Book description
Biometric techniques have proven their ability to provide secure access to shared resources in various domains and software agents. In addition, multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. This volume proposes a new model-the IrisCryptoAgentSystem (ICAS)-which is based on a biometric method for authentication using the iris of the eye. The book explains how MAS can be used to solve security problems in complex systems and demonstrates how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Acknowledgments
- Introduction (1/2)
- Introduction (2/2)
- Chapter 1: Security of Computer Networks (1/2)
- Chapter 1: Security of Computer Networks (2/2)
- Chapter 2: Biometric Systems (1/6)
- Chapter 2: Biometric Systems (2/6)
- Chapter 2: Biometric Systems (3/6)
- Chapter 2: Biometric Systems (4/6)
- Chapter 2: Biometric Systems (5/6)
- Chapter 2: Biometric Systems (6/6)
- Chapter 3: Cryptography (1/2)
- Chapter 3: Cryptography (2/2)
- Chapter 4: Multiagent System (1/5)
- Chapter 4: Multiagent System (2/5)
- Chapter 4: Multiagent System (3/5)
- Chapter 4: Multiagent System (4/5)
- Chapter 4: Multiagent System (5/5)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (1/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (2/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (3/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (4/4)
- Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (1/2)
- Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (2/2)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (1/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (2/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (3/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (4/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (5/5)
- Chapter 8: Global Model Integrating a Multiagent System (1/8)
- Chapter 8: Global Model Integrating a Multiagent System (2/8)
- Chapter 8: Global Model Integrating a Multiagent System (3/8)
- Chapter 8: Global Model Integrating a Multiagent System (4/8)
- Chapter 8: Global Model Integrating a Multiagent System (5/8)
- Chapter 8: Global Model Integrating a Multiagent System (6/8)
- Chapter 8: Global Model Integrating a Multiagent System (7/8)
- Chapter 8: Global Model Integrating a Multiagent System (8/8)
- Chapter 9: Implementation of New Methods (1/2)
- Chapter 9: Implementation of New Methods (2/2)
- Chapter 10: Simulation of Modules (1/2)
- Chapter 10: Simulation of Modules (2/2)
- Chapter 11: Application
- Conclusion and Perspectives
- References (1/2)
- References (2/2)
- Back Cover
Product information
- Title: Iris Biometric Model for Secured Network Access
- Author(s):
- Release date: April 2016
- Publisher(s): CRC Press
- ISBN: 9781466502147
You might also like
book
Touchless Fingerprint Biometrics
This book offers the first comprehensive analysis of touchless fingerprint-recognition technologies. It gives an overview of …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Biometrics for Network Security
The complete guide to implementing biometric security solutions for your network Network security has become the …
book
Take Control of Your Passwords, 4th Edition
Overcome password frustration with Joe Kissell's expert advice! Version 4.1.1, updated March 21, 2024 Password overload …