Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Location of the Pupil-Iris Border in Slit-Lamp Images of the Cornea
ICIAP '99 Proceedings of the 10th International Conference on Image Analysis and Processing
Key Techniques and Methods for Imaging Iris in Focus
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
Image understanding for iris biometrics: A survey
Computer Vision and Image Understanding
A human identification technique using images of the iris andwavelet transform
IEEE Transactions on Signal Processing
On Generation and Analysis of Synthetic Iris Images
IEEE Transactions on Information Forensics and Security
A real-time focusing algorithm for iris recognition camera
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
New Methods in Iris Recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Efficient iris recognition by characterizing key local variations
IEEE Transactions on Image Processing
A review of advances in iris image acquisition system
CCBR'12 Proceedings of the 7th Chinese conference on Biometric Recognition
Hi-index | 0.00 |
In many applications user authentication has to be carried out by portable devices. Usually these devices are personal tokens carried by users, which have many constraints regarding their computational performance, occupied area, and power consumption. These kinds of devices must deal with such constraints, while also maintaining high performance rates in the authentication process. This paper provides solutions to designing such personal tokens where biometric authentication is required. In this paper, iris biometrics have been chosen to be implemented due to the low error rates and the robustness their algorithms provide. Several design alternatives are presented, and their analyses are reported.With these results, most of the needs required for the development of an innovative identification product are covered. Results indicate that the architectures proposed herein are faster (up to 20 times), and are capable of obtaining error rates equivalent to those based on computer solutions. Simultaneously, the security and cost for large quantities are also improved.