OSIRIS: An open source iris recognition software

N Othman, B Dorizzi, S Garcia-Salicetti - Pattern recognition letters, 2016 - Elsevier
In this paper, we present the evolution of the open source iris recognition system OSIRIS
through its more relevant versions: OSIRISV2, OSIRISV4, and OSIRISV4. 1. We developed …

Eye movement analysis for human authentication: a critical survey

C Galdi, M Nappi, D Riccio, H Wechsler - Pattern Recognition Letters, 2016 - Elsevier
This paper addresses the active and dynamic nature of biometrics, in general, and gaze
analysis, in particular, including motivation and background. The paper includes a critical …

A survey of iris biometrics research: 2008–2010

KW Bowyer, KP Hollingsworth, PJ Flynn - Handbook of iris recognition, 2016 - Springer
A recent survey of iris biometric research from its inception through 2007, roughly 15 years
of research, lists approximately 180 publications. This new survey is intended to update the …

Gender classification from the same iris code used for recognition

JE Tapia, CA Perez, KW Bowyer - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Previous researchers have explored various approaches for predicting the gender of a
person based on the features of the iris texture. This paper is the first to predict gender …

Optimal generation of iris codes for iris recognition

Y Hu, K Sirlantzis, G Howells - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The calculation of binary iris codes from feature values (eg, the result of Gabor transform) is
a key step in iris recognition systems. Traditional binarization method based on the sign of …

Non-contact vibration monitoring of power transmission belts through electrostatic sensing

Y Hu, Y Yan, L Wang, X Qian - IEEE Sensors Journal, 2016 - ieeexplore.ieee.org
On-line vibration monitoring plays an important role in the fault diagnosis and prognosis of
industrial belt drive systems. This paper presents a novel measurement technique based on …

Effects of text filtering on authentication performance of keystroke biometrics

J Huang, D Hou, S Schuckers… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Free text keystroke dynamics is a behavioral biometric that has the strong potential to offer
unobtrusive and continuous user authentication. In free-text keystroke biometrics, users are …

Fork bomb attack mitigation by process resource quarantine

G Nakagawa, S Oikawa - 2016 Fourth International Symposium …, 2016 - ieeexplore.ieee.org
A fork bomb attack is a denial of service attack. An attacker generates many processes
rapidly, exhausting the resources of the target computer systems. There are several previous …

Iris recognition from distant images based on multiple feature descriptors and classifiers

LE Ali, J Luo, J Ma - 2016 IEEE 13th International Conference …, 2016 - ieeexplore.ieee.org
This paper proposes a new approach to recognize iris from distantly acquired facial images
by utilizing multiple feature descriptors and classifiers. Firstly, Log-Gabor (LG), Contourlet …

Iris image reconstruction from binary templates

J Galbally, M Savvides, S Venugopalan… - Handbook of Iris …, 2016 - Springer
This chapter explores the possibility of recovering iris images from binary iris templates. It
has been generally assumed that the binary iris code is irreversible, ie, the original iris …