Iris

May 30, 2016 | Author: api-26830587 | Category: N/A
Share Embed Donate


Short Description

Download Iris...

Description

Visit: www.geocities.com/chinna_chetan05/forfriends.html

CONTENTS:  ABSTRACT.  BIO-METRICS. •

What is biometrics?



How a biometric system works.



Iris as a bio-metric.

 IRIS RECOGNITION. •

Iris recognition evolution.



What is iris recognition?



Why iris recognition technology?

 IRIS FEATURES AND PROCESS.  BIOMETRIC

TECHNOLOGY

COMPARISIONS.  DESCRIPTION OF THE METHOD.

 RESULT AND EFFECTIVENESS.  MERITS OS IRIS TECNOLOGY.  DEMERITS OF IRIS TECHNOLOGY.  CURRENT USES(REAL TIME)  APPLICATION

AND

MARKET

DEPLOYMENT.  LIMITATIONS.  CONCLUSION.  REFERENCES.

1 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html

ABSTRACT: Historically,

identity

or

authentication

conventions were based on things one possessed (a key, a passport, or identity credential), or something one knew (a password, the answer to a question, or a PIN.) This possession or knowledge was generally all that was required to confirm identity or confer privileges. However,

these

conventions

could

be

compromised - as possession of a token or the requisite knowledge by the wrong individual could, and still does, lead to security breaches. To bind identity more closely to an individual and appropriate authorization,

new identity

convention is becoming more prevalent. Based not on what a person has or knows, but instead on what physical characteristics or personal behavior traits they exhibit, these are known as biometrics

- measurements of behavioral or

physical attributes - how an individual smells, walks, signs their name, or even types on a keyboard, their voice, fingers, facial structure, vein patterns or patterns in the iris. In this paper I have tried to describe the method and the revolution that the iris recognition could make in the future security measures that the security managers will take for optimization of security levels which make a 100% secure globe. 2 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html difficult to duplicate. Smart cards and tokens also provide a unique identifier, but BIO-METRICS:

biometrics has an advantage over these devices: a user can not lose or forget his or

What is Biometrics?

her fingerprint, retina, or voice.

Biometrics is the use of physical characteristics to identify a person. This rapidly emerging technology is becoming more common as security measures are taken to a new level. Retinal scan biometrics uses iris recognition to identify the pattern of the iris that is as unique to each individual as are fingerprints. How a biometric system works? Biometrics system uses hardware to capture the biometric information, and software to maintain and manage the system. In general, the system translates these measurements to a thematical computer-readable format then a user first creates a biometric profile, known as a template, that template is stored in a database.

Above figure describes the process involved in using a biometric system for security. It

The biometrics system then compares this

contains nine steps:

template to the new image created every time a

(1) Capture the chosen biometric;

user accesses the system. For an enterprise,

(2) Process the biometric and extract and

biometrics provides value in two ways. First, a biometric device automates entry

enroll the biometric template; (3) Store the template in a local repository, a

into secure locations, relieving or at least

central repository, or a portable token

reducing the need for full-time monitoring by

such as a smart card;

personnel. Second, when rolled into an authentication scheme, biometrics adds a strong layer of verification for user names and passwords. Biometrics adds a unique identifier to network authentication, one that is extremely 3 Email: [email protected]

(4) Live-scan the chosen biometric; (5) Process the biometric and extract the biometric template; (6) Store the reference template (7) Match the scanned biometric against stored templates;

Visit: www.geocities.com/chinna_chetan05/forfriends.html (8) Provide a matching score to business

IRIS RECOGNITION

applications with threshold value; (9)Record a secure audit trail with respect to

WHAT IS IRIS RECOGNITION?

system

Of all the biometric technologies used for human authentication today, it is

IRIS AS A BIOMETRIC

generally conceded that iris recognition is

The iris is an overt body that is available for

the most accurate. Coupling this high

remote assessment with the aid of a machine

confidence authentication with factors like

vision system to do automated iris recognition.

outlier group size, speed, usage/human

 Iris recognition technology combines

factors, platform versatility and flexibility

computer vision, pattern recognition,

for use in identification or verification

statistical inference, and optics.

modes - as well as addressing issues like

 The spatial patterns that are apparent in

database size/management and privacy

the human iris are highly distinctive to

concerns - iris recognition has also shown

an individual its extremely data-rich

itself to be exceedingly versatile and

physical structure

suited for large population applications.

