Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Iris Scanner

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

IRIS TECHNOLOGY

Contents
• IRIS?
• Introduction
• History
• How?
• Advantages
• Disadvantages
• Apps.
• Conclusion
What do u mean by IRIS?
• The iris is a thin circular diaphragm, which lies
between the cornea and the lens of the
human eye.
• The function of the iris is to control the
amount of light entering through the pupil.
Introduction
• IRIS scanner is from biometric technology,
which deals with identification based on the
human iris.
• Biometrics is the science of establishing human
identity by using physical or behavioural traits
such as face, fingerprints, palm prints, iris, hand
geometry, and voice.
• It is considered to be the most accurate
biometric technology available today.
History
• The idea of using patterns for personal
identification was originally proposed in 1936
by ophthalmologist Dr. Frank Burch.
• It was first implemented in 1990 ,when
Dr.John Daugman created algorithms for it.
How:The science behind it
Working Of Iris Scanning
Image Acquisition
• Why important?
One of the major challenges of automated iris recognition is to
capture a high-quality image of the iris while remaining
noninvasive to the human operator.
• Concerns on the image acquisition rigs
– Obtained images with sufficient resolution and sharpness
– Good contrast in the interior iris pattern with proper illumination
– Well centered without unduly constraining the operator
– Artifacts eliminated as much as possible
Image Acquisition - Results
IRIS scanning process
 The iris-scan process begins with a
photograph. A specialized camera, typically
very close to the object, not more than three
feet, uses an infrared imager to illuminate the
eye and capture a very high-resolution
photograph. This process takes 1 to 2 seconds.
IRIS recognition
• In less than few seconds, even on a database of
millions of records, the iris code template
generated from a live image is compared to
previously enrolled ones to see if it matches to
any of them.
Iris Localization
Both the inner boundary and the outer boundary of a
typical iris can be taken as circles.
• But the two circles are usually not co-centric.
Compared with the other part of the eye, the pupil is
much darker. We detect the inner boundary between
the pupil and the iris.
• To identify the approximately concentric circular
outer boundaries of the iris and the pupil in a photo
of an eye using DAUGMAN’S ALGORITHM
Results of Iris Localization
Iris Normalization
• The size of the pupil may change due to the
variation of the illumination and the associated
elastic deformations in the iris texture may interface
with the results of pattern matching.
• For the purpose of accurate texture analysis, it is
necessary to compensate this deformation.
• Since both the inner and outer boundaries of the iris
have been detected, it is easy to map the iris ring to
a rectangular block of texture of a fixed size.
Creating an IRIS code
 After localization iris code is computed based on information
received from GABOR WAVELETS.

 GABOR WAVELETS are specialized filter banks that extract


information from signal at various locations and scales.

 The IRIS CODE is calculated using 8 circular bands that has


been adjusted to iris and pupil boundary.

 Iris recognition tech converts visible characteristic of iris into


512 bit iris code, these templates are stored for future
verification attempts.
Image Enhancement
• The original image has low contrast and may
have non-uniform illumination caused by the
position of the light source. These may impair
the result of the texture analysis.
• We enhance the iris image reduce the effect of
non-uniform illumination.
Advantages
• Sensing is done without any physical contact.
• Iris is an internal organ and well protected against
damage.
• Fine texture
• Highly stable
• Analysis of iris is very fast
• Highly accurate
• 100,000 comparisons can be performed in a
second.
disadvantages
• Requires much user co-operation.
• Performance of iris authentication may be
impaired by glasses.
• Difficult to scan at larger distance.
• Susceptible to poor image quality.
• Obscured by eyelashes,light,dust.
• Little bit costlier when compared to other
biometric processes.
Applications
• In ATM’s
• Computer login: as living password.
• Driving license and other personal certificates.
• Suspect screening
• Credit card authentications.
• Secure financial transactions
Conclusion
• This IRIS technology is rapidly going in the field
of security, due to its high rate of accuracy.
This technology has the potential to take
over ,all other security techniques as it
provides hand free, rapid and reliable
identification process.
ThanQ 4 ur attention…..!!

You might also like