mukesh iris detect syn
TRANSCRIPT
-
7/28/2019 Mukesh Iris Detect Syn
1/7
1
1. ABSTRACTIris technology is an emerging research area, providing positive identification of an individual
without contact or invasion, at extremely high confidencelevels. Iris scan has been developing an
identification/verification system capable of positively identifying and verifying the identity ofindividuals without physical contact or human intervention.It is a new technology, using the
unique patterns of the human iris, shows promise of overcoming shortcomings. .
The video-based system locates the eye and iris; evaluates the degree of occlusion by eyelid and
spectral reflection; determines the quality of image focus; and determines the center and
boundary of the pupil and the limbus (outer edge of the iris) for processing. The iris is zoned, and
the features therein measured and encoded into a 512-byte Iris Code for enrollment or
identification. The presented biometric is compared to an extensive database for identification, or
to a referenced Iris Code for verification. Computations and decisions are accomplished at
extremely high rates of speed, resulting in processing times of less than two seconds.
The multiple features produce a non-duplicable organ with more than 400 degrees of freedom, or
measurable variables. of these to create a code which can be compared to an entire database in
milliseconds, producing a positive identification with imposter odds as high as 1 in 1034.
-
7/28/2019 Mukesh Iris Detect Syn
2/7
2
2..INTRODUCTION
Iris recognition is the process of recognizing a person by analyzing the random pattern of the iris.
The automated method of iris recognition is relatively young, existing in patent only since 1994.
The iris is a muscle within the eye that regulates the size of the pupil, controlling the amount oflight that enters the eye. It is the colored portion of the eye with coloring based on the amount of
melatonin pigment within the muscle Although the coloration and structure of the iris is
genetically linked, the details of the patterns are not. The iris develops during prenatal growth
through a process of tight forming and folding of the tissue membrane. Prior to birth,
degeneration occurs, resulting in the pupil opening and the random, unique patterns of the iris.
Although genetically identical, an individuals irides are unique and structurally distinct, which
allows for it to be used for recognition purposes.
Many millions of persons in several countries around the world have been enrolled in iris
recognition systems, for convenience purposes such as passport-free automated border-crossings,
and some national ID systems based on this technology are being deployed. A key advantage of
iris recognition, besides its speed of matching and its extreme resistance to False Matches, is the
stability of the iris as an internal, protected, yet externally visible organ of the eye.
Not to be confused with another, less prevalent, ocular-based technology, retina scanning, iris
recognition uses camera technology with subtleinfrared illumination to acquire images of the
detail-rich, intricate structures of the iris. Digital templates encoded from these patterns by
mathematical and statistical algorithms allow the identification of an individual or someone
pretending to be that individual. Databases of enrolled templates are searched by matcher engines
at speeds measured in the millions of templates per second per (single-core) CPU, and with
infinitesimally small False Match rates.
http://en.wikipedia.org/wiki/Retina_scanhttp://en.wikipedia.org/wiki/Infraredhttp://en.wikipedia.org/wiki/Infraredhttp://en.wikipedia.org/wiki/Retina_scan -
7/28/2019 Mukesh Iris Detect Syn
3/7
3
3. LITERATURE SURVEY
In 1936, ophthalmologist Frank Burch proposed the concept of using iris patterns as a method to
recognize an individual. In 1985, Drs. Leonard Flom and Aran Safir, ophthalmologists, proposed
the concept that no two irides are alike, and were awarded a patent for the iris identificationconcept in 1987. Dr. Flom approached Dr. John Daugman to develop an algorithm to automate
identification of the human iris. In 1993, the Defense Nuclear Agency began work to test and
deliver a prototype unit, which was successfully completed by 1995 due to the combined efforts
of Drs. Flom, Safir, and Daugman. In 1994, Dr. Daugman was awarded a patent for his
automated iris recognition algorithms. In 1995, the first commercial products became available.
In 2005, the broad patent covering the basic concept of iris recognition expired, providing
marketing opportunities for other companies that have developed their own algorithms for iris
recognition. The patent on the IrisCodes implementation of iris recognition developed by Dr.
Daugman (explained below) will not expire until 2011.
The US Department of Homeland Security (DHS) and the Intelligence Technology Innovation
Center (ITIC) co-sponsored a test of iris recognition accuracy, usability, and interoperability
referred to as the Independent Testing of Iris Recognition Technology (ITIRT)
(http://www.biometricscatalog.org/itirt/ITIRTFinalReport.pdf), the results of which were
released in May 2005. The scenario test evaluated enrollment and matching software, and
acquisition devices. The ITIRT's primary objective was to evaluate iris recognition performance
in terms of match rates, enrollment and acquisition rates, and level of effort required from the
user.
-
7/28/2019 Mukesh Iris Detect Syn
4/7
4
4. MERITS AND DEMERITS
MERITS
It is an internal organ that is well protected against damage and wear by a highlytransparent and sensitive membrane (the cornea). This distinguishes it from fingerprints,
which can be difficult to recognize after years of certain types of manual labor.
The iris is mostly flat, and its geometric configuration is only controlled by twocomplementary muscles (the sphincter pupillae and dilator pupillae) that control the
diameter of the pupil. This makes the iris shape far more predictable than, for instance,
that of the face.
The iris has a fine texture thatlike fingerprintsis determined randomly duringembryonic gestation. Like the fingerprint, it is very hard (if not impossible) to prove that
the iris is unique. However, there are so many factors that go into the formation of these
textures (the iris and fingerprint) that the chance of false matches for either is extremely
low. Even genetically identical individuals have completely independent iris textures.
An iris scan is similar to taking a photograph and can be performed from about 10 cm toa few meters away. There is no need for the person being identified to touch any
equipment that has recently been touched by a stranger, thereby eliminating an objection
that has been raised in some cultures against fingerprint scanners, where a finger has to
touch a surface, or retinal scanning, where the eye must be brought very close to an
eyepiece (like looking into a microscope).
DEMERITS
Many commercial iris scanners can be easily fooled by a high quality image of an iris orface in place of the real thing.
The scanners are often tough to adjust and can become bothersome for multiple people ofdifferent heights to use in succession.
The accuracy of scanners can be affected by changes in lighting Iris scanners are significantly more expensive than some other forms of biometrics,
password or prox card security systems
http://en.wikipedia.org/wiki/Corneahttp://en.wikipedia.org/wiki/Gestationhttp://en.wikipedia.org/wiki/Gestationhttp://en.wikipedia.org/wiki/Cornea -
7/28/2019 Mukesh Iris Detect Syn
5/7
5
5. APPLICATIONS :
national border controls: the iris as a living passport computer login: the iris as a living password cell phone and other wireless-device-based authentication secure access to bank accounts at cash machines ticketless travel; authentication of rights to services premises access control (home, office, laboratory, etc) driving licenses; other personal certificates entitlements and benefits authorisation forensics; birth certificates; tracing missing or wanted persons credit-card authentication automobile ignition and unlocking; anti-theft devices anti-terrorism (e.g. security screening at airports) secure financial transactions (electronic commerce, banking) Internet security; control of access to privileged information "Biometric-Key Cryptography" (stable keys from unstable templates) any existing use of keys, cards, PINs, or passwords
-
7/28/2019 Mukesh Iris Detect Syn
6/7
6
6. CONCLUSION
The need for secure methods of authentication is becoming increasingly important in the
corporate world today. Passwords, token cards and PINs are all risks to the security of an
organization due to human nature. Our inability to remember complex passwords and tendencyto write these down along with losing token cards or forgetting PINs all contribute to the possible
breakdown in security for an organization.
-
7/28/2019 Mukesh Iris Detect Syn
7/7
7
7. REFERENCES :
[1] http://www.technicalsymposium.com/Iris_Recognition.html
[2] http://www.biometrics.gov/Documents/irisrec.pdf
[3] http://whatis.techtarget.com/definition/iris-recognition
[4] http://en.wikipedia.org/wiki/Iris_recognition