Вы находитесь на странице: 1из 19

A

SEMINAR

ON

IRIS RECOGNISITION SYSTEM ON MOBILE PHONE

PRESENTED BY

ODESANIMI MORUFAT

FPA/CS/15/3-0054

SUPERVISED BY

DR I.O ARAOYE

SUBMITTED TO

TO DEPARTMENT OF COMPUTER SCIENCE

SHOOL OF SCIENCE AND COMPUTER STUDIES

THE FEDERAL POLYTECHNIC, ADO-EKITI,

EKITI-STATE.

SUPERVISED BY: DR I.O ARAOYE

AUGUST 21, 2017.

1
ABSTRACT

Mobile phones play an increasingly important role on our daily lives. It is becoming
increasingly important to provide a reliable and easy to use method for securing these
devices against unauthorized access. Iris recognition is a biometrical based technology
for personal identification and verification. Iris recognizes a person from his/her iris
prints and analyses the features that have the colored tissue surrounding the pupil. The
iris is an internal organ because it is well protected by the eyelid and the cornea from
environmental damage. Old identification system use password, token cards or pins.
However, these security methods are not efficient enough due to forgotten, stolen and
forging.

2
1.0 INTRODUCTION

In today’s information technology world, security for systems and mobile phones are
becoming more and more important. The number of systems that have been compromised
is ever increasing and authentication plays a major role as a first line of defence against
intruders. The three main types of authentication are password, card or token, biometric.
Passwords are notorious for being weak and easily crackable due to human nature and
our tendency to make passwords easy to remember or writing them down somewhere
easily accessible. Cards and tokens can be presented by anyone and although the token or
card is recognizable, there is no way of knowing if the person presenting the card is the
actual owner. Biometrics, on the other hand, provides a secure method of authentication
and identification, as they are difficult to replicate and steal.
Biometrics system requires physical presence of the person to be identified. Biometric
security can be divided into two parts. First part is behavioral biometric such as signature,
speech, walking style and the other part is physical biometric such as fingerprint, facial or
iris recognition from capturing feature, the samples transformed using mathematical
function and convert it into biometric template, which will be stored in database and
allow comparisons to be made between the templates. Requirements of a biometric
feature are uniqueness, universality, permanence, measurability, user friendliness,
collectability, acceptability. The four categories of characteristics are used for
comparison between different types of biometrics; they are comfort, accuracy,
availability, costs.
Iris recognition is a biometric technology for identifying humans by capturing and
analyzing the unique patterns of the iris in the human eye. Internet-enabled mobile
phones have transformed themselves from a personal communication tool into a
ubiquitous device that many people carry around with them at all times and use to
facilitate day-to-day activities, including shopping and entertainment. As a result, many
users choose to store personal information on their mobile devices, which could range
from email addresses, bank application, important messages andphone numbers to credit
card accounts and user name/password combinations to variouswebsites.
3
This means that it is becoming increasingly important to protect the security of personal
information on mobile phones. People used password or pin number for authentication of
individual and security.The problem regarding to these security method is that, password
can be forgotten by the owner and guessed or stolen by other individual. Fingerprints,
which are widely used, can be forged (gummy fingers). So, the old method is not secured
enough because of these problems. Thisevolution of functionality increases the risks and
theseverity of sequences of loss, theft, and misuse ofmobile devices.

4
1.1 Background of the study
The concept of Iris Recognition was first proposed by Dr. Frank Burch in 1939.In the
mid-1980s two ophthalmologists, Dr. Leonard Flom and AranSafir, proposed that no two
irises are alike, even in twins, thus making them a good biometric. This belief was based
on theirclinical experience where they observed the distinctive features of irises including
the “many collagenous fibres, contraction furrows, coronas, crypts, colour, serpentine
vasculature,striations, freckles, rifts and pits.In 1936, ophthalmologist Frank Burch
proposed the concept of using iris patterns as a method to recognize an individual.
In1985, Drs. Leonard Flom and AranSafir, proposed the concept of automated iris
recognition and were awarded a patent for the iris identification concept in 1987.The first
algorithms of iris recognition was implemented in 1990 by Dr. John Daugman. Integro-
differential operators are used to detect the center and diameter of the iris. The image is
converted from Cartesian coordinates to polar coordinates and the rectangular
representation of the region of the interest is generated. Feature extraction algorithm uses
the 2D Gabor wavelets to generate the iris codes which are then matched using Hamming
distance (Daugman, 2004). The algorithm gives the accuracy of more than 99.99%.
Wildes et al.uses Hough transform, The Hough transform considers a set of edge points
and finds the circle that best fits the most edge points. Boles and Boashashhave given an
algorithm that locates the pupil center using an edge detection method, records grey level
values on virtual concentric circles, and then constructs the zero-crossing representation
on these virtual circles based on a one-dimensional dyadic wavelet transform.
Corresponding virtual circles in different images are determined by rescaling the images
to have a common iris diameter. The authors create two dissimilarity functions for the
purposes of matching, one using every point of the representation and the other using
only the zero crossing points. The algorithm has been tested successfully on a small
database of iris images, with and without noise. Lim, et al. iris localization and
conversion to polar coordinates relative to the center of the pupil, Are alternative
approaches to both feature extraction and matching. Tisse et al. proposed a segmentation
method based on integro- differential operator with Hough transform.

5
2.0 LITERATURE REVIEW
This chapter will discuss about the literature which is related to iris recognition
processing.
2.1 BIOMETRIC IDENTIFICATION
According to Patil, (2009) Identification of human through biometric technologies is
becoming common. Different biometric technologies like finger, face, voice, iris
recognition, etc. use different behavioral or psychological characteristics of human for
recognition. Application of biometric system are used in computer systems security,
secure electronic banking on mobile phones, credit cards, secure access to buildings,
health and social services Arun, R. (2010). Firstly, an individual is enrolled into a
database using specified method, and then the information of certain characteristics is
captured. The information taken is then transform into algorithm then turn it into code.
The information is again placed through the algorithm, the new code is compared with
the ones in the database to discover a match and hence, identification Arun, R. (2010).
In study of Jain, Ross, and Prabhakar (2004), they state that there are certain
requirements that must be met for physical characteristics in biometric system. Such as:

I. Universality, this means that every individual must have unique characteristics.

II. Distinctiveness is only owned by one person which each characteristic is different
within human.

III. Permanence, this means that the characteristic is stable and unchangeable.

IV. Collectability, the data can be measured quantitatively.

6
2.2 HUMAN IRIS RECOGNITION
Iris recognition is an automated method of biometric identification that uses
mathematical pattern recognition techniques. According to Masek (2003), the iris is a thin
circular diaphragm, which lies between the cornea and the lens of the human eye. Iris
recognition is a type of pattern recognition of a person’s iris recorded in a database for
future attempts to determine or recognize a person’s identity when the eye is viewed by a
reader. The iris usually has a brown, blue, gray, or greenish color, with complex patterns
that are visible upon close inspection. Iris is a combination of specific characteristics such
as crypts, freckles, pits, radial furrows and striation. Iris recognition is the most reliable
biometric system available because of iris uniqueness Elgamal, M. (2013).
Each person have their own unique iris pattern, the different even exist between identical
twins. Biometric system of iris recognition can be used to identify a person by analyzing
the patterns found in the iris. (Ahmad and Tamimi, 2012). Iris is a protected internal
organ and is it stable throughout life, it can serve as a kind of living password that one
need not remember but one always carries along. (Chaskar and Sutaone, 2010). Iris has
great advantages, such as variability, stability and security, thus it is the most promising
for high security environments Elgamal, M. (2013).
The human eye anatomy is illustrated in figure 1 and 2

Fig 1:Iris Recognition Figure 2:Human eye anatomy

2.3 ARCHITECTURE OF IRIS RECOGNITION


The block diagram in Figure 3 depicts the principle steps of the proposed iris recognition
system and is described in the following. The system has two sub–systems: the iris
7
enrolment system and the iris verification system. The iris enrolment system is to enrol
the iris in the database for further identification. The iris verification system compares a
newly input iris with the known irises in the database and decides if it is in the database.