 Genetic independence — no two eyes are the same patterns apparently stable throughout life  Physical protection by a transparent window (the cornea), highly protected by internal organ of the eye  Externally visible, so noninvasive — patterns imaged from a distance IRIS RECOGNITION EVOLUTION:

WHY

IRIS

RECOGNITON

TECHNOLOGY? There are many reasons why iris recognition is a particularly attractive technology for identity management. 1. Smallest

outlier

population.

There are relatively few people

Iris recognition was developed in the

who don't have at least one eye, so

early 1990s by John Daugman at the University

there are only a few people who

of Cambridge. The method analyses individual

can't use the technology. While

patterns of the iris and today is mainly used for

blind people can be difficult to

verification purposes (access control) e.g. at

enroll, there are instances where

various airports .

blind

4 Email: [email protected]

people

have

used

iris

Visit: www.geocities.com/chinna_chetan05/forfriends.html recognition successfully (the technology is

pattern-dependent,

not

sight

dependent).

5. Application

Mode

Versatility.

While the technology was initially designed to work in one-to-many

2. Unparalleled Stability. The patterns in

search mode, iris recognition is

the human iris are fixed from about one

perfectly suited to applications that

year in age and remain constant This

require

means that once a subject is enrolled, the

verification mode operation. This

need to re-enroll is lower than for other

makes iris authentication ideal for

biometric identification options.

use in upgrading security systems

3. Unique Design Facilitates Superior

1-1

matching,

or

that have a large base of installed

Management of Large Databases. Iris

card

recognition

biometric

technologyis ideally suited for

authentication technology designed to

smartcard use, - in this case a 512-

work in the 1-n or exhaustive search

byte

mode. This makes it ideal for handling

smartcard.

is

the

only

readers

template

or

PIN

held

pads.

on

the

applications of large user groups, such as a National Documentation application. The technology is ideally suited to

THE IRIS FEATURES AND PROCESS:

handle large databases, and does so without any degradation in accuracy. Iris Access platforms integrate well with large

database

back

ends

like

Microsoft® SQL and Oracle® 8 & 9i. 4. Unmatched Search Speed Iris Access platform searched records nearly 20 times faster than the next fastest technology. Iris recognition technology platforms and solutions enabled by are ideal for applications requiring high throughput speed.

The iris has many features that can be used to distinguish one iris from another . One of the primary visible characteristic is the trabecular meshwork, a tissue which gives the appearance of dividing the iris in a radial fashion that is permanently formed by the eighth month of gestation. During the development of the iris, there is no genetic influence on it, a process known as chaotic morphogenesis that occurs during the seventh month of gestation, which means that even identical

5 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html twins have differing irises. The iris has in excess of 266 degrees of freedom, i.e. the number of variations in the iris that allow one

Biometrics

Crossover Accuracy

iris to be distinguished from another. The fact

1.Retinal Scan

1:10,000,000+

2. Iris Scan

1:131,000

3. Fingerprints

1:500

4. Hand Geometry

1:500

minimal. The iris is also not subject to the

5. Signature Dynamics

1:50

effects of aging which means it remains in a

6. Voice Dynamics

1:50

that the iris is protected behind the eyelid, cornea and aqueous humour means that, unlike other biometrics such as fingerprints, the likelihood of damage and/or abrasion is

stable form from about the age of one until death. The use of glasses or contact lenses (colored or clear) has little effect on the representation of the iris and hence does not interfere with the recognition technology.

PROGRAMMING LANGUAGES FOR IRIS TECHNOLOGY: •

Figure shows examples of the iris pattern and they demonstrate the variations found in irises.

Table

showing

accuracy

of

bio-metric

techniques:

6 Email: [email protected]

C.



C++.



JAVA.

