System
This project proposes a non-orthogonal view iris recognition system comprising a new iris
imaging module, an iris segmentation module, an iris feature extraction module and a
spectral (red, green, blue, and near infrared) iris mages which contain useful information
for simplifying the iris segmentation task. An intelligent random sample consensus iris
image. In order to match iris images acquired at different off-axis angles, we propose a
circle rectification method to reduce the off-axis iris distortion. The rectification
parameters are estimated using the detected elliptical pupillary boundary. Furthermore,
we propose a novel iris descriptor which characterizes an iris pattern with multiscale
step/ridge edge-type maps. The edge-type maps are extracted with the derivative of
Gaussian and the Laplacian of Gaussian filters. The iris pattern classification is
accomplished by edge-type matching which can be understood intuitively with the concept
of classifier ensembles. Experimental results show that the equal error rate of our
approach is only 0.04% when recognizing iris images acquired at ifferent off-axis angles
within ±30°
1.1 Overview of the System
from direct measurement of a part of the human body. Fingerprint, iris-scan, retina-
scan, hand geometry, and facial recognition are leading physiological biometrics.
biometrics, in turn, are based on measurements and data derived from an action,
time as a metric – the measured behavior has a beginning, middle and end.
There are two different ways to resolve a person's identity: verification and
In day-to-day life most people with whom you do business verify your identity. You
claim to be someone (your claimed identity) and then provide proof to back up your
claim. For encounters with friends and family, there is no need to claim an identity.
Instead, those familiar to you identify you, determining your identity upon seeing
These two examples illustrate the difference between the two primary uses of
Positive identification answers the “Who am I?,” although the response is not
users do not enter an ID number or use a card, but simply look at a iris capture
device and are identified from an inmate database. Negative identification systems
search databases in the same fashion, comparing one template against many, but
are designed to ensure that a person is not present in a database. This prevents
people from enrolling twice in a system, and is often used in large-scale public
benefits programs in which users enroll multiple times to gain benefits under
different names.
Not all identification systems are based on determining a username or ID. Some
their actual identities. In this case the system would return a match, but no
template. Verification answers the question, “Am I who I claim to be?” Some
records. For example, a user with three enrolled fingerprint templates may be able
to place any of the three fingers to verify, and the system performs 1:1 matches
against the user’s enrolled templates until a match is found. One-to-few. There is a
(1:few). This type of application involves identification of a user from a very small
database of enrollees. While there is no exact number that differentiates a 1:N from
a 1:few system, any system involving a search of more than 500 records is likely to
Applications areas
forensics such as criminal identification and prison security, and has the potential to
prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs,
Biometrics Technologies
¤ Iris-scan
¤ Retina-scan
¤ Hand geometry
¤ Signature-scan
¤ Keystroke-scan
¤ DNA
¤ Ear shape
¤ Odor (human scent)
Frankfort Airport in Germany allow frequent passengers to register their iris scans in an effort to
streamline boarding procedures. There is discussion that banks may someday make iris scans a
routine part of ATM transactions, and some have begun taking the first steps in testing out these
systems.
emerging role in healthcare. Healthcare solutions based on iris recognition protect access to
patient medical records at hospitals in locations such as Washington, D.C., Pennsylvania and
Alabama. Also, in Germany, infant nursing stations are equipped with iris recognition to ensure
that only parents, doctors and nurses have access to the room that holds newborn children and to
• No degradation of accuracy
Highly Scalable
• Self-focusing
• Self-illuminating
• Multi-language
• Durable
• Portable
with some PIN code. This digital signature method is widely used and this is data
encryption mechanism and concept of hash function. Both combined to produce the
unique long encrypted number for signature. This system can also be affected by
intruders who can misuse the data or information available. The problems are:
o Low reliability
o No unique identification
Technology Comparison
Misidentificati Sec
Method Coded Pattern Applications
on rate urity
Iris
High-security
Recognitio Iris pattern 1/1,200,000 High
facilities
n
Fingerprinti Med
Fingerprints 1/1,000 Universal
ng ium
Hand Size, length and thickness of Low-security
1/700 Low
Shape hands facilities
Facial
Outline, shape and distribution Low-security
Recognitio 1/100 Low
of eyes and nose facilities
n
Shape of letters, writing order, Low-security
Signature 1/100 Low
pen pressure facilities
Voiceprinti Telephone
Voice characteristics 1/30 Low
ng service
• The iris is a thin membrane on the interior of the eyeball. Iris patterns are
extremely complex.
• Patterns are formed by six months after birth, stable after a year. They
HARDWARE SPECIFICATION
PROCESSOR : Pentium IV
RAM : 512 MB RAM
MONITOR : 15” COLOR
HARD DISK : 20 GB
KEYBOARD : TVS Champ
MOUSE : Logitech
WEBCAM : Logitech
SOFTWARE SPECIFICATION
New User
Eye
Admin
Training
User
Testing
Matching
Result
Sequence Diagram :
Datab
ase
New Traini Testin
Mana Result
Eye ng g
geme
nt
Training
Testing Yes
Mismatched
Matching Output
Matched Content
Collaboration Diagram :
Result
Matchi
ng
Trainin Testin
g g
Databa
New se
Eye Manag
ement