SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Biometrics is the science of measuring physical or
anatomical characteristics of individuals.
It performs automatic identification of a person based on
his/her physiological characteristics.
Among the features measured are face, fingerprints,
handwriting, iris, retinal, vein, and voice. Biometric
technologies are becoming the foundation of an extensive
array of highly secure identification and personal verification
solutions.
INTRODUCTION TO IRIS
 Iris is the area of the eye where the pigmented or
colored circle, usually brown, blue, rings the dark pupil
of the eye.
 It is the colored portion of the eye that regulates the size
of the pupil.
 Has unique complex and random patterns which can
be seen from some distance.
 Iris recognition is an automated method of biometric
identification that uses mathematical pattern-
recognition techniques on the images of the irises of an
individual's eyes, whose complex random patterns are
Steps followed In
A person stands in front of the iris identification system,
between one or three feet away, while a wide angle
camera calculates the position of their eye.
A second camera zooms in on the eye and takes a black
and white image.
Once the iris is in focus, it overlays a circular grid on the
image of the iris and identifies the light and dark areas,
like an “eye print”.
To prevent a fake eye from being used to fool system,
these devices may vary the light shine into the eye and
watch for pupil dilation
DEVICES USED FOR IRIS
SCANNING
Working Of Iris Technology
The iris identification program may be
divided into four main functional
blocks:
1.Image Acquisition.
2.Preprocessing.
3.Image Analysis.
merits
Externally visible highly protected internal organ.
Unique patterns.
Not genetically connected unlike eye color.
Probability of matching of iris pattern is 1:10^78.
Stable with age.
Impossible to alter surgically.
Living Password, Can not be forgotten or copied.
Works on blind person.
User needs not to touch appliances.
Accurate faster and supports large data base.
Disadvantages
Accuracy changes with user’s height ,illumination ,image
quality etc.
Person needs to be still, difficult to scan if not co-operated.
Risk of fake Iris lenses.
Alcohol consumption causes deformation in Iris pattern
Easily fooled by presenting a high-quality photograph of a
face instead of a real face; unsuitable for unsupervised
applications.
Need of live tissue verification technology.
Expensive
APPLICATIONS
Computer login: the iris as a living password.
National border controls: the iris as a living passport.
Driving licenses and personal certificates.
Internet security, control of access to privileged
information.
Premises access control (Home, Office, Laboratory).
Anti-terrorism (e.g. security screening at airports)
Financial Transactions (electronic commerce and
banking).
Secure accesses to bank cash machine accounts.
Credit-card authentication.
Automobile ignition and unlocking; anti-theft devices
CONCLUSION
Highly accurate but easy
Fast
Has some drawbacks
Needs some developments
Experiments are going on
Will become day to day technology
very soon.
Iris ppt

Weitere ähnliche Inhalte

Was ist angesagt?

Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaDrishty Sharma
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learningSwatiNarkhede1
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 

Was ist angesagt? (20)

Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Retina scan
Retina scanRetina scan
Retina scan
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
BIONIC EYE
BIONIC EYEBIONIC EYE
BIONIC EYE
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 

Andere mochten auch

An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi MkindiImmune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi MkindiMkindi Mkindi
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
TB-HIV Co-infection Treatment
TB-HIV Co-infection TreatmentTB-HIV Co-infection Treatment
TB-HIV Co-infection TreatmentHopkinsCFAR
 
Anatomy of uvea
Anatomy of uveaAnatomy of uvea
Anatomy of uveaBarun Garg
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
The Bermuda triangle
 The Bermuda triangle The Bermuda triangle
The Bermuda triangleSri Harati K
 
oppurtunistic infection in HIV/AIDS AND IRIS
oppurtunistic infection in HIV/AIDS AND  IRISoppurtunistic infection in HIV/AIDS AND  IRIS
oppurtunistic infection in HIV/AIDS AND IRISBhupendra Shah
 
Anatomy of Uvea track
Anatomy of Uvea trackAnatomy of Uvea track
Anatomy of Uvea trackLhacha
 
HIV and TB coinfection
HIV and TB coinfectionHIV and TB coinfection
HIV and TB coinfectionswati2084
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation HadoopVarun Narang
 

Andere mochten auch (20)

