RETRACTED ARTICLE: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment

被引:0
作者
Teena Joseph
S. A. Kalaiselvan
S. U. Aswathy
R. Radhakrishnan
A. R. Shamna
机构
[1] MBC CET,Department of Computer Science and Engineering
[2] St Martin’s Engineering College,Department of Computer Science and Engineering
[3] Jyothi Engineering College,Department of Civil Engineering
[4] Mangalam College of Engineering,undefined
[5] Musaliar College of Engineering,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2021年 / 12卷
关键词
Authentication; Cloud computing; Cryptography; Hashing; Multimodal biometric system; Symmetric key encryption;
D O I
暂无
中图分类号
学科分类号
摘要
In recent days, due to the advent of advanced technologies such as cloud computing, accessing data can be done anywhere at any time. Meanwhile, ensuring the data security is highly significant. Authentication plays a major role in preserving security via different access control mechanisms. As a recent trend, the biological information of the individual user is considered as verification scheme for the authentication process. Traits such as fingerprint, iris, ear or palm print are widely used to develop the authentication systems from its patterns. But, to increase the complexity of the user authentication and to ensure high security, more than a trait is combined together. In this paper, a multimodal authentication system is proposed by fusing the feature points of fingerprint, iris and palm print traits. Each trait has undergone the following procedures of image processing techniques such as pre-processing, normalization and feature extraction. From the extracted features, a unique secret key is generated by fusing the traits in two stages. False Acceptance Rate (FAR) and False Rejection Rate (FRR) metrics are used to measure the robustness of the system. This performance of the model is evaluated using three standard symmetric cryptographic algorithms such as AES, DES and Blowfish. This proposed model provides better security and access control over data in cloud environment.
引用
收藏
页码:6141 / 6149
页数:8
相关论文
共 50 条
  • [1] Ahmad A(2017)Energy efficient hierarchical resource management for mobile cloud computing IEEE Trans Sustain Comput 2 100-112
  • [2] Paul A(2018)A study on fingerprint hash code generation based on MD5 algorithm and freeman chain code Int J Comput Res Dev (IJCRD) 3 13-22
  • [3] Khan M(2010)A view of cloud computing Commun ACM 53 50-58
  • [4] Jabbar S(2017)Critical literature survey on iris biometric recognition Int J Sci Res Sci Technol 3 600-605
  • [5] Rathore MMU(2016)Towards achieving data security with the cloud computing adoption framework IEEE Trans Serv Comput 9 138-151
  • [6] Chilamkurti N(2012)A fingerprint and palmprint recognition approach based on multiple feature extraction Eur J Sci Res 76 514-526
  • [7] Min-Allah N(2017)Palmprint recognition based on complete direction representation IEEE Trans Image Process 26 4483-4498
  • [8] Aithal PS(2015)Superior content-based video retrieval system according to query image Int J Appl Eng Res 10 7951-7957
  • [9] Armbrust M(2018)Survey on machine learning approaches in gene expression classification in modelling computational diagnostic system for complex diseases Int J Eng Adv Technol 8 10-15
  • [10] Fox A(2015)Cloud computing: from scarcity to abundance J Ind Compet Trade 15 5-19