ebook img

Iris biometric model for secured network access PDF

215 Pages·2013·10.258 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Iris biometric model for secured network access

Information Technology / Securing & Auditing E IIrriiss BBiioommeettrriicc l K In the last few years, biometric techniques have proven their ability to provide h o secure access to shared resources in various domains. Furthermore, software u r MMooddeell ffoorr SSeeccuurreedd agents and multi-agent systems (MAS) have shown their efficiency in resolving y critical network problems. I Iris Biometric Model for Secured Network Access proposes a new model, r NNeettwwoorrkk AAcccceessss i the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for s authentication using the iris of the eyes and an asymmetric cryptography method B using “Rivest-Shamir-Adleman” (RSA) in an agent-based architecture. It focuses i o on the development of new methods in biometric authentication in order to provide m greater efficiency in the ICAS model. It also covers the pretopological aspects in e the development of the indexed hierarchy to classify DRVA iris templates. t r i c The book introduces biometric systems, cryptography, and multi-agent systems M (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of o fields through the integration of various features of agents, it also explains how d e the intersection of biometric systems, cryptography, and MAS can apply to iris l recognition for secure network access. f o r The book presents the various conventional methods for the localization of external S and internal edges of the iris of the eye based on five simulations and details the e effectiveness of each. It also improves upon existing methods for the localization c u of the external and internal edges of the iris and for removing the intrusive effects r of the eyelids. e d N e t w o r k A c K14421 c e Franjieh El Khoury ISBN: 978-1-4665-0213-0 s 90000 s www.crcpress.com 9 781466 502130 www.auerbach-publications.com K14421 cvr mech.indd 1 4/12/13 8:51 AM Iris Biometric Model for Secured Network Access OTHER TITlES FROM AUERBACH PUBlICATIONS AND CRC PRESS Ad Hoc Mobile Wireless Networks: Principles, Guide to the De-Identification of Protocols, and Applications, Second Edition Personal Health Information Subir Kumar Sarkar, T.G. Basavaraju, Khaled El Emam and C. Puttamadappa ISBN 978-1-4665-7906-4 ISBN 978-1-4665-1446-1 Identification and Management of Android Security: Attacks and Defenses Distributed Data: NGN, Content-Centric Anmol Misra and Abhishek Dubey Networks and the Web ISBN 978-1-4398-9646-4 Giovanni Bartolomeo and Tatiana Kovacikova Applying Guiding Principles of Effective ISBN 978-1-4398-7907-8 Program Delivery Kerry R. Wills Information Security Policy Development ISBN 978-1-4665-8789-2 for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, Automatic Defense Against Zero-day PCI DSS V2.0, and AUP V5.0 Polymorphic Worms in Communication Barry L. Williams Networks ISBN 978-1-4665-8058-9 Mohssen Mohammed and Al-Sakib Khan Pathan ISBN 978-1-4665-5727-7 Iris Biometric Model for Secured Network Access Big Data and Business Analytics Franjieh El Khoury Jay Liebowitz (Editor) ISBN 978-1-4665-6578-4 ISBN 978-1-4665-0213-0 Bring Your Own Devices (BYOD) Next Generation Mobile Broadcasting Survival Guide David Gómez-Barquero Jessica Keyes ISBN 978-1-4398-9866-6 ISBN 978-1-4665-6503-6 Optimal Resource Allocation for Distributed The Complete Book of Data Anonymization: Video and Multimedia Communications From Planning to Implementation Yifeng He, Ling Guan, and Wenwu Zhu Balaji Raghunathan ISBN 978-1-4398-7514-8 ISBN 978-1-4398-7730-2 PRAGMATIC Security Metrics: Data Governance: Creating Value from Applying Metametrics to Information Information Assets Security Neera Bhansali (Editor) W. Krag Brotby and Gary Hinson ISBN 978-1-4398-7913-9 ISBN 978-1-4398-8152-1 Data Mining Mobile Devices Jesus Mena Return On Process (ROP): Getting ISBN 978-1-4665-5595-2 Real Performance Results from Process Improvement Driving Business Value with Technology Michael West and Big Data ISBN 978-1-4398-8639-7 Benjamin Woo ISBN 978-1-4665-8054-1 Securing Cloud and Mobility: A Practitioner’s Guide Effective Surveillance for Homeland Security: Ian Lim, E. Coleen Coolidge, and Paul Hourani Balancing Technology and Social Issues ISBN 978-1-4398-5055-8 Francesco Flammini, Roberto Setola, and Giorgio Franceschetti (Editors) Security and Privacy in Smart Grids ISBN 978-1-4398-8324-2 Yang Xiao (Editor) Enterprise Dynamics Sourcebook ISBN 978-1-4398-7783-8 Kenneth C. Hoffman, Christopher G. Glazner, William J. Bunting, Leonard A. Wojcik, Unit and Ubiquitous Internet of Things and Anne Cady Huansheng Ning ISBN 978-1-4200-8256-2 ISBN 978-1-4665-6166-3 Iris Biometric Model for Secured Network Access Franjieh El Khoury CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2013 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20130322 International Standard Book Number-13: 978-1-4665-0214-7 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Dedication To my father, I dedicate this work. Contest all limits . . . Contents Acknowledgments xiii IntroductIon xv Part 1 State of the art ChaPter 1 SeCurity of ComPuter NetworkS 3 1.1 General Overview on Different Risks for and Means of Computer Defense 3 1.2 Level of Security and Risks 3 1.2.1 Risks at the Physical Level 4 1.2.2 Risks at the Level of Access to Data and Their Transmission across the Network 4 1.2.3 Risks at the Network Level 5 1.3 Means of Defense 5 1.3.1 Means of Defense at the Physical Level 6 1.3.2 Means of Defense at the Level of Data and Their Transmission across the Network 8 1.3.3 Means of Defense at the Network Level 10 1.4 Conclusion 12 ChaPter 2 BiometriC SyStemS 13 2.1 Introduction 13 2.2 General Definition of a Biometric System 14 2.3 Different Biometric Technologies 15 2.3.1 Morphological Biometrics 16 2.3.2 Behavioral Biometrics 22 2.3.3 Biological Biometrics 25 vii viii Contents 2.4 Comparison of the Different Biometric Techniques 26 2.5 Algorithms for Iris Recognition 28 2.5.1 Acquisition and Manipulation of the Image 28 2.5.2 Localization of the External and Internal Edges of the Iris 29 2.5.3 Normalization 30 2.5.4 Extraction of Biometric Characteristics of the Iris 31 2.5.5 Verification “Matching” 32 2.5.6 Effect of the Eyebrows and Upper and Lower Eyelids 33 2.6 Discrete Geometry in the Definition of an Edge in an Image 33 2.7 Pretopological Aspects in Image Classification 34 2.7.1 Overview of the Pretopological Spaces 34 2.7.2 Different Types of Pretopological Structures 37 2.7.3 Classification Method 38 2.8 Conclusion 40 ChaPter 3 CryPtograPhy 43 3.1 Introduction 43 3.2 Different Cryptographic Methods 43 3.2.1 Symmetric Cryptography 44 3.2.2 Asymmetric Cryptography 46 3.2.3 Digital Signature 48 3.2.4 Digital Certificate 49 3.3 Recapitulative Table of Comparison of Different Cryptographic Methods 50 3.4 Conclusion 51 ChaPter 4 multiageNt SyStem 53 4.1 Introduction 53 4.2 Properties of Agents 54 4.3 Types of Agents 55 4.4 Communication of Agents 56 4.4.1 Acts of Language 57 4.4.2 Acts of Conversation 58 4.4.3 Languages of Communication 58 4.5 Cooperation of Agents 60 4.5.1 Interactions 60 4.5.2 Coordination 61 4.5.3 Negotiation 62 4.6 Planning in a Multiagent Environment 64 4.7 Architectures of Agents 66 4.7.1 Blackboard Architecture 66 4.7.2 Subsumption Architecture 68 4.7.3 Architecture of Competitive Tasks 68 4.7.4 Architecture of Production Systems 69

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.