An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi MkindiImmune reconstitution inflammatory syndrome-Hamisi Mkindi
Immune reconstitution inflammatory syndrome-Hamisi Mkindi
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Anatomy of iris
Anatomy of irisAnatomy of iris
Anatomy of iris
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Blue brain
Blue brainBlue brain
Blue brain
 
TB-HIV Co-infection Treatment
TB-HIV Co-infection TreatmentTB-HIV Co-infection Treatment
TB-HIV Co-infection Treatment
 
Anatomy of uvea
Anatomy of uveaAnatomy of uvea
Anatomy of uvea
 
Uveal tract anatomy
Uveal tract anatomyUveal tract anatomy
Uveal tract anatomy
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
The Bermuda triangle
 The Bermuda triangle The Bermuda triangle
The Bermuda triangle
 
oppurtunistic infection in HIV/AIDS AND IRIS
oppurtunistic infection in HIV/AIDS AND  IRISoppurtunistic infection in HIV/AIDS AND  IRIS
oppurtunistic infection in HIV/AIDS AND IRIS
 
Anatomy of Uvea track
Anatomy of Uvea trackAnatomy of Uvea track
Anatomy of Uvea track
 
HIV and TB coinfection
HIV and TB coinfectionHIV and TB coinfection
HIV and TB coinfection
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 

Ähnlich wie Iris ppt

Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptnaghamallella
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdfPoooi2
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
Iris/Retina Identification System
Iris/Retina Identification SystemIris/Retina Identification System
Iris/Retina Identification SystemNIMITA NELSON
 

Ähnlich wie Iris ppt (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.pptIris_ information_hiding recognation.ppt
Iris_ information_hiding recognation.ppt
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Iris print
Iris print Iris print
Iris print
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Iris/Retina Identification System
Iris/Retina Identification SystemIris/Retina Identification System
Iris/Retina Identification System
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 

Kürzlich hochgeladen

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Kürzlich hochgeladen (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Iris ppt

  • 1.
  • 2. Biometrics is the science of measuring physical or anatomical characteristics of individuals. It performs automatic identification of a person based on his/her physiological characteristics. Among the features measured are face, fingerprints, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.
  • 3. INTRODUCTION TO IRIS  Iris is the area of the eye where the pigmented or colored circle, usually brown, blue, rings the dark pupil of the eye.  It is the colored portion of the eye that regulates the size of the pupil.  Has unique complex and random patterns which can be seen from some distance.  Iris recognition is an automated method of biometric identification that uses mathematical pattern- recognition techniques on the images of the irises of an individual's eyes, whose complex random patterns are
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Steps followed In A person stands in front of the iris identification system, between one or three feet away, while a wide angle camera calculates the position of their eye. A second camera zooms in on the eye and takes a black and white image. Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like an “eye print”. To prevent a fake eye from being used to fool system, these devices may vary the light shine into the eye and watch for pupil dilation
  • 9. DEVICES USED FOR IRIS SCANNING
  • 10. Working Of Iris Technology The iris identification program may be divided into four main functional blocks: 1.Image Acquisition. 2.Preprocessing. 3.Image Analysis.
  • 11. merits Externally visible highly protected internal organ. Unique patterns. Not genetically connected unlike eye color. Probability of matching of iris pattern is 1:10^78. Stable with age. Impossible to alter surgically. Living Password, Can not be forgotten or copied. Works on blind person. User needs not to touch appliances. Accurate faster and supports large data base.
  • 12. Disadvantages Accuracy changes with user’s height ,illumination ,image quality etc. Person needs to be still, difficult to scan if not co-operated. Risk of fake Iris lenses. Alcohol consumption causes deformation in Iris pattern Easily fooled by presenting a high-quality photograph of a face instead of a real face; unsuitable for unsupervised applications. Need of live tissue verification technology. Expensive
  • 13. APPLICATIONS Computer login: the iris as a living password. National border controls: the iris as a living passport. Driving licenses and personal certificates. Internet security, control of access to privileged information. Premises access control (Home, Office, Laboratory). Anti-terrorism (e.g. security screening at airports) Financial Transactions (electronic commerce and banking). Secure accesses to bank cash machine accounts. Credit-card authentication. Automobile ignition and unlocking; anti-theft devices
  • 14. CONCLUSION Highly accurate but easy Fast Has some drawbacks Needs some developments Experiments are going on Will become day to day technology very soon.