SlideShare a Scribd company logo
1 of 17
VIDYA BHARATHI INSTITUTE OF TECHNOLOGY
                     PAPER PRESENTATION
                                ON
            Iris Recognition of a Biometric Technique

                                        BY
        D.MADHAVI,                          B.SRAVANI,
         ECE II yr,                           ECE II yr,
madhavi.donthi@yahoo.com             bobbalasravani@yahoo.com
Topics of Discussion
   Introduction

   IRIS identification process

   IRIS identification system

   Method of IRIS identification

   Function of IRIS scanner

   properties of IRIS

   Applications of IRIS recognition

   Advantages and Disadvantages

   Conclusion
INTRODUCTION:



The colored part of the eye
WHY WE GO FOR IRIS TECHNOLOGY?
IRIS identification process


           Acquisition          Image
                                                     Localization




IrisCode   Gabor Filters   Polar Representation
                                                  Demarcated Zones
IRIS IDENTIFICATIONSYSTEM:
 There are two types of methods

  1. Active iris system:

     requires that a user be
     anywhere from six to 14
     inches away from the
     camera.


 2. Passive iris system:

     allows the user to be
     anywhere from one to
     three feet away from the
     camera.
FUNCTION OF IRIS SCANNER:
   The user places himself so that he
    can see his own eye's reflection in the
    device.

   Verification time is generally less
    than 5 seconds, though the user will
    only need to look into the device for
    a couple moments.

   A template iris pattern code contains
    between 256 and 512 bytes of data
    depending upon the manufacturer.

   Using a camera it converts the small
    details in the iris stromal pattern into
    a bit pattern.
IRIS IDENTIFICATION STEPS
There are four simple steps that follow:
   A person stands in from of the iris identification system, between one and
    three feet away, while a wide-angle camera calculates the position of they
    eye.

   A second camera zooms in on the eye and takes a black and white image.

   Once the iris is in focus, it overlays a circular grid on the image of the iris
    and identifies the light and dark areas, like and "eyeprint".


   The captured image, or "eyeprint" is checked against a previously stored

    reference template in the database.
   Hamming code

   a Hamming code is a linear error-correcting code
    named after its inventor, Richard Hamming. Hamming
    codes can detect and correct single-bit errors, and can
    detect (but not correct) double-bit errors. In other
    words, the Hamming distance between the transmitted
    and received code-words must be zero or one for
    reliable communication.
Properties of the iris
   Has highly distinguishing texture

   Right eye differs from left eye

   Twins have different iris texture

   Not trivial to capture quality image

   + Works well with cooperative subjects

   + Used in many airports in the world
ADVANTAGES:
   Each iris is unique.

   High recognition performance and high reliability.

   Fast authentication within seconds.

   The iris remains stable throughout ones life. Medical
    advances such as refractive surgery, cataract surgery and
    cornea transplants do not change the iris' characteristics.
DISADVANTAGES:
×   Iris scanning is incompatible with the substantial
    investment.

×   Iris recognition is very difficult to perform at a larger
    distance .

×   Iris recognition is susceptible to poor image quality, with
    associated failure to enroll rates.
APPLICATIONS:
   Database access and computer login.

   The iris-recognition software is implemented for
    security purposes around the airport terminal ,which
    was designed to allow only authorized people to enter
    certain areas.

   To stop this practice- the first door opens upon iris
    recognition and then closes behind the person, leaving
    them in a small portal. The next door will only open
    upon confirming there is just one person in the portal.
CONCLUSION:

   Iris recognition is shown to be a reliable and accurate
    biometric technology.



    The biometric iris recognition serves as one of the best
    processes for safe guarding our personal profiles and can be
    applied to any of the access control systems requiring high
    security,hence reducing the crime of using others profiles
    by another person illegally.
References:
  www.wikipedia.com
 www.techcrunch.com
www.howstuffworks.com
Iris Recognition: A Biometric Technique for Identification
Iris Recognition: A Biometric Technique for Identification

More Related Content

What's hot

Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION Ankit Kumar
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
8” face recognition temperature scanner - Mairsturnstile.com
8” face recognition temperature scanner - Mairsturnstile.com8” face recognition temperature scanner - Mairsturnstile.com
8” face recognition temperature scanner - Mairsturnstile.comwww.mairsturnstile.com
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication techniqueViraj Rajopadhye
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 

What's hot (20)

Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
8” face recognition temperature scanner - Mairsturnstile.com
8” face recognition temperature scanner - Mairsturnstile.com8” face recognition temperature scanner - Mairsturnstile.com
8” face recognition temperature scanner - Mairsturnstile.com
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 

Viewers also liked

Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card SecurityPrav_Kalyan
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS securityClarejenson
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-defQafis
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Prosthetic hand using Artificial Neural Network
Prosthetic hand using Artificial Neural NetworkProsthetic hand using Artificial Neural Network
Prosthetic hand using Artificial Neural NetworkSreenath S
 
Windows embedded compact 7 overview slide share presentation
Windows embedded compact 7 overview slide share presentationWindows embedded compact 7 overview slide share presentation
Windows embedded compact 7 overview slide share presentationMicrosoft Windows Embedded
 
