The document discusses iris recognition as a biometric technique. It provides an overview of iris identification processes including image acquisition, localization, generating an iris code using Gabor filters, and storing the code in a polarized representation. The document outlines the key components of an iris identification system and the steps of iris identification. It discusses properties of the iris like its unique patterns, applications of iris recognition for security, and advantages like reliability while noting disadvantages like requiring close proximity.
1. VIDYA BHARATHI INSTITUTE OF TECHNOLOGY
PAPER PRESENTATION
ON
Iris Recognition of a Biometric Technique
BY
D.MADHAVI, B.SRAVANI,
ECE II yr, ECE II yr,
madhavi.donthi@yahoo.com bobbalasravani@yahoo.com
2. Topics of Discussion
Introduction
IRIS identification process
IRIS identification system
Method of IRIS identification
Function of IRIS scanner
properties of IRIS
Applications of IRIS recognition
Advantages and Disadvantages
Conclusion
5. IRIS identification process
Acquisition Image
Localization
IrisCode Gabor Filters Polar Representation
Demarcated Zones
6. IRIS IDENTIFICATIONSYSTEM:
There are two types of methods
1. Active iris system:
requires that a user be
anywhere from six to 14
inches away from the
camera.
2. Passive iris system:
allows the user to be
anywhere from one to
three feet away from the
camera.
7. FUNCTION OF IRIS SCANNER:
The user places himself so that he
can see his own eye's reflection in the
device.
Verification time is generally less
than 5 seconds, though the user will
only need to look into the device for
a couple moments.
A template iris pattern code contains
between 256 and 512 bytes of data
depending upon the manufacturer.
Using a camera it converts the small
details in the iris stromal pattern into
a bit pattern.
8. IRIS IDENTIFICATION STEPS
There are four simple steps that follow:
A person stands in from of the iris identification system, between one and
three feet away, while a wide-angle camera calculates the position of they
eye.
A second camera zooms in on the eye and takes a black and white image.
Once the iris is in focus, it overlays a circular grid on the image of the iris
and identifies the light and dark areas, like and "eyeprint".
The captured image, or "eyeprint" is checked against a previously stored
reference template in the database.
9. Hamming code
a Hamming code is a linear error-correcting code
named after its inventor, Richard Hamming. Hamming
codes can detect and correct single-bit errors, and can
detect (but not correct) double-bit errors. In other
words, the Hamming distance between the transmitted
and received code-words must be zero or one for
reliable communication.
10. Properties of the iris
Has highly distinguishing texture
Right eye differs from left eye
Twins have different iris texture
Not trivial to capture quality image
+ Works well with cooperative subjects
+ Used in many airports in the world
11. ADVANTAGES:
Each iris is unique.
High recognition performance and high reliability.
Fast authentication within seconds.
The iris remains stable throughout ones life. Medical
advances such as refractive surgery, cataract surgery and
cornea transplants do not change the iris' characteristics.
12. DISADVANTAGES:
× Iris scanning is incompatible with the substantial
investment.
× Iris recognition is very difficult to perform at a larger
distance .
× Iris recognition is susceptible to poor image quality, with
associated failure to enroll rates.
13. APPLICATIONS:
Database access and computer login.
The iris-recognition software is implemented for
security purposes around the airport terminal ,which
was designed to allow only authorized people to enter
certain areas.
To stop this practice- the first door opens upon iris
recognition and then closes behind the person, leaving
them in a small portal. The next door will only open
upon confirming there is just one person in the portal.
14. CONCLUSION:
Iris recognition is shown to be a reliable and accurate
biometric technology.
The biometric iris recognition serves as one of the best
processes for safe guarding our personal profiles and can be
applied to any of the access control systems requiring high
security,hence reducing the crime of using others profiles
by another person illegally.