Iris-Recognition System: Neethu Sunny
Iris-Recognition System: Neethu Sunny
SYSTEM
NEETHU SUNNY
CUSAT, KOCHI-22
Email: [email protected]
Abstract: Iris Recognition System is used for identifying a person using IRIS
pattern match. IRIS is different in person to person .No two persons have the
same IRIS pattern. So by IRIS pattern we can identify the persons .
1.0 INRODUCTION
In today’s information age it is not difficult to collect data about an individual and use that
information to exercise control over the individual. Individuals generally do not want others to
have personal information about them unless they decide to reveal it. With the rapid
development of technology, it is more difficult to maintain the levels of privacy citizens knew in
the past. In this context, data security has become an inevitable feature. Conventional
methods of identification based on possession of ID cards or exclusive knowledge like social
security number or a password are not altogether reliable. Biometric technology has now
become a viable alternative to traditional identification systems because of its tremendous
accuracy and speed. Biometric system automatically verifies or recognizes the identity of a
living person based on physiological or behavioral characteristics. Since the persons to be
identified should be physically present at the point of identification, biometric techniques gives
high security.
Iris is the focus of a relatively new means of biometric identification. The iris is called
the living password because of its unique, random features. It is always with you and can not
be stolen or faked. The iris of each eye is absolutely unique. The probability that any two irises
could be alike is one in 10 to 78 powers — the entire human population of the earth is roughly
5.8 billion. So no two irises are alike in their details, even among identical twins. Even the left
and right irises of a single person seem to be highly distinct. Every iris has a highly detailed
and unique texture that remains stable over decades of life. Because of the texture,
physiological nature and random generation of an iris artificial duplication is virtually
impossible.
2.0 BIOMETRIC
Authentication is the process of verifying that a user requesting a network resource is who he,
she, or it claims to be, and vice versa. Biometric authentication uses personal features-
something that you are.Exciting Biometrics:
This relies on the fact that a fingerprint’s uniqueness can be defined by analyzing the minutiae
of a human being.Two individuals having the same fingerprint is less than one in a billion.
This is done by analyzing the shape, speed, stroke, pen pressure and timing information
during the act of signing. Dynamic signature verification is a replacement.
To identify any person we generally look at face and eyes in particular seem to tell a story how
the person feels.Face recognition is a kind of electronic unmasking
The image of the hand is collected and the feature vectors are extracted and compared with
the database feature vectors.
Both the inner boundary and the outer boundary of a typical iris can be taken as circles. But
the two circles are usually not co-centric. Compared with the other part of the eye, the pupil is
much darker. We detect the inner boundary between the pupil and the iris. The outer boundary
of the iris is more difficult to detect because of the low contrast between the two sides of the
boundary. We detect the outer boundary by maximizing changes of the perimeter- normalized
along the circle. The technique is found to be efficient and effective.
The size of the pupil may change due to the variation of the illumination and the associated
elastic deformations in the iris texture may interface with the results of pattern matching. For
the purpose of accurate texture analysis, it is necessary to compensate this deformation. Since
both the inner and outer boundaries of the iris have been detected, it is easy to map the iris
ring to a rectangular block of texture of a fixed size.
The original image has low contrast and may have non-uniform illumination caused by the
position of the light source. These may impair the result of the texture analysis. We enhance
the iris image reduce the effect of non-uniform illumination.
An iris-recognition algorithm first has to identify the approximately concentric circular outer
boundaries of the iris and the pupil in a photo of an eye. The set of pixels covering only the iris
is then transformed into a bit pattern that preserves the information that is essential for a
statistically meaningful comparison between two iris images. The mathematical methods used
resemble those of modern lossy compression algorithms for photographic images. In the case
of Daugman's algorithms, a Gabor wavelet transform is used in order to extract the spatial
frequency range that contains a good best signal-to-noise ratio considering the focus quality of
available cameras. The result is a set of complex numbers that carry local amplitude and
phase information for the iris image. In Daugman's algorithms, all amplitude information is
discarded, and the resulting 2048 bits that represent an iris consist only of the complex sign
bits of the Gabor-domain representation of the iris image. Discarding the amplitude information
ensures that the template remains largely unaffected by changes in illumination and virtually
negligibly by iris color, which contributes significantly to the long-term stability of the biometric
template. To authenticate via identification (one-to-many template matching) or verification
(one-to-one template matching), a template created by imaging the iris is compared to a stored
value template in a database. If the Hamming distance is below the decision threshold, a
positive identification has effectively been made.
A practical problem of iris recognition is that the iris is usually partially covered by eyelids and
eyelashes. In order to reduce the false-reject risk in such cases, additional algorithms are
needed to identify the locations of eyelids and eyelashes and to exclude the bits in the
resulting code from the comparison operation.
6.0 ADVANTAGES
The iris of the eye has been described as the ideal part of the human body for biometric
identification for several reasons:
As with most other biometric identification technology, a still not satisfactorily solved problem
with iris recognition is the problem of live-tissue verification. The reliability of any biometric
identification depends on ensuring that the signal acquired and compared has actually been
recorded from a live body part of the person to be identified and is not a manufactured
template. Many commercially available iris-recognition systems are easily fooled by presenting
a high-quality photograph of a face instead of a real face, which makes such devices
unsuitable for unsupervised applications, such as door access-control systems. The problem
of live-tissue verification is less of a concern in supervised applications (e.g., immigration
control), where a human operator supervises the process of taking the picture.
Methods that have been suggested to provide some defence against the use of fake eyes and
irises include:
9.0 CONCLUSION
10.0 REFERENCE
14.” Article: Iridian Says Iris Recognition System Deployed in Middle ...”
www.accessmylibrary.com/.../summary_0286-6553780_ITM downloaded on 27/10/09
15 “Eye Controls-iris recognition biometrics for clinical and medical ...” www.eye-
controls.com/ - downloaded on 27/10/09