Volume 10 , Issue 1 , PP: 21-32, 2023 | Cite this article as | XML | Html | PDF | Full Length Article
N. A. Majeed alhammadi 1 * , K. Hameed Zaboon 2 , A. Abdulhadi Abdullah 3
Doi: https://doi.org/10.54216/JISIoT.100102
The security and privacy fields and multimedia biometrics have been widely used today for personal authentication. Sclera and Palm-print of humans are one of the fastest, accurate, reliable, and secure biometric techniques for identification and verification based on unique features. The majority of the biometric systems are based on the global features, which may lead to weak performance in cases of poor-quality biometric images, therefore, swarm intelligence techniques are used to improve recognition accuracy, reliability, and quickness. In this paper, an enhancement shark smell optimization (ESSO) is proposed to build an efficient hybrid identification system depend on the sclera and palm-print images. The SIFT algorithm used to extract features from the biometric images. The optimal key-points from this feature are obtained using ESSO and chaotic map, and finally, generation digital signature using a 256-MD5 algorithm for each user. The Package of the NIST tests proves that the generated keys are random, unpredictable, uncorrelated, and robust against different kinds of attacks.
SIFT algorithm , Feature Selection , shark smell optimization SSO algorithm , 1d logistic chaotic function.
[1] Jazzar, M. M., & Muhammad, G. (2013). Feature selection based verification/identification system using fingerprints and palm print. Arabian Journal for science and engineering, 38(4), 849-857.
[2] Alsubari, A., & Ramteke, R. J. (2017). Extraction of face and palmprint features based on LBP, HOG, and Zernike moments. International Journal of Computer Applications, 172(5), 31-34.
[3] S. A. Liu, F. Tang. (2007).Study on system identification method based on genetic algorithms[J]. System Engineering Theory and Practice, 2007,16(3):134-139.
[4] Deng, X. (2009, December). System identification based on particle swarm optimization algorithm. In 2009 International Conference on Computational Intelligence and Security (Vol. 1, pp. 259-263). IEEE.
[5] Chen Y, Parziale G, Diaz-Santana E, Jain AK. 3D touchless fingerprints: Compatibility with legacy rolled images. In: Proceedings of the Biometrics Symposium: Special Session on Research at Biometric Consortium Conference; 2006. pp. 1-6
[6] Froba B, Rothe C, Kublbeck C. Evaluation of sensor calibration in a biometric person recognition framework based on sensor fusion. In: Proceedings of 4th IEEE International Conference on Automatic Face & Gesture Recognition; 2000. pp. 512-517
[7] Bhaskar B. Veluchamy S. Hand based multi-biometric authentication using local feature extraction. In: Proceedings of the International Conference on Recent Trends in Information Technology; 2014. pp. 1-5
[8] Bokade GU, Sapkal AM. Feature level fusion of palm and face for secure recognition. International Journal of Electrical and Computer Engineering. 2012;4(2):157.
[9] Solé-Casals, J., Vancea, M., & March Amengual, J. M. (2014). A Preliminary Review of Behavioral Biometrics for Health Monitoring in the Elderly.
[10] Mir, A. H., Rubab, S., & Jhat, Z. A. (2011). Biometrics verification: a literature survey. International Journal of Computing and ICT Research, 5(2), 67-80.
[11] Alkassar, S., Woo, W. L., Dlay, S. S., & Chambers, J. A. (2015). Robust sclera recognition system with novel sclera segmentation and validation techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47(3), 474-486.
[12] Dong, W., Zhou, H., & Xu, D. (2018, July). A New Sclera Segmentation and Vessels Extraction Method for Sclera Recognition. In 2018 10th International Conference on Communication Software and Networks (ICCSN) (pp. 552-556). IEEE.
[13] Delac, K., & Grgic, M. (2004, June). A survey of biometric recognition methods. In Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine (pp. 184-193). IEEE.
[14] https://www.kaggle.com/techmn/palm-dataset.
[15] Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE security & privacy, 1(2), 33-42.
[16] Vučković, V., & Arizanović, B. (2017, October). Heuristic-modified region filling algorithms for AB connection searching problem. In 2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS) (pp. 399-402). IEEE.
[17] He, Y., Hu, T., & Zeng, D. (2019). Scan-flood Fill (SCAFF): An Efficient Automatic Precise Region Filling Algorithm for Complicated Regions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (pp. 0-0).
[18] AlAzawee, W. S., Abdel-Qader, I., & Abdel-Qader, J. (2015, May). Using morphological operations—Erosion based algorithm for edge detection. In 2015 IEEE International Conference on Electro/Information Technology (EIT) (pp. 521-525). IEEE.
[19] Pawar, S., & Banga, V. K. (2012). Morphology approach in image processing. In International Conference on Intelligent Computational Systems (ICICS’2012) (Dubai). Dubai (pp. 148-150).
[20] Lowe, G. (2004). SIFT-the scale-invariant feature transform. Int. J, 2, 91-110.
[21] Zheng, L., Li, G., & Bao, Y. (2010, January). Improvement of grayscale image 2D maximum entropy threshold segmentation method. In 2010 International Conference on Logistics Systems and Intelligent Management (ICLSIM) (Vol. 1, pp. 324-328). IEEE.
[22] Gnanasekaran, N., Chandramohan, S., Kumar, P. S., & Imran, A. M. (2016). Optimal placement of capacitors in radial distribution system using a shark smell optimization algorithm. Ain Shams Engineering Journal, 7(2), 907-916.
[23] Ye, R. (2013). Image Watermarking using Chaotic Watermark Scrambling and Perceptual Quality Evaluation.
[24] Ye, G., Jiao, K., Pan, C., & Huang, X. (2018). An effective framework for chaotic image encryption based on 3D logistic map. Security and Communication Networks, 2018.
[25] Zhong, L., Wan, W., & Kong, D. (2016). Java web login authentication based on improved MD5 algorithm. 2016 International Conference on Audio, Language and Image Processing (ICALIP)
[26] Asmin Bhandari, Moshiur Bhuiyan, P. W. C. Prasad. (2017). Enhancement of MD5 Algorithm for Secured Web Development. Journal of Software. Volume 12, Number 4.
[27] Fouque, P. A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., ... & Zhang, Z. (2018). Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submission to the NIST’s post-quantum cryptography standardization process.