Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
75
5
exiStiNg methodS for
localizatioN of exterNal
aNd iNterNal edgeS of
the iriS of the eye
is chapter aims to present the different existing methods used
for the localization of external and internal edges of the iris of
the left or right eye. We will detail five simulations of these
methods. A comparative analysis and an evaluation of the results
of these simulations are presented in the Section 5.3. After ana-
lyzing these results, we will propose in Chapter 7 of Part 3 a new
model that is more efficient at the level of processing time.
5.1 Introduction
As we detailed in Chapter 2, John Daugman was the first to propose
the method of recognition based on the iris of the eye. He used the
integrodifferential operator to locate the external and interna ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147