StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Eye Biometric Recognition System - How It Works - Case Study Example

Cite this document
Summary
The underlying purpose of this discussion "Eye Biometric Recognition System - How It Works" is to provide the reader with a more informed understanding of the system that is mainly concerned with the reflections of illuminated images found in the eye of an individual…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful

Extract of sample "Eye Biometric Recognition System - How It Works"

Eye Biometric Recognition System - how it works Introduction For many years, the secret service has been trying to come across a system that will help make their work easier but has not been easy because most of the systems that they have tried have not proven to be effective until the day they came across the Iris recognition system. This is a system that is used in the top secret missions to find out some of the hidden information associated with criminals. The system is mainly concerned with the reflections of illuminated images found in the eye of an individual. The study of this system is very deep because it more advanced as compared to other systems in existence and that it is easier to positively find the identification of an individual through this system as compared to any other system (Joseph, 2010). Image of The iris image retrieval system Looking deep into the eyes of individual who is about to be investigated, it is easier to find out his or her immediate intentions through this system because there is a way in which the images are portrayed in the eyes of the individual with the indicators of who they really are. The eye recognition system has been used in many ways in many parts of the world and some of the most common ways in which they have been used are such as through getting the National Identification of an individual, through coming up with their passports and so on. This is a method that is automated in biometric identification mathematic techniques to recognize patterns on the video images that are seen in the eyes of an individual who has random patterns that are able to be seen from a long distance and are unique (Nikolaos, 2009). Eye recognition system is mainly concerned with cognitive functions such as learning, attention, visual and audio perception and memory and these are very important for the activities of human beings since they trigger numerous brain activities. Assuming that the brain activities of humans follow a certain pattern for everybody in a normal circumstance, and then there are high chances that they can change when one is stressed up, fatigued either mentally or physically or when one is under the influence of some substances such as alcohol. The eye recognition system would be very effective in health care applications where it could not only be used to verify the identity of an individual in medical records before drug administration or other medical procedures but also to detect the physical and mental conditions of a patient. Besides just being used in the health care applications, this system is expected to have very many uses in the near future because the level of technology is growing at a very high rate. Control of the classified access into restricted areas security systems, health disorder or illness identification in medicine, gaining more understanding of the cognitive human brain processes in neuroscience seem to be the most appealing in eye recognition systems (Christopher, 2006). Iris Color segmentation Eye biometric recognition is used in many ways and in many activities such as electronic commerce for online transactions, Medical records, security identification, and network protection and so on. It is very important to have a clear identification of people involved in an online business transaction because through doing this then there will be protection of the individuals involved. The identification process increases individual accountability within the supply chain of activities and this is very important since it reduces chances of any risks within a working environment. In medical records, eye recognition system is used in verifying the most sensitive information of an individual such as their name, ID number and others since these are the ones that bring accuracy of data during a pharmaceutical delivery. In the medical records personal information can be sealed by the records of an Iris Code and this is also very important because it ensures that the identity of the patient remains unspecified. The only person that can access information is the owner of the data that has been confirmed and through this is where the owner is able to maintain his or her personal privacy protected thus increasing their confidentiality. Eye recognition system is also used in security identification and authentication of the individuals and this is done within business safe rooms, facilities and other restricted areas that require reliability for access (Kamel, 2010). Security identifications such as ID badges, passwords, codes and PINs can be forged or they can be illegally obtained thus using Iris recognition ends up being the most accurate system for security. This technology ensures that the person who is accessing specific information is the one who is entitled to it legally. It also works in Network protection and this can be done through ensuring that all the networks within a computer system and the data that is stored and shared are well protected through making it only accessible to the user who is privileged. Sensitive database cannot be intruded by hackers and other cyber threats when iris recognition has been implemented because it is a very powerful system and those who try to do so find it formidable (Muhammad, 2005). Who Uses It Eye recognition system is used by different people in the society in different area of expertise. The people who mainly use this system are such as the doctors in health care systems, people in the top secret services, business administrations and network data among others. In hospitals doctors use this system to file up the records of