Skip to:Content
|
Bottom
Cover image for Iris biometric model for secured network access
Title:
Iris biometric model for secured network access
Personal Author:
Publication Information:
Boca Raton : CRC Press, 2013
Physical Description:
xvii, 204 pages : ill. ; 24 cm
ISBN:
9781466502130

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010324789 TK7882.B56 K46 2013 Open Access Book Book
Searching...
Searching...
33000000000171 TK7882.B56 K46 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.

The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.

The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.


Table of Contents

Acknowledgmentsp. xiii
Introductionp. xv
Part 1 State of the Art
Chapter 1 Security of Computer Networksp. 3
1.1 General Overview on Different Risks for and Means of Computer Defensep. 3
1.2 Level of Security and Risksp. 3
1.2.1 Risks at the Physical Levelp. 4
1.2.2 Risks at the Level of Access to Data and Their Transmission across the Networkp. 4
1.2.3 Risks at the Network Levelp. 5
1.3 Means of Defensep. 5
1.3.1 Means of Defense at the Physical Levelp. 6
1.3.2 Means of Defense at the Level of Data and Their Transmission across the Networkp. 8
1.3.3 Means of Defense at the Network-Levelp. 10
1.4 Conclusionp. 12
Chapter 2 Biometric Systemsp. 13
2.1 Introductionp. 13
2.2 General Definition of a Biometric Systemp. 14
2.3 Different Biometric Technologiesp. 15
2.3.1 Morphological Biometricsp. 16
2.3.2 Behavioral Biometricsp. 22
2.3.3 Biological Biometricsp. 25
2.4 Comparison of the Different Biometric Techniquesp. 26
2.5 Algorithms for Iris Recognitionp. 28
2.5.1 Acquisition and Manipulation of the Imagep. 28
2.5.2 Localization of the External and Internal Edges of the Irisp. 29
2.5.3 Normalizationp. 30
2.5.4 Extraction of Biometric Characteristics of the Irisp. 31
2.5.5 Verification "Matching"p. 32
2.5.6 Effect of the Eyebrows and Upper and Lower Eyelidsp. 33
2.6 Discrete Geometry in the Definition of an Edge in an Imagep. 33
2.7 Pretopological Aspects in Image Classificationp. 34
2.7.1 Overview of the Pretopological Spacesp. 34
2.7.2 Different Types of Pretopological Structuresp. 37
2.7.3 Classification Methodp. 38
2.8 Conclusionp. 40
Chapter 3 Cryptographyp. 43
3.1 Introductionp. 43
3.2 Different Cryptographic Methodsp. 43
3.2.1 Symmetric Cryptographyp. 44
3.2.2 Asymmetric Cryptographyp. 46
3.2.3 Digital Signaturep. 48
3.2.4 Digital Certificatep. 49
3.3 Recapitulative Table of Comparison of Different Cryptographic Methodsp. 50
3.4 Conclusionp. 51
Chapter 4 Multiagent Systemp. 53
4.1 Introductionp. 53
4.2 Properties of Agentsp. 54
4.3 Types of Agentsp. 55
4.4 Communication of Agentsp. 56
4.4.1 Acts of Languagep. 57
4.4.2 Acts of Conversationp. 58
4.4.3 Languages of Communicationp. 58
4.5 Cooperation of Agentsp. 60
4.5.1 Interactionsp. 60
4.5.2 Coordinationp. 61
4.5.3 Negotiationp. 62
4.6 Planning in a Multiagent Environmentp. 64
4.7 Architectures of Agentsp. 66
4.7.1 Blackboard Architecturep. 66
4.7.2 Subsumption Architecturep. 68
4.7.3 Architecture of Competitive Tasksp. 68
4.7.4 Architecture of Production Systemsp. 69
4.7.5 Architecture of Scalable Agent-Based Information Retrieval Engine (SAIRE)p. 70
4.7.6 Architecture of Agents Based on Behaviorp. 72
4.8 Conclusionp. 73
Conclusion of Part 1p. 73
Part 2 Critical Analysis of Methods of Iris Recognition
Chapter 5 Existing Methods for Localization of External and Internal Edges of the Iris of the Eyep. 77
5.1 Introductionp. 77
5.2 Tests and Simulationsp. 78
5.2.1 First Simulation: Method of Daugman and Huangp. 78
5.2.2 Second Simulation: Method of Daugman and Huang and Tianp. 79
5.2.3 Third Simulation: Method of Daouk and Tianp. 79
5.2.4 Fourth Simulation: Method of Miyazawap. 80
5.2.5 Fifth Simulation: Method of Daouk and Tianp. 80
5.3 Analysis of Simulationsp. 80
5.3.1 Concentricity of Edges C1 and C2p. 82
5.3.2 Temporal Aspectp. 84
5.3.3 Length of Radius of Edge C1p. 86
5.3.4 Comparison of the Methods by Outranking Relationp. 87
5.4 Conclusionp. 91
Chapter 6 Existing Methods for Eliminating Effects of the Eyelidsp. 93
6.1 Introductionp. 93
6.2 Tests and Simulationsp. 93
6.2.1 First Simulation: Method of Daugman and Wildesp. 94
6.2.2 Second Simulation: Method of Myazawa and Daoukp. 95
6.2.3 Third Simulation: Method of Tianp. 95
6.3 Evaluations of Simulationsp. 96
6.4 Conclusionp. 97
Conclusion of Part 2p. 97
Part 3 Our Proposed Model: The Iris Crypto Agent System
Chapter 7 Biometric Model for Authentication Using the Iris of the Eyep. 101
7.1 Introductionp. 101
7.2 Justification of the Choice of the Proposed Biometric Modelp. 102
7.3 Description of the Biometric Modelp. 103
7.4 Representation of the Different Phases Constituting the Modelp. 105
7.4.1 Phase 1-Acquisition of the Imagep. 105
7.4.2 Phase 2-Manipulation of the Imagep. 107
7.4.3 Phase 3-Treatment of the Imagep. 107
7.4.4 Phase 4-Encryption of the Gabaritp. 113
7.4.5 Phase 5-Verificationp. 113
7.5 Conclusionp. 120
Chapter 8 Global Model Integrating a Multiagent Systemp. 123
8.1 Introductionp. 123
8.2 Global Modelp. 123
8.2.1 Architecture of the Modelp. 124
8.2.2 Representation of Interactions between Different Actorsp. 126
8.2.3 Composition of the Modelp. 128
8.3 Integration of Multiagent Systemp. 133
8.3.1 General Model of Integrated MASp. 133
8.3.2 Architecture of Agentsp. 134
8.3.3 Realization of Instances of MAS Agentsp. 135
8.3.4 Modeling Interactions between Agentsp. 142
8.3.5 Model of Scheduling Tasksp. 148
8.3.6 Architecture of MAS Modelp. 155
8.4 Conclusionp. 156
Conclusion of Part 3p. 157
Part 4 Implementation and Simulations
Chapter 9 Implementation of New Methodsp. 161
9.1 Presentation of Our Algorithm for Iris Recognitionp. 161
9.1.1 Algorithm of the Optimized Circular Hough Transformp. 161
9.1.2 Algorithm of the Determination of the Raster Tp. 163
9.1.3 Algorithm for the Classification of Gabarits DHVAp. 165
9.2 Analysis of Performancep. 168
9.3 Conclusionp. 170
Chapter 10 Simulation of Modulesp. 171
10.1 Simulations and Analysis of the Edges Localization Modulep. 171
10.1.1 Simulation of Our Modulep. 172
10.1.2 Analysis of the Simulations Based on Time Aspectsp. 172
10.2 Simulations and Analysis of the Elimination of Eyelids' Effects Modulep. 175
10.2.1 First Simulation: Two Sections of Circular Rings to Left and to Right of 150°p. 175
10.2.2 Second Simulation: One Circular Ring Section of 330°p. 176
10.2.3 Third Simulation: Intersection between Region of the Iris and a Given Ellipsep. 177
10.2.4 Evaluations of Simulationsp. 178
10.3 Simulations and Analysis of Classification of Gabarits DHVA Modulep. 179
10.4 Conclusionp. 180
Chapter 11 Applicationp. 181
11.1 Description of the Information Systemp. 181
11.2 Schema of Granted Privileges by Usersp. 182
11.3 Study of the Resourcesp. 183
11.3.1 Human Resourcesp. 183
11.3.2 Softwarep. 183
11.3.3 Hardwarep. 184
11.4 Conclusionp. 184
Conclusion of Part 4p. 184
Conclusion and Perspectivesp. 185
Referencesp. 187
Indexp. 195
Go to:Top of Page