Implementation of iris recognition technique for E-security

Iris recognition is touted to be one of the most accurate, reliable and promising form of biometrics. Developed by Dr. John Daugman, Daugman’s iris recognition algorithms are used in most commercial iris recognition systems today. Due to the decreasing cost of iris recognition technology, there are...

Full description

Saved in:
Bibliographic Details
Main Author: Loke, Jonathan Xiang
Other Authors: Mohammed Yakoob Siyal
Format: Final Year Project
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/69299
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-69299
record_format dspace
spelling sg-ntu-dr.10356-692992023-07-07T17:46:46Z Implementation of iris recognition technique for E-security Loke, Jonathan Xiang Mohammed Yakoob Siyal School of Electrical and Electronic Engineering DRNTU::Engineering Iris recognition is touted to be one of the most accurate, reliable and promising form of biometrics. Developed by Dr. John Daugman, Daugman’s iris recognition algorithms are used in most commercial iris recognition systems today. Due to the decreasing cost of iris recognition technology, there are more commercial research, development of new algorithms and applications of iris recognition than before. In addition, as password authentication alone is increasingly deemed insufficient, there is a push towards multi-factor authentication in the field of e-security, As a result of the two forces converging, there exists an opportunity and desire to integrate biometric authentication, so as to improve the reputation of e-commerce security. With a more secure e-commerce landscape, online merchants can benefit from more customers choosing e-commerce over regular commerce. Since iris recognition is not the only form of biometric authentication, the other biometrics are also studied and compared in this project to weigh their respective advantages and disadvantages. By implementing Daugman’s algorithm using MATLAB software and publicly available database of iris images, the author modelled an iris recognition system. Experiments were then conducted to simulate the usage of an actual iris recognition system for e-security purposes, as closely as possible. Results from the implemented MATLAB program were then analyzed to evaluate whether it worked according to theory and if the iris recognition error rates are as low as reported. Finally, given the shortcomings faced, works were recommended to improve future implementations of iris recognition systems. Even though iris recognition technology itself has several theoretical advantages, thanks to the uniqueness of irises, malicious attackers will inevitably find ways to circumvent iris recognition. Hence, whenever a human factor is added to the equation, even a promising technology like iris recognition cannot provide a miraculous, 100% fool-proof authentication method for e-security. One can only strive to improve iris recognition, algorithm-wise (technically) and implementation-wise (managerially), to achieve reasonably practicable e-security. Bachelor of Engineering 2016-12-12T07:22:53Z 2016-12-12T07:22:53Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/69299 en Nanyang Technological University 63 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Loke, Jonathan Xiang
Implementation of iris recognition technique for E-security
description Iris recognition is touted to be one of the most accurate, reliable and promising form of biometrics. Developed by Dr. John Daugman, Daugman’s iris recognition algorithms are used in most commercial iris recognition systems today. Due to the decreasing cost of iris recognition technology, there are more commercial research, development of new algorithms and applications of iris recognition than before. In addition, as password authentication alone is increasingly deemed insufficient, there is a push towards multi-factor authentication in the field of e-security, As a result of the two forces converging, there exists an opportunity and desire to integrate biometric authentication, so as to improve the reputation of e-commerce security. With a more secure e-commerce landscape, online merchants can benefit from more customers choosing e-commerce over regular commerce. Since iris recognition is not the only form of biometric authentication, the other biometrics are also studied and compared in this project to weigh their respective advantages and disadvantages. By implementing Daugman’s algorithm using MATLAB software and publicly available database of iris images, the author modelled an iris recognition system. Experiments were then conducted to simulate the usage of an actual iris recognition system for e-security purposes, as closely as possible. Results from the implemented MATLAB program were then analyzed to evaluate whether it worked according to theory and if the iris recognition error rates are as low as reported. Finally, given the shortcomings faced, works were recommended to improve future implementations of iris recognition systems. Even though iris recognition technology itself has several theoretical advantages, thanks to the uniqueness of irises, malicious attackers will inevitably find ways to circumvent iris recognition. Hence, whenever a human factor is added to the equation, even a promising technology like iris recognition cannot provide a miraculous, 100% fool-proof authentication method for e-security. One can only strive to improve iris recognition, algorithm-wise (technically) and implementation-wise (managerially), to achieve reasonably practicable e-security.
author2 Mohammed Yakoob Siyal
author_facet Mohammed Yakoob Siyal
Loke, Jonathan Xiang
format Final Year Project
author Loke, Jonathan Xiang
author_sort Loke, Jonathan Xiang
title Implementation of iris recognition technique for E-security
title_short Implementation of iris recognition technique for E-security
title_full Implementation of iris recognition technique for E-security
title_fullStr Implementation of iris recognition technique for E-security
title_full_unstemmed Implementation of iris recognition technique for E-security
title_sort implementation of iris recognition technique for e-security
publishDate 2016
url http://hdl.handle.net/10356/69299
_version_ 1772825834186342400