Efficient Iris Biometrics Technique for Secure Distributed Systems
نویسندگان
چکیده
منابع مشابه
Iris Biometrics for Secure Remote Access
We propose a new iris texture coding technique with optimal feature extraction, and design a secure remote (internet) access system using the proposed biometrics. The proposed iris coding method is based on Zak-Gabor coefficients sequence, and additionally uses an optimal selection of a subset of iris features. The secure access involves a communication scenario that employs a usual client-serv...
متن کاملAn efficient technique for solving systems of integral equations
In this paper, the wavelet method based on the Chebyshev polynomials of the second kind is introduced and used to solve systems of integral equations. Operational matrices of integration, product, and derivative are obtained for the second kind Chebyshev wavelets which will be used to convert the system of integral equations into a system of algebraic equations. Also, the error is analyzed and ...
متن کاملAn Efficient Biocryptosystem Based on the Iris Biometrics
A new and efficient method for combining iris biometrics with custom cryptographic schemes to obtain an efficient biocryptosystem is proposed in this paper. Though the method structure is basically derived from a previously described biocryptosystem scheme, the introduction of new image processing methods alongside with efficient utilization of traditional methods show promising developments co...
متن کاملTowards Accurate and Fast Iris Segmentation for Iris Biometrics
Iris segmentation is an essential module in iris recognition because it defines the effective image region used for subsequent processing such as feature extraction. Traditional iris segmentation methods often involve an exhaustive search of a large parameter space, which is time-consuming and sensitive to noise. To address these problems, this paper presents a novel algorithm for accurate and ...
متن کاملSecure and Efficient Protocols for Iris and Fingerprint Identification
Recent advances in biometric recognition and the increasing use of biometric data prompt significant privacy challenges associated with the possible misuse, loss or theft, of biometric data. Biometric matching is often performed by two mutually suspicious parties, one of which holds one biometric image while the other owns a possibly large biometric collection. Due to privacy and liability cons...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Digital Society
سال: 2012
ISSN: 2040-2570
DOI: 10.20533/ijds.2040.2570.2012.0075