250 research outputs found
Design of an embedded iris recognition system for use with a multi-factor authentication system.
This paper describes in detail the design, manufacturing and testing of an embedded iris scanner for use with a multifactor authentication system. The design process for this project included hardware design from part selection to board design to populating. Additionally, this process included the entirety of the software development, though the iris recognition process was largely based on other works. The functional requirements for the overall multi-factor authentication system were to have three authentication methods with a thirty second window to complete all three. The system acceptance accuracy was required to be greater than 75%. Those requirements therefore dictate that the iris scanner module must also have an acceptance accuracy higher than 75% and perform iris recognition in a few seconds so that the user can gain admittance in the allotted window of time. While the hardware has been verified and tested, further development and testing is necessary on the software and image processing. This work is funded by the Department of Energy’s Kansas City National Security Campus, operated by Honeywell Federal Manufacturing & Technologies, LLC under contract number DE-NA0002839
Development of CUiris: A Dark-Skinned African Iris Dataset for Enhancement of Image Analysis and Robust Personal Recognition
Iris recognition algorithms, especially with the
emergence of large-scale iris-based identification systems, must
be tested for speed and accuracy and evaluated with a wide
range of templates – large size, long-range, visible and different
origins. This paper presents the acquisition of eye-iris images
of dark-skinned subjects in Africa, a predominant case of verydark-
brown iris images, under near-infrared illumination. The
peculiarity of these iris images is highlighted from the
histogram and normal probability distribution of their
grayscale image entropy (GiE) values, in comparison to Asian
and Caucasian iris images. The acquisition of eye-images for
the African iris dataset is ongoing and will be made publiclyavailable
as soon as it is sufficiently populated
Biometric Security: Are Inexpensive Biometric Devices Reliable Enough to Gain Wide-Spread Security Usage?
The ever growing need for security in today\u27 s world requires exploring the feasibility of various security methods to ensure the safety of the world\u27s population. With the tremendous growth of technology, e-commerce, and business globalization, society implements new methods to try to battle security problems. Technology advances has resulted in a number of inexpensive biometric devices to the marketplace. Two questions surface regarding this devices-are they reliable enough for general usage and will people be willing to use them? This research conducted a repeated design experiment to determine the effectiveness of four inexpensive biometric devices-three fingerprint readers and an iris scanner. Further, a questionnaire was designed to gain insights to the views of subjects using these biometric devices. On average, all the devices performed well for identification purposes-the fingerprint readers performing better than the iris scanner. The questionnaire revealed that most people prefer fingerprint readers over that of iris scanners and that although 60% of the people surveyed had heard of biometrics, only 21% of those surveyed had ever used a biometric device. The public does not feel that these devices provide complete security, but does provide a reliable means for identification
A Review Paper on Biometric Recognition using Iris Scanner
The main purpose of the paper is assembling and developing an iris recognition system in order to verify uniqueness of the human eye of faculty in a college for attendance management system. This system based on biometrics and wireless technique solves the problem of spurious attendance and the trouble of laying the corresponding network. Here biometric recognition is performed with respect to iris because of its unique biological properties. The iris is unaffected by external environmental factors and remains stable over time. It can make the college staff attendance management more easy and effective. This paper includes image acquisition, the preprocessing system, segmentation, feature extraction and recognition
Leveraging the Grid to Provide a Global Platform for Ubiquitous Computing Research
The requirement for distributed systems support for Ubicomp has led to the development of numerous platforms, each addressing a subset of the overall requirements of ubiquitous systems. In contrast, many other scientific disciplines have embraced the vision of a global distributed computing platform, i.e. the Grid. We believe that the Grid has the potential to evolve into an ideal platform for building ubiquitous computing applications. In this paper we explore in detail the areas of synergy between Grid computing and ubiquitous computing and highlight a series of research challenges in this space
Thermal analysis of lithium ion battery-equipped smartphone explosions
Thermal management of mobile electronics has been carried out because performance of the application processor has increased and power dissipation in miniaturized devices is proportional to its functionalities. There have been various studies on thermal analyses related to mobile electronics with the objectives of improving analysis methodologies and cooling strategies to guarantee device safety. Despite these efforts, failure to control thermal energy, especially in smartphones, has resulted in explosions, because thermal behaviors in the device under various operating conditions have not been sufficiently conducted. Therefore, several scenarios that caused the failure in thermal management of smartphone was analyzed to provide improved insight into thermal design deducing the parameters, that affect the thermal management of device. Overcurrent in battery due to malfunction of battery management system or immoderate addition of functionalities to the application processor are considered as reliable causes leading to the recent thermal runaways and explosions. From the analyses, it was also confirmed that the heat generation of the battery, which have not been considered importantly in previous literature, has significant effect on thermal management, and heat spreading could be suppressed according to arrangement of AP and battery. The heat pipe, which is utilized as a cooling device in mobile electronics, was also included in the thermal analyses. Although the heat pipes have been expected to improve the thermal management in mobile electronics, it showed limited heat transfer capacity due to its operating conditions and miniaturization. The demonstrated results of our analysis warn against vulnerabilities of smartphones in terms of safety in design
IOT based Security System for Auto Identifying Unlawful Activities using Biometric and Aadhar Card
In today’s era, where thefts are consecutively increasing, especially in banks, jewelry shops, stores, ATMs, etc, there is a need to either develop a new system or to improve the existing system, due to which the security in these areas can be enhanced. However, the traditional methods (CCTV cameras, alarm buttons) to handle the security issues in these areas are still available, but they have lots of limitations and drawbacks. So, in order to handle the security issues, this paper describes how the biometric and IoT (Internet of Things) techniques can greatly improve the existing traditional security system. Our proposed system uses biometric authentication using the fingerprint and iris pattern with the strength of IoT sensors, microcontroller and UIDAI aadhar server to enhance the security model and to cut the need of keeping extra employees in monitoring the security system
Comparative Analysis of Iris Segmentation and Iris Feature Extraction Techniques
Iris recognition is identification and verification of an individual based on their respective unique iris patterns. This system is preferred because it is stable: Iris of an individual does not change by the passing of time; Unique: Each person has a different Iris pattern; Flexible: it can easily be incorporated into security systems; Reliable: No theft because people can�t create an iris of another person;In our survey project the processes of Iris segmentation and Feature Extraction have been studied in depth.In this survey paper the various techniques that are used in Iris segmentation and Feature extraction processes are compared and analysed and a conclusion is drawn from them
Archaeology of the Moving Image (Volume 1, Summer 2022)
A compilation of postgraduate student research projects written between 2017 and 2021 for a module titled Archaeology of the Moving Image in the Department of Media, Communications and Cultural Studies at Goldsmiths, University of London. Archaeology of the Moving Image is a course that encourages students to undertake independent investigations of the relationship between the past, present and future of moving image culture
Recommended from our members
A schema for cryptographic keys generation using hybrid biometrics
Biometric identifiers refer to unique physical properties or behavioural attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly or indirectly, we implicitly use biometrics to know, distinguish and trust people. Biometric identifiers represent the concept of "who a person is" by gathering vital characteristics that don't correspond to any other person. The human brain to some extent is able to ascertain disparities or variation in certain physical attributes and yet verify the authenticity of a person. But this is difficult to be implemented in electronic systems due to the intense requirements of artificial decision making and hard-coded logic.
This paper examines the possibility of using a combination of biometric attributes to overcome common problems in having a single biometric scheme for authentication. It also investigates possible schemes and features to deal with variations in Biometric attributes. The material presented is related to ongoing research by the Computer Communications Research Group at Leeds Metropolitan University. We use this paper as a starting step and as a plan for advanced research. It offers ideas and proposition for implementing hybrid biometrics in conjunction with cryptography. This is work in progress and is in a very preliminary stage
- …