Saturday, April 24, 2010

biometric security- iris recognisation technology

1) ABSTRACT
2) WHAT IS BIOMETRICS
3) WHY WE USE BIOMETRICS
4) TYPES OF BIOMETRICS
5) IRIS SCANNING
6) HOW IT WORKS
7) THE ACCURACY OF IRIS RECOGNISATION
8) APPLICATIONS
9) ADVANTAGES & LIMITATIONS
10) CONCLUSION.








ABSTRACT: In the present scenario security has become a major aspect. From ATM to AIRPORTS security has become important. The number of system that have been comprised is ever increasing and authenticity plays a major role as a first line of defense against intruders. Identity verification has become a challenging task and an attractive goal when it has to be automated with high accuracy and no reputability .The three main types of authentification are something you know (such as password) ,something you are (BIOMETRIC). The first 2two methods are inadequate to meet heavy demands as are notorious and easily crack able, so it become very difficult to identify the actual owner. In this context automated biometrics can meet all the demand as they are difficult to replicate and steal. However this paper deals with Irises technology and requirements and developments for future security systems.

I. WHAT IS BIOMERTICS?
Biometrics is development of statistical and mathematical methods applicable.
The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics, such as fingerprints, irises, voice patterns, facial patterns, and hand measurements, for identification and verification purposes.
II.WHY WE USE BIOMETRICS?
It makes it possible to guarantee in an absolute, infallible way and ultra confidential safety, the recognition and access control with the physical places or the information processing systems, revolutionizing in same time the securisation and the authentification of E-business and E-trade.
III. TYPES OF BIOMETRICS: There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification.

Examples of physical biometrics include:
Bertillonage - measuring body lengths
• Fingerprint - analyzing fingertip patterns
Facial Recognition - measuring facial characteristics
Hand Geometry - measuring the shape of the hand
• Iris Scan - analyzing features of colored ring of the eye
Retinal Scan - analyzing blood vessels in the eye
• Vascular Patterns - analyzing vein patterns
DNA - analyzing genetic makeup
Examples of behavioral biometrics include:
Speaker Recognition - analyzing vocal behavior
Signature - analyzing signature dynamics
Keystroke - measuring the time spacing of typed words
Major limitations of each BIOMETRICS: In the case of
Bertillonage - body lengths no longer used.
Fingerprint – we can change the hand or by gambling also.
Facial Recognition - facial characteristics will change time to time.
Hand Geometry - the shape of the hand also change the age and not accurate.
Iris Scan – Not applicable for blind people.
Retinal Scan – Eye will be effected more and more.
Vascular Patterns - Vein scans usually use radioactive particles. DNA –DNA is same for twins.
Speaker Recognition - vocal behavior can be change by imitations.
Signature – forgery of signature dynamics
Keystroke – not at all that much of accurate.
Out of all these biometric methods the accurate method is one and only one method which is referred to as Iris scanning method.
HISTORY: The idea of using iris patterns for personal identification was originally proposed in 1936 by ophthalmologist Frank Burch. By the 1980's the idea had appeared in James Bond films, but it still remained science fiction and conjecture. In 1987 two other ophthalmologists, Aran Safir and Leonard Flom, patented this idea, and in 1989 they asked John Daugman (then teaching at Harvard University) to try to create actual algorithms for iris recognition. These algorithms, which Daugman patented in 1994 and are owned by Iridian Technologies, are the basis for all current iris recognition systems and products.
Iris scanning can seem very futuristic, but at the heart of the system is a simple CCD digital camera.. It uses both visible and near-infrared light to take a clear, high-contrast picture of a person's iris. With near-infrared light, a person's pupil is very black, making it easy for the computer to isolate the pupil and iris.
When you look into an iris scanner, either the camera focuses automatically or you use a mirror or audible feedback from the system to make sure that you are positioned correctly. Usually, your eye is 3 to 10 inches from the camera. When the camera takes a picture, the computer locates:
• The center of the pupil
• The edge of the pupil
• The edge of the iris
• The eyelids and eyelashes
It then analyzes the patterns in the iris and translates them into a code.Iris scanners are becoming more common in high-security applications because people's eyes are so unique (the chance of mistaking one iris code for another is 1 in 10 to the 78th power. They also allow more than 200 points of reference for comparison, as opposed to 60 or 70 points in fingerprints.
The iris is a visible but protected structure, and it does not usually change over time, making it ideal for biometric identification. Most of the time, people's eyes also remain unchanged after eye surgery, and blind people can use iris scanners as long as their eyes have irises. Eyeglasses and contact lenses typically do not interfere or cause inaccurate readings.
V. IRIS SCAN: Iris scans analyze the




