Iris recognition

Last updated

Iris recognition biometric systems apply mathematical pattern-recognition techniques to images of the irises of an individual's eyes. ColourIris.png
Iris recognition biometric systems apply mathematical pattern-recognition techniques to images of the irises of an individual's eyes.

Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance. The discriminating powers of all biometric technologies depend on the amount of entropy [1] they are able to encode and use in matching. Iris recognition is exceptional in this regard, enabling the avoidance of "collisions" (False Matches) even in cross-comparisons across massive populations. [2] Its major limitation is that image acquisition from distances greater than a meter or two, or without cooperation, can be very difficult. However, the technology is in development and iris recognition can be accomplished from even up to 10 meters away or in a live camera feed. [3]

Contents

Retinal scanning is a different, ocular-based biometric technology that uses the unique patterns on a person's retina blood vessels and is often confused with iris recognition. Iris recognition uses video camera technology with subtle near infrared illumination to acquire images of the detail-rich, intricate structures of the iris which are visible externally. Digital templates encoded from these patterns by mathematical and statistical algorithms allow the identification of an individual or someone pretending to be that individual. [4] Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per (single-core) CPU, and with remarkably low false match rates.

At least 1.5 billion people around the world (including 1.29 billion citizens of India, in the UIDAI / Aadhaar programme as updated on 30 November) have been enrolled in iris recognition systems for national ID, e-government services, benefits distribution, security, and convenience purposes such as passport-free automated border-crossings. [5] [6] [7] [8] [9] [10] [11] [12] A key advantage of iris recognition, besides its speed of matching and its extreme resistance to false matches, is the stability [13] of the iris as an internal and protected, yet externally visible organ of the eye.

In 2023, Pakistan's National Database & Registration Authority (NADRA) has launched IRIS for citizen registration/ Civic Management during registration at its offices for the National ID Card. After its initial stage, the eye-recognition verification access will be available for LEAs, banking sectors, etc.

History

Although John Daugman developed and in the 1990s patented the first actual algorithms to perform iris recognition, published the first papers about it and gave the first live demonstrations, the concept behind this invention has a much longer history and today it benefits from many other active scientific contributors. In a 1953 clinical textbook, F.H. Adler [14] wrote: "In fact, the markings of the iris are so distinctive that it has been proposed to use photographs as a means of identification, instead of fingerprints." Adler referred to comments by the British ophthalmologist J.H. Doggart, [15] who in 1949 had written that: "Just as every human being has different fingerprints, so does the minute architecture of the iris exhibit variations in every subject examined. [Its features] represent a series of variable factors whose conceivable permutations and combinations are almost infinite." Later in the 1980s, two American ophthalmologists, L. Flom and Aran Safir managed to patent Adler's and Doggart's conjecture that the iris could serve as a human identifier, but they had no actual algorithm or implementation to perform it and so their patent remained conjecture. The roots of this conjecture stretch back even further: in 1892 the Frenchman A. Bertillon had documented nuances in "Tableau de l'iris humain". Divination of all sorts of things based on iris patterns goes back to ancient Egypt, to Chaldea in Babylonia, and to ancient Greece, as documented in stone inscriptions, painted ceramic artefacts, and the writings of Hippocrates. (Iris divination persists today, as "iridology.")[ citation needed ]

The core theoretical idea in Daugman's algorithms is that the failure of a test of statistical independence can be a very strong basis for pattern recognition, if there is sufficiently high entropy (enough degrees-of-freedom of random variation) among samples from different classes. In 1994 he patented this basis for iris recognition and its underlying computer vision algorithms for image processing, feature extraction, and matching, and published them in a paper. [16] These algorithms became widely licensed through a series of companies: IriScan (a start-up founded by Flom, Safir, and Daugman), Iridian, Sarnoff, Sensar, LG-Iris, Panasonic, Oki, BI2, IrisGuard, Unisys, Sagem, Enschede, Securimetrics and L-1, now owned by French company Morpho.

With various improvements over the years, these algorithms remain today the basis of all significant public deployments of iris recognition, and they are consistently top performers in NIST tests (implementations submitted by L-1, MorphoTrust and Morpho, for whom Daugman serves as Chief Scientist for Iris Recognition). But research on many aspects of this technology and on alternative methods has exploded, and today there is a rapidly growing academic literature on optics, photonics, sensors, biology, genetics, ergonomics, interfaces, decision theory, coding, compression, protocol, security, mathematical and hardware aspects of this technology.

