2017
DOI: 10.1155/2017/1281020
|View full text |Cite
|
Sign up to set email alerts
|

An Accurate and Efficient User Authentication Mechanism on Smart Glasses Based on Iris Recognition

Abstract: In modern society, mobile devices (such as smart phones and wearable devices) have become indispensable to almost everyone, and people store personal data in devices. Therefore, how to implement user authentication mechanism for private data protection on mobile devices is a very important issue. In this paper, an intelligent iris recognition mechanism is designed to solve the problem of user authentication in wearable smart glasses. Our contributions include hardware and software. On the hardware side, we des… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(22 citation statements)
references
References 29 publications
0
21
0
Order By: Relevance
“…e limbus boundary was estimated after the pupillary region, and its boundary was located. e enhanced version of MIGREP [9] was applied for estimating the coarse limbus boundary. Its required work was to design a few radially emitting paths that went outward from the pupillary center.…”
Section: Pupillary Boundary Estimationmentioning
confidence: 99%
See 2 more Smart Citations
“…e limbus boundary was estimated after the pupillary region, and its boundary was located. e enhanced version of MIGREP [9] was applied for estimating the coarse limbus boundary. Its required work was to design a few radially emitting paths that went outward from the pupillary center.…”
Section: Pupillary Boundary Estimationmentioning
confidence: 99%
“…e other was defined as s 2 and represented the distance from the pupillary center to the end points of the emitting paths. In [9], these two parameters were predefined and cannot adapt to various input images during runtime. In this work, (s 1 , s 2 ) were dynamically adjusted according to the size of the bounding box found by Faster R-CNN.…”
Section: Pupillary Boundary Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in Figure 6, the retweet scale prediction equation is defined as (5). Equation (5) includes three parts.…”
Section: Linear Model Based On Key Usersmentioning
confidence: 99%
“…A mass of research [1][2][3][4][5] focuses on passwords mechanism and other authentication mechanisms for user authentication in various computer systems. But recently, with the rapid development of microblogging, the scale of users is becoming larger and larger.…”
Section: Introductionmentioning
confidence: 99%