Applications of Iris Recognition

Preview:

Citation preview

Ascent 2K5 1

Wel-Come To

Next Generation Of security

Ascent 2K5 2

Image Processing in

Bio-medical Field Introduces

Presented By:

Miss. Jain Chetna A. Mr. Kothari Abhijeet D.Guided By :

Dr.Mrs.S.D.Apte

Ascent 2K5 3

Image Processing• Analysis of Graphical Images.• Three Steps of Image Processing:

Input :- converts colors/shades into binary values.Processing :- Image Enhancement, Normalization,

editing, filtering & data compression.Output: display/printing processed image.

Ascent 2K5 4

IRIS Recognition• Protected Internal Organ, Stable Throughout the Life.• Iris Causes the muscles compression or expansion, as

pupil responds to changing lighting condition.• Details of each Iris Phenotypically Unique• Living Passport/ Living Password.• Real Time, Recognition decisions made with High

Confidence even for Large Databases.• Developed at Cambridge University by Dr. John

Daugman.

Ascent 2K5 5

How It Works• User stands 1 meter from system.• Contains 3 video cameras. • 2 wide angle cameras for torso • 3rd focuses on eye.• Cameras uses visible & Infrared

(700-900nm) light.• Circular grid is used as a guide to

encode the pattern.

Ascent 2K5 6

• Grid is overlaid on eyes image.• Looks at pattern of light/dark

iris area • 512 byte human bar code for

that person is created.• This file size is small.• System compares the bar code

with the version stored in a computer database.

• Complete process takes about 2 seconds.

• Hamming Distance: II(code A X-OR code B)∩mask A∩mask BII

II mask A∩ mask BII

Ascent 2K5 7

Eyes & Their Bar Patterns: Here Black Color Represents ‘Logic 1 ‘

whereas White Color Represents ‘Logic 0’.

Ascent 2K5 8

Comparison

Ascent 2K5 9

Hough Transforms

Ascent 2K5 10

Advantages Highly protected internal organ of the eye. 100% Accuracy and Reliability Uniqueness: set by combinatorial complexity. No effect of using contact lenses. Patterns apparently stable throughout life. Encoding and decision-making are tractable

Image analysis and encoding time: 1 second Decidability Index = 7.3 to 11.4 seconds. Search speed: 100,000 Iris Codes per second on

300MHz CPU.

Ascent 2K5 11

Disadvantages Small target (1 cm) to acquire from a distance (1 m). Obscured by eyelashes, lenses, reflections. Partially occluded by eyelids. Deforms non-elastically as pupil changes size. Fake detection by “Eye Transplantation”.

Ascent 2K5 12

Famous Example

The Most Well-known & proved Example of missing Afghani Girl

Ascent 2K5 13

Current & Future Applications

For computer login & telephone call charging. Secure access to bank, Cash machines accounts National border controls, Anti-terrorism Ticket less, Document-free, Air travel. Premises access control, Internet security Driving licenses, personal certificates. Credit-card authentication Secure financial transactions (e-commerce, banking). Automobile ignition and unlocking; anti-theft devices

Ascent 2K5 14

Existing Applications

Password Authenticity Over Computer Networks

Ascent 2K5 15

Banking System

Ascent 2K5 16

Conclusion

Ascent 2K5 17

References• Image Processing By: A. K. Jain.• www.whatis.com• www.google.com• www.cl.cam.ac.uk• www.accessexcellence.org• www.melia.com• www.iridiantech.com• www.eyeticket.com• www.nei.nih.gov• www.webvision.med.utah.edu• IEEE Report :Detecting Faces in Images: By Ming-

Hsuan Yang, David J. Kriegman & Narendra Ahuja.

Ascent 2K5 18

Recommended