Crytosystem for Computer security using Iris patterns and Hetro correlators
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 11
Abstract
Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper reveals a robust cryptosystem using iris biometric pattern as a crypto-key to resolve the issues in the encryption. An error correction engine based on hetro-correlators has been used to evoke the partially tarnished data fashioned by the decryption process. This process determines the non-repudiation and key management problems. The experimental results show that the suggestion algorithm can implement in the real-life cryptosystem.
Authors and Affiliations
R. Bremananth , Ahmad Sharieh
Feature Based Correspondence: A Comparative Study on Image Matching Algorithms
Image matching and recognition are the crux of computer vision and have a major part to play in everyday lives. From industrial robots to surveillance cameras, from autonomous vehicles to medical imaging and from missile...
An Example-based Super-Resolution Algorithm for Multi-Spectral Remote Sensing Images
This paper proposes an example-based super-resolution algorithm for multi-spectral remote sensing images. The underlying idea of this algorithm is to learn a matrix-based implicit prior from a set of high-resolution trai...
A Comparison of Collaborative Access Control Models
Collaborative environments need access control to data and resources to increase working cooperation efficiently yet effectively. Several approaches are proposed and multiple access control models are recommended in this...
Secure Medical Internet of Things Framework based on Parkerian Hexad Model
Medical Internet of Things (MIoT) applications enhance medical services by collecting data using devices connected to the IoT. The collected data, which may include personal data and location, is transmitted to mobile de...
Detecting and Classifying Crimes from Arabic Twitter Posts using Text Mining Techniques
Crime analysis has become a critical area for helping law enforcement agencies to protect civilians. As a result of a rapidly increasing population, crime rates have increased dramatically, and appropriate analysis has b...