features that exist in the colored tissue surrounding the pupil which has more than
200 points that can be used for comparison, including rings, furrows and freckles. The scans use a regular video

camera style and can be done from further away than a retinal scan. It will work through glasses fine and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes, and not just verification.
VI. HOW IT WORKS: The user places himself so that he can see his own eye's reflection in the device. The user may be able to do this from up to 2 feet

may need to be as close as a couple of inches depending on the device. Verification time is generally less than 5 seconds, though the user will only need to look into the device for a couple moments.
To prevent a fake eye from being used to fool the system, these devices may vary the light shone into the eye and watch for pupil dilation.
Identification vs. Verification:
Iris recognition identifies people rather than verifying their identity.
Verification: asks; Is this person who they say they are? This is one-to-one matching which means a person must first suggest their identity through a password, card or name and the system then seeks to determine whether or not there is a match between the suggested and true identities.
Identification: asks; Who is this person? This is one-to-many matching meaning that the person is not required to carry anything or volunteer any information. The system simply captures the iris image, searches the entire database and either finds their identity or reports that they are unknown. This is obviously a much more powerful form of authentication as no information is required from the user.
It has several features .those are
Stable: - the unique pattern in the human iris is formed by 10 months of age, and remains unchanged throughout one's lifetime.
Unique: - the probability of two rises producing the same code is nearly impossible.
Flexible: - iris recognition technology easily integrates into existing security systems or operates as a standalone.
Reliable: - a distinctive iris pattern is not susceptible to theft, loss or compromise Non-Invasive: - a distinctive iris pattern is not susceptible to theft, loss or compromise.
This proven biometric approach is fast and remarkably accurate, and lets you design systems that overcome the limitations of typical card or password strategies.
VII. The accuracy of Iris Recognition:
Iris readers use state-of-the art Iris Recognition technology to verify the


identity of authorized persons positively and definitively - with virtually no chance of mis-identification in all applications.
The identification is based on the intricate patterns in the iris of the eye, the ring-shaped structure that gives the eye its color. No two individuals, not even identical twins, have the same exact iris pattern.

Panasonic Iris Recognition has a false acceptance ratio of 0.001% to 0.0001%, making it far more accurate than other biometric approaches.
• 100 to 1,000 times more accurate than spot fingerprinting
• 1,000 to 10,000 times more accurate than hand-print verification
• 3,000 times more accurate than voice prints.
A complete, ready-to-use solution: Iris Readers incorporate a specially-designed video camera for capturing iris images, along with on-board software for processing the iris images and communicating with other elements of your access control system.
Identify almost instantly:
Then, at each access point, a user simply 'looks into' the Reader mounted alongside the doorway. The Reader captures a video image of the iris, translates it to an IrisCode, and compares it to the authorized IrisCodes on file. If there's a proper match, the Reader signals your access system accordingly. It takes about 1.5 seconds. And works with contact lenses, glasses, even protective goggles and face shields.
Ultra-accurate, almost impossible to defeat:

Iris Readers use built-in countermeasures that make them virtually impossible to counterfeit or spoof.
In fact, it's estimated the chance of two irises being identical is 1 in 1078 : Of all the biometric technologies used for human authentication today, it is generally conceded that iris recognition is the most accurate. Iris recognition technology offers the highest accuracy in identifying individuals of any method available. This is because no two irises are alike - not between identical twins, or even between the left and right eye of the same person. Irises are also stable; unlike other identifying characteristics that can change with age; the pattern of one's iris is fully formed by ten months of age and remains the same for the duration of their lifetime. Iris recognition technology is also accurate because it uses more than 240 points of reference in an iris pattern as a basis for a match. By comparison, fingerprints use about 60.
Iris recognition technology works by combining computer vision, pattern recognition, and optics. First, a black-and-white video camera zooms in on the iris and records a sharp image of it. The iris is lit by a low-level light to aid the camera in focusing. A frame from this video is then digitized into a 512 byte file and stored on a computer database.
Iris recognition technology is capable of recording this image from as much as 16 inches (40.64 centimeters) away, so no physical contact is necessary. An individual's identity can then be confirmed by taking another picture of their iris and comparing it to the database. Iris recognition technology can confirm someone's identity within a few seconds.
Iris recognition technology is currently used at physical access points demanding high security, such as airports, government buildings, and research laboratories. However, some hotels have experimented with using iris recognition technology in place of a room key. The potential exists for iris recognition technology to replace most current forms of physical access-based identification. This would include anything requiring a password, personal identification number (PIN), or key; such as electronic transactions, building access, or automobile ignition. And unlike those physical methods of identification, an iris cannot be stolen. Iris recognition technology addresses the problems of both password management and fraud.
What about DNA?
The birth rate of identical twins is 1 in 121 births or 0.82%. As identical twins share the same DNA, the false acceptance rate for any DNA based system must be at least 0.82% due to the birth rate alone. DNA testing is an invasive technology with a cotton swab inserted into the mouth the most common method of obtaining a sample. Combine this with the negative stigma associated with DNA sampling and it becomes clear that iris recognition is the most accurate, safe, user-friendly and fastest identification system on the market.
VIII. APPLICATIONS:
Law enforcement agencies in the United States began using it in 1994 when the Lancaster County Prison in Pennsylvania became the first correctional facility to employ the technology for prisoner identification. The use of iris scans as part of the booking procedure along with fingerprints is just beginning to come into existence. Police stations around the country have been looking into the technology and some, including the Barnstable County jail in Massachusetts which put in a system in early 2002. The power of this biometric may make it rival fingerprints for booking situations where identification and verification are vital .In Berkshire County, the technology is used in the newly built Berkshire County Jail as a security check for employees. The Charlotte/Douglas International Airport in North Carolina and the Flughafen Frankfort Airport in Germany allow frequent passengers to register their iris scans in an effort to streamline boarding procedures. There is discussion that banks may someday make iris scans a routine part of ATM transactions and some have begun taking the first steps in testing out these systems.

In Criminal activities:
Financial fraud - This type of identity theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more. In fact, a total of 25 types of financial identity fraud are investigated by the United States Secret Service. While financial identity theft is the most prevalent (of the approximate 10,000 financial crime arrests that Secret Service agents made in 1997, 94 percent involved identity theft), it certainly isn't the only type. Other types of identity theft, however, usually involve a financial element as well -- typically to fund some sort of criminal enterprise.
Criminal activities
This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get special permits, hide one's own identity, or commit acts of terrorism. These criminal activities can include:
 Computer and cyber crimes
 Organized crime
 Drug trafficking
 Alien smuggling
 Money laundering
In order to avoid all the crime activities and fraud activities we should use Iris technology .
COMPARISION WITH OTHER BIOMETRIC TECHNOLOGIES:
Cost-precision relation: When one calls upon one of these techniques, one first seeks precision, but one also interests in the cost. The graph below shows us the situation of certain techniques compared to these two criteria.

We can notice that, in spite of its 5th place in the market, the iris method of is the most precise, but also the most expensive. It is moreover this technique, particularly effective, that one finds in the film "Minority Report" of Steven Spielberg.
1. This content belongs to



LIMITATIONS: 1) It will affect the eye & not applicable to eye challenged people.
2) The properties can be changed if any eye damage occurred.
3) If retina has changed then it may not be applicable.

Evaluation: The uniqueness of eyes, even between the left and right eye of the same person, makes iris scanning very powerful for identification purposes. The likelihood of a false positive is extremely low and its relative speed and ease of use make it a great potential biometric. The only drawbacks are the potential difficulty in getting someone to hold their head in the right spot for the scan if they are not doing the scan willingly. It also takes up a bit more memory for the data to be stored, but with the advances in technology, this is unlikely to cause any major difficulty.


IX. ADVANTAGES of IRIS TECHNOLOGY SYSTEM:
1) The system involves no lasers, bright lights, or any hazardous technology at all. It's as safe to use as any video camera.

2) An award winning access control system.
3) Has no requirement or costs for cards or PIN's .
4) Is more accurate than DNA matching. No recorded instance of a false accept.
6) Has a very small record size (IrisCode 512 bytes).
6) Uses identification, (one to many) not verification (one to one) matching 7) Is non-contact. Works with glasses, protective clothing, safety shields and contact lenses.
8) Images the iris which is stable over life. One enrolment only.
9) Is non-invasive and non-contact. 10)Uses Video based technology .
11) Has extremely fast database matching (match rates in excess of 100,000 per second achieved on a standard PC).


CONCLUSION: In order to avoid all the crime activities and fraud activities and for Anti-terrorism, we should use Iris technology. The uniqueness of eyes, even between the left and right eye of the same person, makes iris scanning very powerful for identification purposes. The likelihood of a false positive is extremely low and its relative speed and ease of use make it a great potential biometric. Iris Readers use built-in countermeasures that make them virtually impossible to counterfeit or spoof. It is the absolutely genius and unique technology in order to avoid crime activities and to attain more and more security.


REFERENCES:






• Sturgeon, W. (2004). “Biometrics used to keep German Olympians safe...but what are they testing - moustache or mullet?” Security Strategy Sillicon.com

• “The Biometrics Market in Germany 2004-2009: Anti-terrorism Laws Drive Growth” (2004). Soreon Research.
• Tracy V.Wilson, (2004) from “How Biometrics works?”
• Dinah BLIRANDO, Student-Engineer Supinfo Caraïbes SUPINFO graduate year 2007



















:
• Bertillonage - measuring body lengths
• Fingerprint - analyzing fingertip patterns
• Facial Recognition - measuring facial characteristics
• Hand Geometry - measuring the shape of the hand
• Iris Scan - analyzing features of colored ring of the eye
• Retinal Scan - analyzing blood vessels in the eye
• Vascular Patterns - analyzing vein patterns
• DNA - analyzing genetic makeup
Examples of behavioral biometrics include:
• Speaker Recognition - analyzing vocal behavior
• Signature - analyzing signature dynamics
• Keystroke - measuring the time spacing of typed words
Major limitations of each BIOMETRICS: In the case of
• Bertillonage - body lengths no longer used.
• Fingerprint – we can change the hand or by gambling also.
• Facial Recognition - facial characteristics will change time to time.
• Hand Geometry - the shape of the hand also change the age and not accurate.
• Iris Scan – Not applicable for blind people.
• Retinal Scan – Eye will be effected more and more.
• Vascular Patterns - Vein scans usually use radioactive particles. DNA –DNA is same for twins.
• Speaker Recognition - vocal behavior can be change by imitations.
• Signature – forgery of signature dynamics
• Keystroke – not at all that much of accurate.
Out of all these biometric methods the accurate method is one and only one method which is referred to as Iris scanning method.
HISTORY: The idea of using iris patterns for personal identification was originally proposed in 1936 by ophthalmologist Frank Burch. By the 1980's the idea had appeared in James Bond films, but it still remained science fiction and conjecture. In 1987 two other ophthalmologists, Aran Safir and Leonard Flom, patented this idea, and in 1989 they asked John Daugman (then teaching at Harvard University) to try to create actual algorithms for iris recognition. These algorithms, which Daugman patented in 1994 and are owned by Iridian Technologies, are the basis for all current iris recognition systems and products.
Iris scanning can seem very futuristic, but at the heart of the system is a simple CCD digital camera.. It uses both visible and near-infrared light to take a clear, high-contrast picture of a person's iris. With near-infrared light, a person's pupil is very black, making it easy for the computer to isolate the pupil and iris.
When you look into an iris scanner, either the camera focuses automatically or you use a mirror or audible feedback from the system to make sure that you are positioned correctly. Usually, your eye is 3 to 10 inches from the camera. When the camera takes a picture, the computer locates:
• The center of the pupil
• The edge of the pupil
• The edge of the iris
• The eyelids and eyelashes
It then analyzes the patterns in the iris and translates them into a code.Iris scanners are becoming more common in high-security applications because people's eyes are so unique (the chance of mistaking one iris code for another is 1 in 10 to the 78th power. They also allow more than 200 points of reference for comparison, as opposed to 60 or 70 points in fingerprints.
The iris is a visible but protected structure, and it does not usually change over time, making it ideal for biometric identification. Most of the time, people's eyes also remain unchanged after eye surgery, and blind people can use iris scanners as long as their eyes have irises. Eyeglasses and contact lenses typically do not interfere or cause inaccurate readings.
V. IRIS SCAN: Iris scans analyze the
features that exist in the colored tissue surrounding the pupil which has more than
200 points that can be used for comparison, including rings, furrows and freckles. The scans use a regular video

camera style and can be done from further away than a retinal scan. It will work through glasses fine and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes, and not just verification.
VI. HOW IT WORKS: The user places himself so that he can see his own eye's reflection in the device. The user may be able to do this from up to 2 feet
may need to be as close as a couple of inches depending on the device. Verification time is generally less than 5 seconds, though the user will only need to look into the device for a couple moments.
To prevent a fake eye from being used to fool the system, these devices may vary the light shone into the eye and watch for pupil dilation.
Identification vs. Verification:
Iris recognition identifies people rather than verifying their identity.
Verification: asks; Is this person who they say they are? This is one-to-one matching which means a person must first suggest their identity through a password, card or name and the system then seeks to determine whether or not there is a match between the suggested and true identities.
Identification: asks; Who is this person? This is one-to-many matching meaning that the person is not required to carry anything or volunteer any information. The system simply captures the iris image, searches the entire database and either finds their identity or reports that they are unknown. This is obviously a much more powerful form of authentication as no information is required from the user.
It has several features .those are
Stable: - the unique pattern in the human iris is formed by 10 months of age, and remains unchanged throughout one's lifetime.
Unique: - the probability of two rises producing the same code is nearly impossible.
Flexible: - iris recognition technology easily integrates into existing security systems or operates as a standalone.
Reliable: - a distinctive iris pattern is not susceptible to theft, loss or compromise Non-Invasive: - a distinctive iris pattern is not susceptible to theft, loss or compromise.
This proven biometric approach is fast and remarkably accurate, and lets you design systems that overcome the limitations of typical card or password strategies.
VII. The accuracy of Iris Recognition:
Iris readers use state-of-the art Iris Recognition technology to verify the identity of authorized persons positively and definitively - with virtually no chance of mis-identification in all applications.
The identification is based on the intricate patterns in the iris of the eye, the ring-shaped structure that gives the eye its color. No two individuals, not even identical twins, have the same exact iris pattern.

Panasonic Iris Recognition has a false acceptance ratio of 0.001% to 0.0001%, making it far more accurate than other biometric approaches.
• 100 to 1,000 times more accurate than spot fingerprinting
• 1,000 to 10,000 times more accurate than hand-print verification
• 3,000 times more accurate than voice prints.
A complete, ready-to-use solution: Iris Readers incorporate a specially-designed video camera for capturing iris images, along with on-board software for processing the iris images and communicating with other elements of your access control system.
Identify almost instantly:
Then, at each access point, a user simply 'looks into' the Reader mounted alongside the doorway. The Reader captures a video image of the iris, translates it to an IrisCode, and compares it to the authorized IrisCodes on file. If there's a proper match, the Reader signals your access system accordingly. It takes about 1.5 seconds. And works with contact lenses, glasses, even protective goggles and face shields.
Ultra-accurate, almost impossible to defeat:

Iris Readers use built-in countermeasures that make them virtually impossible to counterfeit or spoof.
In fact, it's estimated the chance of two irises being identical is 1 in 1078 : Of all the biometric technologies used for human authentication today, it is generally conceded that iris recognition is the most accurate. Iris recognition technology offers the highest accuracy in identifying individuals of any method available. This is because no two irises are alike - not between identical twins, or even between the left and right eye of the same person. Irises are also stable; unlike other identifying characteristics that can change with age; the pattern of one's iris is fully formed by ten months of age and remains the same for the duration of their lifetime. Iris recognition technology is also accurate because it uses more than 240 points of reference in an iris pattern as a basis for a match. By comparison, fingerprints use about 60.
Iris recognition technology works by combining computer vision, pattern recognition, and optics. First, a black-and-white video camera zooms in on the iris and records a sharp image of it. The iris is lit by a low-level light to aid the camera in focusing. A frame from this video is then digitized into a 512 byte file and stored on a computer database.
Iris recognition technology is capable of recording this image from as much as 16 inches (40.64 centimeters) away, so no physical contact is necessary. An individual's identity can then be confirmed by taking another picture of their iris and comparing it to the database. Iris recognition technology can confirm someone's identity within a few seconds.
Iris recognition technology is currently used at physical access points demanding high security, such as airports, government buildings, and research laboratories. However, some hotels have experimented with using iris recognition technology in place of a room key. The potential exists for iris recognition technology to replace most current forms of physical access-based identification. This would include anything requiring a password, personal identification number (PIN), or key; such as electronic transactions, building access, or automobile ignition. And unlike those physical methods of identification, an iris cannot be stolen. Iris recognition technology addresses the problems of both password management and fraud.
What about DNA?
The birth rate of identical twins is 1 in 121 births or 0.82%. As identical twins share the same DNA, the false acceptance rate for any DNA based system must be at least 0.82% due to the birth rate alone. DNA testing is an invasive technology with a cotton swab inserted into the mouth the most common method of obtaining a sample. Combine this with the negative stigma associated with DNA sampling and it becomes clear that iris recognition is the most accurate, safe, user-friendly and fastest identification system on the market.
VIII. APPLICATIONS:
Law enforcement agencies in the United States began using it in 1994 when the Lancaster County Prison in Pennsylvania became the first correctional facility to employ the technology for prisoner identification. The use of iris scans as part of the booking procedure along with fingerprints is just beginning to come into existence. Police stations around the country have been looking into the technology and some, including the Barnstable County jail in Massachusetts which put in a system in early 2002. The power of this biometric may make it rival fingerprints for booking situations where identification and verification are vital .In Berkshire County, the technology is used in the newly built Berkshire County Jail as a security check for employees. The Charlotte/Douglas International Airport in North Carolina and the Flughafen Frankfort Airport in Germany allow frequent passengers to register their iris scans in an effort to streamline boarding procedures. There is discussion that banks may someday make iris scans a routine part of ATM transactions and some have begun taking the first steps in testing out these systems.

