26
Name-Sunjay kumar sa Branch-CSE iometric Iris Recognition Syste

Biometrics iris recognition

Embed Size (px)

Citation preview

Page 1: Biometrics iris recognition

Name-Sunjay kumar sahuBranch-CSE

Biometric Iris Recognition System

Page 2: Biometrics iris recognition

ContentsOverview of biometrics Introduction

Iris Recognition systemsFour simple steps to followArchitectureWorking of iris technology1. Image Acquisition2. Preprocessing

Iris Localization Edge Detection

3. Image Analysis4. Image Recognition

Recording of IdentitiesPattern MatchingAdvantages of iris technologyDisadvantages of iris

technologyApplications of iris Recognition

systemReal Life ApplicationsComparison Of Iris Recognition

With Other Biometrics Conclusion References

Page 3: Biometrics iris recognition

Overview of biometricsBiometrics is the science of measuring physical or

anatomical characteristics of individuals.It performs automatic identification of a person based on

his/her physiological characteristics.Among the features measured are face, fingerprints,

handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.

Of all the biometric devices and scanners available today, it is generally conceded that iris recognition is the most accurate.  The automated method of iris recognition is relatively young, existing in patent since only 1994.

Page 4: Biometrics iris recognition

IntroductionIris is the area of the eye where the

pigmented or colored circle, usually brown, blue, rings the dark pupil of the eye.

It is the colored portion of the eye that regulates the size of the pupil.

Has unique complex and random patterns which can be seen from some distance.

Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on the images of the irides of an individual's eyes, whose complex random patterns are unique and can be seen from some distance.

Page 5: Biometrics iris recognition

Iris Recognition systemsIris recognition is fast developing to be a

full proof and fast identification technique that can be administered cost effectively. It is a classic biometrics application that is in an advanced stage of research all over the world.

Iris cameras perform recognition detection of a person’s identity by mathematical analysis of the random patterns that are visible within the iris of an eye from some distance.  It combines computer vision, pattern recognition, statistical inference and optics.

Page 6: Biometrics iris recognition

FOUR SIMPLE STEPS TO FOLLOWA person stands in front of the iris identification system,

between one or three feet away, while a wide angle camera calculates the position of their eye.

A second camera zooms in on the eye and takes a black and white image.

Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like an “eye print”.

To prevent a fake eye from being used to fool system, these devices may vary the light shine into the eye and watch for pupil dilation.

Page 7: Biometrics iris recognition

Architecture

Page 8: Biometrics iris recognition

Working of iris technologyThe iris identification program may be divided into four

main functional blocks:1.Image Acquisition.

2.Preprocessing.

3.Image Analysis.

4.Image Recognition.

Page 9: Biometrics iris recognition

Image AcquisitionTo acquire images with sufficient resolution and sharpness to

support recognition.Good contrast and high illumination.Optics and Camera: Human heads are on the order of 15 cm wide. In case of a portal, we needed a capture volume width on the order

of 20–30 cm. More than 200 pixels or more across the iris- Good quality. Of 150–200 pixels across the iris – Acceptable quality Of 100–150 pixels to be of- Marginal quality.Camera Distance up to 3 meters.High Quality Image, Daughman’s Algorithm expect minimum

640X480.

Page 10: Biometrics iris recognition

PreprocessingThe acquired image always not only “useful” parts (IRIS),

but also some “irrelevant” parts e.g. eyelid, pupil .Preprocessing removes the effect of spots/holes lying on

the pupillary area.The Preprocessing module first transforms the true colour

into intensity imageSo the preprocessing is composed of two steps:1. Iris Localization2. Edge Detection

Page 11: Biometrics iris recognition

Iris Localization Both the inner boundary and the outer boundary of a

typical iris can be taken as circles. But the two circles are usually not co-centric. The inner boundary between the pupil and the iris is

detected. The outer boundary of the iris is more difficult to detect

because of the low contrast between the two sides of the boundary.

The outer boundary is detected by maximizing changes of the perimeter- normalized along the circle.

Page 12: Biometrics iris recognition

Edge DetectionIt is used to find complex object boundaries by marking

potential edge point corresponding to places in an image where rapid change in brightness occurs.

In other words, edge is defined by the discontinuity in gray values. An edge separates two distinct objects.

Page 13: Biometrics iris recognition

Image AnalysisThe features of the iris are

then analyzed and digitized into a 512 byte (4096 bits) Iris Code record.

In this iris code half of the describes the features and another half of the describes the control the comparison process.

Page 14: Biometrics iris recognition

Image RecognitionIris code record is stored in the database for future

comparison.

During a recognition attempt, when an iris is presented at a recognition point, the same process is repeated ; however the resulting Iris Code record is not stored but is compared to every file in the database.

Page 15: Biometrics iris recognition

Recording of Identities

Page 16: Biometrics iris recognition

The Process Overview:

Page 17: Biometrics iris recognition

Pattern MatchingThe produced code matches the encoded features stored in the database.

One technique for comparing two Iris Codes is to use the Hamming distance, which is the number of corresponding bits that differ between the two Iris Codes.

Page 18: Biometrics iris recognition

Advantages of iris technologyUniqueness of iris patterns hence improved accuracy.Highly protected, internal organ of the eye. Stability : Persistence of iris patterns. Non-invasive : Relatively easy to be acquired.Unique - the probability of two rises producing the same

code is nearly impossible.Flexible - iris recognition technology easily integrates into

existing security systems or operates as a standalonePatterns apparently stable throughout life.Reliable - a distinctive iris pattern is not susceptible to

theft, loss or compromise

Page 19: Biometrics iris recognition

Disadvantages of iris technologySmall target (1 cm) to acquire from a distance (1m)Alcohol consumption causes deformation in Iris patternIllumination should not be visible or brightObscured by eyelashes, lenses, reflectionsIt will be difficult to capture an image of handicap people

sitting on wheel chair because the cameras are usually attached on the wall and capture an image up to a certain height.

The iris recognition systems are much costlier than other biometric technologies.

If a person is wearing glasses or facing direct sunlight for quite a while, than it may affect the authentication.

Page 20: Biometrics iris recognition

Applications of iris Recognition systemComputer login: the iris as a living password.National border controls: the iris as a living passport.Driving licenses and personal certificates.Internet security, control of access to privileged

information.Premises access control (Home, Office, Laboratory).Anti-terrorism (e.g. security screening at airports)Financial Transactions (electronic commerce and

banking).Secure accesses to bank cash machine accounts.Credit-card authentication.Automobile ignition and unlocking; anti-theft devices

Page 21: Biometrics iris recognition

Real Life Applications:Aadhaar India's Unique ID

project for its one billion citizens uses Iris scan as one of the identification features.

United Arab Emirates uses it in border patrol.

Permits passport free immigration in several countries like Netherlands, Canada, US.

Google uses iris scanners to control access to their datacenters.

Page 22: Biometrics iris recognition

Comparison Of Iris Recognition With Other Biometrics Accurate Stability Fast Scalable

Page 23: Biometrics iris recognition

Comparison Method

Coded Pattern MisIdentific--ation rate

Security

Applications

Iris Iris pattern 1/1,200,000

High high-security

Fingerprint

fingerprints 1/1,000

Medium Universal

voice

Signature

Face

Palm

Voice characteristics 1/30 Low

Low

Low

Low

Telephone service Low-security

Low-security

Low-security

1/100

1/100

1/700

Shape of letters, writingOrder, pen pressure

Outline, shape & distribution of eyes, nosesize, length, & thickness hands

Page 24: Biometrics iris recognition

Conclusion The applications of iris recognition are rapidly growing in

the field of security, due to it’s high rate of accuracy. This technology has the potential to take over all other security techniques, as it provides a hands-free, rapid and reliable identification process.

Iris recognition has proven to be a very useful and versatile security measure.

It is a quick and accurate way of identifying an individual with no chance for human error.

Iris recognition is widely used in the transportation industry and can have many applications in other fields where security is necessary.

Iris recognition will prove to be a widely used security measure in the future.

Page 25: Biometrics iris recognition

Referenceshttp://findbiometrics.com/solutions/iris-scanners-recognition/http://www.irisid.com/irisrecognitiontechnologyhttp://www.slideshare.net/search/slideshow?

searchfrom=header&q=iris+recognitionhttp://en.wikipedia.org/wiki/Iris_recognition#History

Page 26: Biometrics iris recognition

THANK YOU