Anda di halaman 1dari 18

Non-Orthogonal View Iris Recognition

System
This project proposes a non-orthogonal view iris recognition system comprising a new iris

imaging module, an iris segmentation module, an iris feature extraction module and a

classification module. A dual-charge-coupled device camera was developed to capture four-

spectral (red, green, blue, and near infrared) iris mages which contain useful information

for simplifying the iris segmentation task. An intelligent random sample consensus iris

segmentation method is proposed to robustly detect iris boundaries in a four-spectral iris

image. In order to match iris images acquired at different off-axis angles, we propose a

circle rectification method to reduce the off-axis iris distortion. The rectification

parameters are estimated using the detected elliptical pupillary boundary. Furthermore,

we propose a novel iris descriptor which characterizes an iris pattern with multiscale

step/ridge edge-type maps. The edge-type maps are extracted with the derivative of

Gaussian and the Laplacian of Gaussian filters. The iris pattern classification is

accomplished by edge-type matching which can be understood intuitively with the concept

of classifier ensembles. Experimental results show that the equal error rate of our

approach is only 0.04% when recognizing iris images acquired at ifferent off-axis angles

within ±30°
1.1 Overview of the System

The physiological biometrics are based on measurements and data derived

from direct measurement of a part of the human body. Fingerprint, iris-scan, retina-

scan, hand geometry, and facial recognition are leading physiological biometrics.

Behavioral characteristics are based on an action taken by a person. Behavioral

biometrics, in turn, are based on measurements and data derived from an action,

and indirectly measure characteristics of the human body. Voice recognition,

keystroke-scan, and signature-scan are leading behavioral biometric technologies.

One of the defining characteristics of a behavioral biometric is the incorporation of

time as a metric – the measured behavior has a beginning, middle and end.

A biometric system is essentially a pattern recognition system which

makes a personal identification by determining the authenticity of a specific

physiological or behavioral characteristic possessed by the user. An important issue

in designing a practical system is to determine how an individual is identified.

Depending on the context, a biometric system can be either a verification

(authentication) system or an identification system.

There are two different ways to resolve a person's identity: verification and

identification. Verification (Am I whom I claim I am?) involves confirming or denying

a person's claimed identity. In identification, one has to establish a person's identity


(Who am I?). Each one of these approaches has it's own complexities and could

probably be solved best by a certain biometric system.

In day-to-day life most people with whom you do business verify your identity. You

claim to be someone (your claimed identity) and then provide proof to back up your

claim. For encounters with friends and family, there is no need to claim an identity.

Instead, those familiar to you identify you, determining your identity upon seeing

your face or hearing your voice.

These two examples illustrate the difference between the two primary uses of

biometrics: identification and verification.

Identification (1:N, one-to-many, recognition) – The process of determining a

person’s identity by performing matches against multiple biometric templates.

Identification systems are designed to determine identity based solely on biometric

information. There are two types of identification systems: positive identification

and negative identification. Positive identification systems are designed to find a

match for a user’s biometric information in a database of biometric information.

Positive identification answers the “Who am I?,” although the response is not

necessarily a name – it could be an employee ID or another unique identifier. A

typical positive identification system would be a prison release program where

users do not enter an ID number or use a card, but simply look at a iris capture

device and are identified from an inmate database. Negative identification systems

search databases in the same fashion, comparing one template against many, but
are designed to ensure that a person is not present in a database. This prevents

people from enrolling twice in a system, and is often used in large-scale public

benefits programs in which users enroll multiple times to gain benefits under

different names.

Not all identification systems are based on determining a username or ID. Some

systems are designed determine if a user is a member of a particular category. For

instance, an airport may have a database of known terrorists with no knowledge of

their actual identities. In this case the system would return a match, but no

knowledge of the person’s identity is involved.

Verification (1:1, matching, authentication) – The process of establishing the validity

of a claimed identity by comparing a verification template to an enrollment

template. Verification requires that an identity be claimed, after which the

individual’s enrollment template is located and compared with the verification

template. Verification answers the question, “Am I who I claim to be?” Some

verification systems perform very limited searches against multiple enrollee

records. For example, a user with three enrolled fingerprint templates may be able

to place any of the three fingers to verify, and the system performs 1:1 matches

against the user’s enrolled templates until a match is found. One-to-few. There is a

middle ground between identification and verification referred to as one-to-few

(1:few). This type of application involves identification of a user from a very small

database of enrollees. While there is no exact number that differentiates a 1:N from

a 1:few system, any system involving a search of more than 500 records is likely to

be classified as 1:N. A typical use of a 1:few system would be access control to


sensitive rooms at a 50-employee company, where users place their finger on a

device and are located from a small database.

Applications areas

Biometrics is a rapidly evolving technology which is being widely used in

forensics such as criminal identification and prison security, and has the potential to

be used in a large range of civilian application areas. Biometrics can be used to

prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs,

workstations, and computer networks. It can be used during transactions conducted

via telephone and internet (electronic commerce and electronic banking). In

automobiles, biometrics can replace keys with key-less entry devices.

Biometrics Technologies

The primary biometric disciplines include the following:

¤ Fingerprint (optical, silicon, ultrasound, touch less)

¤ Facial recognition (optical and thermal)

¤ Voice recognition (not to be confused with speech recognition)

¤ Iris-scan

¤ Retina-scan

¤ Hand geometry

¤ Signature-scan

¤ Keystroke-scan

¤ Palm-scan (forensic use only)

Disciplines with reduced commercial viability or in exploratory stages include:

¤ DNA

¤ Ear shape
¤ Odor (human scent)

¤ Vein-scan (in back of hand or beneath palm)

¤ Finger geometry (shape and structure of finger or fingers)

¤ Nailbed identification (ridges in fingernails)

¤ Gait recognition (manner of walking)

Application area for Recognition of Human Iris are :

The Charlotte/Douglas International Airport in North Carolina and the Flughafen

Frankfort Airport in Germany allow frequent passengers to register their iris scans in an effort to

streamline boarding procedures. There is discussion that banks may someday make iris scans a

routine part of ATM transactions, and some have begun taking the first steps in testing out these

systems.

In addition to the government and transportation markets, iris recognition is playing an

emerging role in healthcare. Healthcare solutions based on iris recognition protect access to

patient medical records at hospitals in locations such as Washington, D.C., Pennsylvania and

Alabama. Also, in Germany, infant nursing stations are equipped with iris recognition to ensure

that only parents, doctors and nurses have access to the room that holds newborn children and to

avoid potential abductions.


Speed of Throughput

• Exhaustive one-to-many search identifies individual in seconds

• Performs at a matching rate of 100,000 per second

o Generally less than two (2) seconds to recognize

• No degradation of accuracy

Highly Scalable

• Supports extremely large databases

• Robust capabilities permit only one enrollment per individual

• Denies duplicate records or enrollment under aliases

Iris Recognition Works as follows:

• Captures a digital photograph of iris

• Analyzes the unique iris patterns

• Creates a unique 512 byte code

• Compares and matches unique code to all codes in database

• Authenticates or rejects individual


Standalone Iris Capture and Recognition Camera

• Self-focusing

• Self-illuminating

• Adjustable for ADA compliance

• Multi-language

• Durable

• Portable

3.1 Existing Method

The existing system recognizes the person with digital signature or

with some PIN code. This digital signature method is widely used and this is data

encryption mechanism and concept of hash function. Both combined to produce the

unique long encrypted number for signature. This system can also be affected by

intruders who can misuse the data or information available. The problems are:

o Easily traceable by intruders

o Low reliability

o No unique identification
Technology Comparison

Misidentificati Sec
Method Coded Pattern Applications
on rate urity
Iris
High-security
Recognitio Iris pattern 1/1,200,000 High
facilities
n
Fingerprinti Med
Fingerprints 1/1,000 Universal
ng ium
Hand Size, length and thickness of Low-security
1/700 Low
Shape hands facilities
Facial
Outline, shape and distribution Low-security
Recognitio 1/100 Low
of eyes and nose facilities
n
Shape of letters, writing order, Low-security
Signature 1/100 Low
pen pressure facilities
Voiceprinti Telephone
Voice characteristics 1/30 Low
ng service

Benefits of Using Iris Technology

• The iris is a thin membrane on the interior of the eyeball. Iris patterns are

extremely complex.

• Patterns are individual (even in fraternal or identical twins).

• Patterns are formed by six months after birth, stable after a year. They

remain the same for life.

• Imitation is almost impossible.

• Patterns are easy to capture and encode


ARCHITECTURAL DIAGRAM
SYSTEM DIAGRAM
Flow Diagram
SYSTEM SPECIFICATION

HARDWARE SPECIFICATION

The hardware used for the development of the project is:

PROCESSOR : Pentium IV
RAM : 512 MB RAM
MONITOR : 15” COLOR
HARD DISK : 20 GB
KEYBOARD : TVS Champ
MOUSE : Logitech
WEBCAM : Logitech

SOFTWARE SPECIFICATION

The software used for the development of the project is:

OPERATING SYSTEM : Windows XP


ENVIRONMENT : Visual Studio .NET 2005
.NET FRAMEWORK : Version 2.0
LANGUAGE : VB.NET
BACK END : SQLSERVER 2000

Use Case Diagram :


Database
Management

New User
Eye

Admin

Training

User
Testing

Matching
Result

Sequence Diagram :
Datab
ase
New Traini Testin
Mana Result
Eye ng g
geme
nt

State Flow Diagram:


Database
Management

New User Eye

Training

Testing Yes

Mismatched
Matching Output

Matched Content

Collaboration Diagram :
Result

Matchi
ng

Trainin Testin
g g

Databa
New se
Eye Manag
ement

Anda mungkin juga menyukai