SlideShare a Scribd company logo
1 of 30
LUCTUER BY
RAFIDH HAMAD KHALAF
IRIS RECOGNITION
By
RAFIDH
IRIS Introduction ?
History of Iris Recognition?
What the iris ?
 Why iris ?
Methods of iris recognition system ?
Image Acquisition ?
Segmentation ?
Normalization ?
Applications ?
Overview:
Iris recognition is a method
of biometric identification
and authentication that use
pattern-recognition
techniques based on high
resolution images of the
irises of an individual's eyes
It is considered to be the most accurate
biometric technology available today.
Introduction
History of Iris Recognition
1997-1999
1987
1987
1980
The concept of Iris Recognition was first proposed by
Dr. Frank Burch in 1939.
It was first implemented in 1990
when Dr. John Daugman created the
algorithms for it.
These algorithms employ methods
of pattern recognition and some
mathematical calculations for iris
recognition.
Iris is the area of the eye where the
pigmented or colored circle,usually
brown, blue, rings the dark pupil of the
eye.
IRIS
Normal Eye Example of iris
IRIS
What is Iris ?
The colored ring around the pupil
of the eye is called the Iris
What is Iris
?
 The iris is a thin circular diaphragm, which lies
between the cornea and the lens of the human eye.
 The iris is perforated close to its centre by a
circular aperture known as the pupil.
 The function of the iris is to control the amount of
light entering through the pupil.
 The average diameter of the iris is 12 mm, and the
pupil size can vary from 10% to 80% of the iris
diameter.
Externally visible highly protected internal organ.
Unique patterns.
Not genetically connected unlike eye color.
Stable with age.
Impossible to alter surgically.
Living Password, Can not be forgotten or copied.
Works on blind person.
User needs not to touch appliances.
Accurate , faster , and supports large data base.
What is Iris ?
Methods Of IRIS Recognition System
 In identifying one’s iris, there are 2
methods for its recognition and are:
 Active
 Passive
The active Iris system requires that a user be
anywhere from six to fourteen inches away from the
camera.
The passive system allows the user to be anywhere
from one to three feet away from the camera that
locates the focus on the iris.
Iris Recognition Diagram
Image
Acquisition
Image
Acquisition
Image
Acquisition
Iris
Segmentation Normalization
Feature
Encoding
Feature
Matching
Feature points in the
iris region
IrisTemplates
Database
Identify or Reject
Subject
Iris
Segmentation
Normalization
Feature
Encoding
Identify or Reject
Subject
IrisTemplates
Database
Eye Image Iris Region
IrisTemplate
Image Acquisition
 The first step, image acquisition
deals with capturing sequence of iris
images from the subject using
cameras and sensors with High
resolution and good sharpness.
 These images should clearly show
the entire eye especially iris and
pupil part, and then some
preprocessing operation may be
applied to enhance the quality of
image e.g. histogram equalization,
filtering noise removal etc.
(CASIA) eye image database
The first stage of iris
segmentation to isolate the
actual iris region in a digital
eye image.
The iris region, can be
approximated by two
circles, one for the iris/sclera
boundary and another,
interior to the first, for the
iris/pupil boundary.
Segmentation/concept
the derivatives in the horizontal direction for
detecting the eyelids, and in the vertical direction for
detecting the outer circular boundary of the iris .
Taking only the vertical gradients for locating the iris
boundary will reduce influence of the eyelids when
performing circular Hough transform.
Segmentation/eyelids
 eyelashes are treated as belonging to two types :
1 -separable eyelashes:
which are isolated in the image .
2-multiple eyelashes:
which are bunched together and overlap in the eye image.
 Eyelids and Eyelashes are the main noise factor in the iris image.
 These noise factors can affect the accuracy of the iris recognition
system.
 After applying circular Hough transform to iris, we are applying linear
Hough transform and we get line detected noise region in the iris
image.
 We have to remove these detected eyelids and eyelashes from the iris
image Thresolding is used for the removal of eyelashes. Then, the
noise free iris image can be available for future use.
Segmentation/eyelash
1- Edge Detector
2- Hough Transform
Double
thresholdin
g
edeg
1- Edge Detector
2- Hough Transform
LINEAR HOUGHTRANSFORM
CIRCULAR HOUGH TRANSFORM
smoothing
Finding
gradient
Segmentation
Diagram
a. Iris and pupil localization: Pupil and Iris are considered as
two circles using Circular Hough Transform
Process of finding the iris in
an image
b. Eye lid detection and Eye lash noise
removal using linear Hough Transform
method
Segmentation( cont…)
Once the iris segmented ,the next stage
transform the iris region so that it has fixed
dimensions in order to allow comparisons.
Since variations in the eye like pupil dilation
and the inconsistence iris normalization is
needed.
Pupil dilation inconsistence iris
Normalization process involves unwrapping the
iris and converting it in to its polar equivalent .
Normalization
 It is done using Daugman’s Rubber sheet model .
 The centre of the pupil was considered as the
reference point, and radial vectors pass through
the iris region .
 .
Normalization ( cont...)
The Chines Academy of Sciences – Institute
of Automation (CASIA) eye image database
contains 756 greyscale eye images with 108
unique eyes or class are taken from two
sessions .
Research’s Database
 . ATMs
 .Computer login: The iris as a living
password.
 · National Border Controls UAE
 · Driving licenses and other personal
certificates.
 · benefits authentication.
 ·birth certificates, tracking missing.
 · Credit-card authentication.
 · Anti-terrorism (e.g.:— suspect
Screening at airports)
 · Secure financial transaction (e-
commerce, banking).
 · Internet security, control of access
to privileged information.
Applications
The Largest National Deployment
Iris recognition border-crossing system in the
United Arab Emirates (UAE)
Applications
Applications
Iris Capturing Devices
Accuracy changes with user’s height
,illumination , Image quality etc.
Person needs to be still, difficult to scan
if not co-operated.
Risk of fake Iris lenses.
Alcohol consumption causes
deformation in Iris pattern
Disadvantages
1- cost : expensive
2- Ease of use :- easy.
3- Authentication:- high.
4- Identification :- the iris of any one individual.
5- physiological and/or behavior characteristics :-
the iris is physiological characteristics
6- Ability to applied: . high
7- Community acceptance :- low .
8- Automatic : real time.
9-Life cycle:- does not need update
10- maintenance requirement :- not need to maintenance.
important things
Report on the iris scan?
IRIS SCAN TECH: HISTORY, METHODS & APPLICATIONS

