SlideShare una empresa de Scribd logo
1 de 22
IRIS RECOGNITION
SUBMITTED BY
A.ARUNA [1]
V.ELAKKIYA
[2]
III-EEE-’A’
INTRODUCTION TO BIOMETRICS
 Biometric technologies is defined as automated method of identifying or
authenticating the identity of a person based on physiological or behavioural
characteristics.
 Physiological characteristics are more stable and few examples are,
1. Face recognition
2. Finger print recognition
3. Iris recognition
4. DNA recognition
Behavioural characteristics are the reflection of the make up and few examples are,
1. Signatures
2. Voices
IRIS RECOGNITION-WHAT? AND WHY?
 Iris recognition is a method of biometric authentication that uses
pattern recognition techniques based on high-resolution images of
the iris of an individual eyes.
As long as a person has an eye with iris, that eye can be identified
by iris recognition.
 Even the fingerprinting technology allows only 60 to 70 degrees
of freedom.
IRIS SCANNING
With video technology, a camera scans the iris pattern, which
consists of corona, pupil, etc.
 The system then digitizes unique information of the iris from the
photograph and is stored in a database.
To record an individual’s iris code, a black and white video
camera uses approximately 30 frames per second to zoom the eye
and “grab” a sharp and accurate image of the iris.
METHODS OF IRIS
 In identifying one’s iris, there are 2 methods for its recognition
and are,
1. Active
2. Passive
 The active Iris system requires that a user be anywhere from six
to fourteen inches away from the camera.
The passive system allows the user to be anywhere from one to
three feet away from the camera that locates the focus on the iris.
USAGE OF IRIS RECOGNITION IN THE
VOTING PROCESS
• The voting process consists of,
1. Enrolment of iris pattern
2. Iris scanning of individuals
3. Verification for the identity
4. Permission to vote
5. Voting process
BLOCK DIAGRAM OF IRIS
RECOGNITION IN VOTING PROCESS
ENROLMENT
 Before the election the people has to enrol their iris pattern at the
district head quarters, municipal office , etc.
 This registration can be done once throughout the life.
 The distance between the camera and the human eye can be 4 to
24 inches.
 In the entire process, the enrolment stage needs human work.
IRIS CODE GENERATION
The iris pattern is encoded after the unnecessary parts have been
discounted and this process is called as demodulation and it creates a
phase code.
 The phase sequence is called an iris code template, and it captures
the unique features of an that allows easy and rapid comparisons
against large databases of other templates and is encrypted.
VERIFICATION
 In less than few seconds, even on a database of millions of
records, the iris code template is generated from a live image is
compared to previously enrolled ones to see if it matches any of
them.
HOW INDIVIDUAL IRIS IS
IDENTIFIED?
PERMISSION AND VOTING PROCESS
PERMISSION::
 The server provided at the polling station will verify the iris code
with the database and then it verifies whether they had already
voted.
VOTING::
After getting the permission from the server the person can vote
by pressing the keys and the pre recorded voice message will help to
select the candidate.
FLOWCHART FOR PERMISSION TO
VOTE
SPECIALISATION OF IRIS OVER OTHER
RECOGNITION TECHNIQUE
 It uses camera technology, with suitable infra-red illumination
reducing reflection from the convex cornea, to create images of rich
structures of iris.
 Because of its speed of comparison, iris recognition is the only
biometric technology well-suited for one-to-many identification.
ADVANTAGES OF IRIS RECOGNITION
Time saving.
Election malpractices can be stopped.
 Imitation is not possible and pattern cannot be changed without
risking the eye.
 High accuracy rate.
DISADVANTAGES OF IRIS RECOGNITION
 Iris recognition is very difficult to perform at a distance larger
than a few meters.
 Irises are not typically deposited by people at crime scenes, and
so are not useful as fingerprints and DNA for forensic
identification.
 Optical readers are difficult to operate requiring advanced
training for employees.
APPLICATIONS OF IRIS RECOGNITION
 All foreign nationals who posses a visa to enter the UAE(United
Arab Emirates) are processed through iris cameras.
 One of the three biometric identification technologies
internationally standardized by ICAO for use in future passports (the
other two are finger print and face recognition).
 At Schiphol Airport, Netherlands, iris recognition has permitted
passport-free immigration since 2001.
APPLICATION OF IRIS SCANNING
FOR BAGHDAD REFUGEES
ADVANTAGES OVER FINGERPRINT SCANNING:
 There is no need for the person to be identified to touch any
equipment that has recently been touched by a stranger, thereby
eliminating an objection that has been raised in some cultures
against fingerprint scanners, where a finger has to touch a surface or
retinal scanning, where the eye can be brought very close to a lens
(like looking into a microscope lens).
NO TWO IRISES ARE ALIKE:
 No two irises are alike, not even in one individual or identical
twins.
 The iris consists of over 400 different characteristics.
 Compared to the 40 or 50 points of distinct finger print
characteristics, the iris has more than 250 distinct features.
 Hence, iris scanning is much more accurate than fingerprints
or even DNA analysis of the different features.
REFERENCES
1.S.Prabhakar, S.Pankanti and A.K.Jain,”Biomertric
recognition security and privacy concerns”, IEEE
security and privacy magazine, vol.1,No.2, pp.33-42,
2003.
2.D.Maltoni, D.Maio, A.K.Jain and S.Prabhakar,
Handbook of fingerprint recognition, springer. NY,
2003.
3.Electronics for you
4.Wikipedia
5. A.K.Jain, R.Bolle and S.Pankanti(editors),
Biometrics: personal identification in networked
society, kluwer academic publishers, 1999.
THANK YOU

