SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1981
Study on: Advancement of Smartphone Security by using Iris
Scan Detection
Adesh. A. Potdukhe1, Prof. Sanket. S. Pawar2
1Student, BE Computer Science, Bharati Vidyapeeth College of Engineering, Lavale, India
2BE Computer Science, Bharati Vidyapeeth College of Engineering, Lavale, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Mankind usually invents new era to make
existence easier and better to stay. As a way to shield this
generation security devices performs a very critical function.
In this technology, the gadget includes biometrics in
conjunction with virtual code lock which response within the
way for matching or mismatching the code. The purpose of
these studies to have a look at human-computer interaction.
Eye monitoring turns into a more and more essential manner
to analyze human behavior. However, a right analysis of
statistics obtained from a watch tracker takes place to be a
difficult venture. For biometrical analysis, Iris scanner is
getting used in order to be monitored with the help of
microcontroller through the sensors of the biometric sensors.
This study targeted on growing an HCI era completely the use
of one of the telephone’s growing of onboard sensors. This
research supplied the implementation and evaluation of the
HCI prototype. Even though preliminary, studiesconsequences
imply that HCI is a promising approach to ridingcellpackages
in a hands-loose manner.
Key Words: Human computer interaction, Smartphone
security, Iris Scanner
1. INTRODUCTION
As far as we speak of humans all we have three such
things which differ in all of us, the first is 'DNA' second is our
'fingerprint' and the third is the 'pattern of our iris'. In
normal 'Fingerprint scanner' useforbiometric access,where
we have to give access to the selected person or not. The
'DNA' we use in forensic science, we do not use it in normal
life because it becomes quite complicated to use. The last
option that we have is 'IRIS SCANNING'. If we talk of normal
consumer product and day-to-day life, we can also do
fingerprint scanning and an iris scanning or even if we can
use both. Fingerprint scanning is quite simple enough to
come by the time we use it and it is very cheap, so we use it
even today and will continue to use it.
[1]Biometric system grants access to authorized users
by means of verifying their unique physical or behavioral
characteristics such as fingerprints, face recognition, voice
recognition, vein detector, iris scanner etc. [2] Eye
movements are unique behavioral responses that have not
only a reaction time and an accuracy, but also a location
(where one moves), an amplitude (how far one moves), and
a duration (how long one fixates a position). Researchers
looking to examine the effects of stimulus or condition
manipulations typically use a combination of these
measures. [3] Eye tracking becomes more and more
important way to analyse human behaviour. However, a
proper analysis of data obtained from an eye tracker occurs
to be a challenging task. Traditional visualizationtechniques
like scan paths or heat maps may reveal interesting
information, however much of useful information is still not
visible, especially when the temporal characteristics of eye
movement is taken into account. This paper introduces a
technique called gaze self-similarity plot (GSSP) that may be
applied to visualize bothspatial andtemporal eyemovement
features on one two-dimensional plot. The technique is an
extension of the idea of recurrence plots, commonly used in
time series analysis.
When we speak about IRIS scanner it is not so common
that it will see us in a little specific place. But this technology
is securer than the fingerprint scanner. It is quite faster and
more efficient as compared to fingerprint scanning. Now we
talk about how iris scanner work, see the pattern that we
have in the middle of our eyes, blue eyes, black eyes, or we
call it as an iris. This pattern and the fine granular dictates
inside it vary from person to person. This iris does not
change until the death of a particular person it is the same
for a lifetime.
The principle which is identical to fingerprint scanning
that we scanned iris once then we compared it to the result
that came on next scanning and system tell us the result of
scanning is a match or not. But fingerprint scanning consists
of at least 40 to 45 points to scan a single fingerprint. In the
case of iris scanner system scanner scans at least 200 to 250
points to identify. It matches with high-level securityuntil all
the requirements are not fulfilled.
Now see how a scanner work, it has an infraredcamera
and a normal camera both of them take a very high-
resolution photo of your iris and pick up an important data
like where we see diversions, arcs, and curve it identifies
everything. After scanning these 240 to 250 points, make a
code that we call the iris code. For example, If the person 'A’
did an Iris scan, the system makes the code for the person
'A'. After encryption, it will name it as codefortheperson 'A'.
After that next time when person 'A'goesforirisscanning on
the same system or mobile then both cameras take pictures
of the iris again, this information is converted into the code
again then system check all scanned code and compare this
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1982
code with other saved scanned until itmatcheswiththecode
of the person 'A' or not.
