Khoury | Iris Biometric Model for Secured Network Access | E-Book | www.sack.de
E-Book

E-Book, Englisch, 220 Seiten

Khoury Iris Biometric Model for Secured Network Access


Erscheinungsjahr 2013
ISBN: 978-1-4665-0214-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 220 Seiten

ISBN: 978-1-4665-0214-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.

The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.

The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.

Khoury Iris Biometric Model for Secured Network Access jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


STATE OF THE ART

Security of Computer Networks

General Overview on Different Risks for and Means of Computer Defense

Level of Security and Risks Risks at the Physical Level Risks at the Level of Access to Data and Their Transmission across the Network Risks at the Network Level

Means of Defense Means of Defense at the Physical Level Means of Defense at the Level of Data and Their Transmission across the Network Means of Defense at the Network Level

Conclusion

Biometric Systems
Introduction

General Definition of a Biometric System

Different Biometric Technologies Morphological Biometrics Behavioral Biometrics Biological Biometric
Comparison of the Different Biometric Techniques

Algorithms for Iris Recognition Acquisition and Manipulation of the Image Localization of the External and Internal Edges of the Iris Normalization Extraction of Biometric Characteristics of the Iris Verification "Matching" Effect of the Eyebrows and Upper and Lower Eyelids

Discrete Geometry in the Definition of an Edge in an Image

Pretopological Aspects in Image Classification Overview of the Pretopological Spaces Different Types of Pretopological Structures Classification Method

Conclusion

Cryptography

Introduction

Different Cryptographic Methods Symmetric Cryptography Asymmetric Cryptography Digital Signature Digital Certificate

Recapitulative Table of Comparison of Different Cryptographic Methods

Conclusion

Multiagent System

Introduction

Properties of Agents

Types of Agents

Communication of Agents Acts of Language Acts of Conversation Languages of Communication

Cooperation of Agents Interactions Coordination Negotiation

Planning in a Multiagent Environment

Architectures of Agents Blackboard Architecture Subsumption Architecture Architecture of Competitive Tasks Architecture of Production Systems Architecture of Scalable Agent-Based Information Retrieval Engine (SAIRE) Architecture of Agents Based on Behavior

Conclusion

Conclusion of Part 1

CRITICAL ANALYSIS OF METHODS OF IRIS RECOGNITION

Existing Methods for Localization of External and Internal Edges of the Iris of the Eye

Introduction

Tests and Simulations First Simulation: Method of Daugman and Huang Second Simulation: Method of Daugman and Huang and Tian Third Simulation: Method of Daouk and Tian Fourth Simulation: Method of Miyazawa Fifth Simulation: Method of Daouk and Tian

Analysis of Simulations Concentricity of Edges C1 and C2 Temporal Aspect Length of Radius of Edge C1 Comparison of the Methods by Outranking Relation

Conclusion

Existing Methods for Eliminating Effects of the Eyelids
Introduction

Tests and Simulations First Simulation: Method of Daugman and Wildes Second Simulation: Method of Myazawa and Daouk Third Simulation: Method of Tian

Evaluations of Simulations

Conclusion

Conclusion of Part 2

OUR PROPOSED MODEL: THE IRIS CRYPTO AGENT SYSTEM

Biometric Model for Authentication Using the Iris of the Eye

Introduction
Justification of the Choice of the Proposed Biometric Model

Description of the Biometric Model

Representation of the Different Phases Constituting the Model Phase 1—Acquisition of the Image Phase 2—Manipulation of the Image Phase 3—Treatment of the Image Phase 4—Encryption of the Gabarit Phase 5—Verification

Conclusion

Global Model Integrating a Multiagent System
Introduction

Global Model Architecture of the Model Representation of Interactions between Different Actors Composition of the Model

Integration of Multiagent System General Model of Integrated MAS Architecture of Agents Realization of Instances of MAS Agents Modeling Interactions between Agents Model of Scheduling Tasks Architecture of MAS Model

Conclusion

Conclusion of Part 3

IMPLEMENTATION AND SIMULATIONS

Implementation of New Methods

Presentation of Our Algorithm for Iris Recognition Algorithm of the Optimized Circular Hough Transform Algorithm of the Determination of the Raster T Algorithm for the Classification of Gabarits DHVA

Analysis of Performance

Conclusion

Simulation of Modules

Simulations and Analysis of the Edges Localization Module Simulation of Our Module Analysis of the Simulations Based on Time Aspects
Simulations and Analysis of the Elimination of Eyelids’ Effects Module First Simulation: Two Sections of Circular Rings to Left and to Right of 150° Second Simulation: One Circular Ring Section of 330° Third Simulation: Intersection between Region of the Iris and a Given Ellipse Evaluations of Simulations

Simulations and Analysis of Classification of Gabarits DHVA Module

Conclusion

Application

Description of the Information System

Schema of Granted Privileges by Users

Study of the Resources Human Resources Software Hardware

Conclusion

Conclusion of Part 4

Conclusion and Perspectives

References

Index



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.