IRIS Biometric Recognition for Person Identification and Security

Authors

  • S.Vinitha  Master of Computer Application, University College of Engineering, Anna University, BIT Campus, Tiruchirapalli, Tamil Nadu, India
  • R. Karthiyani  Master of Computer Application, University College of Engineering, Anna University, BIT Campus, Tiruchirapalli, Tamil Nadu, India

Keywords:

Biometrics, Iris identification, occluded images,UBIRIS Iris database

Abstract

Todays e-security are in critical need of finding accurate, secure and cost effective alternatives to passwords and personal identification numbers (PIN) as financial losses increase dramatically year over year from computer-based fraud such as computer hacking and theft Biometric solutions address these fundamental problems, because an individual's biometric data is unique and cannot be transferred. The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control and provides strong e-security. The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control and provides strong e-security. Security systems having realized the value of biometrics for two basic purposes: to verify or idification .users. The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control and provides strong e-security. Security systems having realized the value of biometrics for two basic purposes: to verify or idification .users. In this paper we focus on an efficient methodology identification and verification for iris detection, even when the images have obstructions, visual noise and different levels of illuminations and we use the iris database it will also work for Iris database which has images captured from distance while moving a person .Efficiency is acquired from iris detection and recognition when its performance evaluation.

References

  1. Shaoping Zhu and Yongliang Xiao, Intelligent Detection of Facial Expression based on Image, International Journal on Smart Sensing and Intelligent Systems, 8(1):581 – 601, 2015.
  2. Christel- loïc TISSE1, Lionel MARTIN1, Lionel TORRES 2, Michel ROBERT ?Person identification technique using human iris recognition?.
  3. Dong Shiwei, Wang Wei Xiang, Ting and Linming Zhang Hong-cai,” Android 2 SDK introduction and application development” Sung gang Asset Management Corp. Limited 2010
  4. J. Daugman, “How Iris Recognition Works,” IEEETransactions on Circuits and Systems for Video Technology, 14, pp. 21–30, January 2004
  5. Nicola Ivan Giannoccaro, Luigi Spedicato, Aime, Lay-Ekuakille, A robotic arm to sort different types of ball bearings from the knowledge discovered by size measurements of image regions and rfid support, International Journal on Smart Sensing and Intelligent Systems, 7(2):674 – 700, 2014.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
S.Vinitha, R. Karthiyani, " IRIS Biometric Recognition for Person Identification and Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.15-19, May-June-2017.