Visit: www.geocities.com/chinna_chetan05/forfriends.html

METHOD CODED PATTERN Iris Iris pattern recognition Finger Finger prints printing Hand Size,lengths shape thickness of hands Facial Outline,shape recognition and distribution of eyes and nose signature Shape of letters,writing order,pen pressure Voice Voice printing characeristics

MISIDENTIFICATION SECURITY RATE 1/1,200,000 High 1/1,000 Medium 1/700 Low

APPLICAT IONS High security facilities Universal Low-security facilities

1/100

1/100

1/30

From the above table it is clear that for every 1,200,000 tests there is only one failure or misidentification with regard to Iris recognition technology, the security referred in the table is also very high ,even though the cost may rise high the optimum security will return some excellent returns to the fields it has been used. Therefore according my study on Iris recognition technology the future of security techniques that will be used will be Iris recognition technology 7 Email: [email protected]

Low

Low-security facilities

Low

Low-security facilities

Low

Telephone services

Visit: www.geocities.com/chinna_chetan05/forfriends.html

Generally the procedure runs through DESCRIPTION OF METHOD: The complex structure of the iris is not genetically defined, but develops randomly in the 3rd to 8th month of pregnancy in the eye of the foetus. The structure of the iris remains constant throughout the whole life, but in the first years after birth the colour can change through further pigmentation. Today more than 400 different characteristics of these structures can be discriminated of which about 173 are being used for iris recognition. The likeliness that two people have identical structures of the iris is estimated to be 1:1078 starting point of the method is a monochrome camera picture taken by near infrared light (NIR) at a distance of 0.1 to 1 meter. The resolution of the taken picture varies from 50 to 140 dpi.

8 Email: [email protected]

the steps.:

Visit: www.geocities.com/chinna_chetan05/forfriends.html Figure illustrates that the iris has been isolated

Figure: Picture of an iris and graphical

by localizing the inner and outer boundaries. It

representation of an IrisCode

is

obviously

that

the

process

can

discrimination the regions that have different texture characteristics. Maximal statistical measure value was 2.54 what means that it is quite

good

and

accurate

result.

False

Acceptance Rate (FAR) and False Rejection Rate

For the calculation of the so called Iris Code (a string of 2048 bits) e. the DaugmanAlgorithm is used. The above picture I

ple of

an iris picture together with a graphical

(FRR)

are

the

two

critical

measurements of system effectiveness. This system is scored a perfect 0.001% FAR and0.55% FRR. The feature vector consists of

representation of the calculated IrisCode. The

2048 components in Daugman's method.

outer and inner borders of the iris are marked

Figure : process iris pattern during the

using white lines as in .The comparison of an IrisCode against a stored template is done mainly using the ‘Hamming Distance’ method

acquisition (a)failure cases

RESULT AND EFFECTIVENESS: To show the effectiveness, divide the

(b) Success case

240 samples of irises data into 20 equal size folders, such that a single folder is used for testing the model that has been developed from the remaining nineteen sets. The images were acquired under different conditions. The original images were collected as grey-level images. 9 Email: [email protected]

.

Visit: www.geocities.com/chinna_chetan05/forfriends.html Figure : Localization of the iris pattern result

Iris recognition systems can cycle through 1,500,000 matches per minute, which is 20 times greater processing speed than any other biometrics systems. In reallife applications this translates into an identity decision being made in seconds.

METHOD Wildes

RATE%

----->

The enrollment process is also speedily accomplished, typically in three minutes

99.2%

or less. Daugman ---- > Wavelet

----- >

100% 97.3%

Safety and Perceived Invasiveness

MERITS OF IRIS TECHNOLOGY

The co-operation of the user. involves

Accuracy

the enrollee being still, and looking at a

In a comprehensive study conducted by

certain spot. iris scanning is less difficult

Britain’s National Physical Laboratory (NPL)

than retina scanning . The devices capture

iris

decisively

images of the eye from a comforTable

outperformed six other biometrics systems –

distance without bright lights or lasers.

facial recognition, fingerprint, hand geometry,

The IrisCode is hashed and encrypted as a

and vein and voice recognition. Tested to

security measure to prevent theft. If a

positively

office

person feels their recognition patterns

technology

have been compromised, re-enrollment is

registered a false match rate of zero in

possible an infinite number of times by

2,735,529 comparisons and a 0.0 percent

using a permuted IrisCode

failure-to-acquire rate. Iris recognition had a

Costs:

recognition

environment

identify iris

technology

users

in

recognition

an

false rejection rate of 0.0188, the lowest of all systems rested. Four of the other biometrics systems registered a false rejection rate of 1025 percent. Speed

Iris

scanning

can

increase

profitability by minimizing both costs and vulnerabilities associated with password and password management. Research indicates US businesses spend an average of $200 per person a year on password

10 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html management.

