01332nam2 2200277 i 450 SUN006364820080404120000.008-983522-0-720080403d1985 |0engc50 baengUS|||| |||||121.1: Dominique Vivant DenonFrench masters of the nineteenth centuryby Petra ten-Doesschate ChuNew YorkAbaris books1985376 p.in gran parte ill.31 cm.001SUN00373322001 The *illustrated Bartschgeneral editor: Walter L. Strauss[poi] founding editor Walter L. Straussgeneral editor John T. Spike121.1210 New YorkAbaris books215 volumiill.31 cm.USNew YorkSUNL000011Denon, Dominique VivantSUNV033891242343Chu, Petra ten-DoesschateSUNV047986Abaris booksSUNV003351650ITSOL20181109RICASUN0063648UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI LETTERE E BENI CULTURALI07 CONS Ne 1160 07 15616 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI LETTERE E BENI CULTURALIIT-CE010315616CONS Ne 1160caDominique Vivant Denon1436894UNICAMPANIA02221oam 2200457zu 450 991013893640332120241212215827.09781509071739150907173397807695387920769538797(CKB)2400000000003031(SSID)ssj0000452814(PQKBManifestationID)12194533(PQKBTitleCode)TC0000452814(PQKBWorkID)10472559(PQKB)10243520(NjHacI)992400000000003031(EXLCZ)99240000000000303120160829d2009 uy engur|||||||||||txtccr2009 International Conference of Soft Computing and Pattern Recognition[Place of publication not identified]IEEE20091 online resourceBibliographic Level Mode of Issuance: Monograph9781424453306 1424453305 Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now playing an important role especially in application related to security issue. In this work, we present an approach to generate a unique and more secure cryptographic key from iris template. The iris images are processed to produce iris template or code to be utilized for the encryption and decryption tasks. AES cryptography algorithm are employed to encrypt and decrypt the identity data. Distance metric such as hamming distance and Euclidean distance are used for the template matching identification process. Experimental results show that this system can obtain a higher security with a low false rejection or false acceptance rate.Soft computingCongressesSoft computing511.313IEEE StaffPQKBPROCEEDING99101389364033212009 International Conference of Soft Computing and Pattern Recognition2495974UNINA