Subject Review: Securing Iris Authentication System
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.10, No. 8)Publication Date: 2022-08-30
Authors : Raniah Ali Mustafa; Haitham Salman Chyad;
Page : 1-9
Keywords : Iris authentication; Biometric Recognition; Security; Hamming Distant (HD); False Acceptance Rate (FAR) and False Rejection Rate (FRR);
Abstract
Two components are available from a biometric system: authentication and verification. Both of these features must be utilized at the same time by the biometric authentication methods, which must be rigorous enough to support them. The use of biometrics as a key is intended to boost more effective security manner, reducing identification errors caused by human, improve user convenience, and automate security functions. Recognition of iris patterns is one of the most precise biometric authentication techniques. In essence, A biometric identification and authentication method is iris recognition that makes use of recognition algorithms on images of a person's eyes. In this study, we offer a thorough background analysis of a number of strategies, approaches, and techniques employed in the iris print authentication system using many different strategies and techniques. The dataset, pre-processing, feature extraction, authentication, and result technologies used in these security application technologies are also contrasted.
Other Latest Articles
- Tiktok on SNSU Students: Engagement and Influence
- Indian Feminism: An Analysis of Amish Tripathi’s Sita: Warrior of Mithila
- Holistic Consciousness in Chicana Feminist Thought
- Deconstructing the Tropes of Communication in Jonathan Foer's Extremely Loud and Incredibly Close
- New Educational Technologies Available on the Internet as Pedagogical Support in Contingent Remote Learning
Last modified: 2022-08-07 23:17:00