18-03-2011, 09:10 AM
Biometrics in Network Security.doc (Size: 305 KB / Downloads: 77)
Abstract:
In today’s information technology world, security for systems is becoming more and more important. One area where security can be improved is in authentication. Biometric, provides one of the most secure methods of authentication and identification Biometric identification utilizes physiological and behavioural characteristics to authenticate a person’s identity, which are both unique and measurable.
Some common physical characteristics that may be used for identification include fingerprints, palm prints, hand geometry, retinal patterns and iris patterns. Behavioural characteristics include signature, voice pattern and keystroke dynamics. Among all these techniques we have chosen iris recognition because, that no two irises are alike, even in twins, thus making them a good biometric.
In this paper, we deduced the most important, efficient and accurate method of authentification and verification using Iris Recognition Technology. In addition to these we have also discussed the advantages of Iris Recognition Technology including its applications.
INTRODUCTION
Iris recognition, a biometric, provides one of the most secure methods of authentication and identification thanks to the unique characteristics of the iris. An Iris Recognition system works by capturing and storing the biometric information and then comparing the scanned biometric with what is stored in the repository. Once the image of the iris has been captured using a standard camera, the authentication process, involving comparing the current subject’s iris with the stored version, is one of the most accurate with very low false acceptance and rejection rates. This makes the technology very useful in areas such as information security, physical access security, ATMs and airport security.
The technology is accurate, easy to use, non-intrusive, and difficult to forge. Iris recognition technology does provide a good method of authentication to replace the current methods of passwords, token cards or Pin’s and if used in conjunction with something the user knows in a two-factor authentication system then the authentication becomes even stronger.
KNOWLEDGE OF IRIS:
The iris is the plainly visible, colored ring that surrounds the pupil. It is a muscular structure that controls the amount of light entering the eye, with intricate details that can be measured, such as striations, pits and furrows. The iris is not to be confused with the retina, which lines the inside of the back of the eye. The amount of information that can be measured in a single iris is much greater than fingerprints, and accuracy is greater than DNA
IRIS RECOGNITION PROCESS:
The process of Iris Recognition is made up of three steps:
Capturing the image
Defining the location of the iris and optimizing the image
Storing and comparing the image.
1. CAPTURING THE IMAGE
The image of the iris can be captured using a standard camera using both visible and infrared light and may be either a manual or automated procedure. The camera can be positioned between three and a half inches and one meter to capture the image. In the manual procedure, the user needs to adjust the camera to get the iris in focus and needs to be within six to twelve inches of the camera.
This process is much more manually intensive and requires proper user training to be successful. The automatic procedure uses a set of cameras that locate the face and iris automatically thus making this process much more user friendly.
2. DEFINING THE LOCATION OF THE IRIS AND OPTIMIZING THE IMAGE
2.1 LOCATION OF IRIS
Once the camera has located the eye, the iris recognition system then identifies the image that has the best focus and clarity of the iris. The image is then analyzed to identify the outer boundary of the iris where it meets the white sclera of the eye, the pupillary boundary and the centre of the pupil. This results in the precise location of the circular iris.