This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. This proffered algorithm focuses on attaining image procurement as well as biometric perception by an effective exploitation of bi-orthogonal wavelets for encoding biometric information. The biometric system is enhanced by incorporating cryptographic features which results in better solution against various security breaches.
Published in | International Journal of Wireless Communications and Mobile Computing (Volume 5, Issue 1) |
DOI | 10.11648/j.wcmc.20170501.11 |
Page(s) | 1-5 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
Biometrics, Iris Perception and Authentication Approach, Specificity and Sensitivity Analysis
[1] | Abhyankar, A. and Schuckers, S., “Wavelet Based Iris Recognition for Robust Biometric System”, International Journal of Computer Theory and Engineering, 2 (2). [Accessed April 2010]. |
[2] | Boles, W. W. and Boashash, B., “A Human Identification Technique using Images of the Iris and Wavelet Transform”, IEEE Transactions on Signal Processing, 46 (4), 1998. |
[3] | Daugman, J., “Biometric Personal Identification System Based on Iris Analysis”, United States Patent, 5291560, 1994 |
[4] | Haas, Z., Deng, B., Liang, P., Papadimitratos. and Sajama, S., “Wireless Ad-hoc Networks”, Journal of Proakis, In: Wiley Encyclopaedia of Telecommunications John Wiley and Sons, 2002. |
[5] | Ma, L., Wang, Y. and Tan, T., “Iris Recognition using Circular Symmetric Filters”, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002. |
[6] | Masek, L., “Recognition of Human Iris Patterns for Biometric Identification”, University of Western Australia, 2003. |
[7] | Cheng, H., “Genetic Algorithms with Immigrants Schemes for Dynamic Multicast Problems in Mobile Ad-hoc Networks”, Engineering Applications of Artificial Intelligence Elsevier, 806-819, 2010. |
[8] | Panganiban, A., Linsangan, N. and Caluyo, F., “Wavelet-Based Feature Extraction Algorithm for an Iris Recognition System”. Journal of Information Processing Systems, 7 (3), Accessed September 2011. |
[9] | Reddy, T. B., Karthigeyan, B. S., Manoj. and Murthy, C. S. R., “Quality of Service Provisioning in Ad-hoc Wireless Networks: A Survey of Issues and Solutions”, Elsevier Transactions on Ad-hoc Networks, 83-124, Accessed June 2004. |
[10] | Ritter, N., “Location of the Pupil-Iris Border in Slit-Lamp Images of the Cornea” In: Proceedings of the International Conference on Image Analysis and Processing. IEEE International Symposium on Signal Processing and Information Technology, 1999. |
[11] | Wildes, R., “Iris Recognition: An Emerging Biometric Technology” In: Proceedings of the IEEE, 85 (9), 1997. |
[12] | Wildes, R. P., Asmuth, J. C., Green, G. L. and Hsu, H. C., “A System for Automated Iris Recognition” In: Proceedings IEEE Workshop on Applications of Computer Vision, 121-128, 1994. |
[13] | Zafar Sherin, Soni. M. K., Beg M. M. S “An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANET” Procedia Computer Science Volume 62, 2015, Pages 410–418 (Elsevier) Proceedings of the 2015 International Conference on Soft Computing and Software Engineering (SCSE'15). |
[14] | Zafar Sherin, Soni. M. K. “Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm”. I. J. Modern Education and Computer Science, 28-35, 2014. |
[15] | Zafar Sherin, Soni. M. K. “A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET” I. J. Computer Network and Information Security, 64-71, 2014. |
[16] | Zafar Sherin, Soni. M. K. “Secure Routing in MANET through Crypt-Biometric Technique”, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA),713-720, 2014. |
[17] | Zafar Sherin, Soni. M. K., Beg M. M. S “QOS Optimization in Networks through Meta-heuristic Quartered Genetic Approach” ICSCTI, IEEE, 2015. |
APA Style
Sherin Zafar. (2017). Enhancing Security of Networks Through a Novel Biometric Signature Based Approach. International Journal of Wireless Communications and Mobile Computing, 5(1), 1-5. https://doi.org/10.11648/j.wcmc.20170501.11
ACS Style
Sherin Zafar. Enhancing Security of Networks Through a Novel Biometric Signature Based Approach. Int. J. Wirel. Commun. Mobile Comput. 2017, 5(1), 1-5. doi: 10.11648/j.wcmc.20170501.11
AMA Style
Sherin Zafar. Enhancing Security of Networks Through a Novel Biometric Signature Based Approach. Int J Wirel Commun Mobile Comput. 2017;5(1):1-5. doi: 10.11648/j.wcmc.20170501.11
@article{10.11648/j.wcmc.20170501.11, author = {Sherin Zafar}, title = {Enhancing Security of Networks Through a Novel Biometric Signature Based Approach}, journal = {International Journal of Wireless Communications and Mobile Computing}, volume = {5}, number = {1}, pages = {1-5}, doi = {10.11648/j.wcmc.20170501.11}, url = {https://doi.org/10.11648/j.wcmc.20170501.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.wcmc.20170501.11}, abstract = {This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. This proffered algorithm focuses on attaining image procurement as well as biometric perception by an effective exploitation of bi-orthogonal wavelets for encoding biometric information. The biometric system is enhanced by incorporating cryptographic features which results in better solution against various security breaches.}, year = {2017} }
TY - JOUR T1 - Enhancing Security of Networks Through a Novel Biometric Signature Based Approach AU - Sherin Zafar Y1 - 2017/03/04 PY - 2017 N1 - https://doi.org/10.11648/j.wcmc.20170501.11 DO - 10.11648/j.wcmc.20170501.11 T2 - International Journal of Wireless Communications and Mobile Computing JF - International Journal of Wireless Communications and Mobile Computing JO - International Journal of Wireless Communications and Mobile Computing SP - 1 EP - 5 PB - Science Publishing Group SN - 2330-1015 UR - https://doi.org/10.11648/j.wcmc.20170501.11 AB - This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. This proffered algorithm focuses on attaining image procurement as well as biometric perception by an effective exploitation of bi-orthogonal wavelets for encoding biometric information. The biometric system is enhanced by incorporating cryptographic features which results in better solution against various security breaches. VL - 5 IS - 1 ER -