Person Identification Technique Using Human Iris Recognition
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique iris is well suited to be applied to access control and provides strong e-security. A biometric system provides automatic recognition of an individual based on some sort of unique feature or characteristics possessed by the individual. A good biometric is characterized by use of a feature that is highly unique so that the chance of any two people having same characteristic will be minimal, stable so that the feature does not change over time and be easily captured in order to provide convenience to the user and to prevent misrepresentation of the feature. Iris is an internally protected organ whose texture is stable from birth to death. So, it is very reliable as iris texture is unique in each individual with probability of two same is 1/1051 as proved by Dr. J. Doughman. Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. this paper illustrates techniques to improve performance of iris recognition system based on stationary image. In this paper we focused on an efficient methodology for identification and verification for iris detection. The iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification.
Authors and Affiliations
Mr. Sachin S. Bhosale, Mr. Rakesh P. Kumawat, Mr. Pramod P. Gadekar, Mr. Prashant P. Ratnaparkhi
slugInjection modeling of Diesel Engine: A Review
Diesel Engine is the most important part of our life. Our transportation, agricultural, defense, science fields are based on the diesel engine. With the increase the use of diesel engines our life many problems are rais...
Seismic analysis of skewed multi-span Steel Girder Bridge
A bridge is an important component of the road transportation network. Its performance during and even after an earthquake event is quite crucial to provide relief as well as for security and defense purpose. Most of th...
slugEnhanced Privilege Level Wise Access Control for Secure Cloud Storage
Data storage in cloud is possibly a safe and secure way for data accessing and data retrieval, but not at all criteria. Certain security guarantees for the outsourced data were needed to make sure of the access control...
Review on Carbonation Induced Corrosion in Concrete
Carbonation is one of the major reasons for the decrease in pH of the concrete. This reduction in turn will lead to the deterioration of the passivating layer around the steel bar and opens a way for the corrosion to oc...
Wireless Communication under Broadband Reactive Jammer Attacks
A reactive jammer jams wireless channels only when target devices are transmitting. Compared to constant jamming, reactive jamming is harder to track and compensate against [2], [42]. Frequency Hopping Spread Spectrum (...