SlideShare a Scribd company logo
1 of 15
RAJARSHI RANAJAY SINH
INSTITUTE OF MANAGEMENT
& TECHNOLOGY
Seminar on
IRIS SCAN TECHNOLOGY
Submitted By:-
SANA PARVEEN
ABSTRACT
Biometrics is an automated method of capturing a person’s unique
biological data that distinguishes him or her from another individual. Iris
recognition has emerged as one of the most powerful and accurate
identification techniques in the modern world. It has proven to be most fool
proof technique for the identification of individuals with out the use of
cards, PIN’s and passwords. It facilitates automatic identification where by
electronic transactions or access to places, information or accounts are made
easier, quicker and more secure.
TERMINOLOGY
 INTRODUCTION
 IRIS RECOGNITION
 TOPOLOGY
 ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS
 IRIS AS A POWERFUL IDENTIFIER
 SCIENCE BEHIND THE TECHNOLOGY
 DISADVANTAGES OF USING IRIS FOR INDENTIFICATION
 APPLICATIONS
 IRIS RECOGNITION: ISSUES
 CONCLUSION
INTRODUCTION
In today’s information age it is not difficult to collect data about an individual and use
that information to exercise control over the individual. Individuals generally do not want
others to have personal information about them unless they decide to reveal it. With the
rapid development of technology, it is more difficult to maintain the levels of privacy
citizens knew in the past. In this context, data security has become an inevitable feature.
Conventional methods of identification based on possession of ID cards or
exclusive knowledge like social security number or a password are not altogether
reliable. ID cards can be almost lost, forged or misplaced: passwords can be forgotten.
Biometric technology has now become a viable alternative to traditional identification
systems because of its tremendous accuracy and speed. This paper explores the concept
of Iris recognition which is one of the most popular biometric techniques. This
technology finds applications in diverse fields.
IRIS RECOGNITION
Iris identification technology is a tremendously accurate biometric. Iris recognition
leverages the unique features of the human iris to provide an unmatched identification
technology. So accurate are the algorithms used in iris recognition that the entire planet
could be enrolled in an iris database with only a small chance of false acceptance or false
rejection. The technology addresses the FTE (Failure To Enroll) problems which lessen
the effectiveness of other biometrics. Only the iris recognition technology can be used
effectively and efficiently in large scale identification implementations. The tremendous
accuracy of iris recognition allows it, in many ways, to stand apart from other biometric
technologies.
TOPOLOGY OF IDENTIFICATION METHODS
ANATOMY, PHYSIOLOGY AND DEVELOPMENT
OF THE IRIS
The iris is a protective internal organ of the eye. It is a thin diaphragm stretching across the
anterior portion of the eye and supported by lens. At its base the eye is attached to the eye’s
ciliary body. At the opposite end it opens into a pupil. The cornea and the aqueous
humor in front of the iris protect it from scratches and dirt, the iris is installed in its own
casing. It is a multi layered structure. It has a pigmented layer, which forms a coloring that
surrounds the pupil of the eye. One feature of this pupil is that it dilates or contracts in
accordance with variation in light intensity.
The properties of the iris that enhance its suitability for use in high
confidence identification system are those following:-
1. Extremely data rich physical structure about 400 identifying features
2. Genetic independence no two eyes are the same.
3. Stability over time.
4. Its inherent isolation and protection from the external environment.
5. The impossibility of surgically modifying it without unacceptable risk to vision.
6. Its physiological response to light, which provides one of several natural tests against
artifice.
7. The ease of registering its image at some distance forms a subject without physical
contact. unobtrusively and perhaps inconspicuously
8. It intrinsic polar geometry which imparts a natural co-ordinate system and an origin of
co-ordinates
IRIS AS A POWERFUL IDENTIFIER
SCIENCE BEHIND THE TECHNOLOGY
The design and implementation of a system for automated iris recognition can
be subdivided in to 3.
1. Image acquisition
2. Iris localization and
3. Pattern matching
APPLICATIONS
◊ Computer login: The iris as a living password.
◊ National Border Controls: The iris as a living password.
◊ Telephone call charging without cash, cards or PIN numbers.
◊ Ticket less air travel.
◊ Premises access control (home, office, laboratory etc.).
◊ Driving licenses and other personal certificates.
◊ Entitlements and benefits authentication.
◊ Forensics, birth certificates, tracking missing or wanted person
◊ Credit-card authentication.
◊ Automobile ignition and unlocking; anti-theft devices.
◊ Anti-terrorism (e.g.:— suspect Screening at airports)
◊ Secure financial transaction (e-commerce, banking).
◊ Internet security, control of access to privileged information.
◊ “Biometric—key Cryptography “for encrypting/decrypting messages.
DISADVANTAGES OF USING IRIS FOR
IDENTIFICATION
 Small target (1 cm) to acquire from a distance (1m)
 Located behind a curved, wet, reflecting surface
 Obscured by eyelashes, lenses, reflections
 Partially occluded by eyelids, often drooping
 Deforms non-elastically as pupil changes size
 Illumination should not be visible or bright
 Some negative connotations
Even though conventional methods of identification are indeed
inadequate, the biometric technology is not as pervasive and wide spread as
many of us expect it to be. One of the primary reasons is performance. Issues
affecting performance include accuracy, cost, integrity etc.
The figure illustrates a comparison between coast and accuracy. The cost represented
here is a typical incremental investment needed for accruing a commercially available
biometric sensor and for implementing and identity authentication system.
The biometric system has the disadvantages of being intrusive both
physically and socially. They require the users to position their bodies relative
to the sensor and then pause for a second.
IRIS RECOGNITION: ISSUES
The technology requires a certain amount of user interaction the enroller must hold
still in a certain spot, even if only momentarily. It would be very difficult to enroll or
identify a non-cooperative subject. The eye has to have a certain degree of lighting to
allow the camera to capture the iris; any unusual lighting situation may affect the
ability of the camera to acquire its subject. Lastly, as with any biometric, a backup
plan must be in place if the unit becomes inoperable. Network crashes, power
failure, hardware and software problems are but a few of the possible ways in which a
biometric system would become unusable. Since iris technology is designed to be an
identification technology, the fallback procedures may not be as fully developed as in
a recognition schematic. Though these issues do not reduce the exceptional
effectiveness of iris recognition technology, they must be kept in mind, should a
company decide to implement on iris-based solution.
CONCLUSION
The technical performance capability of the iris recognition process far surpasses that
of any biometric technology now available. Iridian process is defined for rapid
exhaustive search for very large databases: distinctive capability required for
authentication today. The extremely low probabilities of getting a false match enable
the iris recognition algorithms to search through extremely large databases, even of a
national or planetary scale. As iris technology grows less expensive, it could very likely
unseat a large portion of the biometric industry, e-commerce included; its technological
superiority has already allowed it to make significant inroads into identification and
security venues which had been dominated by other biometrics. Iris-based biometric
technology has always been an exceptionally accurate one, and it may soon grow much
more prominent.
Iris Scan

