Iris Recognition Based Data Security for Secure Transmission Over Internet of Things Network
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2022, Vol 10, Issue 4
Abstract
The biometric traits of any human being such as fingerprint, tongue prints, face recognition, Retina Scan, Iris recognition, etc. are unique and cannot be replicated or fabricated using modern technologically advanced processes. These unique traits are used to identify individuals for grating access to sensitive data over the cloud. In this paper, we propose a biometric authentication system based on Iris recognition to allow user identity-based data to be pushed onto the cloud for global access if the user Iris image is authenticated with the database. The real-time Iris scanner captures the Iris image and the same is imported to the MATLAB workspace for feature extraction and matching. Upon successful matching, the data is transmitted to the ThingSpeak Internet of Things (IoT) analytics platform. The IoT framework is a massive network of physical devices sharing data according to set protocols. Most IOT-enabled devices lack security protocols. Thus, biometric authentication in general and iris recognition in particular finds a perfect fit for securing data over an IoT framework.
Authors and Affiliations
Alkubra Nusaiba Hassan, Dr. R. P. Singh
Virtual Reallity in Gaming
Augmented reality (VR) gaming is another sort of PC game which utilizes computer generated reality (VR) innovations that can give clients a totally practical, first-individual viewpoint of the game activity. Designing mu...
A Review on Electronic Commerce
The world economy is undergoing a change. All business is becoming data as a result of internet technologies. The pace of technology development is so fast that emergent ecommerce is now influencing every facet of how bu...
Image Search Engine and Individual Profile Building
Look technique utilized for the content gives semantically significant outcome, however isn't a similar with regards to the scan strategy utilized for pictures. Interactive media information is being distributed on the W...
Evaluation of the Toxicity of Aconitum Heterophyllum
Aconitum heterophyllum, commonly known as aruna, belongs to the Ranunculaceae family and is used in Ayurvedic formulations to treat diarrhoea, liver difficulties, and other ailments. Alkaloids, proteins, carbohydrates, s...
Robust Data Hiding In Video Using Forbidden Zone and Selective Embedding
In the recent years, there are lots of systems are introduce. The peoples invented a large thing to protect the data and there are lots of hiding techniques are to be invented for security purpose. But that techniques ca...