Chapter 8. Iris Biometric Technology1

 <  Day Day Up  >  

Chapter 8. Iris Biometric Technology [1]

[1] The entire reference for this chapter is taken from John Daugman's Web site ( www.cl.cam.ac.uk/users/jgd1000/ ).

The use of the iris for biometric authentication is relatively new. All the current commercial algorithms are based on the original patented algorithm from John Daugman at the University of Cambridge. In 1994, the iris engine was ready and available for licensing. Since then, Iridian Technologies has purchased the algorithms and associated rights. Iridian Technologies has licensed other companies to build applications that leverage the iris algorithms.

Iris biometrics offer the promise of the Holy Grail of biometrics. A strong, reliable biometric trait is measured, generating a template that is simple to compare and provides virtually no FAR. There is also an extremely low FRR of 0.2% in three attempts.

With a very high FAR and a very low FRR, iris biometrics work very well for both identification and verification. It is clear that the iris can deliver the best level of accuracy of all other biometrics. However, the question remains: Can it be deployed for use in a network security environment?

In our investigation of iris biometrics, we will try to answer this question and provide a suitable background so that you can make a final decision.

To learn the most about iris biometrics, the discussion will be broken into the following areas:

  • General description of iris biometrics

  • How is the iris captured?

  • How do the algorithms work?

  • How can this biometric be spoofed?

 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net