Karthika krishna ethical hacking slides
-
Upload
karthika-krishna -
Category
Documents
-
view
521 -
download
3
description
Transcript of Karthika krishna ethical hacking slides
VIDYA BHARATHI INSTITUTE OF TECHNOLOGYPAPER PRESENTATION
ONIris Recognition of a Biometric Technique
BY
D.MADHAVI, B.SRAVANI,ECE II yr, ECE II yr,
Topics of Discussion Introduction
IRIS identification process
IRIS identification system
Method of IRIS identification
Function of IRIS scanner
properties of IRIS
Applications of IRIS recognition
Advantages and Disadvantages
Conclusion
INTRODUCTION:
The colored part of the eye
WHY WE GO FOR IRIS TECHNOLOGY?
LocalizationAcquisition
IrisCode Gabor Filters Polar Representation
Image
Demarcated Zones
IRIS identification process
IRIS IDENTIFICATIONSYSTEM: There are two types of methodsThere are two types of methods
1. Active iris system:Active iris system:
2. Passive iris system:Passive iris system:
requires that a user be requires that a user be anywhere from six to 14 anywhere from six to 14 inches away from the inches away from the camera.camera.
allows the user to be allows the user to be anywhere from one to anywhere from one to three feet away from the three feet away from the camera.camera.
FUNCTION OF IRIS SCANNER: The user places himself so that he
can see his own eye's reflection in the device.
Verification time is generally less than 5 seconds, though the user will only need to look into the device for a couple moments.
A template iris pattern code contains between 256 and 512 bytes of data depending upon the manufacturer.
Using a camera it converts the small details in the iris stromal pattern into a bit pattern.
IRIS IDENTIFICATION STEPSThere are four simple steps that follow:
A person stands in from of the iris identification system, between one and three feet away, while a wide-angle camera calculates the position of they eye.
A second camera zooms in on the eye and takes a black and white image.
Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like and "eyeprint".
The captured image, or "eyeprint" is checked against a previously stored
reference template in the database.
Hamming code
a Hamming code is a linear error-correcting code named after its inventor, Richard Hamming. Hamming codes can detect and correct single-bit errors, and can detect (but not correct) double-bit errors. In other words, the Hamming distance between the transmitted and received code-words must be zero or one for reliable communication.
Properties of the iris
Has highly distinguishing texture
Right eye differs from left eye
Twins have different iris texture
Not trivial to capture quality image
+ Works well with cooperative subjects
+ Used in many airports in the world
ADVANTAGES: Each iris is unique.
High recognition performance and high reliability.
Fast authentication within seconds.
The iris remains stable throughout ones life. Medical advances such as refractive surgery, cataract surgery and cornea transplants do not change the iris' characteristics.
DISADVANTAGES: × Iris scanning is incompatible with the substantial
investment.
× Iris recognition is very difficult to perform at a larger distance .
× Iris recognition is susceptible to poor image quality, with associated failure to enroll rates.
APPLICATIONS: Database access and computer login.
The iris-recognition software is implemented for security purposes around the airport terminal ,which was designed to allow only authorized people to enter certain areas.
To stop this practice- the first door opens upon iris recognition and then closes behind the person, leaving them in a small portal. The next door will only open upon confirming there is just one person in the portal.
CONCLUSION:
Iris recognition is shown to be a reliable and accurate biometric technology.
The biometric iris recognition serves as one of the best processes for safe guarding our personal profiles and can be applied to any of the access control systems requiring high security,hence reducing the crime of using others profiles by another person illegally.
References:www.wikipedia.com
www.techcrunch.comwww.howstuffworks.com