Top Banner
Biometric Authentication through Iris Biometric Authentication Through Iris Arti Patil Guide:- Dr. Deepak Jayaswal 6/2/2015 Computer Department St. Francis Institute of Technology
37
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

Slide 1

Example..41

BackBiometric Authentication through IrisIntroduction(continued)Features of Iris:- 1) Iris region is detected by vertical and horizontal edge information. 2) Amount of pigmented material. 3) Color of the iris. 4) Size and diameter of ciliary arteries. 5) Amount of melanin. 6) Radius of the iris. (Example)

5Biometric Authentication through IrisBiometric Identification Various Types of BiometricsDNARetinaIrisFinger printFacePalm Voice3Biometric Authentication through Iris

Introduction

Iris 1.Theirisis a thin, circular structure in theeye 2. Responsible for controlling the diameter and size of thepupil 3. One of the uniqueness of its pattern.

Fig 1:- Iris

4Biometric Authentication through Iris4Introduction(continued)Applications of iris recognition :-Attendance systemATMs password using iris authenticationAutomatic Border Passage (ABP)border-crossing applicationsComputer login: the iris as a living passwordSecure access to bank accounts at cash machinesCell phone and other wireless-device-based authenticationAirline passport presentation

6Biometric Authentication through Iris

Problem Statement

Problem :-In real life, insecurity increases day by day, the need to authentication is more essential and challenging part.

Solution:- Biometric authentication has become increasingly popular in security systems. Biometric authentication system is flexible. Iris Recognition is one of the ways to secure authentication because of Uniqueness and Robustness

7Biometric Authentication through IrisChallengesThere are major challenges:-Abnormality:-If a person is suffering from disease like diabetes there is effect on iris which creates problem in accurate detection.

Astigmatism:-

8

Figure 2: Presence of Astigmatism in iris Biometric Authentication through IrisChallengesIris coloboma: hole

Strabismus (misalignment ; crossed eyes or wall eyes)

9

Figure 3: Presence of coloboma in iris

Figure 4: Presence of Strabismus in iris

Biometric Authentication through IrisChallengesArcus: white ring near limbus: cholesterol10

Figure 5: Presence of Arcus in iris

Biometric Authentication through IrisProposed work Cholesterol presence in the Iris:-

11Fig 6:-Flowchart of Proposed workIris dataset

Feature extraction

Cholesterol detectionAuthentication Biometric Authentication through IrisProposed work Collecting the dataset:-

Chinese Academy of Sciences - Institute of Automation(CASIA )

University of Beira Interior six (UBIRIS)

Multimedia University (MMU)

12Biometric Authentication through IrisProposed work Example:- Presence of Cholesterol in iris13

2.After1.Before

Biometric Authentication through IrisLiterature SurveyIris Recognition System for Secure Authentication[1] IJETST- Volume||01||Issue||03||Pages 264- 267||May||ISSN 2348-9480,2014 (NEXT)

Processes:-

Getting a source or an image from external device.

Grayscale conversion of an image.(Example)

Finding an iris and pupil area.14Biometric Authentication through IrisProposed work Iris Localization :- (Example)Iris localization is a process to isolate the iris region from the rest of the acquired image. Iris can be approximated by two circles, one for iris boundary and another for pupil boundary. 15

Fig 7:- Localization of iris and pupil boundary. Biometric Authentication through IrisProposed work 16

2.Feature extraction:-Biometric Authentication through IrisProposed work Finding an iris and pupil area:- Hough transform:- 1. Classical Hough transform - used for the detection of regular curves such as lines, circles, ellipses The Hough transform in case to detect circle is calculated by formula as given below,17

abc1c2PupilIrisBiometric Authentication through Iris17Proposed work Daugmans algorithm:-

Where X0, Y0, r: the centre and radius of coarse circle (for each of pupil and iris). G(r): Gaussian function. r: the radius range I(X, Y): the edges of iris image.

18

Biometric Authentication through IrisProposed work Feature Extraction:-Feature encoding was implemented by convolving the normalized iris pattern with 1D Log-Gaber wavelet.Normalization Processes:-20

Biometric Authentication through IrisContinue..21

Example:- NormalizationBiometric Authentication through IrisProposed work Cholesterol detection system:-

Present the sodium ring in the iris

Doesnt change the pupil radius but changes the iris radius

Present the white layer in the iris

1Biometric Authentication through IrisProposed work Cholesterol detection system:-Using Rubber Model to calculate the histogram and OTSU.

23

Biometric Authentication through IrisLiterature Survey

242.Feature extraction and cholesterol detection:-Biometric Authentication through IrisProposed work Authentication of both the iris :-Radius matchingColor matching

1 1.Stored iris and pupil radiuses 2.Radiuses of iris and pupil to compareComparing them by using the concept of equivalent ratios.

