Iris

Published on May 2016 | Categories: Documents | Downloads: 57 | Comments: 0 | Views: 792
of 13
Download PDF   Embed   Report

Comments

Content

Visit: www.geocities.com/chinna_chetan05/forfriends.html

CONTENTS:
 ABSTRACT.  BIO-METRICS. • • • • • • What is biometrics? How a biometric system works. Iris as a bio-metric.

 IRIS RECOGNITION. Iris recognition evolution. What is iris recognition? Why iris recognition technology?

 IRIS FEATURES AND PROCESS.  BIOMETRIC COMPARISIONS.  DESCRIPTION OF THE METHOD. TECHNOLOGY

 RESULT AND EFFECTIVENESS.
 MERITS OS IRIS TECNOLOGY.  DEMERITS OF IRIS TECHNOLOGY.  CURRENT USES(REAL TIME)  APPLICATION DEPLOYMENT.  LIMITATIONS.  CONCLUSION.  REFERENCES. AND MARKET

1 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html

ABSTRACT: Historically, identity or authentication conventions were based on things one possessed (a key, a passport, or identity credential), or something one knew (a password, the answer to a question, or a PIN.) This possession or knowledge was generally all that was required to confirm identity or confer privileges. However, these conventions could be compromised - as possession of a token or the requisite knowledge by the wrong individual could, and still does, lead to security breaches. To bind identity more closely to an individual and appropriate authorization, new identity convention is becoming more prevalent. Based not on what a person has or knows, but instead on what physical characteristics or personal behavior traits they exhibit, these are known as
biometrics

- measurements of behavioral or

physical attributes - how an individual smells, walks, signs their name, or even types on a keyboard, their voice, fingers, facial structure, vein patterns or patterns in the iris. In this paper I have tried to describe the method and the revolution that the iris recognition could make in the future security measures that the security managers will take for optimization of security levels which make a 100% secure globe. 2 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html difficult to duplicate. Smart cards and tokens also provide a unique identifier, but BIO-METRICS: What is Biometrics? biometrics has an advantage over these devices: a user can not lose or forget his or
her fingerprint, retina, or voice.

Biometrics is the use of physical characteristics to identify a person. This rapidly emerging technology is becoming more common as security measures are taken to a new level. Retinal scan biometrics uses iris recognition to identify the pattern of the iris that is as unique to each individual as are fingerprints. How a biometric system works? Biometrics system uses hardware to capture the biometric information, and software to maintain and manage the system. In general, the system translates these measurements to a thematical computer-readable format then a user first creates a biometric profile, known as a template, that template is stored in a database. The biometrics system then compares this template to the new image created every time a user accesses the system. For an enterprise, biometrics provides value in two ways. First, a biometric device automates entry into secure locations, relieving or at least reducing the need for full-time monitoring by personnel. Second, when rolled into an authentication scheme, biometrics adds a strong layer of verification for user names and passwords. Biometrics adds a unique identifier to network authentication, one that is extremely 3 Email: [email protected]
Above figure describes the process involved in using a biometric system for security. It contains nine steps: (1) Capture the chosen biometric; (2) Process the biometric and extract and enroll the biometric template; (3) Store the template in a local repository, a central repository, or a portable token such as a smart card; (4) Live-scan the chosen biometric; (5) Process the biometric and extract the biometric template; (6) Store the reference template (7) Match the scanned biometric against stored templates;

Visit: www.geocities.com/chinna_chetan05/forfriends.html
(8) Provide a matching score to business applications with threshold value; (9)Record a secure audit trail with respect to system

IRIS RECOGNITION WHAT IS IRIS RECOGNITION? Of all the biometric technologies used for human authentication today, it is generally conceded that iris recognition is the most accurate. Coupling this high confidence authentication with factors like outlier group size, speed, usage/human factors, platform versatility and flexibility for use in identification or verification modes - as well as addressing issues like database size/management and privacy concerns - iris recognition has also shown itself to be exceedingly versatile and suited for large population applications.

IRIS AS A BIOMETRIC The iris is an overt body that is available for remote assessment with the aid of a machine vision system to do automated iris recognition.  Iris recognition technology combines computer vision, pattern recognition, statistical inference, and optics.  The spatial patterns that are apparent in the human iris are highly distinctive to an individual its extremely data-rich physical structure  Genetic independence — no two eyes are the same patterns apparently stable throughout life  Physical protection by a transparent window (the cornea), highly protected by internal organ of the eye  Externally visible, so noninvasive — patterns imaged from a distance IRIS RECOGNITION EVOLUTION: Iris recognition was developed in the early 1990s by John Daugman at the University of Cambridge. The method analyses individual patterns of the iris and today is mainly used for verification purposes (access control) e.g. at various airports . 4 Email: [email protected]

WHY

IRIS

RECOGNITON

TECHNOLOGY? There are many reasons why iris recognition is a particularly attractive technology for identity management. 1. Smallest outlier population.

There are relatively few people who don't have at least one eye, so there are only a few people who can't use the technology. While blind people can be difficult to enroll, there are instances where blind people have used iris

Visit: www.geocities.com/chinna_chetan05/forfriends.html recognition successfully (the technology is pattern-dependent, not sight dependent). 2. Unparalleled Stability. The patterns in the human iris are fixed from about one year in age and remain constant This means that once a subject is enrolled, the need to re-enroll is lower than for other biometric identification options. 3. Unique Design Facilitates Superior Management of Large Databases. Iris recognition is the only biometric authentication technology designed to work in the 1-n or exhaustive search mode. This makes it ideal for handling applications of large user groups, such as a National Documentation application. The technology is ideally suited to handle large databases, and does so without any degradation in accuracy. Iris Access platforms integrate well with large database back ends like Microsoft® SQL and Oracle® 8 & 9i. 4. Unmatched Search Speed Iris Access platform searched records nearly 20 times faster than the next fastest technology. Iris recognition technology platforms and solutions enabled by are ideal for applications requiring high throughput speed. The iris has many features that can be used to distinguish one iris from another . One of the primary visible characteristic is the trabecular meshwork, a tissue which gives the appearance of dividing the iris in a radial fashion that is permanently formed by the eighth month of gestation. During the development of the iris, there is no genetic influence on it, a process known as chaotic morphogenesis that occurs during the seventh month of gestation, which means that even identical 5 Email: [email protected] THE IRIS FEATURES AND PROCESS: 5. Application Mode Versatility.

While the technology was initially designed to work in one-to-many search mode, iris recognition is perfectly suited to applications that require 1-1 matching, or verification mode operation. This makes iris authentication ideal for use in upgrading security systems that have a large base of installed card readers or PIN pads. technologyis ideally suited for smartcard use, - in this case a 512byte template held on the smartcard.

Visit: www.geocities.com/chinna_chetan05/forfriends.html twins have differing irises. The iris has in excess of 266 degrees of freedom, i.e. the number of variations in the iris that allow one iris to be distinguished from another. The fact that the iris is protected behind the eyelid, cornea and aqueous humour means that, unlike other biometrics such as fingerprints, the likelihood of damage and/or abrasion is minimal. The iris is also not subject to the effects of aging which means it remains in a stable form from about the age of one until death. The use of glasses or contact lenses (colored or clear) has little effect on the representation of the iris and hence does not interfere with the recognition technology.
Biometrics 1.Retinal Scan 2. Iris Scan
3. Fingerprints 4. Hand Geometry 5. Signature Dynamics 6. Voice Dynamics

Crossover Accuracy 1:10,000,000+ 1:131,000 1:500 1:500 1:50 1:50

PROGRAMMING LANGUAGES FOR IRIS TECHNOLOGY: • • • C. C++. JAVA.

Figure shows examples of the iris pattern and they demonstrate the variations found in irises.

