Hamming Cut Matching Algorithm (1261)
Hamming Cut Matching Algorithm (1261)
Matching
Algorithm
For Iris
Recognition
Presented by:
R Sai Suryanarayana Sastry
Roll no: 19311A1261
1. Introduction
2. Identification using Iris recognition
3. Finding Iris in an Image
4. Hamming cut matching Algorithm
Contents 5. Advantages of this algorithm
6. Disadvantages of this algorithm
7. Applications
8. Conclusion
Introduction
John Daugman developed and patented the first algorithms to perform iris recognition in
1953
Hamming – cut matching is also one of the algorithm which reduces the comparison time
for matching the iris code with database
We compare the iris codes of the current person who wants to access the database and
gives the matched results to the user
As the iris recognition technology produces very low false rate when compared to the
other biometrics results it is very preferable in many systems such as airports, banks,
defense, etc..
Identification using Iris recognition
Iris recognition is one of the biometric systems which utilize iris patterns as
a method of gathering unique information about an individual.
It is considered to be one of the most reliable biometrics with some of the
lowest false rejection and false acceptance rates
The iris, the colored portion of the eye, is approximately 11mm (0.433
inches) in diameter and consists of several layers
Finding Iris in
an Image
An iris has a mesh-like texture to it,
with numerous overlays and
patterns that can measured by the
computer.
Can't use a regular camera; requires IR light source and sensor. Visible light
must be minimized for highest accuracy.
Iris is small in size and can’t be located from a few meters distance. A
person needs to be in close distance with the iris scanning device to be
enrolled on the system properly.
The constant use of this system may cause harm to the iris because it is
constantly being scanned with infrared light.
Applications of Hamming cut matching
Algorithm
Hamming – cut matching algorithm which reduces the comparison time for
matching the iris code with database
cell phone and other wireless-device-based authentication can use Iris
recognition
Iris based biometric ATM’s are more secure than conventional pin based
ATM’s because it requires biometric verification which cannot be stolen,
copied or faked.
Passwords, token cards and PINs are all
risks to the security of an organization
due to human nature. Our inability to
remember complex passwords and
tendency to write these down along
with losing token cards or forgetting
PINs all contribute to the possible
Conclusion breakdown in security for an
organization.
If a two-factor authentication system is
implemented, iris recognition with a
hand scanner for the verification, then
the strength of authentication
increases
Thank you