Combined with the security problems encountered in the public security iris application, this paper makes a comprehensive analysis of these security problems from two aspects of iris acquisition and iris verification. And using the current academic research results, combined with the practical application requirements, the iris template encryption, the original image encryption, transmission encryption, equipment authentication and other technical means are used to construct the security system of the public security iris application and ensure the public security iris application in an all-round way. Finally, the application of the research results in actual use is introduced.
CITATION STYLE
Li, L., Li, S., Zhao, S., & Tan, L. (2018). Research on security of public security iris application. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10996 LNCS, pp. 459–467). Springer Verlag. https://doi.org/10.1007/978-3-319-97909-0_49
Mendeley helps you to discover research relevant for your work.