Iris Scaner

Published on May 2016 | Categories: Documents | Downloads: 28 | Comments: 0 | Views: 163
of 23
Download PDF   Embed   Report




Training Presentation on IRIS SCANNER
at MANTRA SOFT TECH. Submitted by:
Rajvrit Singh ECE 4th yr 7th sem.

• • • • • • • •

Company profile Introduction Working of Iris Scanner Iris performance Advantages Applications Software required Conclusion

• Mantra Softech (India) Pvt Ltd is a leader in Biometric security and Business solutions. Automated Fingerprint Identification System(AFIS) and Iris identification search matching are the primary products of Mantra Technologies. • Established in 2002, the Mantra Softech (India) Pvt Ltd develops identity management and access control solutions for the information security requirements of large and medium sized organizations. In addition to the standard access protection systems in common use such as passwords, smart cards, solutions offered by Mantra Softech (India) Pvt Ltd also include sophisticated biometric identification systems.

• Mr. Sachin Verma (Director) • Mr. Jignesh Prajapati (HR Manager) • Mr. Vikash Verma (Training Coordinator) • Mr. Keyur Patel (Training Coordinator)

• • • • • • •

Ahmedabad Bangalore Jaipur Surat Delhi Mumbai Uk

• Biometrics is the science of measuring physical or anatomical characteristics of individuals. • It performs automatic identification of a person based on his/her physiological characteristics.

• Iris Recognition • Fingerprint Recognition • Voice Recognition • Signature Recognition • Face Recognition

• The iris is the colorful part of the eye between the white sclera and the pupil. • Iris is the only internal organ of the human body that is normally externally visible.

• The iris identification program may be divided into four main functional blocks: 1.Image Acquisition. 2.Preprocessing. 3.Image Analysis. 4.Image Recognition.

• The acquired image always not only “useful” parts (IRIS), but also some “irrelevant” parts e.g. eyelid, pupil . • So the preprocessing is composed of two steps: 1.Iris Localization. 2.Edge Detection.

• In this stage, we should determine iris part of the image by localizing the position of the image derived from inside the limbus (outer boundary) and outside the pupil (inner boundary), and finally convert the iris part into a suitable representation.

• It is used to find complex object boundaries by marking potential edge point corresponding to places in an image where rapid change in brightness occurs. • In other words, edge is defined by the discontinuity in gray values. An edge separates two distinct objects.

• The features of the iris are then analyzed and digitized into a 512 byte (4096 bits) Iris Code record. • In this iris code half of the describes the features and another half of the describes the control the comparison process.

• Iris code record is stored in the database for future comparison

• During a recognition attempt, when an iris is presented at a recognition point, the same process is repeated ; however the resulting Iris Code record is not stored but is compared to every file in the database.

1. A person stands in front of the iris identification system, between one and three feet away, while a wide angle camera calculates the position of their eye. 2. A second camera zooms in on the eye and takes a black and white image. 3. Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like an “eye print”. 4. To prevent a fake eye from being used to fool system, these devices may very the light shone into the eye and watch for pupil dilation.

• FAR - As low as 1 in 1,000,000

• FRR –around 2%

1.Highly Protected Internal Organ Of The Eye. 2.Externally Visible Patterns Imaged From A Distance. 3.Pattern Apparently Stable Throughout The Life. 4.Image Analysis And Encoding Time: 1 Seconds. 5.Search Speed: 1,00,000 Iris Code Per Second.

1. Computer login: the iris as a living password. 2. National border controls: the iris as a living passport. 3. Driving licenses and personal certificates. 4. Internet security. 5. Premises access control (Home, Office, Laboratory). 6. Anti-terrorism (e.g. security screening at airports) 7. Financial Transactions (electronic commerce and banking). 8. Secure accesses to bank cash machine accounts.

• Iris recognition system 1.0

• Iris application server 2.0
• Iris 3D 1.0.8

• Biometric technology has great potential • There are many biometric products around, regarding the different biometric technologies • Since September 11th, biometric products are pushed forward • Shortcomings of biometric systems due to o Manufacturers ignorance of security concerns o Lack of quality control o Standardisation problems • Manufacturers have to take security concerns serious

Sponsor Documents

Or use your account on


Forgot your password?

Or register your new account on


Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in