THE HUMAN IRIS STRUCTURE AND ITS APPLICATION IN SECURITY SYSTEM OF CAR

被引:0
作者
Sreekala, P. [1 ]
Jose, Victor [1 ]
Joseph, James [1 ]
Joseph, Shibin [1 ]
机构
[1] Amaljyothi Coll Engn, Elect & Elect Dept, Kanjirapally, Tamil Nadu, India
来源
2012 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION: INNOVATIVE PRACTICES AND FUTURE TRENDS (AICERA) | 2012年
关键词
Biometrics; identification; verification; authentication; security; research issues; evaluation;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Biometrics deals with identification of individuals based on their biological or behavioral characteristics. Biometrics has lately been receiving attention in popular media. it is widely believed that biometrics will become a significant component of the identification technology. In today's society biometric identification is integral to improved security. Biometrics is understood to be the most secure and reliable means of identification and is increasingly deployed maximum security environments. Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the irides of an individual's eyes. Not to be confused with another less prevalent ocular-based technology, retina scanning, iris recognition uses camera technology, and subtle IR illumination to reduce specular reflection from the convex cornea to create images of the detail-rich, intricate structures of the iris. These unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier group of all biometric technologies The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of iris recognition is its stability. In this paper present the security of vehicles especialy car using iris recognition method. Iris recognition method gives better performance than all other image processing system.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Efficient software attack to multimodal biometric systems and its application to face and iris fusion
    Gomez-Barrero, Marta
    Galbally, Javier
    Fierrez, Julian
    PATTERN RECOGNITION LETTERS, 2014, 36 : 243 - 253
  • [42] An Approach for Evaluating New Energy Industry Security and Its Application
    Xu Jun
    Ren Tengfei
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND SOCIAL SCIENCE (ICMESS 2017), 2017, 72 : 270 - 274
  • [43] Synoptic Approach on Biometric Modelling and its Application on Security Purposes
    Akshaya, Sabari, V
    Saratha, S.
    Devi, Subathra R.
    Ramya, S. K.
    Mohanapriya, A.
    2017 IEEE INTERNATIONAL CONFERENCE ON INNOVATIONS IN GREEN ENERGY AND HEALTHCARE TECHNOLOGIES (IGEHT), 2017,
  • [44] Maintaining Security Concerns to Cloud Services and Its Application Vulnerabilities
    Reddy, Lakkireddy Venkateswara
    Viswanath, Vajragiri
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, CIDM 2016, 2017, 556 : 227 - 236
  • [45] Global Security Using Human Face Understanding under Vision Ubiquitous Architecture System
    Jalal, A.
    Kim, S.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 7 - 11
  • [46] Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission
    Bhatnagar, Gaurav
    Wu, Jonathan
    Raman, Balasubramanian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 254 - 267
  • [47] Exploring Organizational Human Resource Information System Security
    Zafar, Humayun
    AMCIS 2012 PROCEEDINGS, 2012,
  • [48] Domotic security system based on human behavior analysis
    Piñuela, JA
    Amador-Reyes, A
    Andina, D
    Soft Computing with Industrial Applications, Vol 17, 2004, 17 : 149 - 153
  • [49] Design and Implementation of Smart Security System for Human Safety
    Mondal, Indranee
    Kibria, Tasbi Binta
    Ghosh, Prottasha
    Noman, Fahim Zaman
    Zishan, Md. Saniat Rahman
    2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), 2019, : 647 - 651
  • [50] APPLICATION OF LEARNING ALGORITHMS IN SMART HOME IOT SYSTEM SECURITY
    Mao, Jian
    Lin, Qixiao
    Bian, Jingdong
    MATHEMATICAL FOUNDATIONS OF COMPUTING, 2018, 1 (01): : 63 - 76