You are on page 1of 12

AI AND PR

IRIS PATTERN RECOGNITION

PRESENTED BY: ASIFA YOUSAF/ANSI


STUDENT ID: 214618007
SUBJECT: AI AND PR
DATE: 12 NOVEMBER, 2021
OUTLINE
 WHAT IS PATTERN RECOGNITION
APPLICATIONS OF PR
PR IN CYBER SECURITY
IRIS PATTERN RECOGNITION
BASICS
LIMITING FACTORS
APPLICATIONS
CONCLUSION Biometrics and the use of Iris Pattern
Recognition in cyber security.
INTRODUCTION TO AI
Artificial intelligence is the simulation of human intelligence processes by
machines, especially computer systems.
AI programming focuses on three cognitive skills: learning, reasoning and
self-correction.
Learning processes. This aspect of AI programming focuses on acquiring
data and creating rules for how to turn the data into actionable
information. The rules, which are called algorithms, provide computing
devices with step-by-step instructions for how to complete a specific task.
Reasoning processes. This aspect of AI programming focuses on
choosing the right algorithm to reach a desired outcome.
Self-correction processes. This aspect of AI programming is designed to
continually fine-tune algorithms and ensure they provide the most
accurate results possible.
WHAT IS PATTER RECOGNITION
Pattern is everything around in this digital world. A
pattern can either be seen physically or it can be observed
mathematically by applying algorithms. 
Pattern recognition is the process of recognizing
patterns by using a machine learning algorithm. Pattern
recognition can be defined as the classification of data
based on knowledge already gained or on statistical
information extracted from patterns and/or their
representation.
Example: consider our face then eyes, ears, nose, etc are
features of the face. A set of features that are taken
together, forms the features vector. 
Automated pattern recognition systems that are
computer-dependent prove more efficient than human
senses. The human sense might fail to recognize patterns
due to loss of vision with age, or inefficient data. Then the
automated systems prove to be the beneficial factor in
various aspects of life.
PHASES IN PR
1. Sensing: In this phase, the pattern
recognition system converts the input data into
analogous data.
2. Segmentation: This phase ensures that the
sensed objects are isolated.
3. Feature extraction: This phase computes the
features or properties of the objects and sends
them for further classification.
4. Classification: In this phase, the sensed
objects are categorized or placed in groups or
cases.
5. Post-processing: Here, further
considerations are made before a decision is
made
IRIS PATTERN RECOGNITION
 The routine inclusion of a fingerprint
scanner on certain popular brands of
Smartphone points to the fact that
biometric security techniques are
becoming an increasingly common
aspect of our daily lives.
 Iris patterns are one of the most
distinctive and distinguishing personal
attributes used in biometric security.
 Biometrics and the use of Iris Pattern
Recognition in cyber security.
IRIS PATTERN RECOGNITION-THE EYE HAS IT
 The iris is a colored ring of muscle which opens and closes the eyeball of eye
like the shutter on a camera. The color of this ring-shaped region around the
pupil is determined by the amount of the substance called melanin, which it
contains. A higher amount of melanin in the iris produces a browner pigment,
in a color spectrum that typically ranges from blue, gray, or greenish, to various
shades of brown.
 These patterns are complex, intricate, and extremely unique. The patterns of
each of two eyes are different from each other – and from those of anyone else.
 This makes iris patterns an even more accurate biometric identifier than
fingerprints (which are also unique to each finger, and each individual). But
with wear and tear over time or due to injury, fingerprints undergo changes that
may render them unreliable.
BASICS OF IRIS PR
 To perform iris pattern recognition, one or more detailed images of
the eye must be captured using a high-resolution digital camera. 
 A computer program known as a matching engine (which is
configured with a special mathematical recognition formula or
algorithm) is then used to compare the captured image of a person’s
iris pattern to its own database of stored images. These matching
engines can typically compare millions of images per second, with a
level of accuracy comparable to conventional fingerprinting or
digital finger scanning.
 When used in access control or identity verification, iris pattern
recognition requires the unique pattern of a subject’s iris to be
positively matched against the system’s recognition database.
ENROLLMENT AND VERIFICATION
The enrollment phase is all about constructing a database of the iris
patterns of all the people which the system will be required to validate or
recognize.
The system removes unnecessary details from each image. This is
approximately five times as many points of comparison as the average
fingerprint analysis yields.
These identifying features are then transformed into a simple, 512-digit
number known as an Iris Code, which is stored in the system database
along with the person’s name and relevant credentials.
Verification occurs each time an individual has their eye photographed by
an iris scanner, and their Iris Code is successfully matched against the
value stored in the system database. Iris patterns may also be compared
using matching engines made up of hundreds, thousands, or even millions
of individual records.
LIMITING FACTORS OF IRIS PR
Much like the early technologies for facial recognition, proximity and image
clarity are vital factors for iris recognition – both in capturing the initial
enrollment photograph and in subsequent scans of a person’s iris pattern for
matching against the verification database. Control mechanisms must also be
put in place to guard against the substitution of high-definition photographs
for actual irises at the point of scanning.
Certain kinds of contact lenses and spectacles may also produce distortions in
the observed pattern of the iris.
These limitations emphasize the need for high-quality and high-definition
digital imaging equipment and software. The software, in particular, has a role
to play in correcting for minor errors such as motion blur, and in correctly
demarcating the two boundaries (inner and outer) of the iris region. Systems
also need to have the capacity to allow for changes in the surface area of the
iris, as the pupil of the eye shrinks or grows in response to different lighting
conditions.
APPLICATIONS
Iris pattern recognition systems have been deployed at airports,
border crossings, and individual points of entry or exit for buildings
in several countries across the globe. Devices may be wall-mounted
or hand-held and portable
Iris recognition systems for personal use are available for protecting
laptops and other equipment, while a number of mobile apps are
available for providing access control and anti-theft protection on
smart phones and other devices fitted with front-facing cameras.
A small portable iris-scanning device is available on the consumer
market, for personal applications such as logging onto secure
websites without having to use a password.
THE VISION AHEAD
It’s been estimated that iris pattern recognition is ten times more accurate than
fingerprinting. And since iris patterns remain relatively unchanged for decades, this
recognition accuracy has the potential to stretch for many years into the future.
Despite the somewhat high initial costs and relative newness of the technology, it’s
likely that it will continue to evolve to the stage where photography and digital
image processing may be conducted with more clarity and at greater distances. This
kind of evolution has the potential to raise issues over privacy concerns, civil
liberties, and the ways in which recognition data is used and handled.
These issues aside, in terms of its accuracy, uniqueness in identifying an individual,
and overall convenience over more conventional methods of verification and access
control, iris pattern recognition has much to offer, in cyber security applications.
The Pattern Recognition systems are powerful to provide various applications in day
to day lives of human beings as a civil society.The Pattern recognition systems are
strongly built on AI and ML principles.

You might also like