Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Seminar Report
On
IRIS RECOGNITION
Submitted in the partial fulfillment of the requirement for the award of
Bachelor of Technology
In
B. Nikhil (14R01A0473)
2017-2018
Department of Electronics and Communication Engineering
Date: 20 -02-2018
Certificate
This is to certify that the technical seminar report entitled “IRIS Recognition” is the bonafide
work done and submitted by
B. Nikhil (14R01A0473)
towards the partial fulfillment of the requirement for the award of Bachelor of Technology in
Electronics and Communication Engineering from Jawaharlal Nehru Technological
University, Hyderabad .
I hereby declare that the technical seminar entitled “IRIS Recognition” is carried out
by me during the academic year 2017–2018 in partial fulfillment of the award of Bachelor of
Technology in Electronics and Communication Engineering from CMR Institute of
Technology affiliated to Jawaharlal Nehru Technological University Hyderabad. I have not
submitted the same to any other university or organization for the award of any other degree.
B. NIKHIL (14R01A0473)
ACKNOWLEDGEMENT
I would like to express my deep gratitude to the technical Seminar coordinators, Mr.
Md. Shabhaz Khan, Mr. Nagaraja kumar Pateti, Ms. R. Anusha & Ms. M. Preethi for
providing me an opportunity to work and guiding in our college.
Also I would like to thank all teaching and non-teaching members of ECE
Department for their generous help in various ways for the completion of this report. They
have been great sources of inspiration to me and I thank them from the bottom of my heart.
Last but not least I would like to thank my parents. They are my first teachers when I
came into this world, who taught me the value of hard work by their own example and to my
friends whose support was very valuable in completion of the seminar.
B.NIKHIL (14R01A0473)
i
ABSTRACT
ii
INDEX
Topics Page No
ACKNOWLEDGEMENT i
ABSTRACT ii
LIST OF FIGURES iii
CHAPTER-I INTRODUCTION 1
CHAPTER-III FINDINGS 6
4.3.2 Defining the Location of the Iris and Optimizing the image 13
CHAPTER-V APPLICATIONS&ADVANTAGES 18
CHAPTER-VI CONCLUSION 22
REFERENCES
LIST OF FIGURES
iii
Iris Recognition
CHAPTER-I
INTRODUCTION
Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology
has the smallest outlier (those who cannot use/enroll) group of all biometric technologies.
Because of its speed of comparison, iris recognition is the only biometric technology well suited
for one-to-many identification. A key advantage of iris recognition is its stability, or template
longevity, as, barring trauma, a single enrollment can last a lifetime.
CHAPTER-II
LITERATURE REVIEW
The iris recognition technology captures and analyzes the unique features of iris in the
human eye to perform identification. In 1936, ophthalmologist Frank Burch proposed the
concept of using iris patterns as a method to recognize an individual, the idea appeared in James
Bond films, but it still remained science fiction and conjecture. The first claim that no two irises
are identical was made by Dr. Leonard Flom and Dr. Aran Safir, both ophthalmologists in mid
1980s. The claim was based on their clinical research that every iris is different and was seen to
remain unchanged in clinical photographs. This claim made the human iris as a good candidate
for a biometric solution and after substantial research the patent of using iris as a means for
identifying persons was awarded to them in 1987. Dr. Flom approached Harvard Professor Dr.
John Daugman to develop an algorithm to automate identification of the human iris. Later in
1989 Dr. John Daugman developed algorithms for recognizing persons by iris recognition. In
1993, the Defense Nuclear Agency began work to test and deliver a prototype unit, which was
successfully completed by 1995 due to the combined efforts of Drs. Flom, Safir, and Daugman.
In 1994, Dr. Daugman was awarded a patent for his automated iris recognition algorithms. In
1995, the first commercial products became available.
According to Masek (2003), the iris is a thin color circular diaphragm, which can be
found between the cornea and the lens of the human eye and close to the pupil. Position of the
iris is bounded by the pupil and the sclera (white of the eye) on their surroundings. Iris has much
visual information in the texture (Murty, Reddy, and Babu, 2009).
The pattern of iris forms from the third month of gestation and complete these pattern
structures in five months, and their pigment accretion can continue until two(2) years old age
(Daugman, 2001). In iris recognition there is no change in iris features during a person’s lifetime
after two(2) years old age and size of iris can be varying from 10% to 80% with the average
diameter is 12mm (Daugman, 2001).
In 1936, ophthalmologist Frank Burch proposed iris pattern for personal recognition.
Then in 1987 two ophthalmologists, Aran Safir and Leonard Flom, patented this idea, and they
ask John Daugman to create algorithms for iris recognition in 1989 (Daugman, 2001).
Iris provides one of the most stable biometric signals for identification, with a distinctive
texture that is formed before age one and remains constant throughout life unless there is an
injury to the eye (Ives, 2004). Iris recognition can easily be considered as the most reliable form
of biometric technology, compared with other biometric technologies, such as face, and
fingerprint recognition (Nasser A. Biqami, 2013).
Most of the currently deployed commercial algorithms for iris recognition (by John
Daugman) have a very low false acceptance rate compared to the other biometric identifiers.
Some of the biometric identifiers have problems with replay attacks, for instance
fingerprints. Replay attacks with the iris biometric can be check by detecting the aliveness of the
eye. The pupil changes its size when light is shone into the eye. The algorithms are able to
measure this change in pupil size. The process of capturing the iris image is not intrusive. Iris
images can be computer matched more accurately than a face image, and it’s acknowledged that
iris recognition is more accurate than any other biometric technique.
research and development of Iris recognition technology there are few public and freely available
databases to have sample images. These iris databases contributes rich amount of iris images
which were taken in different environments. In this paper they discuss and compare the main
characteristics of the public and freely available iris image databases to find the suitable one to
test feature extraction method of iris recognition in non-cooperative environment.
CHAPTER-III
FINDINGS
3.1 IRIS RECOGNITION
Iris recognition combines computer vision, pattern recognition, statistics, and the human
machine interface.
The human iris is a colored oval – to round-shaped ring surrounding the pupil of the eye.
Figure 1 shows a sample iris, it consists of muscles that adjust the size of the pupil. The iris is the
only internal body organ that is visible externally. One of the most distinctive characteristics is
its stability. The iris pattern stabilizes by the second year of birth and remains unchanged
throughout person’s lifetime unless injured or damaged by accident or disease.
The iris pattern is more complex and more random than other biometric patterns and
hence offer a highly precise methods for individual authentication with a false acceptance error
rate of less than one in two million records.
The iris located in the human eye is protected behind the eyelid, cornea and aqueous.
This helps it to keep the damage and abrasion minimal.
The iris pattern remains stable and unchanged after the age of two year and does not
degrade over time or with the environment.
The probability of two irises producing the same numerical code is almost zero.
Each iris is different, even between identical twins or between left and right iris of an individual.
Since the iris is an extremely complex structure, modification of the iris would require
sophisticated intricate microsurgery. This could result in individual loss of sight or an obvious
artificiality that can be easily seen visually.
HARMLESS: - Acquiring your iris image through the optical units is completely safe.
Capturing the iris image is just like taking a picture.
CONVENIENT OPERATION:- You just enroll your iris for registration and recognition.
The identification process can be performed perfectly, regardless of wearing eyeglasses,
most sunglasses, or soft contact lenses.
ACCURACY: - Iris recognition is based on the most mathematically unique biometric –
the iris of the eye. The human iris is unique, even between twins or an individual’s right
and left eyes.
SCALABILITY: - This can handle sizable database entries and there is not any negative
impact on the accuracy as the database size increase.
SPEEDY IDENTIFICATION: - Identification can be made within 1 to 2 seconds.
Research shows the iris is one of the most unique data rich physical structures on the
human body. An iris has 256 independent measurable characteristics, or degrees of freedom,
nearly six times as many as a finger print. Thus, the probability of two irises producing the same
code is approximately 1 in 1078. , With the population of the earth being approximately 1010
people.
