Title :
Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key
Author :
Itkis, Gene ; Chandar, Venkat ; Fuller, Benjamin W. ; Campbell, Joseph P. ; Cunningham, Robert K.
Author_Institution :
Cyber Syst. & Technol., MIT Lincoln Lab., Lexington, MA, USA
Abstract :
Biometrics were originally developed for identification, such as for criminal investigations. More recently, biometrics have been also utilized for authentication. Most biometric authentication systems today match a user?s biometric reading against a stored reference template generated during enrollment. If the reading and the template are sufficiently close, the authentication is considered successful and the user is authorized to access protected resources. This binary matching approach has major inherent vulnerabilities.
Keywords :
authorisation; image matching; iris recognition; telecommunication security; authorization; binary matching approach; biometric authentication system; iris biometric security challenges; Authentication; Authorization; Cryptography; Entropy; Iris recognition; Measurement;
Journal_Title :
Signal Processing Magazine, IEEE
DOI :
10.1109/MSP.2015.2439717