Most flagship deployments of these algorithms have been at airports, in lieu of passport presentation, and for security screening using watch-lists. In the early years of this century, major deployments began at Amsterdam's Schiphol Airport and at ten UK airport terminals allowing frequent travellers to present their iris instead of their passport, in a programme called IRIS: Iris Recognition Immigration System. Similar systems exist along the US / Canada border, and many others. In the United Arab Emirates, all 32 air, land, and seaports deploy these algorithms to screen all persons entering the UAE requiring a visa. Because a large watch-list compiled among GCC States is exhaustively searched each time, the number of iris cross-comparisons climbed to 62 trillion in 10 years. The Government of India has enrolled the iris codes (as well as fingerprints) of more than 1.2 billion citizens in the UIDAI (Unique Identification Authority of India) programme for national ID and fraud prevention in entitlements distribution. [5] In a different type of application, iris is one of three biometric identification technologies internationally standardised since 2006 by ICAO for use in e-passports (the other two are fingerprint and face recognition). [17]

Visible vs near infrared imaging

Iris melanin, also known as chromophore, mainly consists of two distinct heterogeneous macromolecules, called eumelanin (brown–black) and pheomelanin (yellow–reddish), [18] [19] whose absorbance at longer wavelengths in the NIR spectrum is negligible. At shorter wavelengths within the VW spectrum, however, these chromophores are excited and can yield rich patterns. Hosseini, et al. [20] provide a comparison between these two imaging modalities. An alternative feature extraction method to encode VW iris images was also introduced, which may offer an alternative approach for multi-modal biometric systems.

Visible wavelength iris imageNear infrared (NIR) versionNIR imaging extracts structure
ColourIris.png NIRIris.png IRiris.jpg
Visible light reveals rich pigmentation details of an Iris by exciting melanin, the main colouring component in the iris.Pigmentation of the iris is invisible at longer wavelengths in the NIR spectrum.
 
Even "dark brown" eyes reveal rich iris texture in the NIR band, and most corneal specular reflections can be blocked.

Operating principle

A, now obsolete, IriScan model 2100 iris recognition camera. IriScan model 2100 iris scanner 1.jpg
A, now obsolete, IriScan model 2100 iris recognition camera.
Pier2.3 SecuriMetrics iris scanner (cropped).jpg
Pier2.3 rear view.jpg
Iris scanner PIER 2.3 (Portable Iris Enrollment and Recognition) from SecuriMetrics

First the system has to localize the inner and outer boundaries of the iris (pupil and limbus) in an image of an eye. Further subroutines detect and exclude eyelids, eyelashes, and specular reflections that often occlude parts of the iris. The set of pixels containing only the iris, normalized by a rubber-sheet model to compensate for pupil dilation or constriction, is then analyzed to extract a bit pattern encoding the information needed to compare two iris images.

In the case of Daugman's algorithms, a Gabor wavelet transform is used. The result is a set of complex numbers that carry local amplitude and phase information about the iris pattern. In Daugman's algorithms, most amplitude information is discarded, and the 2048 bits representing an iris pattern consist of phase information (complex sign bits of the Gabor wavelet projections). Discarding the amplitude information ensures that the template remains largely unaffected by changes in illumination or camera gain, and contributes to the long-term usability of the biometric template.

For identification (one-to-many template matching) or verification (one-to-one template matching), [21] a template created by imaging an iris is compared to stored templates in a database. If the Hamming distance is below the decision threshold, a positive identification has effectively been made because of the statistical extreme improbability that two different persons could agree by chance ("collide") in so many bits, given the high entropy of iris templates.

Advantages

The iris of the eye has been described as the ideal part of the human body for biometric identification for several reasons:

It is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane (the cornea). This distinguishes it from fingerprints, which can be difficult to recognize after years of certain types of manual labor. The iris is mostly flat, and its geometric configuration is only controlled by two complementary muscles (the sphincter pupillae and dilator pupillae) that control the diameter of the pupil. This makes the iris shape far more predictable than, for instance, that of the face.