More Related Content

What's hot

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
Abhineet Bhamra
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
12202843
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
Piyush Mittal
 

What's hot (20)

Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Biometrics
BiometricsBiometrics
Biometrics
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 

Viewers also liked (11)

IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
An Introduction To Speech Recognition
An Introduction To Speech RecognitionAn Introduction To Speech Recognition
An Introduction To Speech Recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminar
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 

Similar to Iris Scan

8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
sukanya thatamsetty
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
Karthika Krishna
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
Amit Pandey
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
ijtsrd
 

Similar to Iris Scan (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Iris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfIris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdf
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Iris Scan

  • 1. RAJARSHI RANAJAY SINH INSTITUTE OF MANAGEMENT & TECHNOLOGY Seminar on IRIS SCAN TECHNOLOGY Submitted By:- SANA PARVEEN
  • 2. ABSTRACT Biometrics is an automated method of capturing a person’s unique biological data that distinguishes him or her from another individual. Iris recognition has emerged as one of the most powerful and accurate identification techniques in the modern world. It has proven to be most fool proof technique for the identification of individuals with out the use of cards, PIN’s and passwords. It facilitates automatic identification where by electronic transactions or access to places, information or accounts are made easier, quicker and more secure.
  • 3. TERMINOLOGY  INTRODUCTION  IRIS RECOGNITION  TOPOLOGY  ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS  IRIS AS A POWERFUL IDENTIFIER  SCIENCE BEHIND THE TECHNOLOGY  DISADVANTAGES OF USING IRIS FOR INDENTIFICATION  APPLICATIONS  IRIS RECOGNITION: ISSUES  CONCLUSION
  • 4. INTRODUCTION In today’s information age it is not difficult to collect data about an individual and use that information to exercise control over the individual. Individuals generally do not want others to have personal information about them unless they decide to reveal it. With the rapid development of technology, it is more difficult to maintain the levels of privacy citizens knew in the past. In this context, data security has become an inevitable feature. Conventional methods of identification based on possession of ID cards or exclusive knowledge like social security number or a password are not altogether reliable. ID cards can be almost lost, forged or misplaced: passwords can be forgotten. Biometric technology has now become a viable alternative to traditional identification systems because of its tremendous accuracy and speed. This paper explores the concept of Iris recognition which is one of the most popular biometric techniques. This technology finds applications in diverse fields.
  • 5. IRIS RECOGNITION Iris identification technology is a tremendously accurate biometric. Iris recognition leverages the unique features of the human iris to provide an unmatched identification technology. So accurate are the algorithms used in iris recognition that the entire planet could be enrolled in an iris database with only a small chance of false acceptance or false rejection. The technology addresses the FTE (Failure To Enroll) problems which lessen the effectiveness of other biometrics. Only the iris recognition technology can be used effectively and efficiently in large scale identification implementations. The tremendous accuracy of iris recognition allows it, in many ways, to stand apart from other biometric technologies.
  • 7. ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS The iris is a protective internal organ of the eye. It is a thin diaphragm stretching across the anterior portion of the eye and supported by lens. At its base the eye is attached to the eye’s ciliary body. At the opposite end it opens into a pupil. The cornea and the aqueous humor in front of the iris protect it from scratches and dirt, the iris is installed in its own casing. It is a multi layered structure. It has a pigmented layer, which forms a coloring that surrounds the pupil of the eye. One feature of this pupil is that it dilates or contracts in accordance with variation in light intensity.
