Abstract
The basic idea of this research methodology is to perform cyber secure corroboration through crypt-iris based (CIB) approach for enhancing security in today’s cyber world. Today’s cyber world is prone to various kinds of attacks, malware and ransom ware among the latest. So, the proposed CIB authentication system for simulation point of view has taken a standardized database for analysis. As biometric that too iris based is considered one of the most neoteric methodology to sustain security in modern day cyber world by involving exclusive identification features. The success of any kind of biometric approach depends upon the image capture and feature extraction process which is efficiently carried upon in this approach by utilizing bi-orthogonal wavelets for encoding the iris based biometric template. Enhancement of the crypt-iris based biometric system is done by utilizing elliptic curve methodology resulting in effective solutions against various security breaches.
Similar content being viewed by others
References
Abhyankar A, Schuckers S (2010) Wavelet based iris recognition for robust biometric system. Int J Comput Theory Eng 2(2):1793–8201
Kush A, Hwang C (2011) Hash security for ad hoc routing. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi Copy Right © BIJIT; January–June, 2011 3(1); ISSN 0973–5658 271
Boles WW, Boashash B (1998) A human identification technique using images of the iris and wavelet transform. IEEE Trans Signal Process 46(4):1185–1188
Cheng H (2010) Genetic algorithms with immigrants schemes for dynamic multicast problems in mobile ad hoc networks. Eng Appl Artif Intell Elsevier 23(5):806–819
Daugman J (1994) Biometric personal identification system based on iris analysis. United States Patent, 5291560
Singh D, Singh A (2010) A secure private key encryption technique for data security in modern cryptosystem. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi
Haas Z, Deng B, Liang P, Papadimitratos S, proakis J (2002) Wireless ad-hoc networks in encyclopedia of telecommunications. John Wiley
Ma L, Wang Y, Tan T (2002) Iris recognition using circular symmetric filters. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences
Masek L (2003) Recognition of human iris patterns for biometric identification. University of Western Australia, Perth
Panganiban A, Linsangan N, Caluyo F (2011) Wavelet-based feature extraction algorithm for an iris recognition system. J Inf Process Syst 5(3):425–434
Pranav M et al (2010) Simulation and proportional evaluation of AODV and DSR in different environment of WSN. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeth’s Institute of Computer Applications and Management (BVICAM), New Delhi
Reddy TB, Karthigeyan BS, Manoj, Murthy CSR (2004) Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions. Elsevier Trans Ad hoc Netw 83–124
Ritter N (1999) Location of the pupil-iris border in slit-lamp images of the Cornea. In: Proceedings of the international conference on image analysis and processing. IEEE International Symposium on Signal Processing and Information Technology
Gandhi S et al (2013) A novel Hénon map based adaptive PSO for wavelet shrinkage image denoising. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Mitra S, Goswami A (2010) Load balancing in integrated MANET, WLAN and cellular network. In: BIJIT—BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi, November
Wildes R (1997) Iris recognition: an emerging biometric technology. Proc IEEE 85(9):1348–1363
Wildes RP, Asmuth JC, Green GL, Hsu HC (1994) A system for automated iris recognition. In: Proceedings IEEE workshop on applications of computer vision, pp 121–128
Sherin Z, Soni MK, Beg MMS (2015) An optimized genetic stowed biometric approach to potent QOS in MANET. In: Procedia computer science, vol 62. Elsevier, pp 410–418
Sherin Z, Soni MK (2014) Biometric stationed authentication protocol (BSAP) inculcating meta-heuristic genetic algorithm. I.J. Mod Educ Comput Sci 6(9):28–35
Sherin Z, Soni MK (2014) A novel crypt-biometric perception algorithm to protract security in MANET. I.J. Comput Netw Inf Secur 6(12):64–71
Sherin Z, Soni MK (2014) Secure routing in MANET through crypt-biometric technique. In: Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA), pp 713–720
Sherin Z, Soni MK, Beg MMS (2015) QOS optimization in networks through meta-heuristic quartered genetic approach. ICSCTI, IEEE
Sherin Z, Mehta D (2016) Bi-orthogonal wavelet based comer template encoding methodology. MR Int J Eng Technol 8(1):7–15
Sherin Z, Soni MK, Beg MMS (2016) Iris signature methodology for securing MANET. MR Int J Eng Technol 8(1):25–31
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zafar, S. Cyber secure corroboration through CIB approach. Int. j. inf. tecnol. 9, 167–175 (2017). https://doi.org/10.1007/s41870-017-0018-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-017-0018-7