A Novel Approach for Iris Encryption

نویسندگان

  • Shrinivasrao B. Kulkarni
  • Ravindra S. Hegadi
  • Umakant P. Kulkarni
چکیده

A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is one of such biometric systems and is regarded as the most reliable and accurate identification systems available. It is the process of recognizing a person by analyzing the random pattern of the iris [8]. It combines computer vision, pattern recognition, statistical inference, and optics. Its purpose is real-time, high confidence recognition of a person's identity by mathematical analysis of the random patterns that are visible within the iris of an eye[7][8]. The proposed system takes an image of the eye, detects the iris and extracts it. Then a binary image of the extracted iris is created in order to form an equivalent barcode. Similarly a test data is also processed into a barcode and is matched with the reference barcodes in the database [8]. Representation of iris as a barcode provides an efficient and encrypted way for storing the iris data and provides one more level of security. Thus, the system has its application in various areas like national border controls: the iris can be used as a living passport, cell phone and other wireless-device-based authentication, secure access to bank accounts at cash machines, premises access control, credit-card authentication, Internet security, Biometric-Key Cryptography, etc[10]. Following parameters are observed. i.e. ARAcceptance Ratio 58.90%. FRRFalse Rejection Ratio 41.10%.FAR-False Acceptance Ratio 33.34 %. RRRejection Ratio 66.66%. General Terms Encryption, Algorithms, Performance, Design, Experimentation, Security, Human Factors, Verification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

A Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map

Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...

متن کامل

A Novel Biometric Cryptosystem using LDPC and SHA based Iris Recognition

We use Low Density Parity Check (LDPC) error correction code to solve fuzziness i.e., the variability and noise in iris code generated from Iris Recognition System (IRS) and Secure Hash Algorithm (SHA-512) to transform unique iris code into hash string to make them as a Cancellable Biometric. SHA-512 hash string is used as a key for 512 bits Advanced Encryption Standard (AES) encryption process...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012