Skip to main content
Log in

Cyber secure corroboration through CIB approach

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The basic idea of this research methodology is to perform cyber secure corroboration through crypt-iris based (CIB) approach for enhancing security in today’s cyber world. Today’s cyber world is prone to various kinds of attacks, malware and ransom ware among the latest. So, the proposed CIB authentication system for simulation point of view has taken a standardized database for analysis. As biometric that too iris based is considered one of the most neoteric methodology to sustain security in modern day cyber world by involving exclusive identification features. The success of any kind of biometric approach depends upon the image capture and feature extraction process which is efficiently carried upon in this approach by utilizing bi-orthogonal wavelets for encoding the iris based biometric template. Enhancement of the crypt-iris based biometric system is done by utilizing elliptic curve methodology resulting in effective solutions against various security breaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Abhyankar A, Schuckers S (2010) Wavelet based iris recognition for robust biometric system. Int J Comput Theory Eng 2(2):1793–8201

  2. Kush A, Hwang C (2011) Hash security for ad hoc routing. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi Copy Right © BIJIT; January–June, 2011 3(1); ISSN 0973–5658 271

  3. Boles WW, Boashash B (1998) A human identification technique using images of the iris and wavelet transform. IEEE Trans Signal Process 46(4):1185–1188

  4. Cheng H (2010) Genetic algorithms with immigrants schemes for dynamic multicast problems in mobile ad hoc networks. Eng Appl Artif Intell Elsevier 23(5):806–819

  5. Daugman J (1994) Biometric personal identification system based on iris analysis. United States Patent, 5291560

  6. Singh D, Singh A (2010) A secure private key encryption technique for data security in modern cryptosystem. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi

  7. Haas Z, Deng B, Liang P, Papadimitratos S, proakis J (2002) Wireless ad-hoc networks in encyclopedia of telecommunications. John Wiley

  8. Ma L, Wang Y, Tan T (2002) Iris recognition using circular symmetric filters. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences

  9. Masek L (2003) Recognition of human iris patterns for biometric identification. University of Western Australia, Perth

    Google Scholar 

  10. Panganiban A, Linsangan N, Caluyo F (2011) Wavelet-based feature extraction algorithm for an iris recognition system. J Inf Process Syst 5(3):425–434

  11. Pranav M et al (2010) Simulation and proportional evaluation of AODV and DSR in different environment of WSN. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeth’s Institute of Computer Applications and Management (BVICAM), New Delhi

  12. Reddy TB, Karthigeyan BS, Manoj, Murthy CSR (2004) Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions. Elsevier Trans Ad hoc Netw 83–124

  13. Ritter N (1999) Location of the pupil-iris border in slit-lamp images of the Cornea. In: Proceedings of the international conference on image analysis and processing. IEEE International Symposium on Signal Processing and Information Technology

  14. Gandhi S et al (2013) A novel Hénon map based adaptive PSO for wavelet shrinkage image denoising. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)

  15. Mitra S, Goswami A (2010) Load balancing in integrated MANET, WLAN and cellular network. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi, November

  16. Wildes R (1997) Iris recognition: an emerging biometric technology. Proc IEEE 85(9):1348–1363

  17. Wildes RP, Asmuth JC, Green GL, Hsu HC (1994) A system for automated iris recognition. In: Proceedings IEEE workshop on applications of computer vision, pp 121–128

  18. Sherin Z, Soni MK, Beg MMS (2015) An optimized genetic stowed biometric approach to potent QOS in MANET. In: Procedia computer science, vol 62. Elsevier, pp 410–418

  19. Sherin Z, Soni MK (2014) Biometric stationed authentication protocol (BSAP) inculcating meta-heuristic genetic algorithm. I.J. Mod Educ Comput Sci 6(9):28–35

  20. Sherin Z, Soni MK (2014) A novel crypt-biometric perception algorithm to protract security in MANET. I.J. Comput Netw Inf Secur 6(12):64–71

  21. Sherin Z, Soni MK (2014) Secure routing in MANET through crypt-biometric technique. In: Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA), pp 713–720

  22. Sherin Z, Soni MK, Beg MMS (2015) QOS optimization in networks through meta-heuristic quartered genetic approach. ICSCTI, IEEE

  23. Sherin Z, Mehta D (2016) Bi-orthogonal wavelet based comer template encoding methodology. MR Int J Eng Technol 8(1):7–15

  24. Sherin Z, Soni MK, Beg MMS (2016) Iris signature methodology for securing MANET. MR Int J Eng Technol 8(1):25–31

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sherin Zafar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zafar, S. Cyber secure corroboration through CIB approach. Int. j. inf. tecnol. 9, 167–175 (2017). https://doi.org/10.1007/s41870-017-0018-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-017-0018-7

Keywords

Navigation