Seminar
Seminar
Seminar
A SEMINAR ON
IRIS RECOGNITIONTECHNOLOGY
Guided By: Presented By:
K.SHALINI,M.Tech,(Ph.D) D.Dhanalakshmi
Assistant Professor,Dept of EEE, 1975012
SOET,SPMVV Dept.of EEE
CONTENTS…
Introduction..
History of iris recognition
Flowchart of Automated biometrics
Working
Aram Safir & leonard Flom Patented the idea and asked Jhon Dougman to create actual
algorithms for that . Jhon Dougman created this algorithm and Patented that in the same year..
1997-1999
“Pamasonic Authenticam” was ready for use in public places like airports
IRIS
“The colored tissue at the front of the eye that contains the pupil in the center.” Externally visible
highly protected internal organ.
Unique patterns.
Not genetically connected unlike eye color.
Stable with age.
Impossible to alter surgically.
Living password, can not be forgotten or copied.
Works on blind person.
User needs not to touch appliances .
Genetic independency
NORMALIZATION
The size of pupil may change due to the variation of the illumination and the associated elastic
deformations in the iris texture may interfere with the results of pattern matching.
Since both the inner and outer boundaries of the iris have been detected ,it is easy to map the
iris ring to a rectangular block of texture of a fixed size.
PATTERN MATCHING
How closely the produced code matches the encoded features stored in the database.
One technique for comparing two iris codes is to use the hamming distance ,which is the
number of corresponding bits that differ between the two iris codes.
RECORDING OF IDENTITIES
IMAGE PROCESSING
John Daugman(1994)
Pupil detection: circular edge detector
RUBBERSHEET MODEL
Two IrisCodes from two different eyes form imposter pair=>imposter Hamming distance.
Bits in IrisCodes are co-related(for both genuine pair and imposter pair).
MERITS
Highly protected,internal organ of the eye
DEMERITS
Small target(1cm) to acquire from a distance (1m)
Located behind a curved ,wet, reflecting surface
Obscured by eyelashes lenses,reflections
APPLICATIONS
ATMs
Computer login: the iris as a living password
Ticket less air travel
Driving licenses and other personal certificates
Credit card authentication
CONCLUSION
Iria recognition has proven to be a very usefull and versatile security measure
It is a quick and accurate way of identifying an individual with no chance for human error
Iris recognition is widely used in the transportation industry and can have many applications in
other fields where security is necessary
Iris recognition will prove to be a widely used security measure in the future
REFERENCES
https://www.cl.cam.ac.uk
http://en.Wikipedia.org/wiki/Iris recognition
.www.seminars4u.com