SlideShare a Scribd company logo
RashaTarawneh Omamah Thunibat
Presented to:
Dr Ahmad Alhassanat
Mutah university
Biometric course :
 Introduction
 What the iris?
 Why iris?
 History of iris Recognition
 Applications
 Methods of iris recognition system
 Image Acquisition
 Segmentation
 Normalization
 Iris Feature Encoding
 Iris code matching
 Applications
 Disadvantages
 Conclusion
 References
 It is considered to be the most accurate biometric
technology available today.
 Iris recognition is a method of
biometric identification and
authentication that use pattern-
recognition techniques based on
high resolution images of the
irises of an individual's eyes .
The colored ring around the pupil of the eye is called
the Iris
The iris is a thin circular diaphragm, which lies
between the cornea and the lens of the human eye.
The iris is perforated close to its centre by a circular
aperture known as the pupil.
The function of the iris is to control the amount of light
entering through the pupil.
The average diameter of the iris is 12 mm, and the
pupil size can vary from 10% to 80% of the iris
diameter [2].
 The iris consists of a number of layers, the lowest is
the epithelium layer, which contains dense
pigmentation cells.The stromal layer lies above the
epithelium layer, and contains blood vessels,
pigment cells and the two iris muscles.
 The density of stromal pigmentation determines the
colour of the iris.
The externally visible surface of the
multi-layered iris contains two zones,
which often differ in colour An outer
ciliary zone and an inner pupillary zone,
and these two zones are divided by the
collarette – which appears as a zigzag
pattern[3].
 Externally visible highly protected internal
organ.
 Unique patterns.
 Not genetically connected unlike eye color.
 Stable with age.
 Impossible to alter surgically.
 Living Password, Can not be forgotten or copied.
 Works on blind person.
 User needs not to touch appliances.
 Accurate , faster , and supports large data base.
Comparison between cost and accuracy
1997-1999
1987
1987
1980
The concept of Iris Recognition was first proposed by
Dr. Frank Burch in 1939.
It was first implemented in 1990
when Dr. John Daugman created the
algorithms for it.
These algorithms employ methods
of pattern recognition and some
mathematical calculations for iris
recognition.
 . ATMs
 .Computer login:The iris as a living
password.
 · National Border Controls
 · Driving licenses and other personal
certificates.
 · benefits authentication.
 ·birth certificates, tracking missing.
 · Credit-card authentication.
 · Anti-terrorism (e.g.:— suspect
Screening at airports)
 · Secure financial transaction (e-
commerce, banking).
 · Internet security, control of access to
privileged information.
 In identifying one’s iris, there are 2 methods for its
recognition and are:
1. Active
2. Passive
The active Iris system requires that a user be anywhere
from six to fourteen inches away from the camera.
The passive system allows the user to be anywhere
from one to three feet away from the camera that
locates the focus on the iris.
Image
Acquisition
Iris
Segmentation Normalization
Feature
Encoding
Feature
Matching
IrisTemplates
Database
Eye Image Iris Region
Feature points in the
iris region
IrisTemplate
Identify or Reject
Subject
 The first step, image acquisition
deals with capturing sequence of iris
images from the subject using
cameras and sensors with High
resolution and good sharpness.
 These images should clearly show
the entire eye especially iris and
pupil part, and then some
preprocessing operation may be
applied to enhance the quality of
image e.g. histogram equalization,
filtering noise removal etc.
(CASIA) eye image database
The first stage of iris segmentation
to isolate the actual iris region in a
digital eye image.
The iris region, can be
approximated by two circles, one
for the iris/sclera boundary and
another, interior to the first, for
the iris/pupil boundary.
the derivatives in the horizontal direction for detecting
the eyelids, and in the vertical direction for detecting the
outer circular boundary of the iris .
Taking only the vertical gradients for locating the iris
boundary will reduce influence of the eyelids when
performing circular Hough transform.
 The circular Hough transform can be employed to deduce the
radius and centre coordinates of the pupil and iris regions:
 Firstly, an edge map is generated by calculating the first
derivatives of intensity values in an eye image and then
thresholding the result.
 From the edge map, votes are cast in Hough space for the
parameters of circles passing through each edge point,These
parameters are the centre coordinates xc and yc, and the radius r,
which are able to define any circle according to the equation :
A maximum point in the Hough space will correspond to the
radius and centre coordinates of the circle best defined by the
edge points.
 eyelashes are treated as belonging to two types :
1 -separable eyelashes:
which are isolated in the image .
2-multiple eyelashes:
which are bunched together and overlap in the eye image.
 Eyelids and Eyelashes are the main noise factor in the iris image.
 These noise factors can affect the accuracy of the iris recognition system.
 After applying circular Hough transform to iris, we are applying linear Hough
transform and we get line detected noise region in the iris image.

