|Jithin A Manjaly , Nithin A.K , Praveen Wilson , Ronald Pallan|
|Cite This Article:|
Iris Recognition, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 12 ,Page(s):305-309 ,May 2019 ,Available :IJIRT148086_PAPER.pdf
|Humans recognize each other according to their various characteristics for ages. We recognize others by their face when we meet them and by their voice as we speak to them. Identity verification (authentication) in computer systems has been traditionally based on something that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or disclosed.To achieve more reliable verification or identification we should use something that really characterizes the given person. Biometrics offer automated methods of identity verification or identification on the principle of measurable physiological or behavioral characteristics such as a fingerprint or a voice sample. The characteristics are measurable and unique. These characteristics should not be duplicable, but it is unfortunately often possible to create a copy that is accepted by the biometric system as a true sample.In biometric-based authentication, a legitimate user does not need to remember or carry anything and it is known to be more reliable than traditional authentication schemes. However, the security of biometric systems can be undermined in a number of ways. For instance, a biometric template can be replaced by an impostor’s template in a system database or it might be stolen and replayed. Consequently, the impostor could gain unauthorized access to a place or a system. Moreover, it has been shown that it is possible to create a physical spoof starting from standard biometric templates. Hence, securing the biometric templates is vital to maintain security and integrity of biometric systems.This report actually gives an overview of what is biometric system and a detail overview of a particular system i.e. iris recognition system.|
|Unique Paper ID: 148086|
Publication Volume & Issue: Volume 5, Issue 12
Page(s): 305 - 309
|Article Preview & Download|
Experimental Study on Lightweight Fly Ash Aggregat...
Paper ID : IJIRT148696
CFD ANALYSIS ON WASTE HEAT RECOVERY UTILIZING THER...
Paper ID : IJIRT148692
AN INTRODUCTION TO SPHERICAL FUZZY TOPOLOGICAL SPA...
Paper ID : IJIRT148683
Auto secure: A Device with Emotion Detection Enabl...
Paper ID : IJIRT148682
A REVIEW: STRUCTURAL OPTIMIZATION OF RAILWAY SLEEP...
Paper ID : IJIRT148681