Sunteți pe pagina 1din 20

School of Computer Sciences Universiti Sains Malaysia Penang

CST 233 Information Security & Assurance


Assignment 3

TITLE STUDENT NAME

: Biometrics- Iris recognition : SOH SIN SIANG

MATRIC NUMBER : 107630 LECTURER : Dr. Aman Jantan

TABLE OF CONTENT
1. INTRODUCTION3 2. BASIC CONCEPT OF BIOMETRIC TECHNOLOGY4-6 3. WHY IRIS RECOGNITION IS THE BEST OPTION?.7 4. IRIS STRUCTURE8-9 5. HOW DOES IRIS RECOGNITION WORKS? Capturing the image10-11 Defining the location of iris.11-14 Feature extraction and matching.15 6. SPOOFING OF IRIS RECOGNITION16 7. CASE STUDY ON HOW TO PREVENT SPOOFING ON IRIS RECOGNITION....17-18

8. CONCLUSION..19 9. REFERENCES20

Introduction
Todays information security are in critical need of finding accurate, secure and cost effective alternatives to passwords an personal identification numbers(PIN) as the financial losses and identity theft cases increased dramatically year over year from computer based fraud such as computer hacking. Biometrics solution address these fundamental problems, because an individuals biometric data is unique. An individuals behavioral or physiological characteristics have the capability to reliably distinguish between authorized person and an imposter. Since biometric

characteristics are distinctive, cannot be forgotten or lost and the person to be authenticated needs to be physically present at the point of identification. Biometric is more reliable and are capable than traditional knowledge based on token based techniques. Biometrics includes fingerprints, retina, iris, voice, signatures, facial, thermogram, hand geometry, and etc. Among all biometrics eye biometrics such as iris recognition has attracted a lot of attention because it has various advantages like greater speed, simplicity and accuracy as compared to other biometric techniques. Iris recognition relies on the unique pattern of the human iris to identify or verify.

Basic concept of biometric technology


Verification and identification
Biometrics system can be used to verify and identify the person. The most common use of biometris is verification. Biometrics system verifies user based on the information provided by the user. for example, when person A enters his/her username and password, the biometric system then fetches the template for person A. If there is a match, the system verifies that the user is in fact person A. identification is used to determine who the subject is without information from the subject. Identification is complicated because the system must perform a one-to many comparisons of images, rather than a one to one comparison performs by a verification system.

Biometric error analysis


A biometric systems accuracy is determined by combining the rates of false acceptance and rejection. A system that is highly calibrated to reduce the false acceptances may also increase the false rejection, resulting in more help desk calls and administrator intervention. Each error presents a unique administrative challenge. Therefore,

administrators must clearly understand the value of the information or system to be protected, and then find balance between acceptances and rejection rates appropriates to that value. A poorly created enrolment template can compound false acceptance and rejection. For example, if a user enrols in the system with dirt on his finger, it may create an inaccurate template that does not match a clean print. Natural changes in a users physical traits may also lead to errors. The point of intersection

is called the crossover accuracy of the system. As the value of the crossover accuracy becomes higher, the inherent accuracy of the biometric increases. Table (1) shows crossover accuracy of the different biometrics technology.

Biometrics Retinal recognition Iris recognition Fingerprints Hand geometry Signature dynamics Voice dynamics

Crossover accuracy 1:10000000 1:131000 1:500 1:500 1:50 1:50

Table 1 Crossover accuracy of the different biometrics technology.

How basically biometric system work?


1. Biometric devices 2. Biometric process 3. Trial template

9. Decision

8. Score

7. Matching

4. Biometric devices

5. Biometric process

6. Reference template

Figure (1) describes the process involved in using a biometrics system for security. It contains nine steps. (1) Capture the chosen biometric; (2) Process the biometric so as to extract and enrol the template; (3) Store the template in a local repository, a central repository, or a portable token such as smart card; (4) Live-scan the chosen biometric; (5) Process the biometric and extract the biometric template; (6) Store the reference template; (7) Match the scanned biometric against stored templates; (8) Provide a matching score to use for decision making; (9) Record a secure audit trail with respect to system.

Why iris recognition is the best option?


