ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Subject Review: Securing Iris Authentication System

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.10, No. 8)

Publication Date:

Authors : ; ;

Page : 1-9

Keywords : Iris authentication; Biometric Recognition; Security; Hamming Distant (HD); False Acceptance Rate (FAR) and False Rejection Rate (FRR);

Source : Downloadexternal Find it from : Google Scholarexternal


Two components are available from a biometric system: authentication and verification. Both of these features must be utilized at the same time by the biometric authentication methods, which must be rigorous enough to support them. The use of biometrics as a key is intended to boost more effective security manner, reducing identification errors caused by human, improve user convenience, and automate security functions. Recognition of iris patterns is one of the most precise biometric authentication techniques. In essence, A biometric identification and authentication method is iris recognition that makes use of recognition algorithms on images of a person's eyes. In this study, we offer a thorough background analysis of a number of strategies, approaches, and techniques employed in the iris print authentication system using many different strategies and techniques. The dataset, pre-processing, feature extraction, authentication, and result technologies used in these security application technologies are also contrasted.

Last modified: 2022-08-07 23:17:00