Iris Biometric Cryptography for Identity Document



FREE-DOWNLOAD SH Moi, NBA Rahim, P Saad, PL Sim… – … Conference of Soft …,
Abstract—Currently, it is noticed that users tend to choose shorter password as their authentication
which can be easily attacked. Biometric technologies such as fingerprint scanning, voice
authentication, face recognition, signature, hand geometry and iris recognition is now