· web viewin 2000, expenditures for biometric authentication system reached $66 million...
TRANSCRIPT
Page 1
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
BIOTRONICS
Page 2
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
ABSTRACT
This paper deals with the basics of iris, its properties and how it adds some
advantageous features to recognize the correct person. In this paper we
discuss the details regarding the information about how the scanner scans
the whole pattern of the iris while enrolling and matching and how the
scanned patterns are converted into 256 bytes of data, so that it can be
stored in the database. We compare the iris codes of the current person
who want access the database and give the matched results to the user
accordingly.
As the iris recognition technology produces very low false rate
when compared to the other biometrics results, it is very preferable in
many systems such as airports, banks, defence, etc., where the security
plays one of the major role. But there may be chance of loss in the data-
level security because of the possibility of hacking the data from the
database.
The implementation of en-decry-matching algorithm gives the
security to the data so that no one can hack the data. As we have used
hand geometry for verifying the identified person, it adds the security to
the whole system. Comparison of iris recognition with other existing
Page 3
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
biometric technologies is also made. Finally this paper contains the
applications of the combined features of the recognition of iris.
Keywords: Iris, Scanner, en-decry matching algorithm, database,
data-hacking.
Biometrics – An Introduction:Biometrics refers to the automated methods of recognizing a
person based on a physiological or behavioral characteristic. Physical
biometrics includes fingerprints, hand or palm geometry, and retina, iris,
or facial characteristics. Behavioral characteristics are traits that are
learned or acquired which includes signatures, voice of a particular person.
Keeping these characteristics as constraints, many biometric technologies
have been developed and are used to verify or identify users to allow
access to a variety of environments. From ATMs to logging into a network
or your personal Computer, biometrics is being used throughout the world.
Cost Analysis: In 2000, expenditures for biometric authentication system
reached $66 million Worldwide. The forecast through 2006 is for an
overall annual growth of 54%, attaining market levels near $900 million.
Page 4
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
Total Biometric Revenues in million dollars
Page 5
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
An Overview of Existing Biometrics
Technologies: All biometrics consists of three basic elements: enrollment,
templates, and Matching. Each technology uses these elements but in their
own unique way.
Page 6
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
Enrollment – the process where a user enrolls in the
biometric system by giving a sample of their biometric(s) which
can be processed and stored for later use.
Template – a file derived from the features of a user’s
biometric sample which can be used to perform biometric
matches.
Matching – Process of comparing current user’s image with
a stored one in the data base.
BIOMETRIC SYSTEMSThe determination, measuring, and codification of the unique
characteristic traits that each of us is born with is known as the science of
biometrics. Various forms of computer-based biometrics for personal
authentication have been around for the past twenty years, but not until
recently have some reached maturity and a quality/reliability that has
enabled their widespread application. Retinal, iris and fingerprint
recognition are mature technologies with the most reliable performance.
Of the three methods, iris recognition is the least intrusive with greater
accuracy.
In addition to reliable performance some of the other advantages
of using biometrics are:
Page 7
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
1. High Security: It is based on physical characteristics,
which cannot be lost or stolen.
2. Universality: Every person has this specific iris
property, so users need not worry about someone using their
identity
3. Ease of administration: The problems of handling
forgotten PIN/password and lost/stolen keys or access cards are
eliminated; the benefit is a lot of time and resources saved.
IDENTIFICATION USING IRIS
RECOGNITION
Iris recognition is one of the biometric systems, which utilize iris
patterns as a method of gathering unique information about an individual.
It is considered to be one of the most reliable biometrics with some of the
lowest false rejection and false acceptance rates and so it is less intrusive.
IRIS:Iris is the colored portion of the eye that lies behind cornea and is
protected by eye lid. It is approximately 11mm (.433 inches) in diameter
and consists of several layers and distinct features such as furrows, ridges,
coronas, crypts, rings which controls the amount of light that enters into
the eye. Various shades of iris are brown, blue and green, but these colors
Page 8
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
are not used in identification technology. No two irises are alike even for
identical twins.
SHOWING AN IRIS PATTERN IMAGED
PROPERTIES:Glasses and contact lenses do not interfere with the identification
process. The iris is the only internal organ visible externally. In addition,
recent medical advances such as refractive surgery; cataract surgery and
cornea transplants do not change the iris’s characteristics. In fact, it is
impossible to modify the iris without risking for blindness. And even a
blind person can go for a scan. As long as a sightless eye has as iris, that
eye can be identified by iris recognition.