Organic light emitting diode (oled)
Organic light emitting diode (oled)Organic light emitting diode (oled)
Organic light emitting diode (oled)manvithkumar840
 
Rameshchaudhari
RameshchaudhariRameshchaudhari
Rameshchaudharirameshc72
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data StorageAl-amin Hossain
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 

Viewers also liked (20)

Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Network security
Network securityNetwork security
Network security
 
Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card based Robust Security System
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
Network security
Network securityNetwork security
Network security
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Autonomous cars
Autonomous carsAutonomous cars
Autonomous cars
 
Prosthetic hand using Artificial Neural Network
Prosthetic hand using Artificial Neural NetworkProsthetic hand using Artificial Neural Network
Prosthetic hand using Artificial Neural Network
 
Windows embedded compact 7 overview slide share presentation
Windows embedded compact 7 overview slide share presentationWindows embedded compact 7 overview slide share presentation
Windows embedded compact 7 overview slide share presentation
 
Organic light emitting diode (oled)
Organic light emitting diode (oled)Organic light emitting diode (oled)
Organic light emitting diode (oled)
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Rameshchaudhari
RameshchaudhariRameshchaudhari
Rameshchaudhari
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data Storage
 
Holographic memory
Holographic memoryHolographic memory
Holographic memory
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 

Similar to Iris Recognition: A Biometric Technique for Identification

49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System Sadan Khan
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 

Similar to Iris Recognition: A Biometric Technique for Identification (20)

Iris recognition
Iris recognitionIris recognition
Iris recognition
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Dh24703708
Dh24703708Dh24703708
Dh24703708
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 

Iris Recognition: A Biometric Technique for Identification

  • 1. VIDYA BHARATHI INSTITUTE OF TECHNOLOGY PAPER PRESENTATION ON Iris Recognition of a Biometric Technique BY D.MADHAVI, B.SRAVANI, ECE II yr, ECE II yr, madhavi.donthi@yahoo.com bobbalasravani@yahoo.com
  • 2. Topics of Discussion  Introduction  IRIS identification process  IRIS identification system  Method of IRIS identification  Function of IRIS scanner  properties of IRIS  Applications of IRIS recognition  Advantages and Disadvantages  Conclusion
  • 4. WHY WE GO FOR IRIS TECHNOLOGY?
  • 5. IRIS identification process Acquisition Image Localization IrisCode Gabor Filters Polar Representation Demarcated Zones
  • 6. IRIS IDENTIFICATIONSYSTEM: There are two types of methods 1. Active iris system: requires that a user be anywhere from six to 14 inches away from the camera. 2. Passive iris system: allows the user to be anywhere from one to three feet away from the camera.
  • 7. FUNCTION OF IRIS SCANNER:  The user places himself so that he can see his own eye's reflection in the device.  Verification time is generally less than 5 seconds, though the user will only need to look into the device for a couple moments.  A template iris pattern code contains between 256 and 512 bytes of data depending upon the manufacturer.  Using a camera it converts the small details in the iris stromal pattern into a bit pattern.
  • 8. IRIS IDENTIFICATION STEPS There are four simple steps that follow:  A person stands in from of the iris identification system, between one and three feet away, while a wide-angle camera calculates the position of they eye.  A second camera zooms in on the eye and takes a black and white image.  Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like and "eyeprint".  The captured image, or "eyeprint" is checked against a previously stored reference template in the database.
  • 9. Hamming code  a Hamming code is a linear error-correcting code named after its inventor, Richard Hamming. Hamming codes can detect and correct single-bit errors, and can detect (but not correct) double-bit errors. In other words, the Hamming distance between the transmitted and received code-words must be zero or one for reliable communication.
  • 10. Properties of the iris  Has highly distinguishing texture  Right eye differs from left eye  Twins have different iris texture  Not trivial to capture quality image  + Works well with cooperative subjects  + Used in many airports in the world
  • 11. ADVANTAGES:  Each iris is unique.  High recognition performance and high reliability.  Fast authentication within seconds.  The iris remains stable throughout ones life. Medical advances such as refractive surgery, cataract surgery and cornea transplants do not change the iris' characteristics.
  • 12. DISADVANTAGES: × Iris scanning is incompatible with the substantial investment. × Iris recognition is very difficult to perform at a larger distance . × Iris recognition is susceptible to poor image quality, with associated failure to enroll rates.
  • 13. APPLICATIONS:  Database access and computer login.  The iris-recognition software is implemented for security purposes around the airport terminal ,which was designed to allow only authorized people to enter certain areas.  To stop this practice- the first door opens upon iris recognition and then closes behind the person, leaving them in a small portal. The next door will only open upon confirming there is just one person in the portal.
  • 14. CONCLUSION:  Iris recognition is shown to be a reliable and accurate biometric technology.  The biometric iris recognition serves as one of the best processes for safe guarding our personal profiles and can be applied to any of the access control systems requiring high security,hence reducing the crime of using others profiles by another person illegally.
  • 15. References: www.wikipedia.com www.techcrunch.com www.howstuffworks.com