SlideShare una empresa de Scribd logo
1 de 15
RAJARSHI RANAJAY SINH
INSTITUTE OF MANAGEMENT
& TECHNOLOGY
Seminar on
IRIS SCAN TECHNOLOGY
Submitted By:-
SANA PARVEEN
ABSTRACT
Biometrics is an automated method of capturing a person’s unique
biological data that distinguishes him or her from another individual. Iris
recognition has emerged as one of the most powerful and accurate
identification techniques in the modern world. It has proven to be most fool
proof technique for the identification of individuals with out the use of
cards, PIN’s and passwords. It facilitates automatic identification where by
electronic transactions or access to places, information or accounts are made
easier, quicker and more secure.
TERMINOLOGY
 INTRODUCTION
 IRIS RECOGNITION
 TOPOLOGY
 ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS
 IRIS AS A POWERFUL IDENTIFIER
 SCIENCE BEHIND THE TECHNOLOGY
 DISADVANTAGES OF USING IRIS FOR INDENTIFICATION
 APPLICATIONS
 IRIS RECOGNITION: ISSUES
 CONCLUSION
INTRODUCTION
In today’s information age it is not difficult to collect data about an individual and use
that information to exercise control over the individual. Individuals generally do not want
others to have personal information about them unless they decide to reveal it. With the
rapid development of technology, it is more difficult to maintain the levels of privacy
citizens knew in the past. In this context, data security has become an inevitable feature.
Conventional methods of identification based on possession of ID cards or
exclusive knowledge like social security number or a password are not altogether
reliable. ID cards can be almost lost, forged or misplaced: passwords can be forgotten.
Biometric technology has now become a viable alternative to traditional identification
systems because of its tremendous accuracy and speed. This paper explores the concept
of Iris recognition which is one of the most popular biometric techniques. This
technology finds applications in diverse fields.
IRIS RECOGNITION
Iris identification technology is a tremendously accurate biometric. Iris recognition
leverages the unique features of the human iris to provide an unmatched identification
technology. So accurate are the algorithms used in iris recognition that the entire planet
could be enrolled in an iris database with only a small chance of false acceptance or false
rejection. The technology addresses the FTE (Failure To Enroll) problems which lessen
the effectiveness of other biometrics. Only the iris recognition technology can be used
effectively and efficiently in large scale identification implementations. The tremendous
accuracy of iris recognition allows it, in many ways, to stand apart from other biometric
technologies.
TOPOLOGY OF IDENTIFICATION METHODS
ANATOMY, PHYSIOLOGY AND DEVELOPMENT
OF THE IRIS
The iris is a protective internal organ of the eye. It is a thin diaphragm stretching across the
anterior portion of the eye and supported by lens. At its base the eye is attached to the eye’s
ciliary body. At the opposite end it opens into a pupil. The cornea and the aqueous
humor in front of the iris protect it from scratches and dirt, the iris is installed in its own
casing. It is a multi layered structure. It has a pigmented layer, which forms a coloring that
surrounds the pupil of the eye. One feature of this pupil is that it dilates or contracts in
accordance with variation in light intensity.
The properties of the iris that enhance its suitability for use in high
confidence identification system are those following:-
1. Extremely data rich physical structure about 400 identifying features
2. Genetic independence no two eyes are the same.
3. Stability over time.
4. Its inherent isolation and protection from the external environment.
5. The impossibility of surgically modifying it without unacceptable risk to vision.
6. Its physiological response to light, which provides one of several natural tests against
artifice.
7. The ease of registering its image at some distance forms a subject without physical
contact. unobtrusively and perhaps inconspicuously
8. It intrinsic polar geometry which imparts a natural co-ordinate system and an origin of
co-ordinates
IRIS AS A POWERFUL IDENTIFIER
SCIENCE BEHIND THE TECHNOLOGY
The design and implementation of a system for automated iris recognition can
be subdivided in to 3.
1. Image acquisition
2. Iris localization and
3. Pattern matching
APPLICATIONS
◊ Computer login: The iris as a living password.
◊ National Border Controls: The iris as a living password.
◊ Telephone call charging without cash, cards or PIN numbers.
◊ Ticket less air travel.
◊ Premises access control (home, office, laboratory etc.).
◊ Driving licenses and other personal certificates.
◊ Entitlements and benefits authentication.
◊ Forensics, birth certificates, tracking missing or wanted person
◊ Credit-card authentication.
◊ Automobile ignition and unlocking; anti-theft devices.
◊ Anti-terrorism (e.g.:— suspect Screening at airports)
◊ Secure financial transaction (e-commerce, banking).
◊ Internet security, control of access to privileged information.
◊ “Biometric—key Cryptography “for encrypting/decrypting messages.
DISADVANTAGES OF USING IRIS FOR
IDENTIFICATION
 Small target (1 cm) to acquire from a distance (1m)
 Located behind a curved, wet, reflecting surface
 Obscured by eyelashes, lenses, reflections
 Partially occluded by eyelids, often drooping
 Deforms non-elastically as pupil changes size
 Illumination should not be visible or bright
 Some negative connotations
Even though conventional methods of identification are indeed
inadequate, the biometric technology is not as pervasive and wide spread as
many of us expect it to be. One of the primary reasons is performance. Issues
affecting performance include accuracy, cost, integrity etc.
The figure illustrates a comparison between coast and accuracy. The cost represented
here is a typical incremental investment needed for accruing a commercially available
biometric sensor and for implementing and identity authentication system.
The biometric system has the disadvantages of being intrusive both
physically and socially. They require the users to position their bodies relative
to the sensor and then pause for a second.
IRIS RECOGNITION: ISSUES
The technology requires a certain amount of user interaction the enroller must hold
still in a certain spot, even if only momentarily. It would be very difficult to enroll or
identify a non-cooperative subject. The eye has to have a certain degree of lighting to
allow the camera to capture the iris; any unusual lighting situation may affect the
ability of the camera to acquire its subject. Lastly, as with any biometric, a backup
plan must be in place if the unit becomes inoperable. Network crashes, power
failure, hardware and software problems are but a few of the possible ways in which a
biometric system would become unusable. Since iris technology is designed to be an
identification technology, the fallback procedures may not be as fully developed as in
a recognition schematic. Though these issues do not reduce the exceptional
effectiveness of iris recognition technology, they must be kept in mind, should a
company decide to implement on iris-based solution.
CONCLUSION
The technical performance capability of the iris recognition process far surpasses that
of any biometric technology now available. Iridian process is defined for rapid
exhaustive search for very large databases: distinctive capability required for
authentication today. The extremely low probabilities of getting a false match enable
the iris recognition algorithms to search through extremely large databases, even of a
national or planetary scale. As iris technology grows less expensive, it could very likely
unseat a large portion of the biometric industry, e-commerce included; its technological
superiority has already allowed it to make significant inroads into identification and
security venues which had been dominated by other biometrics. Iris-based biometric
technology has always been an exceptionally accurate one, and it may soon grow much
more prominent.
Iris Scan

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Iris ppt
Iris pptIris ppt
Iris ppt
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
An eye with an atm
An eye with an atmAn eye with an atm
An eye with an atm
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Bionic eye
Bionic eyeBionic eye
Bionic eye
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 

Destacado (12)

IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
An Introduction To Speech Recognition
An Introduction To Speech RecognitionAn Introduction To Speech Recognition
An Introduction To Speech Recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminar
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 

Similar a Iris Scan

A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABijtsrd
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEArab Federation for Digital Economy
 

Similar a Iris Scan (20)

A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
 

Último

DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 

Último (20)

DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 

Iris Scan

  • 1. RAJARSHI RANAJAY SINH INSTITUTE OF MANAGEMENT & TECHNOLOGY Seminar on IRIS SCAN TECHNOLOGY Submitted By:- SANA PARVEEN
  • 2. ABSTRACT Biometrics is an automated method of capturing a person’s unique biological data that distinguishes him or her from another individual. Iris recognition has emerged as one of the most powerful and accurate identification techniques in the modern world. It has proven to be most fool proof technique for the identification of individuals with out the use of cards, PIN’s and passwords. It facilitates automatic identification where by electronic transactions or access to places, information or accounts are made easier, quicker and more secure.
  • 3. TERMINOLOGY  INTRODUCTION  IRIS RECOGNITION  TOPOLOGY  ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS  IRIS AS A POWERFUL IDENTIFIER  SCIENCE BEHIND THE TECHNOLOGY  DISADVANTAGES OF USING IRIS FOR INDENTIFICATION  APPLICATIONS  IRIS RECOGNITION: ISSUES  CONCLUSION
  • 4. INTRODUCTION In today’s information age it is not difficult to collect data about an individual and use that information to exercise control over the individual. Individuals generally do not want others to have personal information about them unless they decide to reveal it. With the rapid development of technology, it is more difficult to maintain the levels of privacy citizens knew in the past. In this context, data security has become an inevitable feature. Conventional methods of identification based on possession of ID cards or exclusive knowledge like social security number or a password are not altogether reliable. ID cards can be almost lost, forged or misplaced: passwords can be forgotten. Biometric technology has now become a viable alternative to traditional identification systems because of its tremendous accuracy and speed. This paper explores the concept of Iris recognition which is one of the most popular biometric techniques. This technology finds applications in diverse fields.
  • 5. IRIS RECOGNITION Iris identification technology is a tremendously accurate biometric. Iris recognition leverages the unique features of the human iris to provide an unmatched identification technology. So accurate are the algorithms used in iris recognition that the entire planet could be enrolled in an iris database with only a small chance of false acceptance or false rejection. The technology addresses the FTE (Failure To Enroll) problems which lessen the effectiveness of other biometrics. Only the iris recognition technology can be used effectively and efficiently in large scale identification implementations. The tremendous accuracy of iris recognition allows it, in many ways, to stand apart from other biometric technologies.
  • 7. ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS The iris is a protective internal organ of the eye. It is a thin diaphragm stretching across the anterior portion of the eye and supported by lens. At its base the eye is attached to the eye’s ciliary body. At the opposite end it opens into a pupil. The cornea and the aqueous humor in front of the iris protect it from scratches and dirt, the iris is installed in its own casing. It is a multi layered structure. It has a pigmented layer, which forms a coloring that surrounds the pupil of the eye. One feature of this pupil is that it dilates or contracts in accordance with variation in light intensity.
