This book proposes a new model-the IrisCryptoAgentSystem (ICAS)-based on a biometric method for authentication using the iris of the eye. It explains how to use MAS to solve security problems in complex systems and demonstrates how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
This book proposes a new model-the IrisCryptoAgentSystem (ICAS)-based on a biometric method for authentication using the iris of the eye. It explains how to use MAS to solve security problems in complex systems and demonstrates how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
State of the Art: Security of Computer Network Systems. Biometric Systems. Cryptography. Multi-Agent Systems (MAS). Critical Analysis on the Iris Recognition Methods: Existing Methods for the Localization of the Inner and Outer Edges of the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Proposed Model: IrisCryptoAgentSystem (lCAS): Biometric Model for the Authentication Using the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Global Model Integrating Multi-Agents System. Implementation and Simulations: Implementation of the New Methods. Simulation of the Modules. Application. Conclusion and Perspectives. Acknowledgments. Bibliography.
State of the Art: Security of Computer Network Systems. Biometric Systems. Cryptography. Multi-Agent Systems (MAS). Critical Analysis on the Iris Recognition Methods: Existing Methods for the Localization of the Inner and Outer Edges of the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Proposed Model: IrisCryptoAgentSystem (lCAS): Biometric Model for the Authentication Using the Iris of the Eye. Existing Methods for The Elimination of the Effects of the Eyelids. Global Model Integrating Multi-Agents System. Implementation and Simulations: Implementation of the New Methods. Simulation of the Modules. Application. Conclusion and Perspectives. Acknowledgments. Bibliography.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826