Jenny Chan 01062007 Handout
-
Upload
christy1rc09ec007 -
Category
Documents
-
view
216 -
download
0
Transcript of Jenny Chan 01062007 Handout
-
7/29/2019 Jenny Chan 01062007 Handout
1/48
Biometric Technology---Iris Recognition
Presented by Mei-Jane Chan (Jenny)
-
7/29/2019 Jenny Chan 01062007 Handout
2/48
How Iris Recognition works?
Source: http://www.gii.upv.es/personal/gbenet/treballs
-
7/29/2019 Jenny Chan 01062007 Handout
3/48
Covered Topics What is Biometric Identification Systems?
The Unique characteristics of Iris---Why Iris Recognition is better than other
biometrics? How Iris Recognition works?
SWOT Analysis
Conclusion
-
7/29/2019 Jenny Chan 01062007 Handout
4/48
What Is Biometrics?Technology for automated recognition or verificationof the identity of a person using unique physical or
behavioral characteristics such as fingerprints, handgeometry, iris, voice, and signatures.
Establishes an identitybased on what you are,-- Biometricsrather than
what you possess
what you remember
traditional
-
7/29/2019 Jenny Chan 01062007 Handout
5/48
Behavioral BiometricsSpeaker Recognition
Signature
Keystrokewalking style
voice recognition
*Change according to
al conditionpsychologic*Influenced by physical traits
(men/women, build)*Change a lotSimple, inexpensive equipmentNon-.offensive method
Physical BiometricsFingerprint
Facial Recognition
Hand GeometryIris Scan
Retinal Scan
DNA
Bertillonage
Vascular Patterns
*Relatively stable*Does not change much in a
lifetime*Huge, expensive equipmentneeded.*Intrusive method
Current identity systems make use of
biometrics :
Source:
http://www.idteck.com/technology/biometrics.jsp
-
7/29/2019 Jenny Chan 01062007 Handout
6/48
Why Biometrics? Security and Management
Convenience Easier fraud detection
Better than password/PIN or smartcards
No need to memorize passwords
Requires physical presence of the person to
be identified Unique physical or behavioral characteristic
Cannot be borrowed, stolen, or forgotten
Cannot leave it at home
-
7/29/2019 Jenny Chan 01062007 Handout
7/48
Biometrics Systems Overview
Enrollment Capturing biometric trait using sensor device Extracting relevant features to generate template Store template in database
Verification Generate template as in enrollment Match the template against a specific template
one-to-one search (1:1) Used for physical or computer access
Identification Match done against a set oftemplates
one-to-many search (1:N)
Used in identifying criminals
-
7/29/2019 Jenny Chan 01062007 Handout
8/48
Basic Process Flow: Biometric
System Architecture
Identification/Verification Phase
Enrollment PhaseData Capture &Conditioning
FeatureExtraction
TemplateFormation
TemplateDatabase
Data Capture &
Conditioning
Feature
Extraction
Template
Formation
TemplateMatcher
Decision
Output
http://www.idteck.com/technology/biometrics.jsp
-
7/29/2019 Jenny Chan 01062007 Handout
9/48
Ideal Traits Needed By Biometric
Systems
Universal
everyone has it
Unique
no two people have it alike Permanent
does not change and cannot be changed
Collectable
easy to obtain and quantify with a sensor
-
7/29/2019 Jenny Chan 01062007 Handout
10/48
Comparison of Major Biometric Techniques
http://www.idteck.com/technology/biometrics.jsp
LowLowHighLowHighHighHighDNA
LowMediumMediumMediumMediumMediumMediumVein
HighHighLowMediumLowLowMediumVoice
HighHighLowHighLowLowLowSignature
LowLowHighMediumHighHighHighIris
LowMediumHighMediumHighHighMediumFingerprint
LowLowLowHighMediumLowHighFace
Potential
to
fraud
Accepta-
bility
Perfor-
manc
e
Collect
able
Perman
enceUniqueUniversalBiometrics
-
7/29/2019 Jenny Chan 01062007 Handout
11/48
Iris RecognitionIris Recognition IntroductionIntroduction Iris recognition analyzes the features that exist in
the colored tissue surrounding the pupil, which has250 points used for comparison, including rings,
furrows, and freckles.
