Biometrics (Download Full Report And Abstract)
#24
[attachment=10448]
Abstract:
In today’s information technology world, security for systems is becoming more and more important. One area where security can be improved is in authentication. Biometric, provides one of the most secure methods of authentication and identification Biometric identification utilizes physiological and behavioural characteristics to authenticate a person’s identity, which are both unique and measurable.
Some common physical characteristics that may be used for identification include fingerprints, palm prints, hand geometry, retinal patterns and iris patterns. Behavioural characteristics include signature, voice pattern and keystroke dynamics. Among all these techniques we have chosen iris recognition because, that no two irises are alike, even in twins, thus making them a good biometric.
In this paper, we deduced the most important, efficient and accurate method of authentification and verification using Iris Recognition Technology. In addition to these we have also discussed the advantages of Iris Recognition Technology including its applications.
INTRODUCTION
Iris recognition, a biometric, provides one of the most secure methods of authentication and identification thanks to the unique characteristics of the iris. An Iris Recognition system works by capturing and storing the biometric information and then comparing the scanned biometric with what is stored in the repository. Once the image of the iris has been captured using a standard camera, the authentication process, involving comparing the current subject’s iris with the stored version, is one of the most accurate with very low false acceptance and rejection rates. This makes the technology very useful in areas such as information security, physical access security, ATMs and airport security.
The technology is accurate, easy to use, non-intrusive, and difficult to forge. Iris recognition technology does provide a good method of authentication to replace the current methods of passwords, token cards or Pin’s and if used in conjunction with something the user knows in a two-factor authentication system then the authentication becomes even stronger.
KNOWLEDGE OF IRIS:
The iris is the plainly visible, colored ring that surrounds the pupil. It is a muscular structure that controls the amount of light entering the eye, with intricate details that can be measured, such as striations, pits and furrows. The iris is not to be confused with the retina, which lines the inside of the back of the eye. The amount of information that can be measured in a single iris is much greater than fingerprints, and accuracy is greater than DNA
IRIS RECOGNITION PROCESS:
The process of Iris Recognition is made up of three steps:
 Capturing the image
 Defining the location of the iris and optimizing the image
 Storing and comparing the image.
1. CAPTURING THE IMAGE
The image of the iris can be captured using a standard camera using both visible and infrared light and may be either a manual or automated procedure. The camera can be positioned between three and a half inches and one meter to capture the image. In the manual procedure, the user needs to adjust the camera to get the iris in focus and needs to be within six to twelve inches of the camera.
This process is much more manually intensive and requires proper user training to be successful. The automatic procedure uses a set of cameras that locate the face and iris automatically thus making this process much more user friendly.
2. DEFINING THE LOCATION OF THE IRIS AND OPTIMIZING THE IMAGE
2.1 LOCATION OF IRIS

Once the camera has located the eye, the iris recognition system then identifies the image that has the best focus and clarity of the iris. The image is then analyzed to identify the outer boundary of the iris where it meets the white sclera of the eye, the pupillary boundary and the centre of the pupil. This results in the precise location of the circular iris.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: absract for report on biometric, biometric atm seminar reportreport downlod report, report of bogus voter identification use biometric,
Popular Searches: pt100 atmega32, cons of a sensecam, topic in biometrics in signature, eec dept, gyrobus full, report doc on biometrics scribd, download,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics (IRIS RECOGNITION AN EMERGING BIOMETRIC TECHNOLOGY) - by seminar class - 18-03-2011, 09:10 AM
RE: Biometrics (Download Full Report And Abstract) - by Guest - 29-01-2013, 10:07 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,974 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,840 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 26,000 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,713 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,100 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,273 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,518 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,655 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,433 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 26,387 08-06-2015, 03:26 PM
Last Post: seminar report asees

Forum Jump: