Abstract:
This paper gives a window browsing of the iris technology, its application areas and the spoofing attacks suggested so far from its initiation. Iris recognition and ident...Show MoreMetadata
Abstract:
This paper gives a window browsing of the iris technology, its application areas and the spoofing attacks suggested so far from its initiation. Iris recognition and identification algorithms used various patterns and mathematical models to identify humans for various applications i.e., IoT, POS (Point of Sale), passport, health care digital transformation, child trafficking, liveness detection. This paper gives scope to a comparative survey of the literature of different authors who worked on different acquisition methods, localization and normalization methods, and different spoofing attacks presented and registered in the analysis.
Published in: 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)
Date of Conference: 10-11 December 2021
Date Added to IEEE Xplore: 18 January 2022
ISBN Information: