Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
91
6
exiStiNg methodS
forelimiNatiNg effectS
of the eyelidS
In this chapter we propose to present the existing methods used
for the elimination of the effects of upper and lower eyelids that
can hide a part of the iris of the eye. We will detail three simula-
tions of these methods. Based on these approaches, in Chapter 7
we will present our most effective method for such treatments.
6.1 Introduction
Normalization is an important phase in the process of authentication.
In addition to the functions detailed in previous chapters (cf.Chapter 2,
Section 2.5.3), this phase leads to eliminating the effects of upper and
lower eyelids. Several researchers have proposed various methods to
solve these problems (cf. Chapter 2, Section 2.5.6). We present th ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147