Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 8
Page No. 2018 - 2022

Amalgamation of Iris Biometrics and Cryptography in Cloud Computing for Improved Authentication

Authors : K. Priyadarsini and S. Saravanakumar


Bowyer, K.W., K. Hollingsworth and P.J. Flynn, 2008. Image understanding for iris biometrics: A survey. Comput. Vision Image Understand., 110: 281-307.
CrossRef  |  Direct Link  |  

Chong, S.C.A., T.B. Jin and D.N.C. Ling, 2006. Iris authentication using privatized advanced correlation filter. Proceedings of the International Conference on Advances in Biometrics, January 5-7, 2006, IEEE Xplore, pp: 382-388.

Daugman, J., 2004. How iris recognition works. IEEE Trans. Circuits Syst. Video Technol., 14: 21-30.
CrossRef  |  Direct Link  |  

He, Z., T. Tan, Z. Sun and X. Qiu, 2009. Toward accurate and fast iris segmentation for iris biometrics. IEEE Trans. Pattern Anal. Mach. Intell., 31: 1670-1684.
CrossRef  |  Direct Link  |  

Hogan, M., F. Liu, A. Sokol and J. Tong, 2011. Nist Cloud Computing Standards Roadmap. National Institute of Standards and Technology, Gaithersburg, Maryland, USA., Pages: 76.

Jain, A., R. Bolle and S. Pankanti, 2006. Biometrics: Personal Identification in Networked Society. Vol. 479, Springer, Berlin, Germany, ISBN:978-0387-28539-9, Pages: 407.

Krutz, R.L. and R.D. Vines, 2010. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley, New York, ISBN: 9780470921449, Pages: 504.

Raghava, N.S., 2011. Iris recognition on hadoop: A biometrics system implementation on cloud computing. Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), September 15-17, 2011, IEEE, Beijing, China, ISBN:978-1-61284-203-5, pp: 482-485.

Ratha, N.K., J.H. Connell and R.M. Bolle, 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J., 40: 614-634.
CrossRef  |  Direct Link  |  

Schneier, B., 1994. The blowfish encryption algorithm. Dr. Dobbs J. Software Tools Prof. Programmer, 19: 38-43.

Schnorr, C.P. and M. Jakobsson, 2000. Security of Signed ElGamal Encryption. In: Theory and Application of Cryptology and Information Security, Okamoto, T. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-41404-9, pp: 73-89.

Sudhan, S.K. and S.S. Kumar, 2014. A panoptic survey on cloud computing. Intl. J. Res. Eng. Technol., 2: 1-5.
Direct Link  |  

Sudhan, S.K.H.H. and S.S. Kumar, 2015. An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian J. Sci. Technol., 8: 1-5.
CrossRef  |  Direct Link  |  

Sudhan, S.K.H.H. and S.S. Kumar, 2016. Gallant use of cloud by a novel framework of encrypted biometric authentication and multi level data protection. Indian J. Sci. Technol., 9: 1-7.
CrossRef  |  Direct Link  |  

Vielhauer, C., 2005. Biometric user Authentication for IT Security: From Fundamentals to Handwriting. Vol. 18, Springer, Berlin, Germany, ISBN:13-978-0-387-26194-2, Pages: 284.

Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future Gener. Comput. Syst., 28: 583-592.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2023 All Rights Reserved