Skip to main content

Iris Based Secured Newfangled System Procuring Miniaturized Prorogation

  • Conference paper
  • First Online:
Data Science and Analytics (REDSET 2019)

Abstract

In the present situation, various associations are totally dependent on data innovation for their survival, experiencing the negative effects of different security challenges, for example, unapproved access, physical damage and so forth. So as to maintain a strategic distance from various security breaks and concerns, a strong part for client get to that protections beneficial data and is used to create different other security applications should be received. Biometric “anchored innovation takes into account over customary security components such as password, smartcard and so on, as to take identification of data by biometric are tough in comparison with different instruments. During investigation, the “secure biometric system” is recommended for dispense with the worries related to the security of various societies and associations through the iris acknowledgment structure. Iris acknowledgment structure is a framework that perceives an individual through the breakdown of their iris design. This acknowledgment structure fuses iris picture procurement, division, institutionalization, encoding and last endorsement of iris formats. The structure for iris acknowledgment made and mimicked in this exploration study has been founded on IIT database iris pictures as wellsprings of information and for matching process parameters of hamming distance are utilize. The conclusions outline a novel and profitable philosophy which will crush distinctive unapproved gets to over the web. This iris-based recognition as the novel method system, when stood out from different iris acknowledgment is that at whatever point picked pictures are composed with database having arranged iris pictures which will result hamming distance as almost every iris acknowledgment structures clearly recognize or expel pictures and causes execution issues and gigantic clog.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zafar, S., et al.: An optimized genetic stowed biometric approach to potent QOS in MANET. In: International Conference on Soft Computing and Software Engineering (SCSE) (2015)

    Google Scholar 

  2. Lin, J., Yu, W., Zhang, N.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. In: INDIACom 3rd International Conference, vol. 14, no. 1 (2017)

    Article  Google Scholar 

  3. Elsherief, S.M., Allam, M.E., Fakhr, M.W.: Biometric personal identification based on iris recognition. In: The 2006 International Conference on Computer Engineering and Systems (2006)

    Google Scholar 

  4. Granjal, J., Monterio, E., Silva, J.S.: Security for the internet of things, a survey of existing protocols and open research issues. In: International conference on ICCPEIC, Portugal (2015)

    Article  Google Scholar 

  5. Sherin, Z., Soni, M.K.: Secure Routing in MANET through Crypt-Biometric Technique. In: Satapathy, S.C., Biswal, B.N., Udgata, Siba K., Mandal, J.K. (eds.) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. AISC, vol. 328, pp. 713–720. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-12012-6_79

    Chapter  Google Scholar 

  6. Abomhara, M., Koien, G.M.: Security and privacy in the internet of things: current status and open issues. In: International Conference in Aalborg (2014)

    Google Scholar 

  7. Khaw, P.: Iris recognition technology for improved authentication. SANS Institute (2002)

    Google Scholar 

  8. Wildes, R.P.: Iris recognition: an emerging biometric technology. Proc. IEEE 85(9), 1348–1363 (1997). https://doi.org/10.1109/5.628669

    Article  Google Scholar 

  9. Misiti, M., et al.: A biometric authentication approach for high security ad hoc networks. In: Proceedings of IEEE Workshop on Information Assistance, pp. 250–256 (2004)

    Google Scholar 

  10. Liu, J., et al.: Optimal biometric-based continuous authentication in mobile ad hoc networks. In: Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 76–81 (2007)

    Google Scholar 

  11. Khaw, P.: Iris recognition technology for improved authentication, SANS Security Essential (GSEC) Practical Assignment, version 1.3, SANS Institute, pp. 5–8 (2002)

    Google Scholar 

  12. Masek, L.: Recognition of human eye iris patterns for biometric identification. University of West California (2003)

    Google Scholar 

  13. Daugmann, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 15(11), 1148–1161 (1993)

    Article  Google Scholar 

  14. Zafar, S., Soni, M.K.: A novel crypt-biometric perception algorithm to protract security in MANET. Int. J. Comput. Netw. Inf. Secur. 6, 64–71 (2014)

    Google Scholar 

  15. Zafar, S., Soni, M.K.: Biometric stationed authentication protocol (BSAP) inculcating metaheuristic genetic algorithm. Int. J. Mod. Educ. Comput. Sci. 9, 28–35 (2014)

    Article  Google Scholar 

  16. Bazaz, T., Zafar, S.: A neoteric optimization methodology for cloud networks. Int. J. Mod. Educ. Comput. Sci. 6, 27–34 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayesha Hena Afzal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Afzal, A.H., Zafar, S., Afshar Alam, M. (2020). Iris Based Secured Newfangled System Procuring Miniaturized Prorogation. In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1230. Springer, Singapore. https://doi.org/10.1007/978-981-15-5830-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5830-6_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5829-0

  • Online ISBN: 978-981-15-5830-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics