Record:   Prev Next
Author Khoury, Franjieh El
Title Iris Biometric Model for Secured Network Access
Imprint Baton Rouge : Taylor & Francis Group, 2013
book jacket
Edition 1st ed
Descript 1 online resource (214 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note Front Cover -- Contents -- Acknowledgments -- Introduction -- Chapter 1: Security of Computer Networks -- Chapter 2: Biometric Systems -- Chapter 3: Cryptography -- Chapter 4: Multiagent System -- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye -- Chapter 6: Existing Methods for Eliminating Effects of the Eyelids -- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye -- Chapter 8: Global Model Integrating a Multiagent System -- Chapter 9: Implementation of New Methods -- Chapter 10: Simulation of Modules -- Chapter 11: Application -- Conclusion and Perspectives -- References -- Back Cover
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates. The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access. The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids
Description based on publisher supplied metadata and other sources
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries
Link Print version: Khoury, Franjieh El Iris Biometric Model for Secured Network Access Baton Rouge : Taylor & Francis Group,c2013 9781466502130
Subject Biometric identification.;Iris (Eye);Computer networks -- Security measures
Electronic books
Record:   Prev Next