View
217
Download
1
Category
Preview:
Citation preview
8/20/2019 Report Sayani
1/25
106101
8/20/2019 Report Sayani
2/25
H . W
.
I () (, ) (PIN, ). T
, ,
.
T
. B
. T
. T ,
.
I ,
.
H,
. F , '
. C,
. M,
. H,
.
T
. .
8/20/2019 Report Sayani
3/25
1. INTRODUCTION
1.1 HISTORY AND DEVELOPMENT OF BIOMETRICS
1.2 BASIC STRUCTURE OF A BIOMETRIC SYSTEM
1.3 CLASSIFICATION OF BIOMETRICS
1.4 TYPES OF BIOMETRICS
2. IRIS RECOGNITION
2.1 INTRODUCTION
2.2 ANATOMY OF THE HUMAN IRIS
2.3 STAGES INVOLVED IN IRIS DETECTION
2.3.1 IMAGE ACQUISITION ANS SEGMENTATION
2.3.2 NORMALIZATION
2.3.3 FEATURE ENCODING AND MATCHING
2.4 BIOMETRIC SYSTEM PERFORMANCES
2.5 DECISION ENVIRONMENT
3. ADVANTAGES AND DISADVANTAGES
4. CONCLUSION
8/20/2019 Report Sayani
4/25
1
B
. B
, , , , . S
, B , ,
,
. I
C. B ,
. O , , . H,
, , .
T 1936
F B. B 1980 J B ,
. I 1987, A S
L F 1987 J D
. T D 1994
.
D I
C S
. O
1996 S ATM IRIS
8/20/2019 Report Sayani
5/25
1 . T
NCR C D C I997
1999. P A
, , . T
,
. C , D
.
Biometric authentication requires comparing a registered or enrolled biometric sample (biometric
template or identifier) against a newly captured biometric sample (for example, a fingerprint
captured during a login).
During Enrollment, a sample of the biometric trait is captured, processed by a computer, and
stored for later comparison.
Biometric recognition can be used in Identification mode, where the biometric system identifies
a person from the entire enrolled population by searching a database for a match based solely on
the biometric. For example, an entire database can be searched to verify a person has not applied
8/20/2019 Report Sayani
6/25
for entitlement benefits under two different names. This is sometimes called “one-to-many”
matching.
A system can also be used in Verification mode, where the biometric system authenticates a
person’s claimed identity from their previously enrolled pattern. This is also called “one-to-one”
matching. In most computer access or network access environments, verification mode would be
used. A user enters an account, user name, or inserts a token such as a smart card, but instead of
entering a password, a simple touch with a finger or a glance at a camera is enough to authenticate
the user.
8/20/2019 Report Sayani
7/25
B . A
, ,
F . A ,
. T
.
T '
. F ,
. F
. O
,
. W ,
, .
8/20/2019 Report Sayani
8/25
T
. F
. U
,
()
.
. S
. T
. T
" ." S
: , .
M ,
. T
. T
M , , ,
.
T
. I . T
. I
. S
. T
.
T ,
. T , ,
. O
8/20/2019 Report Sayani
9/25
. I
,
.
T
. T ,
. O
.
2.
2.1
I , ,
. L
,
. N (NIR)
. B NIR
,
. T
. F,
. T, ,
. A
.
8/20/2019 Report Sayani
10/25
2.2
T ,
.T
. T ,
, . T 12 , 10% 80%
.
T ; ,
. T ,
, . T
. T , . A
, .
F .
T
, . F
. T , . D
,
, .
8/20/2019 Report Sayani
11/25
2.3
I T M S
2.3.1) I A S
2.3.2) I N
2.3.3)F C M
2.3.1
O
.
C
O
G
8/20/2019 Report Sayani
12/25
W
A
T . T
, / ,
, / . T
. A,
. A
.
T :
• H T
• D I D
T H
, , . T
H
. F,
. F ,
H . T
, ,
A H
. W . H
, ,
;
8/20/2019 Report Sayani
13/25
I , W .
,
, F . T
,
.
T
H ,
. N
, ,
H .
) ) ) )
.
D
, . T
8/20/2019 Report Sayani
14/25
I(,) , , Gσ() G
, , 0, 0. T
,
. T
.
T ()
,
NIR . O
,
.
T ,
. I
50% , .., .
T
, .
I . T
.
8/20/2019 Report Sayani
15/25
F S T )
, B )
/ B )
( ).
2.3.2
O ,
. T
. O ,
, , ,
. T ,
,
.
T T
8/20/2019 Report Sayani
16/25
T , , ,
(, θ) (0,1) & θ
(0,2π).T I(,) (,)
(, θ) :
I((, θ),(, θ))I(, θ)
W I(,) C ( (θ),(θ))
,
( (θ), (θ)) θ :
(, θ) = (1) (θ) + (θ)(, θ) = (1) (θ) + (θ)
T
.
I
N F . T
,
.
8/20/2019 Report Sayani
17/25
2.3.3
I ,
. O
. M
. T
, .
E
2D G . T
,
2DG :
R;I
1 0 2D ;
,
; α β 2D
, 8 0.15 1:2 ; Ѡ
, β,
R; I .
O
, , ,
. T
F. T
.
8/20/2019 Report Sayani
18/25
T . L
2D G ,
. T ,
. T ,
, , 2048 .
F ,
2 . T
B E OR (XOR) 2048 2
,
. T XOR
, AND
. T ( ) AND
H .
H 2 .
HD= ( A XOR B) AND ( A AND B)
( A AND B)
8/20/2019 Report Sayani
19/25
W A, B A A , B .
W
A B
. I HD 0 .
T H ,
. T H
, H
. N H ,
0
.I , H
,
H . T
.
I 180 , 2
. T D ,
.
F H , ,
. T
,
. T
, , . T
F .
8/20/2019 Report Sayani
20/25
F:A . O ,
. I ,
. T H , ,
.
The following are used as performance metrics for biometric systems:[4]
( ):
. I .
( ):
. I
.
( ):
. T EER ROC . T
EER ROC . I ,
EER .
( ):
. T .
(): W ,
.
8/20/2019 Report Sayani
21/25
2.5
T D
E. T
: SAME
( , , ),
DIFFERENT . W
P ,
( ) . B
,
.
3.
A
,
, . I
,
, .
8/20/2019 Report Sayani
22/25
I
. T .
F , 2
.
A 10
.
E .
G .
T .
O , , .
D .
I .
A ,
,
A ( , ID , .),
.
8/20/2019 Report Sayani
23/25
I
. A . T
:
U ATM .
U .
C : T
C
S (, ).
B C / .
D .
E .
F, ,
8/20/2019 Report Sayani
24/25
T . P
. T
. F,
. T
. S,
. T, .
I :
. T
,
. A
. I ,
.
8/20/2019 Report Sayani
25/25
1. J. G. D, H
, , . 15, . 11,
. 1141161, 13.
2. J. G. D, H , , . 14, . 1, . 2130, 2004.
3. ,, E IRIS R T I
F E S, ()
, . 2, .1, 200.
4. ..
5. P A, S B A S.
6. J D, T C L, U C, C CB3 0FD, UK,
T : .
7. L H, P L, A N B A S
P P, 2009 F I C I A
S.
8...//50033821
9. Somnath Dey and Debasis Samanta,” I F P I BA S, I J E E E 4:2 2010
Recommended