The iris has a fine texture that—like fingerprints—is determined randomly during embryonic gestation. Like the fingerprint, it is very hard (if not impossible) to prove that the iris is unique. However, there are so many factors that go into the formation of these textures (the iris and fingerprint) that the chance of false matches for either is extremely low. Even genetically identical individuals (and the left and right eyes of the same individual) have completely independent iris textures. An iris scan is similar to taking a photograph and can be performed from about 10 cm to a few meters away. There is no need for the person being identified to touch any equipment that has recently been touched by a stranger, thereby eliminating an objection that has been raised in some cultures against fingerprint scanners, where a finger has to touch a surface, or retinal scanning, where the eye must be brought very close to an eyepiece (like looking into a microscope). [22]

The commercially deployed iris-recognition algorithm, John Daugman's IrisCode, has an unprecedented false match rate (better than 10−11 if a Hamming distance threshold of 0.26 is used, meaning that up to 26% of the bits in two IrisCodes are allowed to disagree due to imaging noise, reflections, etc., while still declaring them to be a match). [23] While there are some medical and surgical procedures that can affect the colour and overall shape of the iris, the fine texture remains remarkably stable over many decades. Some iris identifications have succeeded over a period of about 30 years.

Iris recognition works with clear contact lenses, eyeglasses, and non-mirrored sunglasses. The early Sensar technology worked by first finding the face, then the eyes, and then took the Iris images. This was all done using infrared lighting. It is possible to identify someone uniquely in a dark room while they were wearing sunglasses.

Mathematically, iris recognition based upon the original Daugman patents or other similar or related patents define the strongest biometric in the world. Iris recognition will uniquely identify anyone, and easily discerns between identical twins. If a human can verify the process by which the iris images are obtained (at a customs station, entering or even walking by an embassy, as a desktop 2nd factor for authentication, etc.) or through the use of live eye detection (which varies lighting to trigger slight dilation of the pupil and variations across a quick scan which may take several image snapshots) then the integrity of the identification are extremely high.

Shortcomings

Many commercial iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing. [24] The scanners are often tough to adjust and can become bothersome for multiple people of different heights to use in succession. The accuracy of scanners can be affected by changes in lighting. Iris scanners are significantly more expensive than some other forms of biometrics, as well as password and proximity card security systems.

Iris recognition is very difficult to perform at a distance larger than a few meters and if the person to be identified is not cooperating by holding the head still and looking into the camera. However, several academic institutions and biometric vendors are developing products that claim to be able to identify subjects at distances of up to 10 meters ("Standoff Iris" or "Iris at a Distance" as well as Princeton Identity's "Iris on the Move" for persons walking at speeds up to 1 meter/sec). [22] [25]

As with other photographic biometric technologies, iris recognition is susceptible to poor image quality, with associated failure to enroll rates. As with other identification infrastructure (national residents databases, ID cards, etc.), civil rights activists have voiced concerns that iris-recognition technology might help governments to track individuals beyond their will. Researchers have tricked iris scanners using images generated from digital codes of stored irises. Criminals could exploit this flaw to steal the identities of others. [26]

The first study on surgical patients involved modern cataract surgery and showed that it can change iris texture in such a way that iris pattern recognition is no longer feasible or the probability of falsely rejected subjects is increased. [27]

Security considerations

As with most other biometric identification technology, an important consideration is live-tissue verification. The reliability of any biometric identification depends on ensuring that the signal acquired and compared has actually been recorded from a live body part of the person to be identified and is not a manufactured template. Besides a person's physical characteristics, which includes the eyes, one's voice and handwriting too, are not protected by the Fourth Amendment even though they are all constantly exposed. [28] Many commercially available iris-recognition systems are easily fooled by presenting a high-quality photograph of a face instead of a real face, [29] [30] which makes such devices unsuitable for unsupervised applications, such as door access-control systems. However, this is not the case with all iris recognition algorithms. The problem of live-tissue verification is less of a concern in supervised applications (e.g., immigration control), where a human operator supervises the process of taking the picture.

Methods that have been suggested[ citation needed ] to provide some defence against the use of fake eyes and irises include changing ambient lighting during the identification (switching on a bright lamp), such that the pupillary reflex can be verified and the iris image be recorded at several different pupil diameters; analysing the 2D spatial frequency spectrum of the iris image for the peaks caused by the printer dither patterns found on commercially available fake-iris contact lenses; analysing the temporal frequency spectrum of the image for the peaks caused by computer displays.[ citation needed ]

Other methods include using spectral analysis instead of merely monochromatic cameras to distinguish iris tissue from other material; observing the characteristic natural movement of an eyeball (measuring nystagmus, tracking eye while text is read, etc.); testing for retinal retroreflection (red-eye effect) or for reflections from the eye's four optical surfaces (front and back of both cornea and lens) to verify their presence, position and shape. [31] Another proposed[ citation needed ] method is to use 3D imaging (e.g., stereo cameras) to verify the position and shape of the iris relative to other eye features.

