The document discusses iris pattern recognition, which analyzes the unique patterns in a person's iris to identify them. It explains that iris patterns are captured using cameras and encoded into a 512-digit IrisCode for identification. The IrisCode is stored in a database and used to verify a person's identity by matching it to their iris scan. While limitations include lighting and image quality issues, iris recognition has applications in security systems, devices, buildings, and cybersecurity due to its accuracy over fingerprints.
The document discusses iris pattern recognition, which analyzes the unique patterns in a person's iris to identify them. It explains that iris patterns are captured using cameras and encoded into a 512-digit IrisCode for identification. The IrisCode is stored in a database and used to verify a person's identity by matching it to their iris scan. While limitations include lighting and image quality issues, iris recognition has applications in security systems, devices, buildings, and cybersecurity due to its accuracy over fingerprints.
The document discusses iris pattern recognition, which analyzes the unique patterns in a person's iris to identify them. It explains that iris patterns are captured using cameras and encoded into a 512-digit IrisCode for identification. The IrisCode is stored in a database and used to verify a person's identity by matching it to their iris scan. While limitations include lighting and image quality issues, iris recognition has applications in security systems, devices, buildings, and cybersecurity due to its accuracy over fingerprints.
STUDENT ID: 214618007 SUBJECT: AI AND PR DATE: 12 NOVEMBER, 2021 OUTLINE WHAT IS PATTERN RECOGNITION APPLICATIONS OF PR PR IN CYBER SECURITY IRIS PATTERN RECOGNITION BASICS LIMITING FACTORS APPLICATIONS CONCLUSION Biometrics and the use of Iris Pattern Recognition in cyber security. INTRODUCTION TO AI Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. AI programming focuses on three cognitive skills: learning, reasoning and self-correction. Learning processes. This aspect of AI programming focuses on acquiring data and creating rules for how to turn the data into actionable information. The rules, which are called algorithms, provide computing devices with step-by-step instructions for how to complete a specific task. Reasoning processes. This aspect of AI programming focuses on choosing the right algorithm to reach a desired outcome. Self-correction processes. This aspect of AI programming is designed to continually fine-tune algorithms and ensure they provide the most accurate results possible. WHAT IS PATTER RECOGNITION Pattern is everything around in this digital world. A pattern can either be seen physically or it can be observed mathematically by applying algorithms. Pattern recognition is the process of recognizing patterns by using a machine learning algorithm. Pattern recognition can be defined as the classification of data based on knowledge already gained or on statistical information extracted from patterns and/or their representation. Example: consider our face then eyes, ears, nose, etc are features of the face. A set of features that are taken together, forms the features vector. Automated pattern recognition systems that are computer-dependent prove more efficient than human senses. The human sense might fail to recognize patterns due to loss of vision with age, or inefficient data. Then the automated systems prove to be the beneficial factor in various aspects of life. PHASES IN PR 1. Sensing: In this phase, the pattern recognition system converts the input data into analogous data. 2. Segmentation: This phase ensures that the sensed objects are isolated. 3. Feature extraction: This phase computes the features or properties of the objects and sends them for further classification. 4. Classification: In this phase, the sensed objects are categorized or placed in groups or cases. 5. Post-processing: Here, further considerations are made before a decision is made IRIS PATTERN RECOGNITION The routine inclusion of a fingerprint scanner on certain popular brands of Smartphone points to the fact that biometric security techniques are becoming an increasingly common aspect of our daily lives. Iris patterns are one of the most distinctive and distinguishing personal attributes used in biometric security. Biometrics and the use of Iris Pattern Recognition in cyber security. IRIS PATTERN RECOGNITION-THE EYE HAS IT The iris is a colored ring of muscle which opens and closes the eyeball of eye like the shutter on a camera. The color of this ring-shaped region around the pupil is determined by the amount of the substance called melanin, which it contains. A higher amount of melanin in the iris produces a browner pigment, in a color spectrum that typically ranges from blue, gray, or greenish, to various shades of brown. These patterns are complex, intricate, and extremely unique. The patterns of each of two eyes are different from each other – and from those of anyone else. This makes iris patterns an even more accurate biometric identifier than fingerprints (which are also unique to each finger, and each individual). But with wear and tear over time or due to injury, fingerprints undergo changes that may render them unreliable. BASICS OF IRIS PR To perform iris pattern recognition, one or more detailed images of the eye must be captured using a high-resolution digital camera. A computer program known as a matching engine (which is configured with a special mathematical recognition formula or algorithm) is then used to compare the captured image of a person’s iris pattern to its own database of stored images. These matching engines can typically compare millions of images per second, with a level of accuracy comparable to conventional fingerprinting or digital finger scanning. When used in access control or identity verification, iris pattern recognition requires the unique pattern of a subject’s iris to be positively matched against the system’s recognition database. ENROLLMENT AND VERIFICATION The enrollment phase is all about constructing a database of the iris patterns of all the people which the system will be required to validate or recognize. The system removes unnecessary details from each image. This is approximately five times as many points of comparison as the average fingerprint analysis yields. These identifying features are then transformed into a simple, 512-digit number known as an Iris Code, which is stored in the system database along with the person’s name and relevant credentials. Verification occurs each time an individual has their eye photographed by an iris scanner, and their Iris Code is successfully matched against the value stored in the system database. Iris patterns may also be compared using matching engines made up of hundreds, thousands, or even millions of individual records. LIMITING FACTORS OF IRIS PR Much like the early technologies for facial recognition, proximity and image clarity are vital factors for iris recognition – both in capturing the initial enrollment photograph and in subsequent scans of a person’s iris pattern for matching against the verification database. Control mechanisms must also be put in place to guard against the substitution of high-definition photographs for actual irises at the point of scanning. Certain kinds of contact lenses and spectacles may also produce distortions in the observed pattern of the iris. These limitations emphasize the need for high-quality and high-definition digital imaging equipment and software. The software, in particular, has a role to play in correcting for minor errors such as motion blur, and in correctly demarcating the two boundaries (inner and outer) of the iris region. Systems also need to have the capacity to allow for changes in the surface area of the iris, as the pupil of the eye shrinks or grows in response to different lighting conditions. APPLICATIONS Iris pattern recognition systems have been deployed at airports, border crossings, and individual points of entry or exit for buildings in several countries across the globe. Devices may be wall-mounted or hand-held and portable Iris recognition systems for personal use are available for protecting laptops and other equipment, while a number of mobile apps are available for providing access control and anti-theft protection on smart phones and other devices fitted with front-facing cameras. A small portable iris-scanning device is available on the consumer market, for personal applications such as logging onto secure websites without having to use a password. THE VISION AHEAD It’s been estimated that iris pattern recognition is ten times more accurate than fingerprinting. And since iris patterns remain relatively unchanged for decades, this recognition accuracy has the potential to stretch for many years into the future. Despite the somewhat high initial costs and relative newness of the technology, it’s likely that it will continue to evolve to the stage where photography and digital image processing may be conducted with more clarity and at greater distances. This kind of evolution has the potential to raise issues over privacy concerns, civil liberties, and the ways in which recognition data is used and handled. These issues aside, in terms of its accuracy, uniqueness in identifying an individual, and overall convenience over more conventional methods of verification and access control, iris pattern recognition has much to offer, in cyber security applications. The Pattern Recognition systems are powerful to provide various applications in day to day lives of human beings as a civil society.The Pattern recognition systems are strongly built on AI and ML principles.