Biometric Authentication through IrisLiterature SurveyIris and Pupil Matching:-

1.Stored iris and pupil radiuses 2.Radiuses of iris and pupil to compareComparing them by using the concept of equivalent ratios.

26

Biometric Authentication through Iris

Summary

Image Processing is a biometric based personal Identification technique in which Impersonation is most dangerous security threat. Different biometric systems are developed on face, voice and Hand geometry recognition with an effective method for automatic recognition of a persons identity with a high efficiency. The aim, provide a platform independent access to Iris recognition using different technologies present today.Biometric authentication has become increasingly popular in security systems.Iris Recognition is one of the way to secure authentication because of Uniqueness and Reliability

27Biometric Authentication through Iris References[1] Prof. Bharti L. Dhote1, Mr. Abhijit Kedari2,Miss. Shashanki Deshmane,Miss. Anuradha Gaikwad Iris Recognition System for Secure Authentication, IJETST- Volume||01||Issue||03||Pages 264-267||May||ISSN 2348-9480 2014.[2] Kaushik Roy*, Darrel Hudgin*, Prabir Bhattacharya* and Ramesh Chandra Debnath Iris Recognition:A Java based Implementation 1-4244-1551-9/07/$25.00 2007 IEEE.[3] Li Ma, Tieniu Tan, FellowEfficient Iris Recognition by Characterizing Key Local Variations, IEEE,Yunhong Wang, Member, IEEE, andDexin Zhang Elsevier J. on Computers in Industry 57 (2006) pp. 622630.

28Biometric Authentication through IrisReferences(continued)[4] V.Larrumbe Hidalgo, L.Martin Garcia, M.Taboada Iris recognition using the JAVAVis Library, International Journal of Interactive Multimedia and Artificial Intelligence, Vol. 1, N 1, ISSN 1989-1660,2008.[5] Keisuke Fukuta*a, Toshiaki Nakagawa a, Yoshinori Hayashi b,Yuji Hatanaka c, Takeshi Hara a, Hiroshi Fujita Personal Identification Based on Blood Vessels of Retinal Fundus Images, Medical Imaging 2008: Image Processing, edited by Joseph M. Reinhardt, Josien P. W. Pluim,Proc. of SPIE Vol. 6914, 69141V, 2008.

29Biometric Authentication through IrisReferences(continued)[7] K.Saminathan, M.Chithra Devi, T.Chakravarthy Pair of Iris Recognition for Personal Identification Using Artificial Neural Networks, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012[8] Upasana Tiwari, Deepali Kelkar,Abhishek Tiwari,Study of Different IRIS Recognition Methods International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 2009 30Biometric Authentication through IrisReferences(continued)[9] Sachin Gupta Assistant Professor, Department of Computer Science and Engineering Maharishi Markandeshwar Group of Institutions, Karnal, Haryana Ashish Gagneja Associate Professor, Department of Electronics and Communication Engg. Maharishi Markandeshwar Group of Institutions,Karnal, HaryanaProposed Iris Recognition Algorithm through Image Acquisition technique 2014, IJARCSSE All Rights Reserved

31Biometric Authentication through Iris

Questions?32

Thank You !!!3232Methodology :-1) Iris detection use the various methodology C++,MATLAB, java, .NET 2)In C++ language-The large amount of calculations that need to be performed for each iris 3)In MATLAB easily available and .NET very difficult to develop the code 4)In java :-Proposed work33Biometric Authentication through IrisIris Recognition:A Java based ImplementationThe iris image is first blurred using a Gaussian filter, and the edge is detected using the Canny edge detection technique.The iris is so reliable as a form of identification because of the uniqueness of its pattern.

34Biometric Authentication through Iris] Prof. Bharti L. Dhote1, Mr. Abhijit Kedari2,Miss. Shashanki Deshmane3 Miss. Anuradha Gaikwad Iris Recognition System for Secure Authentication, IJETST- Volume||01||Issue||03||Pages 264-267||May||ISSN 2348-9480 2014.

35Biometric Authentication through Iris DefinitionofHETEROCHROMIA. : a difference in coloration in two anatomical structures or two parts of the same structure which are normally alike in color 36Biometric Authentication through IrisFeatures of Iris37

BACKBiometric Authentication through Iris38

Biometric Authentication through IrisExample of melanin :-39

Biometric Authentication through IrisExample..Example of Normalization process:-

40

BackBiometric Authentication through Iris43

Biometric Authentication through Iris44

Biometric Authentication through IrisExample45

BackBiometric Authentication through Iris