Visit: www.geocities.com/chinna_chetan05/forfriends.html
CONTENTS: ABSTRACT. BIO-METRICS. •
What is biometrics?
•
How a biometric system works.
•
Iris as a bio-metric.
IRIS RECOGNITION. •
Iris recognition evolution.
•
What is iris recognition?
•
Why iris recognition technology?
IRIS FEATURES AND PROCESS. BIOMETRIC
TECHNOLOGY
COMPARISIONS. DESCRIPTION OF THE METHOD.
RESULT AND EFFECTIVENESS. MERITS OS IRIS TECNOLOGY. DEMERITS OF IRIS TECHNOLOGY. CURRENT USES(REAL TIME) APPLICATION
AND
MARKET
DEPLOYMENT. LIMITATIONS. CONCLUSION. REFERENCES.
1 Email:
[email protected]
Visit: www.geocities.com/chinna_chetan05/forfriends.html
ABSTRACT: Historically,
identity
or
authentication
conventions were based on things one possessed (a key, a passport, or identity credential), or something one knew (a password, the answer to a question, or a PIN.) This possession or knowledge was generally all that was required to confirm identity or confer privileges. However,
these
conventions
could
be
compromised - as possession of a token or the requisite knowledge by the wrong individual could, and still does, lead to security breaches. To bind identity more closely to an individual and appropriate authorization,
new identity
convention is becoming more prevalent. Based not on what a person has or knows, but instead on what physical characteristics or personal behavior traits they exhibit, these are known as biometrics
- measurements of behavioral or
physical attributes - how an individual smells, walks, signs their name, or even types on a keyboard, their voice, fingers, facial structure, vein patterns or patterns in the iris. In this paper I have tried to describe the method and the revolution that the iris recognition could make in the future security measures that the security managers will take for optimization of security levels which make a 100% secure globe. 2 Email:
[email protected]
Visit: www.geocities.com/chinna_chetan05/forfriends.html difficult to duplicate. Smart cards and tokens also provide a unique identifier, but BIO-METRICS:
biometrics has an advantage over these devices: a user can not lose or forget his or
What is Biometrics?
her fingerprint, retina, or voice.
Biometrics is the use of physical characteristics to identify a person. This rapidly emerging technology is becoming more common as security measures are taken to a new level. Retinal scan biometrics uses iris recognition to identify the pattern of the iris that is as unique to each individual as are fingerprints. How a biometric system works? Biometrics system uses hardware to capture the biometric information, and software to maintain and manage the system. In general, the system translates these measurements to a thematical computer-readable format then a user first creates a biometric profile, known as a template, that template is stored in a database.
Above figure describes the process involved in using a biometric system for security. It
The biometrics system then compares this
contains nine steps:
template to the new image created every time a
(1) Capture the chosen biometric;
user accesses the system. For an enterprise,
(2) Process the biometric and extract and
biometrics provides value in two ways. First, a biometric device automates entry
enroll the biometric template; (3) Store the template in a local repository, a
into secure locations, relieving or at least
central repository, or a portable token
reducing the need for full-time monitoring by
such as a smart card;
personnel. Second, when rolled into an authentication scheme, biometrics adds a strong layer of verification for user names and passwords. Biometrics adds a unique identifier to network authentication, one that is extremely 3 Email:
[email protected]
(4) Live-scan the chosen biometric; (5) Process the biometric and extract the biometric template; (6) Store the reference template (7) Match the scanned biometric against stored templates;
Visit: www.geocities.com/chinna_chetan05/forfriends.html (8) Provide a matching score to business
IRIS RECOGNITION
applications with threshold value; (9)Record a secure audit trail with respect to
WHAT IS IRIS RECOGNITION?
system
Of all the biometric technologies used for human authentication today, it is
IRIS AS A BIOMETRIC
generally conceded that iris recognition is
The iris is an overt body that is available for
the most accurate. Coupling this high
remote assessment with the aid of a machine
confidence authentication with factors like
vision system to do automated iris recognition.
outlier group size, speed, usage/human
Iris recognition technology combines
factors, platform versatility and flexibility
computer vision, pattern recognition,
for use in identification or verification
statistical inference, and optics.
modes - as well as addressing issues like
The spatial patterns that are apparent in
database size/management and privacy
the human iris are highly distinctive to
concerns - iris recognition has also shown
an individual its extremely data-rich
itself to be exceedingly versatile and
physical structure
suited for large population applications.
