Document Type : Research Paper

Authors

Mosul University - College of Computer Science and Mathematics

10.37652/juaps.2012.63374

Abstract

Because of the significant in the field of information technology, increasing means of communication and networks , proliferation of electronic crimes and personality theft, the security of information and verification of the identity of the user became the biggest concerns of institutions and individuals. Hence, several types to verify the reliability of people appeared, some of them relied on traditional means like passwords and smart cards, other modern methods adopted the biometric features for which vital statistics, which depends on the characteristics of natural or unique behavior in people. The artificial neural networks have been used by a large number of researchers to achieve the goals of information security and so as it is ability of learning and modeling of complex relationships between inputs and Outputs.This research suggest a way to improve the user authentication scheme in high security applications in networks. Artificial neural network is used (Back propagation network) to provide privacy to the user and vital feature (fingerprint iris of the eye) being one of the best biometric features to verify the identity of the user as it is the consistency and accuracy in addition to ease of use .

Main Subjects

1-  D. V. K. ( 1990). Foiling the cracker: a survey of, and  improvements to password security. Proceedings of the second USENIX UNIX security workshop, pp. 5-14.
2-  S. Z. R.  and M. M. (2007). User Authentication Using Neural Networks in Smart Home Networks. International Journal of Smart Home, Vol. 1: No. 2, July. pp 147-154
3-  J. A., D.B.L.B. and D.A.A. M. (2009). Application of  Neural Network in User Authentication for Smart Home System.  in Proceeding of the World Academy of Sciences, Engineering and Technology .pp 1293-1300
     4-  M. G. and M. F. (2010).  A protection Scheme for Enhancing Biometric Template Security and Discriminability. Università Politecnica delle Marche, Ancona, Italy.
5-  P. E. A._CH., B. EL.-H. and A. M. (2011). An Enhanced Authenticated Key Agreement Protocol with a Neural Network-based Model for Joining-Phase inMobile Environments. International Journal of Engineering and Inustries, Vol. 2: NO. 2, June.pp103-112
6- الناظر سائد. (2005) .  التعمیة و امن الشبکات. شعاع للنشر والعلوم.  
7- جاسم سجى، جادر میلاد و اسامة ایلاف. (2010) . التشفیر الفوضوی باستخدام مفتاح المقیاس الحیوی.  مجلة الرافدین لعلوم الحاسوب والریاضیات. المجلد 7: العدد 3 .
     8- Al- G. M.  A.-R. H. (2006). Biometric Identification Based on Improved Iris Recognition Techniques. PhD.Thesis Submitted to the Council of the College of Computer and Mathematics Sciences, University Of Mousl.
    -9زکی علاء  ، عزو د.عماد.(2000). الشبکات العصبیة (البنیة الهندسیة ,الخوارزمیات , التطبیقات). سوریة-حلب.