Computer Vision Conference (CVC) 2026
21-22 May 2026
Publication Links
IJACSA
Special Issues
Computer Vision Conference (CVC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 2 Issue 11, 2011.
Abstract: Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper reveals a robust cryptosystem using iris biometric pattern as a crypto-key to resolve the issues in the encryption. An error correction engine based on hetro-correlators has been used to evoke the partially tarnished data fashioned by the decryption process. This process determines the non-repudiation and key management problems. The experimental results show that the suggestion algorithm can implement in the real-life cryptosystem.
R Bremananth and Ahmad Sharieh. “Crytosystem for Computer security using Iris patterns and Hetro correlators ”. International Journal of Advanced Computer Science and Applications (IJACSA) 2.11 (2011). http://dx.doi.org/10.14569/IJACSA.2011.021101
@article{Bremananth2011,
title = {Crytosystem for Computer security using Iris patterns and Hetro correlators
},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2011.021101},
url = {http://dx.doi.org/10.14569/IJACSA.2011.021101},
year = {2011},
publisher = {The Science and Information Organization},
volume = {2},
number = {11},
author = {R Bremananth and Ahmad Sharieh}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.