A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment

Author(s):  
Teena Joseph ◽  
S. A. Kalaiselvan ◽  
S. U. Aswathy ◽  
R. Radhakrishnan ◽  
A. R. Shamna
2016 ◽  
Vol 40 (11) ◽  
Author(s):  
Shehzad Ashraf Chaudhry ◽  
Muhammad Tawab Khan ◽  
Muhammad Khurram Khan ◽  
Taeshik Shon

2019 ◽  
Vol 10 (2) ◽  
pp. 61-74
Author(s):  
D S Bogdanov ◽  
Vladimir Olegovich Mironkin

Исследован проект стандарта защиты нейросетевых биометрических контейнеров, использующего криптографические алгоритмы. Показана несостоятельность рассмотренного совмещения парольной и нейросетевой биометрической систем защиты информации. Предложен алгоритм, позволяющий восстанавливать ключевую информацию, а также служебную информацию, определяющую процесс функционирования нейронной сети. Получен ряд численных характеристик алгоритма.


2018 ◽  
Vol 24 (3) ◽  
pp. 1046-1062 ◽  
Author(s):  
Marimuthu Karuppiah ◽  
Ashok Kumar Das ◽  
Xiong Li ◽  
Saru Kumari ◽  
Fan Wu ◽  
...  

PLoS ONE ◽  
2017 ◽  
Vol 12 (5) ◽  
pp. e0176250 ◽  
Author(s):  
Younsung Choi ◽  
Youngsook Lee ◽  
Jongho Moon ◽  
Dongho Won

2017 ◽  
Vol 13 (8) ◽  
pp. 155014771772430 ◽  
Author(s):  
YoHan Park ◽  
KiSung Park ◽  
KyungKeun Lee ◽  
Hwangjun Song ◽  
YoungHo Park

Many remote user authentication schemes have been designed and developed to establish secure and authorized communication between a user and server over an insecure channel. By employing a secure remote user authentication scheme, a user and server can authenticate each other and utilize advanced services. In 2015, Cao and Ge demonstrated that An’s scheme is also vulnerable to several attacks and does not provide user anonymity. They also proposed an improved multi-factor biometric authentication scheme. However, we review and cryptanalyze Cao and Ge’s scheme and demonstrate that their scheme fails in correctness and providing user anonymity and is vulnerable to ID guessing attack and server masquerading attack. To overcome these drawbacks, we propose a security-improved authentication scheme that provides a dynamic ID mechanism and better security functionalities. Then, we show that our proposed scheme is secure against various attacks and prove the security of the proposed scheme using BAN Logic.


2021 ◽  
Vol 2071 (1) ◽  
pp. 012041
Author(s):  
I Amalina ◽  
A Saidatul ◽  
C Y Fook ◽  
R F Navea

Abstract The brain signals recorded by EEG devices are largely developed in for biometric authentication purposes. Those signals are very informative and reliable to be classified using signal processing. In this paper, the feature extraction and feature fusion are further studied to observe their performance towards the typing tasks. The signals are pre-processed to eliminate the unwanted noise present in the signals. The feature extraction method such as Welch’s method, Burg’s method and Yule Walk’s method are applied to extract the mean, median, standard deviation and variance in the data. Nonlinear feature such as fuzzy entropy is also been extracted. The extracted features are further classified by using k-Nearest Neighbour (k-NN), Random Forest (RF) and Ensemble Bagged Tree (EBT). The performance of feature extraction and feature fusion through concatenation are recorded and compared. For comparison, the feature fusion shows a better performance accuracy rather than feature extraction. The highest percentage accuracy was produced by Burg’s method for frontal-parietal lobes feature fusion which is 95.94% using Ensemble Bagged Tree (EBT).


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 109597-109611 ◽  
Author(s):  
Hailong Yao ◽  
Caifen Wang ◽  
Xingbing Fu ◽  
Chao Liu ◽  
Bin Wu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document