A 2004 report[ citation needed ] by the German Federal Office for Information Security noted that none of the iris-recognition systems commercially available at the time implemented any live-tissue verification technology. Like any pattern-recognition technology, live-tissue verifiers will have their own false-reject probability and will therefore further reduce the overall probability that a legitimate user is accepted by the sensor.

Deployed applications

IrisGuard Inc. UAE enrolment station IrisGuard-UAE.JPG
IrisGuard Inc. UAE enrolment station
IrisGuard Inc. First Cash Withdrawal on Iris Enabled ATM Iris Recognition Enabled ATM.jpg
IrisGuard Inc. First Cash Withdrawal on Iris Enabled ATM
A U.S. Marine Corps Sergeant uses a "PIER 2.3" iris scanner to positively identify a member of the Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and U.S. service members. USMC Sergeant identifies Baghdaddi city council member with iris scanner.jpg
A U.S. Marine Corps Sergeant uses a "PIER 2.3" iris scanner to positively identify a member of the Baghdadi city council prior to a meeting with local tribal leaders, sheiks, community leaders and U.S. service members.

Iris recognition in television and movies

See also

Notes

  1. Apple has introduced the Vision Pro as a "spatial computer", but the media and the general public have referred to it as a mixed reality or extended reality headset.

Related Research Articles

<span class="mw-page-title-main">Fingerprint</span> Biometric identifier

A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfaces such as glass or metal. Deliberate impressions of entire fingerprints can be obtained by ink or other substances transferred from the peaks of friction ridges on the skin to a smooth surface such as paper. Fingerprint records normally contain impressions from the pad on the last joint of fingers and thumbs, though fingerprint cards also typically record portions of lower joint areas of the fingers.

Biometrics are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

A retinal scan is a biometric technique that uses unique patterns on a person's retina blood vessels. It is not to be confused with other ocular-based technologies: iris recognition, commonly called an "iris scan", and eye vein verification that uses scleral veins.

<span class="mw-page-title-main">Facial recognition system</span> Technology capable of matching a face from an image against a database of faces

A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.

Speaker recognition is the identification of a person from characteristics of voices. It is used to answer the question "Who is speaking?" The term voice recognition can refer to speaker recognition or speech recognition. Speaker verification contrasts with identification, and speaker recognition differs from speaker diarisation.

<span class="mw-page-title-main">Hand geometry</span> Biometric identification

Hand geometry is a biometric that identifies users from the shape of their hands. Hand geometry readers measure a user's palm and fingers along many dimensions including length, width, deviation, and angle and compare those measurements to measurements stored in a file.

A card reader is a data input device that reads data from a card-shaped storage medium and provides the data to a computer. Card readers can acquire data from a card via a number of methods, including: optical scanning of printed text or barcodes or holes on punched cards, electrical signals from connections made or interrupted by a card's punched holes or embedded circuitry, or electronic devices that can read plastic cards embedded with either a magnetic strip, computer chip, RFID chip, or another storage medium.

John Gustav Daugman is a British-American professor of computer vision and pattern recognition at the University of Cambridge. His major research contributions have been in computational neuroscience, pattern recognition, and in computer vision with the original development of wavelet methods for image encoding and analysis. He invented the IrisCode, a 2D Gabor wavelet-based iris recognition algorithm that is the basis of all publicly deployed automatic iris recognition systems and which has registered more than 1.5 billion persons worldwide in government ID programs.

M2SYS Technology is a biometric identification management company that provides biometric identity management software, and hardware along with enterprise software applications. The company provide services to the different industries such as public safety, workforce management, point of sale, healthcare, education, child care, transportation security, banking and membership management. They offer Software Development Kits to software vendors that want to add biometric identification to their applications directly to end users.