The iris enrolment system is comprised of the following modules: The image acquisition
module, the Pre-processing Module, the feature extraction module, the Enrolment
Module, and the Iris Pattern Database. The iris verification system does not have the
Enrolment Module, but has two additional modules: pattern matching module and the
Identification Module.

Figure 3: Iris Recognition System


(Source:Chaskar and Sutaone, 2010)

8
2.4 COMPONENT OF IRIS RECOGNITION
The iris recognition consisted of three major components: Image Pre-processing, Feature
Extraction and Pattern matching.

IMAGE PREPROCESSING:
The acquired image always contains not only the “useful” parts (IRIS) but also some
“relevant” parts (e.g. eyelid, pupil). Under some conditions, the brightness is not
uniformly distributed. In addition, different eye-to-camera distance may result in different
image sizes of the same eye. For the purpose of analysis, the original image needs to be
processed. The processing is composed of two steps which are Iris Localization and Iris
Normalization.

Iris Localization: Iris localization by definition means to isolate the actual iris region in
a digital eye image by detecting the inner and outer boundary of the iris. Figure 3 shows
the Iris Localization. The eyelids and eyelashes normally occlude the upper and lower
parts of the iris region. A technique is required to isolate and exclude these artefacts as
well as locating the circular iris region. The aim of this is to detect the iris portion which
can be approximated by two circles, one is the iris/sclera (outer) boundary, and another
interior to the first is the iris/pupil (inner) boundary. Iris Localization is done by the
process of Iris segmentation which localizes the correct iris region in an eye image. Iris
segmentation is an essential in automated iris processing systems, because it is the basis
for any further operations.

9
Figure 4: Localization of Iris
(Source: Chaskar and Sutaone, 2010)
Iris Normalization:
Once the iris region is segmented, the next stage is to normalize this part so as to enable
the generation of the iris-code and their comparisons. Since the variations in the eye, like
optical size of the iris, position of pupil in the iris, and the iris orientation change from
person to person, it is required to normalize the iris image so that the representation is
common to all, with similar dimensions. The normalization process involves un-wrapping
the iris and converting it into its polar equivalent.

FEATURES EXTRACTION
The extraction of iris features means capturing ring-shape patterns around the iris area.
After capturing the eye image, the iris area should be correctly extracted from it.
Detecting the inner boundary of the iris against the pupil and the outer border of the iris
against the sclera finishes the process.

PATTERN MATCHING

After iris localization, the final step is pattern matching of the iris image which generates
a match score by comparing the feature sets of two iris images. One technique for
comparing two Iris-Codes is to use the Hamming distance, which is the number of
corresponding bits that differ between the two Iris-Codes. The iris pattern is different for
every person (even identical twins don’t have the same iris pattern). These patterns are

10
used to create templates for iris recognition.The acquired image is matched with the
whole database of templates.

2.5 IRIS RECOGNITION PROCESS

The process of capturing an iris into a biometric template is made up of 3 steps:


I. Capturing the image
II. Defining the location of the iris and optimizing the image
III. Storing and comparing the image

CAPTURING THE IMAGE:


The image of the iris can be captured using a standard camera using both visible and
infrared light and may be either a manual or automated procedure (Figure 4). The camera
can be positioned between three and a half inches and one meter to capture the image. In
the manual procedure, the user needs to adjust the camera to get the iris in focus and
needs to be within six to twelve inches of the camera. This process is much more
manually intensive and requires proper user training to be successful. The automatic
procedure uses a set of cameras that locate the face and iris automatically thus making
this process much more user friendly.

DEFINING THE LOCATION OF THE IRIS AND OPTIMISING THE IMAGE


Once the camera has located the eye, the iris recognition system then identifies the image
that has the best focus and clarity of the iris (Figure 5). The image is then analysed to
identify the outer boundary of the iris where it meets the white sclera of the eye, the
pupillary boundary and the centre of the pupil. This results in the precise location of the
circular iris.

