Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: BIOMETRICS IN IRIS TECHNOLOGY
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
BIOMETRICS IN IRIS TECHNOLOGY

[attachment=23302]


INTRODUCTION
In olden days people were identified by birth marks facial features and scans which were biometrics then. Biometrics is slowly but surely becoming standards of Authentication in everyday life. Banks worldwide are already experimenting with iris and Retinal scans for ATM machines; laptops are being produced with built in finger print scanners. There are more and more industries going biometric way. With the advent of Modern era, it has become important to go for technologies, which are more secure.
As time evolved various issues of the security, using recognition technologies has evolved. It comes in various forms like
1. Iris and retinal scans
2. Facial recognition
3. Finger print
4. Voice recognition
5. Hand geometry

IRIS AND RETINAL SCANS
Iris and retinal scans are two completely different methods of identification. The iris is photographed using a conventional COD camera, and the resultant image is compared to the template image that is stored in the database for iris characteristics such as filaments, crypts, striations and freckles. In retinal scanning, the capillaries at the back of the eye are analyzed but it creates problem with those using spectacles.

FACIAL RECOGNITION
Facial recognition tries to match various facial characteristics such as distance between eyes, width of nose, cheekbones, jaw line and chin characteristics to arrive at an identity match. This has found limited success in practical applications due to various factors such as facial features being covered by hats or hair, reflection from spectacles angle of capture.

HAND GEOMETRY
Hands by themselves are not descriptive enough to result in positive Identification. It takes into consideration a combination of various factors such as shape, Size, finger length, thickness, and such. It is generally used where fingerprint is considered intrusive.


FINGERPRINT SCANS
Fingerprinting has played a very important role in forensics. Fingerprint scanning devices are one of the most common biometric devices available. However the device used are slightly more complex. They follow various methods from matching print patterns such as whorls, cusps, and ridge the matching of at least 15 different characteristics.


VOICE RECOGNITION
This is favorite of moviemakers. Some often access their cars, secret underground tunnels by just mentioning a few key phrases. Voice verification is not effective because acoustics and other external disturbances interfere with the process.
Iris is a pat inside our eye, which is unique in every individual, it remains unchanged till end of life this is the most prominent technique that can be implemented. The capture of iris is very simple one even need not stand before the camera. So here, we try to give the details of how iris scan is implemented.

WHAT IS IRIS RECOGNITION TECHNOLOGY

Iris recognition is the best of breed authentication process available today. Iris recognition takes a picture of the iris; this picture is used solely for authentication it is different from retinal scanning.

Iris security system is smoother, smarter and more secure identification system Automated high speed iris capturing and precision identification make iris identification system the world's most advanced access and entry point security identification system. The automatic capturing of iris, identification is as simple as looking at the camera. High speed and precision make this system the world's most advanced access and entry point security identification system.
Using the iris recognition technology has reduced errors to less than one in 1.2 million ensuring highly precise individual identification. Confusion or duplication with another individual is virtually impossible. No physical contact makes it perfectly safe. As the users simply need to stand in front of the camera, physical contact is not required. A very weak amount of infrared illumination is used, making the system. Perfectly safe.

SPECIFICATIONS:

Specifications of the camera used to capture the iris are-
1. It takes approximately 3 seconds for recognition that is to capture the eye and check the data.
2. It can recognize up to 4000 irises i.e. 2000 persons. This accepts an ID of maximum 17 digits and a password of 10 digits.
3. The iris can be captured within a distance of 20 meters from control unit. Backup for iris recognition is password access by 10 key inputs.
4. The camera can be installed on the table with camera stand indoor application only and only in vertical direction.
5. It requires a power of 32v DC from control unit max. 20m, from control unit and 24v DC with power supply of unit max. Of 100m from control unit.
6. The operating temperature is from +zero deg c - +40 deg c932 deg f- 104 deg f) and operating humidity is 20% to 80%.
7. Dimensions are 430//211//80mm (16-15/16”//8-5/16”// -1/8”).Weight approximately 6KGs (13.2lbs).