THE HUMAN IRIS STRUCTURE AND ITS APPLICATION IN SECURITY SYSTEM OF CAR

被引:0
|
作者
Sreekala, P. [1 ]
Jose, Victor [1 ]
Joseph, James [1 ]
Joseph, Shibin [1 ]
机构
[1] Amaljyothi Coll Engn, Elect & Elect Dept, Kanjirapally, Tamil Nadu, India
来源
2012 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION: INNOVATIVE PRACTICES AND FUTURE TRENDS (AICERA) | 2012年
关键词
Biometrics; identification; verification; authentication; security; research issues; evaluation;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Biometrics deals with identification of individuals based on their biological or behavioral characteristics. Biometrics has lately been receiving attention in popular media. it is widely believed that biometrics will become a significant component of the identification technology. In today's society biometric identification is integral to improved security. Biometrics is understood to be the most secure and reliable means of identification and is increasingly deployed maximum security environments. Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the irides of an individual's eyes. Not to be confused with another less prevalent ocular-based technology, retina scanning, iris recognition uses camera technology, and subtle IR illumination to reduce specular reflection from the convex cornea to create images of the detail-rich, intricate structures of the iris. These unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier group of all biometric technologies The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of iris recognition is its stability. In this paper present the security of vehicles especialy car using iris recognition method. Iris recognition method gives better performance than all other image processing system.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] The Application of Virtual Machines on System Security
    Zhao, Siqin
    Chen, Kong
    Zheng, Weimin
    FOURTH CHINAGRID ANNUAL CONFERENCE, PROCEEDINGS, 2009, : 222 - 229
  • [22] Designing of Detecting and Measurement System for Car Security Based on Supersonic Principle
    Li, Wei-bing
    Wang, Xin-na
    MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 1346 - +
  • [23] Car security system with face recognition using Convolution Neural Network
    Aruna, S.
    Maheswari, M.
    Saranya, A.
    MATERIALS TODAY-PROCEEDINGS, 2022, 68 : 152 - 155
  • [24] Development of Iris Security System Using Adaptive Quality-Based Template Fusion
    Eid, M. M.
    Mohamed, M. A.
    Abou-El-Soud, M. A.
    INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 : 265 - 278
  • [25] An Effective Machine-Vision System for Information Security and Privacy using Iris Biometrics
    Sonkamble, Sulochana
    Thool, Ravindra
    Sonkamble, Balwant
    WMSCI 2008: 12TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS, 2008, : 209 - +
  • [26] The Application of Software Testing Technology on Security in Web Application System
    Zhai, Hui
    Shi, Hui
    Zhai, Rui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6159 - 6161
  • [27] Homophobic legislation and its impact on human security
    Makofane, Keletso
    Beck, Jack
    Lubensky, Micah
    Ayala, George
    AFRICAN SECURITY REVIEW, 2014, 23 (02) : 186 - 195
  • [28] IRIS: A Database Application System for Diseases Identification Using FTIR Spectroscopy
    Arshad, Ahmad Zulhilmi
    Munajat, Yusof
    Ibrahim, Raja Kamarulzaman Raja
    Mahmood, Nasrul Humaimi
    INTERNATIONAL CONFERENCE ON MATHEMATICS, ENGINEERING AND INDUSTRIAL APPLICATIONS 2014 (ICOMEIA 2014), 2015, 1660
  • [29] Sensors' network and its application in the intelligent storage security
    Zhang, QY
    Nicolescu, M
    Jiang, X
    Zhang, Y
    Yue, WH
    Xiao, WH
    UNMANNED/UNATTENDED SENSORS AND SENSOR NETWORKS, 2004, 5611 : 255 - 264
  • [30] Digital Ant Mechanism and Its Application in Network Security
    Jie, Bao
    Liu, Jingju
    Wang, Yongjie
    Zhou, Xuan
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 710 - 714