Thus, the performance of iris recognition is at a much higher level of scientific certainty
and has many greater capabilities than any other form of Human recognition, including finger
prints, Facial or voice recognition, and retinal recognition. This recognition technology is
relatively new with many significant advantages, such as speed, accuracy, hardware, simplicity,
and applicability.
Lighting, age, glasses, and head/face coverings all impact false reject rates in facial
recognition whereas iris recognition poses no difficulty in enrolling people that wear
glasses or contact lenses.
Face recognition has Privacy concerns: people do not always know when their
picture/image is being taken and being searched in a database or worse, being enrolled in
a database whereas in Iris Recognition subjects agree to enroll and participate, reducing
privacy concerns.
Iris recognition is more reliable than facial recognition.
The error rate for retinal scanning is 1:10,000,000 compared to the iris recognition error
rate of 1:131,000.
People wearing glasses must remove them for a retinal scan. For iris recognition, the
National Physical Laboratory (NPL) tests found that glasses can make enrolment more
difficult, but they can remain in place for verification without causing difficulty.
Hand size and geometry changes over time, especially in the very young and the very old
whereas the iris itself is stable throughout a person’s life (approximately from the age of
one); the physical characteristics of the iris don't change with age.
People are reluctant to place hand where many others have touched so hygiene is another
issue with hand geometry, whereas in iris recognition there is no physical contact of
person with camera.
Also extreme sizes are not accommodated in all hand readers.
CHAPTER-IV
The block diagram in Figure 2 depicts the principle steps of the proposed iris recognition
system and is described in the following. The system has two sub–systems: the iris enrolment
system and the iris verification system. The iris enrolment system is to enroll the iris in the
database for further identification. The iris verification system compares a newly input iris with
the known irises in the database and decides if it is in the database.
The iris enrolment system is comprised of the following modules: The image acquisition
module, the Pre-processing Module, the feature extraction module, the Enrolment Module, and
the Iris Pattern Database. The iris verification system does not have the Enrolment Module, but
has two additional modules: pattern matching module and the Identification Module.
The iris recognition consisted of three major components: Image Pre-processing, Feature
Extraction and Pattern matching.
The acquired image always contains not only the “useful” parts (IRIS) but also some
“relevant” parts (e.g. eyelid, pupil). Under some conditions, the brightness is not uniformly
distributed. In addition, different eye-to-camera distance may result in different image sizes of
the same eye. For the purpose of analysis, the original image needs to be processed. The
processing is composed of two steps which are Iris Localization and Iris Normalization.
Iris Localization: Iris localization by definition means to isolate the actual iris region in a digital
eye image by detecting the inner and outer boundary of the iris. Figure 3 shows the Iris
Localization. The eyelids and eyelashes normally occlude the upper and lower parts of the iris
region. A technique is required to isolate and exclude these artifacts as well as locating the
circular iris region. The aim of this is to detect the iris portion which can be approximated by two
circles, one is the iris/sclera (outer) boundary, and another interior to the first is the iris/pupil
(inner) boundary. Iris Localization is done by the process of Iris segmentation which localizes
the correct iris region in an eye image. Iris segmentation is an essential in automated iris
processing systems, because it is the basis for any further operations.
Iris Normalization: Once the iris region is segmented, the next stage is to normalize this part so
as to enable the generation of the iris-code and their comparisons. Since the variations in the eye,
like optical size of the iris, position of pupil in the iris, and the iris orientation change from
person to person, it is required to normalize the iris image so that the representation is common
to all, with similar dimensions. The normalization process involves un-wrapping the iris and
converting it into its polar equivalent.
The extraction of iris features means capturing ring-shape patterns around the iris area.
After capturing the eye image, the iris area should be correctly extracted from it. Detecting the
inner boundary of the iris against the pupil and the outer border of the iris against the sclera
finishes the process.
