CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

An Efficient Implementation of Iris Recognition and Cryptography in Internet Security System

Published on May 2013 by Kalyan Chatterjee, Nilotpal Mrinal, Prasannjit
Recent Trends in Pattern Recognition and Image Analysis
Foundation of Computer Science USA
RTPRIA - Number 1
May 2013
Authors: Kalyan Chatterjee, Nilotpal Mrinal, Prasannjit
079dcd4d-5068-407e-9fbb-8ba4c8e140d8

Kalyan Chatterjee, Nilotpal Mrinal, Prasannjit . An Efficient Implementation of Iris Recognition and Cryptography in Internet Security System. Recent Trends in Pattern Recognition and Image Analysis. RTPRIA, 1 (May 2013), 46-50.

@article{
author = { Kalyan Chatterjee, Nilotpal Mrinal, Prasannjit },
title = { An Efficient Implementation of Iris Recognition and Cryptography in Internet Security System },
journal = { Recent Trends in Pattern Recognition and Image Analysis },
issue_date = { May 2013 },
volume = { RTPRIA },
number = { 1 },
month = { May },
year = { 2013 },
issn = 0975-8887,
pages = { 46-50 },
numpages = 5,
url = { /specialissues/rtpria/number1/11802-1008/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Recent Trends in Pattern Recognition and Image Analysis
%A Kalyan Chatterjee
%A Nilotpal Mrinal
%A Prasannjit
%T An Efficient Implementation of Iris Recognition and Cryptography in Internet Security System
%J Recent Trends in Pattern Recognition and Image Analysis
%@ 0975-8887
%V RTPRIA
%N 1
%P 46-50
%D 2013
%I International Journal of Computer Applications
Abstract

Internet is one of the most popular communication channels but it is insecure. Since it is an open and insecure medium, malicious medium can intercept the program or data. In the present scenario, fast growth in online application results in data security problem. In order to get secure internet, users need secure communication method for sending secret messages and data through internet. In this paper, we have developed an efficient way to provide a secure internet using Iris Recognition and Cryptography. The Iris Recognition system consists of an automatic segmentation that is based on Hough Transform. The Hamming Distance is employed for classification of Iris template. Thus this paper can be implemented in any real time application.

References
  1. W. W. Boles and B. Boashash "A Human Identification Technique Using Images off the Iris and Wavelet Transform" IEEE TRANSACTIONS ON SIGNAL PROCESING,VOL. 46,NO. 4,APRIL 1998.
  2. Mohammad Ramli, Nurul Akmar, Kamarudin, Muhammad Saufi and JORET Ariffuddin "Iris Recognition for Personal Identification" The International Conference on Electrical Engineering 2008July 6-10, 2008, OKINAWA, JAPAN No. O-099.
  3. Ashish Kumar Dewangan, Majid Ahmed Siddhiqui "Iris Recognition - An Efficient Biometric for Human Identification and Verification" International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-3, February 2012.
  4. A. Porusaberi and B. N. Arabbi "Iris Recognition for Partially Occluded Images: Methodology and Sensitivity Analysis" EURASIP Journal on Advances in Signal Processing, Volume 2007, Article ID 36751, doi:10. 1155/2007/36751.
  5. A. Basit, M. Y. Javed, M. A. Anjum "Efficient Iris Recognition Method for Human Identification" World Academy of Science, Engineering and Technology 4 2007.
  6. Makram Nabti, Lahouari Ghouti and Ahmed Bouridane "An effective and fast iris recognition system based on a combined multiscale feature extraction technique" Pattern Recognition 41(2008) 868-879.
  7. W. K. KONG,D. ZHANG "Accurate Iris segmentation based on novel reflection and eyelash detection model" proceeding of 2001 International Symposium on Intelligent multimedia, video and speech processing May 2-4 2001 Hong Kong
  8. C. R. Prashanth, Shashikumar D. R. , K. B. Raja, K. R. Venugopal, L. M. Patnaik "High Security Human Recognition System using Iris Images" International journal of Recent Trends In Engineering,Vol. 1,No. 1,May 2009.
  9. V K NARENDIRA KUMAR, B. SHRINIVASAN, P. NARENDRAN "Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics" I. J. Information Engineering and Electronic Business, 2012, 1, 18-24
  10. Anni U. Gupta, Prof. Dr. Alice N. Cheeran, Mangesh D. Nikose "IMAGE RESTORATION USING WAVELET BASED IMAGE FUSION" International Journal of Engineering Science and Technology (IJEST) ISSN: 0975-5462 vol. 3 no. 2 2 Feb 2011.
  11. V. B. Gopala Krishna and ,S. Chandra Sekhar, M. Venkateswarlu "RFID card with iris recognition for high security access environment" International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
  12. P. S. Revenkar , Anisa Anjum , W . Z. Gandhare "Secure Iris Authentication Using Visual Cryptography" (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 3, 2010
  13. Y. V. Subba Rao, Yulia Sukonkina, Chakravarthy Bhagwati, Umesh Kumar Singh , "Fingerprint based authentication application using visual cryptography methods(Improved ID card)" Tencon 2008,IEEE Region 10th conference 2008
  14. Centre for Biometrics and Security Research page http://www. cbsr. ia. ac. cn/english/IrisDatabase. asp.
  15. J. Daugman, "High confidence recognition of persons by test of statistical independence". IEEE Trans. on PAMI, vol. 15, 1148-1160, 1993.
  16. Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Huang , "Visual cryptography for general access structure by multi-pixel encoding with variable block size". In Proceedings of the International Symposium on Knowledge Acquisition and Modeling, 340-344, 2008
  17. Xiao-Qing Tan, "Two kinds of ideal contrast visual cryptography schemes". In Proceedings of the International Conference on Signal Processing Systems, 450-453, 2009
  18. Wen-pinn Fang "Non-expansion visual secret sharing in reversible style" International Journal Of Computer Science and Network Security(IJCSNS),9(2),February 2009
  19. Lin Kezheng,Fan Bo, Zhao Hong, "visual cryptographic scheme with high image quality" In proceedings of the International conference on Computational Intelligence and Security, 366-370,IEEE ,2008
  20. Tuyls, P. , Akkermans, A. H. M. , Kevenaar, T. A. M. , Schrijen, G-J Bazen, A. M. , and Veldhuis, R. N. J. , "Practical biometric authentication with template protection" In Proceedings of the 5th International conference on Audio and video based personal authentication. 436-41,2005.
  21. A. K. Jain and U. Uludag "Hiding biometric data" In proceedings of the IEEE, 25(11), Nov. 2004.
  22. Jing Dong, Tieniu Tan, "Effects of watermarking on its recognition performance". 978–1–4244–2287–6, IEEE, 2008.
  23. Shenglin Yang, Ingrid Verbauwhede "Secure iris verification". In Proceedings of the ICASSP, 133-136, 2007
  24. Nick Bartlow, Nathan Kalka, Bojan Cukic, and Arun Ross, "Protecting iris images through asymmetric digital watermarking". 1-4244-1300-1, IEEE 2007.
  25. P. Kovesi. MATLAB Functions for Computer Vision and Image Analysis. Available at: http://www. cs. uwa. edu. au/~pk/Research/MatlabFns/index. html.
Index Terms

Computer Science
Information Sciences

Keywords

Biometric Authentication internet Security Iris Cryptography Segmentation Hamming Distance