IRIS SCANNING
AVINASH KUMAR GUPTA
Contents
system
Overview of biometrics
1936
Frank Burch
1980
1987
1987
1997-1999
When
The iris is a Protective internal organ of the eye. It is easily visible from yards away as a colored disk, behind the clear protective window of the cornea, surrounded by the white tissue of the eye. It is the only internal organ of the body normally visible externally. It is a thin diaphragm stretching across the anterior portion of the eye and supported by lens.
Going the layman way the biometric identification of the
iris is called as “IRIS SCANNING”.But as per WIKIPEDIA,
“Iris recognition is a method of biometric authentication that
uses pattern- recognition techniques based on high-resolution
What is Iris?
The iris is a living password
Artificial duplication is virtually impossible
400 identifying features
Probability of matching of two irises is
1:1078
Genetic independency
Its inherent isolation and protection from the external environment.
WHY
Biometrics And Iris Scanning
Iris Recognition systems
FOUR SIMPLE STEPS TO FOLLOW
Architecture
Working of iris technology
Image Acquisition
In order to accomplish this, we use a CCD camera. We set the resolution to 640x480, the type of the image to jpeg, and the mode to white and black for greater details. The camera is situated normally between half a meter to one meter from the subject. (3 to 10 inches)
BLOCK DIAGRAM OF IMAGE ACQUISITION USING CCD CAMERA
Preprocessing
Iris Localization
The inner boundary between the pupil and the iris is detected.
Edge Detection
Canny Edge Detector
Process of Canny Edge detector
1: filtering image with derivative of gausian.
2. finding magnitude and orientation of image.
3. Apply non-maximum suppression
4. linking and thresholding
HOUGH TRANSFORM
(1) an eye image (2) corresponding edge map (3) edge map with only horizontal gradients I4) edge map with only vertical gradients.
Image Analysis
Image Recognition
database for future comparison.
iris is presented at a recognition point,
the same process is repeated ; however
the resulting Iris Code record is not
stored but is compared to every file
in the database.
Recording of Identities
The Process Overview:
Pattern Matching
is to use the Hamming distance, which is
the number of corresponding bits that differ
between the two Iris Codes.
Advantages of iris technology
Disadvantages of iris technology
Applications of iris Recognition system
Real Life Applications:
Comparison Of Iris Recognition With Other Biometrics
Comparison
Method | Coded Pattern | MisIdentific --ation rate | Security | Applications |
Iris | Iris pattern | 1/1,200,000 | High | high-security |
Fingerprint | fingerprints | 1/1,000 | Medium | Universal |
voice | Voice characteristics | 1/30 | Low | Telephone service |
Signature | Shape of letters, writing Order, pen pressure | 1/100 | Low | Low-security |
Face | Outline, shape & distribution of eyes, nose | 1/100 | Low | Low-security |
Palm | size, length, & thickness hands | 1/700 | Low | Low-security |
Iris recognition system is also finding unexpected applications. The best know example involved using iris recognition to confirm the identification of a mysterious young afghan woman named Sharbat Gula originally photographed by Steve McCurry in 1984.Some 18 years later, McCurry photographed Sharbat Gula in Afghanistan .At the behest of National Geographic, Dr.John Dougman,developer of the Iris recognition system, then compared the irises in the photographs using his algorithms. He concluded that the eyes were a match.
Conclusion