Abstract

One of the most important modules of computer systems is the one that is responsible for user safety. It was proven that simple passwords and logins cannot guarantee high efficiency and are easy to obtain by the hackers. The well-known alternative is identity recognition based on biometrics. In recent years, more interest was observed in iris as a biometrics trait. It was caused due to high efficiency and accuracy guaranteed by this measurable feature. The consequences of such interest are observable in the literature. There are multiple, diversified approaches proposed by different authors. However, neither of them uses discrete fast Fourier transform (DFFT) components to describe iris sample. In this work, the authors present their own approach to iris-based human identity recognition with DFFT components selected with principal component analysis algorithm. For classification, three algorithms were used—k-nearest neighbors, support vector machines and artificial neural networks. Performed tests have shown that satisfactory results can be obtained with the proposed method.

Highlights

  • Recent research [1] is showing that on average every 39 s hacker attack on computer infrastructure is observed

  • It can lead to another statement—the user is the weakest element in the whole computer system

  • All experiments were made with 510 iris photographs. (Each person was described by 10 samples.) During all tests, the databases were divided into two main groups—training and testing

Read more

Summary

Introduction

Recent research [1] is showing that on average every 39 s hacker attack on computer infrastructure is observed. By this statement we can conclude that importance of security systems is increasing. It was proven that simple security approaches based on login and password are not efficient enough [2]. It is mostly connected with the fact that a part of users selects typical, easy to guess, nicknames, PINs or passwords. It can lead to another statement—the user is the weakest element in the whole computer system.

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call