 We have to remove these detected eyelids and eyelashes from the iris image
Thresolding is used for the removal of eyelashes.Then, the noise free iris
image can be available for future use.
1- Edge Detector
2- HoughTransform
Smoothing
Finding
gradient
Double
thresholding Edge
LINEAR HOUGH TRANSFORM
CIRCULAR HOUGH TRANSFORM
Process of finding the iris in an image
a. Iris and pupil localization: Pupil and Iris are considered as
two circles using Circular HoughTransform .
b. Eye lid detection and Eye lash noise removal using linear Hough
Transform method.
 Various Normalisation methods :
1- Daugman’s Rubber sheet Model by
Daugman [2]
2- Image Registration modlyed byWildes et al
.[9]
3-Virtual Circles by Boles [14] .
 Once the iris segmented ,the next stage transform the iris
region so that it has fixed dimensions in order to allow
comparisons.
 Since variations in the eye like pupil dilation and the
inconsistence iris normalization is needed.
Pupil dilation inconsistence iris
 Normalization process involves unwrapping the iris and
converting it in to its polar equivalent .
 It is done using Daugman’s Rubber sheet model .
 The centre of the pupil was considered as the reference
point, and radial vectors pass through the iris region .
 A number of data points are selected along each radial line is
defined as the radial resolution.The number of radial lines
going around the iris region is defined as the angular
resolution.
 where displacement of the center of the pupil relative to the center of the iris is given by 𝑜 𝑥, 𝑜 𝑦 .
 r’ is the distance between the edge of the pupil and edge of the iris at an angle, θ around the region, and rIis the
radius of the iris.
 The remapping formula first gives the radius of the iris region as a function of the angle θ.
 Normalisation produces a 2D array with horizontal
dimensions of angular resolution and vertical dimensions of
radial resolution.
 Rubber sheet model does not compensate for rotational
inconsistencies
 Various feature encoding methods :
1-Gabor Filters employed by Daugman in [2] andTuama.[6]
2- Log-Gabor Filters employed by D. Field.[15]
.
3- HaarWavelet employed by Lim et al.. [16]
4- Zero –crossing of the 1D wavelet employed by Boles and
Boashash .[14]
5- Laplacian of gaussian filters employed byWildes et al[9]
 Feature Encoding : creating a template containing only the
most discriminating features of the iris .
 Extracted the features of the normalized iris by filtering the
normalized iris region . [6]
 a Gabor filter is a sine ( or cosine) wave modulated by a
Gaussian . it is applied on the entire image at once and
unique features are extracted from the image
 Feature encoding was implemented by convolving the
normalized iris with 1D Gabor wavelets.
 The Daugman system makes use of polar coordinates for
normalisation, therefore in polar form the filters are given as :
(r0, θ0) specify the centre frequency of the filter. (α,β) specify the effective width and length.
 The angular direction is taken rather than the radial one ,
since maximum independence occurs in the angular direction
.
 Daugman demodulates the output of the Gabor filters in
order to compress the data this is done by quantising the
phase information in to four levels , for each possible
quadrant in the complex plane . [7]
 The demodulation and phase Quantisation process can be
represented as
where h{Re, Im} can be regarded as a complex valued bit whose real and imaginary components are dependent
on the sign of the 2D integral, and I( ρ,θ ) is the raw iris image in a dimensionless polar coordinate system.
 Using real and imaginary values, the phase information is
extracted and encoded in a binary pattern .
 The total number of bits in the template will be the angular
resolution times the radial resolution , times 2, times number
of filters used .
 The number of filters,their centre frequencies and parameters
of the modulating Gaussian function must be detecting
according to the used data base .
 Various feature matching methods :
