Affiliation:
1. Jamia Hamdard University, India
Abstract
In today's world, wireless technology utilized by cloud and cyber technology has become an essential part of each and every user. Sensitivity, authentication and validation needs to be looked upon. Traditional technologies using simple encryption and password mechanisms cannot look upon the security constraints of today's cyber world; hence, some better authentication aspects like biometric security utilizing most strong feature like iris are exploited in this chapter to serve as specific secure tool.
Reference39 articles.
1. Wavelet Based Iris Recognition for Robust Biometric System.;A.Abhyankar;International Journal of Computer Theory and Engineering,2010
2. Barry, C., & Ritter, N. (n.d.). Database of 120 Greyscale Eye Images. Perth, Western Australia: Lions Eye Institute.
3. A human identification technique using images of the iris and wavelet transform
4. Calderbank, A.R., Daubechies, I., Sweldens, W., & Yeo, B.L. (1998). Wavelet Transforms that Map Integers to Integers. Applied and Computation Harmonic Analysis, (3), 332-369.