11
Figure 5: Circular Iris Location
(Source: Penny Khaw, 2002)

The iris recognition system then identifies the areas of the iris image that are suitable for
feature extraction and analysis. This involves removing areas that are covered by the
eyelids, any deep shadows and reflective areas. The following diagram (Figure 6) shows
the optimization of the image.

Figure 6: Optimizing the image

12
STORING AND COMPARING THE IMAGE
Once the image has been captured, “an algorithm uses 2-D Gabor wavelets to filter and
map segments of the iris into hundreds of vectors (known here as phasors). The 2-D
Gabor phasor is simply the “what” and “where” of the image. Even after applying the
algorithms to the iris image there are still 173 degrees of freedom to identify the iris.
These algorithms also take into account the changes that can occur with an iris, for
example the pupil’s expansion and contraction in response to light will stretch and skew
the iris. This information is used to produce what is known as the Iris-Code, which is a
512-byte record. This record is then stored in a database for future comparison. When a
comparison is required the same process is followed but instead of storing the record it is
compared to all the Iris-Code records stored in the database. The comparison also doesn’t
actually compare the image of the iris but rather compares the hexadecimal value
produced after the algorithms have been applied.In order to compare the stored Iris-Code
record with an image just scanned, a calculation of the Hamming Distance is required.
The Hamming Distance is a measure of the variation between the Iris-Code record for the
current iris and the Iris-Code records stored in the database. Each of the 2048 bits is
compared against each other, i.e. bit 1 from the current Iris-Code and bit 1 from the
stored Iris-Code record are compared, then bit 2 and so on. Any bits that don’t match are
assigned a value of one and bits that do match a value of zero. Once all the bits have been
compared, the number of non-matching bits is divided by the total number of bits to
produce a two-digit figure of how the two Iris-Code records differ. For example a
Hamming Distance of 0.20 means that the two Iris-Codes differ by 20%.

13
Iris Recognition Process

Figure 7: Iris Recognition Process

IRIS RECOGNITION DIAGRAM

Fig 8: A block diagram of an iris recognition system

The iris recognition system is consisting of 5 steps shown in fig 3&4. Therefore the iris
recognition systems steps are as follows:
14
Step1:Image Acquisition: It is the process of acquiring image, which is done using CCD
camera or we can use database. Typically image is acquired using a sensor of adequate
resolution to capture the iris texture. The device used for acquiring iris images is typically
referred to as an iris sensor.When Acquiring images of Iris need consider good resolution
, sharpness of image and need to maintain adequate intensity of source. Mostly or image
acquisition the CCD camera is used
Step2:Iris segmentation: when eye is captured in CCD camera, next need to acquire
only iris pattern .it including localization of iris inner and outer boundaries and
localization of boundary between iris and eyelids.
The process of automatically locating the iris boundaries and excluding the noisy regions
is called as iris segmentation. if segmentation is improper then it can lead to incorrect
feature extraction Hence for correct person identification need to proper segmentation.
Segmentation stage includes following steps:
I. Localization of iris inner boundary
II. Localization of iris outer boundary
III. Localization of boundary between eyelids and iris.
Step3: Iris Normalization: After achieving circular iris, which is to be converted to
rectangular form. The segmented iris is usually unwrapped that means the size of the iris
can vary significantly across images due to pupil dilation and contraction, resolution of
the sensor used. to address such a variation the normalization is used. Once the iris region
is successfully segmented then next step is to transform this iris region into fixed
dimensions for patternmatching. This normalization operation is performed by
representing the segmented iris as a rectangular image in normalization converts each
Cartesian coordinates to polar coordinates.
Steps for normalizing Iris image.
I. Use of Daugman’s rubber sheet model.
II. Representing Cartesian to polar coordinates.
III. Output normalized iris image.

15
Step 4: Feature Extraction: Decomposing and formation of iris pattern into iris codes
This is important step in automatic iris recognition is which have ability of extracting
some unique attributes from iris,
Step 5:Matching or Verification : In this stage doing comparing of new pattern with
reference pattern which are stored in database .images are accept and reject is based on
this comparison.
APPLICATION AREA OF IRIS BIOMETRICS ARE
Baking: (ATM) and Internet banking are vulnerable to fraud. The Iris biometric can be
used to
address some of the problems related to Internet banking and ATMs.
 Computer login: The iris as a living password.
 National Border Controls
 Driving licenses and other personal certificates.
 Birth certificates, tracking missing.
 Credit-card authentication.
 Anti-terrorism (e.g. suspect Screening at airports)
 Secure financial transaction (e-commerce, banking).
 Internet security, control of access to privileged information.

16
ADVANTAGES OF IRIS RECOGNITION
1. Highly protected, internal organ of the eye. A person’s iris is fully developed within 18
months after birth, and is protected by eyelashes, eyelids and the retina. This
distinguishes it from fingerprints, which can be difficult to recognize after years of
certain types of manual labour.

2. Externally visible pattern imaged from a distance

3. Patterns apparently stable throughout life

4. Iris shape is far more predictable than that of the face

5. No need for a person to touch any equipment

6. Its higher uniqueness in shape than face or fingerprints ensures that an authentication
system using the iris is immensely reliable.

7. Iris recognition is proven the highest accuracy in biometrics. Iris recognition had no
false matches

DISADVANTAGES OF IRIS RECOGNITION

I. Localization fails for dark iris

II. Highly prone for changes in weather or due to infection

III. The iris is a very small organ to scan from a distance. It can be obscured by
eyelashes, lenses, reflections. Subjects who are blind or cataracts can also pose a
challenge to iris recognition, as there is difficulty in reading the iris.

IV. Iris recognition is very difficult to perform at a distance larger than a few meters
and if the person to be identified is not cooperating by holding the head still and
looking into the camera.

17
CONCLUSION
The need for secure methods of authentication is becoming increasingly important in
thecorporate world today. Passwords, token cards and PINs are all risks to the security of
anorganization due to human nature. Our inability to remember complex passwords and
tendencyto write these down along with losing token cards or forgetting PINs all
contribute to the possiblebreakdown in security for mobile phones.The uniqueness of the
iris and low probability of a false acceptance or false rejection allcontribute to the
benefits of using iris recognition technology. It provides an accurate and securemethod of
authenticating users onto mobile phone, is a non-intrusive method and has thespeed
required to minimize user frustration when accessing phones. Users no longerhave to
worry about remembering passwords or having weak passwords that areeasily cracked.

18
REFERENCES

Arun, R. (2010). Iris Recognition: The path forward. IEEE Computer Society, PP6-7.

Daugman, J. (2001). The Importance of Being Random: Statistical Principles of Iris

(Ahmad and Tamimi, 2012), Recognition. International Journal of Wavelet, Multi-

resolution and Information Processing, PP3-6.

Daugman, J. and Downing, C. (2001). Epigenetic Randomness, Complexity and

Singularity of Human Iris Patterns. Proceedings of the Royal Society: Biological Science,

PP1737-1738.

Elgamal, M. (2013). An Efficient Feature Extraction Method for Iris Recognition Based

on Wavelet Transformation. International Journal of Wavelets, Multi-resolution and

Information Processing, PP10-11.

Jain, Ross, and Prabhakar (2004), An Efficient Feature Extraction Method for Iris

Recognition Based on Wavelet Transformation. Laser Focus World, PP64-65.

(Chaskarand Sutaone, 2010). Research and Development of an Iris-Based Recognition

System for Identification and Secure Authentication. Information and Security, PP39-57.

Masek (2003), A New Approach to Iris Pattern Recognition. Boca Raton: FL: CRC Press.

John, D. (2003). The Importance of Being Random: Statistical Principles of Iris

Recognition. Pattern Recogntion, PP1-17.

Penny, K. (2002). Iris Recognition Technology for Improved Authentication. SANS

Institute, InfoSec Reading Room, P6.

Source: Yingzi Du and Ives Robert, (2004),Iris Recognition System,www.wikipedia.org

19

Вам также может понравиться