1- Hamming distance employed by Daugman [2]
2-Weighted Euclidean Distance employed by Zhu et al[17] .
3- Normalised correlation employed byWildes [9] .
 The Hamming Distance was chosen as a matching metric ,
which gave a measure of how many bits disagreed between
two templates .
 When the hamming distance of two templates is calculated ,
one template is shifted left and right bit-wise and a number
of hamming distance values are calculated from successive
shifts , in order to account for rotational inconsistencies .
 The actual number of shifts required to normalise rotational
inconsistencies will be determined by the maximum angle
difference between two images of the same eye .
 One shift is defined as one shift to the left , followed by one
shift to the right .
 This method is suggested by Daugman . [7]
 The Chines Academy of Sciences – Institute of Automation
(CASIA) eye image database contains 756 greyscale eye
images with 108 unique eyes or class are taken from two
sessions .[8]
Threshold FAR (%) FRR (%)
0.20 0.000 99.047
0.25 0.000 82.787
0.30 0.000 37.880
0.35 0.000 5.181
0.40 0.005 0.238
0.45 7.599 0.000
0.50 99.499 0.000
Table 1 – False accept and false reject rates for the ‘CASIA-a’ data set with
different separation points using the optimum parameters.
 Accuracy changes with user’s height ,illumination , Image
quality etc.
 Person needs to be still, difficult to scan if not co-operated.
 Risk of fake Iris lenses.
 Alcohol consumption causes deformation in Iris pattern
 Expensive .
 Highly accurate but easy
 Fast
 Needs some developments
 Experiments are going on
 Will become day to day technology very soon
 [1] · http://www.cl.cam.ac.uk
 [2] J. Daugman. How iris recognition works. Proceedings of 2002 International
Conference on Image Processing,Vol. 1, 2002.
 [3]E.Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976.
 [4] L.Flom and A. Safir : Iris Recognition System .U.S. atent No.4641394(1987).
 [5]T. Chuan Chen K . Liang Chung : An Efficient Randomized Algorithm for
Detecting Circles.
Computer vision and Image UnderstandingVol.83(2001) 172-191.
 [6] Amel saeedTuama “ It is Image Segmentation and RecognitionTechnology”
vol-3 No.2 April 2012 .
 [7] S. Sanderson, J. Erbetta. Authentication for secure environments based on iris
scanning technology. IEEColloquium onVisual Biometrics, 2000 .
 [8] E.Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976 .
 [9] R.Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride. A system for
automated iris recognition. Proceedings IEEE Workshop on Applications of Computer Vision,
Sarasota, FL, pp. 121-128, 1994.
 [10] W. Kong, D. Zhang. Accurate iris segmentation based on novel reflection and eyelash
detection model. Proceedings of 2001 International Symposium on Intelligent Multimedia, Video
and Speech Processing, Hong Kong, 2001.
 [11] C.Tisse, L. Martin, L.Torres, M. Robert. Person identification technique using human iris
recognition. International Conference onVision Interface, Canada, 2002.
 [12] L. Ma,Y. Wang,T.Tan. Iris recognition using circular symmetric filters. National Laboratory of
Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002.
 [13] N. Ritter. Location of the pupil-iris border in slit-lamp images of the cornea. Proceedings of
the International Conference on Image Analysis and Processing, 1999.
 [14] W. Boles, B. Boashash. A human identification technique using images of the
iris and wavelet transform. IEEETransactions on Signal Processing,Vol. 46, No. 4,
1998.
 [15] D. Field. Relations between the statistics of natural images and the response
properties of cortical cells. Journal of the Optical Society of America, 1987.
 [16] S. Lim, K. Lee, O. Byeon,T. Kim. Efficient iris recognition through
improvement of feature vector and classifier. ETRIJournal,Vol. 23, No. 2, Korea,
2001.
 [17]Y. Zhu,T.Tan,Y.Wang. Biometric personal identification based on iris
patterns. Proceedings of the 15th International Conference on Pattern Recognition,
Spain,Vol. 2, 2000.


