IRIS Recognition and Authentication System for Enhancing Data Security
Y. Badhe1 , H. Balbatti2 , N. Kaladagi3 , K. Kumar4
Section:Research Paper, Product Type: Journal Paper
Volume-2 ,
Issue-3 , Page no. 55-59, Mar-2014
Online published on Mar 30, 2014
Copyright © Y. Badhe, H. Balbatti, N. Kaladagi, K. Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Y. Badhe, H. Balbatti, N. Kaladagi, K. Kumar, “IRIS Recognition and Authentication System for Enhancing Data Security,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.55-59, 2014.
MLA Style Citation: Y. Badhe, H. Balbatti, N. Kaladagi, K. Kumar "IRIS Recognition and Authentication System for Enhancing Data Security." International Journal of Computer Sciences and Engineering 2.3 (2014): 55-59.
APA Style Citation: Y. Badhe, H. Balbatti, N. Kaladagi, K. Kumar, (2014). IRIS Recognition and Authentication System for Enhancing Data Security. International Journal of Computer Sciences and Engineering, 2(3), 55-59.
BibTex Style Citation:
@article{Badhe_2014,
author = {Y. Badhe, H. Balbatti, N. Kaladagi, K. Kumar},
title = {IRIS Recognition and Authentication System for Enhancing Data Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2014},
volume = {2},
Issue = {3},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {55-59},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=68},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=68
TI - IRIS Recognition and Authentication System for Enhancing Data Security
T2 - International Journal of Computer Sciences and Engineering
AU - Y. Badhe, H. Balbatti, N. Kaladagi, K. Kumar
PY - 2014
DA - 2014/03/30
PB - IJCSE, Indore, INDIA
SP - 55-59
IS - 3
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3674 | 3507 downloads | 3736 downloads |
Abstract
IRIS recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the irises of an individual�s eyes. Not to be confused with another less prevalent ocular-based technology, retina scanning, IRIS recognition uses camera technology, and subtle IR illumination to reduce specular-reflection from the convex cornea to create images of the detail-rich, intricate structures of the iris. These unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual. Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of iris recognition is its stability, or template longevity as, barring trauma, a single enrollment can last a lifetime.
Key-Words / Index Term
Image Processing, IRIS recognition, Biometrics For Data Security, Secure Biometrics
References
[1] IRIS Recognition System using Biometric Template Matching Technology Sudha Gupta, Asst. Professor, LMIETE, LMISTE,Viral Doshi, Abhinav Jain and Sreeram Iyer, K.J.S.C.E.Mumbai India 2010 International Journal of Computer Applications (0975 8887)Volume 1,No. 2.
[2] IRIS Recognition, Shirke Swati D.,Shirke Suvarna D.,Gupta, Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012)Proceedings published in International Journal of Computer Applications (IJCA).
[3] http://IRIS .di.ubi.pt/about.htm
[4] http://IRIS .di.ubi.pt/
[5] Stephen Johnson (2006). Stephen Johnson on Digital Photography (http://books.google. com/ books?id=0UVRXzF91gcC& pg=PA17&dq=grayscale+ black-and-white-continuous-tone& ei=XlwqSdGVOILmkwTalPiIDw). O`Reilly. ISBN 0-596-52370-X.
[6] Bryan S. Morse. Lecture 15: Segmentation (edge based, hough transform). Brigham Young University:Lecture Notes, 2000.
[7] Object Detection using Circular Hough Transform, American Journal of Applied Sciences 2 (12): 1606-1609, 2005,ISSN 1546-9239.
[8] Mahboubeh Shamsi, Abdolreza Rasouli �A Novel Approach for IRIS Segmentation and Normalization� Faculty of Computer Science & Information System Islamic Azad University.
[9] http://en.wikipedia.org/wiki/Local_binary_patterns
[10] Christel-lo�c TISSE1, Lionel MARTIN1, Lionel TORRES 2, Michel ROBERT �Person identification technique using human IRIS recognition� 21Advanced System Technology STMicroelectronics � ZI Rousset � 13106 Rousset Cedex, France.
[11] ]Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 (2): 120�126. doi:10.1145/359340.359342.