Iris Recognition

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Iris Recognition as PDF for free.

More details

  • Words: 2,631
  • Pages: 11
IRIS RECOGNITION AN IMAGE PROCESSING TECHNIQUE

B.venkatesh. [email protected]. & T.Hemasundara rao. [email protected].

ADITYA INSTITUTE OF TECHNOLOGY & MANAGEMENT

III/IV ECE

ABSTRACT:The

pressures

on

today’s

system

administrators to have secure systems are ever increasing. One area where security can be improved is in authentication and identification.

Biometrics provides a

promising solution meeting all demands. Biometric physiological

identification and

utilizes behavioral

characteristics to authenticate a person’s identity which include facial recognition, fingerprints, palm prints, hand geometry, retinal patterns and iris patterns and signature, voice pattern and key stroke dynamics. Many have suffered from high

cost and unsatisfactory error rates. The newer

emerging

technology

IRIS

RECOGNITION, which uses the unique patterns of the human iris, overcomes previous shortcomings and provides positive recognition of an individual without contact or invasion, at extremely high confidence levels. The technology is accurate, easy to use, non-intrusive, and difficult to forge and, despite what many people may think is actually quite a fast

system once initial enrollment has taken

characteristics — a process known as

place.

biometric identification. Various human The recognition principle here is

features have been used as the basis for

the failure of a test of statistical

such

independence on iris phase structure

These include fingerprints,

encoded

by

multi-scale

quadrature

wavelets. This paper, at the outset, throws

measurement

and comparison.

palm prints, hand geometry, vein patterns,

facial

characteristics,

capillary

patterns

in

the

and retina.

light on the technology involved in iris

Additionally, behavioral characteristics

recognition, the algorithms followed by

such as signature dynamics, voice

a statistical analysis highlighting its edge

patterns, and keystroke dynamics have

over

identification

been used for verification. Many of these

systems and its applications in the

require contact or are perceived as

present day world.

This paper is

invasive or intrusive. Others require a

intended for security practitioners who

person to make a final judgment or are

are knowledgeable, but not technically

costly, or suffer from unsatisfactory error

or scientifically oriented.

rates. Iridian Technologies, Inc. has

other

biometric

developed an automated Iris Recognition INTRODUCTION

Technology (IRT) capable of positively

Background

identifying persons without physical

Personal identification has historically been based on what a person possesses (a letter of introduction, perhaps), knows (a secret password), or is (personal recognition). In today’s security industry, possession has become an encoded card, knowledge equates to knowing one’s Personal Identification Number (PIN), and personal recognition has given way to the measurement and comparison of physiological

and

behavioral

contact or real-time human decisionmaking. This technology, for which Iridian Technologies holds many U.S. and international patents, meets this challenge

without

the

drawbacks

exhibited by other mentioned

above.

developing

a

recognition

technologies In

addition

commercially

system

for

to

viable

industrial

application, Iridian Technologies has developed systems for use by the U.S.

government,

correctional

facilities,

nuclear utilities, banks, and now, E-

BASISOFTHE

commerce and computer workstation

T E C H N O L O G Y:-

security. This paper is intended for

Features of the Iris

security

are

The iris is the plainly visible, colored

knowledgeable, but not technically or

ring that surrounds the pupil. It is a

scientifically oriented.

muscular structure that controls the

Is it like retinal scanning?

amount of light entering the eye, with

Iris

practitioners

recognition

who

technology

is

not

intricate details that can be measured,

associated in any way similar to retinal

such as striations, pits, and furrows. The

(capillary) pattern recognition. The iris is

iris is not to be confused with the retina,

the externally visible, colorful, donut-

which lines the inside of the back of the

shaped organ surrounding the pupil of

eye. No two irises are alike. There is no

the eye. The retina is the hemispherical

detailed correlation between the iris

organ behind the cornea, lens, iris, pupil,

patterns of even identical twins, or the

and vitreous humour and is not readily

right and left eye of an individual. The

visible. The Iridian Technologies process

amount of information that can be

captures a video image of the iris,

measured in a single iris ismuch greater

externally visible behind the eye’s

than fingerprints, and the accuracy is

cornea; whereas the retinal scan process

greater

than

scans the fovea, or innermost surface of the eye, the retina. Iris recognition systems truly recognize individuals, doing an exhaustive, one-to-many search of an entire database without benefit of PIN, password, or token. Most other biometric technologies rely on verification, where card or PIN inputs are required to pre-select a single enrolled

file

comparison.

for

a

one-on-one

Uniqueness of the Iris

DNA.

