Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010324789 | TK7882.B56 K46 2013 | Open Access Book | Book | Searching... |
Searching... | 33000000000171 | TK7882.B56 K46 2013 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.
The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.
Table of Contents
Acknowledgments | p. xiii |
Introduction | p. xv |
Part 1 State of the Art | |
Chapter 1 Security of Computer Networks | p. 3 |
1.1 General Overview on Different Risks for and Means of Computer Defense | p. 3 |
1.2 Level of Security and Risks | p. 3 |
1.2.1 Risks at the Physical Level | p. 4 |
1.2.2 Risks at the Level of Access to Data and Their Transmission across the Network | p. 4 |
1.2.3 Risks at the Network Level | p. 5 |
1.3 Means of Defense | p. 5 |
1.3.1 Means of Defense at the Physical Level | p. 6 |
1.3.2 Means of Defense at the Level of Data and Their Transmission across the Network | p. 8 |
1.3.3 Means of Defense at the Network-Level | p. 10 |
1.4 Conclusion | p. 12 |
Chapter 2 Biometric Systems | p. 13 |
2.1 Introduction | p. 13 |
2.2 General Definition of a Biometric System | p. 14 |
2.3 Different Biometric Technologies | p. 15 |
2.3.1 Morphological Biometrics | p. 16 |
2.3.2 Behavioral Biometrics | p. 22 |
2.3.3 Biological Biometrics | p. 25 |
2.4 Comparison of the Different Biometric Techniques | p. 26 |
2.5 Algorithms for Iris Recognition | p. 28 |
2.5.1 Acquisition and Manipulation of the Image | p. 28 |
2.5.2 Localization of the External and Internal Edges of the Iris | p. 29 |
2.5.3 Normalization | p. 30 |
2.5.4 Extraction of Biometric Characteristics of the Iris | p. 31 |
2.5.5 Verification "Matching" | p. 32 |
2.5.6 Effect of the Eyebrows and Upper and Lower Eyelids | p. 33 |
2.6 Discrete Geometry in the Definition of an Edge in an Image | p. 33 |
2.7 Pretopological Aspects in Image Classification | p. 34 |
2.7.1 Overview of the Pretopological Spaces | p. 34 |
2.7.2 Different Types of Pretopological Structures | p. 37 |
2.7.3 Classification Method | p. 38 |
2.8 Conclusion | p. 40 |
Chapter 3 Cryptography | p. 43 |
3.1 Introduction | p. 43 |
3.2 Different Cryptographic Methods | p. 43 |
3.2.1 Symmetric Cryptography | p. 44 |
3.2.2 Asymmetric Cryptography | p. 46 |
3.2.3 Digital Signature | p. 48 |
3.2.4 Digital Certificate | p. 49 |
3.3 Recapitulative Table of Comparison of Different Cryptographic Methods | p. 50 |
3.4 Conclusion | p. 51 |
Chapter 4 Multiagent System | p. 53 |
4.1 Introduction | p. 53 |
4.2 Properties of Agents | p. 54 |
4.3 Types of Agents | p. 55 |
4.4 Communication of Agents | p. 56 |
4.4.1 Acts of Language | p. 57 |
4.4.2 Acts of Conversation | p. 58 |
4.4.3 Languages of Communication | p. 58 |
4.5 Cooperation of Agents | p. 60 |
4.5.1 Interactions | p. 60 |
4.5.2 Coordination | p. 61 |
4.5.3 Negotiation | p. 62 |
4.6 Planning in a Multiagent Environment | p. 64 |
4.7 Architectures of Agents | p. 66 |
4.7.1 Blackboard Architecture | p. 66 |
4.7.2 Subsumption Architecture | p. 68 |
4.7.3 Architecture of Competitive Tasks | p. 68 |
4.7.4 Architecture of Production Systems | p. 69 |
4.7.5 Architecture of Scalable Agent-Based Information Retrieval Engine (SAIRE) | p. 70 |
4.7.6 Architecture of Agents Based on Behavior | p. 72 |
4.8 Conclusion | p. 73 |
Conclusion of Part 1 | p. 73 |
Part 2 Critical Analysis of Methods of Iris Recognition | |
Chapter 5 Existing Methods for Localization of External and Internal Edges of the Iris of the Eye | p. 77 |
5.1 Introduction | p. 77 |
5.2 Tests and Simulations | p. 78 |
5.2.1 First Simulation: Method of Daugman and Huang | p. 78 |
5.2.2 Second Simulation: Method of Daugman and Huang and Tian | p. 79 |
5.2.3 Third Simulation: Method of Daouk and Tian | p. 79 |
5.2.4 Fourth Simulation: Method of Miyazawa | p. 80 |
5.2.5 Fifth Simulation: Method of Daouk and Tian | p. 80 |
5.3 Analysis of Simulations | p. 80 |
5.3.1 Concentricity of Edges C1 and C2 | p. 82 |
5.3.2 Temporal Aspect | p. 84 |
5.3.3 Length of Radius of Edge C1 | p. 86 |
5.3.4 Comparison of the Methods by Outranking Relation | p. 87 |
5.4 Conclusion | p. 91 |
Chapter 6 Existing Methods for Eliminating Effects of the Eyelids | p. 93 |
6.1 Introduction | p. 93 |
6.2 Tests and Simulations | p. 93 |
6.2.1 First Simulation: Method of Daugman and Wildes | p. 94 |
6.2.2 Second Simulation: Method of Myazawa and Daouk | p. 95 |
6.2.3 Third Simulation: Method of Tian | p. 95 |
6.3 Evaluations of Simulations | p. 96 |
6.4 Conclusion | p. 97 |
Conclusion of Part 2 | p. 97 |
Part 3 Our Proposed Model: The Iris Crypto Agent System | |
Chapter 7 Biometric Model for Authentication Using the Iris of the Eye | p. 101 |
7.1 Introduction | p. 101 |
7.2 Justification of the Choice of the Proposed Biometric Model | p. 102 |
7.3 Description of the Biometric Model | p. 103 |
7.4 Representation of the Different Phases Constituting the Model | p. 105 |
7.4.1 Phase 1-Acquisition of the Image | p. 105 |
7.4.2 Phase 2-Manipulation of the Image | p. 107 |
7.4.3 Phase 3-Treatment of the Image | p. 107 |
7.4.4 Phase 4-Encryption of the Gabarit | p. 113 |
7.4.5 Phase 5-Verification | p. 113 |
7.5 Conclusion | p. 120 |
Chapter 8 Global Model Integrating a Multiagent System | p. 123 |
8.1 Introduction | p. 123 |
8.2 Global Model | p. 123 |
8.2.1 Architecture of the Model | p. 124 |
8.2.2 Representation of Interactions between Different Actors | p. 126 |
8.2.3 Composition of the Model | p. 128 |
8.3 Integration of Multiagent System | p. 133 |
8.3.1 General Model of Integrated MAS | p. 133 |
8.3.2 Architecture of Agents | p. 134 |
8.3.3 Realization of Instances of MAS Agents | p. 135 |
8.3.4 Modeling Interactions between Agents | p. 142 |
8.3.5 Model of Scheduling Tasks | p. 148 |
8.3.6 Architecture of MAS Model | p. 155 |
8.4 Conclusion | p. 156 |
Conclusion of Part 3 | p. 157 |
Part 4 Implementation and Simulations | |
Chapter 9 Implementation of New Methods | p. 161 |
9.1 Presentation of Our Algorithm for Iris Recognition | p. 161 |
9.1.1 Algorithm of the Optimized Circular Hough Transform | p. 161 |
9.1.2 Algorithm of the Determination of the Raster T | p. 163 |
9.1.3 Algorithm for the Classification of Gabarits DHVA | p. 165 |
9.2 Analysis of Performance | p. 168 |
9.3 Conclusion | p. 170 |
Chapter 10 Simulation of Modules | p. 171 |
10.1 Simulations and Analysis of the Edges Localization Module | p. 171 |
10.1.1 Simulation of Our Module | p. 172 |
10.1.2 Analysis of the Simulations Based on Time Aspects | p. 172 |
10.2 Simulations and Analysis of the Elimination of Eyelids' Effects Module | p. 175 |
10.2.1 First Simulation: Two Sections of Circular Rings to Left and to Right of 150° | p. 175 |
10.2.2 Second Simulation: One Circular Ring Section of 330° | p. 176 |
10.2.3 Third Simulation: Intersection between Region of the Iris and a Given Ellipse | p. 177 |
10.2.4 Evaluations of Simulations | p. 178 |
10.3 Simulations and Analysis of Classification of Gabarits DHVA Module | p. 179 |
10.4 Conclusion | p. 180 |
Chapter 11 Application | p. 181 |
11.1 Description of the Information System | p. 181 |
11.2 Schema of Granted Privileges by Users | p. 182 |
11.3 Study of the Resources | p. 183 |
11.3.1 Human Resources | p. 183 |
11.3.2 Software | p. 183 |
11.3.3 Hardware | p. 184 |
11.4 Conclusion | p. 184 |
Conclusion of Part 4 | p. 184 |
Conclusion and Perspectives | p. 185 |
References | p. 187 |
Index | p. 195 |