Improving Iris Performance using Segmentation with CASIA Database
Journal Title: Engineering and Scientific International Journal - Year 2018, Vol 5, Issue 3
Abstract
We can recognize humans each other according to their numerous characteristics of age. Identity verification (authentication) in computer systems has been traditionally based on something like password, key, card, pin and etc. Things like keys or cards, however, tend to get stolen or lost and passwords or pin are often forgotten or disclosed. To attain more reliable identification we must use realistic characterization of the given person. Automated Biometrics methods are there for the identity verification on the principle of measurable physiological or behavioural uniqueness like fingerprint or voice sample or iris verification. The characteristics are measurable and unique. These appearances should not be duplicable, but it is unfortunately possible to create a copy that is accepted by the biometric system as a true sample. In biometric-based authentication, a legitimate user does not need to remember or carry anything and it is more reliable than traditional authentication schemes. However, the security of biometric systems can be undetermined in a number of ways. For instance, a biometric template can be replaced by an impostor’s template in a system database or it might be stolen and replayed. Consequently, the impostor could gain unauthorized access to a place or a system. Moreover, it has been shown that it is possible to create a physical spoof starting from standard biometric templates. Hence, securing the biometric template is vital to maintain security and integrity of biometric systems. This report actually gives an overview of improving IRIS recognition performance using segmentation with the help of CASIA database.
Authors and Affiliations
Kavitha G. L.
Review of Privacy Preserving Data Mining Techniques
Data Mining is a process of discovering useful information in large data repositories. Data mining techniques have been used to enhance information retrieval systems. Privacy-preserving data mining (PPDM) refers to the a...
A Generalized Class of Jack-Knifed Estimator for Population Mean using an Auxiliary Variable and Attribute under Measurement Errors
In this paper, we have considered a generalized class of estimators using auxiliary information in both the form variable and attribute under measurement error. We also suggest a class of unbiased estimators using the Ja...
A Comparative Study of Bacterial and Fungal Flora in Glucose Fermentation
Microbes can be used as efficient live factories to produce beneficial products. They are cheap resources that consist of numerous enzymes which can convert complex chemical structure into simple digestible molecules wit...
Analyzing Download time Performance of University Websites in India
The download time of website depends on various web components such as multimedia size, document size, program size and so on. The main objective of this paper is to Analyze Download time of University Websites in India...
Massive Multiuser Multiple-Input and Multiple-Output Wireless Communication System on Antenna Array
This paper is about massive multiple-inputs and multiple-output technology based on the wireless 5G communication system. Surface of antenna in communication engineering applications array deployment regions are usually...