SlideShare a Scribd company logo
1 of 15
RAJARSHI RANAJAY SINH
INSTITUTE OF MANAGEMENT
& TECHNOLOGY
Seminar on
IRIS SCAN TECHNOLOGY
Submitted By:-
SANA PARVEEN
ABSTRACT
Biometrics is an automated method of capturing a person’s unique
biological data that distinguishes him or her from another individual. Iris
recognition has emerged as one of the most powerful and accurate
identification techniques in the modern world. It has proven to be most fool
proof technique for the identification of individuals with out the use of
cards, PIN’s and passwords. It facilitates automatic identification where by
electronic transactions or access to places, information or accounts are made
easier, quicker and more secure.
TERMINOLOGY
 INTRODUCTION
 IRIS RECOGNITION
 TOPOLOGY
 ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS
 IRIS AS A POWERFUL IDENTIFIER
 SCIENCE BEHIND THE TECHNOLOGY
 DISADVANTAGES OF USING IRIS FOR INDENTIFICATION
 APPLICATIONS
 IRIS RECOGNITION: ISSUES
 CONCLUSION
INTRODUCTION
In today’s information age it is not difficult to collect data about an individual and use
that information to exercise control over the individual. Individuals generally do not want
others to have personal information about them unless they decide to reveal it. With the
rapid development of technology, it is more difficult to maintain the levels of privacy
citizens knew in the past. In this context, data security has become an inevitable feature.
Conventional methods of identification based on possession of ID cards or
exclusive knowledge like social security number or a password are not altogether
reliable. ID cards can be almost lost, forged or misplaced: passwords can be forgotten.
Biometric technology has now become a viable alternative to traditional identification
systems because of its tremendous accuracy and speed. This paper explores the concept
of Iris recognition which is one of the most popular biometric techniques. This
technology finds applications in diverse fields.
IRIS RECOGNITION
Iris identification technology is a tremendously accurate biometric. Iris recognition
leverages the unique features of the human iris to provide an unmatched identification
technology. So accurate are the algorithms used in iris recognition that the entire planet
could be enrolled in an iris database with only a small chance of false acceptance or false
rejection. The technology addresses the FTE (Failure To Enroll) problems which lessen
the effectiveness of other biometrics. Only the iris recognition technology can be used
effectively and efficiently in large scale identification implementations. The tremendous
accuracy of iris recognition allows it, in many ways, to stand apart from other biometric
technologies.
TOPOLOGY OF IDENTIFICATION METHODS
ANATOMY, PHYSIOLOGY AND DEVELOPMENT
OF THE IRIS
The iris is a protective internal organ of the eye. It is a thin diaphragm stretching across the
anterior portion of the eye and supported by lens. At its base the eye is attached to the eye’s
ciliary body. At the opposite end it opens into a pupil. The cornea and the aqueous
humor in front of the iris protect it from scratches and dirt, the iris is installed in its own
casing. It is a multi layered structure. It has a pigmented layer, which forms a coloring that
surrounds the pupil of the eye. One feature of this pupil is that it dilates or contracts in
accordance with variation in light intensity.
The properties of the iris that enhance its suitability for use in high
confidence identification system are those following:-
1. Extremely data rich physical structure about 400 identifying features
2. Genetic independence no two eyes are the same.
3. Stability over time.
4. Its inherent isolation and protection from the external environment.
5. The impossibility of surgically modifying it without unacceptable risk to vision.
6. Its physiological response to light, which provides one of several natural tests against
artifice.
7. The ease of registering its image at some distance forms a subject without physical
contact. unobtrusively and perhaps inconspicuously
8. It intrinsic polar geometry which imparts a natural co-ordinate system and an origin of
co-ordinates
IRIS AS A POWERFUL IDENTIFIER
SCIENCE BEHIND THE TECHNOLOGY
The design and implementation of a system for automated iris recognition can
be subdivided in to 3.
1. Image acquisition
2. Iris localization and
3. Pattern matching
APPLICATIONS
◊ Computer login: The iris as a living password.
◊ National Border Controls: The iris as a living password.
◊ Telephone call charging without cash, cards or PIN numbers.
◊ Ticket less air travel.
◊ Premises access control (home, office, laboratory etc.).
◊ Driving licenses and other personal certificates.
◊ Entitlements and benefits authentication.
◊ Forensics, birth certificates, tracking missing or wanted person
◊ Credit-card authentication.
◊ Automobile ignition and unlocking; anti-theft devices.
◊ Anti-terrorism (e.g.:— suspect Screening at airports)
◊ Secure financial transaction (e-commerce, banking).
◊ Internet security, control of access to privileged information.
◊ “Biometric—key Cryptography “for encrypting/decrypting messages.
DISADVANTAGES OF USING IRIS FOR
IDENTIFICATION
 Small target (1 cm) to acquire from a distance (1m)
 Located behind a curved, wet, reflecting surface
 Obscured by eyelashes, lenses, reflections
 Partially occluded by eyelids, often drooping
 Deforms non-elastically as pupil changes size
 Illumination should not be visible or bright
 Some negative connotations
Even though conventional methods of identification are indeed
inadequate, the biometric technology is not as pervasive and wide spread as
many of us expect it to be. One of the primary reasons is performance. Issues
affecting performance include accuracy, cost, integrity etc.
The figure illustrates a comparison between coast and accuracy. The cost represented
here is a typical incremental investment needed for accruing a commercially available
biometric sensor and for implementing and identity authentication system.
The biometric system has the disadvantages of being intrusive both
physically and socially. They require the users to position their bodies relative
to the sensor and then pause for a second.
IRIS RECOGNITION: ISSUES
The technology requires a certain amount of user interaction the enroller must hold
still in a certain spot, even if only momentarily. It would be very difficult to enroll or
identify a non-cooperative subject. The eye has to have a certain degree of lighting to
allow the camera to capture the iris; any unusual lighting situation may affect the
ability of the camera to acquire its subject. Lastly, as with any biometric, a backup
plan must be in place if the unit becomes inoperable. Network crashes, power
failure, hardware and software problems are but a few of the possible ways in which a
biometric system would become unusable. Since iris technology is designed to be an
identification technology, the fallback procedures may not be as fully developed as in
a recognition schematic. Though these issues do not reduce the exceptional
effectiveness of iris recognition technology, they must be kept in mind, should a
company decide to implement on iris-based solution.
CONCLUSION
The technical performance capability of the iris recognition process far surpasses that
of any biometric technology now available. Iridian process is defined for rapid
exhaustive search for very large databases: distinctive capability required for
authentication today. The extremely low probabilities of getting a false match enable
the iris recognition algorithms to search through extremely large databases, even of a
national or planetary scale. As iris technology grows less expensive, it could very likely
unseat a large portion of the biometric industry, e-commerce included; its technological
superiority has already allowed it to make significant inroads into identification and
security venues which had been dominated by other biometrics. Iris-based biometric
technology has always been an exceptionally accurate one, and it may soon grow much
more prominent.
Iris Scan