More Related Content

What's hot

Iris recognition
Iris recognitionIris recognition
Iris recognition
Anjali Awasthi
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
NARAHARISRUTHI1
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
Mazin Alwaaly
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Iris scanning
Iris scanningIris scanning
Iris scanning
himansupaichha
 
Iris Scan
Iris ScanIris Scan
Iris Scan
Matang Saxena
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
Iris ppt
Iris pptIris ppt
Iris ppt
Sri Harati K
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
Being Topper
 
Seminar
SeminarSeminar
Seminar
ARJUN K P
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
Alexander Decker
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
Olivia Moran
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
Drishty Sharma
 

What's hot (20)

Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Seminar
SeminarSeminar
Seminar
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 

Viewers also liked

Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionShashank Dhariwal
 
Pengolahan Citra Digital (Resume materi kuliah)
Pengolahan Citra Digital (Resume materi kuliah)Pengolahan Citra Digital (Resume materi kuliah)
Pengolahan Citra Digital (Resume materi kuliah)
Abdullah Azzam Al Haqqoni
 
Pengolahan Citra Digital - Bab15 - Pengenalan Pola
Pengolahan Citra Digital - Bab15 - Pengenalan PolaPengolahan Citra Digital - Bab15 - Pengenalan Pola
Pengolahan Citra Digital - Bab15 - Pengenalan Pola
Laksmana Hendra
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
Centerix Co., Ltd.
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
mahesh123slideshre
 
Pengolahan Citra Digital
Pengolahan Citra DigitalPengolahan Citra Digital
Pengolahan Citra Digital
lombkTBK
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Iris data analysis example in R
Iris data analysis example in RIris data analysis example in R
Iris data analysis example in R
Duyen Do
 

Viewers also liked (9)

Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
 
Pengolahan Citra Digital (Resume materi kuliah)
Pengolahan Citra Digital (Resume materi kuliah)Pengolahan Citra Digital (Resume materi kuliah)
Pengolahan Citra Digital (Resume materi kuliah)
 
Pengolahan Citra Digital - Bab15 - Pengenalan Pola
Pengolahan Citra Digital - Bab15 - Pengenalan PolaPengolahan Citra Digital - Bab15 - Pengenalan Pola
Pengolahan Citra Digital - Bab15 - Pengenalan Pola
 
Modul praktikum pengolahan citra digital
Modul praktikum pengolahan citra digitalModul praktikum pengolahan citra digital
Modul praktikum pengolahan citra digital
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Pengolahan Citra Digital
Pengolahan Citra DigitalPengolahan Citra Digital
Pengolahan Citra Digital
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Iris data analysis example in R
Iris data analysis example in RIris data analysis example in R
Iris data analysis example in R
 

Similar to Iris sem

WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
sipij
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001vital vital
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001vital vital
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
CSCJournals
 
Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform
IJECEIAES
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
cscpconf
 
A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and Recognition
IJECEIAES
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
ijcsit
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditions
ijcseit
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Editor IJCATR
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
IRJET Journal
 
E010222124
E010222124E010222124
E010222124
IOSR Journals
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a survey
IJMER
 
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
IJEEE
 

Similar to Iris sem (20)

WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
 
E017443136
E017443136E017443136
E017443136
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001
 
Ijcse13 05-01-001
Ijcse13 05-01-001Ijcse13 05-01-001
Ijcse13 05-01-001
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform Pupil Detection Based on Color Difference and Circular Hough Transform
Pupil Detection Based on Color Difference and Circular Hough Transform
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and Recognition
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
366 369
366 369366 369
366 369
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
A robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditionsA robust iris recognition method on adverse conditions
A robust iris recognition method on adverse conditions
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
07515971
0751597107515971
07515971
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
E010222124
E010222124E010222124
E010222124
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a survey
 
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
AN IMPROVED IRIS RECOGNITION SYSTEM BASED ON 2-D DCT AND HAMMING DISTANCE TEC...
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Iris sem

  • 1. RashaTarawneh Omamah Thunibat Presented to: Dr Ahmad Alhassanat Mutah university Biometric course :
  • 2.  Introduction  What the iris?  Why iris?  History of iris Recognition  Applications  Methods of iris recognition system  Image Acquisition  Segmentation  Normalization  Iris Feature Encoding  Iris code matching  Applications  Disadvantages  Conclusion  References
  • 3.  It is considered to be the most accurate biometric technology available today.  Iris recognition is a method of biometric identification and authentication that use pattern- recognition techniques based on high resolution images of the irises of an individual's eyes .
  • 4. The colored ring around the pupil of the eye is called the Iris
  • 5. The iris is a thin circular diaphragm, which lies between the cornea and the lens of the human eye. The iris is perforated close to its centre by a circular aperture known as the pupil. The function of the iris is to control the amount of light entering through the pupil. The average diameter of the iris is 12 mm, and the pupil size can vary from 10% to 80% of the iris diameter [2].
  • 6.  The iris consists of a number of layers, the lowest is the epithelium layer, which contains dense pigmentation cells.The stromal layer lies above the epithelium layer, and contains blood vessels, pigment cells and the two iris muscles.
  • 7.  The density of stromal pigmentation determines the colour of the iris. The externally visible surface of the multi-layered iris contains two zones, which often differ in colour An outer ciliary zone and an inner pupillary zone, and these two zones are divided by the collarette – which appears as a zigzag pattern[3].
  • 8.  Externally visible highly protected internal organ.  Unique patterns.  Not genetically connected unlike eye color.  Stable with age.  Impossible to alter surgically.  Living Password, Can not be forgotten or copied.  Works on blind person.  User needs not to touch appliances.  Accurate , faster , and supports large data base.
  • 9.
  • 10. Comparison between cost and accuracy
  • 11. 1997-1999 1987 1987 1980 The concept of Iris Recognition was first proposed by Dr. Frank Burch in 1939. It was first implemented in 1990 when Dr. John Daugman created the algorithms for it. These algorithms employ methods of pattern recognition and some mathematical calculations for iris recognition.
  • 12.  . ATMs  .Computer login:The iris as a living password.  · National Border Controls  · Driving licenses and other personal certificates.  · benefits authentication.  ·birth certificates, tracking missing.  · Credit-card authentication.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e- commerce, banking).  · Internet security, control of access to privileged information.
  • 13.  In identifying one’s iris, there are 2 methods for its recognition and are: 1. Active 2. Passive The active Iris system requires that a user be anywhere from six to fourteen inches away from the camera. The passive system allows the user to be anywhere from one to three feet away from the camera that locates the focus on the iris.
  • 14. Image Acquisition Iris Segmentation Normalization Feature Encoding Feature Matching IrisTemplates Database Eye Image Iris Region Feature points in the iris region IrisTemplate Identify or Reject Subject
  • 15.  The first step, image acquisition deals with capturing sequence of iris images from the subject using cameras and sensors with High resolution and good sharpness.  These images should clearly show the entire eye especially iris and pupil part, and then some preprocessing operation may be applied to enhance the quality of image e.g. histogram equalization, filtering noise removal etc. (CASIA) eye image database
  • 16. The first stage of iris segmentation to isolate the actual iris region in a digital eye image. The iris region, can be approximated by two circles, one for the iris/sclera boundary and another, interior to the first, for the iris/pupil boundary.
  • 17. the derivatives in the horizontal direction for detecting the eyelids, and in the vertical direction for detecting the outer circular boundary of the iris . Taking only the vertical gradients for locating the iris boundary will reduce influence of the eyelids when performing circular Hough transform.
