17-05-2013, 03:44 PM
Efficient Iris Biometrics Technique for Secure Distributed System
Efficient Iris Biometrics.pdf (Size: 384.84 KB / Downloads: 29)
Summary
In recent years the need has grown for the use of distributed systems for use in different applications and this applications become used in many areas and as an example for the applications of distributed systems is the E-commerce transactions, E-commerce is a set of e-business such as sales, purchase or exchange of goods and this business is done through large computer networks (such as the Internet); hence, there is a growing need for a combination of legislation and technical solutions to globally secure customer privacy. Credit card fraud is one of the crimes especially when it is used for web-based transaction. In this paper, a technical solution using Efficient and fast Iris recognition method as an authentication technique is proposed for protecting identity theft in e-commerce transactions because Iris patterns are unique to an individual. Therefore, this research proposes a web-based architecture which uses a combination of Image Processing and secure transmission of customers’ Iris templates along with credit card details for decreasing credit card frauds over Internet.
Introduction
In reality, the Web represents a huge distributed system that appears as a single resource to the user available at the click of a button. There are several definitions and view points on what distributed systems are. Coulouris defines a distributed system as “a system in which hardware or software components located at networked computers communicate and coordinate their actions only by message passing” [1]; and Tanenbaum defines it as “A collection of independent computers that appear to the users of the system as a single computer” [2]. Leslie Lamport – a famous researcher on timing, message ordering, and clock synchronization in distributed systems once said that “A distributed system is one on which I cannot get any work done because some machine I have never heard of has crashed“ reflecting on the huge number of challenges faced by distributed system designers. Despite these challenges, the benefits of distributed systems and applications are many, making it worthwhile to pursue.
Biometric Authentication
Biometric authentication virtually eliminates the risk of anonymity in a two-factor security scenario by using a physical attribute of the person to authenticate a token. The process is similar to biometric identification. First, the requestor presents a token to assert identity. For example, an ATM or credit card is inserted into a reader. (A number encoded on the card is actually the token; the card is more like a container for the token, but treating the card as a token is appropriate.) As with identification, the system must acquire an image of the personal attribute. Second, the attribute must be localized, minutiae extracted, and a matching template created. Finally, the value of the token is used to look up the template previously stored for this individual. If it matches the template presented on this occasion, the requestor is authenticated, all the above stages explained in the Figure (1)[3].
Image Processing
The possibility that the uniqueness of Iris of the eye could be used as a kind of optical fingerprint for personal identification was first suggested by ophthalmologists. However, John Daugman was the first person to use this idea for human identification as an algorithm [8], [9], [10], [11]. In the previous papers, the extensive amount of research has been done on Daugman’s algorithm [12], the Boles's algorithm[13]and the Arian's algorithm[7]. In this paper we are going to introduce an algorithm to improve the Daugman’s algorithm and another algorithms in both speed and accuracy.
Feature Extraction and Code
An iris image contains much detail texture, the texture is composed by many shape blocks such as strip and speckle, the gray differences are big and distribute unevenly, these blocks with irregular shape can be as distinguish characteristics for iris recognition[16].
Firstly we need to determine the collective and effective coding region of the entering iris and the registering iris, this region does not contain noise such as eyelash, eyelid and facula. We suppose vertical coordinates of D point of the entering iris and the registering iris in the normalized image are rD Enroll , rD Register respectively, and determine the smaller value as rD Match between two values x1,xr, of the entering iris and the registering iris in the normalized image are x1Enroll , xrEnroll and x1Register , xrRegister respectively, determine the bigger value as x1Match , x1Enroll between and x1Register, and determine the smaller value as between xrMatch , xrEnroll between and xrRegister . So we determine collective and effective texture region of the entering iris and the registering iris.
Conclusion
This paper has proposed a new secure model of architecture for online credit card transactions as example for using the distributed systems in the applications. There are so many algorithms that have created to help human identification through Iris recognition. The most popular one is named “Daugman”. To prove this model, in this paper we introduced high performance of Iris recognition algorithm in compare with Daugman’s algorithm and the other algorithms is created. The new Iris recognition method based on the natural-open eyes. This method can find the iris characteristic point in a short time, the recognition rate is high, the recognition speed is guaranteed. And also we displayed in our paper how can provide securely transmission of iris templates over Internet, it has been recognized that the chaos theory as appropriate security technique that can used in our system, that is used to provide authentication and identification to the customers , they used the credit card.