Page 9
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
BLUE SHADED IRIS
By the time a human is about eight months old, the iris structures are
complete, and they do not change in later life. Its physiological
characteristics combined with the fact that those characteristics are
exhibited with so much variation over the population, make the iris a
prime candidate for use in identity.
IMPLEMENTING IRIS RECOGNITION:The implementation of iris recognition involves three processes
such as
Scanning an image
Page 10
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
Iris code creation and Enrollment
Verification and Identification
SCANNING AN IRIS IMAGE: Iris image must be captured by CCD camera. The camera such as
CCD having a high resolution can be set at a distance of five inches (10
centimeters) to 40 inches (one meter) from user’s eye, depending on the
scanning environment. The user should look at LED guide to ensure that
the camera focuses on the iris.
INTERIOR VIEW OF IRIS
Page 11
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
IRIS CODE CREATION AND ENROLLMENT:
An Iris Code is created by encoding the variable structures of the
iris. Using Cameras to record the image, the inner and outer boundaries of
the iris are first determined, taking into account the contours of the eyelid
and discounting eyelashes, reflections and contact lens boundaries. Then
the patterns are encoded using 2D Gabor wavelet. 2048 bits of data plus
2048 masking bits are used to produce a 512-byte iris code. About 250
degrees of freedom or independent dimensions of variability are
represented in the Iris Code. In order to enroll a person for future
identification, the Iris Code is stored in a database.
VERIFICATION AND IDENTIFICATION:Iris recognition technology can be used for both positive and
negative
identification. Iris recognition process for verification and
identification involves
comparing of Iris Codes by performing Boolean XOR
operations and computing a
function called the Hamming Distance, which is a measure
of dissimilarity between any two irises.
The Hamming Distance can be computed with
extreme speed because of the way computers handle Boolean
Page 12
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
operations and the fact that the operations can be performed in
parallel. It would only take 1.7 seconds to compare one
million Iris Codes on a 2.2GHz computer. This level of
performance makes iris recognition technology feasible for
very large-scale applications where millions of Iris Codes can
be compared using multiprocessing techniques.
IRIS SCANNING:
Page 13
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
SHOWING EYE TO IRIS SCANNER
In order to verify that a person is who he or she
claims to be, a camera image is taken again , a new Iris Code
is generated, and a comparison is made between the Iris Code
just created and Iris Code in a database. The recognition
phase includes the Hamming Distance calculation and the
XOR comparison.
COMPARISON OF IRIS RECOGNITION
OVER OTHER BIOMETRIC TECHNOLOGY:
Page 14
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
The iris recognition is compared to other existing
technology and suitability of iris recognition as a current trend
is proved.
Fingerprint identification:
External factors can cause errors in fingerprinting.
Fingerprints can be affected by dirt, dryness and scarring.
There are some health related advantages of iris recognition
over fingerprinting. Fingerprinting requires physically
touching a device each time the finger is presented for
verification. In contrast, the iris template is created without
any physical contact with the person whose iris is encoded.
The iris recognition process is, therefore, more
appealing to those concerned with hygiene than is
fingerprinting. Forgery is not as much of a risk with iris
recognition as with fingerprinting. Although sophisticated
fingerprinting technology is designed to detect false fingers, a
person’s finger can be cut off or used for a mold much easier
Page 15
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
than an eyeball could be extracted and used for
impersonation. In fact, the iris from a person’s
extracted eye would not be usable for more than a few
seconds. Iris recognition devices can also detect the dilating
pupil to ensure that the eye is alive.
Fingerprint matching technique can be placed
into two categories: Minutiae based and correlation based. Minutiae
based technique first find minutiae point and then map their
relative placement on the finger.
Page 16
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
Page 17
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
Correlation based technique require the precise location of a
registration point and are affected by image translation and
rotation.
HAND GEOMENTRY: It is not as accurate as either iris recognition
scanning. The error rate for hand geometry is 1 in 500
compared to 1 in 131,000 for iris recognition. Another
drawback of hand geometry technology is that it is relatively
easy to produce a false negative, since hand features are not
Page 18
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
distinctive. Therefore, the technology is not well suited for
identification. It should work well enough for verification as
long as the device can recognize a fake hand. Unlike the iris,
hand characteristics could change over time due to scars and
growth patterns. Hand geometry has the same hygiene issue
as fingerprinting.
