Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
By: Monika Achury and Shuchita Singh
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Registration systems in Migration Management
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Physical Security Secure the room Secure the machine – 6 ways.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
IRIS RECOGNITION 1 CITY ENGINEERING COLLEGE Technical Seminar On “IRIS RECOGNITION” By NANDAN.T.MURTHY 1CE06EC043.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Biometrics.
Jenna Lutton February 26th, 2007
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Iris Technology Presented By: D.SRIKANTH

Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured are; face, fingerprint, hand geometry, iris, retinal, signature, and voice. Biometrics is the most secure and convenient authentication tool.

Biometric technologies provides authentication to applications, networks, personal computers (PCs), and physical facilities. These are grouped into two : CONTACT BIOMETRIC TECHNOLOGIES: Fingerprint. Hand/finger geometry. Dynamic signature verification. Keystroke dynamics. CONTACT LESS BIOMETRIC TECHNOLOGIES: Facial recognition. Voice recognition. Iris scans. Retinals scan. Biometric technologies

What Is Iris? Iris is a plainly visible, colored ring that surrounds the pupil. No two irises are alike. No correlation between the iris patterns of even identical twins,or the right and left eye of an individual. Accuracy is greater than DNA.

Why Iris Technology Stable Flexible Unique Reliable Non – Invasive

Iris Technology Iris recognition is the most powerful biometric technology. Iris is a protected internal organ whose random texture isstable throughout life.

It utilizes pictures taken from human iris patterns as a unique identifier. Compares all visible attributes against the ones that are stored on file to identify individual identity.

Iris Of An Eye

Working Glance at the camera Near-infrared illumination that is very safe. Taking Picture: Creating an iris code: The picture of eye is processed by software that localizes the inner and outer boundaries of the iris

Mathematical software then encodes the iris pattern by a process called Demodulation. Demodulation phase sequence is called an Iris Code template, and it captures the unique features of an iris.

Technology Comparison MethodCoded Pattern Misidentification rate Security Iris RecognitionIris pattern1/1,200,000High FingerprintingFingerprints1/1,000Medium Hand Shape Size, length and thickness of hands 1/700Low Facial Recognition Outline, shape and distribution of eyes and nose 1/100Low Signature Shape of letters, writing order, pen pressure 1/100Low Voice printingVoice characteristics1/30Low

Current & Future Use Today: Airports, government agencies, banks, and research laboratories are utilizing this technology. Tomorrow: A leader in both IT and wireless.

Applications Document and data storage rooms. Drug and dangerous material storage rooms. Substituting for passports. Aviation security. Ration cards.

Conclusion Iris recognition is the most powerful biometric technology there is nothing else comes close to it.

T H A N K U