Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
8
Page No.
2018 - 2022
References
Bowyer, K.W., K. Hollingsworth and P.J. Flynn, 2008. Image understanding for iris biometrics: A survey. Comput. Vision Image Understand., 110: 281-307.
CrossRef | Direct Link | Chong, S.C.A., T.B. Jin and D.N.C. Ling, 2006. Iris authentication using privatized advanced correlation filter. Proceedings of the International Conference on Advances in Biometrics, January 5-7, 2006, IEEE Xplore, pp: 382-388.
Daugman, J., 2004. How iris recognition works. IEEE Trans. Circuits Syst. Video Technol., 14: 21-30.
CrossRef | Direct Link | He, Z., T. Tan, Z. Sun and X. Qiu, 2009. Toward accurate and fast iris segmentation for iris biometrics. IEEE Trans. Pattern Anal. Mach. Intell., 31: 1670-1684.
CrossRef | Direct Link | Hogan, M., F. Liu, A. Sokol and J. Tong, 2011. Nist Cloud Computing Standards Roadmap. National Institute of Standards and Technology, Gaithersburg, Maryland, USA., Pages: 76.
Jain, A., R. Bolle and S. Pankanti, 2006. Biometrics: Personal Identification in Networked Society. Vol. 479, Springer, Berlin, Germany, ISBN:978-0387-28539-9, Pages: 407.
Krutz, R.L. and R.D. Vines, 2010. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley, New York, ISBN: 9780470921449, Pages: 504.
Raghava, N.S., 2011. Iris recognition on hadoop: A biometrics system implementation on cloud computing. Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), September 15-17, 2011, IEEE, Beijing, China, ISBN:978-1-61284-203-5, pp: 482-485.
Ratha, N.K., J.H. Connell and R.M. Bolle, 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J., 40: 614-634.
CrossRef | Direct Link | Schneier, B., 1994. The blowfish encryption algorithm. Dr. Dobbs J. Software Tools Prof. Programmer, 19: 38-43.
Schnorr, C.P. and M. Jakobsson, 2000. Security of Signed ElGamal Encryption. In: Theory and Application of Cryptology and Information Security, Okamoto, T. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-41404-9, pp: 73-89.
Sudhan, S.K. and S.S. Kumar, 2014. A panoptic survey on cloud computing. Intl. J. Res. Eng. Technol., 2: 1-5.
Direct Link | Sudhan, S.K.H.H. and S.S. Kumar, 2015. An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian J. Sci. Technol., 8: 1-5.
CrossRef | Direct Link | Sudhan, S.K.H.H. and S.S. Kumar, 2016. Gallant use of cloud by a novel framework of encrypted biometric authentication and multi level data protection. Indian J. Sci. Technol., 9: 1-7.
CrossRef | Direct Link | Vielhauer, C., 2005. Biometric user Authentication for IT Security: From Fundamentals to Handwriting. Vol. 18, Springer, Berlin, Germany, ISBN:13-978-0-387-26194-2, Pages: 284.
Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future Gener. Comput. Syst., 28: 583-592.
CrossRef | Direct Link |