SlideShare uma empresa Scribd logo
1 de 19
IRIS RECOGNITION
BY :
N.SRUTHI
CONTENTS
 THE NEED FOR BIOMETRIC
 ANATOMY OF HUMAN EYE
 WHAT IS IRIS
 CHARACTERISTICS OF IRIS
 WHAT IS IT?
 WHY?
 HOW:THE SCIENCE BEHIND IT
 MERITS
 DEMERITS
 APPLICATIONS
 CONCLUSION
The need for biometrics
 As per wikipedia,
“Biometrics consists of methods for uniquely recognizing
humans based upon one or more intrinsic physical or
behavioral traits”
 The need for biometrics
-> Rapid development in technology
-> Globalization
Comparision
Anatomy of the Human Eye
• Eye = Camera
• Cornea bends, refracts,
and focuses light.
• Retina = Film for image
projection (converts image
into electrical signals).
• Optical nerve transmits
signals to the brain.
What is Iris?
 The coloured ring around the pupil of the eye is called the iris.
 Controls light levels inside the eye.
 Tiny muscles that dilate and constrict the pupil size.
 Divides the front of the eye from the back of the eye.
 Color comes from melanin.
Individuality of Iris
Left and right eye irises have distinctive pattern.
Characteristics of Iris
 Has highly distinguishing texture.
 Right eye differs from left eye.
 Twins have different iris texture.
 Iris pattern remains unchanged after the age of two and does not
degrade overtime or with the environment.
 Iris patterns are extremely complex than other biometric
patterns.
What Is It?
“Iris recognition is a method of biometric authentication that uses
pattern-recognition techniques based on high-resolution images of the
irises of an individual's eyes.”
WHY ?
• The iris is a living password
• Artificial duplication is virtually impossible
• Probability of matching of two irises is 1:1078
• Genetic independency
• Its inherent isolation and protection from the external
environment.
HOW : THE SCIENCE BEHIND IT
Iris Localization
 Both the inner boundary and the outer boundary of a typical
iris can be taken as circles.
 The inner boundary between the pupil and the iris is detected.
Recording of Identities
 Highly protected, internal organ of the eye
 Iris patterns possess a high degree of randomness
 Patterns apparently stable throughout life.
 A key advantage of iris recognition is its stability, or template
longevity, as a single enrollment can last a lifetime.
Merits
Demerits
 Obscured by eyelashes, lenses, reflections
 Illumination should not be visible or bright.
 Small target to acquire from a distance
 High cost
Applications
 . ATMs
 .Computer login: The iris as a living password.
 · National Border Controls: The iris as a living password.
 · Premises access control (home, office, laboratory etc.).
 · Driving licenses and other personal certificates.
 · Forensics, birth certificates, tracking missing or wanted person
 · Credit-card authentication.
 · Automobile ignition and unlocking; anti-theft devices.
 · Anti-terrorism (e.g.:— suspect Screening at airports)
 · Secure financial transaction (e-commerce, banking).
 · Internet security, control of access to privileged information.
Conclusion
 Iris recognition has proven to be a very useful and
versatile security measure.
 It is a quick and accurate way of identifying an individual
with no chance for human error.
 Iris recognition will prove to be a widely used security
measure in the future.
References
 ·http://en.wikipedia.org/wiki/Iris_recognition
 .www.seminars4u.com
Iris recognition

Mais conteúdo relacionado

Mais procurados

Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
Sunil Kumar Chawla
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
Nadeer Abu Jraerr
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 

Mais procurados (20)

Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 

Semelhante a Iris recognition

IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
ijtsrd
 
The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
SwarupKulkarni
 

Semelhante a Iris recognition (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris/Retina Identification System
Iris/Retina Identification SystemIris/Retina Identification System
Iris/Retina Identification System
 
Iris Recognition .pptx
Iris Recognition .pptxIris Recognition .pptx
Iris Recognition .pptx
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics
BiometricsBiometrics
Biometrics
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
The Inbuilt Password Iris
The Inbuilt Password IrisThe Inbuilt Password Iris
The Inbuilt Password Iris
 
Iris print
Iris print Iris print
Iris print
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 

Mais de NARAHARISRUTHI1

Mais de NARAHARISRUTHI1 (11)

The Bermuda Triangle
The Bermuda TriangleThe Bermuda Triangle
The Bermuda Triangle
 
Nano technology
Nano technology Nano technology
Nano technology
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Nano technology
Nano technologyNano technology
Nano technology
 
Data transmission
Data transmissionData transmission
Data transmission
 
O led technology
O led technologyO led technology
O led technology
 
Wi charge
Wi chargeWi charge
Wi charge
 
Haptic technology
Haptic  technologyHaptic  technology
Haptic technology
 
Public speaking
Public speakingPublic speaking
Public speaking
 
Laser communication
Laser communicationLaser communication
Laser communication
 
Internet Of Things(IOT)
Internet Of Things(IOT)Internet Of Things(IOT)
Internet Of Things(IOT)
 

Último

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Último (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

Iris recognition

  • 2. CONTENTS  THE NEED FOR BIOMETRIC  ANATOMY OF HUMAN EYE  WHAT IS IRIS  CHARACTERISTICS OF IRIS  WHAT IS IT?  WHY?  HOW:THE SCIENCE BEHIND IT  MERITS  DEMERITS  APPLICATIONS  CONCLUSION
  • 3. The need for biometrics  As per wikipedia, “Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits”  The need for biometrics -> Rapid development in technology -> Globalization
  • 5. Anatomy of the Human Eye • Eye = Camera • Cornea bends, refracts, and focuses light. • Retina = Film for image projection (converts image into electrical signals). • Optical nerve transmits signals to the brain.
  • 6. What is Iris?  The coloured ring around the pupil of the eye is called the iris.  Controls light levels inside the eye.  Tiny muscles that dilate and constrict the pupil size.  Divides the front of the eye from the back of the eye.  Color comes from melanin.
  • 7. Individuality of Iris Left and right eye irises have distinctive pattern.
  • 8. Characteristics of Iris  Has highly distinguishing texture.  Right eye differs from left eye.  Twins have different iris texture.  Iris pattern remains unchanged after the age of two and does not degrade overtime or with the environment.  Iris patterns are extremely complex than other biometric patterns.
  • 9. What Is It? “Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irises of an individual's eyes.”
  • 10. WHY ? • The iris is a living password • Artificial duplication is virtually impossible • Probability of matching of two irises is 1:1078 • Genetic independency • Its inherent isolation and protection from the external environment.
  • 11. HOW : THE SCIENCE BEHIND IT
  • 12. Iris Localization  Both the inner boundary and the outer boundary of a typical iris can be taken as circles.  The inner boundary between the pupil and the iris is detected.
  • 14.  Highly protected, internal organ of the eye  Iris patterns possess a high degree of randomness  Patterns apparently stable throughout life.  A key advantage of iris recognition is its stability, or template longevity, as a single enrollment can last a lifetime. Merits
  • 15. Demerits  Obscured by eyelashes, lenses, reflections  Illumination should not be visible or bright.  Small target to acquire from a distance  High cost
  • 16. Applications  . ATMs  .Computer login: The iris as a living password.  · National Border Controls: The iris as a living password.  · Premises access control (home, office, laboratory etc.).  · Driving licenses and other personal certificates.  · Forensics, birth certificates, tracking missing or wanted person  · Credit-card authentication.  · Automobile ignition and unlocking; anti-theft devices.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e-commerce, banking).  · Internet security, control of access to privileged information.
  • 17. Conclusion  Iris recognition has proven to be a very useful and versatile security measure.  It is a quick and accurate way of identifying an individual with no chance for human error.  Iris recognition will prove to be a widely used security measure in the future.