  • 18.  The circular Hough transform can be employed to deduce the radius and centre coordinates of the pupil and iris regions:  Firstly, an edge map is generated by calculating the first derivatives of intensity values in an eye image and then thresholding the result.  From the edge map, votes are cast in Hough space for the parameters of circles passing through each edge point,These parameters are the centre coordinates xc and yc, and the radius r, which are able to define any circle according to the equation : A maximum point in the Hough space will correspond to the radius and centre coordinates of the circle best defined by the edge points.
  • 19.  eyelashes are treated as belonging to two types : 1 -separable eyelashes: which are isolated in the image . 2-multiple eyelashes: which are bunched together and overlap in the eye image.  Eyelids and Eyelashes are the main noise factor in the iris image.  These noise factors can affect the accuracy of the iris recognition system.  After applying circular Hough transform to iris, we are applying linear Hough transform and we get line detected noise region in the iris image.   We have to remove these detected eyelids and eyelashes from the iris image Thresolding is used for the removal of eyelashes.Then, the noise free iris image can be available for future use.
  • 20. 1- Edge Detector 2- HoughTransform Smoothing Finding gradient Double thresholding Edge LINEAR HOUGH TRANSFORM CIRCULAR HOUGH TRANSFORM
  • 21. Process of finding the iris in an image a. Iris and pupil localization: Pupil and Iris are considered as two circles using Circular HoughTransform . b. Eye lid detection and Eye lash noise removal using linear Hough Transform method.
  • 22.  Various Normalisation methods : 1- Daugman’s Rubber sheet Model by Daugman [2] 2- Image Registration modlyed byWildes et al .[9] 3-Virtual Circles by Boles [14] .
  • 23.  Once the iris segmented ,the next stage transform the iris region so that it has fixed dimensions in order to allow comparisons.  Since variations in the eye like pupil dilation and the inconsistence iris normalization is needed. Pupil dilation inconsistence iris  Normalization process involves unwrapping the iris and converting it in to its polar equivalent .
  • 24.  It is done using Daugman’s Rubber sheet model .  The centre of the pupil was considered as the reference point, and radial vectors pass through the iris region .  A number of data points are selected along each radial line is defined as the radial resolution.The number of radial lines going around the iris region is defined as the angular resolution.
  • 25.  where displacement of the center of the pupil relative to the center of the iris is given by 𝑜 𝑥, 𝑜 𝑦 .  r’ is the distance between the edge of the pupil and edge of the iris at an angle, θ around the region, and rIis the radius of the iris.  The remapping formula first gives the radius of the iris region as a function of the angle θ.
  • 26.  Normalisation produces a 2D array with horizontal dimensions of angular resolution and vertical dimensions of radial resolution.  Rubber sheet model does not compensate for rotational inconsistencies
  • 27.  Various feature encoding methods : 1-Gabor Filters employed by Daugman in [2] andTuama.[6] 2- Log-Gabor Filters employed by D. Field.[15] . 3- HaarWavelet employed by Lim et al.. [16] 4- Zero –crossing of the 1D wavelet employed by Boles and Boashash .[14] 5- Laplacian of gaussian filters employed byWildes et al[9]
  • 28.  Feature Encoding : creating a template containing only the most discriminating features of the iris .  Extracted the features of the normalized iris by filtering the normalized iris region . [6]  a Gabor filter is a sine ( or cosine) wave modulated by a Gaussian . it is applied on the entire image at once and unique features are extracted from the image  Feature encoding was implemented by convolving the normalized iris with 1D Gabor wavelets.
  • 29.  The Daugman system makes use of polar coordinates for normalisation, therefore in polar form the filters are given as : (r0, θ0) specify the centre frequency of the filter. (α,β) specify the effective width and length.  The angular direction is taken rather than the radial one , since maximum independence occurs in the angular direction .
  • 30.  Daugman demodulates the output of the Gabor filters in order to compress the data this is done by quantising the phase information in to four levels , for each possible quadrant in the complex plane . [7]  The demodulation and phase Quantisation process can be represented as where h{Re, Im} can be regarded as a complex valued bit whose real and imaginary components are dependent on the sign of the 2D integral, and I( ρ,θ ) is the raw iris image in a dimensionless polar coordinate system.
