A Mondal, K Roy, P Bhattacharya - … International Conference for …, 2009 - ieeexplore.ieee.org
Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some …
A Mondal, K Roy, P Bhattacharya - 2009 IEEE Workshop on …, 2009 - ieeexplore.ieee.org
Moving towards an dasiaalways-onpsila, dasiamobilepsila and technology driven lifestyle, people are demanding greater technical triumph to make life more exciting, convenient and …
Iris recognition system has demonstrated its strong capability in performing personal verification and identification with promising recognition accuracy. However, the …
Eye iris has been widely recognized as one of the strongest biometrics attributed to its high accuracy performance. However, templates in conventional iris recognition systems are …
D Sadhya, B Raman - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Iris-based biometric models are widely recognized to be one of the most accurate forms for authenticating individual identities. Features extracted from the captured iris images (known …
This paper presents a novel security architecture for protecting the integrity of iris images and templates using watermarking and visual cryptography (VC). The proposed scheme …
This paper discussed about a recent iris template protection scheme named Indexing-First- One hashing (IFO). IFO hashing is originally inspired by the concept of min-hashing while …
The patterns of the structure of the irises are differed and unique to every single person. Any biometric authentication approach should consist of three requirements. They are non …
SV Dhavale - International Journal of Computer Science Issues …, 2012 - Citeseer
In this paper, a new approach of iris image feature extraction technique based on the statistical properties of Walsh Hadamard Transform (WHT) domain is proposed. A Canny …