The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes iris biometric matching performed using the iris pictures captured by the standard visible spectrum smart phone cameras from the MICHE II database. Our method uses a combination of a popular iris code approach and a periocular biometric based on the Multi-Block Transitional Local Binary Patterns. The authentication scores are calculated separately, and the results are combined...
This paper delivers a new database of iris images collected in visible light using a mobile phone's camera and presents results of experiments involving existing commercial and open-source iris recognition methods, namely: Iri-Core, VeriEye, MIRLIN and OSIRIS. Several important observations are made. First, we manage to show that after simple preprocessing, such images offer good visibility of iris...
Iris and Periocular biometrics has proved its effectiveness in accurately verifying the subject of interest. Recent improvements in visible spectrum Iris and Periocular verification have further boosted its application to unconstrained scenarios. However existing visible Iris verification systems suffer from low quality samples because of the limited depth-of-field exhibited by the conventional Iris...
Liveness detection (often referred to as presentation attack detection) is the ability to detect artificial objects presented to a biometric device with an intention to subvert the recognition system. This paper presents the database of iris printout images with a controlled quality, and its fundamental application, namely development of liveness detection method for iris recognition. The database...
In general, a typical iris recognition system includes iris imaging, iris liveness detection, iris image quality assessment, and iris recognition. This paper presents an algorithm focusing on the last two steps. The novelty of this algorithm includes improving the speed and accuracy of the iris segmentation process, assessing the iris image quality such that only the clear images are accepted so as...
Reliable personal recognition is critical to many government and business processes. Iris recognition technology has been successfully applied to person verification and identification. However, all commercial products require user cooperation for iris image capture. Over the last three years, the community have paid more attention on the process of iris images taken with less user cooperative. In...
Iris recognition is one of the most powerful techniques for biometric identification ever developed. Commercial systems based on the algorithms developed by John Daugman have been available since 1995 and have been used in a variety of practical applications. However, all currently available systems impose substantial constraints on subject position and motion during the recognition process. These...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.