Person Identification Technique Using Human Iris Recognition
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique iris is well suited to be applied to access control and provides strong e-security. A biometric system provides automatic recognition of an individual based on some sort of unique feature or characteristics possessed by the individual. A good biometric is characterized by use of a feature that is highly unique so that the chance of any two people having same characteristic will be minimal, stable so that the feature does not change over time and be easily captured in order to provide convenience to the user and to prevent misrepresentation of the feature. Iris is an internally protected organ whose texture is stable from birth to death. So, it is very reliable as iris texture is unique in each individual with probability of two same is 1/1051 as proved by Dr. J. Doughman. Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. this paper illustrates techniques to improve performance of iris recognition system based on stationary image. In this paper we focused on an efficient methodology for identification and verification for iris detection. The iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification.
Authors and Affiliations
Mr. Sachin S. Bhosale, Mr. Rakesh P. Kumawat, Mr. Pramod P. Gadekar, Mr. Prashant P. Ratnaparkhi
Advanced ACO Metaheuristic for Travelling Salesman Problem: A Proposed Technique
ACO meta-heuristic is an advanced approach of solving the various combinatorial optimization problems with positive feedback. ACO algorithms has some limitations such as pheromone stagnation due to which the optimal res...
CRA Role in Identity-Based Encryption for Its Applications
Identicalness based Cryptography is an id based cryptography which depends on the user identity, (IBE) is a world Key cryptoorganisation and eliminates the need of public paint infrastructure (PKI) and certicate adminis...
Structural Health Monitoring Of RCC Slab Using PZT Material: An Overview
In order to study the damage detection or structural health monitoring of RCC slab by the using of PZT smart material. During the process of monitoring or analyzing the damage, simply PZT patches are attached to the sur...
Arduino-UNO Operated Hall-effect Sensor Based Magnetic Field Strength Measurement System
Magnetic field strength is one of two ways that the intensity of a magnetic field can be expressed. Technically, a distinction is made between magnetic field strength H, measured in amperes per meter (A/m), and magnetic...
A Study on the Peculiar Problems of Cold‐Formed Steel Design
The steel construction is the increasingly an important technology for the civil building and actually, the Steel industry is constantly in search of more and better uses for steel. The uses of hot-rolled welded and col...