Novel Secured Biometric System Procuring Miniaturized Prorogation

Full Text (PDF, 987KB), PP.31-41

Views: 0 Downloads: 0

Author(s)

Sherin Zafar 1,* Ayesha Hena Afzal 1 M. Afshar Alam 1

1. Department of Computer Science Engineering, JamiaHamdard, New Delhi, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2018.11.04

Received: 1 Sep. 2018 / Revised: 21 Sep. 2018 / Accepted: 18 Oct. 2018 / Published: 8 Nov. 2018

Index Terms

Biometric, Iris Recognition System, Security Challenges, Normalization, Template Matching, Hamming Distance

Abstract

Different organizations in today’s scenario are fully dependent on information technology for their survival, suffer from various security challenges like unauthorized access, physical damages etc. To avoid various security breaches and concerns, robust mechanism for user access need to be adopted that not only secure of valuable data but can also be utilized for developing various other security applications. “Biometric” secured technology is gaining attention for over traditional security mechanism like password, smart card etc. because information related to biometric are difficult to steal as compared to other mechanisms. In this research analysis “strong biometric approach” is proposed to overcome security apprehensions of various organizations& society through iris recognition system. Iris recognition system is a mechanism to identify a person through analyzing his or her iris pattern. This recognition system includes iris image acquisition, segmentation, normalization, encoding, matching and finally validation of iris templates. The iris recognition system developed and simulated in this research study has taken IIT database iris images as inputs and utilized hamming distance as the matching parameter. The simulated results depict an efficient and novel secured approach that will overcome various unauthorized accesses across the internet. The most novel approach of this iris based recognition system as compared to other traditional systems is that, if selected images are matched with trained iris images present in database then the resultant hamming distance as most of the iris recognition systems directly accept or reject images and causes huge congestion and execution prorogations.

Cite This Paper

Sherin Zafar, Ayesha Hena Afzal, M. Afshar Alam, "Novel Secured Biometric System Procuring Miniaturized Prorogation", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.11, pp.31-41, 2018. DOI:10.5815/ijcnis.2018.11.04

Reference

[1]S. Zafar et al., “An optimized genetic stowed biometric approach to potent QOS in MANET” International Conference on Soft computing and Software Engineering (SCSE) 2015.
[2]J. Daugman, “How Iris Recognition Works”. IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, 2004.
[3]B. Sarika, “Biometrics — Iris Recognition System- A Study Of Promising Approaches For Secured Authentication”, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 14, No. 1, 2004.
[4]S.Barkathunishaan and R.Meenakumari, “Secure transmission of Medical Information using Iris Recognition” International conference on ICCPEIC, 2003 Chennai, India).
[5]S. Zafar, M. K. Soni, “Secure Routing in MANET through Crypt-Biometric Technique” Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), 2014.
[6]R.P. Wildes et al., “Automated, non-invasive iris recognition system and method” U.S Patent 5, 572–596, 1996.
[7]Y. Ping Huang et al., “An Efficient Iris Recognition System” First International Conference on Machine Learning and Cybernetics, Beijing, China, 2002.
[8]R.P. Wildes, “Iris Recognition: An emerging biometric technology” Proceedings of the IEEE, 85(9), 1348–1363 CrossRef, 1997, http://dx.doi.org/10.1109/5.628669.
[9]M. Misiti et al., “A Biometric Authentication Approach for High Security Ad hoc Networks” Proceedings of IEEE Workshop on Information Assistance, pp. 250–256, 2004.
[10]J. Liu, et al., “Optimal Biometric Based Continuous Authentication in Mobile Ad hoc Networks” Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 76–81, 2007.
[11]P. Khaw “Iris Recognition Technology for Improved Authentication” SANS Security Essential (GSEC) Practical Assignment, version 1.3, SANS Institute, 5–8 (2002).
[12]L. Masek, “Recognition of Human Eye Iris Patterns for Biometric Identification” University of West California, 2003.
[13]J. Daugmann, “High Confidence Visual Recognition of Persons by a test of Statistical Independence” IEEE Trans. on Pattern Analysis and Machine Intelligence, 15(11) , 1993.
[14]S. Zafar, M. K. Soni "A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET” I.J. Computer Network and Information Security, 2014, pp. 64-71.
[15]S. Zafar, M.K. Soni, “Biometric Stationed Authentication Protocol (BSAP) Inculcating MetaHeuristic Genetic Algorithm” I.J. Modern Education and Computer Science, 2014, pp. 28-35.
[16]T. Bazaz, S. Zafar, “A Neoteric Optimization Methodology for Cloud Networks”, I.J. Modern Education and Computer Science, 2018, 6, 27-34.