Book description
Biometric techniques have proven their ability to provide secure access to shared resources in various domains and software agents. In addition, multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. This volume proposes a new model-the IrisCryptoAgentSystem (ICAS)-which is based on a biometric method for authentication using the iris of the eye. The book explains how MAS can be used to solve security problems in complex systems and demonstrates how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Acknowledgments
- Introduction (1/2)
- Introduction (2/2)
- Chapter 1: Security of Computer Networks (1/2)
- Chapter 1: Security of Computer Networks (2/2)
- Chapter 2: Biometric Systems (1/6)
- Chapter 2: Biometric Systems (2/6)
- Chapter 2: Biometric Systems (3/6)
- Chapter 2: Biometric Systems (4/6)
- Chapter 2: Biometric Systems (5/6)
- Chapter 2: Biometric Systems (6/6)
- Chapter 3: Cryptography (1/2)
- Chapter 3: Cryptography (2/2)
- Chapter 4: Multiagent System (1/5)
- Chapter 4: Multiagent System (2/5)
- Chapter 4: Multiagent System (3/5)
- Chapter 4: Multiagent System (4/5)
- Chapter 4: Multiagent System (5/5)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (1/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (2/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (3/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (4/4)
- Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (1/2)
- Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (2/2)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (1/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (2/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (3/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (4/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (5/5)
- Chapter 8: Global Model Integrating a Multiagent System (1/8)
- Chapter 8: Global Model Integrating a Multiagent System (2/8)
- Chapter 8: Global Model Integrating a Multiagent System (3/8)
- Chapter 8: Global Model Integrating a Multiagent System (4/8)
- Chapter 8: Global Model Integrating a Multiagent System (5/8)
- Chapter 8: Global Model Integrating a Multiagent System (6/8)
- Chapter 8: Global Model Integrating a Multiagent System (7/8)
- Chapter 8: Global Model Integrating a Multiagent System (8/8)
- Chapter 9: Implementation of New Methods (1/2)
- Chapter 9: Implementation of New Methods (2/2)
- Chapter 10: Simulation of Modules (1/2)
- Chapter 10: Simulation of Modules (2/2)
- Chapter 11: Application
- Conclusion and Perspectives
- References (1/2)
- References (2/2)
- Back Cover
Product information
- Title: Iris Biometric Model for Secured Network Access
- Author(s):
- Release date: April 2016
- Publisher(s): CRC Press
- ISBN: 9781466502147
You might also like
book
Touchless Fingerprint Biometrics
This book offers the first comprehensive analysis of touchless fingerprint-recognition technologies. It gives an overview of …
book
Advances in Biometrics for Secure Human Authentication and Recognition
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about …
book
Biometrics for Network Security
The complete guide to implementing biometric security solutions for your network Network security has become the …
book
Official (ISC)2® Guide to the ISSMP® CBK®
As the recognized leader in the field of information security education and certification, the (ISC)2® promotes …