Más contenido relacionado

La actualidad más candente

Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION Ankit Kumar
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation SystemMohamed Refaei
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognitionAhmed Tememe
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 

La actualidad más candente (20)

Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation System
 
Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 

Destacado

Mobile voting by using biometrics
Mobile  voting  by  using biometricsMobile  voting  by  using biometrics
Mobile voting by using biometricsJEEVA ARAVINTH
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)vasim hasina
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting TechnologyGautam Kumar
 
The Inbuilt Password Iris Final
The Inbuilt Password Iris FinalThe Inbuilt Password Iris Final
The Inbuilt Password Iris FinalSwarupKulkarni
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Waqas Tariq
 
Cryptography and Voting
Cryptography and VotingCryptography and Voting
Cryptography and VotingBen Adida
 
Idea or opportunity?
Idea or opportunity?Idea or opportunity?
Idea or opportunity?Grow America
 
Simha_23_REFFIT_Biochar_ICT_Published Version
Simha_23_REFFIT_Biochar_ICT_Published VersionSimha_23_REFFIT_Biochar_ICT_Published Version
Simha_23_REFFIT_Biochar_ICT_Published VersionPrithvi Simha
 
When Ideas and Opportunities Collide
When Ideas and Opportunities CollideWhen Ideas and Opportunities Collide
When Ideas and Opportunities CollideGrow America
 
The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012Philip Polstra
 
CERTH @ MediaEval 2012 Social Event Detection Task
CERTH @ MediaEval 2012 Social Event Detection TaskCERTH @ MediaEval 2012 Social Event Detection Task
CERTH @ MediaEval 2012 Social Event Detection TaskMediaEval2012
 
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012MediaEval2012
 
Working Notes for the Placing Task at MediaEval 2012
Working Notes for the Placing Task at MediaEval 2012Working Notes for the Placing Task at MediaEval 2012
Working Notes for the Placing Task at MediaEval 2012MediaEval2012
 
Mentor Strategy Session: Business Plan and Video
Mentor Strategy Session: Business Plan and VideoMentor Strategy Session: Business Plan and Video
Mentor Strategy Session: Business Plan and VideoGrow America
 
The Watershed-based Social Events Detection Method with Support from External...
The Watershed-based Social Events Detection Method with Support from External...The Watershed-based Social Events Detection Method with Support from External...
The Watershed-based Social Events Detection Method with Support from External...MediaEval2012
 
