Crytosystem for Computer security using Iris patterns and Hetro correlators 

Abstract

Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper reveals a robust cryptosystem using iris biometric pattern as a crypto-key to resolve the issues in the encryption. An error correction engine based on hetro-correlators has been used to evoke the partially tarnished data fashioned by the decryption process. This process determines the non-repudiation and key management problems. The experimental results show that the suggestion algorithm can implement in the real-life cryptosystem.

Authors and Affiliations

R. Bremananth , Ahmad Sharieh

Keywords

Related Articles

Feature Based Correspondence: A Comparative Study on Image Matching Algorithms

Image matching and recognition are the crux of computer vision and have a major part to play in everyday lives. From industrial robots to surveillance cameras, from autonomous vehicles to medical imaging and from missile...

An Example-based Super-Resolution Algorithm for Multi-Spectral Remote Sensing Images

This paper proposes an example-based super-resolution algorithm for multi-spectral remote sensing images. The underlying idea of this algorithm is to learn a matrix-based implicit prior from a set of high-resolution trai...

A Comparison of Collaborative Access Control Models

Collaborative environments need access control to data and resources to increase working cooperation efficiently yet effectively. Several approaches are proposed and multiple access control models are recommended in this...

Secure Medical Internet of Things Framework based on Parkerian Hexad Model

Medical Internet of Things (MIoT) applications enhance medical services by collecting data using devices connected to the IoT. The collected data, which may include personal data and location, is transmitted to mobile de...

Detecting and Classifying Crimes from Arabic Twitter Posts using Text Mining Techniques

Crime analysis has become a critical area for helping law enforcement agencies to protect civilians. As a result of a rapidly increasing population, crime rates have increased dramatically, and appropriate analysis has b...

Download PDF file
  • EP ID EP124532
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

R. Bremananth, Ahmad Sharieh (2011). Crytosystem for Computer security using Iris patterns and Hetro correlators . International Journal of Advanced Computer Science & Applications, 2(11), 1-8. https://europub.co.uk/articles/-A-124532