subject’s iris with the stored version, isone of the most accurate with very lowfalse acceptance and rejection rates. Thismakes the technology very useful inareas such as information security, physical access security, ATMs andairport security.The technology is accurate,easy to use, non-intrusive, and difficultto forge. Iris recognition technologydoes provide a good method of authentication to replace the currentmethods of passwords, token cards or Pin’s and if used in conjunction withsomething the user knows in a two-factor authentication system then theauthentication becomes even stronger.
KNOWLEDGE OF IRIS:
The iris is the plainly visible, coloredring that surrounds the pupil. It is amuscular structure that controls theamount of light entering the eye, withintricate details that can be measured,such as striations, pits and furrows. Theiris is not to be confused with the retina,which lines the inside of the back of theeye. The amount of information that can be measured in a single iris is muchgreater than fingerprints, and accuracy isgreater than DNA
IRIS RECOGNITION PROCESS:
The process of Iris Recognition is madeup of three steps:
Capturing the image
Defining the location of the irisand optimizing the image
Storing and comparing theimage.
1. CAPTURING THE IMAGE
The image of the iris can becaptured using a standard camera using both visible and infrared light and may be either a manual or automated procedure. The camera can be positioned between three and a half inches and onemeter to capture the image. In themanual procedure, the user needs to