IRIS based Recognition and Spoofing Attacks: A Review | IEEE Conference Publication | IEEE Xplore

IRIS based Recognition and Spoofing Attacks: A Review


Abstract:

This paper gives a window browsing of the iris technology, its application areas and the spoofing attacks suggested so far from its initiation. Iris recognition and ident...Show More

Abstract:

This paper gives a window browsing of the iris technology, its application areas and the spoofing attacks suggested so far from its initiation. Iris recognition and identification algorithms used various patterns and mathematical models to identify humans for various applications i.e., IoT, POS (Point of Sale), passport, health care digital transformation, child trafficking, liveness detection. This paper gives scope to a comparative survey of the literature of different authors who worked on different acquisition methods, localization and normalization methods, and different spoofing attacks presented and registered in the analysis.
Date of Conference: 10-11 December 2021
Date Added to IEEE Xplore: 18 January 2022
ISBN Information:

ISSN Information:

Conference Location: MORADABAD, India

Contact IEEE to Subscribe

References

References is not available for this document.