2017
DOI: 10.1109/tifs.2016.2606083
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Generation of Iris Codes for Iris Recognition

Abstract: The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(18 citation statements)
references
References 39 publications
0
18
0
Order By: Relevance
“…Traditionally, these systems recognize an individual using either a token-based method (such as a key or passwords) or biometric methods (that use the individual’s physical characteristics such as the face [7,8], finger-vein [9], fingerprint [10], or iris patterns [11,12] for recognition). Even though biometric features have proven to be more sufficient in recognizing persons in security systems because of biometric patterns’ advantages of being hard to steal and hard to fake [13], these kinds of biometric features require the cooperation of users and a short capturing distance (z-distance) between camera and user during the image acquisition stage.…”
Section: Introductionmentioning
confidence: 99%
“…Traditionally, these systems recognize an individual using either a token-based method (such as a key or passwords) or biometric methods (that use the individual’s physical characteristics such as the face [7,8], finger-vein [9], fingerprint [10], or iris patterns [11,12] for recognition). Even though biometric features have proven to be more sufficient in recognizing persons in security systems because of biometric patterns’ advantages of being hard to steal and hard to fake [13], these kinds of biometric features require the cooperation of users and a short capturing distance (z-distance) between camera and user during the image acquisition stage.…”
Section: Introductionmentioning
confidence: 99%
“…Body structure, inherent weaknesses, and levels of health and transition are uncovered by the iris, as it changes happen in the one's body as the way they live the life. The eyes are the window of the spirit as said in the past and they are the foremost part of our body which is very necessary of view the beauty of the nature [10]. Therefore, it is key window to one's health.…”
Section: Iris Recognitionmentioning
confidence: 99%
“…This method is able to capture different crypts in different locations and able to match topological changes in the detection of the same crypt in different acquisitions. Yang Hu et al, [13] introduced a method to generate optimal iris code for iris recognition. Addition to the binarized code effective iris codes are obtained by adding terms to the objective functions to the optimization problem.…”
Section: Literature Surveymentioning
confidence: 99%
“…. +x O + 1 (13) Where, k is the norm-factor x 1 , x 2 … x n are the sum gradient magnitude of each block. Here X n =36 Figure 8 shows the block normalized histogram of complete image having 105 blocks, so we have total of 3780 normalized value of gradient magnitude.…”
Section: Histogram Of Gradients (Hog)mentioning
confidence: 99%