Laser & Optoelectronics Progress, Volume. 62, Issue 8, 0800001(2025)

Application Prospects of Iris Recognition Technology in Identity Authentication for Standalone Virtual Reality Devices

Zhenyu Ma1, Nini Wang1,2, Guolei Wu1,2, Chenlong Zhu1,2, Mingqi Zhou3, Yongjun Liu1, and Yunxiang Yan1,2、*
Author Affiliations
  • 1Key Laboratory of In-Fiber Integrated Optics, Ministry Education of China, Harbin Engineering University, Harbin 150001, Heilongjiang , China
  • 2Qingdao Innovation and Development Center of Harbin Engineering University, Qingdao 266000, Shandong , China
  • 3Goertek Inc., Qingdao 266100, Shandong , China
  • show less
    Figures & Tables(20)
    Process flowchart of biometric technology processing[5]
    Human eye structure diagram
    Flow diagram of iris recognition system
    Iris images under different illuminations[28]. (a) Iris images collected under visible light; (b) iris images collected under infrared light
    Iris images under different illuminations[31]. (a) Iris images under four 765 nm LEDs; (b) iris images under two 765 nm LEDs and one 850 nm LED; (c) iris images under two 850 nm LEDs; (d)‒(f) corresponding segmented iris images
    Iris images taken under different infrared light conditions[32]
    Relationship between object height and image height[34]
    Iris recognition equipments[35]. (a) Close iris recognition equipment; (b) (c) medium and long-distance recognition equipments
    Eye tracking module schematic diagram
    Poor quality iris images[44]. (a) Eyelid occlusion; (b) closed eyes; (c) eyelash occlusion; (d) iris is not clear
    Iris images with different resolutions[48]. (a) High resolution iris image; (b) low resolution iris image
    Iris localization algorithm[78]. (a) Localization result of Daugman algorithm; (b) localization result of Wildes algorithm
    Working principal diagram of iris recognition system
    PICO 4 Pro product drawing
    Facial expression restoration[102]
    Camera schematic diagram[104]. (a) Traditional three-chip lens camera; (b) metalenses camera
    • Table 1. Feasibility analysis of four biometric technologies for implementing identity authentication function in standalone VR headsets

      View table

      Table 1. Feasibility analysis of four biometric technologies for implementing identity authentication function in standalone VR headsets

      Bio identification technologySecurity classLearning costStructural changeExisting interference
      Fingerprint recognitionHighHighFingerprint recognition module; collection plane for fingerprint imagesPhysical contact; higher fingerprint clarity and integrity
      Face recognitionHigherLowFace recognition module; more cameras for facial featuresUnable to collect complete face information
      Iris recognitionHighestMiddleEye trace module for iris recognitionClosing eyes; strabismus; obstruction; mirror reflection; ophthalmology diseases
      Speech recognitionHigherMiddleNo need to changePhysiology; pathology; camouflage; environment
    • Table 2. Image deblurring

      View table

      Table 2. Image deblurring

      ClassificationRef.ApproachPros and Cons
      Traditional methodNon-blind deblurring50Lucy-Richardson algorithmSimple model structure, but limited adaptation scene
      51Wiener filtering algorithm
      Blind deblurring52Maximum a posteriorImproved application scenario, but limited resilience in complex scenarios
      53Variational Bayesian
      Deep learning method54Kernel estimationStronger fuzzy kernel estimation ability
      55End-to-end networkImproved accuracy of the recovery effect, but long training time
      56Dynamic networkImproved deblurring performance
    • Table 3. Super-resolution reconstruction of images

      View table

      Table 3. Super-resolution reconstruction of images

      ClassificationRef.ApproachPros and cons
      Interpolation algorithm57Nearest neighbor interpolationSimple and fast, but poor effect with blurred edge
      58Bilinear interpolation
      59Bicubic interpolation
      Reconstruction algorithm60Iterative back projectionSharper edge, but degrade rapidly for HR image with large-scale factor problem
      61Projection onto convex set
      62Maximum a posteriori
      Shallow learning algorithm63Example-based methodsFine high frequency information depending on the quality of the training set
      64ManifoldMore image details can be restored
      65Compressive sensingHigh quality of the reconstructed image, but complex algorithm
      Deep learning algorithm66][67CNNAutomatic extraction and high semantic level of image feature information with deeper network level and difficult training
      68Residual network (ResNet)Improve CNN’s gradient disappearance and gradient explosion problem
      69Generative adversarial networks (GAN)Reconstruct super resolution images with texture details for large scaling factor
    • Table 4. Comparison of traditional iris feature extraction methods

      View table

      Table 4. Comparison of traditional iris feature extraction methods

      ApproachRecognition effectRobustness of illuminationAbility to resist noise interference
      LBPHighHigherLow
      Based on Haar wavelet transformHighHigherLow
      Based on two-dimensional Gabor filteringMediumLowMedium
      GLCMLowHighHigh
    Tools

    Get Citation

    Copy Citation Text

    Zhenyu Ma, Nini Wang, Guolei Wu, Chenlong Zhu, Mingqi Zhou, Yongjun Liu, Yunxiang Yan. Application Prospects of Iris Recognition Technology in Identity Authentication for Standalone Virtual Reality Devices[J]. Laser & Optoelectronics Progress, 2025, 62(8): 0800001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Reviews

    Received: May. 22, 2024

    Accepted: Sep. 24, 2024

    Published Online: Apr. 3, 2025

    The Author Email: Yunxiang Yan (yanyunxiang@hrbeu.edu.cn)

    DOI:10.3788/LOP241341

    CSTR:32186.14.LOP241341

    Topics