SlideShare a Scribd company logo
Retinal Pattern Recognition biometrics contents . description of Retinal Pattern Recognition ,[object Object],by hira aneeqa  ayesha
Biometrics, automatic methods for identifying a person on the basis of some biological or behavioral characteristic of the person. The word  biometrics  comes from the Greek  bios  (life) and  metrikos  (measure). bio metrics:
The retina is the innermost layer of the eye. The pattern formed by veins beneath the surface of the retina is unique to each individual. retina
This pattern is a reliable biometric characteristic. Do you  know?
Researchers acquire digital images of retinal patterns by projecting a low-intensity beam of visible or infrared light into a person’s eye and scanning an image of the retina.
And further interesting but negative  facts are :
The amount of user cooperation required for a retinal scan makes this technique unacceptable in many applications. For a fixed portion of the retina to be used for identification, the person undergoing the scan must gaze into an eyepiece and focus on a predetermined spot. and On the other hand, a large number of biometric devices based on retinal scans have been installed in prisons and other highly secure environments. The primary disadvantage of this biometric technique is that retinal scanners are expensive
thanks

More Related Content

What's hot

Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
DexterChess
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
Olivia Moran
 
Iris ppt
Iris pptIris ppt
Iris ppt
Sri Harati K
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
shyamalaramesh2
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
Being Topper
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
Ankit Kumar
 
Iris scanning
Iris scanningIris scanning
Iris scanning
himansupaichha
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
Ahmed Tememe
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
csitconf
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
NARAHARISRUTHI1
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
Shubham Chopra
 
Human Retina Identification
Human Retina IdentificationHuman Retina Identification
Human Retina Identification
Kalyani Government Engineering College
 

What's hot (20)

Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Human Retina Identification
Human Retina IdentificationHuman Retina Identification
Human Retina Identification
 

Similar to Retinal Pattern Recognition

Iris print
Iris print Iris print
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Biometric data
Biometric dataBiometric data
Biometric data
itszahra98
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
ijtsrd
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
Manoj Kumar
 
Biometrics
BiometricsBiometrics
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
Biomedical Images.ppt
Biomedical Images.pptBiomedical Images.ppt
Biomedical Images.ppt
breenaawan
 
Physical biometrics
Physical biometricsPhysical biometrics
Physical biometrics
nishiyath
 
Iris scanning
Iris scanningIris scanning
Iris scanning
NikithaME
 
E0364024030
E0364024030E0364024030
E0364024030
inventionjournals
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
'Femi Akin-Laguda
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
ijsc
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
Dr-mahmoud Algamel
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
YUSRA FERNANDO
 
Bionic Eye
Bionic EyeBionic Eye
Bionic Eye
Ayisha M Kalburgi
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
ijsc
 
Iris scanning
Iris scanningIris scanning
Iris scanning
Ankit Kumar
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
BirkumarJana
 

Similar to Retinal Pattern Recognition (20)

Iris print
Iris print Iris print
Iris print
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Biometric data
Biometric dataBiometric data
Biometric data
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biomedical Images.ppt
Biomedical Images.pptBiomedical Images.ppt
Biomedical Images.ppt
 
Physical biometrics
Physical biometricsPhysical biometrics
Physical biometrics
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
E0364024030
E0364024030E0364024030
E0364024030
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Bionic Eye
Bionic EyeBionic Eye
Bionic Eye
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid TechniqueBiometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
 

More from hiratufail

Chilled Coffee
Chilled CoffeeChilled Coffee
Chilled Coffeehiratufail
 
Fake Moon Landing
Fake Moon LandingFake Moon Landing
Fake Moon Landing
hiratufail
 
Chilren All Over The World
Chilren All Over The WorldChilren All Over The World
Chilren All Over The Worldhiratufail
 
Getting Dressed
Getting DressedGetting Dressed
Getting Dressedhiratufail
 
Alabama the Beautiful
Alabama the BeautifulAlabama the Beautiful
Alabama the Beautifulhiratufail
 
