2017 International Conference on Computational Science and Computational Intelligence (CSCI) 2017
DOI: 10.1109/csci.2017.102
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of an Iris Biometric Door Access Control System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…Currently, many studies have proposed solutions to these issues, which are as follows:  Using hardware for authentication: This method involves using a keypad together with sensors and smartphones to form a digital door lock system [1], creating a password from a computer or a smartphone and having a user enter digits using the keypad [2], using a wearable device, such as a smartwatch deploying an android application, for identity verification [3], and using RFID for authentication and access control [4].  Using biometrics for authentication: This method includes developing equipment to unlock a door by using a fingerprint scanner for authentication [5][6], the development of a facial recognition system for authentication when accessing a building, where the system can send a notification to a smartphone when an intruder tries to enter a building [7][8] or use an image classification technique for a smart door closer system [9], and using an iris biometric to control access [10].  Using distance for authentication: This system detects the distance between the user and the device to confirm access.…”
Section: Related Studies On Residential Access Controlmentioning
confidence: 99%
“…Currently, many studies have proposed solutions to these issues, which are as follows:  Using hardware for authentication: This method involves using a keypad together with sensors and smartphones to form a digital door lock system [1], creating a password from a computer or a smartphone and having a user enter digits using the keypad [2], using a wearable device, such as a smartwatch deploying an android application, for identity verification [3], and using RFID for authentication and access control [4].  Using biometrics for authentication: This method includes developing equipment to unlock a door by using a fingerprint scanner for authentication [5][6], the development of a facial recognition system for authentication when accessing a building, where the system can send a notification to a smartphone when an intruder tries to enter a building [7][8] or use an image classification technique for a smart door closer system [9], and using an iris biometric to control access [10].  Using distance for authentication: This system detects the distance between the user and the device to confirm access.…”
Section: Related Studies On Residential Access Controlmentioning
confidence: 99%
“…The paper in [8] details the design of a door access system which makes use of the iris biometric technique. The system makes use of an Arduino Uno and an iris scanner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Although, most Nigerian organisations are ill-equipped to mitigate malware threats, studies have shown that organisations cannot effectively mitigate botnet in isolation [5]. Both private and public organisations collaborate to fight botnet but the individuals and corporate entities in the private sector still remains the biggest victim of cybercrime [23][24][25]. Towards fighting against all forms of financial and cyber-crimes therefore EFCC was setup and empowered by Nigerian government to work hand in hand with the cybercrime Prevention Working Group to combat financial crimes.…”
Section: Best Practices and Incentivesmentioning
confidence: 99%