Iris Image Classification: A Survey
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1
Abstract
Iris recognition is one of the consistent accurate, fast and secure biometric techniques for human identification. Iris recognition systems capture an image from an individual's eye. The iris in the image is then segmented and normalized for feature extraction process. The performance of iris recognition systems highly depends on segmentation. In this paper survey of iris recognition and classification methods and challenges related to iris recognition and classification are discussed.
Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools
"The growth in Information Technology has led to the transformation of the banking system towards providing efficient services while simultaneously being time and cost effective. This led to the introduction of the cashl...
Iris Recognition using LBP with Classifiers-KNN and NB
A biometric system provides special and automatic identification of an individual based on characteristics and unique features showed by individuals. With the need for security system going up, Iris recognition is emergi...
Malignant Peripheral Nerve Sheath Tumour (MPNST) of Common Peroneal Nerve –Case Report
Malignant peripheral nerve sheath tumors (MPNSTs) are sarcomas which originate from peripheral nerves or from cells associated with the nerve sheath, such as Schwann cells, perineural cells or fibroblasts. World Health o...
Pyrofighter
This pyro fighter robot performs the operations of firefighting and rescue by virtue of its efficient robotic arm which facilitates evacuation, advanced temperature sensors to detect the intensity of fire, high power pum...
Survey on Different Data Hiding Methods For Binary Host Images
Data hiding approach aims to embed some secret information into a carrier data signal by altering the unimportant components for copyright protection or secret communication. In some cases, the data-hiding operation will...