Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Co
DOI: 10.1109/snpd-sawn.2006.58
|View full text |Cite
|
Sign up to set email alerts
|

Pupil and Iris Localization for Iris Recognition in Mobile Phones

Abstract: Until now, iris recognition has been used in many fields. Recently, there have been attempts to adopt iris recognition technology for the security of mobile phones. For example, in case of bank transaction service by using a mobile phone, using a mobile phone can use high level of security based on iris recognition. In this paper, we propose a new pupil & iris segmentation method apt for the mobile environment. We find the pupil & iris at the same time, using both information of the pupil and iris. And we also… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(10 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…We firstly obtained a low-resolution iris image through an iris camera without a zoom lens, which can decrease the cost and size of the iris recognition system. After increasing the size of the input low-resolution iris image with bilinear interpolation, we detected the iris and pupil region using two circular edge detectors [26] [27]. Next, the parameter of the degradation function was determined according to the zoom factor of the image in terms of recognition accuracy.…”
Section: Overview Of the Methodsmentioning
confidence: 99%
“…We firstly obtained a low-resolution iris image through an iris camera without a zoom lens, which can decrease the cost and size of the iris recognition system. After increasing the size of the input low-resolution iris image with bilinear interpolation, we detected the iris and pupil region using two circular edge detectors [26] [27]. Next, the parameter of the degradation function was determined according to the zoom factor of the image in terms of recognition accuracy.…”
Section: Overview Of the Methodsmentioning
confidence: 99%
“…Many of these systems are all-inclusive systems which include image acquisition, processing, and database hardware in the same device. Examples include the HIDE system used by the Army from L1 systems [11], or systems run on cellular phones and PDA's [12]. • PC-Based Systems -These systems use a PC for their data processing, and typically use add-on or plug-in hardware for image acquisition.…”
Section: Review Of Existing Iris Recognition Systemsmentioning
confidence: 99%
“…In Tao and Veldhuis (2006) and Ijiri et al (2006) people are authenticated by the recognition of their face through the camera of a mobile phone. In ho Cho et al (2006Cho et al ( ) andjeong et al (2005 authentication is provided by means of iris scanning and in Shabeer and Suganthi (2007) the characteristic biometric features are the voice and the fingerprint. Moreover, in Clarke and Furnell (2007) users are recognized by keystroke analysis.…”
Section: Introductionmentioning
confidence: 99%