作者
Ethar Abdul Wahhab Hachim, Methaq Talib Gaata, Thekra Abbas
发表日期
2022/7/20
研讨会论文
2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)
页码范围
1-6
出版商
IEEE
简介
Biometric identification technology has become increasingly common in our daily lives as the demand for information security and security legislation grows around the world. Together, biometrics and encryption can increase the confidence of the lawful data bearer. In cryptographic systems, key generation is an important topic. As a result, how to use biometrics in cryptographic systems (or bio-cryptosystems) is often tied to how to integrate biometrics with cryptographic “keys”. In this paper, since iris recognition is largely considered to be one of the most reliable solutions available we used this metric in order to determine the authorization of persons for using data on the cloud. The Convolution Neural Network (CNN) model for iris images was proposed for the purpose of classifying and identifying authorized and unauthorized persons. Also, the LDA algorithm was used to generate the key from the iris image features …
引用总数
学术搜索中的文章
EAW Hachim, MT Gaata, T Abbas - 2022 International Conference on Electrical, Computer …, 2022