Professional Documents
Culture Documents
TABLE OF CONTENTS
INTRODUCTION
Weakness of Fingerprint
Fingerprint is not accurate as iris recognition. False accepts rate may
occur and is approximately 1 in 100,000. Iris recognition false accepts
rate is 1 in 1.2 million statistically . Most of the fingerprint systems
measure approximately 40 – 60 characteristics but iris recognition looks
about 240 characteristic to create Eigen faces. Iris recognition can
perform matching in a high speed but fingerprint search take much longer
and it may require filtering may give wrong identity matches. Most of the
biometric systems required physical contact with scanner device and that
needs to be kept clean and this is not hygiene issue. Iris recognition has a
standard but on the other hand because of large number of different
symmetry means no fingerprint standard. Fingerprint readability also may
be affected by the work an individual does
obvious different in the very young and very old. It always needs
upgrades for hand geometry. These challenges make hand geometry
unsuitable for the high volume, large population applications of the
transportation industry.
The vertebrate retina is a light sensitive tissue lining the inner surface of
the eye. The optics of the eye creates an image of the visual world on the
retina, which serves much the same function as the film in a camera.
The cornea is the transparent front part of the eye that covers
the iris, pupil, and anterior chamber. Together with the lens, the
cornea refracts light, accounting for approximately two-thirds of the eye's
total optical power.
The pupil is an opening located in the center of the iris of the eye that
allows light to enter the retina. It appears black because most of the light
entering the pupil is absorbed by the tissues inside the eye.
1. The pupillary zone is the inner region whose edge forms the
boundary of the pupil.
2. The ciliary zone is the rest of the iris that extends to its origin at
the ciliary body.
Iris surface features
Crypts at the base of the iris are additional openings that can be
observed close to the outermost part of the ciliary portion of the iris.
3) Iris Pattern Matching- Comparing the saved pattern with that of the
present one.
The Daugman system fits the circular contours via gradient ascent
on the parameters so as to maximize
The Wildes et al. system performs its contour fitting in two steps.
(histogram-based approach)
And
RUBBERSHEET MODEL
IrisCode Formation
4) deciding if the newly acquired data and the data base entry were
derived from the same iris based on the goodness of match.
Improvements:
The identity of the Afghan Girl remained unknown for over 17 years.
Although McCurry made several attempts during the 1990s to locate her,
he was unsuccessful.In January 2002, a National Geographic team
traveled to Afghanistan to locate the subject of the now-famous
photograph. However, there were a number of women who came forward
and identified themselves erroneously as the famous Afghan Girl. In
addition, after being shown the 1985 photo, a handful of young men
falsely claimed Gula as their wife.
The team finally located Gula, then around the age of 30, in a remote
region of Afghanistan; she had returned to her native country from the
refugee camp in 1992. Her identity was confirmed using Iris Recognition
Technology which matched her iris patterns to those of the photograph
with almost full certainty.
CONCLUSION
Despite its challenges, iris recognition is gaining popularity as
a robust and reliable biometric technology. The iris’s complex texture and
its apparent stability hold tremendous promise for leveraging iris
recognition in diverse application scenarios, such as border control,
forensic investigations, and cryptosystems. The use of other ocular
features and facial attributes along with the iris modality could enable
biometric recognition at a distance with good matching accuracy. The
future of iris-based recognition looks bright, particularly in military
applications that demand the rapid identification of individuals in dynamic
environments.
REFERENCES
1. K.W. Bowyer, K. Hollingsworth, and P.J. Flynn, “Image Understanding for
Iris Biometrics: A Survey,” Computer Vision and Image Understanding, vol.
110, no. 2, 2008, pp.281-307.
2. J. Daugman, “New Methods in Iris Recognition,” IEEE Trans. Systems,
Man, and Cybernetics, Part B, vol. 37, no.5, 2007, pp. 1167-1175.
3. S. Shah and A. Ross, “Iris Segmentation Using Geodesic Active
Contours,” IEEE Trans. Information Forensics and Security (TIFS), vol. 4,
no. 4, 2009, pp. 824-836.
4. J. Thornton, M. Savvides, and B.V.K. Kumar, “A Bayesian Approach to
Deformed Pattern Matching of Iris Images,” IEEE Trans. Pattern Analysis
and Machine Intelligence, vol.29, no. 4, 2007, pp. 596-606.
5. D.M. Monro, S. Rakshit, and D. Zhang, “DCT-Based Iris Recognition,”
IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 4, 2007,
pp. 586-596.
6. Z. Sun and T. Tan, “Ordinal Measures for Iris Recognition,” IEEE Trans.
Pattern Analysis and Machine Intelligence, vol.31, no. 12, 2009, pp. 2211-
2226.
7. C. Belcher and Y. Du, “Region-Based SIFT Approach to Iris Recognition,”
Optics and Lasers in Eng., vol. 47, no. 1, 2009, pp. 139-147.
8. C. Boyce et al., “Multispectral Iris Analysis: A Preliminary Study,”
9. J. Matey et al., “Iris Recognition in Less Constrained Environments,”
Advances in Biometrics: Sensors, Algorithms and Systems, Springer, 2008.
10. R. Narayanswamy et al., “Extended Depth-of-Field Iris Recognition
System for a Workstation Environment,” Proc. SPIE Biometric Technology
for Human Identification II, vol.5779, SPIE, 2005, pp. 41-50.