Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (32)
  • Open Access


    A Privacy-Preserving System Design for Digital Presence Protection

    Eric Yocam1, Ahmad Alomari2, Amjad Gawanmeh3,*, Wathiq Mansoor3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3091-3110, 2023, DOI:10.32604/cmc.2023.032826

    Abstract A person’s privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameter-based access control protection mechanism for digital privacy preservation. The enhanced capability combines multiple access control parameters: facial expression, resource, environment, location, and time. The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.… More >

  • Open Access


    A Three-Dimensional Real-Time Gait-Based Age Detection System Using Machine Learning

    Muhammad Azhar1,*, Sehat Ullah1, Khalil Ullah2, Habib Shah3, Abdallah Namoun4, Khaliq Ur Rahman5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 165-182, 2023, DOI:10.32604/cmc.2023.034605

    Abstract Human biometric analysis has gotten much attention due to its widespread use in different research areas, such as security, surveillance, health, human identification, and classification. Human gait is one of the key human traits that can identify and classify humans based on their age, gender, and ethnicity. Different approaches have been proposed for the estimation of human age based on gait so far. However, challenges are there, for which an efficient, low-cost technique or algorithm is needed. In this paper, we propose a three-dimensional real-time gait-based age detection system using a machine learning approach. The proposed system consists of training… More >

  • Open Access


    Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics

    S. Aanjanadevi1,*, S. Aanjankumar2, K. R. Ramela3, V. Palanisamy4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2351-2362, 2023, DOI:10.32604/csse.2023.031893

    Abstract Due to the enormous usage of the internet for transmission of data over a network, security and authenticity become major risks. Major challenges encountered in biometric system are the misuse of enrolled biometric templates stored in database server. To describe these issues various algorithms are implemented to deliver better protection to biometric traits such as physical (Face, fingerprint, Ear etc.) and behavioural (Gesture, Voice, tying etc.) by means of matching and verification process. In this work, biometric security system with fuzzy extractor and convolutional neural networks using face attribute is proposed which provides different choices for supporting cryptographic processes to… More >

  • Open Access


    Cancellable Multi-Biometric Feature Veins Template Generation Based on SHA-3 Hashing

    Salwa M. Serag Eldin1,*, Ahmed Sedik2, Sultan S. Alshamrani3, Ahmed M. Ayoup4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 733-749, 2023, DOI:10.32604/cmc.2023.030789

    Abstract In this paper, a novel cancellable biometrics technique called Multi-Biometric-Feature-Hashing (MBFH) is proposed. The MBFH strategy is utilized to actualize a single direction (non-invertibility) biometric shape. MBFH is a typical model security conspire that is distinguished in the utilization of this protection insurance framework in numerous sorts of biometric feature strategies (retina, palm print, Hand Dorsum, fingerprint). A more robust and accurate multilingual biological structure in expressing human loneliness requires a different format to record clients with inseparable comparisons from individual biographical sources. This may raise worries about their utilization and security when these spread out designs are subverted as… More >

  • Open Access


    A Novel Fusion System Based on Iris and Ear Biometrics for E-exams

    S. A. Shaban*, Hosnia M. M. Ahmed, D. L. Elsheweikh

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3295-3315, 2023, DOI:10.32604/iasc.2023.030237

    Abstract With the rapid spread of the coronavirus epidemic all over the world, educational and other institutions are heading towards digitization. In the era of digitization, identifying educational e-platform users using ear and iris based multimodal biometric systems constitutes an urgent and interesting research topic to preserve enterprise security, particularly with wearing a face mask as a precaution against the new coronavirus epidemic. This study proposes a multimodal system based on ear and iris biometrics at the feature fusion level to identify students in electronic examinations (E-exams) during the COVID-19 pandemic. The proposed system comprises four steps. The first step is… More >

  • Open Access


    Optical Ciphering Scheme for Cancellable Speaker Identification System

    Walid El-Shafai1,2, Marwa A. Elsayed1, Mohsen A. Rashwan3, Moawad I. Dessouky1, Adel S. El-Fishawy1, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 563-578, 2023, DOI:10.32604/csse.2023.024375

    Abstract Most current security and authentication systems are based on personal biometrics. The security problem is a major issue in the field of biometric systems. This is due to the use in databases of the original biometrics. Then biometrics will forever be lost if these databases are attacked. Protecting privacy is the most important goal of cancelable biometrics. In order to protect privacy, therefore, cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases. One methodology to achieve non-invertibility is the employment of non-invertible transforms. This… More >

  • Open Access


    Face Templates Encryption Technique Based on Random Projection and Deep Learning

    Mayada Tarek1,2,*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2049-2063, 2023, DOI:10.32604/csse.2023.027139

    Abstract Cancellable biometrics is the solution for the trade-off between two concepts: Biometrics for Security and Security for Biometrics. The cancelable template is stored in the authentication system’s database rather than the original biometric data. In case of the database is compromised, it is easy for the template to be canceled and regenerated from the same biometric data. Recoverability of the cancelable template comes from the diversity of the cancelable transformation parameters (cancelable key). Therefore, the cancelable key must be secret to be used in the system authentication process as a second authentication factor in conjunction with the biometric data. The… More >

  • Open Access


    Unconstrained Hand Dorsal Veins Image Database and Recognition System

    Mustafa M. Al Rifaee1,*, Mohammad M. Abdallah1, Mosa I. Salah2, Ayman M. Abdalla1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5063-5073, 2022, DOI:10.32604/cmc.2022.030033

    Abstract Hand veins can be used effectively in biometric recognition since they are internal organs that, in contrast to fingerprints, are robust under external environment effects such as dirt and paper cuts. Moreover, they form a complex rich shape that is unique, even in identical twins, and allows a high degree of freedom. However, most currently employed hand-based biometric systems rely on hand-touch devices to capture images with the desired quality. Since the start of the COVID-19 pandemic, most hand-based biometric systems have become undesirable due to their possible impact on the spread of the pandemic. Consequently, new contactless hand-based biometric… More >

  • Open Access


    An Optimised Defensive Technique to Recognize Adversarial Iris Images Using Curvelet Transform

    K. Meenakshi1,*, G. Maragatham2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 627-643, 2023, DOI:10.32604/iasc.2023.026961

    Abstract Deep Learning is one of the most popular computer science techniques, with applications in natural language processing, image processing, pattern identification, and various other fields. Despite the success of these deep learning algorithms in multiple scenarios, such as spam detection, malware detection, object detection and tracking, face recognition, and automatic driving, these algorithms and their associated training data are rather vulnerable to numerous security threats. These threats ultimately result in significant performance degradation. Moreover, the supervised based learning models are affected by manipulated data known as adversarial examples, which are images with a particular level of noise that is invisible… More >

  • Open Access


    A Proposed Biometric Authentication Model to Improve Cloud Systems Security

    Hosam El- El-Sofany1,2,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 573-589, 2022, DOI:10.32604/csse.2022.024302

    Abstract Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’ information. The paper… More >

Displaying 1-10 on page 1 of 32. Per Page  

Share Link