Iris RecognitionTopicsWhy Iris Recognition?TechniqueIris pattern - ComparisonSpeed PerformanceAttacksAttacks cont…Slide 9Slide 10The Process and Analysis UnitThe Largest National DeploymentAdvantages of the Iris for IdentificationDisadvantages of the Iris for IdentificationWhy iris recognition is not so famous?Slide 16Iris Recognition Iris Recognition Sathya Swathi MabbuSathya Swathi MabbuLong N VuongLong N VuongTopicsTopicsTechnique of iris recognitionTechnique of iris recognitionAttacks Attacks ImplementationImplementationAdvantages & DisadvantagesAdvantages & DisadvantagesWhy Iris Recognition?Why Iris Recognition?Iris patterns are unique.Iris patterns are unique.Iris patterns do not change with age. Iris patterns do not change with age. Non Contact approach.Non Contact approach.Simplicity and ease of Simplicity and ease of implementation.implementation.Speed – the process of matching the Speed – the process of matching the iris patterns is very fast. iris patterns is very fast.TechniqueTechniqueStep 1: Capturing the image of the eye using a Step 1: Capturing the image of the eye using a camera. camera. Step 2: Differentiating the outline of the iris and the Step 2: Differentiating the outline of the iris and the sclera, and the pupil from the iris.sclera, and the pupil from the iris.Step 3: Encoding the image using demodulation (also Step 3: Encoding the image using demodulation (also removes reflections, intrusion of eye lid lashes, removes reflections, intrusion of eye lid lashes, contact lens outline etc.,). Code is 256 bytes. contact lens outline etc.,). Code is 256 bytes. pupilirisscleraIris pattern - ComparisonIris pattern - ComparisonTest of Statistical IndependenceTest of Statistical IndependenceCompare the iris codes (256*8=2048 Compare the iris codes (256*8=2048 bits) of the eyes using the following bits) of the eyes using the following formulaformula [Code A (XOR) Code B] AND Mask A AND Mask B[Code A (XOR) Code B] AND Mask A AND Mask BH.D = H.D = Mask A AND Mask BMask A AND Mask BThis is called Hamming Distance (H.D). This is called Hamming Distance (H.D).Speed PerformanceSpeed PerformanceOn a 300 MHz workstation, the execution On a 300 MHz workstation, the execution times for the steps in iris recognition are listed times for the steps in iris recognition are listed below,below,Operation TimeImage focus 15 millisecScrub specular reflections 56 millisecLocalize eye and iris 90 millisecFit pupillary boundary 12 millisecDetect both eyelids 93 millisecRemove lashes and contact lens edges 78 millisecDemodulation and IrisCode creation 102 millisecXOR comparison of two IrisCodes 10 micro sec100,000 comparisons can be performed in a second. IrisCode is a registered trademark of Iridian TechnologiesAttacks Attacks 1. Iris patterns 1. Iris patterns printed on contact printed on contact lenslens Countermeasure:Countermeasure: 2D Fourier 2D Fourier TransformTransformAttacks cont…Attacks cont…Digital Replay attack Digital Replay attack Countermeasure:Countermeasure: Encryption of iris code, Encryption of iris code, database security. database security. Example: Iridian Technologies has Example: Iridian Technologies has established established 3DES Encryption as the standard. 3DES Encryption as the standard.Attacks cont…Attacks cont…Picture of an iris Picture of an iris Countermeasure:Countermeasure: Liveness test ( on Liveness test ( on command eye movement, pupillary light command eye movement, pupillary light reflex , red eye effect, light absorption reflex , red eye effect, light absorption properties of living tissue, hippus etc.,)properties of living tissue, hippus etc.,)RED EYE EFFECTIMPLEMENTATION OF THE IRIS RECOGNITION SYSTEMThe Process and Analysis The Process and Analysis UnitUnitEach image is given to the P&A Unit for recognition:Each image is given to the P&A Unit for recognition:1.1.Splits the colored image and tests the morphologySplits the colored image and tests the morphology2.2.Transforms the image in a 3D imageTransforms the image in a 3D image3.3.Transforms the image in the frequencies domain Transforms the image in the frequencies domain 4.4.Transforms the image in a multidimensional objects, Transforms the image in a multidimensional objects, then the algorithm executes the last analysis to then the algorithm executes the last analysis to recognize a personrecognize a personThe Largest National The Largest National DeploymentDeploymentIris recognition border-crossing system in Iris recognition border-crossing system in the United Arab Emirates (UAE)the United Arab Emirates (UAE)Advantages of the Iris for Advantages of the Iris for IdentificationIdentificationHighly protected, internal organ of the Highly protected, internal organ of the eyeeyeExternally visible, patterns imaged from a Externally visible, patterns imaged from a distancedistanceIris patterns possess a high degree of Iris patterns possess a high degree of randomnessrandomnessPatterns apparently stable throughout lifePatterns apparently stable throughout lifeEncoding and decision-making are Encoding and decision-making are tractabletractableDisadvantages of the Iris for Disadvantages of the Iris for IdentificationIdentificationSmall target to acquire from a distanceSmall target to acquire from a distanceMoving target…within another…on yet Moving target…within another…on yet anotheranotherLocated behind a curved, wet, reflecting Located behind a curved, wet, reflecting surfacesurfaceObscured by eyelashes, lenses, reflectionsObscured by eyelashes, lenses, reflectionsIllumination should not be visible or brightIllumination should not be visible or brightWhy iris recognition is not so famous?Why iris recognition is not so famous?ConvenienceConvenienceAcceptanceAcceptanceCost CostQ & AQ &
View Full Document