SlideShare une entreprise Scribd logo
1  sur  28
IRIS RECOGNITION 
 Presented by:- 
 Name:-Anurag anand 
 Roll no:-1109633010 
 Branch:-E.T. (7th sem.)
The need for biometrics 
Biometrics consists of methods for uniquely recognizing humans based 
upon one or more intrinsic physical or behavioral traits. 
The need for biometrics: 
o Rapid development in technology 
o Globalization
Biometrics and Iris Scanning
Anatomy of the Human Eye 
• Eye = Camera 
• Cornea bends, refracts, 
and focuses light. 
• Retina = Film for image 
projection (converts image 
into electrical signals). 
• Optical nerve transmits 
signals to the brain.
What is Iris? 
 The coloured ring around the pupil of the eye is called the iris 
,like a snowflake. 
 Controls light levels inside the eye. 
 Tiny muscles that dilate and constrict the pupil size. 
 Divides the front of the eye from the back of the eye. 
 Color comes from melanin. 
brown or black in colour
Individuality of Iris 
Left and right eye irises have distinctive pattern.
Characteristics of Iris 
 Has highly distinguishing texture. 
 Right eye differs from left eye. 
 Twins have different iris texture. 
 Iris pattern remains unchanged after the age of two and does not 
degrade overtime or with the environment. 
 Iris patterns are extremely complex than other biometric patterns.
What Is It? 
. 
Going the layman way the biometric identification of the iris is called as 
“IRIS SCANNING”. 
“Iris recognition is a method of biometric authentication that uses 
pattern-recognition techniques based on high-resolution images of the 
irides of an individual's eyes.”
WHY ? 
400 identifying features 
The iris is a living password 
Artificial duplication is virtually impossible 
Probability of matching of two irises is 1:1078 
Genetic independency 
Its inherent isolation and protection from 
the external environment.
WHEN? 
1936 
• Idea was proposed by ophthalmologist Frank Burch 
1980 
• Appeared in the Bond Films 
1987 
• Aram Safir & leonard Flom patented the idea and asked John 
Dougman to create actual algorithms for that. John Dougman created 
this algorithm and patented that in the same year.. 
1987 
• Licensee Sensar deployed special cameras in ATMs of NCR corps 
1997-1999 
• “Panasonic Authenticam” was ready for use in public places like airports
HOW : THE SCIENCE BEHIND IT
Iris on the Move: Acquisition of 
Images 
To acquire images with sufficient resolution and sharpness to support recognition. 
A. Optics and Camera: 
Human heads are on the order of 15 cm wide. 
In case of a portal, we needed a capture volume width on the order of 20–30 cm. 
More than 200 pixels or more across the iris- Good quality. 
Of 150–200 pixels across the iris – Acceptable quality 
Of 100–150 pixels to be of- Marginal quality. 
B. Illumination: 
The shutter is only open during the strobe to reduce the effect of 
ambient light. 
C. Coarse Segmentation: 
Daugman algorithm expects 640 x 480 images.
Iris Localization 
 Both the inner boundary and the outer boundary of a typical iris can be taken 
as circles. 
 But the two circles are usually not co-centric. 
The inner boundary between the pupil and the iris is detected. 
 The outer boundary of the iris is more difficult to detect because of the low 
contrast between the two sides of the boundary. 
 The outer boundary is detected by maximizing changes of the perimeter-normalized 
along the circle.
Iris Normalization 
 The size of the pupil may change due to the variation of the illumination and the 
associated elastic deformations in the iris texture may interfere with the results of 
pattern matching. 
 Since both the inner and outer boundaries of the iris have been detected, it is 
easy to map the iris ring to a rectangular block of texture of a fixed size. 
14
Pattern Matching 
How closely the produced code matches the encoded features stored in the 
database. 
One technique for comparing two Iris Codes is to use the Hamming distance, 
which is the number of corresponding bits that differ between the two Iris Codes.
Recording of Identities
Iris Recognition System 
Image 
Acquisition Localization 
IrisCode Gabor Filters Polar Representation 
Demarcated Zones
18
Merits 
 Highly protected, internal organ of the eye 
 Externally visible; patterns imaged from a distance 
 Iris patterns possess a high degree of randomness 
Uniqueness: set by combinatorial complexity 
Changing pupil size confirms natural physiology 
 Limited genetic penetrance of iris patterns 
 Patterns apparently stable throughout life. 
 A key advantage of iris recognition is its stability, or template 
longevity, as, barring trauma, a single enrollment can last a lifetime.
Demerits 
 Small target (1 cm) to acquire from a distance (1m) 
 Located behind a curved, wet, reflecting surface 
 Obscured by eyelashes, lenses, reflections 
 Partially occluded by eyelids, often drooping 
 Deforms non-elastically as pupil changes size 
 Illumination should not be visible or bright.
Applications 
 . ATMs 
 .Fugitive track record 
 .Computer login: The iris as a living password. 
 · National Border Controls: The iris as a living password. 
 · Ticket less air travel. 
 · Premises access control (home, office, laboratory etc.). 
 · Driving licenses and other personal certificates. 
 · Entitlements and benefits authentication. 
 · Forensics, birth certificates, tracking missing or wanted person 
 · Credit-card authentication. 
 · Automobile ignition and unlocking; anti-theft devices. 
 · Anti-terrorism (e.g.:— suspect Screening at airports) 
 · Secure financial transaction (e-commerce, banking). 
 · Internet security, control of access to privileged information.
National Geographic: 1984 and 2002
Sharbat Gula 
 The remarkable story of Sharbat Gula, first 
photographed in 1984 aged 12 in a refugee 
camp in Pakistan by National Geographic (NG) 
photographer Steve McCurry, and traced 18 
years later to a remote part of Afghanistan 
where she was again photographed by 
McCurry. 
 So the NG turned to the inventor of automatic 
iris recognition, John Daugman at the 
University of Cambridge. 
 The numbers Daugman got left no question in 
his mind that the eyes of the young Afghan 
refugee and the eyes of the adult Sharbat Gula 
belong to the same person.
John Daugman and the Eyes of 
Sharbat Gula
Iris is seen as the saviour of the UID project in India. 
A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the 
Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and 
U.S. service members.
Comparison 
Method Coded Pattern 
MisIdentific 
--ation rate 
Security Applications 
Iris Iris pattern 1/1,200,0 
00 
High high-security 
Fingerprint fingerprints 
1/1,000 Medium Universal 
voice 
Signature 
Face 
Palm 
Voice 
characteristics 1/30 Low 
Low 
Low 
Low 
Telephone service 
Low-security 
Low-security 
Low-security 
1/10 
0 
1/100 
1/700 
Shape of letters, 
writing 
Order, pen pressure 
Outline, shape & 
distribution of eyes, nose 
size, length, & 
thickness hands
THANK 
YOU
IRIS RECOGNITION

