Você está na página 1de 5

Slide 1:

Good morning one and all!


Im g l prasanna and he is my friend mvva Prasad.we are doing MCA
III sem in gvppg clg rushikonda.
We stand before you to present a seminar on IRIS TECHNOLOGY.
Slide 2:
The contents of our presentation are:
 Introduction to Biometrics
 Biometric Technologies
 Iris Technology
 Why Iris Technology?
 Principle
 Working
Slide 3:
 Technology comparison
 Current & Future Use
 Applications
 Challenges
 Conclusion

Slide 4:
Biometrics:

 Biometrics is an emerging technology for automatically


identifying individuals using their distinct physical or behavioral
characteristics.
These characteristics are distinctive to each and every person.

 Features measured are; face, fingerprint, hand geometry,


iris, retinal, signature, and voice.

 Biometrics is the most secure and convenient authentication


tool which is becoming the foundation of highly secure
identification.
'Biometrics' means to most people the verification of peoples'
identities using their unique characteristics.

Slide 5:
Biometric technologies:
Biometric technologies provides authentication to applications,
networks, personal computers (PCs), and physical facilities.

A biometric authentication system is essentially a method of


establishing a person’s identity by comparing the binary code of a
uniquely specific biological or physical characteristic to the binary
code of an electronically stored characteristic called a biometric.
It cannot fall prey to hackers.
These are grouped into two :
CONTACT BIOMETRIC TECHNOLOGIES:

Fingerprint.
Hand/finger geometry.
Dynamic signature verification.
Keystroke dynamics.

CONTACT LESS BIOMETRIC TECHNOLOGIES:

Facial recognition.
Voice recognition.
Iris scans.
Retinals scan.

Slide 6:

Iris Technology:
 Iris recognition is the most powerful biometric technology
there is nothing else comes close to it.
Iris recognition is the best of breed authentication process available
today.
 Iris recognition technology combines computer vision, pattern
recognition, statistical inference, and optics.
Recognition of a person's identity by mathematical analysis of the
random patterns that are visible within the iris of an eye from some
distance.
 Iris is a protected internal organ whose random texture is
stable throughout life.
It can serve as a kind of living passport or a living password that one
need not remember but can always present.
Slide 7:

 It utilizes pictures taken from human


iris patterns as a unique identifier.
 Compares all visible attributes against the ones that are stored
on file to identify individual identity.
Best of breed authentication process available today.

Slide 8:
What Is Iris?
 Iris is a plainly visible, colored ring that surrounds the pupil.
Iris is not to be confused with the retina, which lies the inside of the
back of the eye.
 Its a muscular structure that controls the amount of light
entering the eye, with intricate details such as striations, pits,
and furrows.
Amount of information that can be measured in a single iris is much
greater than fingerprints.
 No two irises are alike.
 No correlation between the iris patterns of even identical twins,
or the right and left eye of an individual.
 Accuracy is greater than DNA.

Slide 9:
Slide 10:
Why Iris?

• Stable: The unique pattern in the human iris is formed by 10


months of age, and remains unchanged throughout one's
lifetime.

• Unique: the probability of two rises producing the same code


is nearly impossible.

• Flexible: iris recognition technology easily integrates into


existing security systems or operates as a standalone.

• Reliable : a distinctive iris pattern is not susceptible to


theft, loss or compromise.

• Non-Invasive: unlike retinal screening, iris recognition is non-


contact and quick, offering unmatched accuracy when
compared to any other security alternative, from distances as
far as 3" to 10"

Slide 11:

Principle

 Phototransistor transforms the reflected IR light into a voltage.

 The voltage is subtracted from the voltage of the nasally located

phototransistors.

 The voltage difference is demodulated and amplified.

 Resulting voltage is proportional to the angular deviation of the


eye.

Você também pode gostar