THE HUMAN IRIS STRUCTURE AND ITS APPLICATION IN SECURITY SYSTEM OF CAR

被引:0
作者
Sreekala, P. [1 ]
Jose, Victor [1 ]
Joseph, James [1 ]
Joseph, Shibin [1 ]
机构
[1] Amaljyothi Coll Engn, Elect & Elect Dept, Kanjirapally, Tamil Nadu, India
来源
2012 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION: INNOVATIVE PRACTICES AND FUTURE TRENDS (AICERA) | 2012年
关键词
Biometrics; identification; verification; authentication; security; research issues; evaluation;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Biometrics deals with identification of individuals based on their biological or behavioral characteristics. Biometrics has lately been receiving attention in popular media. it is widely believed that biometrics will become a significant component of the identification technology. In today's society biometric identification is integral to improved security. Biometrics is understood to be the most secure and reliable means of identification and is increasingly deployed maximum security environments. Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the irides of an individual's eyes. Not to be confused with another less prevalent ocular-based technology, retina scanning, iris recognition uses camera technology, and subtle IR illumination to reduce specular reflection from the convex cornea to create images of the detail-rich, intricate structures of the iris. These unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier group of all biometric technologies The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of iris recognition is its stability. In this paper present the security of vehicles especialy car using iris recognition method. Iris recognition method gives better performance than all other image processing system.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Invariant bilinear forms and its application in information security
    Gao, L
    2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 649 - 654
  • [32] An electronic security application for the authentication of Android phones based on the biometric analysis of human locomotion
    Hernandez, Daniel E.
    Gil, Victor E.
    Robledo, Fabian
    INGENIERIA UC, 2019, 26 (02): : 128 - 144
  • [33] Real-Time Human Authentication System Based on Iris Recognition
    Hafeez, Huma
    Zafar, Muhammad Naeem
    Abbas, Ch Asad
    Elahi, Hassan
    Ali, Muhammad Osama
    ENG, 2022, 3 (04): : 693 - 708
  • [34] Deployment-time multi-cloud application security Automating security measures to an application and its container
    Sheridan, Craig
    Massonet, Philippe
    Phee, Andrew
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 481 - 485
  • [35] Human-Object Relations and Security Control in Inference System for the User Intention
    Park, Boseok
    Tang, Jiamei
    Kim, Sangwook
    IEEE ACCESS, 2023, 11 : 95368 - 95380
  • [36] Structure design and test of enterprise security management system with advanced internal security
    Kim, Seoksoo
    Kim, Soongohn
    Lee, Geuk
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (03): : 358 - 363
  • [37] Indicators system construction and application of regional water security
    Deng J.
    Jia S.
    Shuikexue Jinzhan/Advances in Water Science, 2022, 33 (01): : 48 - 56
  • [38] An improved approach to security and privacy of RFID application system
    Zhang, L
    Zhou, HB
    Kong, RS
    Yang, F
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1149 - 1152
  • [39] Future perspectives: The car and its IP-address - A potential safety and security risk assessment
    Lang, Andreas
    Dittmann, Jana
    Kiltz, Stefan
    Hoppe, Tobias
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2007, 4680 : 40 - +
  • [40] Efficient software attack to multimodal biometric systems and its application to face and iris fusion
    Gomez-Barrero, Marta
    Galbally, Javier
    Fierrez, Julian
    PATTERN RECOGNITION LETTERS, 2014, 36 : 243 - 253