Iris Recognition
#7

[attachment=11141]
CHAPTER -1
INTRODUCTION

In today’s information age it is not difficult to collect data about an individual and use that information to exercise control over the individual. Individuals generally do not want others to have personal information about them unless they decide to reveal it. With the rapid development of technology, it is more difficult to maintain the levels of privacy citizens knew in the past. In this context, data security has become an inevitable feature. Conventional methods of identification based on possession of ID cards or exclusive knowledge like social security number or a password are not altogether reliable. ID cards can be almost lost, forged or misplaced: passwords can be forgotten. Such that an unauthorized user may be able to break into an account with little effort. So it is need to ensure denial of access to classified data by unauthorized persons. Biometric technology has now become a viable alternative to traditional identification systems because of its tremendous accuracy and speed. Biometric system automatically verifies or recognizes the identity of a living person based on physiological or behavioral characteristics. Since the persons to be identified should be physically present at the point of identification, biometric techniques gives high security for the sensitive information stored in mainframes or to avoid fraudulent use of ATMs.This paper explores the concept of Iris recognition which is one of the most popular biometric techniques. This technology finds applications in diverse fields.
1.1 BIOMETRICS - FUTURE OF IDENTITY
Biometric dates back to ancient Egyptians who measured people to identify them. Biometric devices have three primary components.
1. Automated mechanism that scans and captures a digital or analog image of a living personal characteristic
2. Compression, processing, storage and comparison of image with a stored data.
3. Interfaces with application systems.
A biometric system can be divided into two stages: the enrolment module and the identification module. The enrolment module is responsible for training the system to identity a given person. During an enrolment stage, a biometric sensor scans the person’s physiognomy to create a digital representation. A feature extractor processes the representation to generate a more compact and expressive representation called a template. For an iris image these include the various visible characteristics of the iris such as contraction, Furrows, pits, rings etc. The template for each user is stored in a biometric system database. The identification module is responsible for recognizing the person. During the identification stage, the biometric sensor captures the characteristics of the person to be identified and converts it into the same digital format as the template. The resulting template is fed to the feature matcher, which compares it against the stored template to determine whether the two templates match.
The identification can be in the form of verification, authenticating a claimed identity or recognition, determining the identity of a person from a database of known persons. In a verification system, when the captured characteristic and the stored template of the claimed identity are the same, the system concludes that the claimed identity is correct. In a recognition system, when the captured characteristic and one of the stored templates are the same, the system identifies the person with matching template.
TOPOLOGY OF IDENTIFICATION METHODS
1.1. TOPOLOGY OF IDENTIFICATION METHODS

Biometrics encompasses both physiological and behavioral characteristics. A physiological characteristic is a relatively stable physical feature such as finger print, iris pattern, retina pattern or a Facial feature. A behavioral trait in identification is a person’s signature, keyboard typing pattern or a speech pattern. The degree of interpersonal variation is smaller in a physical characteristic than in a behavioral one. For example, the person’s iris pattern is same always but the signature is influenced by physiological characteristics.
Disadvantages
Even though conventional methods of identification are indeed inadequate, the biometric technology is not as pervasive and wide spread as many of us expect it to be. One of the primary reasons is performance. Issues affecting performance include accuracy, cost, integrity etc.
Accuracy
Even if a legitimate biometric characteristic is presented to a biometric system, correct authentication cannot be guaranteed. This could be because of sensor noise, limitations of processing methods, and the variability in both biometric characteristic as well as its presentation.
Cost
Cost is tied to accuracy; many applications like logging on to a pc are sensitive to additional cost of including biometric technology.
1.2 . COMPARISON BETWEEN COST AND ACCURACY
CHAPTER -2
IRIS RECOGNITION

