Crytosystem for Computer security using Iris patterns and Hetro correlators 

Abstract

Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper reveals a robust cryptosystem using iris biometric pattern as a crypto-key to resolve the issues in the encryption. An error correction engine based on hetro-correlators has been used to evoke the partially tarnished data fashioned by the decryption process. This process determines the non-repudiation and key management problems. The experimental results show that the suggestion algorithm can implement in the real-life cryptosystem.

Authors and Affiliations

R. Bremananth , Ahmad Sharieh

Keywords

Related Articles

Path Planning in a Dynamic Environment

Path planning is an important area in the control of autonomous mobile robots. Recent work has focused on aspects reductions in processing time than the memory requirements. A dynamic environment uses a lot of memory and...

Unifying Modeling Language-Merise Integration Approach for Software Design

Software design is the most crucial step in the software development process that is why it must be given a good care. Software designers must go through many modeling steps to end up with a good design that will allow f...

The Implementation of Software Anti-Ageing Model towards Green and Sustainable Products

Software ageing is a phenomenon that normally occurs in a long running software. Progressive degradation of software performance is a symptom that shows software is getting aged and old. Researchers believe that the agei...

Arabic Studies’ Progress in Information Retrieval

The field of information retrieval has witnessed tangible progress over the past decades in response to the expanded usage of the internet and the dire need of users to search for massive amounts of digital information....

Risk Diffusion Modeling and Vulnerability Quantification on Japanese Human Mobility Network from Complex Network Analysis Point of View

The human mobility networks are vital infrastructure in recent social systems. Many efforts have been made to keep the healthy human mobility flows to maintain sustainable development of recent well-connected society. Ho...

Download PDF file
  • EP ID EP124532
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

R. Bremananth, Ahmad Sharieh (2011). Crytosystem for Computer security using Iris patterns and Hetro correlators . International Journal of Advanced Computer Science & Applications, 2(11), 1-8. https://europub.co.uk./articles/-A-124532