Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Secure Iris Authentication Using Visual Cryptography  [PDF]
P. S. Revenkar,Anisa Anjum,W. Z. Gandhare
Computer Science , 2010,
Abstract: Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to security threats biometric template may be modified by attacker. If biometric template is altered authorized user will not be allowed to access the resource. To deal this issue visual cryptography schemes can be applied to secure the iris template. Visual cryptography provides great means for helping such security needs as well as extra layer of authentication.
A new scheme of signature extraction for iris authentication  [PDF]
Belhassen Akrout,Imen Khanfir Kallel,Chokri Ben Amar
Computer Science , 2013, DOI: 10.1109/SSD.2009.4956749
Abstract: Iris recognition, a relatively new biometric technology, has great advantages, such as variability, stability and security, thus is the most promising for high security environment. Iris recognition is proposed in this report. We describe some methods, the first one is based on grey level histogram to extract the pupil, the second is based on elliptic and parabolic HOUGH transformation to determinate the edge of iris, upper and lower eyelids, the third we used 2D Gabor Wavelets to encode the iris and finally we used the Hamming distance for authentication.
Biometric Authentication System based on Iris Patterns  [PDF]
G. Sathish,Dr. S.V. Saravanan,Dr. S. Narmadha,Dr. S. Uma Maheswari
International Journal of Computer Science and Management Studies , 2012,
Abstract: In the present age of digital impersonation, biometrictechniques are being used increasingly to prevaricateagainst identity thefts. Iris recognition is a proven,accurate means to identify people. Iris is regarded as themost reliable biometric feature in terms of its uniquenessand robustness. The objective of this work is to present abiometric authentication system for high securityphysical access control based on iris pattern. Theproposed iris recognition with improvement in segmentation and matching stages using Hamming distance provides match for iris pattern if hamming distance is below 0.15. The CASIA IRIS image database of Chinese Academy of Sciences Institute of Automation is used and the system is implemented in MATLAB. The proposed approach found to report higher verification accuracy of 99.2%.
Highly secured crypto-IRIS based authentication system  [PDF]
S.Kavin hari hara sudhan,K.P.Rajasekar,R.Balaji
International Journal of Computer Technology and Applications , 2012,
Abstract: Nowadays bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, revocability, privacy, and accuracy. In this paper, we propose a provably two way secured biometric authentication system, which addresses the concerns of user’s privacy, template protection, trust issues, network security, and accuracy. The system is highly secure in the sense, biometric details are going to be encrypted twice, the system won’t reveal any additional information about the user or biometric, to the authenticating server’s database or to the insecure network. In this system two different encryption algorithms have been used both in the client and server side. One is public key cryptography another one is private key cryptography. User’s privacy as concern it is revealing only the identity of the user. In template protection this protocol will store the template as encrypted form. Protocol will provide trust between remote user and server, while a remote user cannot be reliably identified without biometric information. Since network security as concern protocol is not revealing the plain biometric details while it is passed through the network. The proposed approach has no restrictions on the biometric data used and it is applicable for multiple biometrics(face, iris, hand geometry, and finger print).Authentication by using two way encryption will give additional layer of security when comparing with existing system.
Journal of Global Research in Computer Science , 2010,
Abstract: Cloud computing provides amble opportunity in many areas. In our Cloud Data Server provides fast and reliable software service to its clients.In that service authentication for identifying authorized user as a major issue. So we proposed a novel security mechanism named as iris cloud verification. The Cloud Iris Verification System(CIVS) enables authorized user to access software as a service from cloud server. It is suggested in recent biometric literature that human irises might be as distinct as fingerprints for different individuals, leading to the idea that iris patterns may contain unique identification features. An CIVS compares a newly acquired iris pattern with a retrieved iris pattern from a data base to decide if they originated from the same eye. Iris patterns are collected from images of the eye. Our system proposes novel and efficient cloud iris recognition method that employs cumulative SUM based grey change analysis. Iris recognition includes security to cloud server from unauthorized access. We demonstrate the effectiveness and feasibility of our method on a thousands of eye images for defense forces. The efficiency ratio of this computation process is 93.17.
Neural Network Based Normalized Fusion Approaches for Optimized Multimodal Biometric Authentication Algorithm  [PDF]
E. Sujatha, A. Chilambuchelvan
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.78103
Abstract: A multimodal biometric system is applied to recognize individuals for authentication using neural networks. In this paper multimodal biometric algorithm is designed by integrating iris, finger vein, palm print and face biometric traits. Normalized score level fusion approach is applied and optimized, encoded for matching decision. It is a multilevel wavelet, phase based fusion algorithm. This robust multimodal biometric algorithm increases the security level, accuracy, reduces memory size and equal error rate and eliminates unimodal biometric algorithm vulnerabilities.
The Network Identity Authentication System Based on Iris Feature Identification
Hua Jiang,Shasha Zhang
Modern Applied Science , 2009, DOI: 10.5539/mas.v3n5p127
Abstract: By researching the mothed of iris identification integrating the iris features with the secure network communication, this paper designs a new Iris-Based Network Authentification System. The system can complete access control in security. The system has many merits, such as finer security, high identification rate, and so on.
A Security Algorithm for Iris Based Biometric System
International Journal of Engineering Science and Technology , 2010,
Abstract: Biometrics is a field which is evolving regularly and also ncorporated classes of security approaches itself in recent years for user authentication. Proposed approach uses iris recognition as a example to explore an idea to build secure biometric systems. After segmenting and identifying the region of the iris, the process of normalization done. Then uniquely robust features of each person’s iris which have extracted, further used to match with iris template which is already saved in database. In this work we will give a new approach of user authentication which uses both eyes of same user. In order to provide privacy protection and deter unauthorized use of biometric sensitive data, iris feature(s) should be properly encrypted by applying cryptographic techniques and image processingapproach jointly. This paper discusses a suitable approach for secure and robust biometric matching.
Performance of Personal Identification System Technique Using Iris Biometrics Technology  [cached]
V.K. Narendira Kumar,B. Srinivasan
International Journal of Image, Graphics and Signal Processing , 2013, DOI: 10.5815/ijigsp.2013.05.08
Abstract: The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris recognition uses iris patterns for personnel identification. The system steps are capturing iris patterns; determining the location of iris boundaries; converting the iris boundary to the stretched polar coordinate system; extracting iris code based on texture analysis. The system has been implemented and tested using dataset of number of samples of iris data with different contrast quality. The developed algorithm performs satisfactorily on the images, provides 93% accuracy. Experimental results show that the proposed method has an encouraging performance.
Investigation on Optimization in Segmentation Phase of Iris Recognition
Selvamuthukumaran Shanmugam,Malmurugan Nagarajan
Journal of Applied Computer Science & Mathematics , 2010,
Abstract: In a progressively more digital society, the demandfor secure identification has led to amplified development ofbiometric systems. Iris biometric systems are becoming widelyadopted and accepted as one of the most effective ways topositively identify people. In this paper, the Segmentation phasesof Iris recognition has been examined. The performance of theSegmentation phase could be amplified by the proposedoptimization technique- Optimized Iris Segmentation using SobelEdge Detection. By the proposed method, the overall rank-onerecognition rate of 90% is being achieved which is much betterthan reported accuracies for iris recognition in the literature.Also the proposed approach makes the overall iris recognitionsystem performance by the improvement factor of 10 fold as well.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.