  • 31.  Using real and imaginary values, the phase information is extracted and encoded in a binary pattern .  The total number of bits in the template will be the angular resolution times the radial resolution , times 2, times number of filters used .  The number of filters,their centre frequencies and parameters of the modulating Gaussian function must be detecting according to the used data base .
  • 32.
  • 33.  Various feature matching methods : 1- Hamming distance employed by Daugman [2] 2-Weighted Euclidean Distance employed by Zhu et al[17] . 3- Normalised correlation employed byWildes [9] .
  • 34.  The Hamming Distance was chosen as a matching metric , which gave a measure of how many bits disagreed between two templates .  When the hamming distance of two templates is calculated , one template is shifted left and right bit-wise and a number of hamming distance values are calculated from successive shifts , in order to account for rotational inconsistencies .
  • 35.  The actual number of shifts required to normalise rotational inconsistencies will be determined by the maximum angle difference between two images of the same eye .  One shift is defined as one shift to the left , followed by one shift to the right .  This method is suggested by Daugman . [7]
  • 36.
  • 37.  The Chines Academy of Sciences – Institute of Automation (CASIA) eye image database contains 756 greyscale eye images with 108 unique eyes or class are taken from two sessions .[8]
  • 38. Threshold FAR (%) FRR (%) 0.20 0.000 99.047 0.25 0.000 82.787 0.30 0.000 37.880 0.35 0.000 5.181 0.40 0.005 0.238 0.45 7.599 0.000 0.50 99.499 0.000 Table 1 – False accept and false reject rates for the ‘CASIA-a’ data set with different separation points using the optimum parameters.
  • 39.  Accuracy changes with user’s height ,illumination , Image quality etc.  Person needs to be still, difficult to scan if not co-operated.  Risk of fake Iris lenses.  Alcohol consumption causes deformation in Iris pattern  Expensive .
  • 40.  Highly accurate but easy  Fast  Needs some developments  Experiments are going on  Will become day to day technology very soon
  • 41.  [1] · http://www.cl.cam.ac.uk  [2] J. Daugman. How iris recognition works. Proceedings of 2002 International Conference on Image Processing,Vol. 1, 2002.  [3]E.Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976.  [4] L.Flom and A. Safir : Iris Recognition System .U.S. atent No.4641394(1987).  [5]T. Chuan Chen K . Liang Chung : An Efficient Randomized Algorithm for Detecting Circles. Computer vision and Image UnderstandingVol.83(2001) 172-191.  [6] Amel saeedTuama “ It is Image Segmentation and RecognitionTechnology” vol-3 No.2 April 2012 .  [7] S. Sanderson, J. Erbetta. Authentication for secure environments based on iris scanning technology. IEEColloquium onVisual Biometrics, 2000 .
  • 42.  [8] E.Wolff. Anatomy of the Eye and Orbit. 7th edition. H. K. Lewis & Co. LTD, 1976 .  [9] R.Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride. A system for automated iris recognition. Proceedings IEEE Workshop on Applications of Computer Vision, Sarasota, FL, pp. 121-128, 1994.  [10] W. Kong, D. Zhang. Accurate iris segmentation based on novel reflection and eyelash detection model. Proceedings of 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing, Hong Kong, 2001.  [11] C.Tisse, L. Martin, L.Torres, M. Robert. Person identification technique using human iris recognition. International Conference onVision Interface, Canada, 2002.  [12] L. Ma,Y. Wang,T.Tan. Iris recognition using circular symmetric filters. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002.  [13] N. Ritter. Location of the pupil-iris border in slit-lamp images of the cornea. Proceedings of the International Conference on Image Analysis and Processing, 1999.
  • 43.  [14] W. Boles, B. Boashash. A human identification technique using images of the iris and wavelet transform. IEEETransactions on Signal Processing,Vol. 46, No. 4, 1998.  [15] D. Field. Relations between the statistics of natural images and the response properties of cortical cells. Journal of the Optical Society of America, 1987.  [16] S. Lim, K. Lee, O. Byeon,T. Kim. Efficient iris recognition through improvement of feature vector and classifier. ETRIJournal,Vol. 23, No. 2, Korea, 2001.  [17]Y. Zhu,T.Tan,Y.Wang. Biometric personal identification based on iris patterns. Proceedings of the 15th International Conference on Pattern Recognition, Spain,Vol. 2, 2000. 