DOC PREVIEW
SJSU CS 265 - Iris Recognition

This preview shows page 1-2-3-4-5 out of 16 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Iris RecognitionTopicsWhy Iris Recognition?TechniqueIris pattern - ComparisonSpeed PerformanceAttacksAttacks cont…Slide 9Slide 10The Process and Analysis UnitThe Largest National DeploymentAdvantages of the Iris for IdentificationDisadvantages of the Iris for IdentificationWhy iris recognition is not so famous?Slide 16Iris Recognition Iris Recognition Sathya Swathi MabbuSathya Swathi MabbuLong N VuongLong N VuongTopicsTopicsTechnique of iris recognitionTechnique of iris recognitionAttacks Attacks ImplementationImplementationAdvantages & DisadvantagesAdvantages & DisadvantagesWhy Iris Recognition?Why Iris Recognition?Iris patterns are unique.Iris patterns are unique.Iris patterns do not change with age. Iris patterns do not change with age. Non Contact approach.Non Contact approach.Simplicity and ease of Simplicity and ease of implementation.implementation.Speed – the process of matching the Speed – the process of matching the iris patterns is very fast. iris patterns is very fast.TechniqueTechniqueStep 1: Capturing the image of the eye using a Step 1: Capturing the image of the eye using a camera. camera. Step 2: Differentiating the outline of the iris and the Step 2: Differentiating the outline of the iris and the sclera, and the pupil from the iris.sclera, and the pupil from the iris.Step 3: Encoding the image using demodulation (also Step 3: Encoding the image using demodulation (also removes reflections, intrusion of eye lid lashes, removes reflections, intrusion of eye lid lashes, contact lens outline etc.,). Code is 256 bytes. contact lens outline etc.,). Code is 256 bytes. pupilirisscleraIris pattern - ComparisonIris pattern - ComparisonTest of Statistical IndependenceTest of Statistical IndependenceCompare the iris codes (256*8=2048 Compare the iris codes (256*8=2048 bits) of the eyes using the following bits) of the eyes using the following formulaformula [Code A (XOR) Code B] AND Mask A AND Mask B[Code A (XOR) Code B] AND Mask A AND Mask BH.D = H.D = Mask A AND Mask BMask A AND Mask BThis is called Hamming Distance (H.D). This is called Hamming Distance (H.D).Speed PerformanceSpeed PerformanceOn a 300 MHz workstation, the execution On a 300 MHz workstation, the execution times for the steps in iris recognition are listed times for the steps in iris recognition are listed below,below,Operation TimeImage focus 15 millisecScrub specular reflections 56 millisecLocalize eye and iris 90 millisecFit pupillary boundary 12 millisecDetect both eyelids 93 millisecRemove lashes and contact lens edges 78 millisecDemodulation and IrisCode creation 102 millisecXOR comparison of two IrisCodes 10 micro sec100,000 comparisons can be performed in a second. IrisCode is a registered trademark of Iridian TechnologiesAttacks Attacks 1. Iris patterns 1. Iris patterns printed on contact printed on contact lenslens Countermeasure:Countermeasure: 2D Fourier 2D Fourier TransformTransformAttacks cont…Attacks cont…Digital Replay attack Digital Replay attack Countermeasure:Countermeasure: Encryption of iris code, Encryption of iris code, database security. database security. Example: Iridian Technologies has Example: Iridian Technologies has established established 3DES Encryption as the standard. 3DES Encryption as the standard.Attacks cont…Attacks cont…Picture of an iris Picture of an iris Countermeasure:Countermeasure: Liveness test ( on Liveness test ( on command eye movement, pupillary light command eye movement, pupillary light reflex , red eye effect, light absorption reflex , red eye effect, light absorption properties of living tissue, hippus etc.,)properties of living tissue, hippus etc.,)RED EYE EFFECTIMPLEMENTATION OF THE IRIS RECOGNITION SYSTEMThe Process and Analysis The Process and Analysis UnitUnitEach image is given to the P&A Unit for recognition:Each image is given to the P&A Unit for recognition:1.1.Splits the colored image and tests the morphologySplits the colored image and tests the morphology2.2.Transforms the image in a 3D imageTransforms the image in a 3D image3.3.Transforms the image in the frequencies domain Transforms the image in the frequencies domain 4.4.Transforms the image in a multidimensional objects, Transforms the image in a multidimensional objects, then the algorithm executes the last analysis to then the algorithm executes the last analysis to recognize a personrecognize a personThe Largest National The Largest National DeploymentDeploymentIris recognition border-crossing system in Iris recognition border-crossing system in the United Arab Emirates (UAE)the United Arab Emirates (UAE)Advantages of the Iris for Advantages of the Iris for IdentificationIdentificationHighly protected, internal organ of the Highly protected, internal organ of the eyeeyeExternally visible, patterns imaged from a Externally visible, patterns imaged from a distancedistanceIris patterns possess a high degree of Iris patterns possess a high degree of randomnessrandomnessPatterns apparently stable throughout lifePatterns apparently stable throughout lifeEncoding and decision-making are Encoding and decision-making are tractabletractableDisadvantages of the Iris for Disadvantages of the Iris for IdentificationIdentificationSmall target to acquire from a distanceSmall target to acquire from a distanceMoving target…within another…on yet Moving target…within another…on yet anotheranotherLocated behind a curved, wet, reflecting Located behind a curved, wet, reflecting surfacesurfaceObscured by eyelashes, lenses, reflectionsObscured by eyelashes, lenses, reflectionsIllumination should not be visible or brightIllumination should not be visible or brightWhy iris recognition is not so famous?Why iris recognition is not so famous?ConvenienceConvenienceAcceptanceAcceptanceCost CostQ & AQ &


View Full Document

SJSU CS 265 - Iris Recognition

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Iris Recognition
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Iris Recognition and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Iris Recognition 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?