After iris localization, the final step is pattern matching of the iris image which generates
a match score by comparing the feature sets of two iris images. One technique for comparing two
Iris-Codes is to use the Hamming distance, which is the number of corresponding bits that differ
between the two Iris-Codes. The iris pattern is different for every person (even identical twins
don’t have the same iris pattern). These patterns are used to create templates for iris recognition.
The acquired image is matched with the whole database of templates.
The image of the iris can be captured using a standard camera using both visible and
infrared light and may be either a manual or automated procedure (Figure 4). The camera can be
positioned between three and a half inches and one meter to capture the image. In the manual
procedure, the user needs to adjust the camera to get the iris in focus and needs to be within six
to twelve inches of the camera. This process is much more manually intensive and requires
proper user training to be successful. The automatic procedure uses a set of cameras that locate
the face and iris automatically thus making this process much more user friendly.
Once the camera has located the eye, the iris recognition system then identifies the image
that has the best focus and clarity of the iris (Figure 5). The image is then analysed to identify the
outer boundary of the iris where it meets the white sclera of the eye, the pupillary boundary and
the centre of the pupil. This results in the precise location of the circular iris.
The iris recognition system then identifies the areas of the iris image that are suitable for
feature extraction and analysis. This involves removing areas that are covered by the eyelids, any
deep shadows and reflective areas. The following diagram (Figure 6) shows the optimisation of
the image.
Once the image has been captured, “an algorithm uses 2-D Gabor wavelets to filter and
map segments of the iris into hundreds of vectors (known here as phasors). The 2-D Gabor
phasor is simply the “what” and “where” of the image. Even after applying the algorithms to the
iris image there are still 173 degrees of freedom to identify the iris. These algorithms also take
into account the changes that can occur with an iris, for example the pupil’s expansion and
contraction in response to light will stretch and skew the iris. This information is used to produce
what is known as the Iris-Code, which is a 512-byte record. This record is then stored in a
database for future comparison. When a comparison is required the same process is followed but
DEPARTMENT OF ECE 14 CMR INSTITUTE OF TECHNOLOGY
Iris Recognition
instead of storing the record it is compared to all the Iris-Code records stored in the database.
The comparison also doesn’t actually compare the image of the iris but rather compares the
hexadecimal value produced after the algorithms have been applied.
In order to compare the stored Iris-Code record with an image just scanned, a calculation
of the Hamming Distance is required. The Hamming Distance is a measure of the variation
between the Iris-Code record for the current iris and the Iris-Code records stored in the database.
Each of the 2048 bits is compared against each other, i.e. bit 1 from the current Iris-Code and bit
1 from the stored Iris-Code record are compared, then bit 2 and so on. Any bits that don’t match
are assigned a value of one and bits that do match a value of zero. Once all the bits have been
compared, the number of non-matching bits is divided by the total number of bits to produce a
two-digit figure of how the two Iris-Code records differ. For example a Hamming Distance of
0.20 means that the two Iris-Codes differ by 20%.
Step 1: Image acquisition, the first phase, is one of the major challenges of automated iris
recognition since we need to capture a high-quality image of the iris while remaining non-
invasive to the human operator.
Step 2: Iris localization takes place to detect the edge of the iris as well as that of the pupil; thus
extracting the iris region.
Step 3: Normalization is used to be able to transform the iris region to have fixed dimensions,
and hence removing the dimensional inconsistencies between eye images due to the stretching of
the iris caused by the pupil dilation from varying levels of illumination.
Step 5: Finally, it is time to extract the most discriminating feature in the iris pattern so that a
comparison between templates can be done. Therefore, the obtained iris region is encoded using
wavelets to construct the iris code.
CHAPTER-V
Iris recognition systems are being used today to control physical access, to facilitate
identity verification and for computer authentication. Real world iris recognition applications
have been implemented for airport and prison security, automatic teller machines (ATM),
authentication using single sign-on, to replace ID cards, and to secure school and hospitals.
