Documente Academic
Documente Profesional
Documente Cultură
TABLE OF CONTENT
1. INTRODUCTION3 2. BASIC CONCEPT OF BIOMETRIC TECHNOLOGY4-6 3. WHY IRIS RECOGNITION IS THE BEST OPTION?.7 4. IRIS STRUCTURE8-9 5. HOW DOES IRIS RECOGNITION WORKS? Capturing the image10-11 Defining the location of iris.11-14 Feature extraction and matching.15 6. SPOOFING OF IRIS RECOGNITION16 7. CASE STUDY ON HOW TO PREVENT SPOOFING ON IRIS RECOGNITION....17-18
8. CONCLUSION..19 9. REFERENCES20
Introduction
Todays information security are in critical need of finding accurate, secure and cost effective alternatives to passwords an personal identification numbers(PIN) as the financial losses and identity theft cases increased dramatically year over year from computer based fraud such as computer hacking. Biometrics solution address these fundamental problems, because an individuals biometric data is unique. An individuals behavioral or physiological characteristics have the capability to reliably distinguish between authorized person and an imposter. Since biometric
characteristics are distinctive, cannot be forgotten or lost and the person to be authenticated needs to be physically present at the point of identification. Biometric is more reliable and are capable than traditional knowledge based on token based techniques. Biometrics includes fingerprints, retina, iris, voice, signatures, facial, thermogram, hand geometry, and etc. Among all biometrics eye biometrics such as iris recognition has attracted a lot of attention because it has various advantages like greater speed, simplicity and accuracy as compared to other biometric techniques. Iris recognition relies on the unique pattern of the human iris to identify or verify.
administrators must clearly understand the value of the information or system to be protected, and then find balance between acceptances and rejection rates appropriates to that value. A poorly created enrolment template can compound false acceptance and rejection. For example, if a user enrols in the system with dirt on his finger, it may create an inaccurate template that does not match a clean print. Natural changes in a users physical traits may also lead to errors. The point of intersection
is called the crossover accuracy of the system. As the value of the crossover accuracy becomes higher, the inherent accuracy of the biometric increases. Table (1) shows crossover accuracy of the different biometrics technology.
Biometrics Retinal recognition Iris recognition Fingerprints Hand geometry Signature dynamics Voice dynamics
9. Decision
8. Score
7. Matching
4. Biometric devices
5. Biometric process
6. Reference template
Figure (1) describes the process involved in using a biometrics system for security. It contains nine steps. (1) Capture the chosen biometric; (2) Process the biometric so as to extract and enrol the template; (3) Store the template in a local repository, a central repository, or a portable token such as smart card; (4) Live-scan the chosen biometric; (5) Process the biometric and extract the biometric template; (6) Store the reference template; (7) Match the scanned biometric against stored templates; (8) Provide a matching score to use for decision making; (9) Record a secure audit trail with respect to system.
Iris structure
The iris is the colour part of the eye behind the eyelids, and in front of the lens. It is the only internal organ of the body, which is normally externally visible. These visible patterns are unique to all individuals and it has been found that the probability of finding two individuals with identical iris patterns is almost zero. Although the human eye is slightly asymmetrical and the pupil is slightly off the centred, for the most practical cases we think of the human eye is symmetrical
with respect to line of sight. The iris controls the amount of light that reaches the retina. Due to heavy pigmentation, light pass only through the iris via pupil, which contracts and dilates according to the amount of available light. Iris dimensions vary slightly between the individuals. Its shape is conical with the papillary margin located more interiorly than the root. A thickened region called the collarete divides the anterior surface into the ciliary and pupil zones.
Iris is made up of four different layers. The back layer is heavily pigmented and makes iris opaque so that light only reaches the eye through the pupil. The next layer contains the sphincter and the dilator muscles that allows for contraction and dilation. The third layer is the stroma, which is loosely connected tissue containing collagen, melanocytes, most cells and macrophases. The exterior layer is called the anterior border layer and is denser than the previous layer with more pigmentation. The colour of the iris is created by different levels of light absorption in the anterior border layers, little pigmentation in this layer results in a blue appearance because light reflects from the back layer of the iris. The more pigmentation a person has in the anterior border layer, the darker is the iris.
Figure 1 example of captured iris image. Imaging of the iris must acquire sufficient detail for recognition while being minimally invasive to the operator. Image acquisition yields an image of the iris as well as the surrounding region.
however can be covered by the eyelids. The pupillary boundary can be far less well defined. The image contrast between a heavily pigmented iris and its pupil can be quite small. Further, while the pupil typically is darker than the iris, the reverse relationship can hold in cases of cataract; the clouded lens leads to significant amount of backscattered light. Like the pupillary boundary. Eyelid contrast can be quite variable depending on the relative pigmentation in the skin and the iris. The eyelid boundary also can be irregular due to the presence of eyelashes. Taken into consideration, these observations suggest that iris localization must be sensitive to wide range of edge contrast, robust to irregular borders, and capable of dealing with variable occlusion. Three steps below are usually taken when come to the phase of defining the location of iris: 1. Binary segmentation 2. Pupil center localization 3. Circular edge detection
Figure 2: this figure shows how binary segmentation and limbic boundary was detected. The eye image (a) was unwrapped into polar coordinates(c) and localization of the limbic boundary of carried out (d). Iris segment obtained in (e).
Figure 3: the result of the pupil center localization and also circular edge detection on the image that obtain in the first stage.
Figure 4 : Result of iris localization. Given a captured image, it is necessary to separate the iris from the surround. The input to the localization process was the captured iris image of figure 1. After localization, all but the iris is masked out.
Figure 5: encoded iris patterns of the newly acquired image. 3. Evaluating the goodness of match between the newly acquired and database representations; 4. Deciding if the newly acquired data and the database entry were derived from the same iris based on the goodness of match.
Pupil dynamics(PD)
Employs a model of the human pupil response to light changes. Comparison between the real pupil and the observed object.
Aim : To prevent replay attack by stopping the electronic replay of an authentication procedure. Suggested method:
Conclusion
A biometric system provides automatic identification of an individual based on a unique feature or characteristics possessed by the individual. Iris is a useful biometric for recognition system. It is simple, easy to use, high accuracy, and cost effective compared to the other biometrics. Discussion on how iris recognition works has been discussed in this paper to get a deeper understanding of iris recognition. Three main steps are included in the process, they are: Capturing the image, defining the location of the iris, feature extraction and matching. Besides that, spoofing of iris recognition and ways to overcome it are also included in the case study section.
References
[1]Nicolaie Popescu-Bodorin, http://fmi.spiruharet.ro/bodorin/articles/fbvme-csirbuid-rj.pdf Date of accessed: 12/5/2012 [2]http://en.wikipedia.org/wiki/Iris_recognition Date of accessed: 12/5/2012
[3]Richard P.Wilders Iris Recogniton: An Emerging Biometric Technology [4]John Daugman, iris recognition for personal identifications.
http://www.cl.cam.ac.uk/~jgd1000/iris_recognition.html [5]John Daugman(2004), How iris recognition works [6] Adam Czajka, Przemek Strzelczyk, and Andrzej Pacut,Making iris recognition more reliable and spoof resistant
http://spie.org/documents/Newsroom/Imported/0614/0614-2007-06-15.pdf Figure:http://www.cytrap.eu/files/ReguStand/2007/image/2007-11-28_irisrecognition-biometric-passport.jpg Figure 1: http://sailjamehra.files.wordpress.com/2009/05/2.png Figure 3: http://docsdrive.com/images/ansinet/itj/2009/fig3-2k9-9541.gif Figure 4: http://ars.sciencedirect.com/content/image/1-s2.0-S026288561000079Xgr8.jpg Figure 5: http://www.morpho.com/IMG/jpg/iris.jpg Figure 6: http://binary-services.sciencedirect.com/content/image/1-s2.0-
S0031320311003074-gr2.sml