
AmbikaM8
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
 
CYBER FORENSIC PPT
CYBER FORENSIC PPTCYBER FORENSIC PPT
CYBER FORENSIC PPT
adityapandit0010
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
IJERA Editor
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
IJERA Editor
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
Poooi2
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
YUSRA FERNANDO
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
 

Similar to Iris scan.ppt 1 (20)

49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris print
Iris print Iris print
Iris print
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
CYBER FORENSIC PPT
CYBER FORENSIC PPTCYBER FORENSIC PPT
CYBER FORENSIC PPT
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 

Recently uploaded (16)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 

Iris scan.ppt 1

  • 2. Introduction  “Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits . Biometrics provides a secure method of authentication and identification. Biometric identification utilises physiological and behavioural characteristics to authenticate a person’s identity. TheThe need for biometrics is: o -> Rapid development in technology o -> Globalization
  • 3. What is IRIS Scanning The iris is a Protective internal organ of the eye. It is easily visible as a colored disk, behind the clear protective window of the cornea, surrounded by the white tissue of the eye. It is the only internal organ of the body normally visible externally. It is a thin diaphragm stretching across the anterior portion of the eye and supported by lens. Going the layman way the biometric identification of the iris is called as “IRIS SCANNING”. “Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes.”
  • 4. Why Iris Recognition? • Iris patterns are unique. • Iris patterns do not change with age. • Artificial duplication is impossible • Probability of matching two ireses is 1:10^78 • Simplicity and ease of implementation. • Speed – the process of matching the iris patterns is very fast.
  • 5. Basic Technique Step 1: Capturing the image of the eye using a camera. Step 2: Differentiating the outline of the iris and the sclera, and the pupil from the iris. Step 3: Encoding the image using demodulation (also removes reflections, intrusion of eye lid lashes, contact lens outline etc.,). Code is 256 bytes. pupil iris sclera
  • 7. The design and implementation of a system for automated iris recognition can be subdivided in to 3 major parts:- 1. IMAGE ACQUISITION : To acquire images with sufficient resolution and sharpness to support recognition. 2. IRIS LOCALIZATION : To delemit the iris from the rest of the image. 3. PATTERN MATCHING : The Iris Code derived from this process is compared with previously generated Iris Code..
  • 8. Image Acquisition Using Visible Light  Using visible light the texture information obtained is less.  The different layers are visible while using visible light .
  • 9. Image Acquisition Using Infrared Light  A better texture information is obtained using infrared light.  It gives more precise data for comparison.
  • 10. Iris Localisation  The process of obtaining picture of iris only is called localization.  Delimits the iris from the rest of the acquired image  To identify the approximately concentric circular outer boundaries of the iris and the pupil in a photo of an eye using DAUGMAN’S ALGORITHM  Exclude eyelids, eyelashes and pupil also .
  • 11. Pattern Matching  Live Iris code of the iris presented for authentication is compared with iris code stored in the database.  Bit by bit comparison is made between two irises & no of non matching bits & matching bits are found out.  Number of non matching bits are divided by number of bits to obtain Hamming distance.  Hamming distance gives degree of match or unmatch. For two identical iris code, hamming distance is zero, and for perfectly unmatch hamming distance is one
  • 12. Advantages  Sensing of the biometric is without physical contact .  Iris is an internal organ is well protected against damage .  Iris has a fine texture .  Highly stable .  Artificial eye can be detected .  Analysis of iris extremely fast .  Highly accurate .
  • 13. Disadvantages  Requires much user cooperation.  Performance of iris authentication may be impaired by glasses .  Difficult to perform at a distance larger than a few meters  Susceptible to poor image quality .  Camera used in the process needs to have the correct amount of illumination.  Obscured by eyelashes, lenses, reflections .
  • 14. Why iris recognition is not so famous? • Convenience • Acceptance • Cost
  • 15. Current Trends And Applications  .Fugitive track record  .Computer login: The iris as a living password.  · National Border Controls: The iris as a living password.  · Ticket less air travel.  · Premises access control (home, office, laboratory etc.).  · Driving licenses and other personal certificates.  · Entitlements and benefits authentication.  · Forensics, birth certificates, tracking missing or wanted person  · Credit-card authentication.  · Automobile ignition and unlocking; anti-theft devices.  . Anti-terrorism (e.g.:— suspect Screening at airports)  . Secure financial transaction (e-commerce, banking).  . Internet security, control of access to privileged information.
  • 16. Current Use Of Iris Recognition • Samsung Galaxy Note 7 : It works alongside an infrared LED and is programmed to recognize the pattern in your iris, and that's pretty much it. It has no other function aside from that. the scanner uses an infrared sensor to detect patterns in a user's iris. Simply pointing it at a registered user's eyes unlocks the phone, and does so incredibly quickly. • Nokia Lumia 950 Xl : there's an infrared camera as well as a secondary camera. The infrared sensor lights up the user's eye, so that the secondary camera can snap a good image and record the data, then turn it in to an encrypted piece of information stored on the device.
  • 17. Future : • Keep Officers Safe On Street: During routine traffic stops or when handling disturbance calls, officers may have to identify and approach belligerent or intoxicated people. Officers will perform a quick iris scan to identify individuals from a distance, providing a critical layer of safety. Wireless, lightweight, and portable, the iris scanner is operated with one hand, leaving the other hand free for fast reaction. Shared databases—similar to the Automated Fingerprint Identification System (AFIS)—will grow to create broad collaboration across enforcement agencies, giving officers in the field rapid understanding of their situation.
  • 18.  Improve patient care: New, ambulatory patients will enroll in the iris recognition database during admission. Previously enrolled patients will identify themselves at any of the networked scanning stations throughout the facility. Non- ambulatory and emergency patients—and those who don’t know who they are,such as dementia patients—will be identified or enrolled without interrupting the critical time to treatment. Even before the patient reaches the ER, iris recognition is providing critical information. As the ambulance travels, EMTs and paramedics can identify patients, gather their medical history, and start procedures and medication right away
  • 19. Conclusion  The uniqueness of iris and the low probability of a false acceptance or false rejection all contribute to the benefits of using iris recognition technology.  Provides an accurate and secure method of authenticating users onto company systems .  The technical performance cabability of the iris recognition process far surpasses that of any biometric technology now available and it is the future of highly secure security system.
  • 20. Qr codes • IRISID • FINDBIOMETRICS • PPT
  • 21. • Research Paper: • Iris Biometrics Technologies Article In HAKIN9 Magazine • IRIS Biomteric Recognition for Person IdentificationIn SeuritySystem