Following on the introduction of fingerprint biometrics, iris authentication for handheld imaging devices has become a hot research topic. However widespread adoption of this technology faces a significant challenge as personal iris data for a significant proportion of the population can be extracted from high-quality images and the growth in image sharing and the creation of online personal photographic albums creates a significant security risk. In this paper we present an overview of the problem and a potential solution – iris obfuscation when images are acquired. Challenges to implementing a practical obfuscation technology are discussed and approaches to overcome these are explored.non-peer-reviewe
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
As a near ideal biometric, iris authentication is widely used and mobile acquisition techniques are ...
This thesis investigates the practical adaption of iris biometrics on smartphones. Iris recognition ...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
The worldwide diffusion of latest generations mobile devices, namely smartphones and tablets, repres...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
The worldwide diffusion of latest generations mobile devices, namely smartphones and tablets, repres...
The worldwide diffusion of latest generations mobile devices, namely smartphones and tablets, repres...
The worldwide diffusion of latest generations mobile devices, namely smartphones and tablets, repres...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
As a near ideal biometric, iris authentication is widely used and mobile acquisition techniques are ...
This thesis investigates the practical adaption of iris biometrics on smartphones. Iris recognition ...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
The worldwide diffusion of latest generations mobile devices, namely smartphones and tablets, repres...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
The worldwide diffusion of latest generations mobile devices, namely smartphones and tablets, repres...
The worldwide diffusion of latest generations mobile devices, namely smartphones and tablets, repres...
The worldwide diffusion of latest generations mobile devices, namely smartphones and tablets, repres...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
Abstract The worldwide diffusion of latest generations mobile devices, namely smartphones and tablet...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...
Biometric-based authentication systems are becoming the preferred choice to replace password-based a...