  • 8. The properties of the iris that enhance its suitability for use in high confidence identification system are those following:- 1. Extremely data rich physical structure about 400 identifying features 2. Genetic independence no two eyes are the same. 3. Stability over time. 4. Its inherent isolation and protection from the external environment. 5. The impossibility of surgically modifying it without unacceptable risk to vision. 6. Its physiological response to light, which provides one of several natural tests against artifice. 7. The ease of registering its image at some distance forms a subject without physical contact. unobtrusively and perhaps inconspicuously 8. It intrinsic polar geometry which imparts a natural co-ordinate system and an origin of co-ordinates IRIS AS A POWERFUL IDENTIFIER
  • 9. SCIENCE BEHIND THE TECHNOLOGY The design and implementation of a system for automated iris recognition can be subdivided in to 3. 1. Image acquisition 2. Iris localization and 3. Pattern matching
  • 10. APPLICATIONS ◊ Computer login: The iris as a living password. ◊ National Border Controls: The iris as a living password. ◊ Telephone call charging without cash, cards or PIN numbers. ◊ Ticket less air travel. ◊ Premises access control (home, office, laboratory etc.). ◊ Driving licenses and other personal certificates. ◊ Entitlements and benefits authentication. ◊ Forensics, birth certificates, tracking missing or wanted person ◊ Credit-card authentication. ◊ Automobile ignition and unlocking; anti-theft devices. ◊ Anti-terrorism (e.g.:— suspect Screening at airports) ◊ Secure financial transaction (e-commerce, banking). ◊ Internet security, control of access to privileged information. ◊ “Biometric—key Cryptography “for encrypting/decrypting messages.
  • 11. DISADVANTAGES OF USING IRIS FOR IDENTIFICATION  Small target (1 cm) to acquire from a distance (1m)  Located behind a curved, wet, reflecting surface  Obscured by eyelashes, lenses, reflections  Partially occluded by eyelids, often drooping  Deforms non-elastically as pupil changes size  Illumination should not be visible or bright  Some negative connotations Even though conventional methods of identification are indeed inadequate, the biometric technology is not as pervasive and wide spread as many of us expect it to be. One of the primary reasons is performance. Issues affecting performance include accuracy, cost, integrity etc.
  • 12. The figure illustrates a comparison between coast and accuracy. The cost represented here is a typical incremental investment needed for accruing a commercially available biometric sensor and for implementing and identity authentication system. The biometric system has the disadvantages of being intrusive both physically and socially. They require the users to position their bodies relative to the sensor and then pause for a second.
  • 13. IRIS RECOGNITION: ISSUES The technology requires a certain amount of user interaction the enroller must hold still in a certain spot, even if only momentarily. It would be very difficult to enroll or identify a non-cooperative subject. The eye has to have a certain degree of lighting to allow the camera to capture the iris; any unusual lighting situation may affect the ability of the camera to acquire its subject. Lastly, as with any biometric, a backup plan must be in place if the unit becomes inoperable. Network crashes, power failure, hardware and software problems are but a few of the possible ways in which a biometric system would become unusable. Since iris technology is designed to be an identification technology, the fallback procedures may not be as fully developed as in a recognition schematic. Though these issues do not reduce the exceptional effectiveness of iris recognition technology, they must be kept in mind, should a company decide to implement on iris-based solution.
  • 14. CONCLUSION The technical performance capability of the iris recognition process far surpasses that of any biometric technology now available. Iridian process is defined for rapid exhaustive search for very large databases: distinctive capability required for authentication today. The extremely low probabilities of getting a false match enable the iris recognition algorithms to search through extremely large databases, even of a national or planetary scale. As iris technology grows less expensive, it could very likely unseat a large portion of the biometric industry, e-commerce included; its technological superiority has already allowed it to make significant inroads into identification and security venues which had been dominated by other biometrics. Iris-based biometric technology has always been an exceptionally accurate one, and it may soon grow much more prominent.