SlideShare ist ein Scribd-Unternehmen logo
1 von 28
IRIS RECOGNITION 
 Presented by:- 
 Name:-Anurag anand 
 Roll no:-1109633010 
 Branch:-E.T. (7th sem.)
The need for biometrics 
Biometrics consists of methods for uniquely recognizing humans based 
upon one or more intrinsic physical or behavioral traits. 
The need for biometrics: 
o Rapid development in technology 
o Globalization
Biometrics and Iris Scanning
Anatomy of the Human Eye 
• Eye = Camera 
• Cornea bends, refracts, 
and focuses light. 
• Retina = Film for image 
projection (converts image 
into electrical signals). 
• Optical nerve transmits 
signals to the brain.
What is Iris? 
 The coloured ring around the pupil of the eye is called the iris 
,like a snowflake. 
 Controls light levels inside the eye. 
 Tiny muscles that dilate and constrict the pupil size. 
 Divides the front of the eye from the back of the eye. 
 Color comes from melanin. 
brown or black in colour
Individuality of Iris 
Left and right eye irises have distinctive pattern.
Characteristics of Iris 
 Has highly distinguishing texture. 
 Right eye differs from left eye. 
 Twins have different iris texture. 
 Iris pattern remains unchanged after the age of two and does not 
degrade overtime or with the environment. 
 Iris patterns are extremely complex than other biometric patterns.
What Is It? 
. 
Going the layman way the biometric identification of the iris is called as 
“IRIS SCANNING”. 
“Iris recognition is a method of biometric authentication that uses 
pattern-recognition techniques based on high-resolution images of the 
irides of an individual's eyes.”
WHY ? 
400 identifying features 
The iris is a living password 
Artificial duplication is virtually impossible 
Probability of matching of two irises is 1:1078 
Genetic independency 
Its inherent isolation and protection from 
the external environment.
WHEN? 
1936 
• Idea was proposed by ophthalmologist Frank Burch 
1980 
• Appeared in the Bond Films 
1987 
• Aram Safir & leonard Flom patented the idea and asked John 
Dougman to create actual algorithms for that. John Dougman created 
this algorithm and patented that in the same year.. 
1987 
• Licensee Sensar deployed special cameras in ATMs of NCR corps 
1997-1999 
• “Panasonic Authenticam” was ready for use in public places like airports
HOW : THE SCIENCE BEHIND IT
Iris on the Move: Acquisition of 
Images 
To acquire images with sufficient resolution and sharpness to support recognition. 
A. Optics and Camera: 
Human heads are on the order of 15 cm wide. 
In case of a portal, we needed a capture volume width on the order of 20–30 cm. 
More than 200 pixels or more across the iris- Good quality. 
Of 150–200 pixels across the iris – Acceptable quality 
Of 100–150 pixels to be of- Marginal quality. 
B. Illumination: 
The shutter is only open during the strobe to reduce the effect of 
ambient light. 
C. Coarse Segmentation: 
Daugman algorithm expects 640 x 480 images.
Iris Localization 
 Both the inner boundary and the outer boundary of a typical iris can be taken 
as circles. 
 But the two circles are usually not co-centric. 
The inner boundary between the pupil and the iris is detected. 
 The outer boundary of the iris is more difficult to detect because of the low 
contrast between the two sides of the boundary. 
 The outer boundary is detected by maximizing changes of the perimeter-normalized 
along the circle.
Iris Normalization 
 The size of the pupil may change due to the variation of the illumination and the 
associated elastic deformations in the iris texture may interfere with the results of 
pattern matching. 
 Since both the inner and outer boundaries of the iris have been detected, it is 
easy to map the iris ring to a rectangular block of texture of a fixed size. 
14
Pattern Matching 
How closely the produced code matches the encoded features stored in the 
database. 
One technique for comparing two Iris Codes is to use the Hamming distance, 
which is the number of corresponding bits that differ between the two Iris Codes.
Recording of Identities
Iris Recognition System 
Image 
Acquisition Localization 
IrisCode Gabor Filters Polar Representation 
Demarcated Zones
18
Merits 
 Highly protected, internal organ of the eye 
 Externally visible; patterns imaged from a distance 
 Iris patterns possess a high degree of randomness 
Uniqueness: set by combinatorial complexity 
Changing pupil size confirms natural physiology 
 Limited genetic penetrance of iris patterns 
 Patterns apparently stable throughout life. 
 A key advantage of iris recognition is its stability, or template 
longevity, as, barring trauma, a single enrollment can last a lifetime.
Demerits 
 Small target (1 cm) to acquire from a distance (1m) 
 Located behind a curved, wet, reflecting surface 
 Obscured by eyelashes, lenses, reflections 
 Partially occluded by eyelids, often drooping 
 Deforms non-elastically as pupil changes size 
 Illumination should not be visible or bright.
Applications 
 . ATMs 
 .Fugitive track record 
 .Computer login: The iris as a living password. 
 · National Border Controls: The iris as a living password. 
 · Ticket less air travel. 
 · Premises access control (home, office, laboratory etc.). 
 · Driving licenses and other personal certificates. 
 · Entitlements and benefits authentication. 
 · Forensics, birth certificates, tracking missing or wanted person 
 · Credit-card authentication. 
 · Automobile ignition and unlocking; anti-theft devices. 
 · Anti-terrorism (e.g.:— suspect Screening at airports) 
 · Secure financial transaction (e-commerce, banking). 
 · Internet security, control of access to privileged information.
National Geographic: 1984 and 2002
Sharbat Gula 
 The remarkable story of Sharbat Gula, first 
photographed in 1984 aged 12 in a refugee 
camp in Pakistan by National Geographic (NG) 
photographer Steve McCurry, and traced 18 
years later to a remote part of Afghanistan 
where she was again photographed by 
McCurry. 
 So the NG turned to the inventor of automatic 
iris recognition, John Daugman at the 
University of Cambridge. 
 The numbers Daugman got left no question in 
his mind that the eyes of the young Afghan 
refugee and the eyes of the adult Sharbat Gula 
belong to the same person.
John Daugman and the Eyes of 
Sharbat Gula
Iris is seen as the saviour of the UID project in India. 
A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the 
Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and 
U.S. service members.
Comparison 
Method Coded Pattern 
MisIdentific 
--ation rate 
Security Applications 
Iris Iris pattern 1/1,200,0 
00 
High high-security 
Fingerprint fingerprints 
1/1,000 Medium Universal 
voice 
Signature 
Face 
Palm 
Voice 
characteristics 1/30 Low 
Low 
Low 
Low 
Telephone service 
Low-security 
Low-security 
Low-security 
1/10 
0 
1/100 
1/700 
Shape of letters, 
writing 
Order, pen pressure 
Outline, shape & 
distribution of eyes, nose 
size, length, & 
thickness hands
THANK 
YOU
IRIS RECOGNITION

Weitere ähnliche Inhalte

Was ist angesagt?

Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
Sunil Kumar Chawla
 

Was ist angesagt? (20)

Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Retina scan
Retina scanRetina scan
Retina scan
 

Andere mochten auch

Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
Shashank Dhariwal
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
argoncillo
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Andere mochten auch (20)

Iris & Peri-ocular Recognition
Iris & Peri-ocular RecognitionIris & Peri-ocular Recognition
Iris & Peri-ocular Recognition
 
Crypt
CryptCrypt
Crypt
 
Edge detection using evolutionary algorithms new
Edge detection using evolutionary algorithms newEdge detection using evolutionary algorithms new
Edge detection using evolutionary algorithms new
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Cryptography
CryptographyCryptography
Cryptography
 

Ähnlich wie IRIS RECOGNITION

The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
SwarupKulkarni
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
ARUNASUJITHA
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
Karthika Krishna
 

Ähnlich wie IRIS RECOGNITION (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
14 5 b8
14 5 b814 5 b8
14 5 b8
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Iris print
Iris print Iris print
Iris print
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Iris/Retina Identification System
Iris/Retina Identification SystemIris/Retina Identification System
Iris/Retina Identification System
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Dh24703708
Dh24703708Dh24703708
Dh24703708
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 

Kürzlich hochgeladen

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Kürzlich hochgeladen (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

IRIS RECOGNITION

  • 1. IRIS RECOGNITION  Presented by:-  Name:-Anurag anand  Roll no:-1109633010  Branch:-E.T. (7th sem.)
  • 2. The need for biometrics Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. The need for biometrics: o Rapid development in technology o Globalization
  • 4. Anatomy of the Human Eye • Eye = Camera • Cornea bends, refracts, and focuses light. • Retina = Film for image projection (converts image into electrical signals). • Optical nerve transmits signals to the brain.
  • 5. What is Iris?  The coloured ring around the pupil of the eye is called the iris ,like a snowflake.  Controls light levels inside the eye.  Tiny muscles that dilate and constrict the pupil size.  Divides the front of the eye from the back of the eye.  Color comes from melanin. brown or black in colour
  • 6. Individuality of Iris Left and right eye irises have distinctive pattern.
  • 7. Characteristics of Iris  Has highly distinguishing texture.  Right eye differs from left eye.  Twins have different iris texture.  Iris pattern remains unchanged after the age of two and does not degrade overtime or with the environment.  Iris patterns are extremely complex than other biometric patterns.
  • 8. What Is It? . Going the layman way the biometric identification of the iris is called as “IRIS SCANNING”. “Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes.”
  • 9. WHY ? 400 identifying features The iris is a living password Artificial duplication is virtually impossible Probability of matching of two irises is 1:1078 Genetic independency Its inherent isolation and protection from the external environment.
  • 10. WHEN? 1936 • Idea was proposed by ophthalmologist Frank Burch 1980 • Appeared in the Bond Films 1987 • Aram Safir & leonard Flom patented the idea and asked John Dougman to create actual algorithms for that. John Dougman created this algorithm and patented that in the same year.. 1987 • Licensee Sensar deployed special cameras in ATMs of NCR corps 1997-1999 • “Panasonic Authenticam” was ready for use in public places like airports
  • 11. HOW : THE SCIENCE BEHIND IT
  • 12. Iris on the Move: Acquisition of Images To acquire images with sufficient resolution and sharpness to support recognition. A. Optics and Camera: Human heads are on the order of 15 cm wide. In case of a portal, we needed a capture volume width on the order of 20–30 cm. More than 200 pixels or more across the iris- Good quality. Of 150–200 pixels across the iris – Acceptable quality Of 100–150 pixels to be of- Marginal quality. B. Illumination: The shutter is only open during the strobe to reduce the effect of ambient light. C. Coarse Segmentation: Daugman algorithm expects 640 x 480 images.
  • 13. Iris Localization  Both the inner boundary and the outer boundary of a typical iris can be taken as circles.  But the two circles are usually not co-centric. The inner boundary between the pupil and the iris is detected.  The outer boundary of the iris is more difficult to detect because of the low contrast between the two sides of the boundary.  The outer boundary is detected by maximizing changes of the perimeter-normalized along the circle.
  • 14. Iris Normalization  The size of the pupil may change due to the variation of the illumination and the associated elastic deformations in the iris texture may interfere with the results of pattern matching.  Since both the inner and outer boundaries of the iris have been detected, it is easy to map the iris ring to a rectangular block of texture of a fixed size. 14
  • 15. Pattern Matching How closely the produced code matches the encoded features stored in the database. One technique for comparing two Iris Codes is to use the Hamming distance, which is the number of corresponding bits that differ between the two Iris Codes.
  • 17. Iris Recognition System Image Acquisition Localization IrisCode Gabor Filters Polar Representation Demarcated Zones
  • 18. 18
  • 19. Merits  Highly protected, internal organ of the eye  Externally visible; patterns imaged from a distance  Iris patterns possess a high degree of randomness Uniqueness: set by combinatorial complexity Changing pupil size confirms natural physiology  Limited genetic penetrance of iris patterns  Patterns apparently stable throughout life.  A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.
  • 20. Demerits  Small target (1 cm) to acquire from a distance (1m)  Located behind a curved, wet, reflecting surface  Obscured by eyelashes, lenses, reflections  Partially occluded by eyelids, often drooping  Deforms non-elastically as pupil changes size  Illumination should not be visible or bright.
  • 21. Applications  . ATMs  .Fugitive track record  .Computer login: The iris as a living password.  · National Border Controls: The iris as a living password.  · Ticket less air travel.  · Premises access control (home, office, laboratory etc.).  · Driving licenses and other personal certificates.  · Entitlements and benefits authentication.  · Forensics, birth certificates, tracking missing or wanted person  · Credit-card authentication.  · Automobile ignition and unlocking; anti-theft devices.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e-commerce, banking).  · Internet security, control of access to privileged information.
  • 23. Sharbat Gula  The remarkable story of Sharbat Gula, first photographed in 1984 aged 12 in a refugee camp in Pakistan by National Geographic (NG) photographer Steve McCurry, and traced 18 years later to a remote part of Afghanistan where she was again photographed by McCurry.  So the NG turned to the inventor of automatic iris recognition, John Daugman at the University of Cambridge.  The numbers Daugman got left no question in his mind that the eyes of the young Afghan refugee and the eyes of the adult Sharbat Gula belong to the same person.
  • 24. John Daugman and the Eyes of Sharbat Gula
  • 25. Iris is seen as the saviour of the UID project in India. A U.S. Marine Corps Sergeant uses an iris scanner to positively identify a member of the Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and U.S. service members.
  • 26. Comparison Method Coded Pattern MisIdentific --ation rate Security Applications Iris Iris pattern 1/1,200,0 00 High high-security Fingerprint fingerprints 1/1,000 Medium Universal voice Signature Face Palm Voice characteristics 1/30 Low Low Low Low Telephone service Low-security Low-security Low-security 1/10 0 1/100 1/700 Shape of letters, writing Order, pen pressure Outline, shape & distribution of eyes, nose size, length, & thickness hands