Search results
1 – 10 of 23Chérif Taouche and Hacene Belhadef
Palmprint recognition is a very interesting and promising area of research. Much work has already been done in this area, but much more needs to be done to make the systems more…
Abstract
Purpose
Palmprint recognition is a very interesting and promising area of research. Much work has already been done in this area, but much more needs to be done to make the systems more efficient. In this paper, a multimodal biometrics system based on fusion of left and right palmprints of a person is proposed to overcome limitations of unimodal systems.
Design/methodology/approach
Features are extracted using some proposed multi-block local descriptors in addition to MBLBP. Fusion of extracted features is done at feature level by a simple concatenation of feature vectors. Then, feature selection is performed on the resulting global feature vector using evolutionary algorithms such as genetic algorithms and backtracking search algorithm for a comparison purpose. The benefits of such step selecting the relevant features are known in the literature, such as increasing the recognition accuracy and reducing the feature set size, which results in runtime saving. In matching step, Chi-square similarity measure is used.
Findings
The resulting feature vector length representing a person is compact and the runtime is reduced.
Originality/value
Intensive experiments were done on the publicly available IITD database. Experimental results show a recognition accuracy of 99.17 which prove the effectiveness and robustness of the proposed multimodal biometrics system than other unimodal and multimodal biometrics systems.
Details
Keywords
S. Veluchamy and L.R. Karlmarx
Biometric identification system has become emerging research field because of its wide applications in the fields of security. This study (multimodal system) aims to find more…
Abstract
Purpose
Biometric identification system has become emerging research field because of its wide applications in the fields of security. This study (multimodal system) aims to find more applications than the unimodal system because of their high user acceptance value, better recognition accuracy and low-cost sensors. The biometric identification using the finger knuckle and the palmprint finds more application than other features because of its unique features.
Design/methodology/approach
The proposed model performs the user authentication through the extracted features from both the palmprint and the finger knuckle images. The two major processes in the proposed system are feature extraction and classification. The proposed model extracts the features from the palmprint and the finger knuckle with the proposed HE-Co-HOG model after the pre-processing. The proposed HE-Co-HOG model finds the Palmprint HE-Co-HOG vector and the finger knuckle HE-Co-HOG vector. These features from both the palmprint and the finger knuckle are combined with the optimal weight score from the fractional firefly (FFF) algorithm. The layered k-SVM classifier classifies each person's identity from the fused vector.
Findings
Two standard data sets with the palmprint and the finger knuckle images were used for the simulation. The simulation results were analyzed in two ways. In the first method, the bin sizes of the HE-Co-HOG vector were varied for the various training of the data set. In the second method, the performance of the proposed model was compared with the existing models for the different training size of the data set. From the simulation results, the proposed model has achieved a maximum accuracy of 0.95 and the lowest false acceptance rate and false rejection rate with a value of 0.1.
Originality/value
In this paper, the multimodal biometric recognition system based on the proposed HE-Co-HOG with the k-SVM and the FFF is developed. The proposed model uses the palmprint and the finger knuckle images as the biometrics. The development of the proposed HE-Co-HOG vector is done by modifying the Co-HOG with the holoentropy weights.
Details
Keywords
Naveed Riaz, Ayesha Riaz and Sajid Ali Khan
The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the…
Abstract
Purpose
The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area.
Design/methodology/approach
In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems.
Findings
Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies.
Originality/value
This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
Details
Keywords
Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision…
Abstract
Purpose
Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.
Design/methodology/approach
The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.
Findings
Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.
Originality/value
To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.
Details
Keywords
Rather than organize as traditional firms, many of today’s companies organize as platforms that sit at the nexus of multiple exchange and production relationships. This chapter…
Abstract
Rather than organize as traditional firms, many of today’s companies organize as platforms that sit at the nexus of multiple exchange and production relationships. This chapter considers a most basic question of organization in platform contexts: the choice of boundaries. Herein, I investigate how classical economic theories of firm boundaries apply to platform-based organization and empirically study how executives made boundary choices in response to changing market and technical challenges in the early mobile computing industry (the predecessor to today’s smartphones). Rather than a strict or unavoidable tradeoff between “openness-versus-control,” most successful platform owners chose their boundaries in a way to simultaneously open-up to outside developers while maintaining coordination across the entire system.
Details
Keywords
N.V. Brindha and V.S. Meenakshi
Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of…
Abstract
Purpose
Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of the harmful attacks in the MANET, which produces fake identities similar to legitimate nodes in the network. It is a serious threat to the MANET when a malicious node uses the fake identities to enter the network illegally.
Design/methodology/approach
A MANET is an independent collection of mobile nodes that form a temporary or arbitrary network without any fixed infrastructure. The nodes in the MANET lack centralized administration to manage the network and change their links to other devices frequently.
Findings
So for securing a MANET, an approach based on biometric authentication can be used. The multimodal biometric technology has been providing some more potential solutions for the user to be able to devise an authentication in MANETs of high security.
Research limitations/implications
The Sybil detection approach, which is based on the received signal strength indicator (RSSI) variations, permits the node to be able to verify the authenticity of communicating nodes in accordance with their localizations.
Practical implications
As the MANET node suffers from a low level of memory and power of computation, there is a novel technique of feature extraction that is proposed for the multimodal biometrics that makes use of palm prints that are based on a charge-coupled device and fingerprints, along with the features that are fused.
Social implications
This paper proposes an RSSI-based multimodal biometric solution to detect Sybil attack in MANETs.
Originality/value
The results of the experiment have indicated that this method has achieved a performance which is better compared to that of the other methods.
Details
Keywords
Jan Mouritsen and Gergana Koleva
The purpose of this paper is to analyse how a patent is an intangible asset and how it creates value.
Abstract
Purpose
The purpose of this paper is to analyse how a patent is an intangible asset and how it creates value.
Design/methodology/approach
Through analysis of a set of cases, the paper analyses how a patent becomes related to a series of other elements. This approach investigates the details of how a patent becomes useful. Theoretically, the paper suggests that a patent only creates value from being entangled in a web of resources in action, contrasting this with patents on hold where they are described as entities but not as resources.
Findings
The paper shows that patens a valuable not by themselves (on hold) but by being linked to a series of other resources and purposes (in actions). To understand the value of the patent is to understand its relationships to other mechanism in production, marketing and finance.
Research limitations/implications
The paper sets out an approach to study the value of patents which looks at the network around the patent. This is a limitation inasmuch as it is difficult to generalise the particular findings, but as a prospective research strategy, its strength is that is allows insight into the complexities of making patents valuable. This can also add to statistical work on the contingencies for patents' value.
Practical implications
The paper suggests that a strategy for patenting must pay attention to the different kinds of resources that make it useful. Often it is necessary to look far beyond the patent office to gain this knowledge. The management agenda is clear: the patent has to be entangled, but this also raises questions, because since the patent is an option, some of its value derives from exploring its possibilities. This however, blocks for its exploitation and thus causes opportunity costs. From a management point of view, it is not always clear that a patent should be used for its maximum potentiality, because this would disrupt the network is it part of and make it a very expensive resource to mobilise towards innovation
Originality/value
Typically, research on patents has taken the route via statistical and economic analysis. Our paper adds by showing the dynamics of managerial uses of patents and it shows that the structural conditioning of use of patents can fruitfully be supplemented by process and network approaches to their use.
Details
Keywords
Hima Bindu and Manjunathachari K.
This paper aims to develop the Hybrid feature descriptor and probabilistic neuro-fuzzy system for attaining the high accuracy in face recognition system. In recent days, facial…
Abstract
Purpose
This paper aims to develop the Hybrid feature descriptor and probabilistic neuro-fuzzy system for attaining the high accuracy in face recognition system. In recent days, facial recognition (FR) systems play a vital part in several applications such as surveillance, access control and image understanding. Accordingly, various face recognition methods have been developed in the literature, but the applicability of these algorithms is restricted because of unsatisfied accuracy. So, the improvement of face recognition is significantly important for the current trend.
Design/methodology/approach
This paper proposes a face recognition system through feature extraction and classification. The proposed model extracts the local and the global feature of the image. The local features of the image are extracted using the kernel based scale invariant feature transform (K-SIFT) model and the global features are extracted using the proposed m-Co-HOG model. (Co-HOG: co-occurrence histograms of oriented gradients) The proposed m-Co-HOG model has the properties of the Co-HOG algorithm. The feature vector database contains combined local and the global feature vectors derived using the K-SIFT model and the proposed m-Co-HOG algorithm. This paper proposes a probabilistic neuro-fuzzy classifier system for the finding the identity of the person from the extracted feature vector database.
Findings
The face images required for the simulation of the proposed work are taken from the CVL database. The simulation considers a total of 114 persons form the CVL database. From the results, it is evident that the proposed model has outperformed the existing models with an improved accuracy of 0.98. The false acceptance rate (FAR) and false rejection rate (FRR) values of the proposed model have a low value of 0.01.
Originality/value
This paper proposes a face recognition system with proposed m-Co-HOG vector and the hybrid neuro-fuzzy classifier. Feature extraction was based on the proposed m-Co-HOG vector for extracting the global features and the existing K-SIFT model for extracting the local features from the face images. The proposed m-Co-HOG vector utilizes the existing Co-HOG model for feature extraction, along with a new color gradient decomposition method. The major advantage of the proposed m-Co-HOG vector is that it utilizes the color features of the image along with other features during the histogram operation.
Details
Keywords
In today's society with concern for crime and violence increasing and court television and celebrity trials bringing the criminal justice system, courtroom procedures, and rules…
Abstract
In today's society with concern for crime and violence increasing and court television and celebrity trials bringing the criminal justice system, courtroom procedures, and rules of evidence into our living rooms, there is an increased need for reliable information about issues that are the core of forensic science: crime scene investigation and the collection and scientific analysis of physical evidence used in trials.