Iris Biometric Model for Secured Network Access
-10%
portes grátis
Iris Biometric Model for Secured Network Access
Khoury, Franjieh El
Taylor & Francis Ltd
10/2017
220
Mole
Inglês
9781138198722
15 a 20 dias
410
Descrição não disponível.
State of the Art: Security of Computer Network Systems. Biometric Systems. Cryptography. Multi-Agent Systems (MAS). Critical Analysis on the Iris Recognition Methods: Existing Methods for the Localization of the Inner and Outer Edges of the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Proposed Model: IrisCryptoAgentSystem (lCAS): Biometric Model for the Authentication Using the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Global Model Integrating Multi-Agents System. Implementation and Simulations: Implementation of the New Methods. Simulation of the Modules. Application. Conclusion and Perspectives. Acknowledgments. Bibliography.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Internal Edges;Edge C1;internal;Asymmetric Cryptography;edges;Iris Recognition;recognition;Private Key;lower;Method M2;eyelids;Circular Hough Transform;hough;Ma;transform;Multiagent System;external;Public Key;edge;Family F1;asymmetric;F1 F2 F3;Biometric Characteristics;Lower Eyelids;Iris;Biometric Authentication Method;Biometric Signature;MATLAB R2006a;External Edge;Left Iris;Protocol MPLS;Edges Localization Module;Method M5;Symmetric Cryptography;Encrypted Message
State of the Art: Security of Computer Network Systems. Biometric Systems. Cryptography. Multi-Agent Systems (MAS). Critical Analysis on the Iris Recognition Methods: Existing Methods for the Localization of the Inner and Outer Edges of the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Proposed Model: IrisCryptoAgentSystem (lCAS): Biometric Model for the Authentication Using the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Global Model Integrating Multi-Agents System. Implementation and Simulations: Implementation of the New Methods. Simulation of the Modules. Application. Conclusion and Perspectives. Acknowledgments. Bibliography.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Internal Edges;Edge C1;internal;Asymmetric Cryptography;edges;Iris Recognition;recognition;Private Key;lower;Method M2;eyelids;Circular Hough Transform;hough;Ma;transform;Multiagent System;external;Public Key;edge;Family F1;asymmetric;F1 F2 F3;Biometric Characteristics;Lower Eyelids;Iris;Biometric Authentication Method;Biometric Signature;MATLAB R2006a;External Edge;Left Iris;Protocol MPLS;Edges Localization Module;Method M5;Symmetric Cryptography;Encrypted Message