Iris Biometric Model for Secured Network Access  book cover
SAVE
$12.99
1st Edition

Iris Biometric Model for Secured Network Access





ISBN 9781138198722
Published October 23, 2017 by CRC Press
220 Pages - 87 B/W Illustrations

 
SAVE ~ $12.99
was $64.95
USD $51.96

Prices & shipping based on shipping country


Preview

Book Description

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.

The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.

The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.

Table of Contents

STATE OF THE ART

Security of Computer Networks
General Overview on Different Risks for and Means of Computer Defense
Level of Security and Risks
     Risks at the Physical Level 
     Risks at the Level of Access to Data and Their Transmission across the Network
     Risks at the Network Level
Means of Defense 
     Means of Defense at the Physical Level 
     Means of Defense at the Level of Data and Their Transmission across the Network 
     Means of Defense at the Network Level
Conclusion

Biometric Systems
Introduction
General Definition of a Biometric System
Different Biometric Technologies 
     Morphological Biometrics
     Behavioral Biometrics 
     Biological Biometric
Comparison of the Different Biometric Techniques
Algorithms for Iris Recognition 
     Acquisition and Manipulation of the Image 
     Localization of the External and Internal Edges of the Iris 
     Normalization 
     Extraction of Biometric Characteristics of the Iris 
     Verification "Matching" 
     Effect of the Eyebrows and Upper and Lower Eyelids
Discrete Geometry in the Definition of an Edge in an Image
Pretopological Aspects in Image Classification 
     Overview of the Pretopological Spaces 
     Different Types of Pretopological Structures 
     Classification Method
Conclusion

Cryptography
Introduction
Different Cryptographic Methods 
     Symmetric Cryptography 
     Asymmetric Cryptography 
     Digital Signature 
     Digital Certificate
Recapitulative Table of Comparison of Different Cryptographic Methods
Conclusion

Multiagent System
 
Introduction
Properties of Agents 
Types of Agents 
Communication of Agents 
     Acts of Language 
     Acts of Conversation 
     Languages of Communication 
Cooperation of Agents 
     Interactions 
     Coordination 
     Negotiation
Planning in a Multiagent Environment
Architectures of Agents 
     Blackboard Architecture 
     Subsumption Architecture 
     Architecture of Competitive Tasks 
     Architecture of Production Systems 
     Architecture of Scalable Agent-Based Information Retrieval Engine (SAIRE) 
     Architecture of Agents Based on Behavior
Conclusion
Conclusion of Part 1

CRITICAL ANALYSIS OF METHODS OF IRIS RECOGNITION

Existing Methods for Localization of External and Internal Edges of the Iris of the Eye
Introduction
Tests and Simulations 
     First Simulation: Method of Daugman and Huang 
     Second Simulation: Method of Daugman and Huang and Tian 
     Third Simulation: Method of Daouk and Tian 
     Fourth Simulation: Method of Miyazawa 
     Fifth Simulation: Method of Daouk and Tian
Analysis of Simulations 
     Concentricity of Edges C1 and C2 
     Temporal Aspect 
     Length of Radius of Edge C1
     Comparison of the Methods by Outranking Relation
Conclusion

Existing Methods for Eliminating Effects of the Eyelids
Introduction 
Tests and Simulations 
     First Simulation: Method of Daugman and Wildes 
     Second Simulation: Method of Myazawa and Daouk 
     Third Simulation: Method of Tian
Evaluations of Simulations
Conclusion
Conclusion of Part 2

OUR PROPOSED MODEL: THE IRIS CRYPTO AGENT SYSTEM

Biometric Model for Authentication Using the Iris of the Eye 
Introduction
Justification of the Choice of the Proposed Biometric Model 
Description of the Biometric Model 
Representation of the Different Phases Constituting the Model 
     Phase 1—Acquisition of the Image 
     Phase 2—Manipulation of the Image 
     Phase 3—Treatment of the Image 
     Phase 4—Encryption of the Gabarit 
     Phase 5—Verification
Conclusion

Global Model Integrating a Multiagent System
Introduction
Global Model 
     Architecture of the Model 
     Representation of Interactions between Different Actors 
     Composition of the Model
Integration of Multiagent System 
     General Model of Integrated MAS 
     Architecture of Agents 
     Realization of Instances of MAS Agents 
     Modeling Interactions between Agents 
     Model of Scheduling Tasks 
     Architecture of MAS Model
Conclusion
Conclusion of Part 3

IMPLEMENTATION AND SIMULATIONS

Implementation of New Methods
Presentation of Our Algorithm for Iris Recognition 
     Algorithm of the Optimized Circular Hough Transform 
     Algorithm of the Determination of the Raster T 
     Algorithm for the Classification of Gabarits DHVA
Analysis of Performance
Conclusion

Simulation of Modules 
Simulations and Analysis of the Edges Localization Module 
     Simulation of Our Module 
     Analysis of the Simulations Based on Time Aspects
Simulations and Analysis of the Elimination of Eyelids’ Effects Module 
     First Simulation: Two Sections of Circular Rings to Left and to Right of 150° 
     Second Simulation: One Circular Ring Section of 330° 
     Third Simulation: Intersection between Region of the Iris and a Given Ellipse
     Evaluations of Simulations 
Simulations and Analysis of Classification of Gabarits DHVA Module
Conclusion

Application
Description of the Information System
Schema of Granted Privileges by Users
Study of the Resources 
     Human Resources 
     Software 
     Hardware
Conclusion
Conclusion of Part 4

Conclusion and Perspectives
References
Index

...
View More