An Improved Approach of Iris Biometric Authentication Performance and Security with Cryptography and Error Correction Codes
DOI: http://dx.doi.org/10.30630/joiv.6.2-2.1091
Abstract
Keywords
Full Text:
PDFReferences
M. Al Rousan, and B. Intrigila, “A Comparative Analysis of Biometrics Types: Literature Review,†Journal of Computer Science, vol. 16, no. 12, pp. 1778-1788, 2020.
T. Sabhanayagam, V. P. Venkatesan, and K. Senthamaraikannan, “A comprehensive survey on various biometric systems,†International Journal of Applied Engineering Research, vol. 13, no. 5, pp. 2276-2297, 2018.
C. Kuo, S. Romanosky, and L. F. Cranor, "Human selection of mnemonic phrase-based passwords." pp. 67-78.
B. Brumen, “Security analysis of Game Changer Password System,†International Journal of Human-Computer Studies, vol. 126, pp. 44-52, 2019/06/01/, 2019.
F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively,†IEEE transactions on computers, vol. 55, no. 9, pp. 1081-1088, 2006.
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcardbased fingerprint authentication." pp. 45-52.
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice." pp. 202-213.
F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamics,†International journal of Information security, vol. 1, no. 2, pp. 69-83, 2002.
A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,†IEEE Transactions on circuits and systems for video technology, vol. 14, no. 1, pp. 4-20, 2004.
M. L. Ali, J. V. Monaco, C. C. Tappert, and M. Qiu, “Keystroke Biometric Systems for User Authentication,†Journal of Signal Processing Systems, vol. 86, no. 2, pp. 175-190, 2017/03/01, 2017.
A. Jain, R. Bolle, and S. Pankanti, Biometrics: personal identification in networked society: Springer Science & Business Media, 1999.
A. Ahire, A. Jambhale, T. Patil, M. Chavan, A. Nerurkar, and R. V. Deolekar, "Comparative Analysis of Biometric Systems." pp. 895-901.
J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,†IEEE transactions on pattern analysis and machine intelligence, vol. 15, no. 11, pp. 1148-1161, 1993.
J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Biometric systems: Technology, design and performance evaluation: Springer Science & Business Media, 2005.
J. Daugman, "Iris recognition," Handbook of biometrics, pp. 71-90: Springer, 2008.
R. P. Wildes, “Iris recognition: an emerging biometric technology,†Proceedings of the IEEE, vol. 85, no. 9, pp. 1348-1363, 1997.
S. Ziauddin, and M. N. Dailey, “Robust iris verification for key management,†Pattern Recognition Letters, vol. 31, no. 9, pp. 926-935, 2010.
I. S. Reed, and G. Solomon, “Polynomial codes over certain finite fields,†Journal of the society for industrial and applied mathematics, vol. 8, no. 2, pp. 300-304, 1960.
P. Ariyapreechakul, and N. Covavisaruch, “An improvement of iris pattern identification using radon transform,†ECTI Transactions on Computer and Information Technology (ECTI-CIT), vol. 3, no. 1, pp. 45-50, 2007.
R. P. Wildes, J. C. Asmuth, G. L. Green, S. C. Hsu, R. J. Kolczynski, J. R. Matey, and S. E. McBride, "A system for automated iris recognition." pp. 121-128.
C.-H. Chen, and C.-T. Chu, "Low complexity iris recognition based on wavelet probabilistic neural networks." pp. 1930-1935.
K. W. Bowyer, K. Hollingsworth, and P. J. Flynn, “Image understanding for iris biometrics: A survey,†Computer vision and image understanding, vol. 110, no. 2, pp. 281-307, 2008.
S. Yang, and I. Verbauwhede, "Secure iris verification." pp. II-133-II-136.
S. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacrétaz, and B. Dorizzi, "Three factor scheme for biometric-based cryptographic key regeneration using iris." pp. 59-64.
X. Wu, N. Qi, K. Wang, and D. Zhang, "A novel cryptosystem based on iris key generation." pp. 53-56.
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, "Optimal iris fuzzy sketches." pp. 1-6.