IRIS Biometric For Person Identification: by Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric For Person Identification: by Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric For Person Identification: by Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
Identification
By
Lakshmi Supriya.D
M.Tech 04IT6002
Dept. of Information Technology
What are Biometrics?
Register
Lan
Typical iris system configuration
Uniform
distribution Stored
templates
Reject
Pre Feature- Identification
processing extraction Verification
Iris Normalization
Image Enhancement
Iris Localization
Both the inner boundary and the outer boundary of a
typical iris can be taken as circles. But the two circles
are usually not co-centric. Compared with the other
part of the eye, the pupil is much darker. We detect the
inner boundary between the pupil and the iris. The
outer boundary of the iris is more difficult to detect
because of the low contrast between the two sides of
the boundary. We detect the outer boundary by
maximizing changes of the perimeter- normalized
along the circle. The technique is found to be efficient
and effective.
Iris Normalization
The size of the pupil may change due to the variation of the
illumination and the associated elastic deformations in the iris
texture may interface with the results of pattern matching. For
the purpose of accurate texture analysis, it is necessary to
compensate this deformation. Since both the inner and outer
boundaries of the iris have been detected, it is easy to map the
iris ring to a rectangular block of texture of a fixed size.
Image Enhancement
The original image has low contrast and may
have non-uniform illumination caused by the
position of the light source. These may impair
the result of the texture analysis. We enhance
the iris image reduce the effect of non-uniform
illumination.
Iris preprocessing: (a) original eye (b) iris localization
( c ) iris normalization (d) image enhancement
Comparison Of Iris Recognition With
Other Biometrics
Accurate
Stability
Fast
Scalable
Comparison
MisIdentific-
Security Applications
Method Coded Pattern -ation rate
voice Voice
1/30 Low Telephone service
characteristics
Shape of letters, writing
Signature Low Low-security
Order, pen pressure 1/100
Current Uses
Future Uses
References
Y.Zhu,T.Tan and Y.Wang,”Biometric
Identification Based on Iris Pattern”.
Anil K Jain,”Biometric Authentication: How
Do I Know Who You Are”.
D Maltoni, D.Maio, Anil K Jain, and S
prabhakar”Handbook of Finger print
Recognition”.