Return to Article Details Finding a Suitable and Secure Threshold Value for an Iris Authentication Download Download PDF