Iris Biometric Model for Secured Network Access

Book description

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgen

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Acknowledgments
  6. Introduction (1/2)
  7. Introduction (2/2)
  8. Chapter 1: Security of Computer Networks (1/2)
  9. Chapter 1: Security of Computer Networks (2/2)
  10. Chapter 2: Biometric Systems (1/6)
  11. Chapter 2: Biometric Systems (2/6)
  12. Chapter 2: Biometric Systems (3/6)
  13. Chapter 2: Biometric Systems (4/6)
  14. Chapter 2: Biometric Systems (5/6)
  15. Chapter 2: Biometric Systems (6/6)
  16. Chapter 3: Cryptography (1/2)
  17. Chapter 3: Cryptography (2/2)
  18. Chapter 4: Multiagent System (1/5)
  19. Chapter 4: Multiagent System (2/5)
  20. Chapter 4: Multiagent System (3/5)
  21. Chapter 4: Multiagent System (4/5)
  22. Chapter 4: Multiagent System (5/5)
  23. Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (1/4)
  24. Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (2/4)
  25. Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (3/4)
  26. Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (4/4)
  27. Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (1/2)
  28. Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (2/2)
  29. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (1/5)
  30. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (2/5)
  31. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (3/5)
  32. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (4/5)
  33. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (5/5)
  34. Chapter 8: Global Model Integrating a Multiagent System (1/8)
  35. Chapter 8: Global Model Integrating a Multiagent System (2/8)
  36. Chapter 8: Global Model Integrating a Multiagent System (3/8)
  37. Chapter 8: Global Model Integrating a Multiagent System (4/8)
  38. Chapter 8: Global Model Integrating a Multiagent System (5/8)
  39. Chapter 8: Global Model Integrating a Multiagent System (6/8)
  40. Chapter 8: Global Model Integrating a Multiagent System (7/8)
  41. Chapter 8: Global Model Integrating a Multiagent System (8/8)
  42. Chapter 9: Implementation of New Methods (1/2)
  43. Chapter 9: Implementation of New Methods (2/2)
  44. Chapter 10: Simulation of Modules (1/2)
  45. Chapter 10: Simulation of Modules (2/2)
  46. Chapter 11: Application
  47. Conclusion and Perspectives
  48. References (1/2)
  49. References (2/2)
  50. Back Cover

Product information

  • Title: Iris Biometric Model for Secured Network Access
  • Author(s): Franjieh El Khoury
  • Release date: April 2016
  • Publisher(s): CRC Press
  • ISBN: 9781466502147