• Abbreviated Title: J. Advanced Management Sci.
  • Editor-in-Chief: Prof. Rajive Mohan Pant
  • Associate Executive Editor: Ms. Alice Loh
  • E-ISSN: 2810-9740  
  • DOI: 10.18178/joams
  • Abstracting/Indexing: CNKI, Google Scholar, Crossref
  • Article Processing Charge (APC): 400 USD
  • E-mail Questions or Comments to JOAMS Editorial Office.



Prof. Rajive Mohan Pant

North Eastern Regional Institute of Science & Technology, India
I am very excited to serve as the first Editor-in-Chief of the Journal of Advanced Management Science (JOAMS) and hope that the publication can enrich the readers’ experience.. ...  [Read More]

Authentication Management for Information System Security Based on Iris Recognition

Yao-Hong Tsai
Department of Information Management, Hsuan Chung University, Hsinchu City, Taiwan

Abstract—This paper presents an integrated security management for authentication of users based on weighted iris recognition technology. For the proposed system, a mobile device cooperating with a user calibration interface is used to capture the iris image. With large variation in the environment, there are two main improvements to develop the system. For calibration on line, we use a three-point localization scheme for extracting appropriate eye region according to the information of eye corners and the center of eyebrow. Furthermore, statistic based illumination normalization is used in preprocessing to decrease illumination influence under variant lighting conditions. The detection of the iris image is based on Adaboost algorithm and local binary pattern (LBP) histogram is then applied to texture classification. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through mobile device. The online authentication process for iris recognition can provide more protection for information system security.

Index Terms—authentication, security control, iris recognition, adaboost, local binary pattern.

Cite:Yao-Hong Tsai, "Authentication Management for Information System Security Based on Iris Recognition ," Journal of Advanced  Management Science, Vol. 1, No. 1, pp. 91-95, March 2013. doi: 10.12720/joams.1.1.91-95     
Copyright © 2013-2024 Journal of Advanced Management Science, All Rights Reserved