Search results

1 – 10 of 23
Article
Publication date: 17 September 2019

Chérif Taouche and Hacene Belhadef

Palmprint recognition is a very interesting and promising area of research. Much work has already been done in this area, but much more needs to be done to make the systems more…

73

Abstract

Purpose

Palmprint recognition is a very interesting and promising area of research. Much work has already been done in this area, but much more needs to be done to make the systems more efficient. In this paper, a multimodal biometrics system based on fusion of left and right palmprints of a person is proposed to overcome limitations of unimodal systems.

Design/methodology/approach

Features are extracted using some proposed multi-block local descriptors in addition to MBLBP. Fusion of extracted features is done at feature level by a simple concatenation of feature vectors. Then, feature selection is performed on the resulting global feature vector using evolutionary algorithms such as genetic algorithms and backtracking search algorithm for a comparison purpose. The benefits of such step selecting the relevant features are known in the literature, such as increasing the recognition accuracy and reducing the feature set size, which results in runtime saving. In matching step, Chi-square similarity measure is used.

Findings

The resulting feature vector length representing a person is compact and the runtime is reduced.

Originality/value

Intensive experiments were done on the publicly available IITD database. Experimental results show a recognition accuracy of 99.17 which prove the effectiveness and robustness of the proposed multimodal biometrics system than other unimodal and multimodal biometrics systems.

Details

Information Discovery and Delivery, vol. 48 no. 1
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 26 May 2020

S. Veluchamy and L.R. Karlmarx

Biometric identification system has become emerging research field because of its wide applications in the fields of security. This study (multimodal system) aims to find more…

Abstract

Purpose

Biometric identification system has become emerging research field because of its wide applications in the fields of security. This study (multimodal system) aims to find more applications than the unimodal system because of their high user acceptance value, better recognition accuracy and low-cost sensors. The biometric identification using the finger knuckle and the palmprint finds more application than other features because of its unique features.

Design/methodology/approach

The proposed model performs the user authentication through the extracted features from both the palmprint and the finger knuckle images. The two major processes in the proposed system are feature extraction and classification. The proposed model extracts the features from the palmprint and the finger knuckle with the proposed HE-Co-HOG model after the pre-processing. The proposed HE-Co-HOG model finds the Palmprint HE-Co-HOG vector and the finger knuckle HE-Co-HOG vector. These features from both the palmprint and the finger knuckle are combined with the optimal weight score from the fractional firefly (FFF) algorithm. The layered k-SVM classifier classifies each person's identity from the fused vector.

Findings

Two standard data sets with the palmprint and the finger knuckle images were used for the simulation. The simulation results were analyzed in two ways. In the first method, the bin sizes of the HE-Co-HOG vector were varied for the various training of the data set. In the second method, the performance of the proposed model was compared with the existing models for the different training size of the data set. From the simulation results, the proposed model has achieved a maximum accuracy of 0.95 and the lowest false acceptance rate and false rejection rate with a value of 0.1.

Originality/value

In this paper, the multimodal biometric recognition system based on the proposed HE-Co-HOG with the k-SVM and the FFF is developed. The proposed model uses the palmprint and the finger knuckle images as the biometrics. The development of the proposed HE-Co-HOG vector is done by modifying the Co-HOG with the holoentropy weights.

Details

Sensor Review, vol. 40 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 7 November 2017

Naveed Riaz, Ayesha Riaz and Sajid Ali Khan

The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the…

Abstract

Purpose

The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area.

Design/methodology/approach

In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems.

Findings

Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies.

Originality/value

This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.

Details

Sensor Review, vol. 38 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 6 June 2016

Ema Kusen and Mark Strembeck

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision…

Abstract

Purpose

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.

Design/methodology/approach

The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.

Findings

Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.

Originality/value

To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Content available
Article
Publication date: 19 February 2020

Gang Li, Srikanth Prabhu, Qingfeng Chen and Jia Wu

392

Abstract

Details

Information Discovery and Delivery, vol. 48 no. 1
Type: Research Article
ISSN: 2398-6247

Book part
Publication date: 16 September 2017

Kevin J. Boudreau

Rather than organize as traditional firms, many of today’s companies organize as platforms that sit at the nexus of multiple exchange and production relationships. This chapter…

Abstract

Rather than organize as traditional firms, many of today’s companies organize as platforms that sit at the nexus of multiple exchange and production relationships. This chapter considers a most basic question of organization in platform contexts: the choice of boundaries. Herein, I investigate how classical economic theories of firm boundaries apply to platform-based organization and empirically study how executives made boundary choices in response to changing market and technical challenges in the early mobile computing industry (the predecessor to today’s smartphones). Rather than a strict or unavoidable tradeoff between “openness-versus-control,” most successful platform owners chose their boundaries in a way to simultaneously open-up to outside developers while maintaining coordination across the entire system.

Details

Entrepreneurship, Innovation, and Platforms
Type: Book
ISBN: 978-1-78743-080-8

Keywords

Article
Publication date: 26 November 2020

N.V. Brindha and V.S. Meenakshi

Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of…

Abstract

Purpose

Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of the harmful attacks in the MANET, which produces fake identities similar to legitimate nodes in the network. It is a serious threat to the MANET when a malicious node uses the fake identities to enter the network illegally.

Design/methodology/approach

A MANET is an independent collection of mobile nodes that form a temporary or arbitrary network without any fixed infrastructure. The nodes in the MANET lack centralized administration to manage the network and change their links to other devices frequently.

Findings

So for securing a MANET, an approach based on biometric authentication can be used. The multimodal biometric technology has been providing some more potential solutions for the user to be able to devise an authentication in MANETs of high security.

Research limitations/implications

The Sybil detection approach, which is based on the received signal strength indicator (RSSI) variations, permits the node to be able to verify the authenticity of communicating nodes in accordance with their localizations.

Practical implications

As the MANET node suffers from a low level of memory and power of computation, there is a novel technique of feature extraction that is proposed for the multimodal biometrics that makes use of palm prints that are based on a charge-coupled device and fingerprints, along with the features that are fused.

Social implications

This paper proposes an RSSI-based multimodal biometric solution to detect Sybil attack in MANETs.

Originality/value

The results of the experiment have indicated that this method has achieved a performance which is better compared to that of the other methods.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 1 September 2005

Jan Mouritsen and Gergana Koleva

The purpose of this paper is to analyse how a patent is an intangible asset and how it creates value.

2590

Abstract

Purpose

The purpose of this paper is to analyse how a patent is an intangible asset and how it creates value.

Design/methodology/approach

Through analysis of a set of cases, the paper analyses how a patent becomes related to a series of other elements. This approach investigates the details of how a patent becomes useful. Theoretically, the paper suggests that a patent only creates value from being entangled in a web of resources in action, contrasting this with patents on hold where they are described as entities but not as resources.

Findings

The paper shows that patens a valuable not by themselves (on hold) but by being linked to a series of other resources and purposes (in actions). To understand the value of the patent is to understand its relationships to other mechanism in production, marketing and finance.

Research limitations/implications

The paper sets out an approach to study the value of patents which looks at the network around the patent. This is a limitation inasmuch as it is difficult to generalise the particular findings, but as a prospective research strategy, its strength is that is allows insight into the complexities of making patents valuable. This can also add to statistical work on the contingencies for patents' value.

Practical implications

The paper suggests that a strategy for patenting must pay attention to the different kinds of resources that make it useful. Often it is necessary to look far beyond the patent office to gain this knowledge. The management agenda is clear: the patent has to be entangled, but this also raises questions, because since the patent is an option, some of its value derives from exploring its possibilities. This however, blocks for its exploitation and thus causes opportunity costs. From a management point of view, it is not always clear that a patent should be used for its maximum potentiality, because this would disrupt the network is it part of and make it a very expensive resource to mobilise towards innovation

Originality/value

Typically, research on patents has taken the route via statistical and economic analysis. Our paper adds by showing the dynamics of managerial uses of patents and it shows that the structural conditioning of use of patents can fruitfully be supplemented by process and network approaches to their use.

Details

Journal of Intellectual Capital, vol. 6 no. 3
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 25 January 2018

Hima Bindu and Manjunathachari K.

This paper aims to develop the Hybrid feature descriptor and probabilistic neuro-fuzzy system for attaining the high accuracy in face recognition system. In recent days, facial…

Abstract

Purpose

This paper aims to develop the Hybrid feature descriptor and probabilistic neuro-fuzzy system for attaining the high accuracy in face recognition system. In recent days, facial recognition (FR) systems play a vital part in several applications such as surveillance, access control and image understanding. Accordingly, various face recognition methods have been developed in the literature, but the applicability of these algorithms is restricted because of unsatisfied accuracy. So, the improvement of face recognition is significantly important for the current trend.

Design/methodology/approach

This paper proposes a face recognition system through feature extraction and classification. The proposed model extracts the local and the global feature of the image. The local features of the image are extracted using the kernel based scale invariant feature transform (K-SIFT) model and the global features are extracted using the proposed m-Co-HOG model. (Co-HOG: co-occurrence histograms of oriented gradients) The proposed m-Co-HOG model has the properties of the Co-HOG algorithm. The feature vector database contains combined local and the global feature vectors derived using the K-SIFT model and the proposed m-Co-HOG algorithm. This paper proposes a probabilistic neuro-fuzzy classifier system for the finding the identity of the person from the extracted feature vector database.

Findings

The face images required for the simulation of the proposed work are taken from the CVL database. The simulation considers a total of 114 persons form the CVL database. From the results, it is evident that the proposed model has outperformed the existing models with an improved accuracy of 0.98. The false acceptance rate (FAR) and false rejection rate (FRR) values of the proposed model have a low value of 0.01.

Originality/value

This paper proposes a face recognition system with proposed m-Co-HOG vector and the hybrid neuro-fuzzy classifier. Feature extraction was based on the proposed m-Co-HOG vector for extracting the global features and the existing K-SIFT model for extracting the local features from the face images. The proposed m-Co-HOG vector utilizes the existing Co-HOG model for feature extraction, along with a new color gradient decomposition method. The major advantage of the proposed m-Co-HOG vector is that it utilizes the color features of the image along with other features during the histogram operation.

Details

Sensor Review, vol. 38 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 April 1996

Katherine B. Killoran

In today's society with concern for crime and violence increasing and court television and celebrity trials bringing the criminal justice system, courtroom procedures, and rules…

Abstract

In today's society with concern for crime and violence increasing and court television and celebrity trials bringing the criminal justice system, courtroom procedures, and rules of evidence into our living rooms, there is an increased need for reliable information about issues that are the core of forensic science: crime scene investigation and the collection and scientific analysis of physical evidence used in trials.

Details

Reference Services Review, vol. 24 no. 4
Type: Research Article
ISSN: 0090-7324

1 – 10 of 23