To see the other types of publications on this topic, follow the link: Iris code.

Journal articles on the topic 'Iris code'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Iris code.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shekar, B. H., S. S. Bhat, and A. Maysuradze. "RELIABILITY INDEX FOR IRIS CODE MATCHING IN IRIS RECOGNITION SYSTEMS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W12 (May 9, 2019): 197–202. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w12-197-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> Iris code matching is an important stage of iris biometric systems which compares the input iris code with stored patterns of enrolled iris codes and classifies the code into one of classes so that, the claim is accepted or rejected. Several classifier based approaches are proposed by the researchers to improve the recognition accuracy. In this paper, we discuss the factors affecting an iris classifier’s performance and we propose a reliability index for iris matching techniques to quantitatively measure the extent of system reliability, based on
APA, Harvard, Vancouver, ISO, and other styles
2

HR, GITE, and MAHENDER CN. "IRIS CODE GENERATION AND RECOGNITION." International Journal of Machine Intelligence 3, no. 3 (2011): 103–7. http://dx.doi.org/10.9735/0975-2927.3.3.103-107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Şimşek, Buğra, and Nursel Akçam. "Heterogenous Computing on Iris Matching with OpenCL." Applied Mechanics and Materials 850 (August 2016): 129–35. http://dx.doi.org/10.4028/www.scientific.net/amm.850.129.

Full text
Abstract:
This study presents parallelization of Hamming Distance algorithm, which is used for iris comparison on iris recognition systems, for heterogeneous systems that can be included Central Processing Units (CPUs), Graphics Processing Units (GPUs), Digital Signal Processing (DSP) boards, Field Programmable Gate Array (FPGA) and some other mobile platforms with OpenCL. OpenCL allows to run same code on CPUs, GPUs, FPGAs and DSP boards. Heterogeneous computing refers to systems include different kind of devices (CPUs, GPUs, FPGAs and other accelerators). Heterogeneous computing gains performance or r
APA, Harvard, Vancouver, ISO, and other styles
4

Matveev, Ivan, and Ilia Safonov. "From Iris Image to Embedded Code: System of Methods." Algorithms 16, no. 2 (2023): 87. http://dx.doi.org/10.3390/a16020087.

Full text
Abstract:
Passwords are ubiquitous in today’s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as input and generates a public key, suitable for storing insecurely. It is impossible to obtain source data (i.e., secret key or biometric traits) from the public key without the iris image of the owner, the irises of other persons will not help. At the same time, when the iris image of the same person is presented the secret key is restored. The sys
APA, Harvard, Vancouver, ISO, and other styles
5

Moi, Sim Hiew, Pang Yee Yong, Rohayanti Hassan, et al. "An Improved Approach of Iris Biometric Authentication Performance and Security with Cryptography and Error Correction Codes." JOIV : International Journal on Informatics Visualization 6, no. 2-2 (2022): 531. http://dx.doi.org/10.30630/joiv.6.2-2.1091.

Full text
Abstract:
One of the most challenging parts of integrating biometrics and cryptography is the intra variation in acquired identifiers between the same users. Due to noise in the environment or different devices, features of the iris may differ when it is acquired at different time periods. This research focuses on improving the performance of iris biometric authentication and encrypting the binary code generated from the acquired identifiers. The proposed biometric authentication system incorporates the concepts of non-repudiation and privacy. These concepts are critical to the success of a biometric au
APA, Harvard, Vancouver, ISO, and other styles
6

Hameed Yassir, Mohammed Ali, Rudzidatul Akmam Dziyauddin, Norshaliza Kamaruddin, and Norulhusna Ahmad. "A standard ranking algorithm for robust iris template protection." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1214. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1214-1225.

Full text
Abstract:
In iris biometric recognition systems, protecting the storage and transmission of iris templates is crucial, and template protection techniques are pivotal for ensuring their security. A prevalent approach involves using indexing methods as an effective algorithm for iris template protection, leveraging the index or rank of the extracted iris code to generate a secure iris template. Meantime, many privacy threats to biometric data have emerged, necessitating heightened protection measures. Specifically, protecting the privacy of iris data is imperative within the context of iris template prote
APA, Harvard, Vancouver, ISO, and other styles
7

Yassir, Mohammed Ali Hameed, Rudzidatul Akmam Dziyauddin, Norshaliza Kamaruddin, and Norulhusna Ahmad. "A standard ranking algorithm for robust iris template protection." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1214–25. https://doi.org/10.11591/ijeecs.v34.i2.pp1214-1225.

Full text
Abstract:
In iris biometric recognition systems, protecting the storage and transmission of iris templates is crucial, and template protection techniques are pivotal for ensuring their security. A prevalent approach involves using indexing methods as an effective algorithm for iris template protection, leveraging the index or rank of the extracted iris code to generate a secure iris template. Meantime, many privacy threats to biometric data have emerged, necessitating heightened protection measures. Specifically, protecting the privacy of iris data is imperative within the context of iris template prote
APA, Harvard, Vancouver, ISO, and other styles
8

Raniah, Ali Mustafa, Abdulbaqi Maryoosh Amal, Nadir George Dena, and Rasheed Humood Waleed. "Iris images encryption based on QR code and chaotic map." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 289–300. https://doi.org/10.12928/TELKOMNIKA.v18i1.13293.

Full text
Abstract:
In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests s
APA, Harvard, Vancouver, ISO, and other styles
9

Hollingsworth, K. P., K. W. Bowyer, and P. J. Flynn. "The Best Bits in an Iris Code." IEEE Transactions on Pattern Analysis and Machine Intelligence 31, no. 6 (2009): 964–73. http://dx.doi.org/10.1109/tpami.2008.185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Damer, Naser, Philipp Terhorst, Andreas Braun, and Arjan Kuijper. "Efficient, Accurate, and Rotation-Invariant Iris Code." IEEE Signal Processing Letters 24, no. 8 (2017): 1233–37. http://dx.doi.org/10.1109/lsp.2017.2719282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

C., Okedunmade Opemipo, Afolabi Adeolu O., Gbadamosi Omoniyi A., Adedeji Oluyinka T., Makinde Bukola O., and Falohun Adeleye S. "Effect of Particle Swarm Optimization Convolutional Neural Network in An Iris Recognition System." East African Scholars Journal of Engineering and Computer Sciences 7, no. 09 (2024): 35–56. http://dx.doi.org/10.36349/easjecs.2024.v07i05.001.

Full text
Abstract:
An iris recognition system based on Convolutional Neural Network with Particle Swarm Optimization (CNN-PSO) was developed to improve the identified hitches in the existing systems. Iris images of 150 and 108 persons were acquired from LAUIRIS (Nigeria) and CASIA (China) respectively. The images were resized and cropped after which Hough transform was used for effective localization of the iris region and normalised using Daugman’s rubber sheet model, while an efficient Cumulative Sum-based analysis method was used to extract discriminative features from the normalised iris images after which t
APA, Harvard, Vancouver, ISO, and other styles
12

A. Kumar, Shruthi, and A. Baskar. "Improving the IRIS Recognition Under Different Illumination Using RETINEX Algorithms." International Journal of Engineering & Technology 7, no. 3.6 (2018): 81. http://dx.doi.org/10.14419/ijet.v7i3.6.14943.

Full text
Abstract:
Iris detection and recognition provides more accurate and secure authentication nowadays. The probability of any two people having the same iris pattern is nearly zero, even the identical twins will not have the same iris pattern. The noise and illumination changes, challenges iris recognition correctness and security in authentication process. The available recent pre-processing techniques for iris detection address different type of noise suppression and removing unwanted information in iris, but still it strives with illumination issues. In this paper, we proposed Retinex algorithm for impr
APA, Harvard, Vancouver, ISO, and other styles
13

Zahedi, Zahedi, and Eka Janitra. "Perancangan Program Aplikasi Deteksi Iris Mata untuk Absensi Karyawan Menggunakan Metode Gabor Wavelet." ComTech: Computer, Mathematics and Engineering Applications 2, no. 1 (2011): 175. http://dx.doi.org/10.21512/comtech.v2i1.2730.

Full text
Abstract:
To take the employees’ absences in a company, a variety of invented tools or technologies are and already used, for example, attendance cards, fingerprints attendance tool, and attendance tool that uses facial recognition. Attendance tool with a facial recognition uses iris recognition of those employees. Iris code has many properties that hard to forge. Thus, the detection and iris recognition is one of the most secure and accurate for identification.
APA, Harvard, Vancouver, ISO, and other styles
14

C., Okedunmade Opemipo, Afolabi Adeolu O., Gbadamosi Omoniyi A., Adedeji Oluyinka T., Makinde Bukola O., and Falohun Adeleye S. "Effect of Particle Swarm Optimization Convolutional Neural Network in An Iris Recognition System." East African Scholars Journal of Engineering and Computer Sciences 7, no. 04 (2024): 35–56. http://dx.doi.org/10.36349/easjecs.2024.v07i04.002.

Full text
Abstract:
An iris recognition system based on Convolutional Neural Network with Particle Swarm Optimization (CNN-PSO) was developed to improve the identified hitches in the existing systems. Iris images of 150 and 108 persons were acquired from LAUIRIS (Nigeria) and CASIA (China) respectively. The images were resized and cropped after which Hough transform was used for effective localization of the iris region and normalised using Daugman’s rubber sheet model, while an efficient Cumulative Sum-based analysis method was used to extract discriminative features from the normalised iris images after which t
APA, Harvard, Vancouver, ISO, and other styles
15

Okokpujie, Kennedy, John Abubakar, Samuel John, Etinosa Noma-Osaghae, Charles Ndujiuba, and Imhade Princess Okokpujie. "A secured automated bimodal biometric electronic voting system." IAES International Journal of Artificial Intelligence (IJ-AI) 10, no. 1 (2021): 1. http://dx.doi.org/10.11591/ijai.v10.i1.pp1-8.

Full text
Abstract:
Insecurity, rigging and violence continue to mar electoral processes in developing nations. It has been difficult to enforce security and transparency in the voting process. This paper proposes a secure and automated bimodal voting system. The system uses three security layers, namely, a unique ID code, a token passcode that expires every five minutes and biometrics (iris and fingerprint). A scanner captures the fingerprint and iris of eligible voters. The fingerprint and iris images stored along with the corresponding particulars in a database. The software implemented is a .net managed code
APA, Harvard, Vancouver, ISO, and other styles
16

Kennedy, Okokpujie, Abubakar John, John Samuel, Noma-Osaghae Etinosa, Ndujiuba Charles, and Princess Okokpujie Imhade. "A secured automated bimodal biometric electronic voting system." International Journal of Artificial Intelligence (IJ-AI) 10, no. 1 (2021): 1–8. https://doi.org/10.11591/ijai.v10.i1.pp1-8.

Full text
Abstract:
Insecurity, rigging and violence continue to mar electoral processes in developing nations. It has been difficult to enforce security and transparency in the voting process. This paper proposes a secure and automated bimodal voting system. The system uses three security layers, namely, a unique ID code, a token passcode that expires every five minutes and biometrics (iris and fingerprint). A scanner captures the fingerprint and iris of eligible voters. The fingerprint and iris images stored along with the corresponding particulars in a database. The software implemented is a .net managed code
APA, Harvard, Vancouver, ISO, and other styles
17

Ibgui, L., I. Hubeny, T. Lanz, and C. Stehlé. "IRIS: a generic three-dimensional radiative transfer code." Astronomy & Astrophysics 549 (January 2013): A126. http://dx.doi.org/10.1051/0004-6361/201220468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Liu, Nianfeng, Jing Liu, Zhenan Sun, and Tieniu Tan. "A Code-Level Approach to Heterogeneous Iris Recognition." IEEE Transactions on Information Forensics and Security 12, no. 10 (2017): 2373–86. http://dx.doi.org/10.1109/tifs.2017.2686013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Umer, Saiyed, Bibhas Chandra Dhara, and Bhabatosh Chanda. "Texture code matrix-based multi-instance iris recognition." Pattern Analysis and Applications 19, no. 1 (2015): 283–95. http://dx.doi.org/10.1007/s10044-015-0482-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Achilli, Andrea, Cinzia Congiu, Roberta Ferri, et al. "SPES3 Facility RELAP5 Sensitivity Analyses on the Containment System for Design Review." Science and Technology of Nuclear Installations 2012 (2012): 1–19. http://dx.doi.org/10.1155/2012/173637.

Full text
Abstract:
An Italian MSE R&D programme on Nuclear Fission is funding, through ENEA, the design and testing of SPES3 facility at SIET, for IRIS reactor simulation. IRIS is a modular, medium size, advanced, integral PWR, developed by an international consortium of utilities, industries, research centres and universities. SPES3 simulates the primary, secondary and containment systems of IRIS, with 1:100 volume scale, full elevation and prototypical thermal-hydraulic conditions. The RELAP5 code was extensively used in support to the design of the facility to identify criticalities and weak points in the
APA, Harvard, Vancouver, ISO, and other styles
21

Han, Ying-Li, and Rae-Hong Park. "Iris Recognition Using the Nonsubsampled Contourlet Transform." International Journal of Pattern Recognition and Artificial Intelligence 29, no. 08 (2015): 1556014. http://dx.doi.org/10.1142/s0218001415560145.

Full text
Abstract:
Biometric information is widely used in user identification system. Because of the unique and invariant properties of the iris through a lifetime, iris recognition is one of the most stable and reliable means in biometric identification. Extracting distinguishable iris features for iris recognition is very important. In this paper, for capturing effective texture features that represent the complex directional structures of an iris image, a new iris recognition method using the nonsubsampled contourlet transform (NSCT) features is proposed. With the shift-invariance, multiscale, and multidirec
APA, Harvard, Vancouver, ISO, and other styles
22

Spies, Simon, Niklas Mück, Haoyi Zeng, et al. "Destabilizing Iris." Proceedings of the ACM on Programming Languages 9, PLDI (2025): 848–73. https://doi.org/10.1145/3729284.

Full text
Abstract:
The separation logic framework Iris has been built on the premise that all assertions are stable , meaning they unconditionally enjoy the famous frame rule . This gives Iris—and the numerous program logics that build on it—very modular reasoning principles. But stability also comes at a cost. It excludes a core feature of the Viper verifier family, heap-dependent expression assertions , which lift program expressions to the assertion level in order to reduce redundancy between code and specifications and better facilitate SMT-based automation. In this paper, we bring heap-dependent expression
APA, Harvard, Vancouver, ISO, and other styles
23

Krishna, Prasad K. "Multi factor Authentication Model using Fingerprint Hash code and Iris Recognition." International Journal of Management, Technology, and Social Sciences 3, no. 2 (2019): 10. https://doi.org/10.5281/zenodo.2538228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Diatri Indradewi, I. Gusti Ayu Agung, I. Putu Agung Bayupati, and I. Ketut Gede Darma Putra. "Ekstraksi Ciri pada Citra Iris Menggunakan Gabor 2-D." Majalah Ilmiah Teknologi Elektro 15, no. 1 (2016): 16. http://dx.doi.org/10.24843/mite.2016.v15i01p03.

Full text
Abstract:
Abstrak – Iris merupakan salah satu bagian tubuh manusia yang sering digunakan dalam sistem pengenalan biometrik karena tingkat perbedaannya yang tinggi. Ektraksi ciri merupakan salah satu tahapan yang dilalui dalam pengembangan sistem pengenalan biometrik iris. Tahap ini bertujuan untuk mengekstrak informasi dari citra iris yang telah disegmentasi sehingga dapat digunakan sebagai ciri unik dari iris bersangkutan. Pada paper ini tahap ekstraksi ciri dilakukan dengan menggunakan tapis Gabor 2-D. Tapis tersebut digunakan karena mampu menyediakan representasi gabungan yang optimal dari sinyal dal
APA, Harvard, Vancouver, ISO, and other styles
25

Czajka, Adam, and Andrzej Pacu. "Iris Recognition System Based on Zak-Gabor Wavelet Packets." Journal of Telecommunications and Information Technology, no. 4 (June 27, 2023): 10–18. http://dx.doi.org/10.26636/jtit.2010.4.1091.

Full text
Abstract:
The paper proposes a new iris coding method based on Zak-Gabor wavelet packet transform. The essential component of the iris recognition methodology design is an effective adaptation of the transformation parameters that makes the coding sensitive to the frequencies characterizing ones eye. We thus propose to calculate the between-to-within class ratio of weakly correlated Zak-Gabor transformation coefficients allowing for selection the frequencies the most suitable for iris recognition. The Zak-Gabor-based coding is non-reversible, i.e., it is impossible to reconstruct the original iris image
APA, Harvard, Vancouver, ISO, and other styles
26

Rao, Xiaojia, Aïna Linn Georges, Maxime Legoupil, et al. "Iris-Wasm: Robust and Modular Verification of WebAssembly Programs." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 1096–120. http://dx.doi.org/10.1145/3591265.

Full text
Abstract:
WebAssembly makes it possible to run C/C++ applications on the web with near-native performance. A WebAssembly program is expressed as a collection of higher-order ML-like modules, which are composed together through a system of explicit imports and exports using a host language, enabling a form of higher- order modular programming. We present Iris-Wasm, a mechanized higher-order separation logic building on a specification of Wasm 1.0 mechanized in Coq and the Iris framework. Using Iris-Wasm, we are able to specify and verify individual modules separately, and then compose them modularly in a
APA, Harvard, Vancouver, ISO, and other styles
27

Haitham, Salman Chyad. "Subject Review: Iris Recognition Using Neural Network." International Journal of Engineering Research and Advanced Technology (IJERAT) 5, no. 9 (2019): 6–10. https://doi.org/10.31695/IJERAT.2019.3562.

Full text
Abstract:
<em>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Essentially use iris technique to human identification and recognition. Due enormous growth through the recent years for iris recognition techniques numerous research has emerged in the areas like; image compression, segmentation, quality assessment, Image Acquisition (IA), restoration, feature extraction (FE), normalization, noise reduction iris code matching (NRCM), evaluation, searching large database, applications, performance under changing multibiometrics and condition.&nbsp; Where many techniques were suggested to iris recognition (IR) using neur
APA, Harvard, Vancouver, ISO, and other styles
28

Olatunbosun, A., and O. Bamigboye. "An Iris Recognition and Detection System Implementation." Publisher 5, no. 8 (2020): 8–10. https://doi.org/10.35940/ijies.H0958.025820.

Full text
Abstract:
There was big interest in the use of biometrical identification techniques, such as iris, face, fingerprints, ears, and significant technological developments and to enhance safety issues. The application varies depending on the location, based on the resources. They are used in safety at airports, border safety, criminal investigation, and so on. This study focuses on iris-based biometric technology. Biometric technology based on the iris diaphragm is the most reliable and acceptable among other biometric technologies. In this study, we developed the IRIS graphic user interface and attempted
APA, Harvard, Vancouver, ISO, and other styles
29

Hicham, Ohmaid, Eddarouich S., Bourouhou A., and Timouyas M. "Comparison between SVM and KNN classifiers for iris recognition using a new unsupervised neural approach in segmentation." International Journal of Artificial Intelligence (IJ-AI) 9, no. 3 (2020): 429–38. https://doi.org/10.11591/ijai.v9.i3.pp429-438.

Full text
Abstract:
A biometric system of identification and authentication provides automatic recognition of an individual based on certain unique features or characteristics he or she possesses. Iris recognition is a biometric identification method that applies pattern recognition to images of the iris. Owing to the unique epigenetic patterns of the iris, iris recognition is considered one of the most accurate methods in the field of biometric identification. The segmentation algorithm proposed in this article starts with determining the regions of the eye using unsupervised neural approach, after the outline o
APA, Harvard, Vancouver, ISO, and other styles
30

KMS, Mariya Christeena Vijini, and Kuzhaloli Shanmugan. "Gender Classification From The Iris Code Used For Recognition." International Journal of MC Square Scientific Research 9, no. 1 (2017): 218–29. http://dx.doi.org/10.20894/ijmsr.117.009.001.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Carelli, Mario, Lawrence Conway, Milorad Dzodzo, et al. "The SPES3 Experimental Facility Design for the IRIS Reactor Simulation." Science and Technology of Nuclear Installations 2009 (2009): 1–12. http://dx.doi.org/10.1155/2009/579430.

Full text
Abstract:
IRIS is an advanced integral pressurized water reactor, developed by an international consortium led by Westinghouse. The licensing process requires the execution of integral and separate effect tests on a properly scaled reactor simulator for reactor concept, safety system verification, and code assessment. Within the framework of an Italian R&amp;D program on Nuclear Fission, managed by ENEA and supported by the Ministry of Economic Development, the SPES3 facility is under design and will be built and operated at SIET laboratories. SPES3 simulates the primary, secondary, and containment syst
APA, Harvard, Vancouver, ISO, and other styles
32

Chai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay, and and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme." Symmetry 11, no. 2 (2019): 164. http://dx.doi.org/10.3390/sym11020164.

Full text
Abstract:
Iris has been found to be unique and consistent over time despite its random nature. Unprotected biometric (iris) template raises concerns in security and privacy, as numerous large-scale iris recognition projects have been deployed worldwide—for instance, susceptibility to attacks, cumbersome renewability, and cross-matching. Template protection schemes from biometric cryptosystems and cancelable biometrics are expected to restore the confidence in biometrics regarding data privacy, given the great advancement in recent years. However, a majority of the biometric template protection schemes h
APA, Harvard, Vancouver, ISO, and other styles
33

Legoupil, Maxime, June Rousseau, Aïna Linn Georges, Jean Pichon-Pharabod, and Lars Birkedal. "Iris-MSWasm: Elucidating and Mechanising the Security Invariants of Memory-Safe WebAssembly." Proceedings of the ACM on Programming Languages 8, OOPSLA2 (2024): 304–32. http://dx.doi.org/10.1145/3689722.

Full text
Abstract:
WebAssembly offers coarse-grained encapsulation guarantees via its module system, but does not support fine-grained sharing of its linear memory. MSWasm is a recent proposal which extends WebAssembly with fine-grained memory sharing via handles, a type of capability that guarantees spatial and temporal safety, and thus enables an expressive yet safe style of programming with flexible sharing. In this paper, we formally validate the pen-and-paper design of MSWasm. To do so, we first define MSWasmCert, a mechanisation of MSWasm that makes it a fully-defined, conservative extension of WebAssembly
APA, Harvard, Vancouver, ISO, and other styles
34

Al-Saggaf, Alawi. "Secure Method for Combining Cryptography with Iris Biometrics." JUCS - Journal of Universal Computer Science 24, no. (4) (2018): 341–56. https://doi.org/10.3217/jucs-024-04-0341.

Full text
Abstract:
Cryptography and biometrics are widely used in providing information security. Cryptographic systems rely on keys for secure information. Unlike biometric systems, the keys in cryptographic systems must be exactly reproducible and not strongly linked to the user identity. Each of the two systems has some issue associated with it. Combining cryptography and biometrics in a secure way can mitigate these issues. This paper presents a secure cryptographic authentication method based on the discrete logarithm problem. Through the security analysis of the proposed scheme, we prove that the security
APA, Harvard, Vancouver, ISO, and other styles
35

Venugopalan, Shreyas, and Marios Savvides. "How to Generate Spoofed Irises From an Iris Code Template." IEEE Transactions on Information Forensics and Security 6, no. 2 (2011): 385–95. http://dx.doi.org/10.1109/tifs.2011.2108288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Tapia, Juan E., Claudio A. Perez, and Kevin W. Bowyer. "Gender Classification From the Same Iris Code Used for Recognition." IEEE Transactions on Information Forensics and Security 11, no. 8 (2016): 1760–70. http://dx.doi.org/10.1109/tifs.2016.2550418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mustafa, Raniah Ali, Amal Abdulbaqi Maryoosh, Dena Nadir George, and Waleed Rasheed Humood. "Iris images encryption based on QR code and chaotic map." TELKOMNIKA (Telecommunication Computing Electronics and Control) 18, no. 1 (2020): 289. http://dx.doi.org/10.12928/telkomnika.v18i1.13293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