Genetic independence — no two eyes are the same patterns apparently stable throughout life Physical protection by a transparent window (the cornea), highly protected by internal organ of the eye Externally visible, so noninvasive — patterns imaged from a distance IRIS RECOGNITION EVOLUTION:
WHY
IRIS
RECOGNITON
TECHNOLOGY? There are many reasons why iris recognition is a particularly attractive technology for identity management. 1. Smallest
outlier
population.
There are relatively few people
Iris recognition was developed in the
who don't have at least one eye, so
early 1990s by John Daugman at the University
there are only a few people who
of Cambridge. The method analyses individual
can't use the technology. While
patterns of the iris and today is mainly used for
blind people can be difficult to
verification purposes (access control) e.g. at
enroll, there are instances where
various airports .
blind
4 Email:
[email protected]
people
have
used
iris
Visit: www.geocities.com/chinna_chetan05/forfriends.html recognition successfully (the technology is
pattern-dependent,
not
sight
dependent).
5. Application
Mode
Versatility.
While the technology was initially designed to work in one-to-many
2. Unparalleled Stability. The patterns in
search mode, iris recognition is
the human iris are fixed from about one
perfectly suited to applications that
year in age and remain constant This
require
means that once a subject is enrolled, the
verification mode operation. This
need to re-enroll is lower than for other
makes iris authentication ideal for
biometric identification options.
use in upgrading security systems
3. Unique Design Facilitates Superior
1-1
matching,
or
that have a large base of installed
Management of Large Databases. Iris
card
recognition
biometric
technologyis ideally suited for
authentication technology designed to
smartcard use, - in this case a 512-
work in the 1-n or exhaustive search
byte
mode. This makes it ideal for handling
smartcard.
is
the
only
readers
template
or
PIN
held
pads.
on
the
applications of large user groups, such as a National Documentation application. The technology is ideally suited to
THE IRIS FEATURES AND PROCESS:
handle large databases, and does so without any degradation in accuracy. Iris Access platforms integrate well with large
database
back
ends
like
Microsoft® SQL and Oracle® 8 & 9i. 4. Unmatched Search Speed Iris Access platform searched records nearly 20 times faster than the next fastest technology. Iris recognition technology platforms and solutions enabled by are ideal for applications requiring high throughput speed.
The iris has many features that can be used to distinguish one iris from another . One of the primary visible characteristic is the trabecular meshwork, a tissue which gives the appearance of dividing the iris in a radial fashion that is permanently formed by the eighth month of gestation. During the development of the iris, there is no genetic influence on it, a process known as chaotic morphogenesis that occurs during the seventh month of gestation, which means that even identical
5 Email:
[email protected]
Visit: www.geocities.com/chinna_chetan05/forfriends.html twins have differing irises. The iris has in excess of 266 degrees of freedom, i.e. the number of variations in the iris that allow one
Biometrics
Crossover Accuracy
iris to be distinguished from another. The fact
1.Retinal Scan
1:10,000,000+
2. Iris Scan
1:131,000
3. Fingerprints
1:500
4. Hand Geometry
1:500
minimal. The iris is also not subject to the
5. Signature Dynamics
1:50
effects of aging which means it remains in a
6. Voice Dynamics
1:50
that the iris is protected behind the eyelid, cornea and aqueous humour means that, unlike other biometrics such as fingerprints, the likelihood of damage and/or abrasion is
stable form from about the age of one until death. The use of glasses or contact lenses (colored or clear) has little effect on the representation of the iris and hence does not interfere with the recognition technology.
PROGRAMMING LANGUAGES FOR IRIS TECHNOLOGY: •
Figure shows examples of the iris pattern and they demonstrate the variations found in irises.
Table
showing
accuracy
of
bio-metric
techniques:
6 Email:
[email protected]
C.
•
C++.
•
JAVA.
Visit: www.geocities.com/chinna_chetan05/forfriends.html
METHOD CODED PATTERN Iris Iris pattern recognition Finger Finger prints printing Hand Size,lengths shape thickness of hands Facial Outline,shape recognition and distribution of eyes and nose signature Shape of letters,writing order,pen pressure Voice Voice printing characeristics
MISIDENTIFICATION SECURITY RATE 1/1,200,000 High 1/1,000 Medium 1/700 Low
APPLICAT IONS High security facilities Universal Low-security facilities
1/100
1/100
1/30
From the above table it is clear that for every 1,200,000 tests there is only one failure or misidentification with regard to Iris recognition technology, the security referred in the table is also very high ,even though the cost may rise high the optimum security will return some excellent returns to the fields it has been used. Therefore according my study on Iris recognition technology the future of security techniques that will be used will be Iris recognition technology 7 Email:
[email protected]
Low
Low-security facilities
Low
Low-security facilities
Low
Telephone services
Visit: www.geocities.com/chinna_chetan05/forfriends.html
Generally the procedure runs through DESCRIPTION OF METHOD: The complex structure of the iris is not genetically defined, but develops randomly in the 3rd to 8th month of pregnancy in the eye of the foetus. The structure of the iris remains constant throughout the whole life, but in the first years after birth the colour can change through further pigmentation. Today more than 400 different characteristics of these structures can be discriminated of which about 173 are being used for iris recognition. The likeliness that two people have identical structures of the iris is estimated to be 1:1078 starting point of the method is a monochrome camera picture taken by near infrared light (NIR) at a distance of 0.1 to 1 meter. The resolution of the taken picture varies from 50 to 140 dpi.
8 Email:
[email protected]
the steps.:
Visit: www.geocities.com/chinna_chetan05/forfriends.html Figure illustrates that the iris has been isolated
Figure: Picture of an iris and graphical
by localizing the inner and outer boundaries. It
representation of an IrisCode
is
obviously
that
the
process
can
discrimination the regions that have different texture characteristics. Maximal statistical measure value was 2.54 what means that it is quite
good
and
accurate
result.
False
Acceptance Rate (FAR) and False Rejection Rate
For the calculation of the so called Iris Code (a string of 2048 bits) e. the DaugmanAlgorithm is used. The above picture I
ple of
an iris picture together with a graphical
(FRR)
are
the
two
critical
measurements of system effectiveness. This system is scored a perfect 0.001% FAR and0.55% FRR. The feature vector consists of
representation of the calculated IrisCode. The
2048 components in Daugman's method.
outer and inner borders of the iris are marked
Figure : process iris pattern during the
using white lines as in .The comparison of an IrisCode against a stored template is done mainly using the ‘Hamming Distance’ method
acquisition (a)failure cases
RESULT AND EFFECTIVENESS: To show the effectiveness, divide the
(b) Success case
240 samples of irises data into 20 equal size folders, such that a single folder is used for testing the model that has been developed from the remaining nineteen sets. The images were acquired under different conditions. The original images were collected as grey-level images. 9 Email:
[email protected]
.
Visit: www.geocities.com/chinna_chetan05/forfriends.html Figure : Localization of the iris pattern result
Iris recognition systems can cycle through 1,500,000 matches per minute, which is 20 times greater processing speed than any other biometrics systems. In reallife applications this translates into an identity decision being made in seconds.
METHOD Wildes
RATE%
----->
The enrollment process is also speedily accomplished, typically in three minutes
99.2%
or less. Daugman ---- > Wavelet
----- >
100% 97.3%
Safety and Perceived Invasiveness
MERITS OF IRIS TECHNOLOGY
The co-operation of the user. involves
Accuracy
the enrollee being still, and looking at a
In a comprehensive study conducted by
certain spot. iris scanning is less difficult
Britain’s National Physical Laboratory (NPL)
than retina scanning . The devices capture
iris
decisively
images of the eye from a comforTable
outperformed six other biometrics systems –
distance without bright lights or lasers.
facial recognition, fingerprint, hand geometry,
The IrisCode is hashed and encrypted as a
and vein and voice recognition. Tested to
security measure to prevent theft. If a
positively
office
person feels their recognition patterns
technology
have been compromised, re-enrollment is
registered a false match rate of zero in
possible an infinite number of times by
2,735,529 comparisons and a 0.0 percent
using a permuted IrisCode
failure-to-acquire rate. Iris recognition had a
Costs:
recognition
environment
identify iris
technology
users
in
recognition
an
false rejection rate of 0.0188, the lowest of all systems rested. Four of the other biometrics systems registered a false rejection rate of 1025 percent. Speed
Iris
scanning
can
increase
profitability by minimizing both costs and vulnerabilities associated with password and password management. Research indicates US businesses spend an average of $200 per person a year on password
10 Email:
[email protected]
Visit: www.geocities.com/chinna_chetan05/forfriends.html management.
The
value
proposition
of
implementing an iris recognition system is
FUTURE OUTLOOK
three-dimensional. Cost, accuracy, and ease of
A report on “Iris recognition
use are all important considerations.Both iris
technology has the depth to last a long
scanning and retina scanning are at the upper
time." predicts that there will be a growth
end of the scale in cost compared to other
in the demand for iris recognition
biometric systems.
products in the next 12 to 18 months in the healthcare industry to solve HIPPA
DEMERITS OF IRIS
compliance and to improve the efficiency
Difficult to use: Acquisition systems are not
of hospitals. Drug dispensing, prescription
straightforward
this system. Emigration services is another
User must be positioned correctly
area iris recognition is likely to gain in
False nonmatching and failure to enroll
fulfillment, and billings may also utilize
use. Soonbe used in a pilot program at Heathrow in the UK. As both conventional
False nonmatch rates need to
and
improve
technology it may be more unusual to be
Works with smaller databases
asked to prove identity with a driver’s
Difficult to capture the images
license or credit card.
e-businesses
move
toward
this
User discomfort
Users reluctant to capture their iris
Acquisition devices are mostly proprietary
CURRENT USES OF IRIS TECHNOLOGY-(REAL TIME EXAMPLES): Iris recognition is currently in use in all sorts of applications in the physical access arena cluding Airports, government agencies, banks, and research laboratories are utilizing this technology.
11 Email:
[email protected]
Visit: www.geocities.com/chinna_chetan05/forfriends.html Public sector customers include the US
The most prominent recent
Congress, Departments of Defense,
deployments of iris-scan
State,and Treasury.
technology have been passenger
Airports in Charlotte, NC, Amsterdam (Netherlands) and Frankfort (Germany)
airports in the U.S., U.K.,
andacross Canada are using iris
Amsterdam, and Iceland.
recognition.
The technology is also used in
Some private sector users are Bank United (ATMs), GTE, Hewlett Packard,
authentication programs at
corrections applications in the U.S. to identify inmates.
Lockheed Martin and BT.
A number of developing countries are
. prisons in both Pennsylvania and
considering iris-scan technology for
Florida
positive
national-ID. It is believed that the
prisoners prior to
largest deployed Iridian database
for
,identification of
making
release or transfer.
spans fewer than 100,000enrollees
Current research gives evidence that from the (raw) picture of the iris certain diseases such as glaucoma and iritis can be diagnosed
Limitations : There are a few known limitations especially in the use of the methods. They apply mainly to
APPLICATION AND MARKET DEPLOYMENT: Iris-scan technology has traditionally been deployed in high-security
People having no eye or no iris (so called aniridia; this happens to 1.8 of 100,000 people) Blind people having problems
employee-facing physical access
adjusting their eye to the camera
implementations
taking the picture
Iridian - the technology’s primary
People
having
pronounced
developer - is dedicated to moving the
nystagmus (tremor of the eye)
technology to the desktop, and has had
having problems getting a proper
some success in small-scale logical
picture of their iris.
access deployments.
12 Email:
[email protected]
Privacy aspects
Visit: www.geocities.com/chinna_chetan05/forfriends.html
REFERENCES: CONCLUSION:
An
Iris Recognition is the High Precision Identification Technology with error rate of 1/1,200,000. It is set to grow substantially through 2007 and beyond. Iris-scan offers low false match rates and hands-free operation, and is the only viable alternative to fingerprint technologies in applications where a single record must be located. Revenues of iris scan are projected to grow from USD16.2 million in 2002 to USD 210.2 million in 2007. Iris-scan revenues
are
expected
to
comprise
approximately 5% of the entire biometric market.
13 Email:
[email protected]
article
by
SANGEETHA
BOENA titled as ---Iris recognition: An emerging biometric technology A study on PKI and biometrics. An iris recognition system to enhance
e-security
wavelet theory(article).
based
on