If the code does not match with the savedscannedcode
system shows an error message.
2. METHOD & MATERIAL
An Iris scanner is much creative in naturebut it is just simply
a charged coupled device that is a mobile camera which uses
infrared light to capture a desolated high-definition photo of
a person’s Iris. The main use of this close infrared light is to
separate the pupil and the Iris of a person as the pupil part is
extremely dark in nature and it moreover making simple for
the computer to detect.
When we check or investigate an Iris scanner the camera
takes the photo which 3 to 10 from the person’s eyes. Now
here starts the work of the mobile system it collects the data
such as the focal point of the pupil, the edge of the pupil, the
edge of the Iris and the eyelids and eyelashes, now in that
point, discrete the example in the Iris and make an
interpretation of them into a layout. With the modern
improvisation of technologies,Irisscannersareturningintoa
wellspring of confirmation of individuality, as we know that
Iris is unique in nature and is much secured biometric and
this doesn’t change time to time. Even an Iris remains
unaltered after a serious eye operation has been done. Even
blind people can also use this Iris scanner system.
In thissystem, the nearness of the spectacle or contactlenses
focal point is not going to show some serious issue. Here the
equipment that is going to be used in this Iris
acknowledgment framework is Iris acknowledgment
checking module, a control module, and a screen or LCD for
display. Here Microcontroller interface throughtransmitting
and getting information parcel using thehelpofasystemthat
is present. The LCD shows the verification is confirmed or
not that is demonstrated in figure.
2.1 Figure:
2.2 PROPOSED ALGORITHM
 Step 1: Take Input_Data: Biometric data of human
Iris.
 Step 2: Begin
 Step3:Input_Data=Request_Data(Users(Biometric_Ir
is))
 Step4:Valid_Data=Retrive_Data (databased
(Users(Biometric_Iris)))
 Step 5: If Input_Data = valid_Data Then Access(
Iris_matched)
 Step 6: Get_ready_for_Next_Process
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1983
2.3 PROPOSED FLOW MODEL BASED ON
ALGORITHM
This starts with the Iris scanner where, the Iris of the person
is reviewed usinganextraordinarymachine,whichcompares
with the record that is store in the database at the time of the
opening the locker.
At last when required verification is done this result is
interfaced with microcontroller which checks the
authenticity. In this way the smartphone is kept safe.
2.4 RESULT & DISCUSSION
In this proposed system there are merits and as well as
demerits as the flow of the proposed system starts with the
Iris scanning mechanism as we know its unique and can’t be
forged but a person needs to be in closedistance withtheiris
scanning device to be enrolled on the system properly. In
some cases, it is hard to perform an iris scanning due to the
presence of reflections and it is expensive.
3. CONCLUSION
General operation was both smooth and successful enough
to serve as an additional mean for human computer
interaction. This study has focused on developing an HCI
technology solely using one of the phone’s growing of on-
board sensors. Study presented the implementation and
evaluation of the HCI prototype. Although preliminary,
study results indicate that HCI is promising approach to
driving mobile applications in a hand-free manner.
ACKNOWLEDGEMENT
Authors of this research paper express their deep sense of
gratitude to Dr. R. N. Patil (The Principal of Bharati
Vidyapeeth College of EngineeringLavale),Prof.UdayPatkar
(Department Head), Prof. Prajakta Pawar and Prof. Sanket
Pawar for his keen interest in promoting research in
Savitribai Phule university and have always been an
inspiration for achieving great heights.
REFERENCES
[1] Meera Mathew, Divya R S “Survey on Various Door Lock
Access Control Mechanisms,” International Conference
on circuits Power and Computing Technologies
[ICCPCT], 2017.
[2] 2. N. C. Anderson, W. F. Bischof, K. E. Laidlaw, E. F.
Risko, and A. Kingstone. Recurrence quantification
analysis of eye movements.BehaviorResearchMethods,
45(3):842–856, 2013.
[3] M. Vidal, A. Bulling, and H. Gellersen. Detection of
smooth pursuits using eye movement shape features.In
Proceedings of the symposium on eye tracking research
and applications, pages 177–180. ACM, 2012.
[4] https://www.interaction-design.org
[5] https://science.howstuffworks.com/biometrics4.ht
m
[6] Mobile Interaction Design 1st Edition by Matt
Jones.
[7] Fast Normalized Cross Correlation – By J Lewis.

