##plugins.themes.academic_pro.article.main##

Abstract

Image Processing is a biometric based personal Identification technique in which Impersonation is most dangerous security threat. Different biometric systems are developed on face, voice and Hand geometry recognition with an effective method for automatic recognition of a person’s identity with a high efficiency. The aim of this paper is to provide a platform independent access to Iris recognition using different technologies present today. In this System IRIS recognition of an individual using Hough transform technique to determine radius of iris and pupil and comparing it by using mathematical equivalent ratios which can be implemented in java and compare it with stored image in database to authenticate an individuals.

##plugins.themes.academic_pro.article.details##

How to Cite
Kedari, A., Deshmane, S., Gaikwad, A., & Dhote, B. L. (2014). Iris Recognition System for Secure Authentication. International Journal of Emerging Trends in Science and Technology, 1(03). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/71

References

[1] Adams Wai-Kin Kong, Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its Security Implications, IEEE Transactions On Image Processing, Vol. 22, No. 3, MARCH 2013

[2] John Daugman, How Iris Recognition Works, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, JANUARY 2004

[3] David Zhang, Wai-Kin Kong, Jane You and Michael Wong, Online Palmprint Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 25, No. 9, SEPTEMBER 2003

[4] Adams Wai Kin KONG, Palmprint Identification Based on Generalization of IrisCode, University of Waterloo, Ontario, Canada, 2007

[5] Mansi Jhamb, Vinod Kumar Khera, IRIS Based Human Recognition System, International Journal of Biometrics and Bioinformatics (IJBB), Volume (5), Issue (1), 2011

[6] John G. Daugman, High confidence visual recognition of persons by a test of statistical independence, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 15, No. 11, November 1993