[PDF][PDF] A review on advances in iris recognition methods
FM Alkoot, HPO Box - International Journal of Computer Engineering …, 2012 - academia.edu
Iris recognition is one of the most accurate identity verification systems. Since its initial
introduction by J. Daughman many methods have been proposed to enhance the …
introduction by J. Daughman many methods have been proposed to enhance the …
Security of biometric authentication systems
This overview paper outlines our views of actual security of biometric authentication and
encryption systems. The attractiveness of some novel approaches like cryptographic key …
encryption systems. The attractiveness of some novel approaches like cryptographic key …
An improved approach of iris biometric authentication performance and security with cryptography and error correction codes
One of the most challenging parts of integrating biometrics and cryptography is the intra
variation in acquired identifiers between the same users. Due to noise in the environment or …
variation in acquired identifiers between the same users. Due to noise in the environment or …
Securing cloud storage by transparent biometric cryptography
With the capability of storing huge volumes of data over the Internet, cloud storage has
become a popular and desirable service for individuals and enterprises. The security issues …
become a popular and desirable service for individuals and enterprises. The security issues …
Securing private keys in electronic health records using session-based hierarchical key encryption
A Omotosho, J Emuoyibofarhe… - Journal of Applied Security …, 2017 - Taylor & Francis
Patients want the assurance that the confidentiality of their records accessed through
Electronic Health Records (EHR) are safe. With increasing implementation of EHR for health …
Electronic Health Records (EHR) are safe. With increasing implementation of EHR for health …
A three-factor authenticated key agreement scheme for SIP on elliptic curves
This paper proposes a new three-factor authenticated key agreement scheme for SIP on
elliptic curve cryptosystem (ECC). In the proposed scheme, we adopts three-factor …
elliptic curve cryptosystem (ECC). In the proposed scheme, we adopts three-factor …
A reliable-inference framework for recognition of human actions
We present an action recognition method based on the concept of reliable inference. Our
approach is formulated in a probabilistic framework using posterior class ratios to verify the …
approach is formulated in a probabilistic framework using posterior class ratios to verify the …
[PDF][PDF] Iris recognition: existing methods and open issues
S Kalsoom, S Ziauddin - PATTERNS: The Fourth International …, 2012 - personales.upv.es
Biometric authentication uses unique physical or behavioural patterns in humans to identify
individuals. Though biometric is generally considered most reliable, stable and unique …
individuals. Though biometric is generally considered most reliable, stable and unique …
[HTML][HTML] Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm
A Boukhari, S Chitroub, I Bouraoui - Int'l J. of Communications, Network …, 2011 - scirp.org
The numerical world is under a fast development generating facilities and threats. The
recommended solutions are especially the protection of information in all its states. The …
recommended solutions are especially the protection of information in all its states. The …
Textured cosmetic contact lens detection using statistical features and SVM classifier
MZ Ahmad, I Arshad, G Raja… - Bahria University Journal …, 2016 - search.proquest.com
Detection of real legitimate biological trait for the purpose of identification of a person is one
of the primary features of biometric-based authentication systems. Iris based identification …
of the primary features of biometric-based authentication systems. Iris based identification …