Académique Documents
Professionnel Documents
Culture Documents
IMPLEMENTATION OF
HAMMING-CUT-MATCHING ALGORITHM
IN
IRIS RECOGNITION
verifying the identified person, it adds the
ABSTRACT
security to the whole system. Finally this
This paper deals with the basics of iris, paper contains the applications of the
its properties and how it adds some combined features of the recognition of iris
the iris codes of the current person who codification of the unique characteristic
wants to access the database and gives the traits that each of us is born with is known
matched results to the user accordingly. as the science of biometrics. Various forms
produces very low false rate when compared authentication have been around for the past
to the other biometrics results it is very twenty years, but not until recently have
airports ,banks ,defence , etc.., where the quality/reliability that has enabled their
security plays one of the major role. But in widespread application. In the past, hand
the case of fields where the database is huge, geometry enjoyed the advantage of very
the comparison time is very high. small templates (codes containing the
This paper includes the implementation biometric data), but with modern computers
algorithm which reduces the comparison based solutions are steadily gaining ground.
time for matching the iris code with Retinal, iris, and fingerprint
database so that we can use iris recognition recognition are mature technologies with the
in case of huge databases like voting system. most reliable performance. Of the three
PROPERTIES:
There will be no effect on our eyes seconds or less and the hand verification
since there is no direct usually takes less than 1 second. The image
error rates being very low. that include a large number of access points
Scalability and speed is high when and users can be centrally administered,
CONCLUSION :
Passwords, token cards and PINs As according to our
are all risks to the security of an implementation the comparison
organisation due to human time of the iris code with the iris
nature. Our inability to remember database is very much less from
complex passwords and tendency the current system.
to write these down along with If a two-factor authentication
losing token cards or forgetting system is implemented, iris
PINs all contribute to the recognition with a hand scanner
possible breakdown in security for the verification , then the
for an organisation. strength of authentication
The uniqueness of the iris and increases and provides another
low probability of a false part to "defence in depth" for the
acceptance or false rejection all airport.
contribute to the benefits of using
iris recognition technology.
It provides an accurate and
secure method of authenticating
users onto company systems, is a
non-intrusive method and has the
speed required to minimise user
frustration when accessing
company systems.
Users no longer have to worry
about remembering passwords
and system administrators no
longer need to worry about the
never-ending problem of users
disclosing passwords or having
weak passwords that are easily
cracked.