Khoury | Iris Biometric Model for Secured Network Access | E-Book | sack.de
E-Book

E-Book, Englisch, 220 Seiten

Khoury Iris Biometric Model for Secured Network Access


Erscheinungsjahr 2013
ISBN: 978-1-4665-0214-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 220 Seiten

ISBN: 978-1-4665-0214-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.

The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.

The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.

Khoury Iris Biometric Model for Secured Network Access jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


STATE OF THE ART

Security of Computer Networks
General Overview on Different Risks for and Means of Computer Defense
Level of Security and Risks
Risks at the Physical Level
Risks at the Level of Access to Data and Their Transmission across the Network
Risks at the Network Level
Means of Defense
Means of Defense at the Physical Level
Means of Defense at the Level of Data and Their Transmission across the Network
Means of Defense at the Network Level
Conclusion

Biometric Systems
Introduction
General Definition of a Biometric System
Different Biometric Technologies
Morphological Biometrics
Behavioral Biometrics
Biological Biometric
Comparison of the Different Biometric Techniques
Algorithms for Iris Recognition
Acquisition and Manipulation of the Image
Localization of the External and Internal Edges of the Iris
Normalization
Extraction of Biometric Characteristics of the Iris
Verification "Matching"
Effect of the Eyebrows and Upper and Lower Eyelids
Discrete Geometry in the Definition of an Edge in an Image
Pretopological Aspects in Image Classification
Overview of the Pretopological Spaces
Different Types of Pretopological Structures
Classification Method
Conclusion

Cryptography
Introduction
Different Cryptographic Methods
Symmetric Cryptography
Asymmetric Cryptography
Digital Signature
Digital Certificate
Recapitulative Table of Comparison of Different Cryptographic Methods
Conclusion

Multiagent System
Introduction
Properties of Agents
Types of Agents
Communication of Agents
Acts of Language
Acts of Conversation
Languages of Communication
Cooperation of Agents
Interactions
Coordination
Negotiation
Planning in a Multiagent Environment
Architectures of Agents
Blackboard Architecture
Subsumption Architecture
Architecture of Competitive Tasks
Architecture of Production Systems
Architecture of Scalable Agent-Based Information Retrieval Engine (SAIRE)
Architecture of Agents Based on Behavior
Conclusion
Conclusion of Part 1

CRITICAL ANALYSIS OF METHODS OF IRIS RECOGNITION

Existing Methods for Localization of External and Internal Edges of the Iris of the Eye
Introduction
Tests and Simulations
First Simulation: Method of Daugman and Huang
Second Simulation: Method of Daugman and Huang and Tian
Third Simulation: Method of Daouk and Tian
Fourth Simulation: Method of Miyazawa
Fifth Simulation: Method of Daouk and Tian
Analysis of Simulations
Concentricity of Edges C1 and C2
Temporal Aspect
Length of Radius of Edge C1
Comparison of the Methods by Outranking Relation
Conclusion
Existing Methods for Eliminating Effects of the Eyelids
Introduction
Tests and Simulations
First Simulation: Method of Daugman and Wildes
Second Simulation: Method of Myazawa and Daouk
Third Simulation: Method of Tian
Evaluations of Simulations
Conclusion
Conclusion of Part 2

OUR PROPOSED MODEL: THE IRIS CRYPTO AGENT SYSTEM

Biometric Model for Authentication Using the Iris of the Eye
Introduction
Justification of the Choice of the Proposed Biometric Model
Description of the Biometric Model
Representation of the Different Phases Constituting the Model
Phase 1—Acquisition of the Image
Phase 2—Manipulation of the Image
Phase 3—Treatment of the Image
Phase 4—Encryption of the Gabarit
Phase 5—Verification
Conclusion
Global Model Integrating a Multiagent System
Introduction
Global Model
Architecture of the Model
Representation of Interactions between Different Actors
Composition of the Model
Integration of Multiagent System
General Model of Integrated MAS
Architecture of Agents
Realization of Instances of MAS Agents
Modeling Interactions between Agents
Model of Scheduling Tasks
Architecture of MAS Model
Conclusion
Conclusion of Part 3

IMPLEMENTATION AND SIMULATIONS

Implementation of New Methods
Presentation of Our Algorithm for Iris Recognition
Algorithm of the Optimized Circular Hough Transform
Algorithm of the Determination of the Raster T
Algorithm for the Classification of Gabarits DHVA
Analysis of Performance
Conclusion

Simulation of Modules
Simulations and Analysis of the Edges Localization Module
Simulation of Our Module
Analysis of the Simulations Based on Time Aspects
Simulations and Analysis of the Elimination of Eyelids’ Effects Module
First Simulation: Two Sections of Circular Rings to Left and to Right of 150°
Second Simulation: One Circular Ring Section of 330°
Third Simulation: Intersection between Region of the Iris and a Given Ellipse
Evaluations of Simulations
Simulations and Analysis of Classification of Gabarits DHVA Module
Conclusion

Application
Description of the Information System
Schema of Granted Privileges by Users
Study of the Resources
Human Resources
Software
Hardware
Conclusion
Conclusion of Part 4

Conclusion and Perspectives
References
Index



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.