Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    A Proposed Biometric Authentication Model to Improve Cloud Systems Security

    Hosam El- El-Sofany1,2,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 573-589, 2022, DOI:10.32604/csse.2022.024302

    Abstract Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’ information. The paper… More >

  • Open Access

    ARTICLE

    Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

    A. S. Anakath1,*, S. Ambika2, S. Rajakumar3, R. Kannadasan4, K. S. Sendhil Kumar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 833-847, 2022, DOI:10.32604/csse.2022.022329

    Abstract Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner. Thus, ensuring the security and confidentiality of the data while processing in the centralized network is very difficult. The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network. Intruders are very active over the network like real authenticated user to hack the personal sensitive data, such as bank balance,… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3131-3144, 2022, DOI:10.32604/cmc.2022.026457

    Abstract Education 4.0 is being authorized more and more by the design of artificial intelligence (AI) techniques. Higher education institutions (HEI) have started to utilize Internet technologies to improve the quality of the service and boost knowledge. Due to the unavailability of information technology (IT) infrastructures, HEI is vulnerable to cyberattacks. Biometric authentication can be used to authenticate a person based on biological features such as face, fingerprint, iris, and so on. This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions, named SRODL-LAC technique. The proposed SRODL-LAC technique… More >

  • Open Access

    ARTICLE

    Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing

    Ahmed M. Ayoup1,*, Ashraf A. M. Khalaf1, Walid El-Shafai2,3, Fathi E. Abd El-Samie2, Fahad Alraddady4, Salwa M. Serag Eldin4,5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3687-3703, 2022, DOI:10.32604/cmc.2022.025902

    Abstract The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data. This paper presents a cancellable multi-biometric identification scheme that includes four stages: biometric data collection and processing, Arnold's Cat Map encryption, decimation process to reduce the size, and final merging of the four biometrics in a single generated template. First, a 2D matrix of size 128 × 128 is created based on Arnold's Cat Map (ACM). The purpose of this rearrangement is to break the correlation between pixels to hide the biometric patterns and merge these patterns together for more security. The decimation is performed to… More >

  • Open Access

    ARTICLE

    Finger Vein Authentication Based on Wavelet Scattering Networks

    Amjad Rehman1, Majid Harouni2,*, Maedeh Omidiravesh3, Suliman Mohamed Fati1, Saeed Ali Bahaj4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3369-3383, 2022, DOI:10.32604/cmc.2022.016410

    Abstract Biometric-based authentication systems have attracted more attention than traditional authentication techniques such as passwords in the last two decades. Multiple biometrics such as fingerprint, palm, iris, palm vein and finger vein and other biometrics have been introduced. One of the challenges in biometrics is physical injury. Biometric of finger vein is of the biometrics least exposed to physical damage. Numerous methods have been proposed for authentication with the help of this biometric that suffer from weaknesses such as high computational complexity and low identification rate. This paper presents a novel method of scattering wavelet-based identity identification. Scattering wavelet extracts image… More >

  • Open Access

    ARTICLE

    Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms

    Safaa El-Gazar1, Walid El-Shafai2,3,*, Ghada El-Banby4, Hesham F. A. Hamed1, Gerges M. Salama1, Mohammed Abd-Elnaby5, Fathi E. Abd El-Samie2,6

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 87-102, 2022, DOI:10.32604/csse.2022.022722

    Abstract Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades. It achieves safe access to systems using biometrics instead of the traditional passwords. The utilization of a biometric in its original format makes it usable only once. Therefore, a cancelable biometric template should be used, so that it can be replaced when it is attacked. Cancelable biometrics aims to enhance the security and privacy of biometric authentication. Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates. In this paper, a highly-secure encryption algorithm is proposed to ensure… More >

  • Open Access

    ARTICLE

    Cancelable Multi-biometric Template Generation Based on Dual-Tree Complex Wavelet Transform

    Ahmed M. Ayoup1,*, Ashraf A. M. Khalaf1, Fahad Alraddady2, Fathi E. Abd El-Samie3, Walid El-Shafai3,5, Salwa M. Serag Eldin2,4

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1289-1304, 2022, DOI:10.32604/iasc.2022.024381

    Abstract In this article, we introduce a new cancelable biometric template generation layout depending on selective encryption technology and Dual-Tree Complex Wavelet Transform (DT-CWT) fusion. The input face biometric is entered into the automatic face-segmentation (Viola-Jones) algorithm to detect the object in a short time. Viola-Jones algorithm can detect the left eye, right eye, nose, and mouth of the input biometric image. The encoder can choose the left or right eye to generate a cancelable biometric template. The selected eye image of size M × N is XORed with the created pseudo-random number (PRN) matrix CM × N to provide an… More >

  • Open Access

    ARTICLE

    Selective Cancellable Multi-Biometric Template Generation Scheme Based on Multi-Exposure Feature Fusion

    Ahmed M. Ayoup1,*, Ashraf A. M. Khalaf1, Fahad Alraddady2, Fathi E. Abd El-Samie3, Walid El-Safai3,5, Salwa M. Serag Eldin2,4

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 549-565, 2022, DOI:10.32604/iasc.2022.024379

    Abstract This article introduces a new cancellable multi-biometric system based on the combination of a selective encryption method and a deep-learning-based fusion technology. The biometric face image is treated with an automatic face segmentation algorithm (Viola-Jones), and the image of the selected eye is XORed with a PRNG (Pseudo Random Number Generator) matrix. The output array is used to create a primary biometric template. This process changes the histogram of the selected eye image. Arnold’s Cat Map is used to superimpose the PRN pixels only on the pixels of the primary image. Arnold’s cat map deformed eyes are encrypted using the… More >

  • Open Access

    ARTICLE

    Face Recognition System Using Deep Belief Network and Particle Swarm Optimization

    K. Babu1,*, C. Kumar2, C. Kannaiyaraju3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 317-329, 2022, DOI:10.32604/iasc.2022.023756

    Abstract Facial expression for different emotional feelings makes it interesting for researchers to develop recognition techniques. Facial expression is the outcome of emotions they feel, behavioral acts, and the physiological condition of one’s mind. In the world of computer visions and algorithms, precise facial recognition is tough. In predicting the expression of a face, machine learning/artificial intelligence plays a significant role. The deep learning techniques are widely used in more challenging real-world problems which are highly encouraged in facial emotional analysis. In this article, we use three phases for facial expression recognition techniques. The principal component analysis-based dimensionality reduction techniques are… More >

  • Open Access

    ARTICLE

    Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems

    Munayfah Alanazi*, Shadi Nashwan

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 703-725, 2022, DOI:10.32604/csse.2022.022962

    Abstract Wireless medical sensor networks (WMSNs) play a significant role in increasing the availability of remote healthcare systems. The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis. The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems. Therefore, an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns. Many authentication schemes for remote patient… More >

Displaying 31-40 on page 4 of 65. Per Page