SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Biometrics is the science of measuring physical or
anatomical characteristics of individuals.
It performs automatic identification of a person based on
his/her physiological characteristics.
Among the features measured are face, fingerprints,
handwriting, iris, retinal, vein, and voice. Biometric
technologies are becoming the foundation of an extensive
array of highly secure identification and personal verification
solutions.
INTRODUCTION TO IRIS
 Iris is the area of the eye where the pigmented or
colored circle, usually brown, blue, rings the dark pupil
of the eye.
 It is the colored portion of the eye that regulates the size
of the pupil.
 Has unique complex and random patterns which can
be seen from some distance.
 Iris recognition is an automated method of biometric
identification that uses mathematical pattern-
recognition techniques on the images of the irises of an
individual's eyes, whose complex random patterns are
Steps followed In
A person stands in front of the iris identification system,
between one or three feet away, while a wide angle
camera calculates the position of their eye.
A second camera zooms in on the eye and takes a black
and white image.
Once the iris is in focus, it overlays a circular grid on the
image of the iris and identifies the light and dark areas,
like an “eye print”.
To prevent a fake eye from being used to fool system,
these devices may vary the light shine into the eye and
watch for pupil dilation
DEVICES USED FOR IRIS
SCANNING
Working Of Iris Technology
The iris identification program may be
divided into four main functional
blocks:
1.Image Acquisition.
2.Preprocessing.
3.Image Analysis.
merits
Externally visible highly protected internal organ.
Unique patterns.
Not genetically connected unlike eye color.
Probability of matching of iris pattern is 1:10^78.
Stable with age.
Impossible to alter surgically.
Living Password, Can not be forgotten or copied.
Works on blind person.
User needs not to touch appliances.
Accurate faster and supports large data base.
Disadvantages
Accuracy changes with user’s height ,illumination ,image
quality etc.
Person needs to be still, difficult to scan if not co-operated.
Risk of fake Iris lenses.
Alcohol consumption causes deformation in Iris pattern
Easily fooled by presenting a high-quality photograph of a
face instead of a real face; unsuitable for unsupervised
applications.
Need of live tissue verification technology.
Expensive
APPLICATIONS
Computer login: the iris as a living password.
National border controls: the iris as a living passport.
Driving licenses and personal certificates.
Internet security, control of access to privileged
information.
Premises access control (Home, Office, Laboratory).
Anti-terrorism (e.g. security screening at airports)
Financial Transactions (electronic commerce and
banking).
Secure accesses to bank cash machine accounts.
Credit-card authentication.
Automobile ignition and unlocking; anti-theft devices
CONCLUSION
Highly accurate but easy
Fast
Has some drawbacks
Needs some developments
Experiments are going on
Will become day to day technology
very soon.
Iris ppt

Weitere ähnliche Inhalte

Was ist angesagt?

Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognitionAhmed Tememe
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYgeothomas18
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
The bionic eye
The bionic eyeThe bionic eye
The bionic eyesoumyaalma
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication techniqueViraj Rajopadhye
 

Was ist angesagt? (20)

Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGY
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
The bionic eye
The bionic eyeThe bionic eye
The bionic eye
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
BIONIC EYE
BIONIC EYEBIONIC EYE
BIONIC EYE
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 

Andere mochten auch

An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi MkindiImmune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi MkindiMkindi Mkindi
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
TB-HIV Co-infection Treatment
TB-HIV Co-infection TreatmentTB-HIV Co-infection Treatment
TB-HIV Co-infection TreatmentHopkinsCFAR
 
Anatomy of uvea
Anatomy of uveaAnatomy of uvea
Anatomy of uveaBarun Garg
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
The Bermuda triangle
 The Bermuda triangle The Bermuda triangle
The Bermuda triangleSri Harati K
 
oppurtunistic infection in HIV/AIDS AND IRIS
oppurtunistic infection in HIV/AIDS AND  IRISoppurtunistic infection in HIV/AIDS AND  IRIS
oppurtunistic infection in HIV/AIDS AND IRISBhupendra Shah
 
Anatomy of Uvea track
Anatomy of Uvea trackAnatomy of Uvea track
Anatomy of Uvea trackLhacha
 
HIV and TB coinfection
HIV and TB coinfectionHIV and TB coinfection
HIV and TB coinfectionswati2084
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation HadoopVarun Narang
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 

Andere mochten auch (20)

An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi MkindiImmune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Anatomy of iris
Anatomy of irisAnatomy of iris
Anatomy of iris
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Blue brain
Blue brainBlue brain
Blue brain
 
TB-HIV Co-infection Treatment
TB-HIV Co-infection TreatmentTB-HIV Co-infection Treatment
TB-HIV Co-infection Treatment
 
Anatomy of uvea
Anatomy of uveaAnatomy of uvea
Anatomy of uvea
 
Uveal tract anatomy
Uveal tract anatomyUveal tract anatomy
Uveal tract anatomy
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
The Bermuda triangle
 The Bermuda triangle The Bermuda triangle
The Bermuda triangle
 
oppurtunistic infection in HIV/AIDS AND IRIS
oppurtunistic infection in HIV/AIDS AND  IRISoppurtunistic infection in HIV/AIDS AND  IRIS
oppurtunistic infection in HIV/AIDS AND IRIS
 
Anatomy of Uvea track
Anatomy of Uvea trackAnatomy of Uvea track
Anatomy of Uvea track
 
HIV and TB coinfection
HIV and TB coinfectionHIV and TB coinfection
HIV and TB coinfection
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Biodiversity PPT
Biodiversity PPTBiodiversity PPT
Biodiversity PPT
 

Ähnlich wie Iris ppt

Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptnaghamallella
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdfPoooi2
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
Iris/Retina Identification System
Iris/Retina Identification SystemIris/Retina Identification System
Iris/Retina Identification SystemNIMITA NELSON
 

Ähnlich wie Iris ppt (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Iris print
Iris print Iris print
Iris print
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Iris/Retina Identification System
Iris/Retina Identification SystemIris/Retina Identification System
Iris/Retina Identification System
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 

Kürzlich hochgeladen

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Kürzlich hochgeladen (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Iris ppt

  • 1.
  • 2. Biometrics is the science of measuring physical or anatomical characteristics of individuals. It performs automatic identification of a person based on his/her physiological characteristics. Among the features measured are face, fingerprints, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.
  • 3. INTRODUCTION TO IRIS  Iris is the area of the eye where the pigmented or colored circle, usually brown, blue, rings the dark pupil of the eye.  It is the colored portion of the eye that regulates the size of the pupil.  Has unique complex and random patterns which can be seen from some distance.  Iris recognition is an automated method of biometric identification that uses mathematical pattern- recognition techniques on the images of the irises of an individual's eyes, whose complex random patterns are
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Steps followed In A person stands in front of the iris identification system, between one or three feet away, while a wide angle camera calculates the position of their eye. A second camera zooms in on the eye and takes a black and white image. Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like an “eye print”. To prevent a fake eye from being used to fool system, these devices may vary the light shine into the eye and watch for pupil dilation
  • 9. DEVICES USED FOR IRIS SCANNING
  • 10. Working Of Iris Technology The iris identification program may be divided into four main functional blocks: 1.Image Acquisition. 2.Preprocessing. 3.Image Analysis.
  • 11. merits Externally visible highly protected internal organ. Unique patterns. Not genetically connected unlike eye color. Probability of matching of iris pattern is 1:10^78. Stable with age. Impossible to alter surgically. Living Password, Can not be forgotten or copied. Works on blind person. User needs not to touch appliances. Accurate faster and supports large data base.
  • 12. Disadvantages Accuracy changes with user’s height ,illumination ,image quality etc. Person needs to be still, difficult to scan if not co-operated. Risk of fake Iris lenses. Alcohol consumption causes deformation in Iris pattern Easily fooled by presenting a high-quality photograph of a face instead of a real face; unsuitable for unsupervised applications. Need of live tissue verification technology. Expensive
  • 13. APPLICATIONS Computer login: the iris as a living password. National border controls: the iris as a living passport. Driving licenses and personal certificates. Internet security, control of access to privileged information. Premises access control (Home, Office, Laboratory). Anti-terrorism (e.g. security screening at airports) Financial Transactions (electronic commerce and banking). Secure accesses to bank cash machine accounts. Credit-card authentication. Automobile ignition and unlocking; anti-theft devices
  • 14. CONCLUSION Highly accurate but easy Fast Has some drawbacks Needs some developments Experiments are going on Will become day to day technology very soon.