SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
IRIS RECOGNITION
SYSTEM
By: Nileshwari Desai
Roll No: A 216
Outline
• Introduction
• History
• Features
• Database design
• Identification steps
• Feature Extraction
• Matching
• Performance Evaluation
• Advantages
• Concerns/possible improvements
• Disadvantages
• Conclusion
• References
Introduction
• Iris recognition is an automated method
of biometric identification that uses mathematical pattern-
recognition techniques on the images of the irides of an
individual's eyes, whose complex random patterns are
unique and can be seen from some distance.
• Not to be confused with another, less prevalent, ocular-
based technology, retina scanning, iris recognition uses
camera technology with subtle infrared illumination to
acquire images of the detail-rich, intricate structures of the
iris externally visible at the front of the eye.
• Digital templates encoded from these patterns by
mathematical and statistical algorithms allow the
identification of an individual or someone pretending to be
that individual.
History
• The concept of Iris Recognition was first proposed by Dr.
Frank Burch in 1939.
• It was first implemented in 1990 when Dr. John Daugman
created the algorithms for it.
• These algorithms employ methods of pattern recognition
and some mathematical calculations for iris recognition.
• The remarkable story of Sharbat Gula, first photographed in 1984 aged 12 in a
refugee camp in Pakistan by National Geographic (NG) photographer Steve
McCurry, and traced 18 years later to a remote part of Afghanistan where she was
again photographed by McCurry.
• So the NG turned to the inventor of automatic iris recognition, John Daugman at
the University of Cambridge.
John Daugman and the Eyes of Sharbat
Gula
The identifiable features include:
• Furrows
• Coronas
• Stripes
• Striations
• Color of the iris
• Collagenous fibers
• Filaments
• Crypts (darkened areas on the iris)
• Serpentine vasculature
• Pupil ring
• Freckles
Database design
Universality
The iris of the eye has been described as the ideal part of the
human body for biometric identification for several reasons:
• It is an internal organ that is well protected against damage and
wear by a highly transparent and sensitive membrane (the
cornea ). This distinguishes it from fingerprints, which can be
difficult to recognize after years of certain types of manual
labor. The iris is mostly flat, and its geometric configuration is
only controlled by two complementary muscles (the sphincter
pupillae and dilator pupillae) that control the diameter of the
pupil.
• Everybody in the world possess eyes, even the blind person
would have an iris. Blindness would only ruin the retina and not
the iris. Thus, Iris can be considered as universal.
Uniqueness
• Every human being have unique iris pattern. Even two identical twins have different
irises.
Permanence
• Most of the time, people's eyes also remain unchanged after eye surgery, and blind
people can use iris scanners as long as their eyes have irises.
• Even after laser surgery or cataract operation, a person’s iris won’t change for at
least 10 years.
• People's retinas change as they age and not the iris, which helps not to lead to
inaccurate readings.
Robustness
• It should not change with time. Iris is a part of the body which does not change over
until 50 years of age.
Performance
• The performance of the system can be predicted only after gathering all the data
and running FAR, FRR like tests on them. Mostly the system is robust and gives
accurate results.
User’s acceptability
• Iris scanning can seem very futuristic, but at the heart of the system is a
simple CCD digital camera. It uses both visible and near-infrared light to
take a clear, high-contrast picture of a person's iris. Some people confuse
iris scans with retinal scans. Retinal scans, however, are an older
technology that required a bright light to illuminate a person's retina. The
sensor would then take a picture of the blood vessel structure in the back of
the person's eye. Some people found retinal scans to be uncomfortable and
invasive. People's retinas also change as they age, which could lead to
inaccurate reading.
Collectability
• It is easy to collect the samples. When you look into an iris scanner, your
eye is 3 to 10 inches from the camera. When the camera takes a picture, the
computer locates
-The center of the pupil
-The edge of the pupil
-The edge of the iris
-The eyelids and eyelashes
It then analyzes the patterns in the iris and translates them into a code.
Database collected
• The database has been downloaded/taken from the