Iris identification technology is a tremendously accurate biometric. Iris recognition leverages the unique features of the human iris to provide an unmatched identification technology. So accurate are the algorithms used in iris recognition that the entire planet could be enrolled in an iris database with only a small chance of false acceptance or false rejection. The technology addresses the FTE (Failure to Enroll) problems which lessen the effectiveness of other biometrics. Only the iris recognition technology can be used effectively and efficiently in large scale identification implementations. The tremendous accuracy of iris recognition allows it, in many ways, to stand apart from other biometric technologies.
2.1 ANATOMY, PHYSIOLOGY AND DEVELOPMENT OF THE IRIS
The word IRIS dates from classical times (a rainbow). The iris is a Protective internal organ of the eye. It is easily visible from yards away as a colored disk, behind the clear protective window of the cornea, surrounded by the white tissue of the eve. It is the only internal organ of the body normally visible externally. It is a thin diaphragm stretching across the anterior portion of the eye and supported by lens. This support gives it the shape of a truncated cone in three dimensions. At its base the eye is attached to the eye’s ciliary body. At the opposite end it opens into a pupil. The cornea and the aqueous humor in front of the iris protect it from scratches and dirt, the iris is installed in its own casing. It is a multi layered structure. It has a pigmented layer, which forms a coloring that surrounds the pupil of the eye. One feature of this pupil is that it dilates or contracts in accordance with variation in light intensity.
The human iris begins to form during the third month of gestation. The structures creating its distinctive pattern are completed by the eighth month of gestation hut pigmentation continues in the first years after birth. The layers of the iris have both ectodermic and embryological origin, consisting of: a darkly pigmented epithelium, pupillary dilator and sphincter muscles, heavily vascularized stroma and an anterior layer chromataphores with a genetically determined density of melanin pigment granules. The combined effect is a visible pattern displaying various distinct features such as arching ligaments, crypts, ridges and zigzag collaratte. Iris color is determined mainly by the density of the stroma and its melanin content, with blue irises resulting from an absence of pigment: long wavelengths are penetrates and is absorbed by the pigment epithelium, while shorter wavelengths are reflected and scattered by the stroma. The heritability and ethnographic diversity of iris color have long been studied. But until the present research, little attention had been paid to the achromatic pattern complexity and textural variability of the iris among individuals.
A permanent visible characteristic of an iris is the trabecular mesh work, a tissue which gives the appearance of dividing the iris in a radial fashion. Other visible characteristics include the collagenous tissue of the stroma, ciliary processes, contraction furrows, crypts, rings, a corona and pupillary frill coloration and sometimes freckle. The striated anterior layer covering the trabecular mesh work creates the predominant texture with visible light.
2.1. A TYPICAL IRIS
2.2 IRIS AS A POWERFUL IDENTIFER

Iris is the focus of a relatively new means of biometric identification. The iris is called the living password because of its unique, random features. It is always with you and can not be stolen or faked. The iris of each eye is absolutely unique. The probability that any two irises could be alike is one in 10 to 78th power — the entire human population of the earth is roughly 5.8 billion. So no two irises are alike in their details, even among identical twins. Even the left and right irises of a single person seem to be highly distinct. Every iris has a highly detailed and unique texture that remains stable over decades of life. Because of the texture, physiological nature and random generation of an iris artificial duplication is virtually impossible.
The properties of the iris that enhance its suitability for use in high confidence identification system are those following.
1. Extremely data rich physical structure about 400 identifying features
2. Genetic independence no two eyes are the same.
3. Stability over time.
4. Its inherent isolation and protection from the external environment.
5. The impossibility of surgically modifying it without unacceptable risk to vision.
6. Its physiological response to light, which provides one of several natural tests against artifice.
7. The ease of registering its image at some distance forms a subject without physical contact. unobtrusively and perhaps inconspicuously
8. It intrinsic polar geometry which imparts a natural co-ordinate system and an origin of co-ordinates
9. The high levels of randomness in it pattern inter subject variability spanning 244 degrees of freedom - and an entropy of 32 bits square million of iris tissue.
2.3 HISTORY AND DEVELOPMENT
The idea of using patterns for personal identification was originally proposed in 1936 by ophthalmologist Frank Burch. By the 1980’s the idea had appeared in James Bond films, but it still remained science fiction and conjecture. In 1987, two other ophthalmologists Aram Safir and Leonard Flom patented this idea and in 1987 they asked John Daugman to try to create actual algorithms for this iris recognition. These algorithms which Daugman patented in 1994 are the basis for all current iris recognition systems and products.
Daugman algorithms are owned by Iridian technologies and the process is licensed to several other Companies who serve as System integrators and developers of special platforms exploiting iris recognition in recent years several products have been developed for acquiring its images over a range of distances and in a variety of applications. One active imaging system developed in 1996 by licensee Sensar deployed special cameras in bank ATM to capture IRIS images at a distance of up to 1 meter. This active imaging system was installed in cash machines both by NCR Corps and by Diebold Corp in successful public trials in several countries during I997 to 1999. a new and smaller imaging device is the low cost “Panasonic Authenticam” digital camera for handheld, desktop, e-commerce and other information security applications. Ticket less air travel, check-in and security procedures based on iris recognition kiosks in airports have been developed by eye ticket. Companies in several, countries are now using Daughman’s algorithms in a variety of products.
2.4 SCIENCE BEHIND THE TECHNOLOGY
The design and implementation of a system for automated iris recognition can be subdivided in to three:
1. image acquisition
2. iris localization and
3. Pattern matching
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: yhsm inucbr 001,
Popular Searches: how iris recognition works, karmasangs tan, iris recognition mobile phone, wang tak, who is alphonse bertillon, atm with an iris recognition process diagrams, er diagram on iris recognition,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Iris Recognition - by nit_cal - 29-10-2009, 03:02 PM
RE: Iris Recognition - by project topics - 10-04-2010, 09:53 PM
RE: Iris Recognition - by project topics - 20-04-2010, 05:08 PM
RE: Iris Recognition - by computer science topics - 29-06-2010, 12:56 PM
RE: Iris Recognition - by seminarsonly - 21-09-2010, 12:57 PM
RE: Iris Recognition - by Rajnish01 - 21-03-2011, 04:46 PM
RE: Iris Recognition - by seminar class - 28-03-2011, 11:23 AM
RE: Iris Recognition - by seminar class - 11-04-2011, 10:46 AM
RE: Iris Recognition - by seminar class - 18-04-2011, 10:14 AM
RE: Iris Recognition - by seminar class - 21-04-2011, 12:32 PM
RE: Iris Recognition - by seminar paper - 20-02-2012, 12:35 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Handwriting Recognition computer science topics 9 6,654 20-07-2013, 11:07 AM
Last Post: computer topic
  Handwriting recognition project report seminar addict 3 4,249 24-06-2013, 11:24 AM
Last Post: computer topic
  Face Recognition Using Artificial Neural Networks nit_cal 2 4,726 20-04-2013, 11:25 AM
Last Post: computer topic
  online handwritten script recognition project report tiger 5 5,004 21-12-2012, 10:48 AM
Last Post: seminar details
  Face recognition using Laplacianfaces mechanical engineering crazy 2 3,347 19-11-2012, 01:14 PM
Last Post: seminar details
  Face Recognition Using Laplacian faces electronics seminars 6 6,531 19-11-2012, 01:14 PM
Last Post: seminar details
  Speech Recognition Computer Science Clay 1 1,657 12-11-2012, 01:58 PM
Last Post: seminar details
  Gesture Recognition Using LASER Tracking seminar class 1 1,818 30-09-2012, 06:46 PM
Last Post: Guest
  Finger Detection for Sign Language Recognition computer girl 0 1,438 08-06-2012, 10:35 AM
Last Post: computer girl
  SPEECH RECOGNITION PROJECT project topics 1 2,812 01-03-2012, 10:58 AM
Last Post: seminar paper

Forum Jump: