DocumentCode
40229
Title
Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key
Author
Itkis, Gene ; Chandar, Venkat ; Fuller, Benjamin W. ; Campbell, Joseph P. ; Cunningham, Robert K.
Author_Institution
Cyber Syst. & Technol., MIT Lincoln Lab., Lexington, MA, USA
Volume
32
Issue
5
fYear
2015
fDate
Sept. 2015
Firstpage
42
Lastpage
53
Abstract
Biometrics were originally developed for identification, such as for criminal investigations. More recently, biometrics have been also utilized for authentication. Most biometric authentication systems today match a user?s biometric reading against a stored reference template generated during enrollment. If the reading and the template are sufficiently close, the authentication is considered successful and the user is authorized to access protected resources. This binary matching approach has major inherent vulnerabilities.
Keywords
authorisation; image matching; iris recognition; telecommunication security; authorization; binary matching approach; biometric authentication system; iris biometric security challenges; Authentication; Authorization; Cryptography; Entropy; Iris recognition; Measurement;
fLanguage
English
Journal_Title
Signal Processing Magazine, IEEE
Publisher
ieee
ISSN
1053-5888
Type
jour
DOI
10.1109/MSP.2015.2439717
Filename
7194913
Link To Document