CASIA iris image database which is easily accessible. The
version taken is CASIA V2.
• The website link is as follows:-
http://biometrics.idealtest.org/dbDetailForUser.do?id=4
• The irises were scanned by TOPCON TRC50IA optical
device connected with SONY DXC- 950P 3CCD camera.
Parameter Quantity
Total images per person 10
Total number of individuals 20
Total images in the database for left eye 200
Total images in the database for right eye 200
Total database 400
Identification steps
• Localization - The inner and the outer boundaries of the
iris are calculated.
• Normalization - Iris of different people may be captured in
different size, for the same person also size may vary
because of the variation in illumination and other factors.
• Feature extraction - Iris provides abundant texture
information. A feature vector is formed which consists of
the ordered sequence of features extracted from the
various representation of the iris images.
• Matching - The feature vectors are classified through
different thresholding techniques like Euclidean distance,
Hamming Distance, weight vector and winner selection,
dissimilarity function, etc.
Feature extraction
Iris localization
Iris boundaries
localization
approximate
pupil center
detection
Iris boundary
points
detection
Curve fitting
Eye lid
detection
Iris localization
Localized iris boundaries
(a). Using AIPF method.
(b). Using integrodifferential method
(a) (b)
Normalization
I(x,y) is the iris region image, (x,y) and (r,θ) are the cartesian and normalised polar
coordinates respectively, (xp, yp ) and (xi, yi) are the coordinates of pupil and iris
boundaries along θ direction.
(R, θ) to unwrap iris and easily generate a template code.
Encoding- Gabor filter
Gabor filters provide excellent attributes which are suitable to
extract iris features.
σx , σy are the scale parameters of guassian function,
µ, v are frequency parameters of gabor fliter.
Matching
• Euclidean distance has been used to perform matching.
• The database image which gives least Euclidean distance
is identified to belong to the genuine user.
• Matching can also be done by hamming distance, weight
vector, winner selection and dissimilarity function for iris
recognition system.
Performance evaluation
• FAR: measurement of how many imposter users are
falsely accepted into the system as “genuine” users.
• FRR: measurement of how many genuine users are
falsely rejected by the system as “imposters”.
• GAR: overall accuracy, measurement of how many
genuine users are accepted into the system as “genuine”
users.
• GRR: measurement of how many genuine users are
rejected by the system as “imposters” because of some
noise present.
Advantages
• Uniqueness of iris patterns hence improved accuracy.
• Highly protected, internal organ of the eye.
• Stability : Persistence of iris patterns.
• Non-invasive : Relatively easy to be acquired.
• Smaller template size so large databases can be easily
stored and checked.
• Cannot be easily forged or modified.
Concerns / Possible improvements
• Person has to be “physically” present.
• Capture images independent of surroundings and
environment / Techniques for dark eyes.
• Non-ideal iris images.
Pupil dilation Eye rotation Inconsistent iris size
Disadvantages
• It will be difficult to capture an image of handicap people
sitting on wheel chair because the cameras are usually
attached on the wall and capture an image up to a certain
height.
• The iris recognition systems are much costlier than other
biometric technologies.
• If a person is wearing glasses or facing direct sunlight for
quite a while, than it may affect the authentication.
Conclusion
• The applications of iris recognition are rapidly growing in
the field of security, due to it’s high rate of accuracy. This
technology has the potential to take over all other security
techniques, as it provides an hands-free, rapid and
reliable identification process.
References
1. J. Daugman’s web site. URL:
http://www.cl.cam.ac.uk/users/jgd1000/
2. J. Daugman, “High Confidence Visual Recognition of Persons
by a Test of Statistical Independence,” IEEE Trans. on Pattern Analysis
and Machine Intelligence, vol. 15, no. 11, pp. 1148 – 1161, 1993.
3. J. Daugman, United States Patent No. 5,291,560 (issued on
March 1994). Biometric Personal Identification System Based on Iris
Analysis, Washington DC: U.S. Government Printing Office, 1994.
4. J. Daugman, “The Importance of Being Random: Statistical
Principles of Iris Recognition,” Pattern Recognition, vol. 36, no. 2, pp
279-291.
5. R. P. Wildes, “Iris Recognition: An Emerging Biometric
Technology,” Proc. of the IEEE, vol. 85, no. 9, 1997, pp. 1348-1363.
Iris recognition system

