Iris Biometric Model for Secured Network Access
Seiten
2017
CRC Press (Verlag)
978-1-138-19872-2 (ISBN)
CRC Press (Verlag)
978-1-138-19872-2 (ISBN)
This book proposes a new model—the IrisCryptoAgentSystem (ICAS)—based on a biometric method for authentication using the iris of the eye. It explains how to use MAS to solve security problems in complex systems and demonstrates how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.
The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.
The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.
Franjieh El Khoury
State of the Art: Security of Computer Network Systems. Biometric Systems. Cryptography. Multi-Agent Systems (MAS). Critical Analysis on the Iris Recognition Methods: Existing Methods for the Localization of the Inner and Outer Edges of the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Proposed Model: IrisCryptoAgentSystem (lCAS): Biometric Model for the Authentication Using the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Global Model Integrating Multi-Agents System. Implementation and Simulations: Implementation of the New Methods. Simulation of the Modules. Application. Conclusion and Perspectives. Acknowledgments. Bibliography.
Erscheinungsdatum | 14.05.2017 |
---|---|
Zusatzinfo | 16 Tables, black and white; 87 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 453 g |
Themenwelt | Informatik ► Grafik / Design ► Digitale Bildverarbeitung |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Mathematik / Informatik ► Mathematik ► Logik / Mengenlehre | |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Umwelttechnik / Biotechnologie | |
ISBN-10 | 1-138-19872-2 / 1138198722 |
ISBN-13 | 978-1-138-19872-2 / 9781138198722 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Modelle für 3D-Druck und CNC entwerfen
Buch | Softcover (2022)
dpunkt (Verlag)
34,90 €
alles zum Drucken, Scannen, Modellieren
Buch | Softcover (2024)
Markt + Technik Verlag
24,95 €