You are on page 1of 3

biometric security- iris

recognisation technology
1) ABSTRACT
2) WHAT IS BIOMETRICS
3) WHY WE USE BIOMETRICS
4) TYPES OF BIOMETRICS
5) IRIS SCANNING
6) HOW IT WORKS
7) THE ACCURACY OF IRIS
RECOGNISATION
8) APPLICATIONS
9) ADVANTAGES & LIMITATIONS
10) CONCLUSION.

ABSTRACT: In the present scenario


security has become a major aspect. From
ATM to AIRPORTS security has become
important. The number of system that have
been comprised is ever increasing and
authenticity plays a major role as a first
line of defense against intruders. Identity
verification has become a challenging task
and an attractive goal when it has to be
automated with high accuracy and no
reputability .The three main types of
authentification are something you know
(such as password) ,something you are
(BIOMETRIC). The first 2two methods
are inadequate to meet heavy demands as
are notorious and easily crack able, so it
become very difficult to identify the actual
owner. In this context automated
biometrics can meet all the demand as they
are difficult to replicate and steal.
However this paper deals with Irises
technology and requirements and
developments for future security systems.

I. WHAT IS BIOMERTICS?
Biometrics is development of statistical
and mathematical methods applicable.
The term "biometrics" is derived from the
Greek words bio (life) and metric (to
measure). For our use, biometrics refers to

technologies for measuring and analyzing


a person's physiological or behavioral
characteristics, such as fingerprints, irises,
voice patterns, facial patterns, and hand
measurements, for identification and
verification purposes.
II.WHY WE USE BIOMETRICS?
It makes it possible to guarantee in an
absolute, infallible way and ultra
confidential safety, the recognition and
access control with the physical places or
the information processing systems,
revolutionizing in same time the
securisation and the authentification of Ebusiness and E-trade.
III. TYPES OF BIOMETRICS: There are
two types of biometrics: behavioral and
physical. Behavioral biometrics are
generally used for verification while
physical biometrics can be used for either
identification or verification.

Iris scanning can seem very futuristic, but


at the heart of the system is a simple CCD
digital camera.. It uses both visible and
near-infrared light to take a clear, highcontrast picture of a person's iris. With
near-infrared light, a person's pupil is very
black, making it easy for the computer to
isolate the pupil and iris.
When you look into an iris scanner, either
the camera focuses automatically or you
use a mirror or audible feedback from the
system to make sure that you are
positioned correctly. Usually, your eye is 3
to 10 inches from the camera. When the
camera takes a picture, the computer
locates:
The center of the pupil
The edge of the pupil
The edge of the iris
The eyelids and eyelashes
It then analyzes the patterns in the iris and
translates them into a code.Iris scanners

are becoming more common in highsecurity applications because people's eyes


are so unique (the chance of mistaking one
iris code for another is 1 in 10 to the 78th
power. They also allow more than 200
points of reference for comparison, as
opposed to 60 or 70 points in fingerprints.
The iris is a visible but protected structure,
and it does not usually change over time,
making it ideal for biometric identification.
Most of the time, people's eyes also remain
unchanged after eye surgery, and blind
people can use iris scanners as long as
their eyes have irises. Eyeglasses and
contact lenses typically do not interfere or
cause inaccurate readings.

V. IRIS SCAN: Iris scans analyze the

features that exist in the colored tissue


surrounding the pupil which has more than
200 points that can be used for
comparison, including rings, furrows and
freckles. The scans use a regular video

camera style and can be done from further


away than a retinal scan. It will work
through glasses fine and in fact has the
ability to create an accurate enough
measurement that it can be used for
identification purposes, and not just
verification.
The system simply captures the iris image,
searches the entire database and either
finds their identity or reports that they are
unknown. This is obviously a much more
powerful form of authentication as no
information is required from the user.
It has several features .those are
Stable: - the unique pattern in the human
iris is formed by 10 months of age, and
remains unchanged throughout one's
lifetime.
Unique: - the probability of two rises
producing the same code is nearly
impossible.
Flexible: - iris recognition technology
easily integrates into existing security
systems or operates as a standalone.
Reliable: - a distinctive iris pattern is not
susceptible to theft, loss or compromise
Non-Invasive: - a distinctive iris pattern is
not susceptible to theft, loss or
compromise.
This proven biometric approach is fast and
remarkably accurate, and lets you design
systems that overcome the limitations of
typical card or password strategies.

100 to 1,000 times more accurate than


spot fingerprinting
1,000 to 10,000 times more accurate than
hand-print verification
3,000 times more accurate than voice
prints.
COMPARISION WITH OTHER
BIOMETRIC TECHNOLOGIES:
Cost-precision relation: When one calls
upon one of these techniques, one first
seeks precision, but one also interests in
the cost. The graph below shows us the
situation of certain techniques compared to
these two criteria.

We can notice that, in spite of its 5th place


in the market, the iris method of is the
most precise, but also the most expensive.

IX. ADVANTAGES of IRIS


TECHNOLOGY SYSTEM:
1) The system involves no lasers, bright
lights, or any hazardous technology at all.
It's as safe to use as any video camera.
2) An award winning access control
system.
3) Has no requirement or costs for cards or
PIN's .
4) Is more accurate than DNA matching.
No recorded instance of a false accept.
6) Has a very small record size (IrisCode
512 bytes).

6) Uses identification, (one to many) not


verification (one to one) matching 7) Is
non-contact. Works with glasses,
protective clothing, safety shields and
contact lenses.
8) Images the iris which is stable over life.
One enrolment only.
9) Is non-invasive and non-contact.
10)Uses Video based technology .
11) Has extremely fast database matching
(match rates in excess of 100,000 per
second achieved on a standard PC).

CONCLUSION: In order to avoid all the


crime activities and fraud activities and for
Anti-terrorism, we should use Iris
technology. The uniqueness of eyes, even
between the left and right eye of the same
person, makes iris scanning very powerful
for identification purposes. The likelihood
of a false positive is extremely low and its
relative speed and ease of use make it a
great potential biometric. Iris Readers use
built-in countermeasures that make them
virtually impossible to counterfeit or
spoof. It is the absolutely genius and
unique technology in order to avoid crime
activities and to attain more and more
security.

You might also like