GSO ISO/IEC 29794-6:2021

ISO/IEC 29794-6:2015
Gulf Standard   Current Edition · Approved on 01 July 2021

Information technology — Biometric sample quality — Part 6: Iris image data

GSO ISO/IEC 29794-6:2021 Files

GSO ISO/IEC 29794-6:2021 Scope

ISO/IEC 29794-6:2015 establishes: methods used to quantify the quality of iris images, normative requirements on software and hardware producing iris images, normative requirements on software and hardware measuring the utility of iris images, terms and definitions for quantifying iris image quality, and standardized encoding of iris image quality.

Outside the scope is performance evaluation of specific iris quality assessment algorithms.

Best Sellers From Information Sector

GSO ISO/TR 18492:2017
ISO/TR 18492:2005 
Gulf Standard
Long-term preservation of electronic document-based information
GSO ISO/TS 23635:2024
ISO/TS 23635:2022 
Gulf Standard
Blockchain and distributed ledger technologies — Guidelines for governance
GSO ISO/IEC 15773:2013
ISO/IEC 15773:1998 
Gulf Standard
Information technology -- Telecommunications and information exchange between systems -- Broadband Private Integrated Services Network -- Inter-exchange signalling protocol -- Transit counter additional network feature
GSO ISO 11238:2017
ISO 11238:2012 
Gulf Standard
Health informatics -- Identification of medicinal products -- Data elements and structures for the unique identification and exchange of regulated information on substances

Recently Published from Information Sector

GSO ISO/IEC 10373-1:2025
ISO/IEC 10373-1:2020 
Gulf Standard
Cards and security devices for personal identification — Test methods — Part 1: General characteristics
GSO ISO/IEC TS 20000-5:2025
ISO/IEC TS 20000-5:2022 
Gulf Standard
Information technology — Service management — Part 5: Implementation guidance for ISO/IEC 20000-1
GSO ISO/IEC/IEEE 42010:2025
ISO/IEC/IEEE 42010:2022 
Gulf Standard
Software, systems and enterprise — Architecture description
GSO ISO/IEC 18033-7:2025
ISO/IEC 18033-7:2022 
Gulf Standard
Information security — Encryption algorithms — Part 7: Tweakable block ciphers