More Related Content

PDF
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
PDF
Attendance System using Android Integrated Biometric Fingerprint Recognition
PPTX
Centerix Iris-Presentation
PDF
Iris based Human Identification
PPTX
Cloud Iris Verifcation System
PPT
Iris scan.ppt 1
PDF
IRIS Recognition Based Authentication System In ATM
PPT
IRIS Scaner
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
Attendance System using Android Integrated Biometric Fingerprint Recognition
Centerix Iris-Presentation
Iris based Human Identification
Cloud Iris Verifcation System
Iris scan.ppt 1
IRIS Recognition Based Authentication System In ATM
IRIS Scaner

What's hot (20)

PDF
C6524029320
PDF
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
PDF
IRJET- Iris Authentication System using Hybrid Technique – IDS
PPTX
Palmprint recognition presentation
PDF
Comparison of various Biometric methods
PPTX
Iris segmentation analysis using integro differential operator and hough tran...
PPTX
Design and development of dorsal hand vein recognition biometric system usin...
PDF
Biometrics Starts
PDF
Report on Finger print sensor and its application
PDF
IriCore SW Brochure
PDF
IRJET- Advanced Two Factor Authentication using Image Processing
PPTX
Iris ppt
PDF
Finger vein based biometric security system
PDF
Iris scanning
PPTX
Smart eye
PPTX
Finger vein technology
PPTX
implementation of finger vein authentication technique
PPTX
Pattern recognition palm print authentication system
PPTX
Retina scan
PPTX
Iris Scan
C6524029320
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Iris Authentication System using Hybrid Technique – IDS
Palmprint recognition presentation
Comparison of various Biometric methods
Iris segmentation analysis using integro differential operator and hough tran...
Design and development of dorsal hand vein recognition biometric system usin...
Biometrics Starts
Report on Finger print sensor and its application
IriCore SW Brochure
IRJET- Advanced Two Factor Authentication using Image Processing
Iris ppt
Finger vein based biometric security system
Iris scanning
Smart eye
Finger vein technology
implementation of finger vein authentication technique
Pattern recognition palm print authentication system
Retina scan
Iris Scan
Ad

Similar to IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection (20)

PDF
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
PDF
A survey paper on various biometric security system methods
PDF
Security for Identity Based Identification using Water Marking and Visual Cry...
PDF
Advance Intelligent Video Surveillance System Using OpenCV
DOCX
Biometric.docx
PPTX
Biometrics iris recognition
PDF
IRJET- Eye Tracking for Password Authentication using Machine Learning
PDF
Bw33449453
PDF
Bw33449453
PDF
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
PDF
A Study of Iris Recognition
PDF
IRJET-Human Face Detection and Identification using Deep Metric Learning
PDF
50120130406045
PDF
IRJET - Smart E – Cane for the Visually Challenged and Blind using ML Con...
PPT
49559880-IRIS-SCANNING1.ppt
PDF
Eye tracking – an innovative monitor
PDF
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
PDF
Wireless Student Attendance System using Fingerprint Sensor
DOC
8 g iris-recognition_system
PDF
Internation Journal Conference
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A survey paper on various biometric security system methods
Security for Identity Based Identification using Water Marking and Visual Cry...
Advance Intelligent Video Surveillance System Using OpenCV
Biometric.docx
Biometrics iris recognition
IRJET- Eye Tracking for Password Authentication using Machine Learning
Bw33449453
Bw33449453
IRJET-Unconstraint Eye Tracking on Mobile Smartphone
A Study of Iris Recognition
IRJET-Human Face Detection and Identification using Deep Metric Learning
50120130406045
IRJET - Smart E – Cane for the Visually Challenged and Blind using ML Con...
49559880-IRIS-SCANNING1.ppt
Eye tracking – an innovative monitor
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Wireless Student Attendance System using Fingerprint Sensor
8 g iris-recognition_system
Internation Journal Conference
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Sustainable Sites - Green Building Construction
PPTX
OOP with Java - Java Introduction (Basics)
PDF
PPT on Performance Review to get promotions
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPT
Project quality management in manufacturing
PPTX
Construction Project Organization Group 2.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Artificial Intelligence
DOCX
573137875-Attendance-Management-System-original
PDF
R24 SURVEYING LAB MANUAL for civil enggi
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Sustainable Sites - Green Building Construction
OOP with Java - Java Introduction (Basics)
PPT on Performance Review to get promotions
Automation-in-Manufacturing-Chapter-Introduction.pdf
Internet of Things (IOT) - A guide to understanding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Project quality management in manufacturing
Construction Project Organization Group 2.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
UNIT 4 Total Quality Management .pptx
Artificial Intelligence
573137875-Attendance-Management-System-original
R24 SURVEYING LAB MANUAL for civil enggi

IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1981 Study on: Advancement of Smartphone Security by using Iris Scan Detection Adesh. A. Potdukhe1, Prof. Sanket. S. Pawar2 1Student, BE Computer Science, Bharati Vidyapeeth College of Engineering, Lavale, India 2BE Computer Science, Bharati Vidyapeeth College of Engineering, Lavale, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Mankind usually invents new era to make existence easier and better to stay. As a way to shield this generation security devices performs a very critical function. In this technology, the gadget includes biometrics in conjunction with virtual code lock which response within the way for matching or mismatching the code. The purpose of these studies to have a look at human-computer interaction. Eye monitoring turns into a more and more essential manner to analyze human behavior. However, a right analysis of statistics obtained from a watch tracker takes place to be a difficult venture. For biometrical analysis, Iris scanner is getting used in order to be monitored with the help of microcontroller through the sensors of the biometric sensors. This study targeted on growing an HCI era completely the use of one of the telephone’s growing of onboard sensors. This research supplied the implementation and evaluation of the HCI prototype. Even though preliminary, studiesconsequences imply that HCI is a promising approach to ridingcellpackages in a hands-loose manner. Key Words: Human computer interaction, Smartphone security, Iris Scanner 1. INTRODUCTION As far as we speak of humans all we have three such things which differ in all of us, the first is 'DNA' second is our 'fingerprint' and the third is the 'pattern of our iris'. In normal 'Fingerprint scanner' useforbiometric access,where we have to give access to the selected person or not. The 'DNA' we use in forensic science, we do not use it in normal life because it becomes quite complicated to use. The last option that we have is 'IRIS SCANNING'. If we talk of normal consumer product and day-to-day life, we can also do fingerprint scanning and an iris scanning or even if we can use both. Fingerprint scanning is quite simple enough to come by the time we use it and it is very cheap, so we use it even today and will continue to use it. [1]Biometric system grants access to authorized users by means of verifying their unique physical or behavioral characteristics such as fingerprints, face recognition, voice recognition, vein detector, iris scanner etc. [2] Eye movements are unique behavioral responses that have not only a reaction time and an accuracy, but also a location (where one moves), an amplitude (how far one moves), and a duration (how long one fixates a position). Researchers looking to examine the effects of stimulus or condition manipulations typically use a combination of these measures. [3] Eye tracking becomes more and more important way to analyse human behaviour. However, a proper analysis of data obtained from an eye tracker occurs to be a challenging task. Traditional visualizationtechniques like scan paths or heat maps may reveal interesting information, however much of useful information is still not visible, especially when the temporal characteristics of eye movement is taken into account. This paper introduces a technique called gaze self-similarity plot (GSSP) that may be applied to visualize bothspatial andtemporal eyemovement features on one two-dimensional plot. The technique is an extension of the idea of recurrence plots, commonly used in time series analysis. When we speak about IRIS scanner it is not so common that it will see us in a little specific place. But this technology is securer than the fingerprint scanner. It is quite faster and more efficient as compared to fingerprint scanning. Now we talk about how iris scanner work, see the pattern that we have in the middle of our eyes, blue eyes, black eyes, or we call it as an iris. This pattern and the fine granular dictates inside it vary from person to person. This iris does not change until the death of a particular person it is the same for a lifetime. The principle which is identical to fingerprint scanning that we scanned iris once then we compared it to the result that came on next scanning and system tell us the result of scanning