{"id":304,"date":"2025-03-18T18:54:47","date_gmt":"2025-03-18T18:54:47","guid":{"rendered":"https:\/\/coeng.uaa.alaska.edu\/AI\/?page_id=304"},"modified":"2025-03-24T20:12:49","modified_gmt":"2025-03-24T20:12:49","slug":"raise-iris-recognition","status":"publish","type":"page","link":"https:\/\/coeng.uaa.alaska.edu\/AI\/raise-iris-recognition\/","title":{"rendered":"RAISE &#8211; Iris Recognition"},"content":{"rendered":"<div class='breakdance'><section class=\"bde-section-304-100 bde-section\">\n  \n  \n\t\n\n\n\n<div class=\"section-container\"><div class=\"bde-columns-304-105 bde-columns\"><div class=\"bde-column-304-106 bde-column\">\n  \n  \n\t\n\n\n\n<div class=\"bde-text-304-102 bde-text\">\nUAA College of Engineering\n<\/div><h1 class=\"bde-heading-304-103 bde-heading\">\n\u200b\u200bReal-time continuous iris recognition for authentication using an eye tracker\n<\/h1><div class=\"bde-text-304-109 bde-text\">\nA collaborative project led by: Kenrick Mock, Bogdan Hoanca, Justin Weaver, Mikal Milton\n<\/div>\n<\/div><div class=\"bde-column-304-107 bde-column\">\n  \n  \n\t\n\n\n\n<img decoding=\"async\" class=\"bde-image2-304-108 bde-image2\" src=\"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/image-4-3-768x576.jpg\" alt=\"Iris Recognition for Continuous Biometric User Authentication\" loading=\"lazy\" srcset=\"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/image-4-3-768x576.jpg 768w, https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/image-4-3-300x225.jpg 300w, https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/image-4-3-1024x768.jpg 1024w, https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/image-4-3-1536x1152.jpg 1536w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-entrance=\"fade\">\n<\/div><\/div><\/div>\n<\/section><section class=\"bde-section-304-193 bde-section\">\n              \n  \n  \n\t\n\n\n\n<div class=\"section-container\"><img decoding=\"async\" class=\"bde-image2-304-196 bde-image2\" src=\"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2024\/10\/CollegeOfEngineering-GG-1536x314-1.png\" alt=\"UAA College of Engineering Logo\" loading=\"lazy\" srcset=\"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2024\/10\/CollegeOfEngineering-GG-1536x314-1.png 1536w, https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2024\/10\/CollegeOfEngineering-GG-1536x314-1-300x61.png 300w, https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2024\/10\/CollegeOfEngineering-GG-1536x314-1-1024x209.png 1024w, https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2024\/10\/CollegeOfEngineering-GG-1536x314-1-768x157.png 768w\" sizes=\"(max-width: 1536px) 100vw, 1536px\"><\/div>\n<\/section><section class=\"bde-section-304-176 bde-section\" data-entrance=\"zoomOut\">\n  \n  \n\t\n\n\n\n<div class=\"section-container\"><div class=\"bde-columns-304-183 bde-columns\"><div class=\"bde-column-304-184 bde-column\">\n  \n  \n\t\n\n\n\n<img decoding=\"async\" class=\"bde-image2-304-191 bde-image2\" src=\"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/6743e0d135a15772947ba95d_6743e07ce736bae981a45162_Iris20of20the20Eye-1024x597.jpeg\" alt=\"Iris recognition\" loading=\"lazy\" srcset=\"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/6743e0d135a15772947ba95d_6743e07ce736bae981a45162_Iris20of20the20Eye-1024x597.jpeg 1024w, https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/6743e0d135a15772947ba95d_6743e07ce736bae981a45162_Iris20of20the20Eye-300x175.jpeg 300w, https:\/\/coeng.uaa.alaska.edu\/AI\/wp-content\/uploads\/2025\/03\/6743e0d135a15772947ba95d_6743e07ce736bae981a45162_Iris20of20the20Eye-768x448.jpeg 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-entrance=\"fade\" data-parallax=\"true\">\n<\/div><div class=\"bde-column-304-185 bde-column\">\n  \n  \n\t\n\n\n\n<h1 class=\"bde-heading-304-186 bde-heading\" data-entrance=\"slideRight\">\nAdvancing Authentication: The Promise of Iris Recognition\n<\/h1><div class=\"bde-text-304-187 bde-text\">\nContinuous User Verification Through Eye Tracking Technology\n<\/div>\n<\/div><\/div><\/div>\n<\/section><section class=\"bde-section-304-188 bde-section\">\n  \n  \n\t\n\n\n\n<div class=\"section-container\"><div class=\"bde-text-304-189 bde-text\">\nThe majority of today's authentication systems, including password and fingerprint scanners, are based on one-time, static authentication methods. A continuous, real-time authentication system opens up the possibility for greater security, but such a system must be unobtrusive and secure.<br><br>In recent research, a team of UAA experts explored whether a commercial eye tracker can be used for unobtrusive, continuous, real-time user authentication via iris recognition. This innovative approach leverages the unique patterns within the iris, which are highly distinctive and stable over time.<br><br>While traditional authentication methods require periodic user input, continuous iris recognition could provide ongoing verification without disrupting the user's workflow. This technology has the potential to significantly enhance security in various applications, from enterprise systems to healthcare and financial services.<br><br>As eye tracking technology continues to advance, its capabilities for multiple factor, continuous authentication are becoming increasingly compelling.\n<\/div><\/div>\n<\/section><section class=\"bde-section-304-197 bde-section\">\n  \n  \n\t\n\n\n\n<div class=\"section-container\"><h1 class=\"bde-heading-304-198 bde-heading\">\nFrequently Asked Questions\n<\/h1><div class=\"bde-frequently-asked-questions-304-199 bde-frequently-asked-questions\">\n      <div class=\"bde-faq__item\">\n      <h3 class=\"bde-faq__title-tag\">\n       <button id=\"bde-faq-199-button-1\" aria-expanded=\"false\" aria-controls=\"bde-faq-199-1\" class=\"bde-faq__question js-faq-item\">\n          <span class=\"bde-faq__title\">What is continuous iris recognition?<\/span>\n                           <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--inactive\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2c5.518 0 9.998 4.48 9.998 9.998 0 5.517-4.48 9.997-9.998 9.997-5.517 0-9.997-4.48-9.997-9.997 0-5.518 4.48-9.998 9.997-9.998zm-.747 9.25h-3.5c-.414 0-.75.336-.75.75s.336.75.75.75h3.5v3.5c0 .414.336.75.75.75s.75-.336.75-.75v-3.5h3.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-3.5v-3.5c0-.414-.336-.75-.75-.75s-.75.336-.75.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n         \t  <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--active\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2.005c5.518 0 9.998 4.48 9.998 9.997 0 5.518-4.48 9.998-9.998 9.998-5.517 0-9.997-4.48-9.997-9.998 0-5.517 4.48-9.997 9.997-9.997zm4.253 9.25h-8.5c-.414 0-.75.336-.75.75s.336.75.75.75h8.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n                  <\/button>\n      <\/h3>\n      <div role=\"region\" aria-labelledby=\"bde-faq-199-button-1\" id=\"bde-faq-199-1\" class=\"bde-faq__answer\">\n        <div class=\"bde-faq__answer-content\">\n            <div class=\"breakdance-rich-text-styles\"><p>Continuous iris recognition is an authentication method that uses the unique patterns of a person's iris to verify their identity in real-time and on an ongoing basis, without requiring any specific action from the user.<\/p><\/div>\n\n                    <\/div>\n      <\/div>\n    <\/div>\n      <div class=\"bde-faq__item\">\n      <h3 class=\"bde-faq__title-tag\">\n       <button id=\"bde-faq-199-button-2\" aria-expanded=\"false\" aria-controls=\"bde-faq-199-2\" class=\"bde-faq__question js-faq-item\">\n          <span class=\"bde-faq__title\">How does this system work?<\/span>\n                           <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--inactive\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2c5.518 0 9.998 4.48 9.998 9.998 0 5.517-4.48 9.997-9.998 9.997-5.517 0-9.997-4.48-9.997-9.997 0-5.518 4.48-9.998 9.997-9.998zm-.747 9.25h-3.5c-.414 0-.75.336-.75.75s.336.75.75.75h3.5v3.5c0 .414.336.75.75.75s.75-.336.75-.75v-3.5h3.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-3.5v-3.5c0-.414-.336-.75-.75-.75s-.75.336-.75.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n         \t  <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--active\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2.005c5.518 0 9.998 4.48 9.998 9.997 0 5.518-4.48 9.998-9.998 9.998-5.517 0-9.997-4.48-9.997-9.998 0-5.517 4.48-9.997 9.997-9.997zm4.253 9.25h-8.5c-.414 0-.75.336-.75.75s.336.75.75.75h8.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n                  <\/button>\n      <\/h3>\n      <div role=\"region\" aria-labelledby=\"bde-faq-199-button-2\" id=\"bde-faq-199-2\" class=\"bde-faq__answer\">\n        <div class=\"bde-faq__answer-content\">\n            <div class=\"breakdance-rich-text-styles\"><p>This system uses a commercial eye tracker to capture images of the iris. The unique patterns within the iris are then analyzed to continuously verify the user's identity.<\/p><\/div>\n\n                    <\/div>\n      <\/div>\n    <\/div>\n      <div class=\"bde-faq__item\">\n      <h3 class=\"bde-faq__title-tag\">\n       <button id=\"bde-faq-199-button-3\" aria-expanded=\"false\" aria-controls=\"bde-faq-199-3\" class=\"bde-faq__question js-faq-item\">\n          <span class=\"bde-faq__title\">Why is continuous authentication important?<\/span>\n                           <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--inactive\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2c5.518 0 9.998 4.48 9.998 9.998 0 5.517-4.48 9.997-9.998 9.997-5.517 0-9.997-4.48-9.997-9.997 0-5.518 4.48-9.998 9.997-9.998zm-.747 9.25h-3.5c-.414 0-.75.336-.75.75s.336.75.75.75h3.5v3.5c0 .414.336.75.75.75s.75-.336.75-.75v-3.5h3.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-3.5v-3.5c0-.414-.336-.75-.75-.75s-.75.336-.75.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n         \t  <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--active\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2.005c5.518 0 9.998 4.48 9.998 9.997 0 5.518-4.48 9.998-9.998 9.998-5.517 0-9.997-4.48-9.997-9.998 0-5.517 4.48-9.997 9.997-9.997zm4.253 9.25h-8.5c-.414 0-.75.336-.75.75s.336.75.75.75h8.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n                  <\/button>\n      <\/h3>\n      <div role=\"region\" aria-labelledby=\"bde-faq-199-button-3\" id=\"bde-faq-199-3\" class=\"bde-faq__answer\">\n        <div class=\"bde-faq__answer-content\">\n            <div class=\"breakdance-rich-text-styles\"><p>Continuous authentication provides a higher level of security compared to traditional, one-time authentication methods like passwords or fingerprint scans. It ensures ongoing verification, reducing the risk of unauthorized access.<\/p><\/div>\n\n                    <\/div>\n      <\/div>\n    <\/div>\n      <div class=\"bde-faq__item\">\n      <h3 class=\"bde-faq__title-tag\">\n       <button id=\"bde-faq-199-button-4\" aria-expanded=\"false\" aria-controls=\"bde-faq-199-4\" class=\"bde-faq__question js-faq-item\">\n          <span class=\"bde-faq__title\">What are the benefits of using iris recognition for continuous authentication?<\/span>\n                           <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--inactive\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2c5.518 0 9.998 4.48 9.998 9.998 0 5.517-4.48 9.997-9.998 9.997-5.517 0-9.997-4.48-9.997-9.997 0-5.518 4.48-9.998 9.997-9.998zm-.747 9.25h-3.5c-.414 0-.75.336-.75.75s.336.75.75.75h3.5v3.5c0 .414.336.75.75.75s.75-.336.75-.75v-3.5h3.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-3.5v-3.5c0-.414-.336-.75-.75-.75s-.75.336-.75.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n         \t  <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--active\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2.005c5.518 0 9.998 4.48 9.998 9.997 0 5.518-4.48 9.998-9.998 9.998-5.517 0-9.997-4.48-9.997-9.998 0-5.517 4.48-9.997 9.997-9.997zm4.253 9.25h-8.5c-.414 0-.75.336-.75.75s.336.75.75.75h8.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n                  <\/button>\n      <\/h3>\n      <div role=\"region\" aria-labelledby=\"bde-faq-199-button-4\" id=\"bde-faq-199-4\" class=\"bde-faq__answer\">\n        <div class=\"bde-faq__answer-content\">\n            <div class=\"breakdance-rich-text-styles\"><ul class=\"marker:text-textOff list-disc\"><li><p class=\"my-0\"><strong>Enhanced Security:<\/strong> Continuous verification makes it more difficult for unauthorized users to gain access.<\/p><\/li><li><p class=\"my-0\"><strong>Unobtrusive Authentication:<\/strong> Iris recognition can be performed without requiring any specific action from the user, minimizing disruption to their workflow.<\/p><\/li><li><p class=\"my-0\"><strong>Real-time Verification:<\/strong> Identity is continuously verified, providing immediate alerts if unauthorized access is detected.<\/p><\/li><\/ul><\/div>\n\n                    <\/div>\n      <\/div>\n    <\/div>\n      <div class=\"bde-faq__item\">\n      <h3 class=\"bde-faq__title-tag\">\n       <button id=\"bde-faq-199-button-5\" aria-expanded=\"false\" aria-controls=\"bde-faq-199-5\" class=\"bde-faq__question js-faq-item\">\n          <span class=\"bde-faq__title\">What are the potential applications of this technology?<\/span>\n                           <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--inactive\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2c5.518 0 9.998 4.48 9.998 9.998 0 5.517-4.48 9.997-9.998 9.997-5.517 0-9.997-4.48-9.997-9.997 0-5.518 4.48-9.998 9.997-9.998zm-.747 9.25h-3.5c-.414 0-.75.336-.75.75s.336.75.75.75h3.5v3.5c0 .414.336.75.75.75s.75-.336.75-.75v-3.5h3.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-3.5v-3.5c0-.414-.336-.75-.75-.75s-.75.336-.75.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n         \t  <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--active\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2.005c5.518 0 9.998 4.48 9.998 9.997 0 5.518-4.48 9.998-9.998 9.998-5.517 0-9.997-4.48-9.997-9.998 0-5.517 4.48-9.997 9.997-9.997zm4.253 9.25h-8.5c-.414 0-.75.336-.75.75s.336.75.75.75h8.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n                  <\/button>\n      <\/h3>\n      <div role=\"region\" aria-labelledby=\"bde-faq-199-button-5\" id=\"bde-faq-199-5\" class=\"bde-faq__answer\">\n        <div class=\"bde-faq__answer-content\">\n            <div class=\"breakdance-rich-text-styles\"><p class=\"my-0\">This technology has potential applications in various fields, including:<\/p><ul class=\"marker:text-textOff list-disc\"><li><p class=\"my-0\">Enterprise systems<\/p><\/li><li><p class=\"my-0\">Healthcare<\/p><\/li><li><p class=\"my-0\">Financial services<\/p><\/li><\/ul><\/div>\n\n                    <\/div>\n      <\/div>\n    <\/div>\n      <div class=\"bde-faq__item\">\n      <h3 class=\"bde-faq__title-tag\">\n       <button id=\"bde-faq-199-button-6\" aria-expanded=\"false\" aria-controls=\"bde-faq-199-6\" class=\"bde-faq__question js-faq-item\">\n          <span class=\"bde-faq__title\">Is iris recognition secure?<\/span>\n                           <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--inactive\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2c5.518 0 9.998 4.48 9.998 9.998 0 5.517-4.48 9.997-9.998 9.997-5.517 0-9.997-4.48-9.997-9.997 0-5.518 4.48-9.998 9.997-9.998zm-.747 9.25h-3.5c-.414 0-.75.336-.75.75s.336.75.75.75h3.5v3.5c0 .414.336.75.75.75s.75-.336.75-.75v-3.5h3.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-3.5v-3.5c0-.414-.336-.75-.75-.75s-.75.336-.75.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n         \t  <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--active\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2.005c5.518 0 9.998 4.48 9.998 9.997 0 5.518-4.48 9.998-9.998 9.998-5.517 0-9.997-4.48-9.997-9.998 0-5.517 4.48-9.997 9.997-9.997zm4.253 9.25h-8.5c-.414 0-.75.336-.75.75s.336.75.75.75h8.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n                  <\/button>\n      <\/h3>\n      <div role=\"region\" aria-labelledby=\"bde-faq-199-button-6\" id=\"bde-faq-199-6\" class=\"bde-faq__answer\">\n        <div class=\"bde-faq__answer-content\">\n            <div class=\"breakdance-rich-text-styles\"><p>Yes, the patterns within the iris are highly distinctive and stable over time, making iris recognition a very secure method of authentication.<\/p><\/div>\n\n                    <\/div>\n      <\/div>\n    <\/div>\n      <div class=\"bde-faq__item\">\n      <h3 class=\"bde-faq__title-tag\">\n       <button id=\"bde-faq-199-button-7\" aria-expanded=\"false\" aria-controls=\"bde-faq-199-7\" class=\"bde-faq__question js-faq-item\">\n          <span class=\"bde-faq__title\">What is the role of eye-tracking technology in this system?<\/span>\n                           <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--inactive\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2c5.518 0 9.998 4.48 9.998 9.998 0 5.517-4.48 9.997-9.998 9.997-5.517 0-9.997-4.48-9.997-9.997 0-5.518 4.48-9.998 9.997-9.998zm-.747 9.25h-3.5c-.414 0-.75.336-.75.75s.336.75.75.75h3.5v3.5c0 .414.336.75.75.75s.75-.336.75-.75v-3.5h3.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-3.5v-3.5c0-.414-.336-.75-.75-.75s-.75.336-.75.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n         \t  <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--active\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2.005c5.518 0 9.998 4.48 9.998 9.997 0 5.518-4.48 9.998-9.998 9.998-5.517 0-9.997-4.48-9.997-9.998 0-5.517 4.48-9.997 9.997-9.997zm4.253 9.25h-8.5c-.414 0-.75.336-.75.75s.336.75.75.75h8.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n                  <\/button>\n      <\/h3>\n      <div role=\"region\" aria-labelledby=\"bde-faq-199-button-7\" id=\"bde-faq-199-7\" class=\"bde-faq__answer\">\n        <div class=\"bde-faq__answer-content\">\n            <div class=\"breakdance-rich-text-styles\"><p>Eye-tracking technology enables the unobtrusive and continuous capture of iris images, making real-time iris recognition possible without disrupting the user.<\/p><\/div>\n\n                    <\/div>\n      <\/div>\n    <\/div>\n      <div class=\"bde-faq__item\">\n      <h3 class=\"bde-faq__title-tag\">\n       <button id=\"bde-faq-199-button-8\" aria-expanded=\"false\" aria-controls=\"bde-faq-199-8\" class=\"bde-faq__question js-faq-item\">\n          <span class=\"bde-faq__title\">Who is leading this research?<\/span>\n                           <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--inactive\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2c5.518 0 9.998 4.48 9.998 9.998 0 5.517-4.48 9.997-9.998 9.997-5.517 0-9.997-4.48-9.997-9.997 0-5.518 4.48-9.998 9.997-9.998zm-.747 9.25h-3.5c-.414 0-.75.336-.75.75s.336.75.75.75h3.5v3.5c0 .414.336.75.75.75s.75-.336.75-.75v-3.5h3.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-3.5v-3.5c0-.414-.336-.75-.75-.75s-.75.336-.75.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n         \t  <div aria-hidden=\"true\" class=\"bde-faq__icon bde-faq__icon--active\">\n                                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 24 24\"><path d=\"m12.002 2.005c5.518 0 9.998 4.48 9.998 9.997 0 5.518-4.48 9.998-9.998 9.998-5.517 0-9.997-4.48-9.997-9.998 0-5.517 4.48-9.997 9.997-9.997zm4.253 9.25h-8.5c-.414 0-.75.336-.75.75s.336.75.75.75h8.5c.414 0 .75-.336.75-.75s-.336-.75-.75-.75z\" fill-rule=\"nonzero\"\/><\/svg>\n                            <\/div>\n                  <\/button>\n      <\/h3>\n      <div role=\"region\" aria-labelledby=\"bde-faq-199-button-8\" id=\"bde-faq-199-8\" class=\"bde-faq__answer\">\n        <div class=\"bde-faq__answer-content\">\n            <div class=\"breakdance-rich-text-styles\"><p>This collaborative project is led by Kenrick Mock, Bogdan Hoanca, Justin Weaver, and Mikal Milton at the UAA College of Engineering.<\/p><\/div>\n\n                    <\/div>\n      <\/div>\n    <\/div>\n  \n<\/div><\/div>\n<\/section><\/div>","protected":false},"excerpt":{"rendered":"<p>UAA College of Engineering \u200b\u200bReal-time continuous iris recognition for authentication using an eye tracker A collaborative project led by: Kenrick Mock, Bogdan Hoanca, Justin Weaver, Mikal Milton Advancing Authentication: The Promise of Iris Recognition Continuous User Verification Through Eye Tracking Technology The majority of today&#8217;s authentication systems, including password and fingerprint scanners, are based on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_breakdance_hide_in_design_set":false,"_breakdance_tags":"","footnotes":""},"class_list":["post-304","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-json\/wp\/v2\/pages\/304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":39,"href":"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-json\/wp\/v2\/pages\/304\/revisions"}],"predecessor-version":[{"id":449,"href":"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-json\/wp\/v2\/pages\/304\/revisions\/449"}],"wp:attachment":[{"href":"https:\/\/coeng.uaa.alaska.edu\/AI\/wp-json\/wp\/v2\/media?parent=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}