Karthika krishna ethical hacking slides

Preview:

DESCRIPTION

 

Citation preview

VIDYA BHARATHI INSTITUTE OF TECHNOLOGYPAPER PRESENTATION

ONIris Recognition of a Biometric Technique

BY

D.MADHAVI, B.SRAVANI,ECE II yr, ECE II yr,

madhavi.donthi@yahoo.com bobbalasravani@yahoo.com

Topics of Discussion Introduction

IRIS identification process

IRIS identification system

Method of IRIS identification

Function of IRIS scanner

properties of IRIS

Applications of IRIS recognition

Advantages and Disadvantages

Conclusion

INTRODUCTION:

The colored part of the eye

WHY WE GO FOR IRIS TECHNOLOGY?

LocalizationAcquisition

IrisCode Gabor Filters Polar Representation

Image

Demarcated Zones

IRIS identification process

IRIS IDENTIFICATIONSYSTEM: There are two types of methodsThere are two types of methods

1. Active iris system:Active iris system:

2. Passive iris system:Passive iris system:

requires that a user be requires that a user be anywhere from six to 14 anywhere from six to 14 inches away from the inches away from the camera.camera.

allows the user to be allows the user to be anywhere from one to anywhere from one to three feet away from the three feet away from the camera.camera.

FUNCTION OF IRIS SCANNER: The user places himself so that he

can see his own eye's reflection in the device.

Verification time is generally less than 5 seconds, though the user will only need to look into the device for a couple moments.

A template iris pattern code contains between 256 and 512 bytes of data depending upon the manufacturer. 

Using a camera it converts the small details in the iris stromal pattern into a bit pattern.

IRIS IDENTIFICATION STEPSThere are four simple steps that follow:

A person stands in from of the iris identification system, between one and three feet away, while a wide-angle camera calculates the position of they eye.

A second camera zooms in on the eye and takes a black and white image. 

Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like and "eyeprint".

The captured image, or "eyeprint" is checked against a previously stored

reference template in the database.   

Hamming code

a Hamming code is a linear error-correcting code named after its inventor, Richard Hamming. Hamming codes can detect and correct single-bit errors, and can detect (but not correct) double-bit errors. In other words, the Hamming distance between the transmitted and received code-words must be zero or one for reliable communication.

Properties of the iris

Has highly distinguishing texture

Right eye differs from left eye

Twins have different iris texture

Not trivial to capture quality image

+ Works well with cooperative subjects

+ Used in many airports in the world

ADVANTAGES: Each iris is unique.

High recognition performance and high reliability.

Fast authentication within seconds.

The iris remains stable throughout ones life. Medical advances such as refractive surgery, cataract surgery and cornea transplants do not change the iris' characteristics.

DISADVANTAGES: × Iris scanning is incompatible with the substantial

investment.

× Iris recognition is very difficult to perform at a larger distance .

× Iris recognition is susceptible to poor image quality, with associated failure to enroll rates.

APPLICATIONS: Database access and computer login.

The iris-recognition software is implemented for security purposes around the airport terminal ,which was designed to allow only authorized people to enter certain areas.

To stop this practice- the first door opens upon iris recognition and then closes behind the person, leaving them in a small portal. The next door will only open upon confirming there is just one person in the portal.

CONCLUSION:

Iris recognition is shown to be a reliable and accurate biometric technology.

The biometric iris recognition serves as one of the best processes for safe guarding our personal profiles and can be applied to any of the access control systems requiring high security,hence reducing the crime of using others profiles by another person illegally.

References:www.wikipedia.com

www.techcrunch.comwww.howstuffworks.com

Recommended