individuals who have been diagnosed with different diseases and this is done through verifying the accurate identification of the patients and noting it down for future references. Business people also use this system when making very important transactions online since it is very good and very important to have complete information of the people whose transactions are being done for creditability purposes (Dijana, 2009). In big business offices, the workers have to identify themselves in many ways so as to avoid situations which could lead to information being leaked. In the past years there have been many ways in which people used to identify themselves before the invention of the eye recognition system and some of the ways are such as through being given PINs, codes, passwords and badges among others. With the rapidly growing rate of technology, people have come to know that these methods can be faked in many ways thus they have decided lay much focus on the eye contact system since it cannot be forged. Business facilities are also kept off some risks through this system and it has been very effective to the business administrations in different parts of the world. People in the IT department in different offices also use this system especially when it comes to dealing with the data collection of information in different companies because nowadays there are many hackers who can disclose information that is very important. The system ensures that very important data is kept safe from anyone who might interfere with it and try to steal information thus this ensures total security of people, facilities and network data within a given company (Samir, 2006). Where in Action? This system is expected to be seen in action in many different places. Some of the most common places where this system is bound to be seen in action are such as in hospitals where the records of patients are kept and their real identity is required, in criminal defense centers where suspects have been caught and are investigated for serious crimes, in business offices where business documents and other facilities are kept and are being checked for confirmation of how secure they are (Cashman, 2009). The system can also be found in action in the IT departments of different offices where collection of information data and protection of the computer systems is being investigated by the organization and so on. And finally, it can also be found in war zones where some terrorists’ suspects have been caught and are investigated for any forms of attacks that might have taken place. Major Functions and History Identification of people in the modern world has become a very important thing and it is becoming of more importance with increase in time in the network society. Biometrics is the main branch of science that deals with the behavior of human beings and their other physical characteristics. Of all the systems that have been in existence, iris recognition has proven to be the most effective since it is the one which brings out the characters of individuals in a unique way since the features of the iris does not change during a lifetime. In Iris recognition system, the most important step is to identify accurate iris segmentation and localization from the images found in the eye. The outer boundary of the iris is calculated through tracing objects that are of various shapes and structure and based on the size of the pupil which is varied, the inner boundary of iris is detected. The variation in the size of the pupil is also used to find out whether the iris is alive or not thus this approach is considered to be a very promising technique in making it easy to trace out a fake iris spoofing attempt. The rate at which the iris can localize eye images is 99.48% with very minimal loss of the iris texture features in spatial domain as compared to all the other techniques in existence since the processing time that is required is also comparable with existing techniques (Ford, 2010). Conclusion Finally, the major functions of this system are such as identification of individuals, identifying iris segmentation, ensuring security in very many ways. It is also used for keeping accurate data information computer systems and protecting them from any other forms of threats. The other major function of this system is ensuring proper documentation of information in health care systems and in other systems too. Reference Muhammad, S (2005). Computer-aided intelligent recognition techniques and applications. New York, John Wiley and Sons Ford, L (2010). Information Processing and Management: International Conference on Recent Trends in Business Administration and Information Processing. New York, Springer Samir, S (2006). Enhanced iris recognition: Algorithms for segmentation, matching and synthesis. West Virginia University, Pro Quest Kamel, M (2010). Image Analysis and Recognition: 7th International Conference, ICIAR 2010, Povoa de Varzim, Portugal. New York, Springer Cashman, S (2009). Discovering Computers 2010: Living in a Digital World. New York, Cengage Learning Dijana, P (2009). Guide to Biometric Reference Systems and Performance Evaluation. New York, Springer Christopher, K (2006). Multispectral iris recognition analysis: Techniques and evaluation. West Virginia University, ProQuest Nikolaos, V (2009). Biometrics: theory, methods, and applications. New York, Wiley & Sons Joseph, N (2010). Biometric Recognition: Challenges and Opportunities. New York, National research Council Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Eye Biometric Recognition System - How It Works Case Study, n.d.)
Eye Biometric Recognition System - How It Works Case Study. https://studentshare.org/technology/2046615-eye-biometric-recognition-system-how-it-works
(Eye Biometric Recognition System - How It Works Case Study)
Eye Biometric Recognition System - How It Works Case Study. https://studentshare.org/technology/2046615-eye-biometric-recognition-system-how-it-works.
“Eye Biometric Recognition System - How It Works Case Study”. https://studentshare.org/technology/2046615-eye-biometric-recognition-system-how-it-works.
  • Cited: 0 times

