SlideShare a Scribd company logo
LUCTUER BY
RAFIDH HAMAD KHALAF
IRIS RECOGNITION
By
RAFIDH
IRIS Introduction ?
History of Iris Recognition?
What the iris ?
 Why iris ?
Methods of iris recognition system ?
Image Acquisition ?
Segmentation ?
Normalization ?
Applications ?
Overview:
Iris recognition is a method
of biometric identification
and authentication that use
pattern-recognition
techniques based on high
resolution images of the
irises of an individual's eyes
It is considered to be the most accurate
biometric technology available today.
Introduction
History of Iris Recognition
1997-1999
1987
1987
1980
The concept of Iris Recognition was first proposed by
Dr. Frank Burch in 1939.
It was first implemented in 1990
when Dr. John Daugman created the
algorithms for it.
These algorithms employ methods
of pattern recognition and some
mathematical calculations for iris
recognition.
Iris is the area of the eye where the
pigmented or colored circle,usually
brown, blue, rings the dark pupil of the
eye.
IRIS
Normal Eye Example of iris
IRIS
What is Iris ?
The colored ring around the pupil
of the eye is called the Iris
What is Iris
?
 The iris is a thin circular diaphragm, which lies
between the cornea and the lens of the human eye.
 The iris is perforated close to its centre by a
circular aperture known as the pupil.
 The function of the iris is to control the amount of
light entering through the pupil.
 The average diameter of the iris is 12 mm, and the
pupil size can vary from 10% to 80% of the iris
diameter.
Externally visible highly protected internal organ.
Unique patterns.
Not genetically connected unlike eye color.
Stable with age.
Impossible to alter surgically.
Living Password, Can not be forgotten or copied.
Works on blind person.
User needs not to touch appliances.
Accurate , faster , and supports large data base.
What is Iris ?
Methods Of IRIS Recognition System
 In identifying one’s iris, there are 2
methods for its recognition and are:
 Active
 Passive
The active Iris system requires that a user be
anywhere from six to fourteen inches away from the
camera.
The passive system allows the user to be anywhere
from one to three feet away from the camera that
locates the focus on the iris.
Iris Recognition Diagram
Image
Acquisition
Image
Acquisition
Image
Acquisition
Iris
Segmentation Normalization
Feature
Encoding
Feature
Matching
Feature points in the
iris region
IrisTemplates
Database
Identify or Reject
Subject
Iris
Segmentation
Normalization
Feature
Encoding
Identify or Reject
Subject
IrisTemplates
Database
Eye Image Iris Region
IrisTemplate
Image Acquisition
 The first step, image acquisition
deals with capturing sequence of iris
images from the subject using
cameras and sensors with High
resolution and good sharpness.
 These images should clearly show
the entire eye especially iris and
pupil part, and then some
preprocessing operation may be
applied to enhance the quality of
image e.g. histogram equalization,
filtering noise removal etc.
(CASIA) eye image database
Pattern recognition IRIS recognition
The first stage of iris
segmentation to isolate the
actual iris region in a digital
eye image.
The iris region, can be
approximated by two
circles, one for the iris/sclera
boundary and another,
interior to the first, for the
iris/pupil boundary.
Segmentation/concept
the derivatives in the horizontal direction for
detecting the eyelids, and in the vertical direction for
detecting the outer circular boundary of the iris .
Taking only the vertical gradients for locating the iris
boundary will reduce influence of the eyelids when
performing circular Hough transform.
Segmentation/eyelids
 eyelashes are treated as belonging to two types :
1 -separable eyelashes:
which are isolated in the image .
2-multiple eyelashes:
which are bunched together and overlap in the eye image.
 Eyelids and Eyelashes are the main noise factor in the iris image.
 These noise factors can affect the accuracy of the iris recognition
system.
 After applying circular Hough transform to iris, we are applying linear
Hough transform and we get line detected noise region in the iris
image.
 We have to remove these detected eyelids and eyelashes from the iris
image Thresolding is used for the removal of eyelashes. Then, the
noise free iris image can be available for future use.
Segmentation/eyelash
1- Edge Detector
2- Hough Transform
Double
thresholdin
g
edeg
1- Edge Detector
2- Hough Transform
LINEAR HOUGHTRANSFORM
CIRCULAR HOUGH TRANSFORM
smoothing
Finding
gradient
Segmentation
Diagram
a. Iris and pupil localization: Pupil and Iris are considered as
two circles using Circular Hough Transform
Process of finding the iris in
an image
b. Eye lid detection and Eye lash noise
removal using linear Hough Transform
method
Segmentation( cont…)
Once the iris segmented ,the next stage
transform the iris region so that it has fixed
dimensions in order to allow comparisons.
Since variations in the eye like pupil dilation
and the inconsistence iris normalization is
needed.
Pupil dilation inconsistence iris
Normalization process involves unwrapping the
iris and converting it in to its polar equivalent .
Normalization
 It is done using Daugman’s Rubber sheet model .
 The centre of the pupil was considered as the
reference point, and radial vectors pass through
the iris region .
 .
Normalization ( cont...)
The Chines Academy of Sciences – Institute
of Automation (CASIA) eye image database
contains 756 greyscale eye images with 108
unique eyes or class are taken from two
sessions .
Research’s Database
 . ATMs
 .Computer login: The iris as a living
password.
 · National Border Controls UAE
 · Driving licenses and other personal
certificates.
 · benefits authentication.
 ·birth certificates, tracking missing.
 · Credit-card authentication.
 · Anti-terrorism (e.g.:— suspect
Screening at airports)
 · Secure financial transaction (e-
commerce, banking).
 · Internet security, control of access
to privileged information.
Applications
The Largest National Deployment
Iris recognition border-crossing system in the
United Arab Emirates (UAE)
Applications
Applications
Iris Capturing Devices
Accuracy changes with user’s height
,illumination , Image quality etc.
Person needs to be still, difficult to scan
if not co-operated.
Risk of fake Iris lenses.
Alcohol consumption causes
deformation in Iris pattern
Disadvantages
1- cost : expensive
2- Ease of use :- easy.
3- Authentication:- high.
4- Identification :- the iris of any one individual.
5- physiological and/or behavior characteristics :-
the iris is physiological characteristics
6- Ability to applied: . high
7- Community acceptance :- low .
8- Automatic : real time.
9-Life cycle:- does not need update
10- maintenance requirement :- not need to maintenance.
important things
Report on the iris scan?
Pattern recognition IRIS recognition

More Related Content

PDF
Iris recognition system
PPT
Iris recognition
PDF
Iris Recognition
PPTX
Iris ppt
DOCX
Iris recognition system
PPTX
Biometrics iris recognition
PPT
Retinal Recognition
PPTX
Iris recognition seminar
Iris recognition system
Iris recognition
Iris Recognition
Iris ppt
Iris recognition system
Biometrics iris recognition
Retinal Recognition
Iris recognition seminar

What's hot (20)

PPTX
IRIS RECOGNITION
PPT
iris recognition system as means of unique identification
PPTX
Iris recognition
PPTX
Iris Recognition Technology
PPT
Retina recognition biometrics drishtysharma
PPTX
Iris Scan
PPTX
Iris recognition
PPTX
Computer Vision - Artificial Intelligence
PPTX
Pattern recognition 3d face recognition
PPT
Final iris recognition
PPT
Working of digital camera
PPTX
Face Recognition Technology
PPTX
Automatic no. plate recognition
PPTX
Iris scanning
PPT
Fingerprint recognition
PPT
Iris Biometric for Person Identification
PPTX
Biometric Technology
PPT
Face recognition
PPTX
Computer Vision Introduction
PPTX
Pattern recognition facial recognition
IRIS RECOGNITION
iris recognition system as means of unique identification
Iris recognition
Iris Recognition Technology
Retina recognition biometrics drishtysharma
Iris Scan
Iris recognition
Computer Vision - Artificial Intelligence
Pattern recognition 3d face recognition
Final iris recognition
Working of digital camera
Face Recognition Technology
Automatic no. plate recognition
Iris scanning
Fingerprint recognition
Iris Biometric for Person Identification
Biometric Technology
Face recognition
Computer Vision Introduction
Pattern recognition facial recognition
Ad

Similar to Pattern recognition IRIS recognition (20)

PPTX
Iris sem
PPTX
Multibiometrics ver5
PDF
1464426255 28 05-2016
PDF
IRJET- Survey of Iris Recognition Techniques
PPT
Iris_ information_hiding recognation.ppt
PDF
Iris recognition for personal identification using lamstar neural network
PPTX
Iris recognition
PDF
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
PDF
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
PPTX
Iris scanner technology
PDF
Ijcse13 05-01-001
PDF
Ijcse13 05-01-001
DOCX
Biometric.docx
PDF
A Survey : Iris Based Recognition Systems
PDF
Recent developments in iris based biometric authentication systems
PDF
A Study of Iris Recognition
PDF
Recent developments in iris based biometric
PDF
Redio miss
Iris sem
Multibiometrics ver5
1464426255 28 05-2016
IRJET- Survey of Iris Recognition Techniques
Iris_ information_hiding recognation.ppt
Iris recognition for personal identification using lamstar neural network
Iris recognition
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
Iris scanner technology
Ijcse13 05-01-001
Ijcse13 05-01-001
Biometric.docx
A Survey : Iris Based Recognition Systems
Recent developments in iris based biometric authentication systems
A Study of Iris Recognition
Recent developments in iris based biometric
Redio miss
Ad

More from Mazin Alwaaly (20)

PPTX
Pattern recognition voice biometrics
PPTX
Pattern recognition palm print authentication system
PPTX
Pattern recognition on line signature
PPTX
Pattern recognition multi biometrics using face and ear
PPT
Pattern recognition hand vascular pattern recognition
PPTX
Pattern recognition Hand Geometry
PPTX
Pattern recognition forensic dental identification
PPT
Pattern recognition fingerprints
PPTX
Pattern recognition ear as a biometric
PPTX
Multimedia multimedia over wireless and mobile networks
PPT
Multimedia network services and protocols for multimedia communications
PPTX
Multimedia content based retrieval in digital libraries
PPTX
Multimedia lossy compression algorithms
PPTX
Multimedia lossless compression algorithms
PPTX
Multimedia basic video compression techniques
PPT
Multimedia image compression standards
PPTX
Multimedia fundamental concepts in video
PPT
Multimedia color in image and video
PPTX
Multimedia graphics and image data representation
PPTX
Information and data security steganography and watermarking
Pattern recognition voice biometrics
Pattern recognition palm print authentication system
Pattern recognition on line signature
Pattern recognition multi biometrics using face and ear
Pattern recognition hand vascular pattern recognition
Pattern recognition Hand Geometry
Pattern recognition forensic dental identification
Pattern recognition fingerprints
Pattern recognition ear as a biometric
Multimedia multimedia over wireless and mobile networks
Multimedia network services and protocols for multimedia communications
Multimedia content based retrieval in digital libraries
Multimedia lossy compression algorithms
Multimedia lossless compression algorithms
Multimedia basic video compression techniques
Multimedia image compression standards
Multimedia fundamental concepts in video
Multimedia color in image and video
Multimedia graphics and image data representation
Information and data security steganography and watermarking

Recently uploaded (20)

PPT
Heredity-grade-9 Heredity-grade-9. Heredity-grade-9.
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PPTX
Application of enzymes in medicine (2).pptx
PPTX
Pharmacology of Autonomic nervous system
DOCX
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
PPTX
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
PPTX
Microbes in human welfare class 12 .pptx
PDF
Is Earendel a Star Cluster?: Metal-poor Globular Cluster Progenitors at z ∼ 6
PDF
GROUP 2 ORIGINAL PPT. pdf Hhfiwhwifhww0ojuwoadwsfjofjwsofjw
PDF
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PPTX
Seminar Hypertension and Kidney diseases.pptx
PPT
1. INTRODUCTION TO EPIDEMIOLOGY.pptx for community medicine
PPTX
The Minerals for Earth and Life Science SHS.pptx
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PDF
Lymphatic System MCQs & Practice Quiz – Functions, Organs, Nodes, Ducts
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PPTX
Science Quipper for lesson in grade 8 Matatag Curriculum
PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
PDF
An interstellar mission to test astrophysical black holes
Heredity-grade-9 Heredity-grade-9. Heredity-grade-9.
Phytochemical Investigation of Miliusa longipes.pdf
Application of enzymes in medicine (2).pptx
Pharmacology of Autonomic nervous system
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
Microbes in human welfare class 12 .pptx
Is Earendel a Star Cluster?: Metal-poor Globular Cluster Progenitors at z ∼ 6
GROUP 2 ORIGINAL PPT. pdf Hhfiwhwifhww0ojuwoadwsfjofjwsofjw
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Seminar Hypertension and Kidney diseases.pptx
1. INTRODUCTION TO EPIDEMIOLOGY.pptx for community medicine
The Minerals for Earth and Life Science SHS.pptx
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
Lymphatic System MCQs & Practice Quiz – Functions, Organs, Nodes, Ducts
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
Science Quipper for lesson in grade 8 Matatag Curriculum
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
An interstellar mission to test astrophysical black holes

Pattern recognition IRIS recognition

  • 1. LUCTUER BY RAFIDH HAMAD KHALAF IRIS RECOGNITION By RAFIDH
  • 2. IRIS Introduction ? History of Iris Recognition? What the iris ?  Why iris ? Methods of iris recognition system ? Image Acquisition ? Segmentation ? Normalization ? Applications ? Overview:
  • 3. Iris recognition is a method of biometric identification and authentication that use pattern-recognition techniques based on high resolution images of the irises of an individual's eyes It is considered to be the most accurate biometric technology available today. Introduction
  • 4. History of Iris Recognition 1997-1999 1987 1987 1980 The concept of Iris Recognition was first proposed by Dr. Frank Burch in 1939. It was first implemented in 1990 when Dr. John Daugman created the algorithms for it. These algorithms employ methods of pattern recognition and some mathematical calculations for iris recognition.
  • 5. Iris is the area of the eye where the pigmented or colored circle,usually brown, blue, rings the dark pupil of the eye. IRIS Normal Eye Example of iris
  • 7. What is Iris ? The colored ring around the pupil of the eye is called the Iris
  • 8. What is Iris ?  The iris is a thin circular diaphragm, which lies between the cornea and the lens of the human eye.  The iris is perforated close to its centre by a circular aperture known as the pupil.  The function of the iris is to control the amount of light entering through the pupil.  The average diameter of the iris is 12 mm, and the pupil size can vary from 10% to 80% of the iris diameter.
  • 9. Externally visible highly protected internal organ. Unique patterns. Not genetically connected unlike eye color. Stable with age. Impossible to alter surgically. Living Password, Can not be forgotten or copied. Works on blind person. User needs not to touch appliances. Accurate , faster , and supports large data base. What is Iris ?
  • 10. Methods Of IRIS Recognition System  In identifying one’s iris, there are 2 methods for its recognition and are:  Active  Passive The active Iris system requires that a user be anywhere from six to fourteen inches away from the camera. The passive system allows the user to be anywhere from one to three feet away from the camera that locates the focus on the iris.
  • 11. Iris Recognition Diagram Image Acquisition Image Acquisition Image Acquisition Iris Segmentation Normalization Feature Encoding Feature Matching Feature points in the iris region IrisTemplates Database Identify or Reject Subject Iris Segmentation Normalization Feature Encoding Identify or Reject Subject IrisTemplates Database Eye Image Iris Region IrisTemplate
  • 12. Image Acquisition  The first step, image acquisition deals with capturing sequence of iris images from the subject using cameras and sensors with High resolution and good sharpness.  These images should clearly show the entire eye especially iris and pupil part, and then some preprocessing operation may be applied to enhance the quality of image e.g. histogram equalization, filtering noise removal etc. (CASIA) eye image database
  • 14. The first stage of iris segmentation to isolate the actual iris region in a digital eye image. The iris region, can be approximated by two circles, one for the iris/sclera boundary and another, interior to the first, for the iris/pupil boundary. Segmentation/concept
  • 15. the derivatives in the horizontal direction for detecting the eyelids, and in the vertical direction for detecting the outer circular boundary of the iris . Taking only the vertical gradients for locating the iris boundary will reduce influence of the eyelids when performing circular Hough transform. Segmentation/eyelids
  • 16.  eyelashes are treated as belonging to two types : 1 -separable eyelashes: which are isolated in the image . 2-multiple eyelashes: which are bunched together and overlap in the eye image.  Eyelids and Eyelashes are the main noise factor in the iris image.  These noise factors can affect the accuracy of the iris recognition system.  After applying circular Hough transform to iris, we are applying linear Hough transform and we get line detected noise region in the iris image.  We have to remove these detected eyelids and eyelashes from the iris image Thresolding is used for the removal of eyelashes. Then, the noise free iris image can be available for future use. Segmentation/eyelash
  • 17. 1- Edge Detector 2- Hough Transform Double thresholdin g edeg 1- Edge Detector 2- Hough Transform LINEAR HOUGHTRANSFORM CIRCULAR HOUGH TRANSFORM smoothing Finding gradient Segmentation Diagram
  • 18. a. Iris and pupil localization: Pupil and Iris are considered as two circles using Circular Hough Transform Process of finding the iris in an image b. Eye lid detection and Eye lash noise removal using linear Hough Transform method Segmentation( cont…)
  • 19. Once the iris segmented ,the next stage transform the iris region so that it has fixed dimensions in order to allow comparisons. Since variations in the eye like pupil dilation and the inconsistence iris normalization is needed. Pupil dilation inconsistence iris Normalization process involves unwrapping the iris and converting it in to its polar equivalent . Normalization
  • 20.  It is done using Daugman’s Rubber sheet model .  The centre of the pupil was considered as the reference point, and radial vectors pass through the iris region .  . Normalization ( cont...)
  • 21. The Chines Academy of Sciences – Institute of Automation (CASIA) eye image database contains 756 greyscale eye images with 108 unique eyes or class are taken from two sessions . Research’s Database
  • 22.  . ATMs  .Computer login: The iris as a living password.  · National Border Controls UAE  · Driving licenses and other personal certificates.  · benefits authentication.  ·birth certificates, tracking missing.  · Credit-card authentication.  · Anti-terrorism (e.g.:— suspect Screening at airports)  · Secure financial transaction (e- commerce, banking).  · Internet security, control of access to privileged information. Applications
  • 23. The Largest National Deployment Iris recognition border-crossing system in the United Arab Emirates (UAE)
  • 27. Accuracy changes with user’s height ,illumination , Image quality etc. Person needs to be still, difficult to scan if not co-operated. Risk of fake Iris lenses. Alcohol consumption causes deformation in Iris pattern Disadvantages
  • 28. 1- cost : expensive 2- Ease of use :- easy. 3- Authentication:- high. 4- Identification :- the iris of any one individual. 5- physiological and/or behavior characteristics :- the iris is physiological characteristics 6- Ability to applied: . high 7- Community acceptance :- low . 8- Automatic : real time. 9-Life cycle:- does not need update 10- maintenance requirement :- not need to maintenance. important things
  • 29. Report on the iris scan?