...I.R.I.S- Iris Recognition & Information System TUHINA KHARE, MEDI-CAPS INSTITUTE OF TECHNOLOGY & MANAGEMENT, INDORE, INDIA; Email: kharetuhina@gmail.com Abstract. In computer systems, there is an urgent need for accurate authentication techniques to prevent unauthorized access. Only biometrics, the authentication of individuals using biological identifiers, can offer true proof of identity. This paper presents software for recognition and identification of people by using iris patterns. The system has been implemented using MATLAB for its ease in image manipulation and wavelet applications. The system also provides features for calculating the technical details of the iris image (Centre & Radius, Color Recognition). The system is based on an empirical analysis of the iris image and it is split in several steps using local image properties. Graphical user interface (GUI) has been introduced for easier application of the system. The system was tested and segmentation result came out to be 100% correct segmentation. The experimental results showed that the proposed system could be used for personal identification in an efficient and effective manner. Keyword: iris recognition, authentication, biometrics, Haar wavelet, GUI, MATLAB, image processing. 1. INTRODUCTION To control the access to secure areas or materials, a reliable personal identification infrastructure is required. Conventional methods of recognizing the identity of a person by using passwords or cards are not...
Words: 2531 - Pages: 11
...DEVEOLPMENT OF BIOMETRICALLY CONTROLLED DOOR SYSTEM (USING IRIS), WITH POWER BACKUP ABSTRACT Doors are known to provide major functions such as protection, safety to a building or place from any invasion. Therefore, the capability of a door system to provide privacy and security when demanded is worthwhile. Automatic door is a new way of creating doors without the need to manually apply force in the case of doors with handles or keys. Using a computer to control the opening and closing of the door with the use of programming skills makes the door more flexible and adaptable to changes when required. The biometrics technology based on Iris recognition can be used in the development and automation of security doors. Biometrics as a form of software technology is applicable in automation to create security and restrict unrecognized assessment of the machine infrastructure. Biometrics is a human identification/authentication technology based on physical, biological, and behavioral characteristics. These characteristics include face, fingerprint, iris, voice, and hand geometry. Compared to traditional authentication methods, biometrics is more reliable and convenient. Among them, it is reported that iris is one of the most reliable biometrics. The major construction of the door prototype with electric circuit design was carried out and the development of an iris recognition software using MATLAB to interface with the door prototype...
Words: 6305 - Pages: 26
...History and uses of Biometrics HISTORY AND USES OF BIOMETRICS By Marie C. Smith Gerard Beatty SEC310 March 10, 2014 Table of Contents I. First uses of Biometrics Facial recognition------------------------------------------------------------------------------3 Ancient finger prints---------------------------------------------------------------------------4 II. Types of Biometrics A. Physiological-------------------------------------------------------------------------------4 DNA fingerprinting-----------------------------------------------------------------------5 IRIS Recognition--------- ----------------------------------------------------------------5 B. Behavioral-----------------------------------------------------------------------------------6 HISTORY AND USES OF BIOMETRICS Biometrics which is a Greek term for bio-life and metrics-measure has been used since caveman time on cave paintings by putting a handprint next to the painting to distinguish the artist so everyone knows who painted it and later in in china parents hand printed and foot printed their children to identify while and Egyptian merchants and traders were identified by physiological descriptions to tell who were the trusted traders of successful transactions and those new to the marketplace. Today biometrics is the use of both physiological and behavioral sciences to identify and secure work sites that are critical to the ways we bank and do business...
Words: 1291 - Pages: 6
...technology are used to help with communication such as mobile data terminals and iris scans in the criminal justice system. In this paper, this student will compare different types of specialized databases and will also discuss over positive and negative effects due to new technologies. Mobile data terminals are used in the criminal justice system as a form of specialized database to help with communication. “A mobile data terminal (MDT) is a computerized device used in public transit vehicles and emergency vehicles to communicate with a central dispatch office” (Versaterm, 2011). There are many large police agencies that require all law enforcement officers to have a wireless mobile terminal system installed in their vehicles. This database can help law enforcement officers with workload management in the communication center and they can also help better time management of officers and help greater efficiency. Mobile data terminals can also help with communication between officers and dispatch by letting the officers have access to dispatch receipts, status updates, access to other unit statuses and they can also view any traffic stop updates. Overall, mobile data terminals have helped increase communication between officers and dispatch in the criminal justice system (Versaterm, 2011). Another type of specialized database that is used in the criminal justice system is known as iris scans. “Iris scans is a method of biometric...
Words: 1044 - Pages: 5
...Biometrics and finger/palm printing Tara Tatum Team C Introduction In many of the FBI’s high profile cases, one form of technology that has become highly effective is biometrics. The definition of biometrics is the science of measuring and statistically analyzing biological data. This scientific measuring tool is mostly used in identifying individuals whether anatomical or physiological. While fingerprinting is probably one of the oldest and most common forms of biometrics, other forms can include but are not limited to iris scans, voice recognition, palm prints, and facial recognition. As of late, the FBI, being a leader in the latest biometric technology, has created with the help of the science and technology branch, the Biometric Center of Excellence or BCOE. Not only has the BCOE strengthened the FBI’s abilities by proving the guilt, as well as the innocence of those convicted of crimes, but it has also been effective in thwarting terrorism that plagues many countries today. Finger/palm printing techniques Since the early 1920’s, fingerprinting techniques have been in existence, assisting in identifying and authenticating a person’s identity. This older form of biometric technology has both advantages and disadvantages. Some of the advantages can be the authentication of one’s identity, as no two person’s have the same prints, the cost effectiveness, the ease of use, the accuracy and the standardization. Some disadvantages are the intrusiveness, as some...
Words: 776 - Pages: 4
...Both the iris and retina are two of the most unique biometric traits exploited in two of the most accurate biometric verification and identification methods currently in use today. Retina recognition offers an astounding one in 10,000,000 comparative accuracy ratio while iris imaging offers a slightly lesser comparative accuracy ratio at one in 131,000. This puts the two at the top of the list in comparative accuracy when it comes to the common biometric methods. Although both have their clear advantages they also have key disadvantages that must be brought to light. (Newton, Robert, 2010) The iris can be easily identified as the colored portion of the eye; it is a muscle within the eye that regulates the size of the pupil, thus controlling...
Words: 897 - Pages: 4
...Limited Biometric Authentication Report Introduction This report aims to give a brief overview of the alternatives to the current authentication system being used at Dynamic Holidays Limited. Specifically it will detail the technologies behind both fingerprint and iris scanning, doing a comparison of each in turn, and then ultimately leading to a recommendation as to which would suit the company better. Biometric Overview Biometrics, or the singular biometric, is the measurement of living things and in most contexts details the measurement of human beings for security and authentication purposes. This stems from the Greek bios (life) and metron (measure). In a security environment, biometrics are utilised to ensure that the correct people have access to the products and services to which they are entitled. The field of biometrics covers a wide scope of technologies, including but not limited to facial, iris, fingerprint and DNA recognition. Within the field of biometrics, there are generally two sources of identification classifications: physiological and behavioural. Physiological characteristics are those that we are born with and do not usually change (iris and fingerprints), especially once we have reached adulthood. This excludes the nature of physical injury or various other medical or traumatic interventions. Behavioural characteristics are ingrained within us as we grow and develop (gait and signature) and usually only changed when we make...
Words: 3039 - Pages: 13
...perform a particular action such as access into a specific location. It raises suspicions about an individual’s motive, for instance a suspected terrorist at points of public vulnerability. Biometrics is believed to reduce and possibly eradicate the infiltration of the ‘unwanted’, coming as a solution to “the rising problem of identity theft/fraud coupled with the obsession of securing the inside”. Benjamin J. Muller believes that biometrics is certainly timely. He goes on to say “the unshakeable problem of identity theft/fraud are forwarded as challenges or rather problems that biometrics is only too capable of ‘resolving’”. A scanner, and probably the kind most often seen in movies, is a retinal or iris scanner. These function by either taking an image of a person’s eye (iris scanner,) or of the pattern of blood vessels on the back of the eye (retina scanner.) Retinal scanners offer a very secure...
Words: 803 - Pages: 4
...Title (2) Biometric scanning system types and which one is more effectiveness in a workplace Biometric recognition, or biometrics, refers to the automatic authentication of a person based on his or her physiological or behavioural characteristics (Jain, Bolle, and Pankanti 1999a; Maltoni, Maio, Jain, and Prabhakar 2003). One of the most important technologies which acts as a human being identify required purpose. Nowadays there were great progresses in technology of access for companies which it using human being body to identify the identity of the person. In the past Human beings used fingerprint to identity for signature. Biometric technology looks like a revolution for modern society for example, Iris and AFIS (Automatic Finger Print Identification System). Although fingerprint has a good feature to identify people but I will argue that iris system has shown the best performance to do the required purpose of scanning and identification more accurately than fingerprint. Reliability Fingerprint is a biometric device by which the people been identified through scanning fingerprint of the person and save the data to store the fingerprint image. Furthermore fingerprint identification scanning is reliability because fingerprint identification and authentication is the mature biometric technology (Komarinski, 2005). Firstly, the fingerprint is reliable because it includes quite huge information and will keep for all life of human being, In spite of the fingerprint just...
Words: 1161 - Pages: 5
...Wellington Academy - Silicon Oasis Year 12 Word Count - ____ Contents Title Page………………………………………………………………………………………………………..1 Abstract………………………………………………………………………………………………………….3 Introduction……………………………………………………………………………………………………4 Biometrics………………………………………………………………………………………………………4 Fingerprints…………………………………………………………………………………………4 What is a Fingerprint?..........................................................................................4 Why is it used?.........................................................................................................4 What is Fingerprint Recognition?...................................................................4 Facial Recognition………………………………………………………………………………..5 Why is it used?........................................................................................................5 What is Facial Recognition?..............................................................................5 How does it work?................................................................................................5 Eye Scanning Why is it used?........................................................................................................6 What is Eye Scanning?.........................................................................................6 How does it work?.................................................................................................6 In a...
