Crytosystem for Computer security using Iris patterns and Hetro correlators 

Abstract

Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper reveals a robust cryptosystem using iris biometric pattern as a crypto-key to resolve the issues in the encryption. An error correction engine based on hetro-correlators has been used to evoke the partially tarnished data fashioned by the decryption process. This process determines the non-repudiation and key management problems. The experimental results show that the suggestion algorithm can implement in the real-life cryptosystem.

Authors and Affiliations

R. Bremananth , Ahmad Sharieh

Keywords

Related Articles

An Efficient Design of RPL Objective Function for Routing in Internet of Things using Fuzzy Logic

The nature of the Low power and lossy networks (LLNs) requires having efficient protocols capable of handling the resource constraints. LLNs consist of networks that connect different type of devices which has constraint...

An SMS-SQL based On-board system to manage and query a database

Technological advances of recent years have facilitated the use of embedded systems. They are part of our everyday life. Thanks to them, electronic devices are increasingly present in our lives in many forms: Mobile phon...

Optimizing Coverage of Churn Prediction in Telecommunication Industry

Companies are investing more in analytics to obtain a competitive edge in the market and decision makers are required better identification among their data to be able to interpret complex patterns more easily. Alluring...

Case Based Reasoning: Case Representation Methodologies

Case Based Reasoning (CBR) is an important technique in artificial intelligence, which has been applied to various kinds of problems in a wide range of domains. Selecting case representation formalism is critical for the...

Directed and Almost-Directed Flow Loops in Real Networks

Directed flow loops are highly undesirable because they are associated with wastage of energy for maintaining them and entail big losses to the world economy. It is shown that directed flow loops may appear in networks e...

Download PDF file
  • EP ID EP124532
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

R. Bremananth, Ahmad Sharieh (2011). Crytosystem for Computer security using Iris patterns and Hetro correlators . International Journal of Advanced Computer Science & Applications, 2(11), 1-8. https://europub.co.uk./articles/-A-124532