|Jithin A Manjaly , Nithin A.K , Praveen Wilson , Ronald Pallan|
|Cite This Article:|
Iris Recognition, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 12 ,Page(s):305-309 ,May 2019 ,Available :IJIRT148086_PAPER.pdf
|Humans recognize each other according to their various characteristics for ages. We recognize others by their face when we meet them and by their voice as we speak to them. Identity verification (authentication) in computer systems has been traditionally based on something that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or disclosed.To achieve more reliable verification or identification we should use something that really characterizes the given person. Biometrics offer automated methods of identity verification or identification on the principle of measurable physiological or behavioral characteristics such as a fingerprint or a voice sample. The characteristics are measurable and unique. These characteristics should not be duplicable, but it is unfortunately often possible to create a copy that is accepted by the biometric system as a true sample.In biometric-based authentication, a legitimate user does not need to remember or carry anything and it is known to be more reliable than traditional authentication schemes. However, the security of biometric systems can be undermined in a number of ways. For instance, a biometric template can be replaced by an impostor’s template in a system database or it might be stolen and replayed. Consequently, the impostor could gain unauthorized access to a place or a system. Moreover, it has been shown that it is possible to create a physical spoof starting from standard biometric templates. Hence, securing the biometric templates is vital to maintain security and integrity of biometric systems.This report actually gives an overview of what is biometric system and a detail overview of a particular system i.e. iris recognition system.|
|Unique Paper ID: 148086|
Publication Volume & Issue: Volume 5, Issue 12
Page(s): 305 - 309
|Article Preview & Download|
Enhanced PAD Neural Based Approach for Forgery Det...
Paper ID : IJIRT148940
A Comparative Study on Various Dairy Co-operative ...
Paper ID : IJIRT148939
ENHANCED DISTRIBUTED ENERGY EFFICIENT CLUSTERING P...
Paper ID : IJIRT148938
A Photovoltaic Modeling module with different Conv...
Paper ID : IJIRT148936
A Partial Replacement of Ceramic Tiles Waste in Co...
Paper ID : IJIRT148935