IEEE Spectrum
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Usability and biometric verification at the ATM interface
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project
DCW '00 Proceedings of the Third International Workshop on Distributed Communities on the Web
Biometric identification systems
Signal Processing
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
A Biometric Identification System Based on Eigenpalm and Eigenfinger Features
IEEE Transactions on Pattern Analysis and Machine Intelligence
The case for transient authentication
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Protecting file systems with transient authentication
Wireless Networks
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Human hand recognition using IPCA-ICA algorithm
EURASIP Journal on Applied Signal Processing
Image understanding for iris biometrics: A survey
Computer Vision and Image Understanding
DLDA-based iris recognition from image sequences with various focus information
MUSP'07 Proceedings of the 7th WSEAS International Conference on Multimedia Systems & Signal Processing
Efficient iris recognition scheme based on difference of filters
WSEAS Transactions on Computer Research
Degradation of iris recognition performance due to non-cosmetic prescription contact lenses
Computer Vision and Image Understanding
Optimal sampling for feature extraction in iris recognition systems
MICAI'06 Proceedings of the 5th Mexican international conference on Artificial Intelligence
An application of random and hammersley sampling methods to iris recognition
IEA/AIE'06 Proceedings of the 19th international conference on Advances in Applied Artificial Intelligence: industrial, Engineering and Other Applications of Applied Intelligent Systems
Biometric-Iris random key generator using generalized regression neural networks
IEA/AIE'06 Proceedings of the 19th international conference on Advances in Applied Artificial Intelligence: industrial, Engineering and Other Applications of Applied Intelligent Systems
Feature characterization in iris recognition with stochastic autoregressive models
IBERAMIA-SBIA'06 Proceedings of the 2nd international joint conference, and Proceedings of the 10th Ibero-American Conference on AI 18th Brazilian conference on Advances in Artificial Intelligence
Multifocus image sequences for iris recognition
PSIVT'06 Proceedings of the First Pacific Rim conference on Advances in Image and Video Technology
Improving iris recognition through new target vectors in MLP artificial neural networks
ANNPR'12 Proceedings of the 5th INNS IAPR TC 3 GIRPR conference on Artificial Neural Networks in Pattern Recognition
A review of information fusion techniques employed in iris recognition systems
International Journal of Advanced Intelligence Paradigms
Hi-index | 4.10 |
Much work in the emerging field of biometrics has focused on identification applications. Biometrics offers the means to identify individuals without requiring that they carry ID cards and badges or memorize passwords. A leading concern in the development of such applications, however, is how to avoid rejecting valid users or approving impostors. The iris of the eye may provide a solution by offering a much more discriminating biometric than fingerprint or face recognition. The authors have designed and implemented an iris biometric system for personal electronic identification. Further, their system solves problems associated with public-use devices such as automated teller machines, where habituated use is not the norm. The system also addresses personal- use arenas, such as home banking, and other Internet and network applications, such as secure business logons. The article describes the public- and personal-use systems, as well as relating statistical analysis and field trials to gauge the effectiveness of their system.