Sciweavers

256 search results - page 3 / 52
» How iris recognition works
Sort
View
CSE
2009
IEEE
14 years 5 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
SIGGRAPH
1994
ACM
14 years 2 months ago
IRIS performer: a high performance multiprocessing toolkit for real-time 3D graphics
This paper describes the design and implementation of IRIS Performer, a toolkit for visual simulation, virtual reality, and other real-time 3D graphics applications. The principal...
John Rohlf, James Helman
ICB
2009
Springer
107views Biometrics» more  ICB 2009»
14 years 5 months ago
Enhancement and Registration Schemes for Matching Conjunctival Vasculature
Ocular biometrics has made significant strides over the past decade primarily due to the rapid advances in iris recognition. Recent literature has investigated the possibility of ...
Simona Crihalmeanu, Arun Ross, Reza Derakhshani
ICPIA
1992
14 years 2 months ago
Intelligent Pattern Recognition and Applications
:: This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and ...
Patrick Shen-Pei Wang
TIFS
2008
129views more  TIFS 2008»
13 years 10 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo