Iris Recognition: Sathya Swathi Mabbu Long N Vuong
Iris Recognition: Sathya Swathi Mabbu Long N Vuong
Iris Recognition: Sathya Swathi Mabbu Long N Vuong
Topics
Technique of iris recognition Attacks Implementation Advantages & Disadvantages
Technique
Step 1: Capturing the image of the eye using a camera. Step 2: Differentiating the outline of the iris and the sclera, and the pupil from the iris.
sclera
iris
pupil
Step 3: Encoding the image using demodulation (also removes reflections, intrusion of eye lid lashes, contact lens outline etc.,). Code is 256 bytes.
[Code A (XOR) Code B] AND Mask A AND Mask B H.D = Mask A AND Mask B
Speed Performance
On a 300 MHz workstation, the execution times for the steps in iris recognition are listed below,
Operation Time Image focus 15 millisec Scrub specular reflections 56 millisec Localize eye and iris 90 millisec Fit pupillary boundary 12 millisec Detect both eyelids 93 millisec Remove lashes and contact lens edges 78 millisec Demodulation and IrisCode creation 102 millisec XOR comparison of two IrisCodes 10 micro sec
Attacks
1. Iris patterns printed on contact lens Countermeasure: 2D Fourier Transform
Attacks cont
Digital Replay attack Countermeasure: Encryption of iris code, database security. Example: Iridian Technologies has established 3DES Encryption as the standard.
Attacks cont
Picture of an iris Countermeasure: Liveness test ( on command eye movement, pupillary light reflex , red eye effect, light absorption properties of living tissue, hippus etc.,)
Each image is given to the P&A Unit for recognition: 1. Splits the colored image and tests the morphology 2. Transforms the image in a 3D image 3. Transforms the image in the frequencies domain 4. Transforms the image in a multidimensional objects, then the algorithm executes the last analysis to recognize a person
Q&A