SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Creating New Era of Latest technology
https://dailytechnologyblog.weebly.com/
Privacy and Security being the major concern now-a-days, Recognition Technique could find a
variety of applications. Such applications could be: Biometric authentication, Security and many
more. Some factors possibly lead to flaws in authentication. While processing authentication,
various parameters are to be considered, such as sufficient lighting when image is being captured,
proper posture of the person, image superiority and various other. The adequate examination and
experimentation of all the above mentioned parameters could produce acceptable and desirable
results. The technique of Pre-processing (processing of data for having its comparison prior to its
transmission to the database) could provide an enhanced probability of acquiring the correct
matches .
Every individual have uniqueness in their appearance, face or certain body characteristics
minimizing the chances of duplicity in biometric system. This makes biometric recognition or
biometric systems as most widespread and highly reliable technique for providing highest
security. Digital representation of the data of an individual provides uniqueness to the individual,
biometric sensors employ these digital data to check authenticity of the user or the authorized
person. Examples of such sensors are: fingerprint sensor, digital camera for face extract, etc
https://dailytechnologyblog.weebly.com/
Types of Biometric Authentication Systems
Biometric being considered the most acceptable, secure, and dependable system has
captured a wide range of applications. Various biometric authentication techniques are:
1. Face recognition
2. Iris Recognition
3. Fingerprints recognition
4. Palm recognition
5. Face Recognition
Iris Recognition
Iris is the ring-shaped region in the human eye that inscribes the pupil of an eye. Iris
recognition technique employs the detection and comparison of the unique patterns of
iris for every individual. It is designated as the fastest and most efficient technique that
is capable of producing intended results in the least duration of time.
Face recognition
Face recognition technique is rising to be the most acceptable and secure field in
biometric authentication. It is employed in surveillance systems since it has the caliber
to successfully execute its algorithm without object comparison. The most advantageous
aspect of this technique as compared to other similar systems is individuality and
attainability.
https://dailytechnologyblog.weebly.com/
Palm Recognition
Palm recognition or Palm print recognition could be considered as an optimistic and
assuring technique that employs palm characteristics for the identification and
recognition of a person. The characteristics employed in fulfillment of recognition
criteria are lines of a palm, wrinkles, and ridges on a hand, etc., where wrinkles of
palm are identified as being thinner than the primary lines.
Fingerprint Recognition
When government organizations and agencies are taken into account, they demand
high security; this requirement could be easily fulfilled using biometric systems,
specifically by the fingerprint recognition technique. Every individual has a unique
and distinguishable
print of fingers
https://dailytechnologyblog.weebly.com/
Preprocessing the images using the median filter
A biometric system is designed to follow certain biometric recognition algorithms,
defined specifically for each different mechanism. While processing authentication,
various parameters are to be considered, such as sufficient lighting when the image is
being captured, proper posture of the person, image superiority, and various others.
Each biometric system employs several modes or processes to authorize, these are
feature extraction, sensing, and matching modules. The filtration mechanism is applied
to pre-process the input image of the iris.
The pre-processing of the input image is done
to remove the noisy content from it. This is
achieved by applying the collaboration of
median filters. After filtration, the feature
from the processed image is extracted by using
the LBP-LDA technique. After extracting the features, the Artificial Neural Network
is used to perform pattern matching. For purpose of performance evaluation, the
proposed iris recognition is implemented in MATLAB.
https://dailytechnologyblog.weebly.com/
Application
1. Surveillance
2. Logical Access Control
3. Physical Access Control
4. Time and Attendance
5. Law Enforcement
6. Border and airport control
7. Secured transaction banking and financial institutions
Final words
Security has become the main issue in today’s world. Various security and
authentication methods or techniques are applied to secure the iris template. The
proposed feature extraction and pattern recognition techniques on the preprocessed
image so that the security and reliability of the system could be raised.
https://dailytechnologyblog.weebly.com/
Contact Us
About Us
Address: 333-334, Second Floor, Himalaya
Marg, Sub. City Center, Sector 35 -B,
Chandigarh, 160035 India.
Email: careers@klevvrtechcar.com
Phone: 0172 400 7083, +91-7717427009
Dailylatestblog delivers the
finest information about Latest
Technology Gadgets. Electronics Gadgets
are playing a vital role in our daily life
activities. Gadgets help us to stay
connected with one another by providing
access to email, SMS, phone services,
video call, and social media. We can easily
use them to make new connections, in the
real world. According to the needs of
human beings to make life easier
technological up-gradation is very
important.
Social Media Platform
facebook Instagram
Twitter
https://dailytechnologyblog.weebly.com/

Weitere ähnliche Inhalte

Was ist angesagt?

A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces StudsPlanet.com
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection SystemIntrader Amit
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKTITHI DAN
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification SystemIRJET Journal
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognitionIRJET Journal
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningSunil Aryal
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learningReallykul Kuul
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...sadique_ghitm
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsIOSR Journals
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewTkeyah Anderson
 
IRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face DetectionIRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face DetectionIRJET Journal
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
 

Was ist angesagt? (19)

A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Face detection
Face detectionFace detection
Face detection
 
D1061825
D1061825D1061825
D1061825
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep Learning
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
Face recognition
Face recognition Face recognition
Face recognition
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical Review
 
IRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face DetectionIRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face Detection
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 

Ähnlich wie AI Approach for Iris Biometric Recognition Using a Median Filter

A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.YuvrajGanguly2
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
Face detection & recognition
Face detection & recognitionFace detection & recognition
Face detection & recognitionMadhuri Negi
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Harikrishna Patel
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodIRJET Journal
 

Ähnlich wie AI Approach for Iris Biometric Recognition Using a Median Filter (20)

A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Face detection & recognition
Face detection & recognitionFace detection & recognition
Face detection & recognition
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

AI Approach for Iris Biometric Recognition Using a Median Filter

  • 1. Creating New Era of Latest technology https://dailytechnologyblog.weebly.com/
  • 2. Privacy and Security being the major concern now-a-days, Recognition Technique could find a variety of applications. Such applications could be: Biometric authentication, Security and many more. Some factors possibly lead to flaws in authentication. While processing authentication, various parameters are to be considered, such as sufficient lighting when image is being captured, proper posture of the person, image superiority and various other. The adequate examination and experimentation of all the above mentioned parameters could produce acceptable and desirable results. The technique of Pre-processing (processing of data for having its comparison prior to its transmission to the database) could provide an enhanced probability of acquiring the correct matches . Every individual have uniqueness in their appearance, face or certain body characteristics minimizing the chances of duplicity in biometric system. This makes biometric recognition or biometric systems as most widespread and highly reliable technique for providing highest security. Digital representation of the data of an individual provides uniqueness to the individual, biometric sensors employ these digital data to check authenticity of the user or the authorized person. Examples of such sensors are: fingerprint sensor, digital camera for face extract, etc https://dailytechnologyblog.weebly.com/
  • 3. Types of Biometric Authentication Systems Biometric being considered the most acceptable, secure, and dependable system has captured a wide range of applications. Various biometric authentication techniques are: 1. Face recognition 2. Iris Recognition 3. Fingerprints recognition 4. Palm recognition 5. Face Recognition Iris Recognition Iris is the ring-shaped region in the human eye that inscribes the pupil of an eye. Iris recognition technique employs the detection and comparison of the unique patterns of iris for every individual. It is designated as the fastest and most efficient technique that is capable of producing intended results in the least duration of time. Face recognition Face recognition technique is rising to be the most acceptable and secure field in biometric authentication. It is employed in surveillance systems since it has the caliber to successfully execute its algorithm without object comparison. The most advantageous aspect of this technique as compared to other similar systems is individuality and attainability. https://dailytechnologyblog.weebly.com/
  • 4. Palm Recognition Palm recognition or Palm print recognition could be considered as an optimistic and assuring technique that employs palm characteristics for the identification and recognition of a person. The characteristics employed in fulfillment of recognition criteria are lines of a palm, wrinkles, and ridges on a hand, etc., where wrinkles of palm are identified as being thinner than the primary lines. Fingerprint Recognition When government organizations and agencies are taken into account, they demand high security; this requirement could be easily fulfilled using biometric systems, specifically by the fingerprint recognition technique. Every individual has a unique and distinguishable print of fingers https://dailytechnologyblog.weebly.com/
  • 5. Preprocessing the images using the median filter A biometric system is designed to follow certain biometric recognition algorithms, defined specifically for each different mechanism. While processing authentication, various parameters are to be considered, such as sufficient lighting when the image is being captured, proper posture of the person, image superiority, and various others. Each biometric system employs several modes or processes to authorize, these are feature extraction, sensing, and matching modules. The filtration mechanism is applied to pre-process the input image of the iris. The pre-processing of the input image is done to remove the noisy content from it. This is achieved by applying the collaboration of median filters. After filtration, the feature from the processed image is extracted by using the LBP-LDA technique. After extracting the features, the Artificial Neural Network is used to perform pattern matching. For purpose of performance evaluation, the proposed iris recognition is implemented in MATLAB. https://dailytechnologyblog.weebly.com/
  • 6. Application 1. Surveillance 2. Logical Access Control 3. Physical Access Control 4. Time and Attendance 5. Law Enforcement 6. Border and airport control 7. Secured transaction banking and financial institutions Final words Security has become the main issue in today’s world. Various security and authentication methods or techniques are applied to secure the iris template. The proposed feature extraction and pattern recognition techniques on the preprocessed image so that the security and reliability of the system could be raised. https://dailytechnologyblog.weebly.com/
  • 7. Contact Us About Us Address: 333-334, Second Floor, Himalaya Marg, Sub. City Center, Sector 35 -B, Chandigarh, 160035 India. Email: careers@klevvrtechcar.com Phone: 0172 400 7083, +91-7717427009 Dailylatestblog delivers the finest information about Latest Technology Gadgets. Electronics Gadgets are playing a vital role in our daily life activities. Gadgets help us to stay connected with one another by providing access to email, SMS, phone services, video call, and social media. We can easily use them to make new connections, in the real world. According to the needs of human beings to make life easier technological up-gradation is very important. Social Media Platform facebook Instagram Twitter https://dailytechnologyblog.weebly.com/