You are on page 1of 15

IRIS BIOMETRICS FOR EMBEDDED SYSTEMS

INTRODUCTION

Biometrics are automated methods of recognizing a person based on his/her real features Physiological are related to the shape of the body. Eg: fingerprint, face recognition

Behavioral are related to the behavior of a person.

Eg:signature, and voice. Biometric characteristics are unique to individuals and cannot be lost or stolen like password, making them only
2

CONT.
Biometric

application can be divided in to

two IDENTIFICATION:- Performed when user identity is not provided AUTHENTICATION:- Process of taking the identity of user using provided data

WHY IRIS?

Highly protected, internal organ of the eye.

Externally visible & its pattern imaged from a distance.


Each individual has unique iris.

A difference exists between identical twins and between


left and right eye of the same person.

Patterns apparently stable throughout life. Eye injuries or operation cannot change the Iris(stability).4

BLOCK DIAGRAM
.

Image Acquisition

Preprocessing

Matching

Feature Extraction
5

IMAGE ACQUISITION

Capturing the image of eye Infrared photo or video camera is used Distance b/w camera &eye is set so as to capture

high quality image

Infrared range to capture image provide many advantages than visible range

Now we using camera with automatic focus


6

IRIS SEGMENTATION

To locate iris on image and to isolate it from rest of the eye image

Detecting the pupil edges Detecting the iris edges Extracting the iris region

Main task performed in this section is 1)image quality enhancement


7

2)noise reduction

FEATURE EXTRACTION

Begin with normalization of segmented image Normalization is necessary because pupil varie size with light intensity variation

After normalization method used for recognizing phase


information 1)Gabor filter 2)Dyadic wavelet transformation

Generate a template code

MATCHING

Compare 2 iris templates using Hamming distances Gives a measure of how many bits are the same between two bit patterns

Hamming Distance:-Most Common Algorithm HD(A,B)=1/L*(i=0L (Pi Yi))

LVector Length HD(A,B) > Predefined ThresholdRejected(0.32)


9

ThresholdDepends on Final Application

10

PLATFORM-MICROPROCESSOR

11

PLATFORM-DEDICATED HARDWARE

12

RESULTS AND DISCUSSION


MICROPROCESSOR

DEDICATED HARDWARE

ARM 7 High computational power Low cost Processing time is more Area high More secure&low error rate than DH

FPGA-Virtex4 by Xilinx Low computational power High cost Low processing time Low electronic area

13

FUTURE WORKS & CONCLUSION


FUTURE WORKS Integrate cryptographic module that results in secure data communication Using hardware/software co design CONCLUSION Here 2 platforms are discussed p and dedicated hardware Choice depends on application High security and low error-p Large no: of user and execution time is significantdedicated hardware

14

REFERENCES

Iris Biometrics for Embedded Systems,IEEE Transaction on VLSI system,Volume 19,no:2,February 2011 Personal Authentication using Human Iris Recognition based on Embedded ZerotreeWavelet Coding, 2010 Fifth International Multi-conference on Computing in the Global Information Technology www.scribd.com

www.biometrics.org
An Embedded System for iris Recognition-2010
15

You might also like