Table

showing

accuracy

of

bio-metric

techniques:

6 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html

METHOD CODED PATTERN Iris Iris pattern recognition Finger Finger prints printing Hand Size,lengths shape thickness of hands Facial Outline,shape recognition and distribution of eyes and nose signature Shape of letters,writing order,pen pressure Voice Voice printing characeristics

MISIDENTIFICATION SECURITY RATE 1/1,200,000 High 1/1,000 Medium 1/700 Low 1/100 Low

APPLICAT IONS High security facilities Universal Low-security facilities Low-security facilities

1/100

Low

Low-security facilities Telephone services

1/30

Low

From the above table it is clear that for every 1,200,000 tests there is only one failure or misidentification with regard to Iris recognition technology, the security referred in the table is also very high ,even though the cost may rise high the optimum security will return some excellent returns to the fields it has been used. Therefore according my study on Iris recognition technology the future of security techniques that will be used will be Iris recognition technology 7 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html

Generally the procedure runs through DESCRIPTION OF METHOD: The complex structure of the iris is not genetically defined, but develops randomly in the 3rd to 8th month of pregnancy in the eye of the foetus. The structure of the iris remains constant throughout the whole life, but in the first years after birth the colour can change through further pigmentation. Today more than 400 different characteristics of these structures can be discriminated of which about 173 are being used for iris recognition. The likeliness that two people have identical structures of the iris is estimated to be 1:1078 starting point of the method is a monochrome camera picture taken by near infrared light (NIR) at a distance of 0.1 to 1 meter. The resolution of the taken picture varies from 50 to 140 dpi. the steps.:

8 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html
Figure illustrates that the iris has been isolated

Figure: Picture of an iris and graphical representation of an IrisCode

by localizing the inner and outer boundaries. It is obviously that the process can

discrimination the regions that have different texture characteristics. Maximal statistical measure value was 2.54 what means that it is quite good and accurate result. False

Acceptance Rate (FAR) and False Rejection Rate (FRR) are the two critical

For the calculation of the so called Iris Code (a string of 2048 bits) e. the DaugmanAlgorithm is used. The above picture I ple of an iris picture together with a graphical representation of the calculated IrisCode. The outer and inner borders of the iris are marked using white lines as in .The comparison of an IrisCode against a stored template is done mainly using the ‘Hamming Distance’ method RESULT AND EFFECTIVENESS: To show the effectiveness, divide the 240 samples of irises data into 20 equal size folders, such that a single folder is used for testing the model that has been developed from the remaining nineteen sets. The images were acquired under different conditions. The original images were collected as grey-level images. 9 Email: [email protected]

measurements of system effectiveness. This system is scored a perfect 0.001% FAR and0.55% FRR. The feature vector consists of 2048 components in Daugman's method. Figure : process iris pattern during the

acquisition (a)failure cases

(b) Success case

.

Visit: www.geocities.com/chinna_chetan05/forfriends.html Figure : Localization of the iris pattern result Iris recognition systems can cycle through 1,500,000 matches per minute, which is 20 times greater processing speed than any other biometrics systems. In reallife applications this translates into an identity decision being made in seconds. METHOD Wildes -----> RATE% 99.2% 100% 97.3% Safety and Perceived Invasiveness The co-operation of the user. involves the enrollee being still, and looking at a certain spot. iris scanning is less difficult than retina scanning . The devices capture images of the eye from a comforTable distance without bright lights or lasers. The IrisCode is hashed and encrypted as a security measure to prevent theft. If a person feels their recognition patterns have been compromised, re-enrollment is possible an infinite number of times by using a permuted IrisCode Costs: Iris scanning can increase The enrollment process is also speedily accomplished, typically in three minutes or less. Daugman ---- > Wavelet ----- >

MERITS OF IRIS TECHNOLOGY Accuracy In a comprehensive study conducted by Britain’s National Physical Laboratory (NPL) iris recognition technology decisively outperformed six other biometrics systems – facial recognition, fingerprint, hand geometry, and vein and voice recognition. Tested to positively environment identify iris users in an office recognition technology

registered a false match rate of zero in 2,735,529 comparisons and a 0.0 percent failure-to-acquire rate. Iris recognition had a false rejection rate of 0.0188, the lowest of all systems rested. Four of the other biometrics systems registered a false rejection rate of 1025 percent. Speed

profitability by minimizing both costs and vulnerabilities associated with password and password management. Research indicates US businesses spend an average of $200 per person a year on password

10 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html management. The value proposition of FUTURE OUTLOOK A report on “Iris recognition technology has the depth to last a long time." predicts that there will be a growth in the demand for iris recognition products in the next 12 to 18 months in the healthcare industry to solve HIPPA DEMERITS OF IRIS  Difficult to use:  Acquisition systems are not straightforward  User must be positioned correctly compliance and to improve the efficiency of hospitals. Drug dispensing, prescription fulfillment, and billings may also utilize this system. Emigration services is another area iris recognition is likely to gain in use. Soonbe used in a pilot program at Heathrow in the UK. As both conventional False nonmatch rates need to improve   Works with smaller databases Difficult to capture the images  User discomfort  Users reluctant to capture their iris  Acquisition devices are mostly proprietary CURRENT USES OF IRIS TECHNOLOGY-(REAL TIME EXAMPLES):  Iris recognition is currently in use in all sorts of applications in the physical access arena cluding Airports, government agencies, banks, and research laboratories are utilizing this technology. and e-businesses move toward this technology it may be more unusual to be asked to prove identity with a driver’s license or credit card.

implementing an iris recognition system is three-dimensional. Cost, accuracy, and ease of use are all important considerations.Both iris scanning and retina scanning are at the upper end of the scale in cost compared to other biometric systems.

 False nonmatching and failure to enroll 

11 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html  Public sector customers include the US Congress, Departments of Defense, State,and Treasury.  Airports in Charlotte, NC, Amsterdam (Netherlands) and Frankfort (Germany) andacross Canada are using iris recognition.  Some private sector users are Bank United (ATMs), GTE, Hewlett Packard, Lockheed Martin and BT.


 The most prominent recent deployments of iris-scan technology have been passenger authentication programs at airports in the U.S., U.K., Amsterdam, and Iceland.  The technology is also used in corrections applications in the U.S. to identify inmates. A number of developing countries are considering iris-scan technology for national-ID. It is believed that the largest deployed Iridian database spans fewer than 100,000enrollees Limitations : There are a few known limitations especially in the use of the methods. They apply mainly to  People having no eye or no iris (so called aniridia; this happens to 1.8 of 100,000 people)  Blind people having problems adjusting their eye to the camera taking the picture  People having pronounced nystagmus (tremor of the eye) having problems getting a proper picture of their iris.  Privacy aspects

. prisons in both Pennsylvania and Florida for making positive ,identification of release or transfer. prisoners prior to

 Current research gives evidence that from the (raw) picture of the iris certain diseases such as glaucoma and iritis can be diagnosed APPLICATION AND MARKET DEPLOYMENT:  Iris-scan technology has traditionally been deployed in high-security employee-facing physical access implementations  Iridian - the technology’s primary developer - is dedicated to moving the technology to the desktop, and has had some success in small-scale logical access deployments.

12 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html

REFERENCES: CONCLUSION: Iris Recognition is the High Precision Identification Technology with error rate of 1/1,200,000. It is set to grow substantially through 2007 and beyond. Iris-scan offers low false match rates and hands-free operation, and is the only viable alternative to fingerprint technologies in applications where a single record must be located. Revenues of iris scan are projected to grow from USD16.2 million in 2002 to USD 210.2 million in 2007. Iris-scan revenues market. are expected to comprise approximately 5% of the entire biometric  An article by SANGEETHA

BOENA titled as ---Iris recognition: An emerging biometric technology  A study on PKI and biometrics.  An iris recognition system to enhance e-security based on

wavelet theory(article).

13 Email: [email protected]

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close