More Related Content

What's hot (20)

Iris ppt
Iris pptIris ppt
Iris ppt
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Abstract for Google glass
Abstract for Google glassAbstract for Google glass
Abstract for Google glass
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Driver detection system_final.ppt
Driver detection system_final.pptDriver detection system_final.ppt
Driver detection system_final.ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 

Viewers also liked

Viewers also liked (12)

IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
An Introduction To Speech Recognition
An Introduction To Speech RecognitionAn Introduction To Speech Recognition
An Introduction To Speech Recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminar
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 

Similar to Iris Scan

Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABijtsrd
 
Iris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfIris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfSachinSadgir1
 

Similar to Iris Scan (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Iris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfIris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdf
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Iris Scan

  • 1. RAJARSHI RANAJAY SINH INSTITUTE OF MANAGEMENT & TECHNOLOGY Seminar on IRIS SCAN TECHNOLOGY Submitted By:- SANA PARVEEN
  • 2. ABSTRACT Biometrics is an automated method of capturing a person’s unique biological data that distinguishes him or her from another individual. Iris recognition has emerged as one of the most powerful and accurate identification techniques in the modern world. It has proven to be most fool proof technique for the identification of individuals with out the use of cards, PIN’s and passwords. It facilitates automatic identification where by electronic transactions or access to places, information or accounts are made easier, quicker and more secure.
  • 3. TERMINOLOGY  INTRODUCTION  IRIS RECOGNITION  TOPOLOGY  ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS  IRIS AS A POWERFUL IDENTIFIER  SCIENCE BEHIND THE TECHNOLOGY  DISADVANTAGES OF USING IRIS FOR INDENTIFICATION  APPLICATIONS  IRIS RECOGNITION: ISSUES  CONCLUSION
  • 4. INTRODUCTION In today’s information age it is not difficult to collect data about an individual and use that information to exercise control over the individual. Individuals generally do not want others to have personal information about them unless they decide to reveal it. With the rapid development of technology, it is more difficult to maintain the levels of privacy citizens knew in the past. In this context, data security has become an inevitable feature. Conventional methods of identification based on possession of ID cards or exclusive knowledge like social security number or a password are not altogether reliable. ID cards can be almost lost, forged or misplaced: passwords can be forgotten. Biometric technology has now become a viable alternative to traditional identification systems because of its tremendous accuracy and speed. This paper explores the concept of Iris recognition which is one of the most popular biometric techniques. This technology finds applications in diverse fields.
  • 5. IRIS RECOGNITION Iris identification technology is a tremendously accurate biometric. Iris recognition leverages the unique features of the human iris to provide an unmatched identification technology. So accurate are the algorithms used in iris recognition that the entire planet could be enrolled in an iris database with only a small chance of false acceptance or false rejection. The technology addresses the FTE (Failure To Enroll) problems which lessen the effectiveness of other biometrics. Only the iris recognition technology can be used effectively and efficiently in large scale identification implementations. The tremendous accuracy of iris recognition allows it, in many ways, to stand apart from other biometric technologies.
  • 7. ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS The iris is a protective internal organ of the eye. It is a thin diaphragm stretching across the anterior portion of the eye and supported by lens. At its base the eye is attached to the eye’s ciliary body. At the opposite end it opens into a pupil. The cornea and the aqueous humor in front of the iris protect it from scratches and dirt, the iris is installed in its own casing. It is a multi layered structure. It has a pigmented layer, which forms a coloring that surrounds the pupil of the eye. One feature of this pupil is that it dilates or contracts in accordance with variation in light intensity.