is a match or not. But fingerprint scanning consists of at least 40 to 45 points to scan a single fingerprint. In the case of iris scanner system scanner scans at least 200 to 250 points to identify. It matches with high-level securityuntil all the requirements are not fulfilled. Now see how a scanner work, it has an infraredcamera and a normal camera both of them take a very high- resolution photo of your iris and pick up an important data like where we see diversions, arcs, and curve it identifies everything. After scanning these 240 to 250 points, make a code that we call the iris code. For example, If the person 'A’ did an Iris scan, the system makes the code for the person 'A'. After encryption, it will name it as codefortheperson 'A'. After that next time when person 'A'goesforirisscanning on the same system or mobile then both cameras take pictures of the iris again, this information is converted into the code again then system check all scanned code and compare this
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1982 code with other saved scanned until itmatcheswiththecode of the person 'A' or not. If the code does not match with the savedscannedcode system shows an error message. 2. METHOD & MATERIAL An Iris scanner is much creative in naturebut it is just simply a charged coupled device that is a mobile camera which uses infrared light to capture a desolated high-definition photo of a person’s Iris. The main use of this close infrared light is to separate the pupil and the Iris of a person as the pupil part is extremely dark in nature and it moreover making simple for the computer to detect. When we check or investigate an Iris scanner the camera takes the photo which 3 to 10 from the person’s eyes. Now here starts the work of the mobile system it collects the data such as the focal point of the pupil, the edge of the pupil, the edge of the Iris and the eyelids and eyelashes, now in that point, discrete the example in the Iris and make an interpretation of them into a layout. With the modern improvisation of technologies,Irisscannersareturningintoa wellspring of confirmation of individuality, as we know that Iris is unique in nature and is much secured biometric and this doesn’t change time to time. Even an Iris remains unaltered after a serious eye operation has been done. Even blind people can also use this Iris scanner system. In thissystem, the nearness of the spectacle or contactlenses focal point is not going to show some serious issue. Here the equipment that is going to be used in this Iris acknowledgment framework is Iris acknowledgment checking module, a control module, and a screen or LCD for display. Here Microcontroller interface throughtransmitting and getting information parcel using thehelpofasystemthat is present. The LCD shows the verification is confirmed or not that is demonstrated in figure. 2.1 Figure: 2.2 PROPOSED ALGORITHM  Step 1: Take Input_Data: Biometric data of human Iris.  Step 2: Begin  Step3:Input_Data=Request_Data(Users(Biometric_Ir is))  Step4:Valid_Data=Retrive_Data (databased (Users(Biometric_Iris)))  Step 5: If Input_Data = valid_Data Then Access( Iris_matched)  Step 6: Get_ready_for_Next_Process
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1983 2.3 PROPOSED FLOW MODEL BASED ON ALGORITHM This starts with the Iris scanner where, the Iris of the person is reviewed usinganextraordinarymachine,whichcompares with the record that is store in the database at the time of the opening the locker. At last when required verification is done this result is interfaced with microcontroller which checks the authenticity. In this way the smartphone is kept safe. 2.4 RESULT & DISCUSSION In this proposed system there are merits and as well as demerits as the flow of the proposed system starts with the Iris scanning mechanism as we know its unique and can’t be forged but a person needs to be in closedistance withtheiris scanning device to be enrolled on the system properly. In some cases, it is hard to perform an iris scanning due to the presence of reflections and it is expensive. 3. CONCLUSION General operation was both smooth and successful enough to serve as an additional mean for human computer interaction. This study has focused on developing an HCI technology solely using one of the phone’s growing of on- board sensors. Study presented the implementation and evaluation of the HCI prototype. Although preliminary, study results indicate that HCI is promising approach to driving mobile applications in a hand-free manner. ACKNOWLEDGEMENT Authors of this research paper express their deep sense of gratitude to Dr. R. N. Patil (The Principal of Bharati Vidyapeeth College of EngineeringLavale),Prof.UdayPatkar (Department Head), Prof. Prajakta Pawar and Prof. Sanket Pawar for his keen interest in promoting research in Savitribai Phule university and have always been an inspiration for achieving great heights. REFERENCES [1] Meera Mathew, Divya R S “Survey on Various Door Lock Access Control Mechanisms,” International Conference on circuits Power and Computing Technologies [ICCPCT], 2017. [2] 2. N. C. Anderson, W. F. Bischof, K. E. Laidlaw, E. F. Risko, and A. Kingstone. Recurrence quantification analysis of eye movements.BehaviorResearchMethods, 45(3):842–856, 2013. [3] M. Vidal, A. Bulling, and H. Gellersen. Detection of smooth pursuits using eye movement shape features.In Proceedings of the symposium on eye tracking research and applications, pages 177–180. ACM, 2012. [4] https://www.interaction-design.org [5] https://science.howstuffworks.com/biometrics4.ht m [6] Mobile Interaction Design 1st Edition by Matt Jones. [7] Fast Normalized Cross Correlation – By J Lewis.