Iris Detection for Personal Authentication Using Back Propagation

  • Unique Paper ID: 144427
  • PageNo: 218-219
  • Abstract:
  • In our day to day life, one of the main threats that the security environment can have, is the possibility of intruders in the system. This is normally solved by user authentication schemes based on passwords, secret codes and identification cards or tokens. Schemes based only on passwords or secret codes can be cracked by intercepting the presentation of such a password or by brute force attacks. On the other hand, an intruder can attack systems based on identification card or token by robbing, copying or simulating them. As it is a well-known, biometric deal with identification of individuals based on their physical and behavioral features. Today iris recognition is treated as the most accurate manner of personal identification. Therefore nowadays many automatic security systems based on iris recognition have been deployed worldwide for border control, restricted access and so on. The research shows the iris detection using back propagation algorithm.
add_icon3email to a friend

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144427,
        author = {Sukanya.S and Dr. Kavitha Jaba Malar},
        title = {Iris Detection for Personal Authentication Using Back Propagation},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {11},
        pages = {218-219},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144427},
        abstract = {In our day to day life, one of the main threats that the security environment can have, is the possibility of intruders in the system. This is normally solved by user authentication schemes based on passwords, secret codes and identification cards or tokens. Schemes based only on passwords or secret codes can be cracked by intercepting the presentation of such a password or by brute force attacks. On the other hand, an intruder can attack systems based on identification card or token by robbing, copying or simulating them. As it is a well-known, biometric deal with identification of individuals based on their physical and behavioral features. Today iris recognition is treated as the most accurate manner of personal identification. Therefore nowadays many automatic security systems based on iris recognition have been deployed worldwide for border control, restricted access and so on. The research shows the iris detection using back propagation algorithm.},
        keywords = {Authentication, Biometrics, Iris, Recognition},
        month = {},
        }

Cite This Article

Sukanya.S, , & Malar, D. K. J. (). Iris Detection for Personal Authentication Using Back Propagation. International Journal of Innovative Research in Technology (IJIRT), 3(11), 218–219.

Related Articles