Click here to load reader

The Inbuilt Password Iris Final

Embed Size (px)

Citation preview

  • 1. Presented by
    Ms. Madhuri Undre,
    Mr. Swarup Kulkarni
    From
    MCA II, Dept. of Comp. Eng.
    BRACTs
    Vishwakarma Institute of Technology,
    Pune
    The Inbuilt Password: Iris

2. Contents:
Introduction
The Eye
Iris Recognition system
Applications
Advantages
Comparison with other techniques
Conclusion
References
2
The Inbuilt Password: Iris
2/27/2009
3. Identification/Authentication
Need
Different Techniques
Traditional
Intermediate
Latest
3
The Inbuilt Password: Iris
2/27/2009
4. Biometrics
2/27/2009
The Inbuilt Password: Iris
4
5. The Eye
One of most important organ
Expresses: emotions, confidence, truthfulness
Comprises of Iris, pupil, sclera
Iris gives color, beauty as well as Identity
5
The Inbuilt Password: Iris
2/27/2009
6. Iris Recognition
6
The Inbuilt Password: Iris
2/27/2009
7. Iris Recognition continued...
2/27/2009
The Inbuilt Password: Iris
7
Image acquisition
Distance
Light
Camera
8. Iris Recognition continued...
Processing of image
Iris localization

  • Calculating Boundaries

Normalization

  • Cartesian to Polar

Enhancement of images

  • Non-uniform illumination

9. SharpeningImage before enhancement
Image after enhancement
8
The Inbuilt Password: Iris
2/27/2009
10. Iris Recognition continued...
Feature Extraction
512 bytes Iris Code
500,000 templates per second
IrisCode generation
9
The Inbuilt Password: Iris
2/27/2009
11. Iris Recognition continued...
Matching Iris pattern
Comparison of two Iris Codes
Statistical Independence
Hamming Distance
10
The Inbuilt Password: Iris
2/27/2009
12. Applications
The Inbuilt Password: Iris
11
ATM- Used since 1997 in UK, US, Japan, etc.
Airports Employee, passenger identification
Prison transfers and releases
Online shopping
Online voting
2/27/2009
13. Advantages
Iris pattern extremely complex
Patterns are individual even in twins
Patterns identical through out the life
Works even user wares sunglasses, contact lenses
Imitation almost impossible
Very resistant to false matching(1/1.2 million) and fraud
12
The Inbuilt Password: Iris
2/27/2009
14. Comparison
13
The Inbuilt Password: Iris
2/27/2009
15. Conclusion
Excellent Recognition System.
One of the most Robust ways of Identification.
Enhanced suitability.
Imitation is almost impossible due to complexity.
Impossibility of surgically modifying without the risk of vision hence Fraud Resistant.
14
The Inbuilt Password: Iris
2/27/2009
16. References
www.sciencedirect.com
Dr. Mustafa H. Dahshan, Computer Engineering Department, College of Computer & Information Sciences, King Saud University.
John Daugman. How Iris Recognition Works, IEEE Transaction paper, Vol. 14, JANUARY 2004
www.wikipedia.com
IRIS Recognition, www.cl.cam.ac.uk/~jgd1000/iris_recognition.html
Biometrics, scgwww.epfl.ch/courses/Biometrics-Lectures-2007-2008-pdf/07-Biometrics-Lecture-7-Part2-2-2007-11-05.pdf
www.biometrics.gov/Documents/IrisRec.pdf
Biometrics the Ultimate Reference by John D. Woodward-Jr., Nicholas M. Orlans, Peter T. Higgins. Dreamtech press.
15
The Inbuilt Password: Iris
2/27/2009
17. THANK YOU!
16
The Inbuilt Password: Iris
2/27/2009