Iris Recognition is the most reliable and accurate biometric identification system available today!
You can see it very commonly used in futuristic electronic devices like smartwatches and smartphones and security purposes like passports, aviation security, and controlling access to restricted areas at airports, database access, and computer login.
Iris recognition identifies a person in real-time by analyzing the random pattern visible within the iris, a muscle in the eye that regulates the size of the pupil, controlling the amount of light that enters the eye. Iris is the color portion that gets its color based on the amount of melatonin pigment within the eye muscle.
From birth, the pattern in the retina remains unchanged till your death, so the iris biometric is one of the most secure access controls in terms of security. In fingerprint biometric, a person’s finger can change its size/form over time, which can easily lead to false acceptance.
How does it work?
Iris recognition involves two stages: enrollment, a process of scanning the pupil for the first time and storing it in the database/cloud/device as reference for the future authorizations, and verification, a process of cross-checking the database and then authorizing the personnel if the data matches. If the verification fails, the system will show an error log or ask the personnel for enrollment.
A typical iris scanner scans the retina with the help of CCD (Charge Coupled Device) digital camera and takes a clear, high-contrast picture of a person’s iris using both visible and near-infrared light. In the presence of near-infrared light, the pupil becomes black, making it to isolate the pupil and iris, so that the iris pattern can be used for matching purposes.
After the iris isolation, it is converted into a digital format to be analyzed in the iris detection process with Modified Canny Edge Detection Algorithm. This involves five steps:
- Smoothing: removes the noise by filtering and blurring
- Finding gradients: At the points/pixels where the color pattern falls in a similar threshold, the region is grouped.
- Non-maximum suppression: The image portion is nonlinear and circular or convex; hence, the boundary region matching the shape of the closet is taken out for only local maxima and then should be marked as the edge.
- Double thresholding: determines the potential edges.
- Edge tracking by hysteresis: Final edges are determined by suppressing all edges that are not connected to a very certain (strong) edge.
Then comes the next step called Normalization, in which the final edges are normalized to enable the generation of the iris code and their comparisons. The normalization process involves unwrapping the iris and converting it into its polar equivalent. It is done using Dagan’s Rubber sheet model.
In the next phase called feature extraction, Haar Wavelet Decomposition is used to derive the unique characteristics of the iris. This process decomposes the image into four coefficients: Horizontal, Diagonal, Vertical, and Approximation. This process is continued for five-level. The coefficient of the last level is combined to form a vector and converted into binary form. This allows the scanner to compare the data in the database and query image, and grant the access by passing the binary value.
The final step is called matching, where the hamming distance approach is used to compare the iris code generated for the database and query image. The difference between the two codes is counted, and the number is divided by the count. This matching score is provided as input that generates a final matching score.
Advantages of iris recognition
- The biggest advantage of using iris recognition is its accuracy and reliability.
- Mathematical patterns of iris remain stable throughout the life of the individual.
- It is a secure and cost-effective alternative to passwords and personal identification numbers (PIN).
- Highly scalable to be deployed in many government projects like National ID or immigration and healthcare services.
- Unlike a fingerprint, it ensures hygiene as iris can be scanned from a distance and doesn’t require any contact.
- Extremely difficult to be forged. This assures the highest level of security.
Disadvantages of iris recognition
- If the subject is unconscious or dead, the authentication will fail because the scanner detects the movement of the iris.
- It requires a minimum distance between the scanner and the human eye. It cannot scan if the distance is high.
- It requires an IR light source and sensor. It can’t use a regular camera.
- Visible light should be minimized for the highest accuracy.
- Eyelashes, lenses, and reflections can cause obstacles.
The major market player in iris recognition
- Crossmatch Technologies
- HID Global
- IRIS ID
- NEC Corporation
- Princeton Identity
- SRI International
- Thales Group