2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) 2018
DOI: 10.1109/icicct.2018.8473300
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Reliable Biometric Verification System Using Iris

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
1
0
Order By: Relevance
“…The parameters of the iris boundaries must be searched for using these two traditional methods across the entire parameter space. In [16], the authors used the watershed transform and circle fitting to locate the outer circle, while the inner circle was found using the Canny edge and fitting circle approach [16]. An iris localization approach for imperfect iris data was put forth in [17].…”
Section: Introductionmentioning
confidence: 99%
“…The parameters of the iris boundaries must be searched for using these two traditional methods across the entire parameter space. In [16], the authors used the watershed transform and circle fitting to locate the outer circle, while the inner circle was found using the Canny edge and fitting circle approach [16]. An iris localization approach for imperfect iris data was put forth in [17].…”
Section: Introductionmentioning
confidence: 99%
“…One approach is using Image processing technique to detect the skimming devices captured through surveillance cameras and does processing. However, this method does not provide adequate solution to security as advanced technologies could be used to manipulate cameras [17][18][19][20]. Additionally, In real time implementations, sophisticated and advanced surveillance cameras needs to be installed to capture clear details of skimming devices which could be cost effective.…”
Section: Introductionmentioning
confidence: 99%