The iris is unique because of the chaotic

or eye, is one of the most carefully

morphogenesis of that organ. To quote

protected organs in one’s body. In this

Dr. John Daugman (Reference 1), “An

environment,

advantage

with

deleterious effects of aging, the features

fingerprints is the chaotic morphogenesis

of the iris remain stable and fixed from

of its minutiae. The iris texture has

about one year of age until death.

chaotic dimension because its details

Natural Protection from Artifice

depend

The

the

on

iris

initial

shares

conditions

in

human

and

eye

not

has

subject

to

physiological

embryonic genetic expression; yet, the

properties that can be exploited to

limitation of partial genetic penetrance

impede use of images and artificial

(beyond expression of form, function,

devices to spoof the system. As a matter

color and general textural quality),

of policy, Iridian Technologies, Inc. does

ensures that even identical twins have

not discuss the details of these properties

uncorrelated iris minutiae. Thus the

or specific countermeasures in the open

uniqueness of every iris, including the

media

pair

possessed

parallels

the

by

one

uniqueness

individual, of

every

PROCESSING

fingerprint regardless of whether there is

Image Acquisition

a common genome.” Given this, the

Optical

statistical probability that two irises

optimized for specific iris recognition

would be exactly the same is estimated

applications allow image acquisition at

at 1 in 1072.

distances from 3.5" to nearly one meter.

Stability of the Iris

In its simplest functional configuration,

Notwithstanding its delicate nature, the

an optical unit acquires multiple images

iris is protected behind eyelid, cornea,

of the presented iris through a simple

aqueous

frequently

lens, a monochrome CCD camera, and a

eyeglasses or contact lenses (which have

frame grabbing board. Multiple low

negligible effect on the recognition

level LEDs operating in the 720 to 850

process). An iris is not normally

nanometer range provide illumination

contaminated with foreign material, and

over the focal range of the camera. User

human instinct being what it is, the iris,

alignment in the X, Y, and Z axes is

humor,

and

platforms

designed

and

aided by a combination of mirrors, audible verbal direction, and in some cases, zoom or auto-focus lenses. In some models, a range finder, initiates the process automatically when a subject approaches within 18" of the unit. Iris Definition The image that best meets the focus and detail clarity requirements of the system is then analyzed to locate the limbus (the outer boundary of the iris that meets the white sclera of the eye), the nominal pupillary boundary, and the center of the pupil (see Figure 1). The precise location of the circular iris has now been defined and

processing

can

take

place.

Field Optimization The system quickly defines the suitable usable area of the iris for feature extraction

and

analysis.

Using

algorithms that exclude areas covered by eyelids, reflection,

deep etc.,

shadow, it

specular

concentrates

its

feature-extraction power in those areas

most visible (Figure 2). A dynamic

produce what is known as Iris Code,

feature of the system automatically

which is a 512-byte record.

adjusts the width of the pupillary boundary-to-limbus zone in real time to maximize the amount of iris analyzed, given varying ratios of pupil to iris sizes. Elimination of marginal areas has little negative impact on the analysis process. In actual practice, excellent enrollments

Image Analysis

and subsequent recognitions are obtained

The features of the iris are then analyzed

with 40% or less of the iris available for

and digitized into a 512 byte (4096 bit)

analysis.

IrisCode

Feature

locations

and

dimensions are defined using a polar

record, half of which describes the

coordinate (as opposed to a Cartesian, X,

features, half of which controls the

Y) system.

comparison process. During enrollment,

Image analysis Storing and comparing images

this IrisCode record is stored in the

2-D Gabor wavelets filter and map segments of the iris into hundreds of vectors(phasors).The 2-D Gabor phaser is simply the “what” and “where “ of the image. The phase demodulation process used to encode iris patterns. Local regions of an iris are projected onto quadrature

2d

gabor

wavelets,

generating complex-valued coefficients whose real imaginary parts specify the coordinates of a phasor is quantised to one of the four quadrants, setting two bits of phase information is used to

database for future comparison. During a recognition attempt, when an iris is presented at a recognition point, the same process is repeated; however the resulting IrisCode record is not stored, but is compared to every file in the database.

zero to that pair comparison. If two bits are different, it assigns a value of one to that pair comparison. After all pairs are compared, the number of disagreeing bit-pairs is divided by the total number of bit-pair comparisons resulting in a two digit quantitative expression of how different the two IrisCode records are. A Hamming Distance of .10 means that two IrisCode records differed by 10%. Hamming Distance Calculation Comparison of IrisCode records includes calculation of a Hamming Distance (HD), as a measure of variation between the IrisCode record from the presented iris and each IrisCode record in the database. Each useable pair of the 2048 available pairs of bits is compared

Recognition or Rejection

(Figure 3), and a value assigned using

Millions of IrisCode record comparisons

exclusive-OR logic. (The total 2048

have

pairs are seldom compared in their

Distributions (Probability Densities) in

entirety,

field

Figure 4. Here, the mean imposter

optimization process described above.)

Hamming Distance is near 0.5, which is

Bit #1 from the presented IrisCode

what one would expect in a truly random

record is compared to bit #1 from the

relationship. Conversely, the mean value

reference IrisCode record, bit #2 from

for authentics is 0.08 (or 8%). Another

the

key

because

presented

of

IrisCode

the

record

is

defined

aspect

the

of

the

Frequency

Frequency

compared to bit #2 from the reference

Distributions is the very small Standard

IrisCode record, and so on. If two bits

Deviation, resulting in very tightly

are alike, the system assigns a value of

clustered HD scores for both impostors

and authentics. These two “spikey”

seconds).

distributions appear, visually at least, to be

discrete

(totally

separate).

Mathematically, however, the adjacent slopes cross, and at that point, a nominal Accept/Reject decision threshold can be established.

At

Hamming

Distance

(.342), the probability of a False Reject is approximately the same as the probability of a False Accept. That setting reflects a conscious decision that an IrisCode differing by more than .342 (34.2%) from the codes with which it is compared, is likely to be part of the Imposter

Frequency

Distribution

because it is approaching a random relationship with the compared code. Sophisticated

algorithms

have

been

developed to adjust automatically that threshold based on number of bit-pairs available for comparison and the size of

PE R FO R MAN C E

database. Obviously, rejection of an

Crossover (Equal) Error Rate (CER)

individual occurs only after rejection of

At present, a crossover error rate is

all stored files (normally less than two

estimated based on the point at which the Impostor and Authentic distributions cross.

The

Iridian

Technologies’

(theoretical) crossover error rate is .0000008, or 1 in 1,200,000 (Note Table 1). This would equate to a Hamming Distance of just under .342. This is an extremely conservative statement about

an

error

rate,

because

in

many

population.

Although

published

comparisons over time, recognition HDs

Crossover Error Rates are “worst case”,

average 0.08, where the probability of a

the Hamming Distance for the average

False Accept is 1 in 1048.

authentic comparison in the authentic

Recognition Speed

Frequency Distribution of Figure 4,

The speed of the recognition process is

equates to imposter odds of 1 in 1048.

determined

by

many

interacting

variables, the speed of the processor and size of the database being the two most obvious. Databases containing millions of IrisCode records have been searched

Iris Recognition is suitable for many applications. Here are some of the benefits: •

in seconds. Faster processors have kept recognition speeds in the 2–3 second



range, even with large databases. •

Confidence The promise of the iris recognition technology described herein has been



Smallest outlier population: there are very few people who cant use this technology, for instance blind people. Unparalled stability: human iris patterns are stable from about one year in age till death. Unique design facilities &superior management of large databases: Unmatched search speed is

established based on millions of file

limited not by database size but

comparisons

by hardware selected for server

accuracy.

with

System

extraordinary

problems

management.

almost

exclusively reflect lighting, focus or



High level user acceptance.

image



No more need for ID Cards or

degradation

issues.

Having

Passwords

analyzed formally 12 separate databases

So there is no need to worry

totaling more than a million scores in accordance with recognized principles of

about

statistical decision theory, one can say

damaged or stolen or passwords

with 99% confidence that the values

being forgotten.

established for the Hamming Distances



ID

cards

being

lost,

Easily accommodates growing

of authentics and impostors in Figure 4

numbers

are within 9% of the whole (infinite)

All that is required to add users is

of

users



to register their iris patterns. This flexibility makes iris recognition

to scan from a distance.

ideal for large facilities. •

The iris is a very small organ



Time and cost savings are large

It is a moving target and can be obscured by objects such as the eyelid and eye lashes.

There is no need to issue or





The camera here needs to

manage ID cards and passwords.

have the correct amount of

Once

illumination.

users

are

registered,

The

system

additional time and costs are

linked by the camera is

reduced to near zero.

currently

Border Control & Immigration

images in a monochrome

Iris recognition is already being

format.

used

in

numerous

only

capturing

airports

worldwide for government and

CONCLUSION

transportation applications such

Highly

as

restricted

recognition is feasible today using the

access, and simplified passenger

iris of the human eye. This unique and

travel. Your iris is literally your

complex

passport at border crossings in

dimensions (measures) of variation than

countries like Canada,. Where

any other biometric feature currently in

iris recognition supports border

use, remains stable throughout a lifetime

control, enrolled travelers can

and is readily available for sampling in a

bypass

and

non-intrusive way. And has the speed

immigration lines, while security

required minimizing user frustration

officials can more efficiently

when accessing company systems. The

concentrate

process uses simple and non-threatening

border

control,

lengthy

on

unknown travelers.

customs

examining

accurate,

organ,

positive

which

personal

has

more

video technology to take images of the iris, digitize the features, and create a

Drawbacks

512-byte code, which is then compared

There are few drawbacks.

against an entire database in less than two seconds. Recognitions can then be

used to control access and entry, to provide recognition information to an existing entry control system or for any other

purpose

where

positive

identification is needed. Recent testing, under

U.S.

conditions,

Government

controlled

in

real-world

three

environments, and in a variety of operational applications have proven the practicality

and

feasibility

of

the

extremely accurate iris recognition for any

function

requiring

positive

recognition. References 1. http://www.sans.org/rr/whitepapers/a uthentication/132.php 2. http://www.computer.org/itpro/home page/jan_feb/security3.htm 3. http://www.rycom.ca/solutions/pdfs/i ridian/iris_whtppr.pdf 4. http://www.cl.cam.ac.uk/users /jgd1000/history.html 5. http://www.stanford.edu//

Related Documents

Iris Recognition
June 2020 2
Iris Recognition
June 2020 2
Iris
November 2019 30
Iris
May 2020 22
Iris
June 2020 22