In Criminal activities:
Financial fraud - This type of identity theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more. In fact, a total of 25 types of financial identity fraud are investigated by the United States Secret Service. While financial identity theft is the most prevalent (of the approximate 10,000 financial crime arrests that Secret Service agents made in 1997, 94 percent involved identity theft), it certainly isn't the only type. Other types of identity theft, however, usually involve a financial element as well -- typically to fund some sort of criminal enterprise.
Criminal activities –
This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get special permits, hide one's own identity, or commit acts of terrorism. These criminal activities can include:
 Computer and cyber crimes
 Organized crime
 Drug trafficking
 Alien smuggling
 Money laundering
In order to avoid all the crime activities and fraud activities we should use Iris technology .
COMPARISION WITH OTHER BIOMETRIC TECHNOLOGIES:
Cost-precision relation: When one calls upon one of these techniques, one first seeks precision, but one also interests in the cost. The graph below shows us the situation of certain techniques compared to these two criteria.

We can notice that, in spite of its 5th place in the market, the iris method of is the most precise, but also the most expensive. It is moreover this technique, particularly effective, that one finds in the film "Minority Report" of Steven Spielberg.
1. This content belongs to



LIMITATIONS: 1) It will affect the eye & not applicable to eye challenged people.
2) The properties can be changed if any eye damage occurred.
3) If retina has changed then it may not be applicable.

Evaluation: The uniqueness of eyes, even between the left and right eye of the same person, makes iris scanning very powerful for identification purposes. The likelihood of a false positive is extremely low and its relative speed and ease of use make it a great potential biometric. The only drawbacks are the potential difficulty in getting someone to hold their head in the right spot for the scan if they are not doing the scan willingly. It also takes up a bit more memory for the data to be stored, but with the advances in technology, this is unlikely to cause any major difficulty.


IX. ADVANTAGES of IRIS TECHNOLOGY SYSTEM:
1) The system involves no lasers, bright lights, or any hazardous technology at all. It's as safe to use as any video camera.

2) An award winning access control system.
3) Has no requirement or costs for cards or PIN's .
4) Is more accurate than DNA matching. No recorded instance of a false accept.
6) Has a very small record size (IrisCode 512 bytes).
6) Uses identification, (one to many) not verification (one to one) matching 7) Is non-contact. Works with glasses, protective clothing, safety shields and contact lenses.
8) Images the iris which is stable over life. One enrolment only.
9) Is non-invasive and non-contact. 10)Uses Video based technology .
11) Has extremely fast database matching (match rates in excess of 100,000 per second achieved on a standard PC).














CONCLUSION: In order to avoid all the crime activities and fraud activities and for Anti-terrorism, we should use Iris technology. The uniqueness of eyes, even between the left and right eye of the same person, makes iris scanning very powerful for identification purposes. The likelihood of a false positive is extremely low and its relative speed and ease of use make it a great potential biometric. Iris Readers use built-in countermeasures that make them virtually impossible to counterfeit or spoof. It is the absolutely genius and unique technology in order to avoid crime activities and to attain more and more security.



REFERENCES:

• Sturgeon, W. (2004). “Biometrics used to keep German Olympians safe...but what are they testing - moustache or mullet?” Security Strategy Sillicon.com

• “The Biometrics Market in Germany 2004-2009: Anti-terrorism Laws Drive Growth” (2004). Soreon Research.
• Tracy V.Wilson, (2004) from “How Biometrics works?”
• Dinah BLIRANDO, Student-Engineer Supinfo Caraïbes SUPINFO graduate year 2007

3 comments:

  1. what a gud blog. so much info about ict i can find out here.. thanks to the writer! =))

    ReplyDelete
  2. Great and Informative Blog!!!
    You have mentioned all about the biometric security system in this blog.
    Yes, Biometric Face Reader uses frequently nowadays to analyzing the facial expression like eyes, cheeks, ears and other facial aspects via capture the image and match or maps it with the database.

    ReplyDelete