Equipping The Haealthy Kitchen
Equipping The Haealthy KitchenEquipping The Haealthy Kitchen
Equipping The Haealthy Kitchenhiratufail
 
Cutting Fat And Calories Cut Down
Cutting Fat And Calories Cut DownCutting Fat And Calories Cut Down
Cutting Fat And Calories Cut Downhiratufail
 
Barack Obama Vs John Mccain
Barack Obama Vs John MccainBarack Obama Vs John Mccain
Barack Obama Vs John Mccainhiratufail
 
Clothes For Toddlers
Clothes For ToddlersClothes For Toddlers
Clothes For Toddlershiratufail
 
Baby Sitter Guidelines
Baby Sitter GuidelinesBaby Sitter Guidelines
Baby Sitter Guidelineshiratufail
 
A Safe And Clean Kitchen
A Safe And Clean KitchenA Safe And Clean Kitchen
A Safe And Clean Kitchenhiratufail
 

More from hiratufail (20)

a-z animals
a-z animalsa-z animals
a-z animals
 
Chilled Coffee
Chilled CoffeeChilled Coffee
Chilled Coffee
 
Guten Morgen
Guten MorgenGuten Morgen
Guten Morgen
 
Apple Iphone
Apple IphoneApple Iphone
Apple Iphone
 
Similarity
SimilaritySimilarity
Similarity
 
Fake Moon Landing
Fake Moon LandingFake Moon Landing
Fake Moon Landing
 
Chilren All Over The World
Chilren All Over The WorldChilren All Over The World
Chilren All Over The World
 
Food Pyramid
Food PyramidFood Pyramid
Food Pyramid
 
Getting Dressed
Getting DressedGetting Dressed
Getting Dressed
 
Microwaving
MicrowavingMicrowaving
Microwaving
 
Alabama the Beautiful
Alabama the BeautifulAlabama the Beautiful
Alabama the Beautiful
 
Equipping The Haealthy Kitchen
Equipping The Haealthy KitchenEquipping The Haealthy Kitchen
Equipping The Haealthy Kitchen
 
Food Pyramid
Food PyramidFood Pyramid
Food Pyramid
 
Cutting Fat And Calories Cut Down
Cutting Fat And Calories Cut DownCutting Fat And Calories Cut Down
Cutting Fat And Calories Cut Down
 
Cooking
CookingCooking
Cooking
 
Barack Obama Vs John Mccain
Barack Obama Vs John MccainBarack Obama Vs John Mccain
Barack Obama Vs John Mccain
 
Clothes For Toddlers
Clothes For ToddlersClothes For Toddlers
Clothes For Toddlers
 
Balanced Diet
Balanced DietBalanced Diet
Balanced Diet
 
Baby Sitter Guidelines
Baby Sitter GuidelinesBaby Sitter Guidelines
Baby Sitter Guidelines
 
A Safe And Clean Kitchen
A Safe And Clean KitchenA Safe And Clean Kitchen
A Safe And Clean Kitchen
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Retinal Pattern Recognition

  • 1.
  • 2. Biometrics, automatic methods for identifying a person on the basis of some biological or behavioral characteristic of the person. The word biometrics comes from the Greek bios (life) and metrikos (measure). bio metrics:
  • 3. The retina is the innermost layer of the eye. The pattern formed by veins beneath the surface of the retina is unique to each individual. retina
  • 4. This pattern is a reliable biometric characteristic. Do you know?
  • 5. Researchers acquire digital images of retinal patterns by projecting a low-intensity beam of visible or infrared light into a person’s eye and scanning an image of the retina.
  • 6. And further interesting but negative facts are :
  • 7. The amount of user cooperation required for a retinal scan makes this technique unacceptable in many applications. For a fixed portion of the retina to be used for identification, the person undergoing the scan must gaze into an eyepiece and focus on a predetermined spot. and On the other hand, a large number of biometric devices based on retinal scans have been installed in prisons and other highly secure environments. The primary disadvantage of this biometric technique is that retinal scanners are expensive