Rahmatallah Hossam Farouk, H. Mohsen, Y.M. Abd El-Latif
{"title":"Iris Recognition System Techniques: A Literature Survey and Comparative Study","authors":"Rahmatallah Hossam Farouk, H. Mohsen, Y.M. Abd El-Latif","doi":"10.1109/icci54321.2022.9756079","DOIUrl":null,"url":null,"abstract":"The main objective of this comparative study is to present a comprehensive review of literature on one of the biometric identification systems namely the iris recognition system. Biometric authentication has been introduced as one of the most fundamental security technologies. As most human phenotypes are unique, physiological features such as fingerprints, iris color, facial patterns, and geometry are used as security passwords. Because of its dependability, iris receives the greatest attention in the authentication. The segmentation, border defining, feature extraction, and matching methods are analyzed in this work. Most of the used iris datasets are also presented in the paper. The purpose of this research is to investigate current iris recognition systems and describe their phases.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Computing and Informatics (ICCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icci54321.2022.9756079","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The main objective of this comparative study is to present a comprehensive review of literature on one of the biometric identification systems namely the iris recognition system. Biometric authentication has been introduced as one of the most fundamental security technologies. As most human phenotypes are unique, physiological features such as fingerprints, iris color, facial patterns, and geometry are used as security passwords. Because of its dependability, iris receives the greatest attention in the authentication. The segmentation, border defining, feature extraction, and matching methods are analyzed in this work. Most of the used iris datasets are also presented in the paper. The purpose of this research is to investigate current iris recognition systems and describe their phases.