IRIS based Recognition and Spoofing Attacks: A Review

This paper gives a window browsing of the iris technology, its application areas and the spoofing attacks suggested so far from its initiation. Iris recognition and identification algorithms used various patterns and mathematical models to identify humans for various applications i.e., IoT, POS (Point of Sale), passport, health care digital transformation, child trafficking, liveness detection. This paper gives scope to a comparative survey of the literature of different authors who worked on different acquisition methods, localization and normalization methods, and different spoofing attacks presented and registered in the analysis.