SlideShare a Scribd company logo
1 of 23
POORNIMA COLLEGE OF
ENGINEERING
JAIPUR

Training Presentation
on
IRIS SCANNER
at
MANTRA SOFT TECH.
Submitted by:
Rajvrit Singh
ECE 4th yr 7th sem.
www.powerpointpresentationon.blogspot.com
•
•
•
•
•
•
•
•

Company profile
Introduction
Working of Iris Scanner
Iris performance
Advantages
Applications
Software required
Conclusion
• Mantra Softech (India) Pvt Ltd is a leader in Biometric security
and Business solutions. Automated Fingerprint Identification
System(AFIS) and Iris identification search matching are the
primary products of Mantra Technologies.
• Established in 2002, the Mantra Softech (India) Pvt Ltd
develops identity management and access control solutions for
the information security requirements of large and medium
sized organizations. In addition to the standard access
protection systems in common use such as passwords, smart
cards, solutions offered by Mantra Softech (India) Pvt Ltd also
include sophisticated biometric identification systems.
• Mr. Sachin Verma (Director)
• Mr. Jignesh Prajapati (HR Manager)
• Mr. Vikash Verma (Training Coordinator)
• Mr. Keyur Patel (Training Coordinator)
•
•
•
•
•
•
•

Ahmedabad
Bangalore
Jaipur
Surat
Delhi
Mumbai
Uk
• Biometrics is the science of measuring physical
or anatomical characteristics of individuals.
• It performs automatic identification of a person
based on his/her physiological characteristics.
• Iris Recognition
• Fingerprint Recognition
• Voice Recognition
• Signature Recognition
• Face Recognition
• The iris is the colorful
part of the eye
between the white
sclera and the pupil.
• Iris is the only internal
organ of the human
body that is normally
externally visible.
• The iris identification program may be divided into
four main functional blocks:
1.Image Acquisition.
• Preprocessing.
• Image Analysis.
• Image Recognition.
• The acquired image always not only “useful” parts
(IRIS), but also some “irrelevant” parts
e.g. eyelid, pupil .
1.So the preprocessing is composed of two steps:
2.Iris Localization.
• Edge Detection.
• In this stage, we should
determine iris part of
the image by localizing
the position of the
image derived from
inside the limbus
(outer boundary) and
outside the pupil
(inner boundary), and
finally convert the iris
part into a suitable
representation.
• It is used to find complex
object boundaries by marking
potential edge point
corresponding to places in an
image where rapid change in
brightness occurs.
• In other words, edge is
defined by the discontinuity in
gray values. An edge
separates two distinct
objects.
• The features of the iris are then analyzed and
digitized into a 512 byte (4096 bits) Iris Code
record.
• In this iris code half of the describes the features
and another half of the describes the control the
comparison process.
• Iris code record is stored in the database for future
comparison
• During a recognition attempt, when an iris is
presented at a recognition point, the same process
is repeated ; however the resulting Iris Code
record is not stored but is compared to every file in
the database.
1. A person stands in front of the iris identification system,
between one and three feet away, while a wide angle
camera calculates the position of their eye.
2. A second camera zooms in on the eye and takes a
black and white image.
3. Once the iris is in focus, it overlays a circular grid on the
image of the iris and identifies the light and dark areas,
like an “eye print”.
4. To prevent a fake eye from being used to fool system,
these devices may very the light shone into the eye and
watch for pupil dilation.
• FAR - As low as 1 in 1,000,000
• FRR –around 2%
1.Highly Protected Internal Organ Of The Eye.
2.Externally Visible Patterns Imaged From A
Distance.
3.Pattern Apparently Stable Throughout The Life.
4.Image Analysis And Encoding Time: 1 Seconds.
5.Search Speed: 1,00,000 Iris Code Per Second.
1. Computer login: the iris as a living password.
2. National border controls: the iris as a living passport.
3. Driving licenses and personal certificates.
4. Internet security.
5. Premises access control (Home, Office, Laboratory).
6. Anti-terrorism (e.g. security screening at airports)
7. Financial Transactions (electronic commerce and
banking).
8. Secure accesses to bank cash machine accounts.
• Iris recognition system 1.0
• Iris application server 2.0
• Iris 3D 1.0.8
• Biometric technology has great potential
• There are many biometric products around,
regarding the different biometric technologies
• Since September 11th, biometric products are
pushed forward
• Shortcomings of biometric systems due to
o Manufacturers ignorance of security concerns
o Lack of quality control
o Standardisation problems
• Manufacturers have to take security concerns
serious
 IRIS Scaner