<span class="mw-page-title-main">Aadhaar</span> Indian national identification number

Aadhaar is a 12-digit unique identity number that can be obtained voluntarily by all residents of India, based on their biometrics and demographic data. The data is collected by the Unique Identification Authority of India (UIDAI), a statutory authority established in January 2009 by the Government of India, under the jurisdiction of the Ministry of Electronics and Information Technology, following the provisions of the Aadhaar Act, 2016.

<span class="mw-page-title-main">Vein matching</span> Technique of biometric identification

Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin. Though used by the Federal Bureau of Investigation and the Central Intelligence Agency, this method of identification is still in development and has not yet been universally adopted by crime labs as it is not considered as reliable as more established techniques, such as fingerprinting. However, it can be used in conjunction with existing forensic data in support of a conclusion.

In order to identify a person, a security system has to compare personal characteristics with a database. A scan of a person's iris, fingerprint, face, or other distinguishing feature is created, and a series of biometric points are drawn at key locations in the scan. For example, in the case of a facial scan, biometric points might be placed at the tip of each ear lobe and in the corners of both eyes. Measurements taken between all the points of a scan are compiled and result in a numerical "score". This score is unique for every individual, but it can quickly and easily be compared to any compiled scores of the facial scans in the database to determine if there is a match.

A whole new range of techniques has been developed to identify people since the 1960s from the measurement and analysis of parts of their bodies to DNA profiles. Forms of identification are used to ensure that citizens are eligible for rights to benefits and to vote without fear of impersonation while private individuals have used seals and signatures for centuries to lay claim to real and personal estate. Generally, the amount of proof of identity that is required to gain access to something is proportionate to the value of what is being sought. It is estimated that only 4% of online transactions use methods other than simple passwords. Security of systems resources generally follows a three-step process of identification, authentication and authorization. Today, a high level of trust is as critical to eCommerce transactions as it is to traditional face-to-face transactions.

Biometrics refers to the automated recognition of individuals based on their biological and behavioral characteristics, not to be confused with statistical biometrics; which is used to analyse data in the biological sciences. Biometrics for the purposes of identification may involve DNA matching, facial recognition, fingerprints, retina and iris scanning, voice analysis, handwriting, gait, and even body odor.

IDEMIA is a multinational technology company headquartered in Courbevoie, France. It provides identity-related security services, and sells facial recognition and other biometric identification products and software to private companies and governments.

Eye vein verification is a method of biometric authentication that applies pattern-recognition techniques to video images of the veins in a user's eyes. The complex and random patterns are unique, and modern hardware and software can detect and differentiate those patterns at some distance from the eyes.

<span class="mw-page-title-main">Biometric device</span> Identification and authentication device

A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.

<span class="mw-page-title-main">Aadhaar Act, 2016</span> Act of the Parliament of India

The Aadhaar Act, 2016 is a money bill of the Parliament of India. It aims to provide legal backing to the Aadhaar unique identification number project. It was passed on 11 March 2016 by the Lok Sabha. Certain provisions of the Act came into force from 12 July 2016 and 12 September 2016.

Contactless fingerprinting technology (CFP) was described in a government-funded report as an attempt to gather and add fingerprints to those gathered via wet-ink process and then, in a "touchless" scan, verify claimed identify and, a bigger challenge, identify their owners without additional clues.

<span class="mw-page-title-main">Neurotechnology (company)</span>

Neurotechnology is an algorithm and software development company founded in Vilnius, Lithuania in 1990.

