Sign Up to like & get
recommendations!
0
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-0934-0
Abstract: Iris identification technology is the most versatile non-contact scanning technique, based on mathematical pattern matching. This outstanding authentication method proves its merit exceedingly well in terms of high verification speed, capability of handling large database,…
read more here.
Keywords:
extraction;
recognition;
swarm optimization;
particle swarm ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-5049-3
Abstract: ABSTRACTSmartphones have become an important way to store sensitive information; therefore, users’ privacy needs to be highly protected. This can be done by using the most reliable and accurate biometric identification system available today: iris…
read more here.
Keywords:
recognition system;
phase;
system;
iris recognition ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-5689-y
Abstract: Human iris has been explored as one of the most promising biometric traits since last many years. This paper presents a new ingenious feature extraction approach which is based on the texture variations of the…
read more here.
Keywords:
based applications;
spectral iris;
cross spectral;
applications cross ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-08598-7
Abstract: Mobile devices have become ubiquitous nowadays and so is the need of secure access to these devices. Iris being the most reliable and hard-to-tamper biometric trait, can serve the aforementioned purpose. Iris recognition on mobile…
read more here.
Keywords:
recognition optimized;
based iris;
recognition;
smartphone based ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2022 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-021-11746-7
Abstract: Iris biometrics is one of the frequently used biometrics for security purposes, and it provides the appropriate tools for identifying humans. Deep learners when used along with iris recognition can improve accuracy, automatic learning, and…
read more here.
Keywords:
orb features;
whale optimization;
elephant herding;
recognition ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2939326
Abstract: Cross-spectral iris recognition represents the ability of the system to identify the iris images acquired in different electromagnetic spectrums. An iris captured in the near-infrared spectrum (NIR) is matched with an iris obtained in the…
read more here.
Keywords:
recognition performance;
cross spectral;
spectral iris;
recognition ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2973433
Abstract: For large-scale iris recognition tasks, the determination of classification thresholds remains a challenging task, especially in practical applications where sample space is growing rapidly. Due to the complexity of iris samples, the classification threshold is…
read more here.
Keywords:
scale iris;
center;
large scale;
iris ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3425648
Abstract: To harness the power of pre-trained image classification models on the extensive ImageNet dataset, early layers of pre-trained backbones have been used to capture relevant information about iris texture in the field of Iris Recognition…
read more here.
Keywords:
backbone;
pre trained;
trained backbone;
iris recognition ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3605676
Abstract: This paper proposes an authentication protocol based on post-quantum cryptography and iris recognition. The process uses a modified version of the original McEliece cryptographic algorithm that provides post-quantum security. Additionally, iris recognition is included in…
read more here.
Keywords:
process;
authentication;
recognition;
post quantum ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Circuits and Systems for Video Technology"
DOI: 10.1109/tcsvt.2021.3117291
Abstract: Cross-spectral recognition is still an open challenge in iris recognition. In cross-spectral iris recognition, there exist distinct device-specific bands between near-infrared (NIR) and visible (VIS) images, resulting in the distribution gap between samples from different…
read more here.
Keywords:
recognition;
spectral iris;
cross spectral;
device specific ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2018.2869342
Abstract: Assumptions regarding eye morphology are implicit in iris recognition algorithms. The cornea is assumed to have little to no effect on the view of the iris texture when the eye gaze is non-frontal, the iris…
read more here.
Keywords:
non planarity;
eye;
iris;
iris recognition ... See more keywords