Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
A Seminar
Research and compilation by: Anand M S Dept. of Telecommunications PESIT
INTRODUCTION
Biometrics is a rapidly evolving technology Facilitates the automatic identification based on physical or behavioral characteristics Eliminates the need to memorize a password or carry some form of token
A IRISCODE Sample
Iris-code Generation
Gabor Filtering : Complex planar wave restricted to a 2-D Gaussian envelope Aside from scale and orientation, the only thing that can make two Gabor wavelets differ is the ratio between wavelength and the width of the Gaussian envelope. Every Gabor wavelet has a certain wavelength and orientation, and can be convolved with an image to estimate the magnitude of local frequencies of that approximate wavelength and orientation in the image. A jet of Gabor wavelets consists of numerous wavelets of different wavelengths and orientations. By convolving an image with a full jet of lters it is possible to quantify the magnitude and phase of the local frequency information within the bandwidths of the jet. Gabor wavelets are formed through 2 components - a complex sinusoidal carrier and a Gaussian envelope. g(x,y)=s(x,y)w(x,y) The complex carrier takes the form : s(x,y)=e^j(2 (u0x+v0y)+P)
Real part
Imaginary Part
The real part of the function is given by : Re(s(x,y))=cos(2 (u0x+v0y)+P) The imaginary part is given by Im(s(x,y))=sin(2 (u0x+v0y)+P) The parameters u0 and v0 represent the frequency of the horizontal and vertical sinusoids respectively. P represents an arbitrary phase shift.
The second component of a Gabor wavelet is its envelope. The resulting wavelet is the product of the sinusoidal carrier and this envelope. The envelope has a Gaussian profile and is described by the following equation: g(x,y)= Ke (a2(x x0)2r+b2(y y0)2r) where : (x x0)r=(x x0)cos( )+(y y0)sin( ) (y y0)r= (x x0)sin( )+(y y0)cos( ) The parameters used above are K - a scaling constant (a,b) envelope axis scaling constants, - envelope rotation constant, (x0,y0) - Gaussian envelope peak.
To put it all together, we multiply s(x,y) by w(x,y). This produces a wavelet like this one:
Image of an eye
We extract a set of unique features from this iris and then store them. When presented with an unknown iris, we can compare the stored features to the features in the unknown iris to see if they are the same. These set of features are called the Iriscode . Any given iris has a unique texture that is generated through a random process before birth. Filters based on Gabor wavelets turn out to be very good at detecting patterns in images.
We'll use a fixed frequency 1D Gabor filter to look for patterns in our unrolled image. First, we'll take a one pixel wide column from our unrolled image and convolve it with a 1D Gabor wavelet. Because the Gabor filter is complex, the result will have a real and imaginary part which are treated separately.
We only store a small number of bits for each iris code, so the real and imaginary parts are each quantized. If a given value in the result vector is greater than zero, a one is stored; otherwise zero is stored. Once all the columns of the image have been filtered and quantized, we can form a new black and white image by putting all of the columns side by side.
In theory, two iris codes independently generated from the same iris will be exactly the same. In reality though, this doesn't happen vary often for reasons such as imperfect cameras, lighting or small rotational errors. To account for these slight inconsistencies, two iris codes are compared and if the distance between them is below a certain threshold we'll call them a match. This is based on the idea of statistical independence. The iris is random enough such that iris codes from different eyes will be statistically independent (ie. have a distance larger than the threshold) and therefore only iris codes of the same eye will fail the test of statistical independence. Empirical studies with millions of images have supported this assertion.
Authenticam
Character istic Ease of use Error Incidence Accuracy Cost User Acceptan ce Required Security LTS
Retina
Iris
Face
Signature
Voice
Low Glasses
High High
Medium Medium
High High
Medium Medium
Medium Medium
High Medium
BIOMETRICS APPLICATIONS
Indian Initiatives
Bioenable Technology, Pune Siemens Information System Ltd., Banglore Axis Software, Pune Jaypeetex ,Mumbai
Global Developments
Internet Security : Litronix, Usa Windows Biometrics : Microsoft Net Nanny Software International Biometric Smart Cards : Polarid & Atmel
FUTURE OF BIOMETRICS
ATM Machine Use Travel & Tourism Public Identity Card - Aadhar
CONCLUSION
Your fingerprints, iris pattern, and voice will verify your identity You can unlock your house or withdraw money from your bank with just a blink of eye, a tap of your finger, or by just showing your face
BIBLIOGRAPHY
Biometrics : Journal of International Biometric Society The Biometrics Consortium May 2002 Electronics For You June 2002 www.biometric.com www.bioventric.com http://homepage.ntlworld.com/avanti http://www.ibia.org
Thank You