More Related Content

What's hot

Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION Ankit Kumar
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation SystemMohamed Refaei
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognitionAhmed Tememe
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 

What's hot (20)

Centerix Iris-Presentation
Centerix Iris-PresentationCenterix Iris-Presentation
Centerix Iris-Presentation
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Cloud Iris Verifcation System
Cloud Iris Verifcation SystemCloud Iris Verifcation System
Cloud Iris Verifcation System
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 

Viewers also liked

Technology & it’s impact on our planet
Technology & it’s impact on our planetTechnology & it’s impact on our planet
Technology & it’s impact on our planetDorac87
 
Eddy Current Metal Testing for Conservation
Eddy Current Metal Testing for ConservationEddy Current Metal Testing for Conservation
Eddy Current Metal Testing for ConservationJason Church
 
Report on Tubular Non-Destructive Techniques ( Remote Field testing and Inter...
Report on Tubular Non-Destructive Techniques ( Remote Field testing and Inter...Report on Tubular Non-Destructive Techniques ( Remote Field testing and Inter...
Report on Tubular Non-Destructive Techniques ( Remote Field testing and Inter...Akshay Mistri
 
Eddy current testing
Eddy current testingEddy current testing
Eddy current testingzoha nasir
 
Guided Wave Ultrasound - Principles and Apllications
Guided Wave Ultrasound - Principles and ApllicationsGuided Wave Ultrasound - Principles and Apllications
Guided Wave Ultrasound - Principles and Apllicationssubash_j
 
Tutorial - Eddy Current Testing
Tutorial - Eddy Current TestingTutorial - Eddy Current Testing
Tutorial - Eddy Current TestingEthan Gros
 
Heat-exchanger-manual
Heat-exchanger-manualHeat-exchanger-manual
Heat-exchanger-manualAbdelrhman K.
 
Eddy current inspection
Eddy current inspectionEddy current inspection
Eddy current inspectionVertika Nigam
 
Chris brooks storage tanks inspection, maintenance and failure
Chris brooks   storage tanks inspection, maintenance and failureChris brooks   storage tanks inspection, maintenance and failure
Chris brooks storage tanks inspection, maintenance and failureSreekumar K S
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 
Solution: Long Seam Weld Inspection
Solution: Long Seam Weld InspectionSolution: Long Seam Weld Inspection
Solution: Long Seam Weld InspectionZetec Inc.
 

Viewers also liked (17)

Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Technology & it’s impact on our planet
Technology & it’s impact on our planetTechnology & it’s impact on our planet
Technology & it’s impact on our planet
 
NDT Methods Ready
NDT Methods ReadyNDT Methods Ready
NDT Methods Ready
 
Eddy Current Metal Testing for Conservation
Eddy Current Metal Testing for ConservationEddy Current Metal Testing for Conservation
Eddy Current Metal Testing for Conservation
 
White Paper PDF
White Paper PDFWhite Paper PDF
White Paper PDF
 
Report on Tubular Non-Destructive Techniques ( Remote Field testing and Inter...
Report on Tubular Non-Destructive Techniques ( Remote Field testing and Inter...Report on Tubular Non-Destructive Techniques ( Remote Field testing and Inter...
Report on Tubular Non-Destructive Techniques ( Remote Field testing and Inter...
 
