1 / 27

IRIS Biometric for Person Identification

IRIS Biometric for Person Identification. By Lakshmi Supriya.D

paul2
Télécharger la présentation

IRIS Biometric for Person Identification

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

  2. What are Biometrics? • Why are Biometrics used? • How Biometrics is today?

  3. Iris • Iris is the area of the eye where the pigmented or colored circle,usually brown, blue, rings the dark pupil of the eye.

  4. Example of iris Normal Eye

  5. Example of 10 Different People Iris

  6. Exciting Biometrics • Fingerprint Recognition • Voice Recognition • Signature Recognition • Face Recognition • Palm Recognition

  7. Fingerprint Recognition • This relies on the fact that a fingerprint’s uniqueness can be defined by analyzing the minutiae of a human being. • Two individuals having the same fingerprint is less than one in a billion.

  8. Voice Recognition • The person to be identified is usually pronounce a designated password or phrase, which facilitates the verification process. • But has the weakness of technology

  9. Signature Recognition • This is done by analyzing the shape, speed, stroke, pen pressure and timing information during the act of signing. • Dynamic signature verification is a replacement.

  10. Face Recognition • To identify any person we generally look at face and eyes in particular seem to tell a story how the person feels. • Face recognition is a kind of electronic unmasking

  11. Palm Recognition • The image of the hand is collected and the feature vectors are extracted and compared with the database feature vectors.

  12. Iris Recognition systems • The iris-scan process begins with a photograph. A specialized camera, typically very close to the subject, not more than three feet, uses an infrared imager to illuminate the eye and capture a very high-resolution photograph. This process takes 1 to 2 seconds.

  13. Creating an Iris code • The picture of eye first is processed by software that localizes the inner and outer boundaries of the iris. • And it is encoded by image-processing technologies.

  14. Iris recognition • In less than few seconds, even on a database of millions of records, the iris code template generated from a live image is compared to previously enrolled ones to see if it matches to any of them.

  15. Major characteristics of iris recognition • Iris is thin membrane on the interior of the eyeball. • Iris pattern remains unchanged after the age of two and does not degrade overtime or with the environment. • Iris patterns are extremely complex than other biometric patterns

  16. Typical iris system configuration for taking a picture • An iris recognition camera takes a black and white picture from 5 to 24 inches away. • The camera uses non-invasive, near-infrared illumination that is barely visible and very safe. • And this iris recognition cannot take place without the person permission

  17. Example of iris recognition system Gate device Management device reference Register Lan

  18. Typical iris system configuration Uniform distribution Stored templates Reject Pre processing Feature-extraction Identification Verification Accept Iris scan 2d image capture Iris localization Transform representation comparison enrolment Authentication

  19. Techniques used • Iris Localization • Iris Normalization • Image Enhancement

  20. Iris Localization • Both the inner boundary and the outer boundary of a typical iris can be taken as circles. But the two circles are usually not co-centric. Compared with the other part of the eye, the pupil is much darker. We detect the inner boundary between the pupil and the iris. The outer boundary of the iris is more difficult to detect because of the low contrast between the two sides of the boundary. We detect the outer boundary by maximizing changes of the perimeter- normalized along the circle. The technique is found to be efficient and effective.

  21. Iris Normalization • The size of the pupil may change due to the variation of the illumination and the associated elastic deformations in the iris texture may interface with the results of pattern matching. For the purpose of accurate texture analysis, it is necessary to compensate this deformation. Since both the inner and outer boundaries of the iris have been detected, it is easy to map the iris ring to a rectangular block of texture of a fixed size.

  22. Image Enhancement • Theoriginal image has low contrast and may have non-uniform illumination caused by the position of the light source. These may impair the result of the texture analysis. We enhance the iris image reduce the effect of non-uniform illumination.

  23. Iris preprocessing: (a) original eye (b) iris localization ( c ) iris normalization (d) image enhancement

  24. Comparison Of Iris Recognition With Other Biometrics • Accurate • Stability • Fast • Scalable

  25. Comparison MisIdentific--ation rate Security Applications Method Coded Pattern 1/1,200,000 Iris pattern High high-security Iris fingerprints Fingerprint Medium 1/1,000 Universal Voice characteristics voice Low 1/30 Telephone service Shape of letters, writing Order, pen pressure Signature Low Low-security 1/100 Outline, shape & distribution of eyes, nose Face 1/100 Low Low-security size, length, & thickness hands Low Palm 1/700 Low-security

  26. Analysis • Current Uses • Future Uses

  27. References • Y.Zhu,T.Tan and Y.Wang,”Biometric Identification Based on Iris Pattern”. • Anil K Jain,”Biometric Authentication: How Do I Know Who You Are”. • D Maltoni, D.Maio, Anil K Jain, and S prabhakar”Handbook of Finger print Recognition”.

More Related