Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

California Polytechnic State University, San Luis Obispo

Theses/Dissertations

2015

Authentication

Articles 1 - 2 of 2

Full-Text Articles in Engineering

An Iris Authentication System Based On Artificial Neural Networks, Brenden Velu Jun 2015

An Iris Authentication System Based On Artificial Neural Networks, Brenden Velu

Electrical Engineering

An iris authentication system verifies the authenticity of a person based on their iris features. The iris features are extracted through wavelet transform of the isolated iris from modified iris images. A level 5 wavelet decomposition is performed on the images, and the resulting low-frequency wavelet coefficients represent the inputs to the artificial neural network. The artificial neural network reads these features as inputs, and classifies each set of inputs according to their target identity. This authentication system currently classifies up to 10 people. The irises used for classification represent ideal situations with minimum eyelash and eyelid interference.


Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity Jun 2015

Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity

Master's Theses

Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted …