IRIS Recognition and Authentication System for Enhancing Data Security

Authors

  • Yogesh Badhe Computer Department, PCCOE, Pune University, India
  • Hafij Balbatti Computer Department, PCCOE, Pune University, India
  • Neelkanth Kaladagi Computer Department, PCCOE, Pune University, India
  • Kranti Kumar Computer Department, PCCOE, Pune University, India

Keywords:

Image Processing, IRIS recognition, Biometrics For Data Security, Secure Biometrics

Abstract

IRIS  recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the IRIS es of an individual’s eyes. Not to be confused with another less prevalent ocular-based technology, retina scanning, IRIS  recognition uses camera technology, and subtle IR illumination to reduce specular-reflection from the convex cornea to create images of the detail-rich, intricate structures of the IRIS . These unique structures converted into digital templates, provide mathematical representations of the IRIS  that yield unambiguous positive identification of an individual. IRIS  recognition efficacy is rarely impeded by glasses or contact lenses. IRIS  technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of IRIS  recognition is its stability, or template longevity as, barring trauma, a single enrolment can last a lifetime.

References

IRIS Recognition System using Biometric Template Matching Technology Sudha Gupta, Asst. Professor, LMIETE, LMISTE,Viral Doshi, Abhinav Jain and Sreeram Iyer, K.J.S.C.E.Mumbai India 2010 International Journal of Computer Applications (0975 8887)Volume 1,No. 2.

IRIS Recognition, Shirke Swati D.,Shirke Suvarna D.,Gupta, Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012)Proceedings published in International Journal of Computer Applications (IJCA).

http://IRIS .di.ubi.pt/about.htm

http://IRIS .di.ubi.pt/

Stephen Johnson (2006). Stephen Johnson on Digital Photography (http://books.google. com/ books?id=0UVRXzF91gcC& pg=PA17&dq=grayscale+ black-and-white-continuous-tone& ei=XlwqSdGVOILmkwTalPiIDw). O'Reilly. ISBN 0-596-52370-X.

Bryan S. Morse. Lecture 15: Segmentation (edge based, hough transform). Brigham Young University:Lecture Notes, 2000.

Object Detection using Circular Hough Transform, American Journal of Applied Sciences 2 (12): 1606-1609, 2005,ISSN 1546-9239.

Mahboubeh Shamsi, Abdolreza Rasouli “A Novel Approach for IRIS Segmentation and Normalization” Faculty of Computer Science & Information System Islamic Azad University.

http://en.wikipedia.org/wiki/Local_binary_patterns

Christel-loïc TISSE1, Lionel MARTIN1, Lionel TORRES 2, Michel ROBERT “Person identification technique using human IRIS recognition” 21Advanced System Technology STMicroelectronics – ZI Rousset – 13106 Rousset Cedex, France.

]Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 (2): 120–126. doi:10.1145/359340.359342.

Downloads

Published

2014-03-31

How to Cite

[1]
Y. Badhe, H. Balbatti, N. Kaladagi, and K. Kumar, “IRIS Recognition and Authentication System for Enhancing Data Security”, Int. J. Comp. Sci. Eng., vol. 2, no. 3, pp. 55–59, Mar. 2014.

Issue

Section

Research Article