The

value

proposition

of

implementing an iris recognition system is

FUTURE OUTLOOK

three-dimensional. Cost, accuracy, and ease of

A report on “Iris recognition

use are all important considerations.Both iris

technology has the depth to last a long

scanning and retina scanning are at the upper

time." predicts that there will be a growth

end of the scale in cost compared to other

in the demand for iris recognition

biometric systems.

products in the next 12 to 18 months in the healthcare industry to solve HIPPA

DEMERITS OF IRIS

compliance and to improve the efficiency

 Difficult to use:  Acquisition systems are not

of hospitals. Drug dispensing, prescription

straightforward

this system. Emigration services is another

User must be positioned correctly

area iris recognition is likely to gain in



 False nonmatching and failure to enroll

fulfillment, and billings may also utilize

use. Soonbe used in a pilot program at Heathrow in the UK. As both conventional

False nonmatch rates need to

and

improve

technology it may be more unusual to be



Works with smaller databases

asked to prove identity with a driver’s



Difficult to capture the images

license or credit card.



e-businesses

move

toward

this

 User discomfort 

Users reluctant to capture their iris

 Acquisition devices are mostly proprietary

CURRENT USES OF IRIS TECHNOLOGY-(REAL TIME EXAMPLES):  Iris recognition is currently in use in all sorts of applications in the physical access arena cluding Airports, government agencies, banks, and research laboratories are utilizing this technology.

11 Email: [email protected]

Visit: www.geocities.com/chinna_chetan05/forfriends.html  Public sector customers include the US

 The most prominent recent

Congress, Departments of Defense,

deployments of iris-scan

State,and Treasury.

technology have been passenger

 Airports in Charlotte, NC, Amsterdam (Netherlands) and Frankfort (Germany)

airports in the U.S., U.K.,

andacross Canada are using iris

Amsterdam, and Iceland.

recognition.

 The technology is also used in

 Some private sector users are Bank United (ATMs), GTE, Hewlett Packard,



authentication programs at

corrections applications in the U.S. to identify inmates.

Lockheed Martin and BT.

A number of developing countries are

. prisons in both Pennsylvania and

considering iris-scan technology for

Florida

positive

national-ID. It is believed that the

prisoners prior to

largest deployed Iridian database

for

,identification of

making

release or transfer.

spans fewer than 100,000enrollees

 Current research gives evidence that from the (raw) picture of the iris certain diseases such as glaucoma and iritis can be diagnosed

Limitations : There are a few known limitations especially in the use of the methods. They apply mainly to

APPLICATION AND MARKET DEPLOYMENT:  Iris-scan technology has traditionally been deployed in high-security

 People having no eye or no iris (so called aniridia; this happens to 1.8 of 100,000 people)  Blind people having problems

employee-facing physical access

adjusting their eye to the camera

implementations

taking the picture

 Iridian - the technology’s primary

 People

having

pronounced

developer - is dedicated to moving the

nystagmus (tremor of the eye)

technology to the desktop, and has had

having problems getting a proper

some success in small-scale logical

picture of their iris.

access deployments.

12 Email: [email protected]

 Privacy aspects

Visit: www.geocities.com/chinna_chetan05/forfriends.html

REFERENCES: CONCLUSION:

 An

Iris Recognition is the High Precision Identification Technology with error rate of 1/1,200,000. It is set to grow substantially through 2007 and beyond. Iris-scan offers low false match rates and hands-free operation, and is the only viable alternative to fingerprint technologies in applications where a single record must be located. Revenues of iris scan are projected to grow from USD16.2 million in 2002 to USD 210.2 million in 2007. Iris-scan revenues

are

expected

to

comprise

approximately 5% of the entire biometric market.

13 Email: [email protected]

article

by

SANGEETHA

BOENA titled as ---Iris recognition: An emerging biometric technology  A study on PKI and biometrics.  An iris recognition system to enhance

e-security

wavelet theory(article).

based

on

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF