R. R, H. K, K. Malathy, G. Sivagamidevi, C. V. Sudhakar, V. Indhumathi
{"title":"An Effective Security Protocol Design for IRIS based Credential Evaluation using Intensive Deep Learning Scheme","authors":"R. R, H. K, K. Malathy, G. Sivagamidevi, C. V. Sudhakar, V. Indhumathi","doi":"10.1109/ACCAI58221.2023.10199928","DOIUrl":null,"url":null,"abstract":"The component of a system charged with ensuring the security of its users is among its most crucial parts. It has been demonstrated that using a password or login that is too basic makes you vulnerable to hackers and does not ensure a high level of security. Authentication using biometric methods can be achieved in several ways. Some of the most advanced and reliable are facial recognition technology and iris recognition. Because it relies heavily on detection of patterns, it is able to reliably identify the rightful owner of an Iris scan. Accuracy as well as effectiveness have both been greatly enhanced in the resultant recognition system. Security breaches and other identification scams are on the rise, making it all the more crucial to implement a robust biometric system. The option that has gained a lot of attention is biometric identification. The iris's potential as a biometric has gained traction in recent years. This quantifiable quality ensures great productivity and precision, which is what triggered the phenomenon. We present a complete ResNet50-based deep learning system for iris identification in this study. Utilizing only a small number of training photos from every class, we train our algorithm on a popular identification of iris dataset, achieving significant gains over prior methods. In addition, we introduce a visualization method that may identify key features of iris pictures that have a significant bearing on the precision of recognition. We anticipate that this approach will be utilized extensively in the future to improve the scalability and precision of various biometrics identification jobs","PeriodicalId":382104,"journal":{"name":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCAI58221.2023.10199928","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The component of a system charged with ensuring the security of its users is among its most crucial parts. It has been demonstrated that using a password or login that is too basic makes you vulnerable to hackers and does not ensure a high level of security. Authentication using biometric methods can be achieved in several ways. Some of the most advanced and reliable are facial recognition technology and iris recognition. Because it relies heavily on detection of patterns, it is able to reliably identify the rightful owner of an Iris scan. Accuracy as well as effectiveness have both been greatly enhanced in the resultant recognition system. Security breaches and other identification scams are on the rise, making it all the more crucial to implement a robust biometric system. The option that has gained a lot of attention is biometric identification. The iris's potential as a biometric has gained traction in recent years. This quantifiable quality ensures great productivity and precision, which is what triggered the phenomenon. We present a complete ResNet50-based deep learning system for iris identification in this study. Utilizing only a small number of training photos from every class, we train our algorithm on a popular identification of iris dataset, achieving significant gains over prior methods. In addition, we introduce a visualization method that may identify key features of iris pictures that have a significant bearing on the precision of recognition. We anticipate that this approach will be utilized extensively in the future to improve the scalability and precision of various biometrics identification jobs