Iris Recognition based Image Authentication
نویسندگان
چکیده
منابع مشابه
Iris Recognition based Image Authentication
This paper introduces an efficient approach to protect the ownership by hiding iris code from iris recognition system into digital image for an authentication purpose using the reversible watermarking scheme. This scheme embeds bookkeeping data of histogram modification and iris code into the first level high frequency sub-bands of images found by Integer Wavelet Transform (IWT) using threshold...
متن کاملEye Based Authentication: Iris and Retina Recognition
Biometric authentication comes in play to release the users from the difficulties of remembering and protecting passwords as required by traditional authentication systems. Among all the biometrics in use today, eye biometrics (iris and retina) offers the highest level of uniqueness, universality, permanence, and accuracy. Despite these convincing properties of iris and retina biometrics, they ...
متن کاملIris recognition based on robust iris segmentation and image enhancement
A new iris recognition method based on a robust iris segmentation approach is presented in this paper for improving iris recognition performance. The robust iris segmentation approach applies power-law transformations for more accurate detection of the pupil region, which significantly reduces the candidate limbic boundary search space for increasing detection accuracy and efficiency. The limbi...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملImproved Authentication Using Arduino Based Voice and Iris Recognition Technology
Today authentication is the important one to improve the security in various applications Here the proposed system uses three steps to allow the process that is initially enter the password and then give the voice as the input using the arduino microcontroller it verifies the voice and then iris identification of the user. The user has to follow these steps and then only permit to continue the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/6272-8434