Improving Iris Performance using Segmentation with CASIA Database
Journal Title: Engineering and Scientific International Journal - Year 2018, Vol 5, Issue 3
Abstract
We can recognize humans each other according to their numerous characteristics of age. Identity verification (authentication) in computer systems has been traditionally based on something like password, key, card, pin and etc. Things like keys or cards, however, tend to get stolen or lost and passwords or pin are often forgotten or disclosed. To attain more reliable identification we must use realistic characterization of the given person. Automated Biometrics methods are there for the identity verification on the principle of measurable physiological or behavioural uniqueness like fingerprint or voice sample or iris verification. The characteristics are measurable and unique. These appearances should not be duplicable, but it is unfortunately possible to create a copy that is accepted by the biometric system as a true sample. In biometric-based authentication, a legitimate user does not need to remember or carry anything and it is more reliable than traditional authentication schemes. However, the security of biometric systems can be undetermined in a number of ways. For instance, a biometric template can be replaced by an impostor’s template in a system database or it might be stolen and replayed. Consequently, the impostor could gain unauthorized access to a place or a system. Moreover, it has been shown that it is possible to create a physical spoof starting from standard biometric templates. Hence, securing the biometric template is vital to maintain security and integrity of biometric systems. This report actually gives an overview of improving IRIS recognition performance using segmentation with the help of CASIA database.
Authors and Affiliations
Kavitha G. L.
SE-AODV-Secured and Energy Efficient Routing in Mobile Ad-hoc Network
Mobile ad hoc network (MANET) is a standalone network capable of autonomous operation where nodes communicate with each other without the need of any existing infrastructure. Mobile ad hoc networks consist of nodes that...
Internet of Things a Vision of Future and the Technological Growth
This paper addresses the impact of Internet of Things (IoT) in the whole world. The effort of IOT is to provide a communication between the network, common devices or human to other devices through the internet. Ten year...
Chemotactic Effect of Common Food Chemicals on the Escherichia Coli Present in the Gastrointestinal Tract of Homo sapiens
This study was conducted to detect the effect of common food chemicals on the Escherichia coli flora present in the large intestine of the gastrointestinal tract. E.coli is a symbiotic bacillus, one of the frequently occ...
A Comparative Study of Bacterial and Fungal Flora in Glucose Fermentation
Microbes can be used as efficient live factories to produce beneficial products. They are cheap resources that consist of numerous enzymes which can convert complex chemical structure into simple digestible molecules wit...
Cow Dung for Increasing the Ph of Acidic Soil and Cow Importance from Vedic Scriptures
Now a day‟s pollution is increasing rapidly whether it is related to land or it is related to soil, water and air. This is due to increase in industrial activities in which some industries releases their waste without tr...