Contenu connexe

Tendances

Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 

Tendances (20)

implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
PROJECT FINAL PPT
PROJECT FINAL PPTPROJECT FINAL PPT
PROJECT FINAL PPT
 
face recognition
face recognitionface recognition
face recognition
 
The bionic eye
The bionic eyeThe bionic eye
The bionic eye
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 

En vedette

Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
Shashank Dhariwal
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
argoncillo
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

En vedette (20)

Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
 
Crypt
CryptCrypt
Crypt
 
Edge detection using evolutionary algorithms new
Edge detection using evolutionary algorithms newEdge detection using evolutionary algorithms new
Edge detection using evolutionary algorithms new
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Cryptography
CryptographyCryptography
Cryptography
 

Similaire à IRIS RECOGNITION

IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 
The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
SwarupKulkarni
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
ARUNASUJITHA
 

Similaire à IRIS RECOGNITION (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
14 5 b8
14 5 b814 5 b8
14 5 b8
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Iris print
Iris print Iris print
Iris print
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Iris/Retina Identification System
Iris/Retina Identification SystemIris/Retina Identification System
Iris/Retina Identification System
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Dh24703708
Dh24703708Dh24703708
Dh24703708
 

Dernier

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Dernier (20)

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 

IRIS RECOGNITION

  • 1. IRIS RECOGNITION  Presented by:-  Name:-Anurag anand  Roll no:-1109633010  Branch:-E.T. (7th sem.)
  • 2. The need for biometrics Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. The need for biometrics: o Rapid development in technology o Globalization
  • 4. Anatomy of the Human Eye • Eye = Camera • Cornea bends, refracts, and focuses light. • Retina = Film for image projection (converts image into electrical signals). • Optical nerve transmits signals to the brain.
  • 5. What is Iris?  The coloured ring around the pupil of the eye is called the iris ,like a snowflake.  Controls light levels inside the eye.  Tiny muscles that dilate and constrict the pupil size.  Divides the front of the eye from the back of the eye.  Color comes from melanin. brown or black in colour
  • 6. Individuality of Iris Left and right eye irises have distinctive pattern.
  • 7. Characteristics of Iris  Has highly distinguishing texture.  Right eye differs from left eye.  Twins have different iris texture.  Iris pattern remains unchanged after the age of two and does not degrade overtime or with the environment.  Iris patterns are extremely complex than other biometric patterns.
  • 8. What Is It? . Going the layman way the biometric identification of the iris is called as “IRIS SCANNING”. “Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes.”
  • 9. WHY ? 400 identifying features The iris is a living password Artificial duplication is virtually impossible Probability of matching of two irises is 1:1078 Genetic independency Its inherent isolation and protection from the external environment.
  • 10. WHEN? 1936 • Idea was proposed by ophthalmologist Frank Burch 1980 • Appeared in the Bond Films 1987 • Aram Safir & leonard Flom patented the idea and asked John Dougman to create actual algorithms for that. John Dougman created this algorithm and patented that in the same year.. 1987 • Licensee Sensar deployed special cameras in ATMs of NCR corps 1997-1999 • “Panasonic Authenticam” was ready for use in public places like airports
  • 11. HOW : THE SCIENCE BEHIND IT
  • 12. Iris on the Move: Acquisition of Images To acquire images with sufficient resolution and sharpness to support recognition. A. Optics and Camera: Human heads are on the order of 15 cm wide. In case of a portal, we needed a capture volume width on the order of 20–30 cm. More than 200 pixels or more across the iris- Good quality. Of 150–200 pixels across the iris – Acceptable quality Of 100–150 pixels to be of- Marginal quality. B. Illumination: The shutter is only open during the strobe to reduce the effect of ambient light. C. Coarse Segmentation: Daugman algorithm expects 640 x 480 images.
  • 13. Iris Localization  Both the inner boundary and the outer boundary of a typical iris can be taken as circles.  But the two circles are usually not co-centric. The inner boundary between the pupil and the iris is detected.  The outer boundary of the iris is more difficult to detect because of the low contrast between the two sides of the boundary.  The outer boundary is detected by maximizing changes of the perimeter-normalized along the circle.
  • 14. Iris Normalization  The size of the pupil may change due to the variation of the illumination and the associated elastic deformations in the iris texture may interfere with the results of pattern matching.  Since both the inner and outer boundaries of the iris have been detected, it is easy to map the iris ring to a rectangular block of texture of a fixed size. 14
  • 15. Pattern Matching How closely the produced code matches the encoded features stored in the database. One technique for comparing two Iris Codes is to use the Hamming distance, which is the number of corresponding bits that differ between the two Iris Codes.
  • 17. Iris Recognition System Image Acquisition Localization IrisCode Gabor Filters Polar Representation Demarcated Zones
  • 18. 18
  • 19. Merits  Highly protected, internal organ of the eye  Externally visible; patterns imaged from a distance  Iris patterns possess a high degree of randomness Uniqueness: set by combinatorial complexity Changing pupil size confirms natural physiology  Limited genetic penetrance of iris patterns  Patterns apparently stable throughout life.  A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.
  • 20. Demerits  Small target (1 cm) to acquire from a distance (1m)  Located behind a curved, wet, reflecting surface  Obscured by eyelashes, lenses, reflections  Partially occluded by eyelids, often drooping  Deforms non-elastically as pupil changes size  Illumination should not be visible or bright.
  • 21. Applications  . ATMs  .Fugitive track record  .Computer login: The iris as a living password.  · National Border Controls: The iris as a living password.  · Ticket less air travel.  · Premises access control (home, office, laboratory etc.).  · Driving licenses and other personal certificates.  · Entitlements and benefits authentication.  · Forensics, birth certificates, tracking missing or wanted person  · Credit-card authentication.  · Automobile ignition and unlocking; anti-theft devices.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e-commerce, banking).  · Internet security, control of access to privileged information.
  • 23. Sharbat Gula  The remarkable story of Sharbat Gula, first photographed in 1984 aged 12 in a refugee camp in Pakistan by National Geographic (NG) photographer Steve McCurry, and traced 18 years later to a remote part of Afghanistan where she was again photographed by McCurry.  So the NG turned to the inventor of automatic iris recognition, John Daugman at the University of Cambridge.  The numbers Daugman got left no question in his mind that the eyes of the young Afghan refugee and the eyes of the adult Sharbat Gula belong to the same person.
  • 24. John Daugman and the Eyes of Sharbat Gula
  • 25. Iris is seen as the saviour of the UID project in India. A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and U.S. service members.
  • 26. Comparison Method Coded Pattern MisIdentific --ation rate Security Applications Iris Iris pattern 1/1,200,0 00 High high-security Fingerprint fingerprints 1/1,000 Medium Universal voice Signature Face Palm Voice characteristics 1/30 Low Low Low Low Telephone service Low-security Low-security Low-security 1/10 0 1/100 1/700 Shape of letters, writing Order, pen pressure Outline, shape & distribution of eyes, nose size, length, & thickness hands