karthika krishna ethical hacking slides

17
VIDYA BHARATHI INSTITUTE OF TECHNOLOGY PAPER PRESENTATION ON Iris Recognition of a Biometric Technique BY .MADHAVI, B.SRAVANI, I yr, ECE II [email protected] [email protected]

Upload: karthika-krishna

Post on 07-Nov-2014

521 views

Category:

Documents


3 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Karthika krishna ethical hacking slides

VIDYA BHARATHI INSTITUTE OF TECHNOLOGYPAPER PRESENTATION

ONIris Recognition of a Biometric Technique

BY

D.MADHAVI, B.SRAVANI,ECE II yr, ECE II yr,

[email protected] [email protected]

Page 2: Karthika krishna ethical hacking slides

Topics of Discussion Introduction

IRIS identification process

IRIS identification system

Method of IRIS identification

Function of IRIS scanner

properties of IRIS

Applications of IRIS recognition

Advantages and Disadvantages

Conclusion

Page 3: Karthika krishna ethical hacking slides

INTRODUCTION:

The colored part of the eye

Page 4: Karthika krishna ethical hacking slides

WHY WE GO FOR IRIS TECHNOLOGY?

Page 5: Karthika krishna ethical hacking slides

LocalizationAcquisition

IrisCode Gabor Filters Polar Representation

Image

Demarcated Zones

IRIS identification process

Page 6: Karthika krishna ethical hacking slides

IRIS IDENTIFICATIONSYSTEM: There are two types of methodsThere are two types of methods

1. Active iris system:Active iris system:

2. Passive iris system:Passive iris system:

requires that a user be requires that a user be anywhere from six to 14 anywhere from six to 14 inches away from the inches away from the camera.camera.

allows the user to be allows the user to be anywhere from one to anywhere from one to three feet away from the three feet away from the camera.camera.

Page 7: Karthika krishna ethical hacking slides

FUNCTION OF IRIS SCANNER: The user places himself so that he

can see his own eye's reflection in the device.

Verification time is generally less than 5 seconds, though the user will only need to look into the device for a couple moments.

A template iris pattern code contains between 256 and 512 bytes of data depending upon the manufacturer. 

Using a camera it converts the small details in the iris stromal pattern into a bit pattern.

Page 8: Karthika krishna ethical hacking slides

IRIS IDENTIFICATION STEPSThere are four simple steps that follow:

A person stands in from of the iris identification system, between one and three feet away, while a wide-angle camera calculates the position of they eye.

A second camera zooms in on the eye and takes a black and white image. 

Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like and "eyeprint".

The captured image, or "eyeprint" is checked against a previously stored

reference template in the database.   

Page 9: Karthika krishna ethical hacking slides

Hamming code

a Hamming code is a linear error-correcting code named after its inventor, Richard Hamming. Hamming codes can detect and correct single-bit errors, and can detect (but not correct) double-bit errors. In other words, the Hamming distance between the transmitted and received code-words must be zero or one for reliable communication.

Page 10: Karthika krishna ethical hacking slides

Properties of the iris

Has highly distinguishing texture

Right eye differs from left eye

Twins have different iris texture

Not trivial to capture quality image

+ Works well with cooperative subjects

+ Used in many airports in the world

Page 11: Karthika krishna ethical hacking slides

ADVANTAGES: Each iris is unique.

High recognition performance and high reliability.

Fast authentication within seconds.

The iris remains stable throughout ones life. Medical advances such as refractive surgery, cataract surgery and cornea transplants do not change the iris' characteristics.

Page 12: Karthika krishna ethical hacking slides

DISADVANTAGES: × Iris scanning is incompatible with the substantial

investment.

× Iris recognition is very difficult to perform at a larger distance .

× Iris recognition is susceptible to poor image quality, with associated failure to enroll rates.

Page 13: Karthika krishna ethical hacking slides

APPLICATIONS: Database access and computer login.

The iris-recognition software is implemented for security purposes around the airport terminal ,which was designed to allow only authorized people to enter certain areas.

To stop this practice- the first door opens upon iris recognition and then closes behind the person, leaving them in a small portal. The next door will only open upon confirming there is just one person in the portal.

Page 14: Karthika krishna ethical hacking slides

CONCLUSION:

Iris recognition is shown to be a reliable and accurate biometric technology.

The biometric iris recognition serves as one of the best processes for safe guarding our personal profiles and can be applied to any of the access control systems requiring high security,hence reducing the crime of using others profiles by another person illegally.

Page 15: Karthika krishna ethical hacking slides

References:www.wikipedia.com

www.techcrunch.comwww.howstuffworks.com

Page 16: Karthika krishna ethical hacking slides
Page 17: Karthika krishna ethical hacking slides