Biometrics provides better authentication. Unprotected biometrics is open to attacks from intruders as stolen biometrics may not be revocable. Although there are several points where attacks can be launched on biometric systems, template databases are said to be the most frequently attacked. When a template database is attacked, attackers can add fresh templates, modify the existing ones, copy or steal templates and later construct a spoof from it or replay it back into the biometric system to impersonate a genuine user. Several template security systems have been presented in the literature to secure biometric templates. Fuzzy vault, as proposed by many researchers is, to some extent, one of the best algorithms to achieve template protection as it has good security. Fuzzy vault, however, lacks irreversibility, revocability, and diversity. To address these disadvantages and strengthen fuzzy vault, this study combines a noninvertible feature transformation template protection algorithm known as cuckoo hashing that possesses irreversibility, revocability, and diversity properties with a fuzzy vault for privacy. The study used fingerprint biometrics as it is widely used. The proposed algorithm was implemented in the MATLAB 2016a environment using FVC 2004 DB1 fingerprint public database. The proposed algorithm recorded a FAR of 0.01% and an FRR value of 0.09% with an EER of 0.05%.
Read MoreDoi: https://doi.org/10.54216/FPA.100201
Vol. 10 Issue. 2 PP. 08-24, (2023)
The objective of this paper is to introduce a novel security model for the encryption of uncertain rational data units represented as single-valued rational neutrosophic numbers by combining refined neutrosophic number theoretical concepts with the El Gamal public key crypto scheme. In addition, some applications on uncertain data units will be shown and illustrated.
Read MoreDoi: https://doi.org/10.54216/FPA.100203
Vol. 10 Issue. 2 PP. 35-41, (2023)
The demand for cloud computing has increased immensely, and its security is becoming challenging. The enormous growth in cloud computing adaptation has been observed, but the information security concerns have not been addressed thoroughly. The security issues related to cloud computing are a concern. The emergence of Blockchain as a key security provider has increased the hope for the availability of a secure cloud computing environment. The data-sharing technique based on the cloud scenario relies on the network's storage and architecture; however, the storage providers are considered trusted third parties for data-sharing and storage purposes. The associated limitations such as security, high operational cost, centralized storage capability, and data availability have become a challenging task, which leads to the development of a trusted data management system for secure data sharing through the Blockchain. This study presents an analysis of secure data-sharing techniques using Blockchain. The related research articles were elicited from several sources such as Springer, IEEE, Elsevier, and other online sources. The primary studies have been categorized into four types: healthcare data sharing, vehicular communication-based data sharing, IoT-based data sharing, and other miscellaneous techniques. The techniques have been analyzed based on various performance metrics. The analysis and findings of this study can pave a way for the future development of safe data-sharing techniques using Blockchain technology.
Read MoreDoi: https://doi.org/10.54216/FPA.100204
Vol. 10 Issue. 2 PP. 42-54, (2023)
The objective of this paper is to build the neutrosophic version of the RSA crypto-algorithm, where we use the foundations of fusion neutrosophic number theory such as neutrosophic phi-Euler's function, neutrosophic congruencies, and neutrosophic inverses to build novel algorithms for cryptography depending of famous RSA algorithm.
Read MoreDoi: https://doi.org/10.54216/FPA.100206
Vol. 10 Issue. 2 PP. 69-74, (2023)
The paper proposes a method for improving the accuracy of image classification by combining CNNs and the Binary Marine Predators Algorithm (BMPA). The CNNs used in the study, ResNet 50 and AlexNet, were trained on ImageNet and used to extract features from the images in the dataset. Features are taken from layers (avg_pool) in ResNet 50 and (drop7) in AlexNet. These features were then fed into the BMPA algorithm, which selected the most relevant features and removed irrelevant ones to improve the classification process. The proposed method is said to be efficient, capable of achieving higher classification accuracy, and able to select the best features. The authors believe that this approach could be applied to a variety of other image classification tasks. It is important to note that the effectiveness of this method should be evaluated on a range of datasets and compared to other state-of-the-art methods.
Read MoreDoi: https://doi.org/10.54216/FPA.100208
Vol. 10 Issue. 2 PP. 86-94, (2023)
the impact of social analytics on hospital health management: a multilevel fusion approach for data-driven decision-making and brand improvement. The hospital health management center should use feature extraction techniques to learn more about customers' feelings towards their services and optimize their business strategies and promotions accordingly. The proposed multi-level/hybrid level fusion system architectures can effectively integrate data/images from multiple sources, including social networks, to collect and process essential data for score level and rank level decision-making. This approach leverages intelligent techniques, such as deep learning models, fuzzy logic, and optimization algorithms, to improve fusion scores and achieve optimal fusion performance. The proposed framework can also be extended to various applications, including multimedia data fusion, e-systems data fusion, and spatial data fusion, to enable intelligent systems for information fusion and decision-making in diverse domains. Therefore, this paper proposes Improved Customer Relation and Business Operations (ICR-BO) to enhance customer relationships in business development using text and social analytics. A case study is carried out to explore the online debate of computer brands operated in hospital environments and Twitter suppliers. The authors used text-mining strategies and social analytics to analyze business operations. Social Media uses data sets to view important observations and trends to identify consumer awareness after collecting critical tweets using Twitter search. The experimental results show that ICR-BO achieves the highest customer relation compared to other existing methods.
Read MoreDoi: https://doi.org/10.54216/FPA.100209
Vol. 10 Issue. 2 PP. 95-107, (2023)
In this study, we present a multi-level fusion of deep learning technique for facial expression identification, with applications spanning the fields of cognitive science, personality development, and the detection and diagnosis of mental health disorders in humans. The suggested approach, named Deep Learning aided Hybridized Face Expression Recognition system (DLFERS), classifies human behavior from a single image frame through the use of feature extraction and a support vector machine. An information classification algorithm is incorporated into the methodology to generate a new fused image consisting of two integrated blocks of eyes and mouth, which are very sensitive to changes in human expression and relevant for interpreting emotional expressions. The Transformation of Invariant Structural Features (TISF) and the Transformation of Invariant Powerful Movement (TIPM) are utilized to extract features in the suggested method's Storage Pack of Features (SPOF). Multiple datasets are used to compare the effectiveness of different neural network algorithms for learning facial expressions. The study's major findings show that the suggested DLFERS approach achieves an overall classification accuracy of 93.96 percent and successfully displays a user's genuine emotions during common computer-based tasks.
Read MoreDoi: https://doi.org/10.54216/FPA.100210
Vol. 10 Issue. 2 PP. 108-121, (2023)