V.SatyanarayanaTallapragada, V., and E. G. Rajan. "IRIS Recognition based on Non Linear Dimensionality Reduction of IRIS Code with KPCA and SVM based Classification." International Journal of Computer Applications 44, no. 13 (2012): 42–46. http://dx.doi.org/10.5120/6326-8681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

LIU, BO, SIEW-KEI LAM, THAMBIPILLAI SRIKANTHAN, and WEIQI YUAN. "IRIS RECOGNITION OF DEFOCUSED IMAGES FOR MOBILE PHONES." International Journal of Pattern Recognition and Artificial Intelligence 26, no. 08 (2012): 1260010. http://dx.doi.org/10.1142/s0218001412600105.

Full text
Abstract:
In this paper, we introduce a novel iris recognition approach for mobile phones, which takes into account imaging noise arising from image capture outside the depth of field (DOF) of cameras. Unlike existing approaches that rely on special hardware to extend the DOF or computationally expensive algorithms to restore the defocused images prior to recognition, the proposed method performs recognition on the defocused images based on the stable bits in the iris code representation that are robust to imaging noise. To the best of our knowledge, our work is the first to investigate the characterist
APA, Harvard, Vancouver, ISO, and other styles
40

Mohan, Poovayar Priya, and Ezhilarasan Murugesan. "A novel approach for detecting the presence of a lymphatic rosary in the iris using a 3-stage algorithm." AIMS Bioengineering 11, no. 4 (2024): 506–26. http://dx.doi.org/10.3934/bioeng.2024023.

Full text
Abstract:
&lt;p&gt;Lymphatic dysfunction is characterized by the sluggish movement of lymph fluids. It manifests as a “Lymphatic Rosary” in the iris which is often due to dehydration and inactivity. Detecting these signs early is crucial for diagnosis and treatment. Therefore, there is a need for an automated, accurate, and efficient method to detect lymphatic rosaries in the iris. This paper presents a novel approach for detecting a lymphatic rosary using advanced image processing techniques. The proposed method involves iris segmentation to isolate the iris from the eye, followed by normalization to s
APA, Harvard, Vancouver, ISO, and other styles
41

Tamilselvi, S. "A Novel Based Approach for iris code Recognization Using Gabor Filter." IOSR Journal of Electronics and Communication Engineering 4, no. 5 (2013): 32–37. http://dx.doi.org/10.9790/2834-0453237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mahammad, Farooq Sunar. "Iris Unleashed: Revolutionizing Mouse Control through OpenCV." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 4268–73. http://dx.doi.org/10.22214/ijraset.2024.60909.

Full text
Abstract:
Abstract: Background: In today's modern world, personal computers have become an essential part of our daily routines, serving various purposes like work, education, and entertainment. However, for individuals with limited mobility, using traditional input devices such as keyboards and mouse can be quite challenging. In such cases, alternative input methods that utilize different abilities, such as eye movements, are preferred. Objectives: The proposed system begins by capturing an image with a camera and using OpenCV code to detect the pupil's position in the eye. This information serves as a
APA, Harvard, Vancouver, ISO, and other styles
43

LARBI, Nouar, and Nasreddine TALEB. "A Robust Multi-Biometric System with Compact Code for Iris and Face." International Journal on Electrical Engineering and Informatics 10, no. 1 (2018): 1–13. http://dx.doi.org/10.15676/ijeei.2018.10.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Maccari, Pietro, Giuseppe Agnello, Fulvio Mascari, and Stefano Ederli. "Analysis of BDBA sequences in a generic IRIS reactor using ASTEC code." Annals of Nuclear Energy 182 (March 2023): 109611. http://dx.doi.org/10.1016/j.anucene.2022.109611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Al-Zubi, Raed T., Khalid A. Darabkh, and Nayel Al-Zubi. "Effect of Eyelid and Eyelash Occlusions on a Practical Iris Recognition System: Analysis and Solution." International Journal of Pattern Recognition and Artificial Intelligence 29, no. 08 (2015): 1556016. http://dx.doi.org/10.1142/s0218001415560169.

Full text
Abstract:
One of the crucial and inherent issues in a practical iris recognition system is the occlusion that happens due to eyelids and eyelashes. This occlusion increases the complexity and degrades the performance of matching and feature extraction processes. Generally, two types of approaches have been proposed to solve this issue. The first approach requires generating an iris mask that indicates which part of the iris is useful and which others are occluded. However, in the second approach, a fixed region of interest (ROI) within the iris area is selected to avoid the regions of occlusion. In this
APA, Harvard, Vancouver, ISO, and other styles
46

Polito, Vanessa, Graham S. Kerr, Yan Xu, Viacheslav M. Sadykov, and Juraj Lorincik. "Solar Flare Ribbon Fronts. I. Constraining Flare Energy Deposition with IRIS Spectroscopy." Astrophysical Journal 944, no. 1 (2023): 104. http://dx.doi.org/10.3847/1538-4357/acaf7c.

Full text
Abstract:
Abstract Spectral lines formed at lower atmospheric layers show peculiar profiles at the “leading edge” of ribbons during solar flares. In particular, increased absorption of the BBSO/GST He i λ10830 line, as well as broad and centrally reversed profiles in the spectra of the Mg ii and C ii lines observed by the IRIS satellite, has been reported. In this work, we aim to understand the physical origin of such peculiar IRIS profiles, which seem to be common of many, if not all, flares. To achieve this, we quantify the spectral properties of the IRIS Mg ii profiles at the ribbon leading edge duri
APA, Harvard, Vancouver, ISO, and other styles
47

Umar, Muhammad Muneer, Amjad Mehmood, Houbing Song, and Kim-Kwang Raymond Choo. "I-Marks: An iris code embedding system for ownership identification of multimedia content." Computers & Electrical Engineering 63 (October 2017): 209–19. http://dx.doi.org/10.1016/j.compeleceng.2017.07.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Mohit, Kumar Verma, and Saif Wajid Mohd. "A Multimodal Biometric System using Iris and Palmprint." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 1892–96. https://doi.org/10.35940/ijeat.C5236.029320.

Full text
Abstract:
A biometric system is basically a system of image recognition that uses bio metric characteristics to identify individuals. The thesis introduces a biometric multimodal system that is based on iris-based Palm Print verification and fusion. We suggest an approach to extracting features from each modality using four-level decomposition of the wavelet packet. It includes 256 packets capable of generating a simple binary code. Dictate standardized thresholds based on the first three highest energy peaks that would impact 0 or 1 for each wavelet packet. Specific fusion approaches were evaluated at
APA, Harvard, Vancouver, ISO, and other styles
49

Nanda, Vedant, Ayan Majumdar, Camila Kolling, et al. "Do Invariances in Deep Neural Networks Align with Human Perception?" Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 8 (2023): 9277–85. http://dx.doi.org/10.1609/aaai.v37i8.26112.

Full text
Abstract:
An evaluation criterion for safe and trustworthy deep learning is how well the invariances captured by representations of deep neural networks (DNNs) are shared with humans. We identify challenges in measuring these invariances. Prior works used gradient-based methods to generate identically represented inputs (IRIs), ie, inputs which have identical representations (on a given layer) of a neural network, and thus capture invariances of a given network. One necessary criterion for a network's invariances to align with human perception is for its IRIs look 'similar' to humans. Prior works, howev
APA, Harvard, Vancouver, ISO, and other styles
50

Huh, C., M. Proffitt, H. B. Prosper, et al. "Declarative interfaces for HEP data analysis: FuncADL and ADL/CutLang." Journal of Physics: Conference Series 2438, no. 1 (2023): 012075. http://dx.doi.org/10.1088/1742-6596/2438/1/012075.

Full text
Abstract:
Abstract Analysis description languages are declarative interfaces for HEP data analysis that allow users to avoid writing event loops, simplify code, and enable performance improvements to be decoupled from analysis development. One example is FuncADL, inspired by functional programming and developed using Python as a host language. FuncADL borrows concepts from database query languages to isolate the interface from the underlying physical and logical schemas. The same query can be used to select data from different sources and formats and with different execution mechanisms. FuncADL is one o
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!