record stored ,a database access is granted [4]. At the excess of 266 degrees of freedom, i.e. the number of
ATM, a positive authentication can be read through variations in the iris that allow one iris to be
glasses, contact lenses and most sunglasses. Iris distinguished from another.
recognition proves highly accurate, easy to use and
virtually fraud proof means to verify the identity of the The fact that the iris is protected behind the eyelid,
customer. cornea and aqueous humour means that, unlike other
biometrics such as fingerprints, the likelihood of
1. Background and Related work damage and/or abrasion is minimal. The iris is also not
Identification vs. Verification subject to the effects of aging which means it remains
in a stable form from about the age of one until death.
It is important to distinguish whether a biometrics
The use of glasses or contact lenses (colored or clear)
system is used to verify or identify a person. These
has little effect on the representation of the iris and
are separate goals, and some biometrics systems are
hence does not interfere with the recognition
more appropriate for one than the other, though no
technology. Figure (1) shows examples of the iris
biometric system is limited to one or the other. The
pattern and they demonstrate the variations found in
needs of the environment will dictate which system is
irises [8].
chosen. The most common use of biometrics is
verification [5]. As the name suggests, the biometric
system verifies the user based on information
provided by the user. For example, when X enters
her/his user name and password, the biometric system
then fetches the template for X. If there is a match,
the system verifies that the user is in fact X.
Identification seeks to determine who the subject is
without information from the subject. For instance, Examples of human iris patterns: Figure 1
face recognition systems are commonly used for In general, the process of iris recognition system
identification; a device captures an image of the includes the following four steps:
subject is face and looks for a match in its database.
Identification is complicated and resource-intensive 1. Capturing the image
2. Defining the location of the iris
because the system must perform a one-to-many
3. Optimizing the image
comparison of images, rather than a one-to-one 4. Storing and comparing the image.
comparison performed by a verification system [6].
How a biometric system works: Figure 2 Both the inner boundary and the outer boundary of a
typical iris can be taken as circles. But the two circles
2. The Proposed System are usually not co-centric. Compared with the other
part of the eye, the pupil is much darker. We detect the
inner boundary between the pupil and the iris by
In this section, we will discuss in detail the means of thresholding. The outer boundary of the iris
proposed system. The system contains five main is more difficult to detect because of the low contrast
steps; image acquisition, iris localization, between the two sides of the boundary. We detect the
outer boundary by maximizing changes of the
coordinate systems, recognition and identification
perimeter-normalized sum of gray level values along
process and matching and classification the circle. The technique is found to be efficient and
evaluation [9]. Each step is described as follows: effective.
Step-5 Isolate the iris boundary: Segment the This section illustrates the technique of how to get
image of the iris from the eye by applying the feature vector (iris code) to able to compare the
boundary detection technique to localize the similarities of the human eyes and to identify the
pupillary boundary. person [12]. The wavelet transform breaks an image
down into four sub-sampled, or images. The results
consist of one image that has been high pass in the
horizontal and vertical directions, one that has been
low passed in the vertical and high passed in the
horizontal, and one that has been low pass filtered in
both directions. Where, H and L mean the high pass
and low pass filter, respectively. While HH means
that the high pass filter is applied to signals of both
directions.
Original image :Fig (a) Image after localization: Fig
(b)
3. Polar Transformation
5. Matching Process