Words: 1744 - Pages: 7
...movements, features of face and other parts of the body, retina or iris pattern. Nature has made human beings with different characteristics which may vary from one person to another. This property is made use of by Biometric technology to distinctly identify each person. This paper gives an overview of key biometric technologies and basic technique involved. The various opportunities for biometrics are mentioned, followed by the the benefits of the biometric and identification, the actual issue or current potential problems and abuses, and appropriate guidelines of identification and biometrics technology. Introduction Biometric technology involves effective methods of individual identification/authentication through its recognition of unique physiological characteristics. Although still a developing technology which contains deficiencies, it is generally considered to be a highly accurate and widely applicable security measure. However, growing public awareness of this technology has been accompanied by increasing concerns about ethical issues associated with its use. Biometric Systems Biometrics are automated methods of recognizing a person based on a physiological or behavior characteristics. Biometrics technologies are becoming the foundation of an extensive array of highly secure identification and personal verification. Physiological characteristics consists of finger images, facial, hand and iris recognition. For behavioral characteristics it contains signature verification...
Words: 268 - Pages: 2
...Evolution of Biometrics kody Saylor Computer security Keisha Nelson December 10, 2013 Biometrics is the use of individual’s physical or behavioral characteristics to uniquely identify them for authentication or identifications purposes. Types of biometrics include: fingerprints, hand geometry, retina and iris patterns, facial recognition, and signature, voice, and keystroke patterns. There has been an evolution between man and machine. Technology has grown in leaps and bounds and today, flesh and machine have been fused together as one. There have been many science fiction novels and movies of chip implantation representing quick identification to a mainframe. Biometric technology has taken the form of this fantasy and turned it into an immeasurable reality. There are potential benefits of an integrated biometrics-based identification system include but not limited to: * The cost of administration. * The reliability of identification. * Access to information held by organizations. * The accuracy and quality of research and statistics. * The level of technical security of communications. In America, there has been a huge debate over whether or not security is taking away our freedom. One instance of security verses freedom is about the recent legislation regarding driver’s licenses incorporating biometric technology. Biometrics is “the statistical study of biological phenomena” (American Heritage Dictionary) or more commonly known as “a technology...
Words: 1485 - Pages: 6
...This course has opened my eyes to the ever evolving world of Information Technology and its effect on the business world. If companies fail to adapt to new technologies and changing markets they will find themselves struggling to compete and survive. Just a few of these new technologies such as social networking, biometric technology, RFID, and cloud networks have completely changes the way companies operate. They have redefined and replaced older technologies and have managed to do so at a rapid pace. If companies do not set themselves up with flexibility to implement new technologies they will soon be out of business. Cloud networks have become increasingly popular due to the cost savings and effectiveness of their design. A company is able to save money by not having the overhead and staff to maintain and service their own servers. I think that this type of network will soon become a standard business model for all companies. As the security features continue to advance, the cost savings provided by the cloud will be too great to pass up. The cloud has also contributed to the rise in another type of network, the social network. The increasing popularity of social websites such as Facebook and Twitter has spawned new ways to market and advertise. The traditional forms of advertising are slowly being phased out and being replaced by more direct advertising based on the information a user provides to their social networking site. The ability to capture and use...
Words: 675 - Pages: 3
...unique pattern in the human iris is formed by ten months of age, and remains unchanged throughout one's lifetime. The probability of two persons having the same iris pattern is nearly impossible. In The Rayid Model of Iris Interpretation, there are four constitutional iris patterns: Two primary and two secondary. The two primary structures are \Jewel" and \Flower". Everyone has one of these two patterns as their dominant iris structure. The primary iris pattern is modied by the secondary pattern: either \Stream" or \Shaker". Personality traits and characteristics are dierent for each of these structures. In addition to the in uence of Stream or Shaker, personality is modied by birth order position and other factors. The presence of brown or dark-colored freckle-like dots or ecks in the iris indicates a thinking-oriented, analytical person. These color spots, which can range from yellow to gold to brown, are referred to as jewels, and this mentally-oriented personality is referred to as a Jewel. Distinctly curved or rounded openings in the bers of the iris (like petals of a ower), indicate a feeling-oriented personality. These openings, which look as if the light colored iris bers have round holes within them, are called owers, and we refer to the feeling-type of personality as a \Flower". The \Stream" type in the Rayid Model is called the kinesthetic type. Metaphorically, it is referred to as a stream. The iris of a person with a stream personality...
Words: 347 - Pages: 2
...Abstract Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems. A fingerprint reader captures the curves and indentations of a fingerprint. Fingerprint readers can be set up to perform different functions for different fingers. Iris recognition systems read patterns in the iris of the eye. Biometric technology is a very effective way to keep both information and the world more secure. Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics (Doe, 2012). Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems. A fingerprint reader captures the curves and indentations of a fingerprint. Fingerprint readers can be set up to perform different functions for different fingers. For example, the index finger could start a program, and the ring finger could shut down the computer (Jenkins). Parlor (2012) states that one use of fingerprint readers is for users to log on to programs and...
Words: 401 - Pages: 2