1st Edition

Iris Biometric Model for Secured Network Access

By Franjieh El Khoury Copyright 2013
    220 Pages 87 B/W Illustrations
    by CRC Press

    220 Pages 87 B/W Illustrations
    by CRC Press

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

    Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates.

    The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.

    The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.

    STATE OF THE ART

    Security of Computer Networks
    General Overview on Different Risks for and Means of Computer Defense
    Level of Security and Risks
         Risks at the Physical Level 
         Risks at the Level of Access to Data and Their Transmission across the Network
         Risks at the Network Level
    Means of Defense 
         Means of Defense at the Physical Level 
         Means of Defense at the Level of Data and Their Transmission across the Network 
         Means of Defense at the Network Level
    Conclusion

    Biometric Systems
    Introduction
    General Definition of a Biometric System
    Different Biometric Technologies 
         Morphological Biometrics
         Behavioral Biometrics 
         Biological Biometric
    Comparison of the Different Biometric Techniques
    Algorithms for Iris Recognition 
         Acquisition and Manipulation of the Image 
         Localization of the External and Internal Edges of the Iris 
         Normalization 
         Extraction of Biometric Characteristics of the Iris 
         Verification "Matching" 
         Effect of the Eyebrows and Upper and Lower Eyelids
    Discrete Geometry in the Definition of an Edge in an Image
    Pretopological Aspects in Image Classification 
         Overview of the Pretopological Spaces 
         Different Types of Pretopological Structures 
         Classification Method
    Conclusion

    Cryptography
    Introduction
    Different Cryptographic Methods 
         Symmetric Cryptography 
         Asymmetric Cryptography 
         Digital Signature 
         Digital Certificate
    Recapitulative Table of Comparison of Different Cryptographic Methods
    Conclusion

    Multiagent System
     
    Introduction
    Properties of Agents 
    Types of Agents 
    Communication of Agents 
         Acts of Language 
         Acts of Conversation 
         Languages of Communication 
    Cooperation of Agents 
         Interactions 
         Coordination 
         Negotiation
    Planning in a Multiagent Environment
    Architectures of Agents 
         Blackboard Architecture 
         Subsumption Architecture 
         Architecture of Competitive Tasks 
         Architecture of Production Systems 
         Architecture of Scalable Agent-Based Information Retrieval Engine (SAIRE) 
         Architecture of Agents Based on Behavior
    Conclusion
    Conclusion of Part 1

    CRITICAL ANALYSIS OF METHODS OF IRIS RECOGNITION

    Existing Methods for Localization of External and Internal Edges of the Iris of the Eye
    Introduction
    Tests and Simulations 
         First Simulation: Method of Daugman and Huang 
         Second Simulation: Method of Daugman and Huang and Tian 
         Third Simulation: Method of Daouk and Tian 
         Fourth Simulation: Method of Miyazawa 
         Fifth Simulation: Method of Daouk and Tian
    Analysis of Simulations 
         Concentricity of Edges C1 and C2 
         Temporal Aspect 
         Length of Radius of Edge C1
         Comparison of the Methods by Outranking Relation
    Conclusion

    Existing Methods for Eliminating Effects of the Eyelids
    Introduction 
    Tests and Simulations 
         First Simulation: Method of Daugman and Wildes 
         Second Simulation: Method of Myazawa and Daouk 
         Third Simulation: Method of Tian
    Evaluations of Simulations
    Conclusion
    Conclusion of Part 2

    OUR PROPOSED MODEL: THE IRIS CRYPTO AGENT SYSTEM

    Biometric Model for Authentication Using the Iris of the Eye 
    Introduction
    Justification of the Choice of the Proposed Biometric Model 
    Description of the Biometric Model 
    Representation of the Different Phases Constituting the Model 
         Phase 1—Acquisition of the Image 
         Phase 2—Manipulation of the Image 
         Phase 3—Treatment of the Image 
         Phase 4—Encryption of the Gabarit 
         Phase 5—Verification
    Conclusion

    Global Model Integrating a Multiagent System
    Introduction
    Global Model 
         Architecture of the Model 
         Representation of Interactions between Different Actors 
         Composition of the Model
    Integration of Multiagent System 
         General Model of Integrated MAS 
         Architecture of Agents 
         Realization of Instances of MAS Agents 
         Modeling Interactions between Agents 
         Model of Scheduling Tasks 
         Architecture of MAS Model
    Conclusion
    Conclusion of Part 3

    IMPLEMENTATION AND SIMULATIONS

    Implementation of New Methods
    Presentation of Our Algorithm for Iris Recognition 
         Algorithm of the Optimized Circular Hough Transform 
         Algorithm of the Determination of the Raster T 
         Algorithm for the Classification of Gabarits DHVA
    Analysis of Performance
    Conclusion

    Simulation of Modules 
    Simulations and Analysis of the Edges Localization Module 
         Simulation of Our Module 
         Analysis of the Simulations Based on Time Aspects
    Simulations and Analysis of the Elimination of Eyelids’ Effects Module 
         First Simulation: Two Sections of Circular Rings to Left and to Right of 150° 
         Second Simulation: One Circular Ring Section of 330° 
         Third Simulation: Intersection between Region of the Iris and a Given Ellipse
         Evaluations of Simulations 
    Simulations and Analysis of Classification of Gabarits DHVA Module
    Conclusion

    Application
    Description of the Information System
    Schema of Granted Privileges by Users
    Study of the Resources 
         Human Resources 
         Software 
         Hardware
    Conclusion
    Conclusion of Part 4

    Conclusion and Perspectives
    References
    Index

    Biography

    Franjieh El Khoury