2022
DOI: 10.1117/1.jei.31.5.053036
|View full text |Cite
|
Sign up to set email alerts
|

Performance boosting of image matching-based iris recognition systems using deformable circular hollow kernels and uniform histogram fusion images

Abstract: . Identification of people using different biometric data is becoming more important in network society. Biometrics include voice, ears, palms, fingerprints, faces, iris, retina, and hand shapes. Among these features, iris detection gets more attention because each iris type is unique and does not change throughout life. In this study, an iris recognition framework is proposed using deformable circular hollow kernels and uniform histogram fusion images (UHFIs). This system introduces two different approaches f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…In today's world, where security is becoming more important, personal authentication methods are also updating themselves to close existing security gaps with the developing technology. Although some Biometric Recognition methods, such as fingerprint [1][2][3], palmprint [4,5], retina [6][7][8], iris [8,9], and face recognition [10,11], used for this purpose, are used for tracking, entry-exit access permission control, and security purposes, they have some disadvantages compared to FV recognition. Among them, fingerprint and palmprint recognition systems create a security vulnerability because of unable to control whether the tissue is alive or not, being on the exterior surface of the body, and copied easily.…”
Section: Introductionmentioning
confidence: 99%
“…In today's world, where security is becoming more important, personal authentication methods are also updating themselves to close existing security gaps with the developing technology. Although some Biometric Recognition methods, such as fingerprint [1][2][3], palmprint [4,5], retina [6][7][8], iris [8,9], and face recognition [10,11], used for this purpose, are used for tracking, entry-exit access permission control, and security purposes, they have some disadvantages compared to FV recognition. Among them, fingerprint and palmprint recognition systems create a security vulnerability because of unable to control whether the tissue is alive or not, being on the exterior surface of the body, and copied easily.…”
Section: Introductionmentioning
confidence: 99%
“…Face (identity) recognition and transfer learning are commonly studied fields [48,416]. While identity recognition models such as FaceNet [330],…”
Section: Out Of Scopementioning
confidence: 99%