Retinal Scanner

Only available on StudyMode
  • Download(s) : 69
  • Published : March 6, 2013
Open Document
Text Preview
CHAPTER I
THE PROBLEM AND ITS SETTING

This chapter comprises the introduction, background of the study, objectives of the study and scopes and limitations of the study.

INTRODUCTION

From Wikipedia (2012) definition, human retina is a thin tissue composed of neural cells that is located in the latter portion of the eye. Although retinal patterns may be changed in cases of diabetes, glaucoma or retinal degenerative disorders, the retina typically remains unchanged from birth until death. Due to its unique and unchanging nature, the retina appears to be the most precise and reliable biometric. Also, from the same source, retinal’s scan, commonly confused with the more appropriate named “iris scanner”, is a biometric technique that uses the unique patterns on a person’s retina to identify an individual. A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look through the scanner’s eyepiece. This beam of light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code stored in a database. According to the article made by Professor Dan Boneh (2012), computer security is a branch of computer technology known as information security as applied to computers and computer networks. The objective of computer security includes protection of information and property from others. BACKGROUND OF THE STUDY

Based on the latest article made by Paul Rubens (2012), he clearly emphasized that passwords are potentially the weakest link in an organization’s information security systems. Biometric authentication technologies promise a more secure alternative (See Appendix A). Not to be confused with the two ocular-based technologies, which are iris and retina scanning, the different is that iris recognition uses camera technology with fine infrared illumination to acquire images of the detail-rich, complicated structures of the iris. Digital templates encoded from these patterns by mathematical and statistical algorithms allow the identification of an individual or someone pretending to be that individual. Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per (single-core) CPU, and with infinitesimally small False Match rates.

With the survey conducted by the researchers to determine the need of a more secured way of integrating passwords for their files (See Appendix B), they find out that 20 out 25 respondents would like to have a more efficient and more powerful computer security program that will help them to secure their personal files and documents in their system.

With these two different studies, the researchers concluded that there is a need to provide a better security measure in order to prevent file theft.

OBJECTIVE OF THE STUDY

The general objective of the study is to develop a computer security program to secure personal computers with the use of eye’s retina. Specifically, it aims to:
1. Design the system with the following features;
a. Scan the user’s retina with the use of webcam.
b. Record the scanned retina of the user and save into a database. c. Compare the captured image of the retina with the user’s retina. 2. Create the system as designed.
3. Test and evaluate the output of the study.
4. Determine the acceptability of the system according to the criteria, functionality, content, reliability and availability of ISO 9126.

SIGNIFICANCE OF THE STUDY

The researchers intended to create a security program that will give personal computers a very unique but a more powerful security lock. The following are the people who will be benefited from the study:

Students
Students who...
tracking img