MediaEval 2012 Opening
MediaEval 2012 OpeningMediaEval 2012 Opening
MediaEval 2012 OpeningMediaEval2012
 

Destacado (20)

Mobile voting by using biometrics
Mobile  voting  by  using biometricsMobile  voting  by  using biometrics
Mobile voting by using biometrics
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
Online votinh
Online votinh Online votinh
Online votinh
 
The Inbuilt Password Iris Final
The Inbuilt Password Iris FinalThe Inbuilt Password Iris Final
The Inbuilt Password Iris Final
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
 
Cryptography and Voting
Cryptography and VotingCryptography and Voting
Cryptography and Voting
 
Idea or opportunity?
Idea or opportunity?Idea or opportunity?
Idea or opportunity?
 
Simha_23_REFFIT_Biochar_ICT_Published Version
Simha_23_REFFIT_Biochar_ICT_Published VersionSimha_23_REFFIT_Biochar_ICT_Published Version
Simha_23_REFFIT_Biochar_ICT_Published Version
 
When Ideas and Opportunities Collide
When Ideas and Opportunities CollideWhen Ideas and Opportunities Collide
When Ideas and Opportunities Collide
 
Thotcon2013
Thotcon2013Thotcon2013
Thotcon2013
 
The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012
 
CERTH @ MediaEval 2012 Social Event Detection Task
CERTH @ MediaEval 2012 Social Event Detection TaskCERTH @ MediaEval 2012 Social Event Detection Task
CERTH @ MediaEval 2012 Social Event Detection Task
 
Closing
ClosingClosing
Closing
 
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012
 
Working Notes for the Placing Task at MediaEval 2012
Working Notes for the Placing Task at MediaEval 2012Working Notes for the Placing Task at MediaEval 2012
Working Notes for the Placing Task at MediaEval 2012
 
Mentor Strategy Session: Business Plan and Video
Mentor Strategy Session: Business Plan and VideoMentor Strategy Session: Business Plan and Video
Mentor Strategy Session: Business Plan and Video
 
The Watershed-based Social Events Detection Method with Support from External...
The Watershed-based Social Events Detection Method with Support from External...The Watershed-based Social Events Detection Method with Support from External...
The Watershed-based Social Events Detection Method with Support from External...
 
MediaEval 2012 Opening
MediaEval 2012 OpeningMediaEval 2012 Opening
MediaEval 2012 Opening
 

Similar a Iris by @run@$uj! final

Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4sakshi_20
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 

Similar a Iris by @run@$uj! final (20)

Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Iris print
Iris print Iris print
Iris print
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Iris by @run@$uj! final

  • 1. IRIS RECOGNITION SUBMITTED BY A.ARUNA [1] V.ELAKKIYA [2] III-EEE-’A’
  • 2. INTRODUCTION TO BIOMETRICS  Biometric technologies is defined as automated method of identifying or authenticating the identity of a person based on physiological or behavioural characteristics.  Physiological characteristics are more stable and few examples are, 1. Face recognition 2. Finger print recognition 3. Iris recognition 4. DNA recognition Behavioural characteristics are the reflection of the make up and few examples are, 1. Signatures 2. Voices
  • 3. IRIS RECOGNITION-WHAT? AND WHY?  Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the iris of an individual eyes. As long as a person has an eye with iris, that eye can be identified by iris recognition.  Even the fingerprinting technology allows only 60 to 70 degrees of freedom.
  • 4. IRIS SCANNING With video technology, a camera scans the iris pattern, which consists of corona, pupil, etc.  The system then digitizes unique information of the iris from the photograph and is stored in a database. To record an individual’s iris code, a black and white video camera uses approximately 30 frames per second to zoom the eye and “grab” a sharp and accurate image of the iris.
  • 5. METHODS OF IRIS  In identifying one’s iris, there are 2 methods for its recognition and are, 1. Active 2. Passive  The active Iris system requires that a user be anywhere from six to fourteen inches away from the camera. The passive system allows the user to be anywhere from one to three feet away from the camera that locates the focus on the iris.
  • 6. USAGE OF IRIS RECOGNITION IN THE VOTING PROCESS • The voting process consists of, 1. Enrolment of iris pattern 2. Iris scanning of individuals 3. Verification for the identity 4. Permission to vote 5. Voting process
  • 7. BLOCK DIAGRAM OF IRIS RECOGNITION IN VOTING PROCESS
  • 8. ENROLMENT  Before the election the people has to enrol their iris pattern at the district head quarters, municipal office , etc.  This registration can be done once throughout the life.  The distance between the camera and the human eye can be 4 to 24 inches.  In the entire process, the enrolment stage needs human work.
  • 9. IRIS CODE GENERATION The iris pattern is encoded after the unnecessary parts have been discounted and this process is called as demodulation and it creates a phase code.  The phase sequence is called an iris code template, and it captures the unique features of an that allows easy and rapid comparisons against large databases of other templates and is encrypted.
  • 10. VERIFICATION  In less than few seconds, even on a database of millions of records, the iris code template is generated from a live image is compared to previously enrolled ones to see if it matches any of them.
  • 11. HOW INDIVIDUAL IRIS IS IDENTIFIED?
  • 12. PERMISSION AND VOTING PROCESS PERMISSION::  The server provided at the polling station will verify the iris code with the database and then it verifies whether they had already voted. VOTING:: After getting the permission from the server the person can vote by pressing the keys and the pre recorded voice message will help to select the candidate.
  • 14. SPECIALISATION OF IRIS OVER OTHER RECOGNITION TECHNIQUE  It uses camera technology, with suitable infra-red illumination reducing reflection from the convex cornea, to create images of rich structures of iris.  Because of its speed of comparison, iris recognition is the only biometric technology well-suited for one-to-many identification.
  • 15. ADVANTAGES OF IRIS RECOGNITION Time saving. Election malpractices can be stopped.  Imitation is not possible and pattern cannot be changed without risking the eye.  High accuracy rate.
  • 16. DISADVANTAGES OF IRIS RECOGNITION  Iris recognition is very difficult to perform at a distance larger than a few meters.  Irises are not typically deposited by people at crime scenes, and so are not useful as fingerprints and DNA for forensic identification.  Optical readers are difficult to operate requiring advanced training for employees.
  • 17. APPLICATIONS OF IRIS RECOGNITION  All foreign nationals who posses a visa to enter the UAE(United Arab Emirates) are processed through iris cameras.  One of the three biometric identification technologies internationally standardized by ICAO for use in future passports (the other two are finger print and face recognition).  At Schiphol Airport, Netherlands, iris recognition has permitted passport-free immigration since 2001.
  • 18. APPLICATION OF IRIS SCANNING FOR BAGHDAD REFUGEES
  • 19. ADVANTAGES OVER FINGERPRINT SCANNING:  There is no need for the person to be identified to touch any equipment that has recently been touched by a stranger, thereby eliminating an objection that has been raised in some cultures against fingerprint scanners, where a finger has to touch a surface or retinal scanning, where the eye can be brought very close to a lens (like looking into a microscope lens).
  • 20. NO TWO IRISES ARE ALIKE:  No two irises are alike, not even in one individual or identical twins.  The iris consists of over 400 different characteristics.  Compared to the 40 or 50 points of distinct finger print characteristics, the iris has more than 250 distinct features.  Hence, iris scanning is much more accurate than fingerprints or even DNA analysis of the different features.
  • 21. REFERENCES 1.S.Prabhakar, S.Pankanti and A.K.Jain,”Biomertric recognition security and privacy concerns”, IEEE security and privacy magazine, vol.1,No.2, pp.33-42, 2003. 2.D.Maltoni, D.Maio, A.K.Jain and S.Prabhakar, Handbook of fingerprint recognition, springer. NY, 2003. 3.Electronics for you 4.Wikipedia 5. A.K.Jain, R.Bolle and S.Pankanti(editors), Biometrics: personal identification in networked society, kluwer academic publishers, 1999.