Literature Survey on an ATM with an Iris Authentication
Abstract
This paper gives an overview about the automatic iris popularity as a biometrically based skill for the non-public identification and verification. The main motivation of this stems from the observation that the human iris provides a unique structure on which to base a technology for non-invasive biological assessment.
Keywords: iris recognition, biometrics, humans, fingerprint recognition, face detection
Cite this Article: Neha Pal. Literature Survey on an ATM with an Iris Authentication. International Journal of Optical Sciences. 2019; 5(1): 18–23p.
Full Text:
PDFReferences
Richard P Wildes. Iris recognition: an emerging biometric technology. Proceedings of the IEEE September 1997;85(9).
Lynne Coventry. Usability and Biometrics Verification at the ATM Interface. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. April 2003;5(1):153-160.
Chavan Jagruti Kailas. ATM security based on Iris Recognition. International Research Journal of Engineering and Technology. April 2018;5(4):3489-3491.
Kevin W Bowyer. Image understanding for iris biometrics: A survey, Computer Vision and Image Understanding. May 2008; 110(2):281-307.
Anil K Jain. An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology. January 2004;14(1).
Himanshu Srivastava. Personal Identification Using Iris Recognition System. May 2013;3(3).
Kavita Hooda. ATM Security. International Journal of Scientific and Research Publications. April 4;6(4).
Renu Bhatia. Biometrics and Face Recognition Techniques. International Journal of Advanced Research in Computer Science and Software Engineering. May 2013;3(5):93-99p.
Sonakshi Bhagat. ATM Security using Iris Recognition Technology and RFID. International Journal of Engineering Science and Computing. 2017;7(5):11486-11488.
Mohamed Desoky Rabeh. E-learning Management System by Blackboard: A Survey of the Trends of Faculty Members at the University Level. IJCSNS International Journal of Computer Science and Network Security. October 2011;19(5):210–2017.
Refbacks
- There are currently no refbacks.