• Mar 26, 2024 News!Vol.16, No. 1 has been published with online version.   [Click]
  • Jan 02, 2024 News!All papers in IJET will be publihsed article by article staring from 2024.
  • Nov 03, 2023 News!News | Vol.15, No. 4 has been published with online version.   [Click]
General Information
    • ISSN: 1793-8236 (Online)
    • Abbreviated Title Int. J. Eng. Technol.
    • Frequency:  Quarterly 
    • DOI: 10.7763/IJET
    • Managing Editor: Ms. Jennifer Zeng
    • Abstracting/ Indexing: Inspec (IET), CNKI Google Scholar, EBSCO, ProQuest, Crossref, etc.
    • E-mail: ijet_Editor@126.com
Editor-in-chief
IJET 2011 Vol.3(1): 102-108 ISSN: 1793-8236
DOI: 10.7763/IJET.2011.V3.207

Iris Biometrics Based Authentication and Key Exchange System

K. Saraswathi, B. Jayaram and R. Balasubramanian

Abstract—Wireless Local Area Networks (WLANs) are gaining gratitude as they are fast, cost effective, supple and easy to use. The networks face severe issues and challenges in establishing security to the users’ of the network. With users accessing networks remotely, exchanging data by means of the Internet and carrying around laptops containing sensitive data, ensuring security is an increasingly multifarious challenge. Therefore it is essential to make sure the security of the network users. In order to offer network security many techniques and systems have been proposed earlier in literature. Most of these traditional methods uses password, smart cards and so on to provide security to the network users. Though these traditional methods are effectual in ensuring security they posses some limitations too. This paper proposes an approach for network security by means of biometrics. As we all know biometric systems are generally used to control access to physical assets (laboratories, buildings, cash from ATMs, etc.) or logical information such as personal computer accounts, secure electronic documents etc., The human biometrics such as hand geometry, face, fingerprint, retina, iris, DNA, signature and voice can be effectively used to ensure the network security. The different phases included in this proposed approach are user registration, Extraction of minutiae points and secret key, Iris localization and Normalization. Furthermore, biometric authentication systems can be more opportune for the users since it involves no password that might be feared to be forgotten by the network users or key to be lost and therefore a single biometric trait (e.g. Iris) can be used to access several accounts without the burden of remembering passwords. In this paper the Iris biometric is used to provide security. This proposed paper also explains some of the Iris localization and Normalization techniques to make the biometric template noise free. Experiments are conducted to appraise the performance measure of the proposed approach.

Index Terms—Biometric Security, Cryptography, Data Security, Iris Biometrics, Localization and Normalization.

K. Saraswathi, Asst. Proffessor is with the Department of Computer Science, Govt Arts College, Udumalpet, Tirupur, India.
B. Jayaram, Asst. Proffessor is with the Department of Computer Science & Engineering, PA College of Engineering and Technology, Pollachi, Coimbatore, India.
R. Balasubramanian is with the Dean Academic Affairs, PP GInstitute of Technology, Coimbatore, India.

[PDF]

Cite: K. Saraswathi, B. Jayaram and R. Balasubramanian, "Iris Biometrics Based Authentication and Key Exchange System," International Journal of Engineering and Technology vol. 3, no. 1, pp. 102-108, 2011.

Copyright © 2008-2024. International Journal of Engineering and Technology. All rights reserved. 
E-mail: ijet_Editor@126.com