E-Book, Englisch, 220 Seiten
Khoury Iris Biometric Model for Secured Network Access
Erscheinungsjahr 2013
ISBN: 978-1-4665-0214-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 220 Seiten
ISBN: 978-1-4665-0214-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.
The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
STATE OF THE ART
Security of Computer Networks
General Overview on Different Risks for and Means of Computer Defense
Level of Security and Risks Risks at the Physical Level Risks at the Level of Access to Data and Their Transmission across the Network Risks at the Network Level
Means of Defense Means of Defense at the Physical Level Means of Defense at the Level of Data and Their Transmission across the Network Means of Defense at the Network Level
Conclusion
Biometric Systems
Introduction
General Definition of a Biometric System
Different Biometric Technologies Morphological Biometrics Behavioral Biometrics Biological Biometric
Comparison of the Different Biometric Techniques
Algorithms for Iris Recognition Acquisition and Manipulation of the Image Localization of the External and Internal Edges of the Iris Normalization Extraction of Biometric Characteristics of the Iris Verification "Matching" Effect of the Eyebrows and Upper and Lower Eyelids
Discrete Geometry in the Definition of an Edge in an Image
Pretopological Aspects in Image Classification Overview of the Pretopological Spaces Different Types of Pretopological Structures Classification Method
Conclusion
Cryptography
Introduction
Different Cryptographic Methods Symmetric Cryptography Asymmetric Cryptography Digital Signature Digital Certificate
Recapitulative Table of Comparison of Different Cryptographic Methods
Conclusion
Multiagent System
Introduction
Properties of Agents
Types of Agents
Communication of Agents Acts of Language Acts of Conversation Languages of Communication
Cooperation of Agents Interactions Coordination Negotiation
Planning in a Multiagent Environment
Architectures of Agents Blackboard Architecture Subsumption Architecture Architecture of Competitive Tasks Architecture of Production Systems Architecture of Scalable Agent-Based Information Retrieval Engine (SAIRE) Architecture of Agents Based on Behavior
Conclusion
Conclusion of Part 1
CRITICAL ANALYSIS OF METHODS OF IRIS RECOGNITION
Existing Methods for Localization of External and Internal Edges of the Iris of the Eye
Introduction
Tests and Simulations First Simulation: Method of Daugman and Huang Second Simulation: Method of Daugman and Huang and Tian Third Simulation: Method of Daouk and Tian Fourth Simulation: Method of Miyazawa Fifth Simulation: Method of Daouk and Tian
Analysis of Simulations Concentricity of Edges C1 and C2 Temporal Aspect Length of Radius of Edge C1 Comparison of the Methods by Outranking Relation
Conclusion
Existing Methods for Eliminating Effects of the Eyelids
Introduction
Tests and Simulations First Simulation: Method of Daugman and Wildes Second Simulation: Method of Myazawa and Daouk Third Simulation: Method of Tian
Evaluations of Simulations
Conclusion
Conclusion of Part 2
OUR PROPOSED MODEL: THE IRIS CRYPTO AGENT SYSTEM
Biometric Model for Authentication Using the Iris of the Eye
Introduction
Justification of the Choice of the Proposed Biometric Model
Description of the Biometric Model
Representation of the Different Phases Constituting the Model Phase 1—Acquisition of the Image Phase 2—Manipulation of the Image Phase 3—Treatment of the Image Phase 4—Encryption of the Gabarit Phase 5—Verification
Conclusion
Global Model Integrating a Multiagent System
Introduction
Global Model Architecture of the Model Representation of Interactions between Different Actors Composition of the Model
Integration of Multiagent System General Model of Integrated MAS Architecture of Agents Realization of Instances of MAS Agents Modeling Interactions between Agents Model of Scheduling Tasks Architecture of MAS Model
Conclusion
Conclusion of Part 3
IMPLEMENTATION AND SIMULATIONS
Implementation of New Methods
Presentation of Our Algorithm for Iris Recognition Algorithm of the Optimized Circular Hough Transform Algorithm of the Determination of the Raster T Algorithm for the Classification of Gabarits DHVA
Analysis of Performance
Conclusion
Simulation of Modules
Simulations and Analysis of the Edges Localization Module Simulation of Our Module Analysis of the Simulations Based on Time Aspects
Simulations and Analysis of the Elimination of Eyelids’ Effects Module First Simulation: Two Sections of Circular Rings to Left and to Right of 150° Second Simulation: One Circular Ring Section of 330° Third Simulation: Intersection between Region of the Iris and a Given Ellipse Evaluations of Simulations
Simulations and Analysis of Classification of Gabarits DHVA Module
Conclusion
Application
Description of the Information System
Schema of Granted Privileges by Users
Study of the Resources Human Resources Software Hardware
Conclusion
Conclusion of Part 4
Conclusion and Perspectives
References
Index