Based on the table 1, we can see that, apart from eye recognition, others recognition crossover accuracy is relatively low compared to eye recognition. For example in face recognition, the crossover accuracy is low as the difficulties arise from the face that the face is a changeable social organ displaying a variety of expressions. It has been shown that for facial images taken at least one year apart; even the best algorithms have error rates of 43% to 50%. Retina recognition however producing a higher accuracy of recognition compared to iris. But the problem arises during the biometric process to take the trial template. For example, the user-reader interfaces is not convenient for eyeglass wearers (glasses have to be removed first) nor for those who have concerns about close contact with the reader( eye infection). Users must interact correctly and patiently for the system to work. Of all the biometric technologies, the motivation level of the user of retinal recognition must be very high for the system to function properly. For all of these reasons, iris patterns become interesting as an alternative approach to reliable visual recognition of persons when imaging(trial template) can be done at distances of less than a meter. As an internal yet extremely visible organ of the eye, iris is well protected from the environment and stable over time. We will discuss about the iris structure in the next section to know in deep how iris is used in biometrics recognition.

Iris structure

The iris is the colour part of the eye behind the eyelids, and in front of the lens. It is the only internal organ of the body, which is normally externally visible. These visible patterns are unique to all individuals and it has been found that the probability of finding two individuals with identical iris patterns is almost zero. Although the human eye is slightly asymmetrical and the pupil is slightly off the centred, for the most practical cases we think of the human eye is symmetrical

with respect to line of sight. The iris controls the amount of light that reaches the retina. Due to heavy pigmentation, light pass only through the iris via pupil, which contracts and dilates according to the amount of available light. Iris dimensions vary slightly between the individuals. Its shape is conical with the papillary margin located more interiorly than the root. A thickened region called the collarete divides the anterior surface into the ciliary and pupil zones.

Iris is made up of four different layers. The back layer is heavily pigmented and makes iris opaque so that light only reaches the eye through the pupil. The next layer contains the sphincter and the dilator muscles that allows for contraction and dilation. The third layer is the stroma, which is loosely connected tissue containing collagen, melanocytes, most cells and macrophases. The exterior layer is called the anterior border layer and is denser than the previous layer with more pigmentation. The colour of the iris is created by different levels of light absorption in the anterior border layers, little pigmentation in this layer results in a blue appearance because light reflects from the back layer of the iris. The more pigmentation a person has in the anterior border layer, the darker is the iris.

How does iris recognition work?


Iris recognition basically can be separated into three parts: 1. Capturing the image 2. Defining the location of the iris 3. Feature extraction and Matching

Capturing the image


One of the major challenges of automated iris recognition is to capture a high quality image of the iris while remaining non-invasive to the human operator. Given that the iris is a relatively small, dark object and that human operators are very sensitive about their eyes, this matter require careful engineering. Several points are of particulat concern. First, it is desirable to capture images of the iris with sufficient resolution and sharpness to support recognition. Secondly, it is important to have good contrast in the interior iris pattern without resorting to a level of illumination that annoys the operator. Thirdly, these images must be well framed (centred). Further, as an integral part of this process, artifacts/artefacts( noise or error due to specular reflections, optical aberrations, etc.) in the captured images should be eliminated as much as possible. For graphical illustration, expected captured image should be about the same as shown as figure 1.

Figure 1 example of captured iris image. Imaging of the iris must acquire sufficient detail for recognition while being minimally invasive to the operator. Image acquisition yields an image of the iris as well as the surrounding region.

Defining the location of iris


Without placing undue constraints on the human operator, capturing image of the iris cannot be expected to yield an image containing only the iris. Rather, process of capturing image will capture the iris as part of a larger image that also contains data derived for the immediately surrounding eye region. Therefore, prior to performing iris pattern matching, it is important to localize that portion of the captured image that corresponds to an iris. In particular, it is necessary to localize that portion of the image derived from inside the limbus( the border between sclera and the iris) and outside the pupil. Further, if the eyelids are covering part of the iris, then only that portion of image below the upper eyelid and above eyelid should be included. Typically, the limbic boundary is imaged with high contrast, owing the sharp change in eye pigmentation that it marks. The upper and lower portions of this boundary,

however can be covered by the eyelids. The pupillary boundary can be far less well defined. The image contrast between a heavily pigmented iris and its pupil can be quite small. Further, while the pupil typically is darker than the iris, the reverse relationship can hold in cases of cataract; the clouded lens leads to significant amount of backscattered light. Like the pupillary boundary. Eyelid contrast can be quite variable depending on the relative pigmentation in the skin and the iris. The eyelid boundary also can be irregular due to the presence of eyelashes. Taken into consideration, these observations suggest that iris localization must be sensitive to wide range of edge contrast, robust to irregular borders, and capable of dealing with variable occlusion. Three steps below are usually taken when come to the phase of defining the location of iris: 1. Binary segmentation 2. Pupil center localization 3. Circular edge detection

Figure 2: this figure shows how binary segmentation and limbic boundary was detected. The eye image (a) was unwrapped into polar coordinates(c) and localization of the limbic boundary of carried out (d). Iris segment obtained in (e).

