• DocumentCode
    40229
  • Title

    Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key

  • Author

    Itkis, Gene ; Chandar, Venkat ; Fuller, Benjamin W. ; Campbell, Joseph P. ; Cunningham, Robert K.

  • Author_Institution
    Cyber Syst. & Technol., MIT Lincoln Lab., Lexington, MA, USA
  • Volume
    32
  • Issue
    5
  • fYear
    2015
  • fDate
    Sept. 2015
  • Firstpage
    42
  • Lastpage
    53
  • Abstract
    Biometrics were originally developed for identification, such as for criminal investigations. More recently, biometrics have been also utilized for authentication. Most biometric authentication systems today match a user?s biometric reading against a stored reference template generated during enrollment. If the reading and the template are sufficiently close, the authentication is considered successful and the user is authorized to access protected resources. This binary matching approach has major inherent vulnerabilities.
  • Keywords
    authorisation; image matching; iris recognition; telecommunication security; authorization; binary matching approach; biometric authentication system; iris biometric security challenges; Authentication; Authorization; Cryptography; Entropy; Iris recognition; Measurement;
  • fLanguage
    English
  • Journal_Title
    Signal Processing Magazine, IEEE
  • Publisher
    ieee
  • ISSN
    1053-5888
  • Type

    jour

  • DOI
    10.1109/MSP.2015.2439717
  • Filename
    7194913