Iris Pattern Recognition
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: The earlier experimental which were conducted has resulted in the biometric templates, which include the iris of human eye and the attributes of the individual, that are produced using different methods of recognition, which can be matched with the help of central rays in the convex polyhedral cones and that these templates are protected by a method which is extended from Iris-templates and it can be broken into. The results of these experiments clearly show that, the convex polyhedral cone template cannot be presumed secure without a thorough security analysis. If there is a contact lens present then it imposes challenge in the recognition of the iris pattern. It is more complicated when the lens is a textured lens used as cosmetics. These types of lenses are readily available in the market. This study also intends at analyzing the influence of these constraints in the recognition of iris of the human eye. The approach that is being proposed overtakes the other types ofalgorithms used for detection and improves the performance of the recognition process of the iris. When it comes to those who wear a contact lens, the identification of the presence of a lens is the initial task which should be taken in order to increase the reliability and usability of the recognition process. The astonishing success of Iris-templates depends deeply on its computational benefits and it includes the enormously high matching speed for identification of iris on a large-scale and automatic threshold adjustment which is based onthe quality of the image. Many techniques which were modified from Iris-templates were suggested for iris recognition and the recognition based on the individuals attributes.
Authors and Affiliations
Dr. S. T. Deepa , Praneetha V
Enhanced Denoising Algorithm for Improving Quality of Objects in Frames for Video Surveillance
Abstract: In the 21st century’s security awareness scenario, video surveillance plays an important role in improving security to people and property. Fully automatic surveillance systems are much sought after by both pub...
Survey on Security Issues and Secure Protocols for Manet
A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links the union of which form an arbitrary topology. The routers are free to move rando...
Analysis of Data Mining Tasks, Techniques, Tools, Applications And Trend
Data mining is a process which finds useful patterns from huge amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It u...
Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
Abstract: Recent approaches in mobile computing consider context to be central to the design and implementation of mobile applications. Context considerations enables the mobile application to respond to the needs and pu...
I-ViDE: An Improved Vision-Based Approach for Deep Web Data Extraction
Abstract: Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web pages in this paper). Extr...