Topics
Technique
of iris recognition
Attacks
Implementation
Advantages
& Disadvantages
Technique
Step 1: Capturing the image of the eye using a
camera.
Step 2: Differentiating the outline of the iris and the
sclera, and the pupil from the iris.
sclera
iris
pupil
of Statistical Independence
Compare the iris codes (256*8=2048
bits) of the eyes using the following
formula
[Code A (XOR) Code B] AND Mask A AND Mask B
H.D =
Mask A AND Mask B
Speed Performance
On
Operation Time
Image focus 15 millisec
Scrub specular reflections 56 millisec
Localize eye and iris 90 millisec
Fit pupillary boundary 12 millisec
Detect both eyelids 93 millisec
Remove lashes and contact lens edges 78 millisec
Demodulation and IrisCode creation 102 millisec
XOR comparison of two IrisCodes 10 micro sec
100,000
second.
Attacks
1. Iris patterns
printed on contact
lens
Countermeasure:
2D Fourier
Transform
Attacks cont
Digital
Replay attack
Countermeasure: Encryption of iris code,
database security.
Example: Iridian Technologies has
established
3DES Encryption as the standard.
Attacks cont
Picture
of an iris
Countermeasure: Liveness test ( on
command eye movement, pupillary light
reflex , red eye effect, light absorption
properties of living tissue, hippus etc.,)
RED EYE EFFECT
eye
Externally visible, patterns imaged from a
distance
Iris patterns possess a high degree of
randomness
Patterns apparently stable throughout life
Encoding and decision-making are
tractable
Q&A