2011
DOI: 10.5120/2250-2883
|View full text |Cite
|
Sign up to set email alerts
|

Extract and Classification of Iris Images by Fractal Dimension and Efficient Color of Iris

Abstract: In the last decade, identification by biometric features such as iris and fingerprint has been considered very much. Last introduced methods, in fact, could achieve high accuracy, but one of the most common problems in these methods is the lack of scalability. So these methods are suitable for use in small databases of iris. One solution for this problem is using the hierarchy classification. In this paper, fractal dimension of iris and effective range of color in RGB layers are used as first and second layers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 19 publications
(15 reference statements)
0
2
0
Order By: Relevance
“…Fractals such as the contour set, snowflake or Sierpinski triangle have simple construction rules. There are many such fractals in nature, such as the fingerprint and iris [25]; both of these are considered to be the most important biometric features. As mentioned before, no construction rule is presented for any of these fractal phenomena.…”
Section: Resultsmentioning
confidence: 99%
“…Fractals such as the contour set, snowflake or Sierpinski triangle have simple construction rules. There are many such fractals in nature, such as the fingerprint and iris [25]; both of these are considered to be the most important biometric features. As mentioned before, no construction rule is presented for any of these fractal phenomena.…”
Section: Resultsmentioning
confidence: 99%
“…To protect text against external attacks we can use authentication, authorization and access control techniques such as username and password, smart identification card or biometric identification methods [10]. Of course, each of these techniques has special strengths and weaknesses.…”
Section: Text Protectionmentioning
confidence: 99%