Authentication Management for Information System Security Based on Iris Recognition
Yao-Hong Tsai
Department of Information Management, Hsuan Chung University, Hsinchu City, Taiwan
Abstract—This paper presents an integrated security management for authentication of users based on weighted iris recognition technology. For the proposed system, a mobile device cooperating with a user calibration interface is used to capture the iris image. With large variation in the environment, there are two main improvements to develop the system. For calibration on line, we use a three-point localization scheme for extracting appropriate eye region according to the information of eye corners and the center of eyebrow. Furthermore, statistic based illumination normalization is used in preprocessing to decrease illumination influence under variant lighting conditions. The detection of the iris image is based on Adaboost algorithm and local binary pattern (LBP) histogram is then applied to texture classification. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through mobile device. The online authentication process for iris recognition can provide more protection for information system security.
Index Terms—authentication, security control, iris recognition, adaboost, local binary pattern.
Cite:Yao-Hong Tsai, "Authentication Management for Information System Security Based on Iris Recognition ," Journal of Advanced Management Science, Vol. 1, No. 1, pp. 91-95, March 2013. doi: 10.12720/joams.1.1.91-95
Index Terms—authentication, security control, iris recognition, adaboost, local binary pattern.
Cite:Yao-Hong Tsai, "Authentication Management for Information System Security Based on Iris Recognition ," Journal of Advanced Management Science, Vol. 1, No. 1, pp. 91-95, March 2013. doi: 10.12720/joams.1.1.91-95