Iris recognition uses a regular video camerasystem and can be done from further away than a
retinal scan.
It has the ability to create an accurate enoughmeasurement that can be used for Identification
purposes, not just verification.
-
7/29/2019 Jenny Chan 01062007 Handout
12/48
Iris RecognitionIris Recognition IntroductionIntroduction
The probability of finding two people with identicaliris patterns is considered to be approximately 1 in1052 (population of the earth is of the order 1010).Not even one-egged twins or a future clone of aperson will have the same iris patterns.
The iris is considered to be an internal organbecause it is so well protected by the eyelid andthe cornea from environmental damage.
It is stable over time even though the personages.
Iris recognition is the most precise and fastest ofthe biometric authentication methods
-
7/29/2019 Jenny Chan 01062007 Handout
13/48
Why Iris Recognition is better than other biometrics
Features of the iris
Measurable Physical Features: 250 degrees offreedom,250 non-related unique features of a persons iris
Unique: Every iris is absolutely unique. No two iris
are the sameStable: iris remains stable from 1st year till death.
Accurate :Iris recognition is the most accurate of
the commonly used biometric technologies.Fast :Iris recognition takes less than 2 seconds.20 times more matches per minute than its closestcompetitor.
Non-Invasive :No bright lights or lasers are usedin the imaging and iris authentication process.
-
7/29/2019 Jenny Chan 01062007 Handout
14/48
Iris Recognition-Accuracy
Telephone
service
Low1/30Voice characteristicsVoiceprinting
Low-security
facilities
Low1/100Shape of letters, writing
order, pen pressure
Signature
Low-security
facilities
Low1/100Outline, shape and
distribution of eyes and
nose
Facial
recognition
Low-security
facilities
Low1/700Size, length, and thickness of
hands
Hand shape
UniversalMedium1/1,000FingerprintsFingerprinting
High-security
facilities
High1/1,200,000Iris PatternIris
recognition
ApplicationsSecurityMisidentification
rate
Coded patternMethod
source: AIM Japan, Automatic Identification seminar,
Sep 14,2001
-
7/29/2019 Jenny Chan 01062007 Handout
15/48
SPEED PERFORMANCE---A iris recognition system representated on a PIII-550 Mhz
workstation
100455 msTotal time
< 0.2< 1 msIris code matching
< 0.2< 1 msIris code extraction
41187 ms2D Freq. demodulation
3.516 msPolar reference
55250 msIris localization
% of total timeTime consuming
source : http://www.gii.upv.es/personal/gbenet/treballs
-
7/29/2019 Jenny Chan 01062007 Handout
16/48
3. How3. How Iris RecognitionIris Recognition worksworks
The process of iris recognitionStep1:
Iris image acquisition by using a monochrome CCD
(Charged couple Device) camera.Step2:
Preprocessing of the image by locating the iris,
normalizing the iris and enhancing the image.
Step3:
Extracting the local features of the iris.
Step4:
Matching the iris-code with an already stored iris code
-
7/29/2019 Jenny Chan 01062007 Handout
17/48
Access to restricted areas at US airports
http://www.cl.cam.ac.uk/~jgd1000/SchipholEnrollment.ht
ml
-
7/29/2019 Jenny Chan 01062007 Handout
18/48
Recognition of frequent flyers in lieu of passport presentation
http://www.cl.cam.ac.uk/~jgd1000/SchipholEnrollment.html
-
7/29/2019 Jenny Chan 01062007 Handout
19/48
Enrollment of frequent flyers at Schiphol Airport, NL.
http://www.cl.cam.ac.uk/~jgd1000/SchipholEnrollment.html
-
7/29/2019 Jenny Chan 01062007 Handout
20/48
Condominium entry control (with automatic elevator calling
and programming).
http://www.cl.cam.ac.uk/~jgd1000/SchipholEnrollment.html
-
7/29/2019 Jenny Chan 01062007 Handout
21/48
In lieu of passport presentation at Frankfurt/Main Airport
http://www.cl.cam.ac.uk/~jgd1000/SchipholEnrollment.html
-
7/29/2019 Jenny Chan 01062007 Handout
22/48
WatchList screening of all arriving foreigners at UAE ports of entry
http://www.cl.cam.ac.uk/~jgd1000/SchipholEnrollment.html
-
7/29/2019 Jenny Chan 01062007 Handout
23/48
Expedited check-in of departing passengers at Narita Airport
http://www.cl.cam.ac.uk/~jgd1000/SchipholEnrollment.html
Iris RecognitionIris Recognition 11 Image acquisitionImage acquisition
-
7/29/2019 Jenny Chan 01062007 Handout
24/48
Iris RecognitionIris Recognition 1.1.Image acquisitionImage acquisition
http://www.idteck.com/technology/biometrics.jsp
-
7/29/2019 Jenny Chan 01062007 Handout
25/48
Iris RecognitionIris Recognition 1.1.Image acquisitionImage acquisition
Finding an Iris in an image by a monochrome CCD(Charged couple Device) camera
Transfer the value of the different photosites outof the CCD chip.
Reading out the voltages from the CCD-chip
Thereafter the signals of each Data are amplified
and sent to an ADC (Analog to Digital Converter)
http://www.cl.cam.ac.uk/~jgd1000/
-
7/29/2019 Jenny Chan 01062007 Handout
26/48
Iris RecognitionIris Recognition1.1. Image acquisitionImage acquisition
The image acquisition is done by a
monochrome CCD-camera (640x480)covering the iris radius with at least 70photosites(=pixels).
The camera is situated normally between halfa meter to one meter from the subject.(3 to
10 inches) It uses near infrared(NIR) illumination ,so
darker irises will show more details.
Iris RecognitionIris Recognition 11 Image acquisitionImage acquisition
-
7/29/2019 Jenny Chan 01062007 Handout
27/48
Iris RecognitionIris Recognition 1.1.Image acquisitionImage acquisition
The CCD-camera The CCD-cameras
job is to take theimage from theoptical system and
convert it intoelectronic data:
Source: www.cl.cam.ac.uk/~jgd1000/
Iris RecognitionIris Recognition 22 PreprocessingPreprocessing
-
7/29/2019 Jenny Chan 01062007 Handout
28/48
Iris RecognitionIris Recognition 2.2.PreprocessingPreprocessing
Iris localization:
* The task consists of localizing the inner and outerboundaries of the iris. Both are circular, but theproblem lies in the fact that they are not co-centric The two circles must be calculated seperately.
*To do this a circle detection variant of the normallyline detecting Hough-transformation is applied byUsing polar coordinate system
Source :http://www.cl.cam.ac.uk/~jgd1000/
Iris RecognitionIris Recognition 22. PreprocessingPreprocessing
-
7/29/2019 Jenny Chan 01062007 Handout
29/48
Iris RecognitionIris Recognition 2.2. PreprocessingPreprocessing
Normalization: Two images of the same iris might be very different as a result of:
The size of the image.
Size of the pupil. Orientation of the iris.
To cope with this, the image is normalized by converting to doublydimensionless polar
Pseudo polar coordinate system
-it ranges from the pupillary boundary to limbus always as a unit
interval 0 to 1
Iris RecognitionIris Recognition 2.2. PreprocessingPreprocessing
-
7/29/2019 Jenny Chan 01062007 Handout
30/48
Iris RecognitionIris Recognition 2.2. PreprocessingPreprocessing
Enhancement: It is necessary to enhance the image to be able to
extract the iris patterns later.
The enhancement consist of Sharpening the picture with a sharpening mask
Reducing the effect of non-uniform illumination with
local histogram equalization
Figure 1 : Texture image before enhancement.
Figure 2 : Texture image after enhancement.
http://www.rpi.edu/AFS/home/03/kimjw/public_html/
-
7/29/2019 Jenny Chan 01062007 Handout
31/48
Iris RecognitionIris Recognition 3.3.Iris code constructionIris code construction
To construct the iris code,the patterns are encoded using
2D Gabor wavelet demodulation(512byte) to collect the iriscode with a length of 256 bytes (2048 bits).
This is done by using various features of the iris to come up
with a basic code a highly complex mathematical processfor computation which developed and patened by JohnDaugman ( Cambridge University )
Once the code has been computed, statistical tests can berun on it to compare it with other iris codes and search for amatch.
-
7/29/2019 Jenny Chan 01062007 Handout
32/48
The 2-D Gabor wavelet demodulation used for iris recognition are
defined in the doubly dimensionless polar coordinate
system (r, ) as shown in figure below:
Source: www.cl.cam.ac.uk/~jgd1000/
Iris RecognitionIris Recognition 3.3. the test of statistical Independence :the test of statistical Independence :C f
-
7/29/2019 Jenny Chan 01062007 Handout
33/48
Combinatorics of phase sequencesCombinatorics of phase sequences
Hamming Distance Calculation
The difference between iris codes are measured by theHamming Distance (HD), which is the number of
disagreeing bits between two iris-codes. Using XOR operatordetects disagreement between
any corresponding pair of bits Hamming Distance
Comparison of Iriscode records ,which is a measure ofvariation between the Iriscode record from the presentediris and each Iriscode record in the database.
There have been identified about 250 degrees of freedomin the iris
http://www.rpi.edu/AFS/home/03/kimjw/public_html/
Iris Recognition ---Iris Verification
-
7/29/2019 Jenny Chan 01062007 Handout
34/48
Ex :Measure of variation between a live iris and each
template stored in the database Hamming Distance CalculationHamming Distance Calculation
Source: www.cl.cam.ac.uk/~jgd1000/
33 Iris RecognitionIris Recognition Iris code constructionIris code construction
-
7/29/2019 Jenny Chan 01062007 Handout
35/48
3.3.Iris RecognitionIris Recognition -- Iris code constructionIris code construction
Verification and identification : Boolean XOR operatordetects disagreement between
any corresponding pair of bits Hamming Distance
codeA: captured iris code ex) 1101011
codeB: Stored iris code ex) 1000011maskA: Mask bit vector of captured iris codeex) 1001111maskB: Mask bit vector of stored iris codeex) 1100111
||||
||)(||
maskBmaskA
maskBmaskAcodeBcodeAHD
=
Source :
http://www.rpi.edu/AFS/home/03/kimjw/public_html/
Iris RecognitionIris Recognition Recognizing irises regardless of size
-
7/29/2019 Jenny Chan 01062007 Handout
36/48
Iris RecognitionIris Recognition Recognizing irises regardless of size,position, and orientation
Images are captured in non-ideal conditions for HDdistribution for same eyes
http://www.rpi.edu/AFS/home/03/kimjw/public_html/
Iris RecognitionIris Recognition Iris code construction andIris code construction andEntropy MeasuresEntropy Measures
-
7/29/2019 Jenny Chan 01062007 Handout
37/48
Images are captured in ideal conditions
Entropy MeasuresEntropy Measures
Source : http://www.rpi.edu/AFS/home/03/kimjw/public_html/
St ti ti l d t f h i di t
-
7/29/2019 Jenny Chan 01062007 Handout
38/48
Statistical data of hamming distance
Arbitrary test iris codes and registered iris codehas hamming distance of mean value around 0.5
http://www.cl.cam.ac.uk/~jgd1000/http://www.rpi.edu/AFS/home/03/kimjw/public_html/
http://www.cl.cam.ac.uk/~jgd1000/http://www.cl.cam.ac.uk/~jgd1000/http://www.cl.cam.ac.uk/~jgd1000/ -
7/29/2019 Jenny Chan 01062007 Handout
39/48
Uniqueness of failing the test of statisticaltest of statistical
IndependenceIndependence in 9.1 million pairs comparison
All testing organizations have reported a falsematch rate of 0 in their tests.
British Telecom US Sandia Labs UK National Physical lab, NBTC Panasonic, LG Oki EyeTicket IBM
-
7/29/2019 Jenny Chan 01062007 Handout
40/48
John Daugman (Iriscode Designer) John Daugman is a physicist and
computer-vision expert at the University
of Cambridge Computer Laboratory. He is best known for his pioneering
work in biometric identification, in
particular the development of theIrisCode algorithm that is (as of 2006)the basis of all commercially availablebiometric iris recognition systems
In 1994, Dr. Daugman patented thealgorithms, which are owned by IridianTechnologies, Inc.
http://www.cl.cam.ac.uk/users/jgd1000/history.
html
-
7/29/2019 Jenny Chan 01062007 Handout
41/48
SWOT Analysis -StrengthsHighly Protected:
internal organ of the eyeExternally visible; patterns imaged from a distance
Measurable Features of iris patternIris patterns possess a high degree of randomnessvariability: 244 degrees-of-freedomentropy: 3.2 bits per square-millimeter
Uniqueness:set by combinatorial complexity
Stable :Patterns apparently stable throughout life
Quick and accurate--- Encoding and decision-making are tractableimage analysis and encoding time: 1 second
search speed: 100,000 IrisCodes per second on 300MHz CPU
SWOT Analysis - Weaknesses
-
7/29/2019 Jenny Chan 01062007 Handout
42/48
y
Some difficulty in usage as individuals dont
know exactly where they should positionthemselves.
and if the person to be identified is notcooperating by holding the head still andlooking into the camera.
Acquisition device is much more expensive
Analysis SWOT-Strengths and
-
7/29/2019 Jenny Chan 01062007 Handout
43/48
y g
Weaknesses
Threat
Cost High-end physical security unit : $4000~5000 range Home or office : $700~800 range. Other competitors
Opportunity
More and more needed for Automatic Identification Systems.
Better solution for increased security requirements than traditionalmethods
Iris identification has low error rate Hopes to break the $500 price barrier.
-
7/29/2019 Jenny Chan 01062007 Handout
44/48
Impact of Iris Recognition
An award winning access control system Uses identification, (one to many) not verification (one to one)
matching It is non-contact. Works with glasses, protective clothing, safety
shields and contact lenses Images the iris which is stable over life. One enrollment only Is non-invasive .Uses Video based technology Has extremely fast database matching (match rates in excess of
100,000 /per second achieved on a standard PC)
-
7/29/2019 Jenny Chan 01062007 Handout
45/48
Conclusion The iris technology combines computer vision, pattern
recognition , statistical inference, and optics. Its purpose
is real-time, high confidence recognition of a personsidentity by mathematical analysis of random patterns thatare visible within iris of an eye from some distance.
The iris technology is expanding into the most reliablebiometrics feature -- -data rich of physical structure,accurate, secure, stable, and safe
The only disadvantage was the designing andmanufacturing cost
Reference :
-
7/29/2019 Jenny Chan 01062007 Handout
46/48
Reference :
Recognizing Persons By Their Iris - Dr Daugman
http://www.cl.cam.ac.uk/users/jgd1000/history.html
Technical Paper: How Iris Recognition Works - DrDaugman
http://www.cl.cam.ac.uk/users/jgd1000/history.html
Iris Recognition Technologyhttp://www.argus-solutions.com/pdfs/irisrecogwilliams.pdf
-
7/29/2019 Jenny Chan 01062007 Handout
47/48
Thank you very much
Q & A
-
7/29/2019 Jenny Chan 01062007 Handout
48/48
Movie poster for the Minority Report(2002)filmSource : http://en.wikipedia.org/wiki/Image:Minority_Report.jpg
http://en.wikipedia.org/wiki/Minority_Report_%28film%29http://en.wikipedia.org/wiki/Minority_Report_%28film%29