Iris Biometric Model for Secured Network Access

Book description

Biometric techniques have proven their ability to provide secure access to shared resources in various domains and software agents. In addition, multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. This volume proposes a new model-the IrisCryptoAgentSystem (ICAS)-which is based on a biometric method for authentication using the iris of the eye. The book explains how MAS can be used to solve security problems in complex systems and demonstrates how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Acknowledgments
  6. Introduction (1/2)
  7. Introduction (2/2)
  8. Chapter 1: Security of Computer Networks (1/2)
  9. Chapter 1: Security of Computer Networks (2/2)
  10. Chapter 2: Biometric Systems (1/6)
  11. Chapter 2: Biometric Systems (2/6)
  12. Chapter 2: Biometric Systems (3/6)
  13. Chapter 2: Biometric Systems (4/6)
  14. Chapter 2: Biometric Systems (5/6)
  15. Chapter 2: Biometric Systems (6/6)
  16. Chapter 3: Cryptography (1/2)
  17. Chapter 3: Cryptography (2/2)
  18. Chapter 4: Multiagent System (1/5)
  19. Chapter 4: Multiagent System (2/5)
  20. Chapter 4: Multiagent System (3/5)
  21. Chapter 4: Multiagent System (4/5)
  22. Chapter 4: Multiagent System (5/5)
  23. Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (1/4)
  24. Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (2/4)
  25. Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (3/4)
  26. Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (4/4)
  27. Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (1/2)
  28. Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (2/2)
  29. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (1/5)
  30. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (2/5)
  31. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (3/5)
  32. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (4/5)
  33. Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (5/5)
  34. Chapter 8: Global Model Integrating a Multiagent System (1/8)
  35. Chapter 8: Global Model Integrating a Multiagent System (2/8)
  36. Chapter 8: Global Model Integrating a Multiagent System (3/8)
  37. Chapter 8: Global Model Integrating a Multiagent System (4/8)
  38. Chapter 8: Global Model Integrating a Multiagent System (5/8)
  39. Chapter 8: Global Model Integrating a Multiagent System (6/8)
  40. Chapter 8: Global Model Integrating a Multiagent System (7/8)
  41. Chapter 8: Global Model Integrating a Multiagent System (8/8)
  42. Chapter 9: Implementation of New Methods (1/2)
  43. Chapter 9: Implementation of New Methods (2/2)
  44. Chapter 10: Simulation of Modules (1/2)
  45. Chapter 10: Simulation of Modules (2/2)
  46. Chapter 11: Application
  47. Conclusion and Perspectives
  48. References (1/2)
  49. References (2/2)
  50. Back Cover

Product information

  • Title: Iris Biometric Model for Secured Network Access
  • Author(s): Franjieh El Khoury
  • Release date: April 2016
  • Publisher(s): CRC Press
  • ISBN: 9781466502147