Personal Authentication System Based on Iris Recognition and Digital Signature Technology

نویسندگان

چکیده

Authentication based on biometrics is being used to prevent physical access high-security institutions. Recently, due the rapid rise of information system technologies, now in applications databases and commercial workflow systems. These need implement measures counter security threats. Many developers are exploring developing novel authentication techniques these attacks. However, most challenging problem how keep biometric data while maintaining functional performance identity verification This paper presents a biometrics-based personal which smart card, Public Key Infrastructure (PKI), iris technologies combined. Raspberry Pi 4 Model B+ as core hardware components with an IR Camera. Following that idea, we designed optimal image processing algorithm OpenCV, Python, Keras, sci-kit learn libraries for feature extraction recognition chosen application development this project. After training, implemented gives accuracy (97% 100%) left right (NTU) datasets. Later, person performed verify claimed examine authentication. For NTU dataset, time key generation, Signature, Verification 5.17sec,0.288, 0.056, respectively. work offers realistic architecture identity-based cryptography using Rivest–Shamir–Adleman (RSA) algorithm.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Personal Authentication Using Signature Recognition

In this paper, a problem of personal authentication through the use of signature recognition is described. The methods of verification include both online (or dynamic) and off-line (static) signature verification algorithms. The dynamic methods covered, are based on the analysis of the shape, speed, stroke, pen pressure and timing information. While the static methods involve general shape reco...

متن کامل

Improved Authentication Using Arduino Based Voice and Iris Recognition Technology

Today authentication is the important one to improve the security in various applications Here the proposed system uses three steps to allow the process that is initially enter the password and then give the voice as the input using the arduino microcontroller it verifies the voice and then iris identification of the user. The user has to follow these steps and then only permit to continue the ...

متن کامل

Iris Recognition based Image Authentication

This paper introduces an efficient approach to protect the ownership by hiding iris code from iris recognition system into digital image for an authentication purpose using the reversible watermarking scheme. This scheme embeds bookkeeping data of histogram modification and iris code into the first level high frequency sub-bands of images found by Integer Wavelet Transform (IWT) using threshold...

متن کامل

Vital Sign: Personal Signature Based Biometric Authentication System

Signature is a behavioral biometric: it is not based on the physical properties, such as fingerprint or face, of the individual, but behavioral ones. Signature verification is split into two according to the available data in the input. Offline (static) signature verification takes as input the image of a signature and is useful in automatic verification of signatures found on bank checks and d...

متن کامل

Eye Based Authentication: Iris and Retina Recognition

Biometric authentication comes in play to release the users from the difficulties of remembering and protecting passwords as required by traditional authentication systems. Among all the biometrics in use today, eye biometrics (iris and retina) offers the highest level of uniqueness, universality, permanence, and accuracy. Despite these convincing properties of iris and retina biometrics, they ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JOURNAL OF SOFT COMPUTING AND DATA MINING

سال: 2022

ISSN: ['2716-621X']

DOI: https://doi.org/10.30880/jscdm.2022.03.01.001