IRIS Recognition and Authentication System for Enhancing Data Security
Keywords:
Image Processing, IRIS recognition, Biometrics For Data Security, Secure BiometricsAbstract
IRIS recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the IRIS es of an individual’s eyes. Not to be confused with another less prevalent ocular-based technology, retina scanning, IRIS recognition uses camera technology, and subtle IR illumination to reduce specular-reflection from the convex cornea to create images of the detail-rich, intricate structures of the IRIS . These unique structures converted into digital templates, provide mathematical representations of the IRIS that yield unambiguous positive identification of an individual. IRIS recognition efficacy is rarely impeded by glasses or contact lenses. IRIS technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of IRIS recognition is its stability, or template longevity as, barring trauma, a single enrolment can last a lifetime.
References
IRIS Recognition System using Biometric Template Matching Technology Sudha Gupta, Asst. Professor, LMIETE, LMISTE,Viral Doshi, Abhinav Jain and Sreeram Iyer, K.J.S.C.E.Mumbai India 2010 International Journal of Computer Applications (0975 8887)Volume 1,No. 2.
IRIS Recognition, Shirke Swati D.,Shirke Suvarna D.,Gupta, Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012)Proceedings published in International Journal of Computer Applications (IJCA).
http://IRIS .di.ubi.pt/about.htm
http://IRIS .di.ubi.pt/
Stephen Johnson (2006). Stephen Johnson on Digital Photography (http://books.google. com/ books?id=0UVRXzF91gcC& pg=PA17&dq=grayscale+ black-and-white-continuous-tone& ei=XlwqSdGVOILmkwTalPiIDw). O'Reilly. ISBN 0-596-52370-X.
Bryan S. Morse. Lecture 15: Segmentation (edge based, hough transform). Brigham Young University:Lecture Notes, 2000.
Object Detection using Circular Hough Transform, American Journal of Applied Sciences 2 (12): 1606-1609, 2005,ISSN 1546-9239.
Mahboubeh Shamsi, Abdolreza Rasouli “A Novel Approach for IRIS Segmentation and Normalization” Faculty of Computer Science & Information System Islamic Azad University.
http://en.wikipedia.org/wiki/Local_binary_patterns
Christel-loïc TISSE1, Lionel MARTIN1, Lionel TORRES 2, Michel ROBERT “Person identification technique using human IRIS recognition” 21Advanced System Technology STMicroelectronics – ZI Rousset – 13106 Rousset Cedex, France.
]Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 (2): 120–126. doi:10.1145/359340.359342.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
