Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Seminar

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

ELECTRICAL AND ELECTRONICS ENGINEERING

A SEMINAR ON

IRIS RECOGNITIONTECHNOLOGY
Guided By: Presented By:
K.SHALINI,M.Tech,(Ph.D) D.Dhanalakshmi
Assistant Professor,Dept of EEE, 1975012
SOET,SPMVV Dept.of EEE

CONTENTS…
Introduction..
History of iris recognition
Flowchart of Automated biometrics
Working

Rubbersheet model,performance(hamming distance)


Merits
Demerits
Applications
Conclusion
Reference
INTRODUCTION
Going the layman way the biometric identification of the iris is called as ”IRIS
SCANNING”.

“Iris recognition is a method of biometric authentication that uses pattern


recognition techniques based on high resolution images of the irides of an
individual’s eyes”.
NEED FOR BIOMETRICS
“Biometrics consist of methods of uniquely recognizing humans based
up-on one or more intrinsic physical or behavioural
traits”
The Need for Biometrics:
Rapid development in technology
Globalization
High security and assurance
Accurate Identification

HISTORY OF IRIS RECOGNITION


1936

 Idea was proposed by opthomologist Framk Burch


1980

 Appeard in the Bond Films


1987

 Aram Safir & leonard Flom Patented the idea and asked Jhon Dougman to create actual
algorithms for that . Jhon Dougman created this algorithm and Patented that in the same year..
1997-1999

 “Pamasonic Authenticam” was ready for use in public places like airports

IRIS
“The colored tissue at the front of the eye that contains the pupil in the center.” Externally visible
highly protected internal organ.
Unique patterns.
Not genetically connected unlike eye color.
Stable with age.
Impossible to alter surgically.
Living password, can not be forgotten or copied.
Works on blind person.
User needs not to touch appliances .

Accurate,faster and supports large database.


AUTOMATED BIOMETRICS
INDIVIDUALITY OF IRIS
Artificial duplication is virtually impossible

The iris is a living password

Propability of matching two irises is 1:10^-8

Genetic independency

It’s inherent isolation and protection from


the external environment
IRIS RECOGNITION SYSTEM
WORKING
IRIS ON THE MOVE: ACQUISITION OF
IMAGES
To acquire images with sufficient resolution and sharpness to support recognition A. Optics
and Camera:
Human heads are on the order of 15cm wide.
incase of a portal,we needed a capcha volume width on the order of 20-30cm.
More than 200px or more across the iris -Good quality .
Of 150-200px across the iris-Acceptable quality.
Of 100-150px to be of- Marginal quality. B.Illumination:
The shutter is only open during the strobe to reduce the effect of ambient light. C. Course
Segmentation:
Daugman algorithm expects 640x480 images.
IRIS LOCALIZATION
Both the inner boundary and outer boundary of a typical iris can be taken as circles.
But the two circles are usually not co-centric.

the inner boundary between puple and iris is detected.


The outer boundary of the iris is more difficult to detect because of the low contrast between
the two sides of the boundary.
The outer boundary is detected by maximizing changes of the perimeternormalized along the
circle.

NORMALIZATION
The size of pupil may change due to the variation of the illumination and the associated elastic
deformations in the iris texture may interfere with the results of pattern matching.
Since both the inner and outer boundaries of the iris have been detected ,it is easy to map the
iris ring to a rectangular block of texture of a fixed size.

PATTERN MATCHING
How closely the produced code matches the encoded features stored in the database.
One technique for comparing two iris codes is to use the hamming distance ,which is the
number of corresponding bits that differ between the two iris codes.
RECORDING OF IDENTITIES
IMAGE PROCESSING
John Daugman(1994)
Pupil detection: circular edge detector
RUBBERSHEET MODEL

Each pixel (x,y)is mapped in to polar pair(r, ). θ


Circular band is divided into 8 sub-bands of equal thickness for a given angle θ.
MEASURE OF
PERFORMANCE
Off –line and on-line modes of operation.

Hammimg distance:standard measure for comparision of binary strings

X and y are two IrisCodes is the notation


for exclusive OR(XOR)
Counts bits that disagree
OBSERVATIONS
Two IrisCodes from the same eye form genuine pair=>genuine Hamming distance.

Two IrisCodes from two different eyes form imposter pair=>imposter Hamming distance.

Bits in IrisCodes are co-related(for both genuine pair and imposter pair).

The co-relation between IrisCodes from the same eye is stronger.

MERITS
Highly protected,internal organ of the eye

Extreamly visible;patterns imaged from a distance

Iris patterns posses a high degree randomness,uniqueness:set by combinatorial complexity


changing pu[il size confims natural physiology
Limited genetic penetrance of iris patterns Patterns
apparently stable throughout life.
A key advantage of iris recognition is it’s stability ,or template longevity,as,barring trauma,a
single enrollment can last a life time.

DEMERITS
Small target(1cm) to acquire from a distance (1m)
Located behind a curved ,wet, reflecting surface
Obscured by eyelashes lenses,reflections

Partially occluded by eyelids,often drooping


Deforms non-elastically as pupil changes size Illumination should
not be visible or bright.

APPLICATIONS
ATMs
Computer login: the iris as a living password
Ticket less air travel
Driving licenses and other personal certificates
Credit card authentication

Forensics, birth cirtificates,tracking missing or unwanted person

Anti-terrorism(example:suspect screening at airports)


Secure financial transactions(E-commerce,banking)

Internet security,control of access to privileged information

CONCLUSION
Iria recognition has proven to be a very usefull and versatile security measure
It is a quick and accurate way of identifying an individual with no chance for human error
Iris recognition is widely used in the transportation industry and can have many applications in
other fields where security is necessary
Iris recognition will prove to be a widely used security measure in the future

REFERENCES
 https://www.cl.cam.ac.uk

 http://en.Wikipedia.org/wiki/Iris recognition
 .www.seminars4u.com

 Daugman J (1999) ”Biometric decision landscapes.”Techinical Report No TR482,University of


Cambridge Computer Laboratory.
 International gernal of computer technology and electronics engineering(IJCTEE)Volume 2 issue 1
THANK YOU

You might also like