Automated Eye-Pattern Recognition Systems

Download Report

Transcript Automated Eye-Pattern Recognition Systems

Automated Eye-Pattern Recognition
Systems
Guided By:
Presented By:
1
Contents
What is Iris?
 Eye Diagram
 Characteristics of Iris
 History of Eye pattern recognition system
 Need of Eye pattern recognition system
 Operating Principle
 Procedure
 Techniques used
 Advantages
 Disadvantages
 Deployed applications
 Identifying the mystery woman
 Conclusion

2
What is Iris?
The colored part of the eye is called the iris.
 It controls light levels inside the eye.
 The iris is embedded with tiny muscles that
dilate and constrict the pupil size.
 The iris is flat and divides the front of the
eye from the back of the eye.
 Its color comes from microscopic pigment
cells called melanin.

3
Eye Diagram
4
Characteristics of Iris
Has highly distinguishing texture.
 Right eye differs from left eye.
 Twins have different iris texture.
 Iris pattern remains unchanged after the age
of two and does not degrade overtime or
with the environment.
 Iris patterns are extremely complex than
other biometric patterns.

5
History of Eye-Pattern Recognition
System

In the mid-1980s, ophthalmologists Leonard
Flom and Aran Safir realized that no two
patient’s irises were alike.

In 1987, the pair were issued the so-called Flom
patent, which has given the company they
founded, Iridian Technologies, dominance in the
iris-recognition market.
6
Need of Eye-Pattern Recognition
Technology
Illusion for Data Privacy.
Passwords, or Social Security Numbers can be
cracked easily.
 Eye pattern recognition system virtually eliminates
fake authentication and identity privacy and safely
controls authorized entry to sensitive sites, data or
material.
 Iris Pattern is most distinguished than any other
facial feature and do not change overtime and
research show the matching accuracy of iris
recognition systems is greater than that of DNA
testing.


7
Continue…

Iris recognition system is easy to operate,
comfortable and is virtually impossible to deceive.

Since the iris is a protected internal organ whose
random texture is stable throughout life, it can serve
as a living password that one need not remember but
one always carries. .
8
Operating Principle
An iris-recognition algorithm first has to identify the
approximately concentric circular outer boundaries
of the iris and the pupil in a photo of an eye.
 The set of pixels covering only the iris is then
transformed into a bit pattern that preserves the
information that is essential for a statistically
meaningful comparison between two iris images.
 The mathematical methods used resemble those of
modern lossy compression algorithms for
photographic images.
 In the case of Daugman's algorithms, a Gabor
wavelet transform is used in order to extract the
spatial frequency range that contains a good signalto-noise ratio considering the focus quality of
available cameras.

9
Continue…
The result is a set of complex numbers that
carry local amplitude and phase information for
the iris image.
 In Daugman's algorithms, all amplitude
information is discarded, and the resulting 2048
bits that represent an iris consist only of the
complex sign bits of the Gabor-domain
representation of the iris image.
 Discarding the amplitude information ensures
that the template remains largely unaffected by
changes in illumination and virtually negligibly
by iris color, which contributes significantly to
the long-term stability of the biometric
template.

10
Continue…
To authenticate via identification or verification , a
template created by imaging the iris is compared to a
stored value template in a database.
 If the Hamming distance is below the decision
threshold, a positive identification has effectively
been made.
 A practical problem of iris recognition is that the iris
is usually partially covered by eyelids and eyelashes.
 In order to reduce the false-reject risk in such cases,
additional algorithms are needed to identify the
locations of eyelids and eyelashes and to exclude the
bits in the resulting code from the comparison
operation.

11
Six different images of the same eye. These were
100% verified to be the same eye for every
unique combination of 2 images.
12
Six different images of the another eye. These were 80% verified to be
the same eye for every unique combination of 2 images. The error is due
to the presence of eyelids and eyelashes in the image.
13
Iris Code by John Daugman
14
An Iris Scan model 2100 iris scanner
15
Android Iris Scanner
16
Procedure

