Iris Final Ppt
-
Upload
gaurav-jain -
Category
Documents
-
view
227 -
download
0
Transcript of Iris Final Ppt
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 1/15
PRESENTED BY :
GAURAV JAIN (B.E.COMP.)
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 2/15
1. Introduction
2. Web service and Security
3. Iris Recognition System
Iris Recognition System Process
4. Integrating Iris Recognition System With
Web Services
5. Result
6. Conclusion
7. Reference
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 3/15
: From the past few years, Internet is widelyused in every field. There have been threewaves of internet development: e-mail, websites and web services. The latestdevelopment in using web for conductingbusiness resulted in a new paradigm calledweb services. A web service contains so muchcritical & sensitive information, such as
government , However, security for such webservices is critical . Security for web servicesis seen as a major challenge to be overcome.Biometrics can play an important role in webservices security.
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 4/15
The web services framework is divided into
three areas.
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 5/15
There are five key threats to the security of Webservices, which are given below:
Unauthorized access - refers when a person who does nothave permission to connect to or use a system gains entry
in a manner unintended by the system owner P arameter manipulation - refers to the unauthorized
mod
ification of data sent between the web serviceconsumer and the web service
N etwork eavesdropping -an attacker is able to view webservi
ce messages as they flow across the network
Disclosure of configuration data - refers to thereveal
ing of the information to the attacker
Message replay - an attacker captures and copies amessage and
replays it to the web service impersonatingthe client. The message may or may not be modified.
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 6/15
Authentication of an entity, provided by web
services security, is usually done by verifying
one or more of the followings:
Something the entity is (by biometric
techniques)
Something the entity has (by PKI certificate,
IDcards, smart cards)
Something the entity knows (by passwords)
unauthorized parties.
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 8/15
Iris recognition has become the major
recognition technology since it is the most
reliable form of biometrics.
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 9/15
Image acquisition
Preprocessing the iris image
Iris feature extraction
Iris matching
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 10/15
First the user·s iris image is captured and
then it is preprocessed.
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 11/15
The encoded binary code is embedded in
XCBF and then the encoded binary code will
be compared with the enrolled code during
the verification process through theHamming distance.
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 12/15
In this paper, the analysis of the need of
security in the web services and the usage of
iris biometrics for the strong authentication
is presented. The aim of this work is tointegrate iris recognition biometric system
with the web service for the authentication
purpose. As iris recognition system is unique
and accurate, it is used mainly for theauthentication purpose. It also speeds up the
verification and identification
8/3/2019 Iris Final Ppt
http://slidepdf.com/reader/full/iris-final-ppt 13/15
[1] David C.Chou, Kirill Yurov, ´Security development in web servicesenvironment ´, Computer standards and interfaces , 27 (2005), pp. 233-240.
[2] Ramakanta Mohanty, V. Ravi b, M.R. Patra , ́ Web-servicesclassification using intelligent techniquesµ, Expert Systems with
Applications ,37 (2010), pp. 5484²5490.
[3] UDDI. Version 3.0, <http://uddi.org/pubs/uddi-v3.00-published-20020719.htm > , 19 July 2002
[4] Stuart King, ´Threat and solutions to web service securityµ, NetworkSecurity, 9(2003), pp. 8-11.
[5] J. Wayman, A. Jain, D. Maltoni, D. Maio, Biometric Systems,Technology, Design and Performance Evaluation, 2005
[6] Arun Ross, ´Iris recognition: the path forwardµ, IEEE ComputerSociety, 2010.