SlideShare a Scribd company logo
SWATI NEGI
06-ECE-152
Gurgaon Institute of Technology and Management,Bilaspur, Gurgaon
EMAIL: negiswati@yahoo.com
CONTENTS
• Introduction
• Biometrics - Future Of Identity
• Human eye
• Iris Recognition
• How it works
• Advantages and Disadvantages
• Technology comparison
• Iris recognition in fiction
• Applications
• Retinal scans
INTRODUCTION
• In today's information age it is not difficult to collect data
about an individual and use that information to exercise
control over the individual.
• Data security has become an inevitable feature.
• ID cards can be almost lost, forged or misplaced:
passwords can be forgotten.
• If you lose your keys or jot your password on a piece of
paper, someone else can find them and use them as
though they were you.
• Biometric system automatically verifies or recognizes the
identity of a living person based on physical or
behavioral characteristics.
• Instead of using something you have (like a key) or
something you know (like a password), biometrics uses
who you are to identify you.
• Biometrics can use physical characteristics, like your
face, fingerprints, irises or veins, or behavioral
characteristics like your voice, handwriting or typing
rhythm.
• Unlike keys and passwords, your personal traits are
extremely difficult to lose or forget. They can also be
very difficult to copy. For this reason, many people
consider them to be safer and more secure than keys or
passwords
BIOMETRICS - FUTURE OF
IDENTITY
• A Biometric system can be divided into 2 systems:
1. The enrollment module
2. The identification module.
• The enrollment module is responsible for the training the
system to identify the person.
 Biometric sensor scans person’s physiognomy to create
digital representation.
 Feature extractor processes the representation to
generate more expressive representation-template.
 Template for each user is stored in a biometric system
database.
• The identification module is responsible for recognizing
the person.
 Biometric sensor captures characteristics of person to
be identified.
 Converts into same digital format as template.
 Resulting template is fed to feature matcher.
 Which compares it against stored template to
determine the match!
Biometric systems can seem complicated, but they all use the
same three steps:
• Enrollment: The first time you use a biometric system, it records
basic information about you, like your name or an identification
number. It then captures an image or recording of your specific trait.
• Storage: Contrary to what you may see in movies, most systems
don't store the complete image or recording. They instead analyze
your trait and translate it into a code or graph. Some systems also
record this data onto a smart card that you carry with you.
• Comparison: The next time you use the system, it compares the
trait you present to the information on file. Then, it either accepts or
rejects that you are who you claim to be .
HUMAN EYE
• The pupil is the central
transparent area (shown
as black).
• The blue area
surrounding it is iris.
• The white outer area is
the sclera, the central
transparent part of which
is the cornea.
HUMAN EYE
IRIS RECOGNITION
• Iris scanning measures patterns
on the colored part of eye-the
iris.
• The tissue has a unique pattern
of markings which does not
change and is different for each
eye.
• Iris scanners read from the
outer edge towards the pupil,
detecting and plotting the
markings.
• Data is saved and stored on a
chip, on a passport or ID card
which will be verified when the
eye is scanned in.
HOW IT WORKS
• First step :
Position Correctly
3-10 inches max 3 feet
Camera focuses automatically or,
You Use mirror
• Second step:
Photograph is taken by
Specialized digital camera in iris scanner:
a) uses visible light
b) uses near infrared light
To take a clear high contrast picture of a person’s iris.
PROCESS TAKES LESS THAN 2 SECONDS
• Computer locates:
 Centre of pupil
 Edge of pupil
 Edge of iris (IRIS SCAN ALGORITHM )
 Eye lids and eye lashes
It provides detail of the iris mapped , recorded, stored future
matching/verification.
• Analyses of patterns in iris, Translating into code.(512
byte iris code)
• Matching of codes and hence verification takes place.
ADVANTAGES
• Iris is ideal for biometric identification.
• Imitation is impossible.
• Recognition not impeded by glasses or contact lenses.
• Stable i.e. remain same better than fingerprints.
• Predictable shape than face.
• Fast / quick scan. (little more than second)
• High security.
• Misidentification rate is less.(1 in 1.2 million)
• Many wide applications.
• More than 200 unique points of reference for
comparison.
• Even blind people can use it as long as they have
irides.
DISADVANTAGES
• Incompatible with authorities. (investment)
• Poor image quality.
• Difficult to perform at large distance
• Difficulty arises if the person to be identified is not
cooperating by holding the head still, and not looking
into camera.
Is there any way to fool the
system?
• Researchers attempted to do this by creating contact
lenses with irides printed on them. The system had no
trouble spotting the fakes. Some of the newer drug
treatments for glaucoma include changes in iris
pigmentation among their side effects. This should not be a
problem since iris recognition systems rely on
monochrome images, the developers say.
Method Coded Pattern
Misidentifica
tion rate
Secur
ity
Applications
Iris
Recogni
tion
Iris pattern 1/1,200,000 High
High-
security
facilities
Fingerprint
ing
Fingerprints 1/1,000
Medi
u
m
Universal
Hand
Shape
Size, length and
thickness of hands
1/700 Low
Low-
security
facilities
Facial
Recogni
tion
Outline, shape and
distribution of eyes
and nose
1/100 Low
Low-
security
facilities
Signature
Shape of letters, writing
order, pen pressure
1/100 Low
Low-
security
facilities
Voice
printing
Voice characteristics 1/30 Low
Telephone
service
TECHNOLOGY COMPARISON
IRIS RECOGNITION IN FICTION
• Demolition Man (1993) Character played by Wesley Snipes uses the
Warden's gouged eye to gain access through security door.
• In Dan Brown's 2000 novel Angels and Demons, an assassin gains access
to a top secret CERN laboratory using a scientist's eye.
• Steven Spielberg's 2002 science fiction film Minority Report depicts a society
in which what appears to be a form of iris recognition has become daily
practice. The principal character undergoes an eye transplant in order to
change his identity but continues to use his original eyes to gain access to
restricted locations.
• The Simpsons Movie (2007) features a scene that illustrates the difficulty of
image acquisition in iris recognition.
• Numb3rs features a scene where a robber gets into the CalSci facility by
cracking the code assigned to a specific iris.
• NCIS uses an Iris scanner in the garage, where forensic vehicle
investigations are carried out and evidence is stored.
APPLICATIONS
• Substituting for passports (automated international
border crossing);
• Aviation security and controlling access to restricted
areas at airports;
• Database access and computer login; premises
access control;
• Hospital settings including mother-infant pairing in
maternity wards;
• Door lock system.
• ATM machines.
• It is under consideration for biometrically enabled
National Identity Cards.
• Airports have begun to use iris-scanning for such diverse
functions as employee identification/verification for
movement through secure areas and allowing registered
frequent airline passengers a system that enables fast
and easy identity verification in order to expedite their
path through passport control
• Projects designed to authenticate
 on-line purchasing
 on-line banking
 on-line voting
 on-line stock trading.
• Iris-scan offers a high level of user security, privacy and
general peace of mind for the consumer.
RETINAL SCANS
• Not to be confused with another less prevalent ocular-
based technology, retina scanning,
• Some people confuse iris scans with retinal scans.
• Retinal scans, however, are an older technology that
required a bright light to illuminate a person's retina.
• The sensor would then take a picture of the blood vessel
structure in the back of the person's eye.
• Some people found retinal scans to be uncomfortable
and invasive.
• People's retinas also change as they age, which could
lead to inaccurate readings.
THANKS AND QUERIES!

More Related Content

PDF
Iris scanning
NikithaME
 
PPT
Iris scan.ppt 1
Shubham Chopra
 
PPTX
Iris ppt
Sri Harati K
 
PPTX
Biometrics iris recognition
sunjaysahu
 
PPTX
Iris print
Mohamed Mohsen El Alfy
 
PPT
49559880-IRIS-SCANNING1.ppt
AdityaTakePatil
 
PDF
Iris recognition system
Nilu Desai
 
PPTX
Bio metric security
Mohamed Safraz
 
Iris scanning
NikithaME
 
Iris scan.ppt 1
Shubham Chopra
 
Iris ppt
Sri Harati K
 
Biometrics iris recognition
sunjaysahu
 
49559880-IRIS-SCANNING1.ppt
AdityaTakePatil
 
Iris recognition system
Nilu Desai
 
Bio metric security
Mohamed Safraz
 

Similar to Envisioning the future using iris scanning biometrics (20)

PPT
Karthika krishna ethical hacking slides
Karthika Krishna
 
PPTX
Iris Recognition Technology
RutikBhoyar
 
PPTX
CYBER FORENSIC PPT
adityapandit0010
 
PPT
IRIS Scaner
Rohit Chintu
 
DOCX
Biometric.docx
ShubhamYadav769267
 
PPTX
Iris scanner technology
shams tabrez
 
PPTX
Iris Scan
Matang Saxena
 
PPTX
Zaki_Anwer Seminar PPT.pptx
Mewar University
 
PPTX
Iris recognition
shyamalaramesh2
 
PPTX
Iris recognition seminar
Ajinkya Bhalerao
 
PDF
Biometrics Starts
YUSRA FERNANDO
 
PPT
Iris by @run@$uj! final
ARUNASUJITHA
 
PPTX
Iris scanning
himansupaichha
 
PPTX
Iris scanning
himansupaichha
 
PPTX
IRIS &RETINAL SCANNING PPT
Ajay K
 
PPT
Study and development of Iris Segmentation and Normalization Technique
Sunil Kumar Chawla
 
PPTX
Iris ppt
AmbikaM8
 
PPT
Iris Biometric for Person Identification
Manish Kumar
 
PPTX
Iris Recognition .pptx
SOMESHJADHWANI
 
PPT
Bio-metric Security System
Sadan Khan
 
Karthika krishna ethical hacking slides
Karthika Krishna
 
Iris Recognition Technology
RutikBhoyar
 
CYBER FORENSIC PPT
adityapandit0010
 
IRIS Scaner
Rohit Chintu
 
Biometric.docx
ShubhamYadav769267
 
Iris scanner technology
shams tabrez
 
Iris Scan
Matang Saxena
 
Zaki_Anwer Seminar PPT.pptx
Mewar University
 
Iris recognition
shyamalaramesh2
 
Iris recognition seminar
Ajinkya Bhalerao
 
Biometrics Starts
YUSRA FERNANDO
 
Iris by @run@$uj! final
ARUNASUJITHA
 
Iris scanning
himansupaichha
 
Iris scanning
himansupaichha
 
IRIS &RETINAL SCANNING PPT
Ajay K
 
Study and development of Iris Segmentation and Normalization Technique
Sunil Kumar Chawla
 
Iris ppt
AmbikaM8
 
Iris Biometric for Person Identification
Manish Kumar
 
Iris Recognition .pptx
SOMESHJADHWANI
 
Bio-metric Security System
Sadan Khan
 
Ad

Recently uploaded (20)

PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Doc9.....................................
SofiaCollazos
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Ad

Envisioning the future using iris scanning biometrics

  • 1. SWATI NEGI 06-ECE-152 Gurgaon Institute of Technology and Management,Bilaspur, Gurgaon EMAIL: [email protected]
  • 2. CONTENTS • Introduction • Biometrics - Future Of Identity • Human eye • Iris Recognition • How it works • Advantages and Disadvantages • Technology comparison • Iris recognition in fiction • Applications • Retinal scans
  • 3. INTRODUCTION • In today's information age it is not difficult to collect data about an individual and use that information to exercise control over the individual. • Data security has become an inevitable feature. • ID cards can be almost lost, forged or misplaced: passwords can be forgotten. • If you lose your keys or jot your password on a piece of paper, someone else can find them and use them as though they were you. • Biometric system automatically verifies or recognizes the identity of a living person based on physical or behavioral characteristics.
  • 4. • Instead of using something you have (like a key) or something you know (like a password), biometrics uses who you are to identify you. • Biometrics can use physical characteristics, like your face, fingerprints, irises or veins, or behavioral characteristics like your voice, handwriting or typing rhythm. • Unlike keys and passwords, your personal traits are extremely difficult to lose or forget. They can also be very difficult to copy. For this reason, many people consider them to be safer and more secure than keys or passwords
  • 5. BIOMETRICS - FUTURE OF IDENTITY • A Biometric system can be divided into 2 systems: 1. The enrollment module 2. The identification module. • The enrollment module is responsible for the training the system to identify the person.  Biometric sensor scans person’s physiognomy to create digital representation.  Feature extractor processes the representation to generate more expressive representation-template.  Template for each user is stored in a biometric system database.
  • 6. • The identification module is responsible for recognizing the person.  Biometric sensor captures characteristics of person to be identified.  Converts into same digital format as template.  Resulting template is fed to feature matcher.  Which compares it against stored template to determine the match!
  • 7. Biometric systems can seem complicated, but they all use the same three steps: • Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait. • Storage: Contrary to what you may see in movies, most systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart card that you carry with you. • Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be .
  • 8. HUMAN EYE • The pupil is the central transparent area (shown as black). • The blue area surrounding it is iris. • The white outer area is the sclera, the central transparent part of which is the cornea.
  • 10. IRIS RECOGNITION • Iris scanning measures patterns on the colored part of eye-the iris. • The tissue has a unique pattern of markings which does not change and is different for each eye. • Iris scanners read from the outer edge towards the pupil, detecting and plotting the markings. • Data is saved and stored on a chip, on a passport or ID card which will be verified when the eye is scanned in.
  • 11. HOW IT WORKS • First step : Position Correctly 3-10 inches max 3 feet Camera focuses automatically or, You Use mirror • Second step: Photograph is taken by Specialized digital camera in iris scanner: a) uses visible light b) uses near infrared light To take a clear high contrast picture of a person’s iris. PROCESS TAKES LESS THAN 2 SECONDS
  • 12. • Computer locates:  Centre of pupil  Edge of pupil  Edge of iris (IRIS SCAN ALGORITHM )  Eye lids and eye lashes It provides detail of the iris mapped , recorded, stored future matching/verification. • Analyses of patterns in iris, Translating into code.(512 byte iris code) • Matching of codes and hence verification takes place.
  • 13. ADVANTAGES • Iris is ideal for biometric identification. • Imitation is impossible. • Recognition not impeded by glasses or contact lenses. • Stable i.e. remain same better than fingerprints. • Predictable shape than face. • Fast / quick scan. (little more than second) • High security. • Misidentification rate is less.(1 in 1.2 million) • Many wide applications. • More than 200 unique points of reference for comparison. • Even blind people can use it as long as they have irides.
  • 14. DISADVANTAGES • Incompatible with authorities. (investment) • Poor image quality. • Difficult to perform at large distance • Difficulty arises if the person to be identified is not cooperating by holding the head still, and not looking into camera.
  • 15. Is there any way to fool the system? • Researchers attempted to do this by creating contact lenses with irides printed on them. The system had no trouble spotting the fakes. Some of the newer drug treatments for glaucoma include changes in iris pigmentation among their side effects. This should not be a problem since iris recognition systems rely on monochrome images, the developers say.
  • 16. Method Coded Pattern Misidentifica tion rate Secur ity Applications Iris Recogni tion Iris pattern 1/1,200,000 High High- security facilities Fingerprint ing Fingerprints 1/1,000 Medi u m Universal Hand Shape Size, length and thickness of hands 1/700 Low Low- security facilities Facial Recogni tion Outline, shape and distribution of eyes and nose 1/100 Low Low- security facilities Signature Shape of letters, writing order, pen pressure 1/100 Low Low- security facilities Voice printing Voice characteristics 1/30 Low Telephone service TECHNOLOGY COMPARISON
  • 17. IRIS RECOGNITION IN FICTION • Demolition Man (1993) Character played by Wesley Snipes uses the Warden's gouged eye to gain access through security door. • In Dan Brown's 2000 novel Angels and Demons, an assassin gains access to a top secret CERN laboratory using a scientist's eye. • Steven Spielberg's 2002 science fiction film Minority Report depicts a society in which what appears to be a form of iris recognition has become daily practice. The principal character undergoes an eye transplant in order to change his identity but continues to use his original eyes to gain access to restricted locations. • The Simpsons Movie (2007) features a scene that illustrates the difficulty of image acquisition in iris recognition. • Numb3rs features a scene where a robber gets into the CalSci facility by cracking the code assigned to a specific iris. • NCIS uses an Iris scanner in the garage, where forensic vehicle investigations are carried out and evidence is stored.
  • 18. APPLICATIONS • Substituting for passports (automated international border crossing); • Aviation security and controlling access to restricted areas at airports; • Database access and computer login; premises access control; • Hospital settings including mother-infant pairing in maternity wards; • Door lock system. • ATM machines. • It is under consideration for biometrically enabled National Identity Cards.
  • 19. • Airports have begun to use iris-scanning for such diverse functions as employee identification/verification for movement through secure areas and allowing registered frequent airline passengers a system that enables fast and easy identity verification in order to expedite their path through passport control • Projects designed to authenticate  on-line purchasing  on-line banking  on-line voting  on-line stock trading. • Iris-scan offers a high level of user security, privacy and general peace of mind for the consumer.
  • 20. RETINAL SCANS • Not to be confused with another less prevalent ocular- based technology, retina scanning, • Some people confuse iris scans with retinal scans. • Retinal scans, however, are an older technology that required a bright light to illuminate a person's retina. • The sensor would then take a picture of the blood vessel structure in the back of the person's eye. • Some people found retinal scans to be uncomfortable and invasive. • People's retinas also change as they age, which could lead to inaccurate readings.