Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

An Efficient Implementation of Iris Recognition and Cryptography in Internet Security System

Print
PDF
IJCA Special Issue on Recent Trends in Pattern Recognition and Image Analysis
© 2013 by IJCA Journal
RTPRIA
Year of Publication: 2013
Authors:
Kalyan Chatterjee
Nilotpal Mrinal
Prasannjit
10.5120/11802-1008

Kalyan Chatterjee, Nilotpal Mrinal and Prasannjit. Article: An Efficient Implementation of Iris Recognition and Cryptography in Internet Security System. IJCA Special Issue on Recent Trends in Pattern Recognition and Image Analysis RTPRIA(1):46-50, May 2013. Full text available. BibTeX

@article{key:article,
	author = {Kalyan Chatterjee and Nilotpal Mrinal and Prasannjit},
	title = {Article: An Efficient Implementation of Iris Recognition and Cryptography in Internet Security System},
	journal = {IJCA Special Issue on Recent Trends in Pattern Recognition and Image Analysis},
	year = {2013},
	volume = {RTPRIA},
	number = {1},
	pages = {46-50},
	month = {May},
	note = {Full text available}
}

Abstract

Internet is one of the most popular communication channels but it is insecure. Since it is an open and insecure medium, malicious medium can intercept the program or data. In the present scenario, fast growth in online application results in data security problem. In order to get secure internet, users need secure communication method for sending secret messages and data through internet. In this paper, we have developed an efficient way to provide a secure internet using Iris Recognition and Cryptography. The Iris Recognition system consists of an automatic segmentation that is based on Hough Transform. The Hamming Distance is employed for classification of Iris template. Thus this paper can be implemented in any real time application.

References

  • W. W. Boles and B. Boashash "A Human Identification Technique Using Images off the Iris and Wavelet Transform" IEEE TRANSACTIONS ON SIGNAL PROCESING,VOL. 46,NO. 4,APRIL 1998.
  • Mohammad Ramli, Nurul Akmar, Kamarudin, Muhammad Saufi and JORET Ariffuddin "Iris Recognition for Personal Identification" The International Conference on Electrical Engineering 2008July 6-10, 2008, OKINAWA, JAPAN No. O-099.
  • Ashish Kumar Dewangan, Majid Ahmed Siddhiqui "Iris Recognition - An Efficient Biometric for Human Identification and Verification" International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-3, February 2012.
  • A. Porusaberi and B. N. Arabbi "Iris Recognition for Partially Occluded Images: Methodology and Sensitivity Analysis" EURASIP Journal on Advances in Signal Processing, Volume 2007, Article ID 36751, doi:10. 1155/2007/36751.
  • A. Basit, M. Y. Javed, M. A. Anjum "Efficient Iris Recognition Method for Human Identification" World Academy of Science, Engineering and Technology 4 2007.
  • Makram Nabti, Lahouari Ghouti and Ahmed Bouridane "An effective and fast iris recognition system based on a combined multiscale feature extraction technique" Pattern Recognition 41(2008) 868-879.
  • W. K. KONG,D. ZHANG "Accurate Iris segmentation based on novel reflection and eyelash detection model" proceeding of 2001 International Symposium on Intelligent multimedia, video and speech processing May 2-4 2001 Hong Kong
  • C. R. Prashanth, Shashikumar D. R. , K. B. Raja, K. R. Venugopal, L. M. Patnaik "High Security Human Recognition System using Iris Images" International journal of Recent Trends In Engineering,Vol. 1,No. 1,May 2009.
  • V K NARENDIRA KUMAR, B. SHRINIVASAN, P. NARENDRAN "Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics" I. J. Information Engineering and Electronic Business, 2012, 1, 18-24
  • Anni U. Gupta, Prof. Dr. Alice N. Cheeran, Mangesh D. Nikose "IMAGE RESTORATION USING WAVELET BASED IMAGE FUSION" International Journal of Engineering Science and Technology (IJEST) ISSN: 0975-5462 vol. 3 no. 2 2 Feb 2011.
  • V. B. Gopala Krishna and ,S. Chandra Sekhar, M. Venkateswarlu "RFID card with iris recognition for high security access environment" International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
  • P. S. Revenkar , Anisa Anjum , W . Z. Gandhare "Secure Iris Authentication Using Visual Cryptography" (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 3, 2010
  • Y. V. Subba Rao, Yulia Sukonkina, Chakravarthy Bhagwati, Umesh Kumar Singh , "Fingerprint based authentication application using visual cryptography methods(Improved ID card)" Tencon 2008,IEEE Region 10th conference 2008
  • Centre for Biometrics and Security Research page http://www. cbsr. ia. ac. cn/english/IrisDatabase. asp.
  • J. Daugman, "High confidence recognition of persons by test of statistical independence". IEEE Trans. on PAMI, vol. 15, 1148-1160, 1993.
  • Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Huang , "Visual cryptography for general access structure by multi-pixel encoding with variable block size". In Proceedings of the International Symposium on Knowledge Acquisition and Modeling, 340-344, 2008
  • Xiao-Qing Tan, "Two kinds of ideal contrast visual cryptography schemes". In Proceedings of the International Conference on Signal Processing Systems, 450-453, 2009
  • Wen-pinn Fang "Non-expansion visual secret sharing in reversible style" International Journal Of Computer Science and Network Security(IJCSNS),9(2),February 2009
  • Lin Kezheng,Fan Bo, Zhao Hong, "visual cryptographic scheme with high image quality" In proceedings of the International conference on Computational Intelligence and Security, 366-370,IEEE ,2008
  • Tuyls, P. , Akkermans, A. H. M. , Kevenaar, T. A. M. , Schrijen, G-J Bazen, A. M. , and Veldhuis, R. N. J. , "Practical biometric authentication with template protection" In Proceedings of the 5th International conference on Audio and video based personal authentication. 436-41,2005.
  • A. K. Jain and U. Uludag "Hiding biometric data" In proceedings of the IEEE, 25(11), Nov. 2004.
  • Jing Dong, Tieniu Tan, "Effects of watermarking on its recognition performance". 978–1–4244–2287–6, IEEE, 2008.
  • Shenglin Yang, Ingrid Verbauwhede "Secure iris verification". In Proceedings of the ICASSP, 133-136, 2007
  • Nick Bartlow, Nathan Kalka, Bojan Cukic, and Arun Ross, "Protecting iris images through asymmetric digital watermarking". 1-4244-1300-1, IEEE 2007.
  • P. Kovesi. MATLAB Functions for Computer Vision and Image Analysis. Available at: http://www. cs. uwa. edu. au/~pk/Research/MatlabFns/index. html.