International Journal of Wireless Communications and Mobile Computing

| Peer-Reviewed |

Enhancing Security of Networks Through a Novel Biometric Signature Based Approach

Received: 20 October 2016    Accepted: 09 February 2017    Published: 04 March 2017
Views:       Downloads:

Share This Article

Abstract

This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. This proffered algorithm focuses on attaining image procurement as well as biometric perception by an effective exploitation of bi-orthogonal wavelets for encoding biometric information. The biometric system is enhanced by incorporating cryptographic features which results in better solution against various security breaches.

DOI 10.11648/j.wcmc.20170501.11
Published in International Journal of Wireless Communications and Mobile Computing (Volume 5, Issue 1, January 2017)
Page(s) 1-5
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Biometrics, Iris Perception and Authentication Approach, Specificity and Sensitivity Analysis

References
[1] Abhyankar, A. and Schuckers, S., “Wavelet Based Iris Recognition for Robust Biometric System”, International Journal of Computer Theory and Engineering, 2 (2). [Accessed April 2010].
[2] Boles, W. W. and Boashash, B., “A Human Identification Technique using Images of the Iris and Wavelet Transform”, IEEE Transactions on Signal Processing, 46 (4), 1998.
[3] Daugman, J., “Biometric Personal Identification System Based on Iris Analysis”, United States Patent, 5291560, 1994
[4] Haas, Z., Deng, B., Liang, P., Papadimitratos. and Sajama, S., “Wireless Ad-hoc Networks”, Journal of Proakis, In: Wiley Encyclopaedia of Telecommunications John Wiley and Sons, 2002.
[5] Ma, L., Wang, Y. and Tan, T., “Iris Recognition using Circular Symmetric Filters”, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, 2002.
[6] Masek, L., “Recognition of Human Iris Patterns for Biometric Identification”, University of Western Australia, 2003.
[7] Cheng, H., “Genetic Algorithms with Immigrants Schemes for Dynamic Multicast Problems in Mobile Ad-hoc Networks”, Engineering Applications of Artificial Intelligence Elsevier, 806-819, 2010.
[8] Panganiban, A., Linsangan, N. and Caluyo, F., “Wavelet-Based Feature Extraction Algorithm for an Iris Recognition System”. Journal of Information Processing Systems, 7 (3), Accessed September 2011.
[9] Reddy, T. B., Karthigeyan, B. S., Manoj. and Murthy, C. S. R., “Quality of Service Provisioning in Ad-hoc Wireless Networks: A Survey of Issues and Solutions”, Elsevier Transactions on Ad-hoc Networks, 83-124, Accessed June 2004.
[10] Ritter, N., “Location of the Pupil-Iris Border in Slit-Lamp Images of the Cornea” In: Proceedings of the International Conference on Image Analysis and Processing. IEEE International Symposium on Signal Processing and Information Technology, 1999.
[11] Wildes, R., “Iris Recognition: An Emerging Biometric Technology” In: Proceedings of the IEEE, 85 (9), 1997.
[12] Wildes, R. P., Asmuth, J. C., Green, G. L. and Hsu, H. C., “A System for Automated Iris Recognition” In: Proceedings IEEE Workshop on Applications of Computer Vision, 121-128, 1994.
[13] Zafar Sherin, Soni. M. K., Beg M. M. S “An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANET” Procedia Computer Science Volume 62, 2015, Pages 410–418 (Elsevier) Proceedings of the 2015 International Conference on Soft Computing and Software Engineering (SCSE'15).
[14] Zafar Sherin, Soni. M. K. “Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm”. I. J. Modern Education and Computer Science, 28-35, 2014.
[15] Zafar Sherin, Soni. M. K. “A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET” I. J. Computer Network and Information Security, 64-71, 2014.
[16] Zafar Sherin, Soni. M. K. “Secure Routing in MANET through Crypt-Biometric Technique”, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA),713-720, 2014.
[17] Zafar Sherin, Soni. M. K., Beg M. M. S “QOS Optimization in Networks through Meta-heuristic Quartered Genetic Approach” ICSCTI, IEEE, 2015.
Author Information
  • Faculty of Engineering, Jamia Hamdard University, New Delhi, India

Cite This Article
  • APA Style

    Sherin Zafar. (2017). Enhancing Security of Networks Through a Novel Biometric Signature Based Approach. International Journal of Wireless Communications and Mobile Computing, 5(1), 1-5. https://doi.org/10.11648/j.wcmc.20170501.11

    Copy | Download

    ACS Style

    Sherin Zafar. Enhancing Security of Networks Through a Novel Biometric Signature Based Approach. Int. J. Wirel. Commun. Mobile Comput. 2017, 5(1), 1-5. doi: 10.11648/j.wcmc.20170501.11

    Copy | Download

    AMA Style

    Sherin Zafar. Enhancing Security of Networks Through a Novel Biometric Signature Based Approach. Int J Wirel Commun Mobile Comput. 2017;5(1):1-5. doi: 10.11648/j.wcmc.20170501.11

    Copy | Download

  • @article{10.11648/j.wcmc.20170501.11,
      author = {Sherin Zafar},
      title = {Enhancing Security of Networks Through a Novel Biometric Signature Based Approach},
      journal = {International Journal of Wireless Communications and Mobile Computing},
      volume = {5},
      number = {1},
      pages = {1-5},
      doi = {10.11648/j.wcmc.20170501.11},
      url = {https://doi.org/10.11648/j.wcmc.20170501.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.wcmc.20170501.11},
      abstract = {This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. This proffered algorithm focuses on attaining image procurement as well as biometric perception by an effective exploitation of bi-orthogonal wavelets for encoding biometric information. The biometric system is enhanced by incorporating cryptographic features which results in better solution against various security breaches.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Enhancing Security of Networks Through a Novel Biometric Signature Based Approach
    AU  - Sherin Zafar
    Y1  - 2017/03/04
    PY  - 2017
    N1  - https://doi.org/10.11648/j.wcmc.20170501.11
    DO  - 10.11648/j.wcmc.20170501.11
    T2  - International Journal of Wireless Communications and Mobile Computing
    JF  - International Journal of Wireless Communications and Mobile Computing
    JO  - International Journal of Wireless Communications and Mobile Computing
    SP  - 1
    EP  - 5
    PB  - Science Publishing Group
    SN  - 2330-1015
    UR  - https://doi.org/10.11648/j.wcmc.20170501.11
    AB  - This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. This proffered algorithm focuses on attaining image procurement as well as biometric perception by an effective exploitation of bi-orthogonal wavelets for encoding biometric information. The biometric system is enhanced by incorporating cryptographic features which results in better solution against various security breaches.
    VL  - 5
    IS  - 1
    ER  - 

    Copy | Download

  • Sections