Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
26
IrIs BIometrIC modeL
2.5 Algorithms for Iris Recognition
e systems of iris recognition are used to extract the biometric char-
acteristics of the iris (i.e., biometric template of the iris or iris bio-
metric signature) “gabarit” (template) for secure access to confidential
data or private locations. ese systems, like other biometric systems,
consist first in enrolling the gabarit in a database of identification.
en they are used to create the gabarit for each person wishing to
access the system. e required gabarit will be compared with other
gabarits stored in the database to validate access.
e process of recognition by the biometric method of the iris is
composed of six phases: acquisition of the image of the iris, manipu-
lation of the ima ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147