[PDF][PDF] A review on advances in iris recognition methods

FM Alkoot, HPO Box - International Journal of Computer Engineering …, 2012 - academia.edu
Iris recognition is one of the most accurate identity verification systems. Since its initial
introduction by J. Daughman many methods have been proposed to enhance the …

Security of biometric authentication systems

V Matyáš, Z Říha - 2010 International Conference on Computer …, 2010 - ieeexplore.ieee.org
This overview paper outlines our views of actual security of biometric authentication and
encryption systems. The attractiveness of some novel approaches like cryptographic key …

An improved approach of iris biometric authentication performance and security with cryptography and error correction codes

SH Moi, PY Yong, R Hassan, H Asmuni… - … : International Journal on …, 2022 - joiv.org
One of the most challenging parts of integrating biometrics and cryptography is the intra
variation in acquired identifiers between the same users. Due to noise in the environment or …

Securing cloud storage by transparent biometric cryptography

L Abed, N Clarke, B Ghita, A Alruban - Innovative Security Solutions for …, 2019 - Springer
With the capability of storing huge volumes of data over the Internet, cloud storage has
become a popular and desirable service for individuals and enterprises. The security issues …

Securing private keys in electronic health records using session-based hierarchical key encryption

A Omotosho, J Emuoyibofarhe… - Journal of Applied Security …, 2017 - Taylor & Francis
Patients want the assurance that the confidentiality of their records accessed through
Electronic Health Records (EHR) are safe. With increasing implementation of EHR for health …

A three-factor authenticated key agreement scheme for SIP on elliptic curves

EJ Yoon, KY Yoo - 2010 Fourth International Conference on …, 2010 - ieeexplore.ieee.org
This paper proposes a new three-factor authenticated key agreement scheme for SIP on
elliptic curve cryptosystem (ECC). In the proposed scheme, we adopts three-factor …

A reliable-inference framework for recognition of human actions

JW Davis, A Tyagi - Proceedings of the IEEE Conference on …, 2003 - ieeexplore.ieee.org
We present an action recognition method based on the concept of reliable inference. Our
approach is formulated in a probabilistic framework using posterior class ratios to verify the …

[PDF][PDF] Iris recognition: existing methods and open issues

S Kalsoom, S Ziauddin - PATTERNS: The Fourth International …, 2012 - personales.upv.es
Biometric authentication uses unique physical or behavioural patterns in humans to identify
individuals. Though biometric is generally considered most reliable, stable and unique …

[HTML][HTML] Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm

A Boukhari, S Chitroub, I Bouraoui - Int'l J. of Communications, Network …, 2011 - scirp.org
The numerical world is under a fast development generating facilities and threats. The
recommended solutions are especially the protection of information in all its states. The …

Textured cosmetic contact lens detection using statistical features and SVM classifier

MZ Ahmad, I Arshad, G Raja… - Bahria University Journal …, 2016 - search.proquest.com
Detection of real legitimate biological trait for the purpose of identification of a person is one
of the primary features of biometric-based authentication systems. Iris based identification …