Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
31
BIometrIC systems
similarity is calculated by the cosine of the angle between their vec-
tors, on the Euclidean distance. In other words, if the cosine is zero,
then the images are totally dissimilar.
2.5.6 Effect of the Eyebrows and Upper and Lower Eyelids
e eyelids and eyebrows hide a part of the iris. is affects the per-
formance of the authentication process.
To overcome these problems, Daugman (2004) and Wildes (1997)
modeled the upper and lower eyelids with parabolic arcs. Miyazawa
et al. (2005) and Daouk et al. (2002) have used only the lower part of
the iris for authentication. is method has proven an effectiveness of
100% at the level of verification (Daouk et al. 2002). Tian et al. (2006)
adopted the linear Hough transform. ey used ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147