  • 8. The properties of the iris that enhance its suitability for use in high confidence identification system are those following:- 1. Extremely data rich physical structure about 400 identifying features 2. Genetic independence no two eyes are the same. 3. Stability over time. 4. Its inherent isolation and protection from the external environment. 5. The impossibility of surgically modifying it without unacceptable risk to vision. 6. Its physiological response to light, which provides one of several natural tests against artifice. 7. The ease of registering its image at some distance forms a subject without physical contact. unobtrusively and perhaps inconspicuously 8. It intrinsic polar geometry which imparts a natural co-ordinate system and an origin of co-ordinates IRIS AS A POWERFUL IDENTIFIER
  • 9. SCIENCE BEHIND THE TECHNOLOGY The design and implementation of a system for automated iris recognition can be subdivided in to 3. 1. Image acquisition 2. Iris localization and 3. Pattern matching
  • 10. APPLICATIONS ◊ Computer login: The iris as a living password. ◊ National Border Controls: The iris as a living password. ◊ Telephone call charging without cash, cards or PIN numbers. ◊ Ticket less air travel. ◊ Premises access control (home, office, laboratory etc.). ◊ Driving licenses and other personal certificates. ◊ Entitlements and benefits authentication. ◊ Forensics, birth certificates, tracking missing or wanted person ◊ Credit-card authentication. ◊ Automobile ignition and unlocking; anti-theft devices. ◊ Anti-terrorism (e.g.:— suspect Screening at airports) ◊ Secure financial transaction (e-commerce, banking). ◊ Internet security, control of access to privileged information. ◊ “Biometric—key Cryptography “for encrypting/decrypting messages.
  • 11. DISADVANTAGES OF USING IRIS FOR IDENTIFICATION  Small target (1 cm) to acquire from a distance (1m)  Located behind a curved, wet, reflecting surface  Obscured by eyelashes, lenses, reflections  Partially occluded by eyelids, often drooping  Deforms non-elastically as pupil changes size  Illumination should not be visible or bright  Some negative connotations Even though conventional methods of identification are indeed inadequate, the biometric technology is not as pervasive and wide spread as many of us expect it to be. One of the primary reasons is performance. Issues affecting performance include accuracy, cost, integrity etc.
  • 12. The figure illustrates a comparison between coast and accuracy. The cost represented here is a typical incremental investment needed for accruing a commercially available biometric sensor and for implementing and identity authentication system. The biometric system has the disadvantages of being intrusive both physically and socially. They require the users to position their bodies relative to the sensor and then pause for a second.
  • 13. IRIS RECOGNITION: ISSUES The technology requires a certain amount of user interaction the enroller must hold still in a certain spot, even if only momentarily. It would be very difficult to enroll or identify a non-cooperative subject. The eye has to have a certain degree of lighting to allow the camera to capture the iris; any unusual lighting situation may affect the ability of the camera to acquire its subject. Lastly, as with any biometric, a backup plan must be in place if the unit becomes inoperable. Network crashes, power failure, hardware and software problems are but a few of the possible ways in which a biometric system would become unusable. Since iris technology is designed to be an identification technology, the fallback procedures may not be as fully developed as in a recognition schematic. Though these issues do not reduce the exceptional effectiveness of iris recognition technology, they must be kept in mind, should a company decide to implement on iris-based solution.
  • 14. CONCLUSION The technical performance capability of the iris recognition process far surpasses that of any biometric technology now available. Iridian process is defined for rapid exhaustive search for very large databases: distinctive capability required for authentication today. The extremely low probabilities of getting a false match enable the iris recognition algorithms to search through extremely large databases, even of a national or planetary scale. As iris technology grows less expensive, it could very likely unseat a large portion of the biometric industry, e-commerce included; its technological superiority has already allowed it to make significant inroads into identification and security venues which had been dominated by other biometrics. Iris-based biometric technology has always been an exceptionally accurate one, and it may soon grow much more prominent.