Contenu connexe

Tendances

iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognitionAhmed Tememe
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueSunil Kumar Chawla
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning techniqueVenkat Projects
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 

Tendances (20)

Iris recognition
Iris recognitionIris recognition
Iris recognition
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 

En vedette (18)

An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Atm System
Atm SystemAtm System
Atm System
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biodiversity PPT
Biodiversity PPTBiodiversity PPT
Biodiversity PPT
 
Lockerlatest
LockerlatestLockerlatest
Lockerlatest
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
 

Similaire à Iris recognition system

Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
A03640106
A03640106A03640106
A03640106theijes
 
Iris Recognition .pptx
Iris Recognition .pptxIris Recognition .pptx
Iris Recognition .pptxSOMESHJADHWANI
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptnaghamallella
 
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptxApplications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptxAhmed Ali
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 

Similaire à Iris recognition system (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
A03640106
A03640106A03640106
A03640106
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Iris Recognition .pptx
Iris Recognition .pptxIris Recognition .pptx
Iris Recognition .pptx
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptxApplications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris print
Iris print Iris print
Iris print
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Human Retina Identification
Human Retina IdentificationHuman Retina Identification
Human Retina Identification
 

Plus de Nilu Desai

data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacksNilu Desai
 
Adversarial search
Adversarial searchAdversarial search
Adversarial searchNilu Desai
 
collaborative study on the cloud
collaborative study on the cloudcollaborative study on the cloud
collaborative study on the cloudNilu Desai
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS securityNilu Desai
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
deadlock prevention
deadlock preventiondeadlock prevention
deadlock preventionNilu Desai
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactionsNilu Desai
 

Plus de Nilu Desai (7)

data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacks
 
Adversarial search
Adversarial searchAdversarial search
Adversarial search
 
collaborative study on the cloud
collaborative study on the cloudcollaborative study on the cloud
collaborative study on the cloud
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS security
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
deadlock prevention
deadlock preventiondeadlock prevention
deadlock prevention
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
 

Dernier

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Dernier (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Iris recognition system

  • 2. Outline • Introduction • History • Features • Database design • Identification steps • Feature Extraction • Matching • Performance Evaluation • Advantages • Concerns/possible improvements • Disadvantages • Conclusion • References
  • 3.
  • 4. Introduction • Iris recognition is an automated method of biometric identification that uses mathematical pattern- recognition techniques on the images of the irides of an individual's eyes, whose complex random patterns are unique and can be seen from some distance. • Not to be confused with another, less prevalent, ocular- based technology, retina scanning, iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail-rich, intricate structures of the iris externally visible at the front of the eye. • Digital templates encoded from these patterns by mathematical and statistical algorithms allow the identification of an individual or someone pretending to be that individual.
  • 5. History • The concept of Iris Recognition was first proposed by Dr. Frank Burch in 1939. • It was first implemented in 1990 when Dr. John Daugman created the algorithms for it. • These algorithms employ methods of pattern recognition and some mathematical calculations for iris recognition.
  • 6. • The remarkable story of Sharbat Gula, first photographed in 1984 aged 12 in a refugee camp in Pakistan by National Geographic (NG) photographer Steve McCurry, and traced 18 years later to a remote part of Afghanistan where she was again photographed by McCurry. • So the NG turned to the inventor of automatic iris recognition, John Daugman at the University of Cambridge.
  • 7. John Daugman and the Eyes of Sharbat Gula
  • 8. The identifiable features include: • Furrows • Coronas • Stripes • Striations • Color of the iris • Collagenous fibers • Filaments • Crypts (darkened areas on the iris) • Serpentine vasculature • Pupil ring • Freckles
  • 9. Database design Universality The iris of the eye has been described as the ideal part of the human body for biometric identification for several reasons: • It is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane (the cornea ). This distinguishes it from fingerprints, which can be difficult to recognize after years of certain types of manual labor. The iris is mostly flat, and its geometric configuration is only controlled by two complementary muscles (the sphincter pupillae and dilator pupillae) that control the diameter of the pupil. • Everybody in the world possess eyes, even the blind person would have an iris. Blindness would only ruin the retina and not the iris. Thus, Iris can be considered as universal.
  • 10. Uniqueness • Every human being have unique iris pattern. Even two identical twins have different irises. Permanence • Most of the time, people's eyes also remain unchanged after eye surgery, and blind people can use iris scanners as long as their eyes have irises. • Even after laser surgery or cataract operation, a person’s iris won’t change for at least 10 years. • People's retinas change as they age and not the iris, which helps not to lead to inaccurate readings. Robustness • It should not change with time. Iris is a part of the body which does not change over until 50 years of age. Performance • The performance of the system can be predicted only after gathering all the data and running FAR, FRR like tests on them. Mostly the system is robust and gives accurate results.
  • 11. User’s acceptability • Iris scanning can seem very futuristic, but at the heart of the system is a simple CCD digital camera. It uses both visible and near-infrared light to take a clear, high-contrast picture of a person's iris. Some people confuse iris scans with retinal scans. Retinal scans, however, are an older technology that required a bright light to illuminate a person's retina. The sensor would then take a picture of the blood vessel structure in the back of the person's eye. Some people found retinal scans to be uncomfortable and invasive. People's retinas also change as they age, which could lead to inaccurate reading. Collectability • It is easy to collect the samples. When you look into an iris scanner, your eye is 3 to 10 inches from the camera. When the camera takes a picture, the computer locates -The center of the pupil -The edge of the pupil -The edge of the iris -The eyelids and eyelashes It then analyzes the patterns in the iris and translates them into a code.
  • 12. Database collected • The database has been downloaded/taken from the CASIA iris image database which is easily accessible. The version taken is CASIA V2. • The website link is as follows:- http://biometrics.idealtest.org/dbDetailForUser.do?id=4 • The irises were scanned by TOPCON TRC50IA optical device connected with SONY DXC- 950P 3CCD camera.
  • 13.
  • 14. Parameter Quantity Total images per person 10 Total number of individuals 20 Total images in the database for left eye 200 Total images in the database for right eye 200 Total database 400
  • 15. Identification steps • Localization - The inner and the outer boundaries of the iris are calculated. • Normalization - Iris of different people may be captured in different size, for the same person also size may vary because of the variation in illumination and other factors. • Feature extraction - Iris provides abundant texture information. A feature vector is formed which consists of the ordered sequence of features extracted from the various representation of the iris images. • Matching - The feature vectors are classified through different thresholding techniques like Euclidean distance, Hamming Distance, weight vector and winner selection, dissimilarity function, etc.
  • 17. Iris localization Iris boundaries localization approximate pupil center detection Iris boundary points detection Curve fitting Eye lid detection
  • 18. Iris localization Localized iris boundaries (a). Using AIPF method. (b). Using integrodifferential method (a) (b)
  • 19. Normalization I(x,y) is the iris region image, (x,y) and (r,θ) are the cartesian and normalised polar coordinates respectively, (xp, yp ) and (xi, yi) are the coordinates of pupil and iris boundaries along θ direction.
  • 20. (R, θ) to unwrap iris and easily generate a template code.
  • 21. Encoding- Gabor filter Gabor filters provide excellent attributes which are suitable to extract iris features. σx , σy are the scale parameters of guassian function, µ, v are frequency parameters of gabor fliter.
  • 22. Matching • Euclidean distance has been used to perform matching. • The database image which gives least Euclidean distance is identified to belong to the genuine user. • Matching can also be done by hamming distance, weight vector, winner selection and dissimilarity function for iris recognition system.
  • 23. Performance evaluation • FAR: measurement of how many imposter users are falsely accepted into the system as “genuine” users. • FRR: measurement of how many genuine users are falsely rejected by the system as “imposters”. • GAR: overall accuracy, measurement of how many genuine users are accepted into the system as “genuine” users. • GRR: measurement of how many genuine users are rejected by the system as “imposters” because of some noise present.
  • 24. Advantages • Uniqueness of iris patterns hence improved accuracy. • Highly protected, internal organ of the eye. • Stability : Persistence of iris patterns. • Non-invasive : Relatively easy to be acquired. • Smaller template size so large databases can be easily stored and checked. • Cannot be easily forged or modified.
  • 25. Concerns / Possible improvements • Person has to be “physically” present. • Capture images independent of surroundings and environment / Techniques for dark eyes. • Non-ideal iris images. Pupil dilation Eye rotation Inconsistent iris size
  • 26. Disadvantages • It will be difficult to capture an image of handicap people sitting on wheel chair because the cameras are usually attached on the wall and capture an image up to a certain height. • The iris recognition systems are much costlier than other biometric technologies. • If a person is wearing glasses or facing direct sunlight for quite a while, than it may affect the authentication.
  • 27. Conclusion • The applications of iris recognition are rapidly growing in the field of security, due to it’s high rate of accuracy. This technology has the potential to take over all other security techniques, as it provides an hands-free, rapid and reliable identification process.
  • 28. References 1. J. Daugman’s web site. URL: http://www.cl.cam.ac.uk/users/jgd1000/ 2. J. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148 – 1161, 1993. 3. J. Daugman, United States Patent No. 5,291,560 (issued on March 1994). Biometric Personal Identification System Based on Iris Analysis, Washington DC: U.S. Government Printing Office, 1994. 4. J. Daugman, “The Importance of Being Random: Statistical Principles of Iris Recognition,” Pattern Recognition, vol. 36, no. 2, pp 279-291. 5. R. P. Wildes, “Iris Recognition: An Emerging Biometric Technology,” Proc. of the IEEE, vol. 85, no. 9, 1997, pp. 1348-1363.