CFP last date
22 April 2024
Reseach Article

Introducing an Approach for Secure Authentication using Iris Recognition

by Charvi Gahlot, Deepak Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 13
Year of Publication: 2014
Authors: Charvi Gahlot, Deepak Sharma
10.5120/15779-4476

Charvi Gahlot, Deepak Sharma . Introducing an Approach for Secure Authentication using Iris Recognition. International Journal of Computer Applications. 90, 13 ( March 2014), 17-19. DOI=10.5120/15779-4476

@article{ 10.5120/15779-4476,
author = { Charvi Gahlot, Deepak Sharma },
title = { Introducing an Approach for Secure Authentication using Iris Recognition },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 13 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number13/15779-4476/ },
doi = { 10.5120/15779-4476 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:56.463026+05:30
%A Charvi Gahlot
%A Deepak Sharma
%T Introducing an Approach for Secure Authentication using Iris Recognition
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 13
%P 17-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes an approach to iris recognition system for securely authenticating user. Eye images are captured using a USB webcam and are enhanced. Segmentation is done using an algorithm based on hough transform . Then the selected portion of image is converted to polar coordinates. Distinctive features of the iris are extracted using Haar wavelet transform and encoded. Iris binary codes after filteration will be stored in system database & hamming distance calculation is done for comparing two codes.

References
  1. John Daugman , "How Iris Recognition Works," IEEE transaction on circuits and systems for video technology, vol. 14, no. 1, pp. 1-3, january 2004.
  2. S. Sanderson and J. Erbetta, "Authentication for secure environments based on iris scanning technology," IEEE Colloquium on Visual Biometrics, 2000.
  3. L. Masek, "Recognition of Human Iris Patterns for Biometric Identification,""M. Thesis2003.
  4. V. Larrumbe Hidalgo, L. Martin García and M. Taboada Lorenzo , "Iris recognition using the JAVAVis Library," International Journal of Interactive Multimedia and Artificial Intelligence, Vol. 1, Nº 1, ISSN 1989-1660.
  5. Manoj K. Vairalkar, "Edge Detection of Images Using Sobel Operator," International Journal of Emerging Technology and Advanced Engineering, vol. 2, issue 1, january 2012.
  6. Meherchilakalapudi, "KNOW ABOUT - BIOMETRIC AUTHENTICATION SYSTEM," May 30,2009 , available: http://meherchilakalapudi. wordpress. com/2009/05/30/know-about-biometric-authentication-system/
  7. Jafar M. H. Ali and Aboul Ella Hassanien ,"An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory," AMO - Advanced Modeling and Optimization, Volume 5, Number 2, 2003.
  8. Nandan. T. Murthy ,"Technical Seminar On IRIS RECOGNITION," city engineering college.
  9. Roger F. Larico Chavez, Yuzo Iano, Member IEEE, and Vicente B. Sablón, "Process of Recognition of Human Iris: Fast Segmentation of the Iris," University of Campinas, available: http://www. decom. fee. unicamp. br/~rlarico/iris/localizationiris. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Iris image processing image encoding biometric security