References

  1. "Advances in Artificial Intelligence and Machine Learning, vol. 4, issue 2, pp 2152-2163" (PDF). cam.ac.uk.
  2. "Understanding Biometric Entropy and Iris Capacity: Avoiding Identity Collisions on National Scales" (PDF). cam.ac.uk. Retrieved 12 August 2023.
  3. Choi, | Tyler (13 June 2022). "Iris recognition reaches the mainstream for identification, authentication | Biometric Update". www.biometricupdate.com. Retrieved 28 June 2023.
  4. Zetter, Kim (25 July 2012). "Reverse-Engineered Irises Look So Real, They Fool Eye-Scanners". Wired Magazine. Retrieved 25 July 2012.
  5. 1 2 3 "Apache Tomcat". Archived from the original on 28 June 2013. Retrieved 27 August 2013.
  6. "UNHCR's new biometrics system helps verify 110,000 Myanmar refugees in Thailand | UNHCR UK".
  7. "Blockchain could change the future of humanitarian aid". 3 January 2019.
  8. "WFP Introduces Iris Scan Technology to Provide Food Assistance to Syrian Refugees in Zaatari | World Food Programme". 6 October 2016.
  9. "'These changes show that WFP loves us.'". 20 March 2018.
  10. "A Decade of Aadhaar: Lessons in implementing a foundational ID system | ORF".
  11. "Biometrics on a mass scale".
  12. Daugman, John (7 May 2014). "600 million citizens of India are now enrolled with biometric ID". SPIE Newsroom. SPIE-Intl Soc Optical Eng. doi:10.1117/2.1201405.005449.
  13. P. Grother, J. Matey, E. Tabassi, G. Quinn, and M. Chumakov, IREX VI: temporal stability of iris recognition accuracy, NIST Interagency Report 7948, pp. 1–3, 2013
  14. Adler, F.H., Physiology of the Eye (Chapter VI, page 143), Mosby (1953)
  15. Doggart, J.H., Ocular Signs in Slit-Lamp Microscopy, Kimpton (1949), page 27
  16. Daugman, J., "High confidence visual recognition of persons by a test of statistical independence", IEEE Transactions on Pattern Analysis and Machine Intelligence, 15 (11), pp 1148-1161 (1993)
  17. "ICAO Document 9303: Machine Readable Travel Documents, Part 9: Deployment of Biometric Identification and Electronic Storage of Data in eMRTDs, 7th edition" (PDF). 2015.
  18. Liu Y, Simon JD (February 2005). "Metal-ion interactions and the structural organization of Sepia eumelanin". Pigment Cell Res. 18 (1): 42–8. doi:10.1111/j.1600-0749.2004.00197.x. PMID   15649151.
  19. Meredith P, Sarna T (December 2006). "The physical and chemical properties of eumelanin". Pigment Cell Res. 19 (6): 572–94. doi:10.1111/j.1600-0749.2006.00345.x. PMID   17083485.
  20. Hosseini, M.S.; Araabi, B.N.; Soltanian-Zadeh, H. (April 2010). "Pigment Melanin: Pattern for Iris Recognition". IEEE Trans Instrum Meas. 59 (4): 792–804. arXiv: 0911.5462 . Bibcode:2010ITIM...59..792H. doi:10.1109/TIM.2009.2037996. S2CID   16646573.
  21. "MSite - Biometric Access Control for Construction Sites". www.msite.com.
  22. 1 2 Martin, Zach (23 March 2011). "Biometric Trends: Will emerging modalities and mobile applications bring mass adoption?". SecureIDNews. Retrieved 14 July 2013.
  23. "Probing the uniqueness and randomness of IrisCodes: Results from 200 billion iris pair comparisons." Proceedings of the IEEE, vol. 94 (11), 2006, pp. 1927-1935.
  24. "Hacker Finds a Simple Way to Fool IRIS Biometric Security Systems". thehackernews.com. 6 March 2015. Retrieved 17 March 2017.
  25. 1 2 Whittaker, Zack (29 September 2018). "Princeton Identity debuts a new walkthrough biometric scanner". TechCrunch . Retrieved 29 March 2019.
  26. "Iris scanners 'can be tricked'". BBC News. 26 July 2012.
  27. R. Roizenblatt, P. Schor et al. Iris recognition as a biometric method after cataract surgery. Biomed Eng Online. 2004; 3: 2
  28. Hashemi, Soheil; Tann, Hokchhay; Buttafuoco, Francesco; Reda, Sherief (March 2018). "Approximate Computing for Biometric Security Systems: A Case Study on Iris Scanning". 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE. pp. 319–324. doi:10.23919/date.2018.8342029. ISBN   9783981926309. S2CID   5061011.
  29. Brewster, Thomas. "Hacking Putin's Eyes: How To Bypass Biometrics The Cheap And Dirty Way With Google Images". Forbes. Retrieved 28 June 2023.
