A Comparative Study of Facial, Retinal, Iris and Sclera Recognition Techniques
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
The pressures on today’s system administrators to have secure systems are ever increasing. One area where security can be improved is in authentication. Face, retina, iris and sclera recognition, biometrics, provide one of the most secure methods of authentication and identification. These technologies are very useful in areas such as information security, physical access security, ATMs and airport security. These technologies are more or less accurate, easy to use, non-intrusive, and difficult to forge and, despite what people may think, are actually quite fast systems once initial enrolment has taken place. However, they do require the co-operation of the subject: need specific hardware and software to operate. These recognition technologies do provide a good method of authentication to replace the current methods of passwords, token cards or PINs and if used in conjunction with something the user knows in a two-factor authentication system then the authentication becomes even stronger.
Authors and Affiliations
Sugandha Agarwal
Detecting Intruders and Packet Modifiers in Wireless Sensor Networks
The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication o...
Twitter Sentiment Classification on Sanders Data using HybridApproach
Abstract : Sentiment analysis is very perplexing and massive issue in the field of social data mining. Twitter isone of the mostly used social media where people discuss on various issues in a dense way. The tweets about...
Scheduling Algorithm for University Timetabling Problem
Abstract: Scheduling for timetabling is one of the challenges faced by most Universities in developing countries. In this research work, consideration is made in developing of a scheduling algorithm capable of providing...
Blue-Droid: An Intelligent Library Management System on Android Platform
Abstract : Bluetooth Library Manager (BLM) is library management software which can be used in any library for maintaining different functions like book search, requisition submission, data entry etc. I have implem...
A Parameter free Clustering of Density Based Algortihm
Clustering is a kind of unsupervised learning process in data mining and pattern recognition, most of the clustering algorithms are sensitive to their input parameters. So it is necessary to evaluate results of the clust...