In U.S many banks incorporated iris recognition technology into ATM’s for the purpose
of controlling access to one’s bank accounts. After enrolling once (a “30 second” process), the
customer need only approach the ATM, follow the instruction to look at the camera, and be
recognized within 2-4 seconds. The benefits of such a system are that the customer who chooses
to use bank’s ATM with iris recognition will have a quicker, more secure transaction.
Applications of this type are well suited to iris recognition technology. First, being fairly
large, iris recognition physical security devices are easily integrated into the mountable, sturdy
apparatuses needed or access control, the technology’s phenomenal accuracy can be relied upon
to prevent unauthorized release or transfer and to identify repeat offenders re-entering prison
under a different identity.
Iris scan has implemented their devices with great success in borders in Mexico and USA
border. By this any person going to USA from Mexico is authorized through biometric
identification. Such devices greatly ease logistical and staffing problems.
1. Highly protected, internal organ of the eye. A person’s iris is fully developed within 18
months after birth, and is protected by eyelashes, eyelids and the retina. This
distinguishes it from fingerprints, which can be difficult to recognize after years of
certain types of manual labour.
2. Externally visible pattern imaged from a distance
3. Patterns apparently stable throughout life
4. Iris shape is far more predictable than that of the face
5. No need for a person to touch any equipment
6. Its higher uniqueness in shape than face or fingerprints ensures that an authentication
system using the iris is immensely reliable.
7. Iris recognition is proven the highest accuracy in biometrics. Iris recognition had no false
matches.
8. Iris patterns possess a high degree of randomness. Randomness in irises makes them very
difficult to forge and hence imitate the actual person.
9. Encoding and decision-making are tractable.
10. Image analysis and encoding time: 1second
11. Search speed: 100000 Iris Codes per second
CHAPTER-VI
CONCLUSION
The need for secure methods of authentication is becoming increasingly important in the
corporate world today. Passwords, token cards and PINs are all risks to the security of an
organization due to human nature. Our inability to remember complex passwords and tendency
to write these down along with losing token cards or forgetting PINs all contribute to the
possible breakdown in security for an organization.
The uniqueness of the iris and low probability of a false acceptance or false rejection all
contribute to the benefits of using iris recognition technology. It provides an accurate and secure
method of authenticating users onto company systems, is a non-intrusive method and has the
speed required to minimize user frustration when accessing company systems. Users no longer
have to worry about remembering passwords and system administrators no longer need to worry
about the never-ending problem of users disclosing passwords or having weak passwords that are
easily cracked.
For iris recognition there is a vast scope in today’s modern technology in security and
maintenance of data from unauthorized persons.
REFERENCES
1. Daugman, J. (2001). The Importance of Being Random: Statistical Principles of Iris
Recognition. International Journal of Wavelet, Multi-resolution and Information
Processing, PP3-6.
2. Daugman, J. and Downing, C. (2001). Epigenetic Randomness, Complexity and
Singularity of Human Iris Patterns. Proceedings of the Royal Society: Biological Science,
PP1737-1738.
3. Hussein, H. and Benedict, B. (2006). Research and Development of an Iris-Based
Recognition System for Identification and Secure Authentication. Information and
Security, PP39-57.
4. Ives, Y. D. (2004). A New Approach to Iris Pattern Recognition. Boca Raton: FL: CRC
Press.
5. Penny, K. (2002). Iris Recognition Technology for Improved Authentication. SANS
Institute, InfoSec Reading Room, P6.
6. Ramamurthy, P. and Krishnamurthy, R. (2012). Effective Iris Recognition For Security
Enhancement. International Journal of Engineering Research and Applications (IJERA),
PP1016-1019.
7. Vijay, D. et al. (2010). Biometric Recognition: A Modern Era for Security. International
Journal of Engineering Science and Technology, P3364.
8. https://en.m.wikipedia.org/wiki/Iris_recognition
9. https://www.scribd.com/mobile/doc/54927670/Iris-Scanning-Seminar-Report
10. https://www.slideshare.net/mobile/ajinkya_93/iris-recognition-seminar