  30. Goodin, Dan (23 May 2017). "Breaking the iris scanner locking Samsung's Galaxy S8 is laughably easy". Ars Technica. Retrieved 28 June 2023.
  31. Hsieh, Sheng-Hsun; Li, Yung-Hui; Wang, Wei; Tien, Chung-Hao (March 2018). "A Novel Anti-Spoofing Solution for Iris Recognition Toward Cosmetic Contact Lens Attack Using Spectral ICA Analysis". Sensors. 18 (3): 795. Bibcode:2018Senso..18..795H. doi: 10.3390/s18030795 . ISSN   1424-8220. PMC   5876747 . PMID   29509692.
  32. "Identification in the Twinkle of the Eye". europeanbusiness.gr.
  33. "Behin Pajouhesh Eng. Co. - Behin IRIS (Automated IRIS-Based Identification System)".
  34. "Bank United Announces Results of First U.S. Iris Recognition ATM Consumer Survey". www.atmmarketplace.com. 16 April 2002. Retrieved 5 June 2021.
  35. "UNHCR Innovation | Biometric Cash Assistance". innovation.unhcr.org. Retrieved 3 November 2016.
  36. "Aadhaar - Unique Identification". portal.uidai.gov.in. Archived from the original on 4 June 2017. Retrieved 2 November 2015.
  37. "STQC Certificate granted suppliers" (PDF).
  38. "Police to begin iPhone iris scans amid privacy concerns". Reuters. 20 July 2011. Archived from the original on 18 September 2012. Retrieved 26 September 2012.
  39. "Biometric Identity Management System". UNHCR. Retrieved 2 November 2015.
  40. "Iris scans at Amsterdam Airport Schiphol". Amsterdam Airport Schiphol. Archived from the original on 3 December 2013. Retrieved 14 July 2013.
  41. "Restricted area identity card". Archived from the original on 14 May 2012.
  42. "Backgrounder". Canadian Air Transport Security Authority (CATSA).
  43. Pascu, | Luana (29 October 2019). "Nexus kiosks at Canadian airports upgraded with facial recognition | Biometric Update". www.biometricupdate.com. Retrieved 18 July 2023.
  44. "CANPASS Air". Archived from the original on 27 December 2012. Retrieved 17 November 2010.
  45. "IRIS". Archived from the original on 1 May 2008.
  46. "Manchester Airport eye scanners scrapped over delays". Manchester Evening News.
  47. Johnson, Wesley (16 February 2012). "Airport eye scanners to be reviewed". The Press Association, printed in The Independent.
  48. Daugman, John. "How the Afghan Girl was Identified by Her Iris Patterns". University of Cambridge . Retrieved 14 July 2013.
  49. "Google data center security". YouTube . 13 April 2011. Archived from the original on 21 December 2021. Retrieved 14 July 2013.
  50. Saylor, Michael (2012). The Mobile Wave: How Mobile Intelligence Will Change Everything . Perseus Books/Vanguard Press. p.  98. ISBN   978-1593157203.
  51. Whitney, Lance (12 May 2011). "Iris recognition gadget eliminates passwords". CNET. Archived from the original on 10 July 2012. Retrieved 12 May 2011.
  52. "SRI International Sarnoff launches iris biometric vehicle access control system". Biometric Update. 10 April 2013. Retrieved 15 July 2013.
  53. "Novant's new iris scan connects patients to records". Archived from the original on 7 April 2014.
  54. "Indian state selects iris based identity management solution by IriTech". BiometricUpdate. 11 March 2015. Retrieved 2 November 2015.
  55. "Fujitsu Releases ARROWS NX F-04G - Fujitsu Global".
  56. Seifert, Dan (2 August 2016). "Samsung Galaxy Note 7 arrives August 19th with curved display, iris scanner". The Verge. Retrieved 8 June 2023.
  57. Gibbs, Samuel (3 August 2016). "Samsung unveils Galaxy Note 7 phablet you can unlock with your eyes". The Guardian. ISSN   0261-3077 . Retrieved 8 June 2023.
  58. Sullivan, Mark (22 August 2016). "Samsung's Galaxy Note 7 Iris Scanner Is A Welcome New Authentication Option". Fast Company.
  59. "These changes show that WFP loves us". World Food Programme Insight. 19 March 2018. Retrieved 19 July 2018.
  60. "Zain".
  61. Shakir, Umar (5 June 2023). "Apple's Vision Pro headset uses iris scanning for logins with Optic ID". The Verge. Retrieved 7 June 2023.
  62. Dolmetsch, Chris (1 February 2011). "'Minority Report' May Come to Real World With Iris Recognition". Bloomberg L.P. Retrieved 14 July 2013.
  63. Daugman, John. "Iris Recognition and "The Simpsons Movie"". University of Cambridge . Retrieved 15 July 2013.

Further reading