CFP last date
22 July 2024
Reseach Article

Retinal Biometrics based Authentication and Key Exchange System

by K. Saraswathi, B. Jayaram, Dr. R. Balasubramanian
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 19 - Number 1
Year of Publication: 2011
Authors: K. Saraswathi, B. Jayaram, Dr. R. Balasubramanian

K. Saraswathi, B. Jayaram, Dr. R. Balasubramanian . Retinal Biometrics based Authentication and Key Exchange System. International Journal of Computer Applications. 19, 1 ( April 2011), 1-7. DOI=10.5120/2329-3026

@article{ 10.5120/2329-3026,
author = { K. Saraswathi, B. Jayaram, Dr. R. Balasubramanian },
title = { Retinal Biometrics based Authentication and Key Exchange System },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 19 },
number = { 1 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { },
doi = { 10.5120/2329-3026 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T20:05:50.428102+05:30
%A K. Saraswathi
%A B. Jayaram
%A Dr. R. Balasubramanian
%T Retinal Biometrics based Authentication and Key Exchange System
%J International Journal of Computer Applications
%@ 0975-8887
%V 19
%N 1
%P 1-7
%D 2011
%I Foundation of Computer Science (FCS), NY, USA

The growth and development of the Internet in the recent years has been very significant. But, the security and authentication is still a challenging problem. The security and authentication of the users in the Wireless LANs is also a serious issue. Hence, the security of the network users has become a vital factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But these conventional authentication systems have lot of limitations. Most recently biometric features like fingerprint and iris are also used to provide security to the network users. These biometric features are very reliable compared to the traditional methods. This paper proposes an approach for network security using a novel technique for personal authentication, where the biometric feature used for authentication is the retinal vessel tree. The configuration of the retinal vessels is unique for each individual and that it does not vary forever, so it can be used for the authentication purpose. The diverse phases included in this proposed approach are user registration, Extraction of retinal features, Retina Normalization and building secret key. The performance of the proposed approach is evaluated using the experimental observation. The simplicity and efficiency of the proposed method make it readily to be applied alone or incorporated with other existing security methods.

  1. Rajeswari Mukesh, A. Damodaram, and V. Subbiah Bharathi, “Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack,” IJCSNS International Journal of Computer Science and Network Security, Vol. 8, no. 10, pp. 14-20, 2008.
  2. T. Gunasekaran, and C. Parthasarathy, “Biometrics in Network Security,” International Journal of Computer Network and Security (IJCNS), vol. 1, no. 1, pp. 36-42, 2006.
  3. “Biometrics Security Considerations,” Systems and Network Analysis Center Information Assurance Directorate,
  4. P. Arul, and Dr. A. Shanmugam, “Generate A Key for AES Using Biometric for VOIP Network Security,” Journal of Theoretical and Applied Information Technology, pp. 107-112.
  5. S. Kasaei, and B. Boashash, “Fingerprint feature extraction using block-direction on reconstructed images,” In IEEE region TEN Conference on digital signal Processing applications, TENCON, pp. 303– 306, 1997.
  6. Mahfuzur Rahman, and Prabir Bhattacharya, “Secure Network Communication Using Biometrics,” IEEE International Conference on Multimedia and Expo (ICME'01), p. 52, 2001.
  7. Yunsu Chung, Kiyoung Moon, and Hyung-Woo Lee, “Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism,” Frontiers in the Convergence of Bioscience and Information Technologies, pp. 709-714, 2007.
  8. Sandip Dutta, Avijit Kar, N. C. Mahanti, and B. N. Chatterji, “Network Security Using Biometric and Cryptography,” Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems, pp. 38-44, 2008.
  9. O. S. Benavente, and R. Piccio-Marchetti, “Authentication services and biometrics: network security issues,” 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST '05, pp. 333-3336, 2005.
  10. Suriza Ahmad Zabidi, and Momoh-Jimoh E. Salami, “Design and Development of Intelligent Fingerprint-Based Security System,” Knowledge-Based Intelligent Information and Engineering Systems, vol. 3214, pp. 312-318, 2004.
  11. Ronald G. Wolak, “Network Security: Biometrics - The Password Alternative,” School of Computer and Information Sciences, 1998.
  12. S. C. Chong, A. B. J. Teoh, and D. C. L. Ngo, “Iris authentication using privatized advanced correlation filter,” in ICB, pages 382–388, 2006.
  13. K. Bae, S. Noh, and J. Kim, “Iris feature extraction using independent component analysis,” in Proceedings of the 4th International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA ’03), vol. 2688, pp. 1059–1060,Guildford, UK, June 2003.
  14. Umut Uludag, Sharath Pankanti, Salil Prabhakar, and Anil K. Jain “Biometric Cryptosystems Issues and Challenges” Proceedings of the IEEE 2004.
  15. R. Wildes, “Iris Recognition: An Emerging Biometric Technology”, Proceedings of the IEEE, vol. 85, pp 1348-1363, 1999.
  16. Li Chen, IEEE Member, Xiao-Long zhang, “Feature-based image registration using bifurcation structures”, Matlab Central
Index Terms

Computer Science
Information Sciences


Biometric Security Cryptography Data Security Retinal Biometrics Localization and Normalization