Iris Final Ppt

15
PRESENTED BY : GAURAV JAIN (B.E.COMP.)

Transcript of Iris Final Ppt

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 1/15

PRESENTED BY :

GAURAV JAIN (B.E.COMP.)

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 2/15

1. Introduction

2. Web service and Security

3. Iris Recognition System

Iris Recognition System Process

4. Integrating Iris Recognition System With

Web Services

5. Result

6. Conclusion

7. Reference

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 3/15

: From the past few years, Internet is widelyused in every field. There have been threewaves of internet development: e-mail, websites and web services. The latestdevelopment in using web for conductingbusiness resulted in a new paradigm calledweb services. A web service contains so muchcritical & sensitive information, such as

government , However, security for such webservices is critical . Security for web servicesis seen as a major challenge to be overcome.Biometrics can play an important role in webservices security.

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 4/15

The web services framework is divided into

three areas.

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 5/15

There are five key threats to the security of Webservices, which are given below:

Unauthorized access - refers when a person who does nothave permission to connect to or use a system gains entry

in a manner unintended by the system owner P arameter manipulation - refers to the unauthorized

mod

ification of data sent between the web serviceconsumer and the web service

N etwork eavesdropping -an attacker is able to view webservi

ce messages as they flow across the network

Disclosure of configuration data - refers to thereveal

ing of the information to the attacker

Message replay  - an attacker captures and copies amessage and

replays it to the web service impersonatingthe client. The message may or may not be modified.

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 6/15

Authentication of an entity, provided by web

services security, is usually done by verifying

one or more of the followings: 

Something the entity is (by biometric

techniques)

Something the entity has (by PKI certificate,

IDcards, smart cards)

Something the entity knows (by passwords)

unauthorized parties.

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 7/15

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 8/15

Iris recognition has become the major

recognition technology since it is the most

reliable form of biometrics.

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 9/15

Image acquisition

Preprocessing the iris image

Iris feature extraction

Iris matching

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 10/15

First the user·s iris image is captured and

then it is preprocessed.

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 11/15

The encoded binary code is embedded in

XCBF and then the encoded binary code will

be compared with the enrolled code during

the verification process through theHamming distance.

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 12/15

In this paper, the analysis of the need of

security in the web services and the usage of

iris biometrics for the strong authentication

is presented. The aim of this work is tointegrate iris recognition biometric system

with the web service for the authentication

purpose. As iris recognition system is unique

and accurate, it is used mainly for theauthentication purpose. It also speeds up the

verification and identification

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 13/15

[1] David C.Chou, Kirill Yurov, ´Security development in web servicesenvironment ´, Computer standards and interfaces , 27 (2005), pp. 233-240.

[2] Ramakanta Mohanty, V. Ravi b, M.R. Patra , ́ Web-servicesclassification using intelligent techniquesµ, Expert Systems with

Applications ,37 (2010), pp. 5484²5490.

[3] UDDI. Version 3.0, <http://uddi.org/pubs/uddi-v3.00-published-20020719.htm > , 19 July 2002

[4] Stuart King, ´Threat and solutions to web service securityµ, NetworkSecurity, 9(2003), pp. 8-11.

[5] J. Wayman, A. Jain, D. Maltoni, D. Maio, Biometric Systems,Technology, Design and Performance Evaluation, 2005

[6] Arun Ross, ´Iris recognition: the path forwardµ, IEEE ComputerSociety, 2010.

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 14/15

 THANK YOU

8/3/2019 Iris Final Ppt

http://slidepdf.com/reader/full/iris-final-ppt 15/15

ANY 

QUESTIONS ????