Enhancing Security of Networks Through a Novel Biometric Signature Based Approach
International Journal of Wireless Communications and Mobile Computing
Volume 5, Issue 1, January 2017, Pages: 1-5
Received: Oct. 20, 2016; Accepted: Feb. 9, 2017; Published: Mar. 4, 2017
Views 1592      Downloads 105
Author
Sherin Zafar, Faculty of Engineering, Jamia Hamdard University, New Delhi, India
Article Tools
Follow on us
Abstract
This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. This proffered algorithm focuses on attaining image procurement as well as biometric perception by an effective exploitation of bi-orthogonal wavelets for encoding biometric information. The biometric system is enhanced by incorporating cryptographic features which results in better solution against various security breaches.
Keywords
Biometrics, Iris Perception and Authentication Approach, Specificity and Sensitivity Analysis
To cite this article
Sherin Zafar, Enhancing Security of Networks Through a Novel Biometric Signature Based Approach, International Journal of Wireless Communications and Mobile Computing. Vol. 5, No. 1, 2017, pp. 1-5. doi: 10.11648/j.wcmc.20170501.11
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Abhyankar, A. and Schuckers, S., “Wavelet Based Iris Recognition for Robust Biometric System”, International Journal of Computer Theory and Engineering, 2 (2). [Accessed April 2010].
[2]
Boles, W. W. and Boashash, B., “A Human Identification Technique using Images of the Iris and Wavelet Transform”, IEEE Transactions on Signal Processing, 46 (4), 1998.
[3]
Daugman, J., “Biometric Personal Identification System Based on Iris Analysis”, United States Patent, 5291560, 1994
[4]
Haas, Z., Deng, B., Liang, P., Papadimitratos. and Sajama, S., “Wireless Ad-hoc Networks”, Journal of Proakis, In: Wiley Encyclopaedia of Telecommunications John Wiley and Sons, 2002.
[5]
Ma, L., Wang, Y. and Tan, T., “Iris Recognition using Circular Symmetric Filters”, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002.
[6]
Masek, L., “Recognition of Human Iris Patterns for Biometric Identification”, University of Western Australia, 2003.
[7]
Cheng, H., “Genetic Algorithms with Immigrants Schemes for Dynamic Multicast Problems in Mobile Ad-hoc Networks”, Engineering Applications of Artificial Intelligence Elsevier, 806-819, 2010.
[8]
Panganiban, A., Linsangan, N. and Caluyo, F., “Wavelet-Based Feature Extraction Algorithm for an Iris Recognition System”. Journal of Information Processing Systems, 7 (3), Accessed September 2011.
[9]
Reddy, T. B., Karthigeyan, B. S., Manoj. and Murthy, C. S. R., “Quality of Service Provisioning in Ad-hoc Wireless Networks: A Survey of Issues and Solutions”, Elsevier Transactions on Ad-hoc Networks, 83-124, Accessed June 2004.
[10]
Ritter, N., “Location of the Pupil-Iris Border in Slit-Lamp Images of the Cornea” In: Proceedings of the International Conference on Image Analysis and Processing. IEEE International Symposium on Signal Processing and Information Technology, 1999.
[11]
Wildes, R., “Iris Recognition: An Emerging Biometric Technology” In: Proceedings of the IEEE, 85 (9), 1997.
[12]
Wildes, R. P., Asmuth, J. C., Green, G. L. and Hsu, H. C., “A System for Automated Iris Recognition” In: Proceedings IEEE Workshop on Applications of Computer Vision, 121-128, 1994.
[13]
Zafar Sherin, Soni. M. K., Beg M. M. S “An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANET” Procedia Computer Science Volume 62, 2015, Pages 410–418 (Elsevier) Proceedings of the 2015 International Conference on Soft Computing and Software Engineering (SCSE'15).
[14]
Zafar Sherin, Soni. M. K. “Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm”. I. J. Modern Education and Computer Science, 28-35, 2014.
[15]
Zafar Sherin, Soni. M. K. “A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET” I. J. Computer Network and Information Security, 64-71, 2014.
[16]
Zafar Sherin, Soni. M. K. “Secure Routing in MANET through Crypt-Biometric Technique”, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA),713-720, 2014.
[17]
Zafar Sherin, Soni. M. K., Beg M. M. S “QOS Optimization in Networks through Meta-heuristic Quartered Genetic Approach” ICSCTI, IEEE, 2015.
ADDRESS
Science Publishing Group
548 FASHION AVENUE
NEW YORK, NY 10018
U.S.A.
Tel: (001)347-688-8931