Infrared Eye imaging
 Creation

of an Iris code
Iris recognition
17
Infrared Eye imaging
The iris scan process begins with a photograph. A specialized
camera, typically very close to the subject, not more than three
feet, uses an infrared imager to illuminate the eye and capture a
very high-resolution photograph. This process takes 1 to 2
seconds.
Creation of an Iris code
The picture of eye first is processed by software that localizes
the inner and outer boundaries of the iris. And it is encoded by
image-processing technologies.
Iris recognition
In less than few seconds, even on a database of millions of
records, the iriscode template generated from a live image is
compared to previously enrolled ones to see if it matches to any
of them.
18
Typical iris system configuration for
taking a picture
An iris recognition camera takes a black and
white picture from 2 to 24 inches away.
 The camera uses non-invasive, near-infrared
illumination that is barely visible and very safe.
 Iris recognition cannot take place without the
person
permission

19
Techniques used
 Iris
Localization
 Iris
Normalization
 Image
Enhancement
20
Iris Localization




Both the inner boundary and the outer boundary of
a typical iris can be taken as circles.
But the two circles are usually not co-centric.
The inner boundary between the pupil and the iris
is detected.
The outer boundary of the iris is more difficult to
detect because of the low contrast between the two
sides of the boundary.
The outer boundary is detected by maximizing
changes of the perimeter- normalized along the
circle.
21
Iris Normalization
The size of the pupil may change due to the
variation of the illumination and the associated
elastic deformations in the iris texture may
interfere with the results of pattern matching.
 Since both the inner and outer boundaries of the
iris have been detected, it is easy to map the iris
ring to a rectangular block of texture of a fixed
size.

22
Image Enhancement
The original image has low contrast and
may have non-uniform illumination caused
by the position of the light source.
 These may impair the result of the texture
analysis.

23
24
Advantages




Iris is an internal organ which is highly transparent and
sensitive membrane. It is more persistent than fingerprints as
they tend to fade under manual labor.
Iris is mostly flat, and its geometric configuration is only
controlled by two complementary muscles i.e. the sphincter
pupillae and dilator pupillae that control the diameter of the
pupil. This makes the iris shape far more predictable than the
face.
The iris has a fine texture which is determined randomly during
embryonic gestation. Even genetically identical individuals
have completely independent iris textures, whereas DNA is not
unique for the about 0.2% of the human population who have a
genetically identical twin.
An iris scan is similar to taking a photograph and can be
performed from about 10 cm to a few meters away.
25
Disadvantages

Iris scanning being a new technology is incompatible with
most electronic gadgets present.

Iris recognition is very difficult to perform at a distance larger
than a few meters and without proper cooperation of the
person.

As with other photographic biometric technologies, iris
recognition is susceptible to poor image quality.

Equipments used for scanning are very expensive.
26
Deployed applications






United Arab Emirates IrisGuard's Homeland Security Border
Control has been operating an expellee tracking system in the
United Arab Emirates since 2001, when the it launched a
national border-crossing security initiative.
One of three biometric identification technologies internationally
standardized by ICAO for use in future passports .
Iris recognition technology has been implemented by BioID
Technologies SA in Pakistan for UNHCR repatriation project to
control aid distribution for Afghan refugees.
At Schiphol Airport, Netherlands, iris recognition has permitted
passport-free immigration since 2001.
In a number of US and Canadian airports, as part of the NEXUS
program that facilitates entry into the US and Canada for preapproved, low-risk travelers.
In several Canadian airports, as part of the CANPASS Air
program that facilitates entry into Canada for pre-approved, lowrisk air travelers.
27
IrisGuard Inc. UAE Enrollment Station
28
A U.S. Marine Corps Sergeant uses an iris scanner
to positively identify a member of the Baghdadi city
council prior to a meeting with local tribal leaders,
sheiks, community leaders and U.S. service
members
29
Identifying the Mystery Woman
Afghan woman originally
photographed by Iris recognition
systems are also finding unexpected
applications. The best known example
involved using iris recognition to
confirm the identification of a
mysterious young Nation Geographic
photographer Steve McCurry in 1984.
Some 18 years later, McCurry
photographed Sharbat Gula in
Afghanistan. At the behest of National
Geographic, Dr. John Daugman,
developer of the iris recognition
system, then compared the irides in the
photographs using his algorithms. He
concluded that the eyes were a match!!!
30
Conclusion
Iris recognition has proven to be a very useful
and versatile security measure.
 It is a quick and accurate way of identifying an
individual with no chance for human error.
 Iris recognition is widely used in the
transportation industry and can have many
applications in other fields where security is
necessary.
 Iris recognition will prove to be a widely used
security measure in the future.

31
32
33