To register in a hand-scan system a hand is placed on
a reader’s covered flat surface. Five guides or pins that
correctly situate the hand for the camera position this
placement. A succession of cameras captures 3-D pictures of
the sides and back of the hand. The hand-scan device can
process the 3-D images in 5 seconds or less and the hand
verification usually takes less than 1 second. The image
capturing and verification software and hardware can easily
be integrated within standalone units.
Page 19
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
SHOWING THE HAND SCANNER
VOICE RECOGNITION:
With an error rate of 1 in 50, speaker recognition is
much less accurate than iris recognition. False negatives are
easy to produce, and the errors can occur due to noise and
colds. Speaker recognition could be used to verify a person’s
Page 20
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
identity, comparing to a previously stored template for a
person, but is not recommended for identification. Iris
recognition is recommended for both verification and
identification.
ADVANTAGE OF IRIS RECOGNITION:As the morph genesis of the iris that occurred during the
month of seven remain stable throughout life it never changes
with the time.
1. Uniqueness will be maintained between even the
multi-birth children and so it is very difficult to
forge.
2. There will be no effect on our eyes since there is
no direct contact.
3. The accurateness of the scanning technology is
great with error rates being very low.
4. Scalability and speed is high when compared to
other systems.
Page 21
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
OUR IMPLEMENTATION TO HAVE ADDED
SECURITY: In ordinary database system, there is a chance of hacking
the database from the stored system by some hackers. So in
order to prevent this hacking, we have given some added
security to the database by encrypting the stored bits in to a
new bit feature. Hence the data level security is increased
further. Now we are working to develop an algorithm for it.
This helps the data to be hided from others.
EMERGING BIOMETRIC TECHNOLOGIES: Biometrics is not limited to the four technologies. There
continues to be expansion of the current technology and
exploration and innovation into additional biometric security
solutions. Nail bed identification and finger geometry is
building on existing fingerprint technology. Advancements
insecurity technologies have also made such identifiers as ear
shape, odor, veinscan, and gait recognition possible means of
authentication. Although it has been at the forefront in
personal identification, DNA matching has continued to
improve and become more readily accepted.
Page 22
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
The following is a list of newer biometric
technologies and how they are obtained.
DNA – Similar to a genetic fingerprint
Ear Shape - Geometry of one's ear (shape, size,
curves)
Odor – Human scent of one’s hand
Finger geometry – Shape and structure of finger or
fingers
Today’s Uses of Biometrics:
Biometric technologies are being used in a variety of
different ways all over the world. The following are a few
examples:
Airports use facial scanning to recognize employees
and also to try to
identify known terrorists and/or criminals.
Border crossing checkpoints use facial scanning to
recognize know
Page 23
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
Criminals before they enter a different country.
Airports use iris scanning to allow employees to
enter and exit secured areas.
Banks with Automatic Teller Machines (ATMs) use
secured Personal
Identification Numbers (PIN) and are using iris
scanning to identify and
verify their customers.
Government military sites use iris scanning for
highly sensitive
restrictive areas.
Financial institutions, corporations, and government
agencies use
Telephony applications for voice recognition to
account information, service
calls, and house arrests.
Page 24
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
Individuals may use cashless vending to prevent
unauthorized uses of
their credit cards. Individuals swipe their credit card
then touch a
fingerprint reader, which then verifies the identity.
CONCLUSION:
Password, tokens cards and PIN are all risks to the security of originations due to human nature. Our inability to remember complex passwords and tendency to write these down along with losing token cards or forgetting PIN all contribute to the possible breakdown in security for an organization.
The uniqueness of the iris and low probability of a false acceptance or false rejection all contribute to the benefits of using iris recognition technology.
It provides an accurate and secure method of authenticating users onto company systems, is a non-intrusive method and has the speed required to minimize user frustration when accessing company systems.
Page 25
www.engineeringminiprojects.com
ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com
www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER
PRESENTATIONS
Users no longer have to worry about remembering passwords and system administrators no longer need to worry about the never-ending problem of users disclosing passwords or having weak passwords that are easily cracked.
As according to our implementation there is also a data-level security so that than the designer no one can use it illegally.
REFERENCES:
“An Introduction to Biometrics.” Biometric Consortium.
www.biometrics.org/html/introduction.html
www.biometricsinfo.org/biometrics/html www.findbiometrics.com/Pages /feature%20articles/anatomy/html.