Figure 3: the result of the pupil center localization and also circular edge detection on the image that obtain in the first stage.

Figure 4 : Result of iris localization. Given a captured image, it is necessary to separate the iris from the surround. The input to the localization process was the captured iris image of figure 1. After localization, all but the iris is masked out.

Feature extraction and Matching


Having localized the region of an acquired image that corresponds to the iris, the final task is to decide if this pattern matches a previously stored iris pattern. This matter of pattern matching can be decomposed into four parts: 1. Bringing the newly acquired iris pattern into spatial alignment with a candidate data base entry; 2. Choosing a representation of the aligned iris patterns that makes their distinctive patterns apparent;

Figure 5: encoded iris patterns of the newly acquired image. 3. Evaluating the goodness of match between the newly acquired and database representations; 4. Deciding if the newly acquired data and the database entry were derived from the same iris based on the goodness of match.

Spoofing of iris recognition


A spoof is a counterfeit biometric that is used in an attempt to circumvent a biometric device. Even though iris recognition provide a highly accuracy and security to the authentication system, it is however still prone to the attack of spoofing. A straight forward method that has been used to spoof an iris recognition device is based on a high quality photo graph of the eye. Unauthorized user just needs to print the authorized iris image on a paper with a laser printer and place it in front of the iris recognition device, and the device will be spoofed. Replay attack is one of the spoofing methods too. Another method used to successfully spoof some iris recognition device is to use a contact lens on which an iris pattern is printed. Even more sophisticated, multi-layered and three-dimensional artificial irises may also be produces to spoof an iris recognition device.

Figure 6: Natural iris (left) and clone iris/contact lens(right)

Case study on how to prevent spoofing on iris recognition


In paper [6], it provides several approaches to prevent spoofing on iris recognition. Below are the summary of the paper on the approaches of preventing spoofing of iris recognition: Aim: To detect whether the eyes are alive or not, aliveness detection Suggested method:

Based on frequency analysis(FA)


Detect artificial frequencies in iris images that may exist due to the finite resolution of the printing devices

Controlled light reflection(CLR)


Relied on the detection of infrared light reflections on the moist corneas when stimulated with light sources positioned randomly in space.

Pupil dynamics(PD)
Employs a model of the human pupil response to light changes. Comparison between the real pupil and the observed object.

Aim : To prevent replay attack by stopping the electronic replay of an authentication procedure. Suggested method:

Zak-Gabor based coding


Use Zak transform to convert iris stripes into Gabor-transformation coefficients. The coefficient produced has more advantages compared to Gabor filtering (typically used in commercial system).

Conclusion
A biometric system provides automatic identification of an individual based on a unique feature or characteristics possessed by the individual. Iris is a useful biometric for recognition system. It is simple, easy to use, high accuracy, and cost effective compared to the other biometrics. Discussion on how iris recognition works has been discussed in this paper to get a deeper understanding of iris recognition. Three main steps are included in the process, they are: Capturing the image, defining the location of the iris, feature extraction and matching. Besides that, spoofing of iris recognition and ways to overcome it are also included in the case study section.

References
[1]Nicolaie Popescu-Bodorin, http://fmi.spiruharet.ro/bodorin/articles/fbvme-csirbuid-rj.pdf Date of accessed: 12/5/2012 [2]http://en.wikipedia.org/wiki/Iris_recognition Date of accessed: 12/5/2012

[3]Richard P.Wilders Iris Recogniton: An Emerging Biometric Technology [4]John Daugman, iris recognition for personal identifications.

http://www.cl.cam.ac.uk/~jgd1000/iris_recognition.html [5]John Daugman(2004), How iris recognition works [6] Adam Czajka, Przemek Strzelczyk, and Andrzej Pacut,Making iris recognition more reliable and spoof resistant

http://spie.org/documents/Newsroom/Imported/0614/0614-2007-06-15.pdf Figure:http://www.cytrap.eu/files/ReguStand/2007/image/2007-11-28_irisrecognition-biometric-passport.jpg Figure 1: http://sailjamehra.files.wordpress.com/2009/05/2.png Figure 3: http://docsdrive.com/images/ansinet/itj/2009/fig3-2k9-9541.gif Figure 4: http://ars.sciencedirect.com/content/image/1-s2.0-S026288561000079Xgr8.jpg Figure 5: http://www.morpho.com/IMG/jpg/iris.jpg Figure 6: http://binary-services.sciencedirect.com/content/image/1-s2.0-

S0031320311003074-gr2.sml

S-ar putea să vă placă și