28209750 Iris Technology
-
Upload
krishnamamta -
Category
Documents
-
view
220 -
download
0
Transcript of 28209750 Iris Technology
-
8/12/2019 28209750 Iris Technology
1/15
Iris Technology
Presented By :
D.SRIKANTH
-
8/12/2019 28209750 Iris Technology
2/15
Biometrics
Identifying individuals using theirdistinct physical or behaviorcharacteristics.
Features measured are; face, fingerprint,hand geometry, iris, retinal, signature,
and voice.
Biometrics is the most secure andconvenient authentication tool.
-
8/12/2019 28209750 Iris Technology
3/15
Biometric technologies provides authentication to
applications, networks, personal computers (PCs), and
physical facilities.
These are grouped into two :
CONTACT BIOMETRIC
TECHNOLOGIES:
Fingerprint.
Hand/finger geometry.
Dynamic signature verification.
Keystroke dynamics.
CONTACT LESS BIOMETRIC
TECHNOLOGIES:
Facial recognition.
Voice recognition.
Iris scans.
Retinals scan.
Biometric technologies
-
8/12/2019 28209750 Iris Technology
4/15
What Is Iris? Iris is a plainly visible, colored ring that
surrounds the pupil.
No two irises are alike.
No correlation between the iris patterns of
even identical twins,or the right and lefteye of an individual.
Accuracy is greater than DNA.
-
8/12/2019 28209750 Iris Technology
5/15
WhyIrisTechnologyStable
Flexible
Unique
Reliable
NonInvasive
-
8/12/2019 28209750 Iris Technology
6/15
Iris Technology
Iris recognition is the most powerful
biometric technology.
Iris is a protected internal organ
whose random texture isstable
throughout life.
-
8/12/2019 28209750 Iris Technology
7/15
It utilizes pictures taken from human iris
patterns as a unique identifier.
Compares all visible attributes against the
ones that are stored on file to identify
individual identity.
-
8/12/2019 28209750 Iris Technology
8/15
Iris Of An Eye
-
8/12/2019 28209750 Iris Technology
9/15
WorkingGlance at the camera
Near-infrared illumination that is very safe.
Taking Picture:
Creating an iris code:
The picture of eye is processed by softwarethat localizes the inner and outer
boundaries of the iris
-
8/12/2019 28209750 Iris Technology
10/15
Mathematical software then encodes
the iris pattern by a process calledDemodulation.
Demodulation phase sequence iscalled an Iris Code template, and itcaptures the unique features of aniris.
-
8/12/2019 28209750 Iris Technology
11/15
TechnologyComparisonMethod Coded Pattern
Misidentification
rateSecurity
Iris Recognition Iris pattern 1/1,200,000 High
Fingerprinting Fingerprints 1/1,000 Medium
Hand ShapeSize, length and
thickness of hands1/700 Low
Facial Recognition
Outline, shape and
distribution of eyesand nose
1/100 Low
Signature
Shape of letters,
writing order, pen
pressure
1/100 Low
Voice printing Voice characteristics 1/30 Low
-
8/12/2019 28209750 Iris Technology
12/15
Current Future UseToday:
Airports, government agencies, banks, and
research laboratories are utilizing thistechnology.
Tomorrow:
A leader in both IT and wireless.
-
8/12/2019 28209750 Iris Technology
13/15
Applications
Document and data storage rooms.
Drug and dangerous material storage rooms.
Substituting for passports.
Aviation security.
Ration cards.
-
8/12/2019 28209750 Iris Technology
14/15
ConclusionIris recognition is the most powerful biometric
technology there is nothing else comes close
to it.
-
8/12/2019 28209750 Iris Technology
15/15