CHECK THESE SAMPLES OF Eye Biometric Recognition System - How It Works

The Introduction of the Biometric System

The introduction of the Biometric system has taken new strides as we usher into the next decade.... The paper "Biometric system" discusses the pros and cons of the system and also throws light whether it infringes the privacy of an individual.... hellip; Many Europeans countries have considered adopting this system to have a much more synchronized process of identification as well as the compilation of data with regard to the citizens of the countries....
6 Pages (1500 words) Essay

Biometric Authentication

Before deciding on whether the biometric system should be used or not, the first question is whether the biometric information can be technologically reproduced artificially.... biometric Authentication is generally a more secure means of optimizing data security on online transaction as it minimizes the risk of impersonation and identity theft.... In essence, biometric identification implies that the owners of the information are present in person as it… 11)....
2 Pages (500 words) Essay

Biometric Centralisation vs Biometric Balkanization: which is better

54). Biometric Balkanization provides maximum flexibility to the users a system.... FlexibilityBiometric Balkanization provides maximum flexibility to the users a system.... SynergyBiometric Balkanization provides synergy to the interests of the users of the system.... Jafari-Khouzani & K 2014, Near infrared face recognition by combining Zernike moments and undecimated discrete wavelet transform.... rawford, M 2002, "Facial recognition progress report"....
1 Pages (250 words) Essay

Stengths and weaknesses of biometrics mechanis,s

It impossible that the system made mistakes as proved in crimesRetinal scanningThere is no known way to replicate a retina scanning, which makes it the safest bet (“Comparative study of different biometric features”)Latency can take away 10 seconds which is very difficult.... Gait technology has been a prominent force that has been the driving force for signature recognition to drive security Many new improvements have been the catalyst to improve these programs (“Comparative study of different biometric features”). Analyzing this, it is clear… For instance, the password method is the cheapest technology but is the most vulnerable....
2 Pages (500 words) Essay

The Application of Biometric Technology and the Convenience

This essay "The Application of biometric Technology and the Convenience" analyzes public applications as well as commercial applications of biometric technology.... biometric technology faces many challenges especially due to the slow development and issues.... hellip; biometric technology has been used in offering better security and convenience when controlling access to facilities as well as other tangible resources.... The main reason propelling the use of biometric technology for tighter border control is that the conventional security approaches never offer adequate level of security....
5 Pages (1250 words) Essay

The Ways of Organization of World Exhibitions of Fine and Applied Art

This paper "The Ways of Organization of World Exhibitions of Fine and Applied Art" focuses on the fact that from school lessons, everyone knows that all acknowledged genii of fine and applied Art worked for a long time in order to make their works world-famous and popular.... He also bought their works of art and exhibited them in the window of his shop.... There is a way to pay the attention of the auditory to the works of new painters.... Instead of buying the works of unknown authors, it is better to open a gallery and organize the exhibition of their works....
12 Pages (3000 words) Research Proposal

Biometric Technologies Used for Workstation Authentication in Small Enterprises

There are however differing restrictions on how the images are by the systems, a factor which has made the task quite a hard one (Chellappa, et al.... Biometrics involves recognition of human beings based upon some traits such as in their physique or behaviors.... Facial recognition: this is another biometric technology that has been used in various security demanding situations.... Facial recognition ranges from static shots, controlled movements and dynamic identification against diverse backgrounds....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us