Eddy current testing
Eddy current testingEddy current testing
Eddy current testing
 
Guided Wave Ultrasound - Principles and Apllications
Guided Wave Ultrasound - Principles and ApllicationsGuided Wave Ultrasound - Principles and Apllications
Guided Wave Ultrasound - Principles and Apllications
 
Paut full notes
Paut  full notesPaut  full notes
Paut full notes
 
Tutorial - Eddy Current Testing
Tutorial - Eddy Current TestingTutorial - Eddy Current Testing
Tutorial - Eddy Current Testing
 
Testing
TestingTesting
Testing
 
Heat-exchanger-manual
Heat-exchanger-manualHeat-exchanger-manual
Heat-exchanger-manual
 
Heat exchangers
Heat exchangersHeat exchangers
Heat exchangers
 
Eddy current inspection
Eddy current inspectionEddy current inspection
Eddy current inspection
 
Chris brooks storage tanks inspection, maintenance and failure
Chris brooks   storage tanks inspection, maintenance and failureChris brooks   storage tanks inspection, maintenance and failure
Chris brooks storage tanks inspection, maintenance and failure
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Solution: Long Seam Weld Inspection
Solution: Long Seam Weld InspectionSolution: Long Seam Weld Inspection
Solution: Long Seam Weld Inspection
 

Similar to IRIS Scaner

Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemShakti Patil
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.sandipan paul
 

Similar to IRIS Scaner (20)

Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification System
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Automatic Data Capture.pptx
Automatic Data Capture.pptxAutomatic Data Capture.pptx
Automatic Data Capture.pptx
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.
 
IriCore SW Brochure
IriCore SW BrochureIriCore SW Brochure
IriCore SW Brochure
 

More from Rohit Chintu

Electronics for you projects and ideas 2000 (malestrom)
Electronics for you projects and ideas 2000 (malestrom)Electronics for you projects and ideas 2000 (malestrom)
Electronics for you projects and ideas 2000 (malestrom)Rohit Chintu
 
Plugin anrit sitemasterseri30416
Plugin anrit sitemasterseri30416Plugin anrit sitemasterseri30416
Plugin anrit sitemasterseri30416Rohit Chintu
 
Wire routing tools
Wire routing toolsWire routing tools
Wire routing toolsRohit Chintu
 
List of tongue twisters in english
List of tongue twisters in englishList of tongue twisters in english
List of tongue twisters in englishRohit Chintu
 
English tongue twisters
English tongue twisters English tongue twisters
English tongue twisters Rohit Chintu
 
Tongue twisters in english
Tongue twisters in englishTongue twisters in english
Tongue twisters in englishRohit Chintu
 

More from Rohit Chintu (16)

Qtp syllabus
Qtp syllabus Qtp syllabus
Qtp syllabus
 
Testing syllabus
Testing syllabusTesting syllabus
Testing syllabus
 
Mpi godse
Mpi godseMpi godse
Mpi godse
 
Electronics for you projects and ideas 2000 (malestrom)
Electronics for you projects and ideas 2000 (malestrom)Electronics for you projects and ideas 2000 (malestrom)
Electronics for you projects and ideas 2000 (malestrom)
 
Windbot
WindbotWindbot
Windbot
 
Data logger
Data loggerData logger
Data logger
 
Plugin anrit sitemasterseri30416
Plugin anrit sitemasterseri30416Plugin anrit sitemasterseri30416
Plugin anrit sitemasterseri30416
 
Syntutic
SyntuticSyntutic
Syntutic
 
Synthese
SyntheseSynthese
Synthese
 
Vhdl design flow
Vhdl design flowVhdl design flow
Vhdl design flow
 
Ground sailor
Ground sailorGround sailor
Ground sailor
 
Wire routing tools
Wire routing toolsWire routing tools
Wire routing tools
 
List of tongue twisters in english
List of tongue twisters in englishList of tongue twisters in english
List of tongue twisters in english
 
English tongue twisters
English tongue twisters English tongue twisters
English tongue twisters
 
Tongue twisters in english
Tongue twisters in englishTongue twisters in english
Tongue twisters in english
 
Tongue Twister
Tongue TwisterTongue Twister
Tongue Twister
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

IRIS Scaner

  • 1. POORNIMA COLLEGE OF ENGINEERING JAIPUR Training Presentation on IRIS SCANNER at MANTRA SOFT TECH. Submitted by: Rajvrit Singh ECE 4th yr 7th sem. www.powerpointpresentationon.blogspot.com
  • 2. • • • • • • • • Company profile Introduction Working of Iris Scanner Iris performance Advantages Applications Software required Conclusion
  • 3. • Mantra Softech (India) Pvt Ltd is a leader in Biometric security and Business solutions. Automated Fingerprint Identification System(AFIS) and Iris identification search matching are the primary products of Mantra Technologies. • Established in 2002, the Mantra Softech (India) Pvt Ltd develops identity management and access control solutions for the information security requirements of large and medium sized organizations. In addition to the standard access protection systems in common use such as passwords, smart cards, solutions offered by Mantra Softech (India) Pvt Ltd also include sophisticated biometric identification systems.
  • 4. • Mr. Sachin Verma (Director) • Mr. Jignesh Prajapati (HR Manager) • Mr. Vikash Verma (Training Coordinator) • Mr. Keyur Patel (Training Coordinator)
  • 6. • Biometrics is the science of measuring physical or anatomical characteristics of individuals. • It performs automatic identification of a person based on his/her physiological characteristics.
  • 7. • Iris Recognition • Fingerprint Recognition • Voice Recognition • Signature Recognition • Face Recognition
  • 8. • The iris is the colorful part of the eye between the white sclera and the pupil. • Iris is the only internal organ of the human body that is normally externally visible.
  • 9. • The iris identification program may be divided into four main functional blocks: 1.Image Acquisition. • Preprocessing. • Image Analysis. • Image Recognition.
  • 10.
  • 11. • The acquired image always not only “useful” parts (IRIS), but also some “irrelevant” parts e.g. eyelid, pupil . 1.So the preprocessing is composed of two steps: 2.Iris Localization. • Edge Detection.
  • 12. • In this stage, we should determine iris part of the image by localizing the position of the image derived from inside the limbus (outer boundary) and outside the pupil (inner boundary), and finally convert the iris part into a suitable representation.
  • 13. • It is used to find complex object boundaries by marking potential edge point corresponding to places in an image where rapid change in brightness occurs. • In other words, edge is defined by the discontinuity in gray values. An edge separates two distinct objects.
  • 14. • The features of the iris are then analyzed and digitized into a 512 byte (4096 bits) Iris Code record. • In this iris code half of the describes the features and another half of the describes the control the comparison process.
  • 15. • Iris code record is stored in the database for future comparison • During a recognition attempt, when an iris is presented at a recognition point, the same process is repeated ; however the resulting Iris Code record is not stored but is compared to every file in the database.
  • 16.
  • 17. 1. A person stands in front of the iris identification system, between one and three feet away, while a wide angle camera calculates the position of their eye. 2. A second camera zooms in on the eye and takes a black and white image. 3. Once the iris is in focus, it overlays a circular grid on the image of the iris and identifies the light and dark areas, like an “eye print”. 4. To prevent a fake eye from being used to fool system, these devices may very the light shone into the eye and watch for pupil dilation.
  • 18. • FAR - As low as 1 in 1,000,000 • FRR –around 2%
  • 19. 1.Highly Protected Internal Organ Of The Eye. 2.Externally Visible Patterns Imaged From A Distance. 3.Pattern Apparently Stable Throughout The Life. 4.Image Analysis And Encoding Time: 1 Seconds. 5.Search Speed: 1,00,000 Iris Code Per Second.
  • 20. 1. Computer login: the iris as a living password. 2. National border controls: the iris as a living passport. 3. Driving licenses and personal certificates. 4. Internet security. 5. Premises access control (Home, Office, Laboratory). 6. Anti-terrorism (e.g. security screening at airports) 7. Financial Transactions (electronic commerce and banking). 8. Secure accesses to bank cash machine accounts.
  • 21. • Iris recognition system 1.0 • Iris application server 2.0 • Iris 3D 1.0.8
  • 22. • Biometric technology has great potential • There are many biometric products around, regarding the different biometric technologies • Since September 11th, biometric products are pushed forward • Shortcomings of biometric systems due to o Manufacturers ignorance of security concerns o Lack of quality control o Standardisation problems • Manufacturers have to take security concerns serious