Sign up
Forgot password?
FAQ: Login

El Khoury F. Iris Biometric Model for Secured Network Access

  • pdf file
  • size 2,54 MB
  • added by
  • info modified
El Khoury F. Iris Biometric Model for Secured Network Access
CRC Press, 2013. — 215 p.
The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality and its advantages and disadvantages. On the one hand, the transition from a centralized to a decentralized system distributed locally or remotely has facilitated the tasks in various sectors (e.g., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at an international level and allowed operations to be conducted remotely (e.g., e-commerce, e-banking, etc.). In addition to the Internet, there is the mobile network that provides advanced services (e.g., multimedia messaging, Internet access, etc.).
This growth was followed by development of several methods of accessing data such as traditional (e.g., password, smart card, etc.) or biometrics (e.g., fingerprint, hand geometry, iris identification, etc.).
The complexity of computer networks, the variety of applications, and traditional methods of accessing security encountered difficulties regarding access controls to data and increased risk of attack of confidential information.
In order to provide a network’s user a well-secured access level and guarantee the protection of confidential information, our study focuses on the development of the model IrisCryptoAgentSystem (ICAS), which can meet these objectives. This model is based on the biometric method of the iris of the eye (for authentication of individuals) and the method of asymmetric encryption (for data encryption).
We also propose to integrate a multiagent system (MAS) composed of agents of different types (e.g., biometrics, cryptography, etc.). The MAS system must be capable of meeting the multiexpertise present in our model.
State of the Art
Security of Computer Networks
Biometric Systems
Cryptography
Multiagent System
Critical Analysis of Methods of Iris Recognition
Existing Methods for Localization of External and Internal Edges of the Iris of the Eye
Existing Methods for Eliminating Effects of the Eyelids
Our Proposed Model: The Iris Crypto Agent System
Biometric Model for Authentication Using the Iris of the Eye
Global Model Integrating a Multiagent System
Implementation and Simulations
Implementation of New Methods
Simulation of Modules
Application
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up