Fusion: Practice and Applications

Journal DOI


Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics

Mulikat B. Akanbi , Rasheed G. Jimoh , Agbotiname L. Imoize , Joseph B. Awotunde , Olatunji S. Isiaka , Shade B. Abdulrahaman

Biometrics provides better authentication. Unprotected biometrics is open to attacks from intruders as stolen biometrics may not be revocable. Although there are several points where attacks can be launched on biometric systems, template databases are said to be the most frequently attacked. When a template database is attacked, attackers can add fresh templates, modify the existing ones, copy or steal templates and later construct a spoof from it or replay it back into the biometric system to impersonate a genuine user. Several template security systems have been presented in the literature to secure biometric templates. Fuzzy vault, as proposed by many researchers is, to some extent, one of the best algorithms to achieve template protection as it has good security. Fuzzy vault, however, lacks irreversibility, revocability, and diversity. To address these disadvantages and strengthen fuzzy vault, this study combines a noninvertible feature transformation template protection algorithm known as cuckoo hashing that possesses irreversibility, revocability, and diversity properties with a fuzzy vault for privacy. The study used fingerprint biometrics as it is widely used. The proposed algorithm was implemented in the MATLAB 2016a environment using FVC 2004 DB1 fingerprint public database. The proposed algorithm recorded a FAR of 0.01% and an FRR value of 0.09% with an EER of 0.05%.

Read More

Doi: https://doi.org/10.54216/FPA.100201

Vol. 10 Issue. 2 PP. 08-24, (2023)

Media Students’ Internship planning and practices During and After COVID-19: Fusion of technology perspective

Walaa Fouda , Federico Triolo , Amira Al Nahdi

The COVID-19 pandemic had a significant impact on many areas of the workforce, including internship programs. The education sector in general started integrating technology as a kind of fusion of technology in different ways.   The internship course was one of the important educational programs that get affected by the pandemic and there was a deep need for technology fusion to overcome the hard times. This study investigates the effects of COVID-19 on internship programs and provides recommendations for implementing effective strategies in a post-COVID-19 World.  To accomplish this, a comprehensive review of relevant literature review has been conducted, including academic journals, governments, and industry reports, as well as employing both qualitative and quantitative research methods. This study also discussed a case study of the Professional Work Shadow Program, an internship for media students specialized in Integrated marketing communication, Broadcasting, International relations, and public relations. The study findings recommend various marketing strategies, which can help media internship providers and beyond offer effective and sustainable programs to university students.

Read More

Doi: https://doi.org/10.54216/FPA.100202

Vol. 10 Issue. 2 PP. 25-34, (2023)

Security Model for Encrypting Uncertain Rational Data Units Based on Refined Neutrosophic Integers Fusion and El Gamal Algorithm

Mehmet Merkepci , Mohammad Abobala

The objective of this paper is to introduce a novel security model for the encryption of uncertain rational data units represented as single-valued rational neutrosophic numbers by combining refined neutrosophic number theoretical concepts with the El Gamal public key crypto scheme. In addition, some applications on uncertain data units will be shown and illustrated.

Read More

Doi: https://doi.org/10.54216/FPA.100203

Vol. 10 Issue. 2 PP. 35-41, (2023)

Analysis of Secure Data Sharing Techniques Using Blockchain

Neha Mathur , Shweta Sinha , Rajesh Kumar Tyagi , Nishtha Jatana

The demand for cloud computing has increased immensely, and its security is becoming challenging. The enormous growth in cloud computing adaptation has been observed, but the information security concerns have not been addressed thoroughly. The security issues related to cloud computing are a concern. The emergence of Blockchain as a key security provider has increased the hope for the availability of a secure cloud computing environment. The data-sharing technique based on the cloud scenario relies on the network's storage and architecture; however, the storage providers are considered trusted third parties for data-sharing and storage purposes. The associated limitations such as security, high operational cost, centralized storage capability, and data availability have become a challenging task, which leads to the development of a trusted data management system for secure data sharing through the Blockchain. This study presents an analysis of secure data-sharing techniques using Blockchain. The related research articles were elicited from several sources such as Springer, IEEE, Elsevier, and other online sources. The primary studies have been categorized into four types: healthcare data sharing, vehicular communication-based data sharing, IoT-based data sharing, and other miscellaneous techniques. The techniques have been analyzed based on various performance metrics. The analysis and findings of this study can pave a way for the future development of safe data-sharing techniques using Blockchain technology.

Read More

Doi: https://doi.org/10.54216/FPA.100204

Vol. 10 Issue. 2 PP. 42-54, (2023)

Forecasting NFT Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFT Collectors

Rasha Almajed , Abedallah Z. Abualkishik , Amer Ibrahim , Nahia Mourad

Non-Fungible Tokens (NFTs) are one-of-a-kind digital items with static or continuous visual and audio content. NFTs digitally represent any assets that may hold photos, gifs, audio, videos, or any other data-based storable material. These assets may come under a variety of asset groups, including art, in-game goods, and entertainment collecting units. What makes them appealing is their exclusivity, in the sense that each NFT is unique to itself, and ownership is determined by a digital certificate. In the first half of 2021, NFT sales totaled more than a billion. The NFT Software as a service (SAAS) based system is a one-of-a-kind offering and concept for thinking outside the box and presenting intellectuals and creative treasures and exhibiting these objects to ensure the security and integrity of digital assets. The existence of core decentralized networks allows for unrestricted access to this material as well as further analysis. Based on the Web3 Blockchain technology, these assets may be traded and represent next-generation ownership.  In this paper, Adaptive Improved Convolutional Neural Networks (AICNN) are used to forecast NFT to provide a SAAS NFT collector. We also introduce Tree-seed Chaotic Atom Search Optimization (TSC-ASO) algorithm to optimize the forecasting process. The proposed method of NFT price forecasting is evaluated and compared with the existing forecasting methods. To produce an accurate report for NFT price forecasting, the proposed method will be effective.

Read More

Doi: https://doi.org/10.54216/FPA.100205

Vol. 10 Issue. 2 PP. 55-68, (2023)

The Applications of Fusion Neutrosophic Number Theory in Public Key Cryptography and the Improvement of RSA Algorithm

Mehmet Merkepci , Mohammad Abobala , Ali Allouf

The objective of this paper is to build the neutrosophic version of the RSA crypto-algorithm, where we use the foundations of fusion neutrosophic number theory such as neutrosophic phi-Euler's function, neutrosophic congruencies, and neutrosophic inverses to build novel algorithms for cryptography depending of famous RSA algorithm.

Read More

Doi: https://doi.org/10.54216/FPA.100206

Vol. 10 Issue. 2 PP. 69-74, (2023)