iris_recognition

NIST Test Proves 'The Eyes Have It' For ID Verification

The eyes may be the mirror to the soul, but the iris reveals a person’s true identity -- its intricate structure constitutes a powerful biometric. A new report by computer scientists at the National Institute of Standards and Technology (NIST) demonstrates that iris recognition algorithms can maintain their accuracy and interoperability with compact images, affirming their potential for large-scale identity management applications such as the federal Personal Identity Verification program, cyber security and counterterrorism.

After fingerprints, iris recognition has emerged in recent years as the second most widely supported biometric characteristic. This marketplace rests, in large part, on the ability of recognition algorithms to process standard images from the many cameras now available. This requires images to be captured in a standard format and prepared so that they are compact enough for a smart card and for transmission across global networks. The images also have to be identifiable by computer algorithms and interoperable with any iris-matcher product regardless of the manufacturer.

NIST scientists are working with the international biometrics community to revise iris recognition standards and to advance iris images as the global interchange medium in this rapidly evolving field.

NIST established the Iris Exchange IREX program as a NIST-industry collaboration to encourage development of iris recognition algorithms operating on images conforming to the new ISO-IEC 19794-6 standard. The first IREX project, IREX I, provided quantitative support to the standard by conducting the largest independently administered test of iris recognition technology to date. The test attracted 19 recognition technologies from 10 different providers. This represents an order of magnitude expansion of the industry over the past five years.

The international standard, now under revision, defined three competing image formats and three compression methods: the IREX I test narrowed the field by determining which ones performed consistently at a high level and are included in the IREX report. The image format test showed that two of the three formats performed well: these center and crop the iris, or center, crop and mask eyelids and eyelashes. The study also determined that two compression standards were found to squeeze the images to a size small enough for storage and transmission while retaining the necessary quality level. One is the JPEG2000 which gives better recognition accuracy than the more commonly used JPEG, and the other is PNG format that employs lossless compression to completely preserve the iris information.

The IREX I tests also looked at technical factors affecting users. These include speed-accuracy tradeoffs, threshold calibration, storage requirements, image quality assessment, and the effects of iris size, eyelid occlusion and pupil dilation. The test result shows that forensic applications, where image quality is sometimes degraded, can benefit from slower but more powerful algorithms.

Recommendations based on the NIST results have been adopted by the standards committees. The report, IREX I: Performance of Iris Recognition Algorithms on Standard Images, can be downloaded from http://iris.nist.gov/irex. Since its inception in 2007, IREX has helped advance iris recognition toward the level of technical maturity and interoperability of fingerprint biometrics and has affirmed the potential for using iris biometrics as a second modality for large-scale identity management applications.

Meanwhile, plans for IREX II are under way to calibrate and evaluate the effectiveness and efficiency of iris image quality assessment algorithms. This study will support a new international iris image quality standard by identifying specific iris image properties that are influential on recognition accuracy.

 

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities