Professional Documents
Culture Documents
Iris Based Authentication Report
Iris Based Authentication Report
Systems
Nikolay Dakov
Department of Computer Science, University College London
Introduction
Since times immemorial people have been in dire need of effective authentication systems that
can decide whether to give access to some person in a given place. We all know the basic
authentication based on a username and password. However, such simple systems can be easily
exploited if an attacker knows the credentials of a person with access. Thats why, in the last
few decades systems based on biometrics begun to emerge as a possible solution. Biometrics
represent human characteristics such as fingerprints, iris and voice [1]. Iris-based recognition
is one of the most reliable systems. In this article, we are going to discuss the classification
methodology of the system and compare its results with other solutions.
1
Furthermore, accuracy and speed are other two obstacles that shall be solved. Compared
to other biometric systems, iris recognition doesnt only satisfy more criteria, but also achieves
the highest scan speed (1.7s on a 2GHz server with one million users) and really high accuracy
(99.999999%) [3].
Methodology
Biometric authentication systems are classification problems. A system has to decide whether
certain object exists in its database and to assign a proper name to that object. For example, the
application Shazam solves a classification problem because when given a recording of a song,
it has to recognize its name. An iris recognition system would be given the iris of a person and
would have to check if the person exists in the database and to find the appropriate name.
Iris recognition has two fundamental stages - training and classification:
• During the training, the system extracts the irises of all people who later would have to
be recognized. Each instance is preprocessed in such a way that only the most distinc-
tive features of the data are retrieved. Then, the the calculated iris code is added to the
database.
• During the classification, a system would have to extract the iris a person gazing at a
2
camera and again calculate a code which would be compared with all others from the
database. If theres a close match, the name of the person would be displayed.
3
the area of the iris. Finally, the iris, without the pupil, is segmented (cut) from the image and
normalised [6] by converting it to a rectangular image.
Classification
After the system has an iris code, it is compared to all such codes that already exist in the
database. Taking into account also the patches of the iris that contain eyelashes, the Hamming
distance is used to find the difference between two iris codes [3]. It is based on bitwise compari-
son between two binary iris codes. In my opinion, other possible distance measurements would
be the Euclidean distance or angular similarity. The iris code from the database that produces
the lowest dissimilarity with the analysed one is a possible match.
Conclusion
Iris recognition systems work in a classification fashion. They localize iris from provided image
data, segment it, extract its descriptive features to generate iris code and finally classify it by
comparing it with instances from a database. Because iris data satisfies most of the biometric
criteria for reliable system, especially uniqueness, this methodology achieves high accuracy and
speedy detection; thats why it is actively used for e.g. in UAE airports. Iris recognition is still
actively researched, however, as scanning iris from long distance with non-near-infrared camera
while the object is moving is problematic. Nevertheless, the future seems to be bright from what
results show latest research [7].
4
References and Notes
[1] Anil Jain, Ruud Bolle, and Sharath Pankanti. Biometrics: personal identification in net-
worked society, volume 479. Springer Science & Business Media, 2006.
[2] Tiwalade O Majekodunmi and Francis E Idachaba. A review of the fingerprint, speaker
recognition, face recognition and iris recognition based biometric identification technolo-
gies. 2011.
[3] John Daugman. New methods in iris recognition. IEEE Transactions on Systems, Man, and
Cybernetics, Part B, 37(5):1167–1175, 2007.
[4] Izem Hamouchene and Saliha Aouat. A new texture analysis approach for iris recognition.
AASRI Procedia, 9:2 – 7, 2014.
[5] John Daugman. How iris recognition works. IEEE Transactions on circuits and systems
for video technology, 14(1):21–30, 2004.
[6] Gil Santos and Edmundo Hoyle. A fusion approach to unconstrained iris recognition. Pat-
tern Recognition Letters, 33(8):984 – 990, 2012. Noisy Iris Challenge Evaluation {II} -
Recognition of Visible Wavelength Iris Images Captured At-a-distance and On-the-move.
[7] Kevin W. Bowyer. The results of the nice.ii iris biometrics competition. Pattern Recognition
Letters, 33(8):965 – 969, 2012. Noisy Iris Challenge Evaluation {II} - Recognition of
Visible Wavelength Iris Images Captured At-a-distance and On-the-move.