More Related Content

What's hot

Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognitionAhmed Tememe
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation istdeep sharma
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 

What's hot (20)

Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation ist
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 

Similar to IRIS SCAN TECH: HISTORY, METHODS & APPLICATIONS

Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptnaghamallella
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
A03640106
A03640106A03640106
A03640106theijes
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET Journal
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Similar to IRIS SCAN TECH: HISTORY, METHODS & APPLICATIONS (20)

Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Iris print
Iris print Iris print
Iris print
 
E010222124
E010222124E010222124
E010222124
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
A03640106
A03640106A03640106
A03640106
 
Iris sem
Iris semIris sem
Iris sem
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET-Unconstraint Eye Tracking on Mobile Smartphone
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

More from Mazin Alwaaly

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometricsMazin Alwaaly
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earMazin Alwaaly
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionMazin Alwaaly
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identificationMazin Alwaaly
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprintsMazin Alwaaly
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometricMazin Alwaaly
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMazin Alwaaly
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithmsMazin Alwaaly
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithmsMazin Alwaaly
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniquesMazin Alwaaly
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in videoMazin Alwaaly
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and videoMazin Alwaaly
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representationMazin Alwaaly
 

More from Mazin Alwaaly (20)

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometrics
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and ear
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identification
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital libraries
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithms
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in video
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and video
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representation
 

Recently uploaded

Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfSumit Kumar yadav
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 

Recently uploaded (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 

IRIS SCAN TECH: HISTORY, METHODS & APPLICATIONS

  • 1. LUCTUER BY RAFIDH HAMAD KHALAF IRIS RECOGNITION By RAFIDH
  • 2. IRIS Introduction ? History of Iris Recognition? What the iris ?  Why iris ? Methods of iris recognition system ? Image Acquisition ? Segmentation ? Normalization ? Applications ? Overview:
  • 3. Iris recognition is a method of biometric identification and authentication that use pattern-recognition techniques based on high resolution images of the irises of an individual's eyes It is considered to be the most accurate biometric technology available today. Introduction
  • 4. History of Iris Recognition 1997-1999 1987 1987 1980 The concept of Iris Recognition was first proposed by Dr. Frank Burch in 1939. It was first implemented in 1990 when Dr. John Daugman created the algorithms for it. These algorithms employ methods of pattern recognition and some mathematical calculations for iris recognition.
  • 5. Iris is the area of the eye where the pigmented or colored circle,usually brown, blue, rings the dark pupil of the eye. IRIS Normal Eye Example of iris
  • 7. What is Iris ? The colored ring around the pupil of the eye is called the Iris
  • 8. What is Iris ?  The iris is a thin circular diaphragm, which lies between the cornea and the lens of the human eye.  The iris is perforated close to its centre by a circular aperture known as the pupil.  The function of the iris is to control the amount of light entering through the pupil.  The average diameter of the iris is 12 mm, and the pupil size can vary from 10% to 80% of the iris diameter.
  • 9. Externally visible highly protected internal organ. Unique patterns. Not genetically connected unlike eye color. Stable with age. Impossible to alter surgically. Living Password, Can not be forgotten or copied. Works on blind person. User needs not to touch appliances. Accurate , faster , and supports large data base. What is Iris ?
  • 10. Methods Of IRIS Recognition System  In identifying one’s iris, there are 2 methods for its recognition and are:  Active  Passive The active Iris system requires that a user be anywhere from six to fourteen inches away from the camera. The passive system allows the user to be anywhere from one to three feet away from the camera that locates the focus on the iris.
  • 11. Iris Recognition Diagram Image Acquisition Image Acquisition Image Acquisition Iris Segmentation Normalization Feature Encoding Feature Matching Feature points in the iris region IrisTemplates Database Identify or Reject Subject Iris Segmentation Normalization Feature Encoding Identify or Reject Subject IrisTemplates Database Eye Image Iris Region IrisTemplate
  • 12. Image Acquisition  The first step, image acquisition deals with capturing sequence of iris images from the subject using cameras and sensors with High resolution and good sharpness.  These images should clearly show the entire eye especially iris and pupil part, and then some preprocessing operation may be applied to enhance the quality of image e.g. histogram equalization, filtering noise removal etc. (CASIA) eye image database
  • 13.
  • 14. The first stage of iris segmentation to isolate the actual iris region in a digital eye image. The iris region, can be approximated by two circles, one for the iris/sclera boundary and another, interior to the first, for the iris/pupil boundary. Segmentation/concept
  • 15. the derivatives in the horizontal direction for detecting the eyelids, and in the vertical direction for detecting the outer circular boundary of the iris . Taking only the vertical gradients for locating the iris boundary will reduce influence of the eyelids when performing circular Hough transform. Segmentation/eyelids
  • 16.  eyelashes are treated as belonging to two types : 1 -separable eyelashes: which are isolated in the image . 2-multiple eyelashes: which are bunched together and overlap in the eye image.  Eyelids and Eyelashes are the main noise factor in the iris image.  These noise factors can affect the accuracy of the iris recognition system.  After applying circular Hough transform to iris, we are applying linear Hough transform and we get line detected noise region in the iris image.  We have to remove these detected eyelids and eyelashes from the iris image Thresolding is used for the removal of eyelashes. Then, the noise free iris image can be available for future use. Segmentation/eyelash
  • 17. 1- Edge Detector 2- Hough Transform Double thresholdin g edeg 1- Edge Detector 2- Hough Transform LINEAR HOUGHTRANSFORM CIRCULAR HOUGH TRANSFORM smoothing Finding gradient Segmentation Diagram
  • 18. a. Iris and pupil localization: Pupil and Iris are considered as two circles using Circular Hough Transform Process of finding the iris in an image b. Eye lid detection and Eye lash noise removal using linear Hough Transform method Segmentation( cont…)
  • 19. Once the iris segmented ,the next stage transform the iris region so that it has fixed dimensions in order to allow comparisons. Since variations in the eye like pupil dilation and the inconsistence iris normalization is needed. Pupil dilation inconsistence iris Normalization process involves unwrapping the iris and converting it in to its polar equivalent . Normalization
  • 20.  It is done using Daugman’s Rubber sheet model .  The centre of the pupil was considered as the reference point, and radial vectors pass through the iris region .  . Normalization ( cont...)
  • 21. The Chines Academy of Sciences – Institute of Automation (CASIA) eye image database contains 756 greyscale eye images with 108 unique eyes or class are taken from two sessions . Research’s Database
  • 22.  . ATMs  .Computer login: The iris as a living password.  · National Border Controls UAE  · Driving licenses and other personal certificates.  · benefits authentication.  ·birth certificates, tracking missing.  · Credit-card authentication.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e- commerce, banking).  · Internet security, control of access to privileged information. Applications
  • 23. The Largest National Deployment Iris recognition border-crossing system in the United Arab Emirates (UAE)
  • 27. Accuracy changes with user’s height ,illumination , Image quality etc. Person needs to be still, difficult to scan if not co-operated. Risk of fake Iris lenses. Alcohol consumption causes deformation in Iris pattern Disadvantages
  • 28. 1- cost : expensive 2- Ease of use :- easy. 3- Authentication:- high. 4- Identification :- the iris of any one individual. 5- physiological and/or behavior characteristics :- the iris is physiological characteristics 6- Ability to applied: . high 7- Community acceptance :- low . 8- Automatic : real time. 9-Life cycle:- does not need update 10- maintenance requirement :- not need to maintenance. important things
  • 29. Report on the iris scan?