iris ppt
TRANSCRIPT
By,
PRIYA PURI M.Tech I Year - II SemCOMPTER SCIENCE17112004
INTRODUCTION
In today's information age it is not difficult to collect data about an individual and use that information to exercise control over the individual. Earlier there were two ways for identifying a person.
a. Possession-based: using one specific "token" such as a security tag.
b. Knowledge-based: the use of a code or password.
Conventional methods of identification based on possession of ID cards or exclusive knowledge like social security number or a password are not altogether reliable. ID cards can be almost lost, forged or misplaced and passwords can be forgotten.
In computer security, biometrics refers to authentication techniques that rely on measurable physical, behavioral characteristics that can be automatically checked.
Three Basic Identification Methods
•Password•PIN
•Keys•Passport•Smart Card
•Face•Fingerprint•Iris
Possession(“something I have”)
Biometrics(“something I am”)
Knowledge(“something I know”)
BIOMETRICSBiometrics deals with the study of measurable biological characteristics.
Biometrics (ancient Greek: bios ="life", metron ="measure“) refers to very different fields of study and application.
This includes both the physiological and behavioral characteristics of a human being by which they differ from one another.
IRIS RECOGNITIOIN
Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high resolution images of the irides of an individual's eyes.
Anatomy of the Human Eye
• Eye = Camera
• Cornea bends, refracts, and focuses light.
• Retina = Film for image projection (converts image into electrical signals).
• Optical nerve transmits signals to the brain.
Individuality of Iris
Left and right eye irises have distinctive pattern
IRIS
1) The iris is a Protective internal organ of the eye. It is easily visible from yards away as a colored disk
2) It is the only internal organ of the body normally visible externally.
3) The iris is called the LIVING PASSWORD because of its unique, random features.
4) It is always with you and can not be stolen or faked. The iris of each eye is absolutely unique.
5)No two irises are alike in their details, even among identical twins. Even
the left and right irises of a single person seem to be highly distinct. It can be used for identification purposes, and not just verification.
IRIS SCAN
A biometric iris recognition system can be divided into two stages:
1. Enrollment module
2. Identification module.
ENROLLMENT MODULE:
The Enrollment module is responsible for training the system to identity a given person. During an enrolment stage, a biometric sensor scans the person's physiognomy to create a digital representation.
The iris enrollment system :
1)Iris acquisition
2)Preprocessing Module
3)Establish Coordinate System Module
4) Mask Generation Module
5)Adaptive Threshold Module
6) Iris Pattern Generation Module
7) Enrollment Module
8)Iris Pattern Database
ENROLLMENT MODULE
Adaptive threshold
Iris signature
Acquire iris image
Preprocessing
Establish coordinate system
Mask generation
db
Image acquisition
Acquisition
Image
• Distance up to 1 meter
• Near-infrared camera
PREPROCESSING
a) Original iris image
b) ¼ size iris imagec) Edges of the iris image
ESTABLISH COORDINATE SYSTEM
a) Rectangular to polar transformation
b) After boundary detection
c)Iris image in polar coordinates
MASK GENERATION
ADAPTIVE THRESHOLD
IDENTIFICATION MODULE:
The iris identification system is somewhat similar to the Enrollment Module, but has two additional modules:
The Hamming Distance Module and
Iris Signature
IDENTIFICATION MODULE
Adaptive threshold
Iris signature
Acquire iris image
Preprocessing
Establish coordinate system
Mask generation
Hamming distance
Display result
db
Iris Signature:
It takes multiple iris images of the same iris to register and generate the enrollment iris signature.
Hamming Distance: When a live iris is presented for comparison, the iris pattern is processed and encoded
into 512 byte Iris Code. The Iris Code derived from this process is compared with previously generated Iris Code. This process is called pattern matching. Pattern matching evaluates the goodness of match between the newly acquired iris pattern and the candidate’s data base entry. Pattern matching is performed as follows:
Using integer XOR logic in a single clock cycle, a long vector of each to iris code can be XORed to generate a new integer. Each of whose bits represent mismatch between the vectors being compared. The total number of 1s represents the total number of mismatches between the two binary codes. The difference between the two recodes is expressed as a fraction of mismatched bits termed as hamming distance. For two identical Iris Codes, the hamming distance is Zero. For perfectly unmatched Iris Codes, the hamming distance is 1.
HAMMING DISTANCE
ENROLLMENT 0 0 1 0 0 1 0 0 IDENTIFICATION 0 0 1 0 0 0 0 1 XOR 0 0 0 0 0 1 0 1
HAMMING DISTANCE=2
APPLICATIONS:
1. In Berkshire County, the technology is used in the newly built Berkshire Country Jail as a security check for employees.
2. The Charlotte/Douglas International Airport in North Carolina and the Flughafen Frankfort Airport in Germany allow frequent passengers to register their iris scans in an effort to streamline boarding procedures
3. Birth certificates, tracking missing or wanted person
4. Credit-card authentication.
5. Anti-terrorism (e.g.:— suspect Screening at airports)
6. INDIA: Adhar yojna
7. Google : to access data centers
cons
1)Costly2)fraudulent use3)security4)legal concideration5)users with differential abilities
Pros1)Accuracy 2)Uniqueness3)Robustness4)Ease of use5)Security6)Speed7)Iris on the move (IOM)
http://www.abc.net.au/science/news/stories/s982770.htm
Future of Iris
National Geographic: 1984 and 2002
Sharbat Gula
The remarkable story of Sharbat Gula, first photographed in 1984 aged 12 in a refugee camp in Pakistan by National Geographic (NG) photographer Steve McCurry, and traced 18 years later to a remote part of Afghanistan where she was again photographed by McCurry.
So the NG turned to the inventor of automatic iris recognition, John Daugman at the University of Cambridge.
The numbers Daugman got left no question in his mind that the eyes of the young Afghan refugee and the eyes of the adult Sharbat Gula belong to the same person.
Comparison
Method Coded PatternMisIdentific--ation rate Security Applications
Iris Iris pattern 1/1,200,000
High high-security
Fingerprint
fingerprints 1/1,000 Medium Universal
voice
Signature
Face
Palm
Voice characteristics 1/30 Low
Low
Low
Low
Telephone service
Low-security
Low-security
Low-security
1/100
1/100
1/700
Shape of letters, writing
Order, pen pressure
Outline, shape & distribution of eyes, nose
size, length, & thickness hands
CONCLUSION:
The technical performance capability of the iris recognition process far surpasses that of any biometric technology now available. Iridian process is defined for rapid exhaustive search for very large databases: distinctive capability required for authentication today. The extremely low probabilities of getting a false match enable the iris recognition algorithms to search through extremely large databases, even of a national or planetary scale. Iris-based biometric technology has always been an exceptionally accurate one, and it may soon grow much more prominent.
REFRENCES
1)“Handbook of Biometric “ by Anil K Jain
2)www.wikipedia.org
3)www.biometrics.gov
4)www.iris-recognition.org
5) Biometrics, Iris Scanning: A Literature Review was written as part of a group collaboration with Barry Feehily and Eric Nichols
THANK YOU