  • 8. The properties of the iris that enhance its suitability for use in high confidence identification system are those following:- 1. Extremely data rich physical structure about 400 identifying features 2. Genetic independence no two eyes are the same. 3. Stability over time. 4. Its inherent isolation and protection from the external environment. 5. The impossibility of surgically modifying it without unacceptable risk to vision. 6. Its physiological response to light, which provides one of several natural tests against artifice. 7. The ease of registering its image at some distance forms a subject without physical contact. unobtrusively and perhaps inconspicuously 8. It intrinsic polar geometry which imparts a natural co-ordinate system and an origin of co-ordinates IRIS AS A POWERFUL IDENTIFIER
  • 9. SCIENCE BEHIND THE TECHNOLOGY The design and implementation of a system for automated iris recognition can be subdivided in to 3. 1. Image acquisition 2. Iris localization and 3. Pattern matching
  • 10. APPLICATIONS ◊ Computer login: The iris as a living password. ◊ National Border Controls: The iris as a living password. ◊ Telephone call charging without cash, cards or PIN numbers. ◊ Ticket less air travel. ◊ Premises access control (home, office, laboratory etc.). ◊ Driving licenses and other personal certificates. ◊ Entitlements and benefits authentication. ◊ Forensics, birth certificates, tracking missing or wanted person ◊ Credit-card authentication. ◊ Automobile ignition and unlocking; anti-theft devices. ◊ Anti-terrorism (e.g.:— suspect Screening at airports) ◊ Secure financial transaction (e-commerce, banking). ◊ Internet security, control of access to privileged information. ◊ “Biometric—key Cryptography “for encrypting/decrypting messages.
  • 11. DISADVANTAGES OF USING IRIS FOR IDENTIFICATION  Small target (1 cm) to acquire from a distance (1m)  Located behind a curved, wet, reflecting surface  Obscured by eyelashes, lenses, reflections  Partially occluded by eyelids, often drooping  Deforms non-elastically as pupil changes size  Illumination should not be visible or bright  Some negative connotations Even though conventional methods of identification are indeed inadequate, the biometric technology is not as pervasive and wide spread as many of us expect it to be. One of the primary reasons is performance. Issues affecting performance include accuracy, cost, integrity etc.
  • 12. The figure illustrates a comparison between coast and accuracy. The cost represented here is a typical incremental investment needed for accruing a commercially available biometric sensor and for implementing and identity authentication system. The biometric system has the disadvantages of being intrusive both physically and socially. They require the users to position their bodies relative to the sensor and then pause for a second.
  • 13. IRIS RECOGNITION: ISSUES The technology requires a certain amount of user interaction the enroller must hold still in a certain spot, even if only momentarily. It would be very difficult to enroll or identify a non-cooperative subject. The eye has to have a certain degree of lighting to allow the camera to capture the iris; any unusual lighting situation may affect the ability of the camera to acquire its subject. Lastly, as with any biometric, a backup plan must be in place if the unit becomes inoperable. Network crashes, power failure, hardware and software problems are but a few of the possible ways in which a biometric system would become unusable. Since iris technology is designed to be an identification technology, the fallback procedures may not be as fully developed as in a recognition schematic. Though these issues do not reduce the exceptional effectiveness of iris recognition technology, they must be kept in mind, should a company decide to implement on iris-based solution.
  • 14. CONCLUSION The technical performance capability of the iris recognition process far surpasses that of any biometric technology now available. Iridian process is defined for rapid exhaustive search for very large databases: distinctive capability required for authentication today. The extremely low probabilities of getting a false match enable the iris recognition algorithms to search through extremely large databases, even of a national or planetary scale. As iris technology grows less expensive, it could very likely unseat a large portion of the biometric industry, e-commerce included; its technological superiority has already allowed it to make significant inroads into identification and security venues which had been dominated by other biometrics. Iris-based biometric technology has always been an exceptionally accurate one, and it may soon grow much more prominent.