Cloud-based human authentication through scalable multibiometric image sensor fusion

被引:0
|
作者
Amin, Parag [1 ]
Bhuvana, J. [2 ]
Patel, Warish [3 ]
Saxena, Ashendra Kumar [4 ]
机构
[1] ATLAS SkillTech Univ, Sch Management & Entrepreneurship, ISME, Mumbai, Maharashtra, India
[2] Jain Univ, Sch CS & IT, Dept CSIT, Bengaluru, Karnataka, India
[3] Parul Univ, Dept Comp Sci & Engn, PIET, Vadodara, Gujarat, India
[4] Teerthanker Mahaveer Univ, Dept Coll Comp Sci & Informat Technol, Moradabad, Uttar Pradesh, India
关键词
Individual identification; Biometric information; Merged characteristics; Improved particle swarm optimization-based advanced encryption standard (IPSO-AES); IDENTIFICATION; BIOMETRICS;
D O I
10.1007/s13198-024-02449-x
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The privacy and safety of confidential information throughout various programs are greatly enhanced by cloud-based human verification. Traditional authentication techniques frequently rely on a single biometric property, which can be vulnerable to assaults like spoofing. This work offers an extensible multibiometric image sensor fusion method for cloud-based human authentication using an improved particle swarm optimization-based Advanced Encryption Standard (IPSO-AES) cryptography framework. The IPSO-AES model that has been suggested combines several biometric features, including fingerprint, palm print, and facial characteristics, which have been recorded by a flexible multibiometric image detector. To improve the quality and dependability of the collected biometric information, preprocessing is applied. The AES method, which is applied to encrypt the biometric information before transfer to the cloud system, is then optimized using the IPSO technique. Using a wide range of trials, the suggested model is assessed in terms of several metrics and contrasted with current authentication techniques. The experimental findings show that the suggested encryption model performs better than other alternatives with regard to authentication precision, security, and scalability. The concept is promising for actual cloud-based human verification scenarios where anonymity and safety are crucial.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Cloud-based Programmable Sensor Data Provision
    Yan, Lin
    Guo, Yao
    Chen, Xiangqun
    2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 135 - 143
  • [32] EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback
    Yang, Yingyuan
    Li, Jiangnan
    Lee, Sunshin
    Huang, Xueli
    Sun, Jinyuan
    NETWORK, 2022, 2 (01): : 190 - 202
  • [33] A novel protocol for efficient authentication in cloud-based IoT devices
    Alam, Irfan
    Kumar, Manoj
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (10) : 13823 - 13843
  • [34] A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems
    Fan, Kai
    Zhu, Shanshan
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    IEEE NETWORK, 2019, 33 (02): : 44 - 49
  • [35] ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment
    Qingfeng Cheng
    Xinglong Zhang
    Jianfeng Ma
    Journal of Medical Systems, 2017, 41
  • [36] Security-enhanced cloud-based image secret sharing and authentication using POB number system
    Chen, Tzung-Her
    Chang, Tzu-Ching
    Zhu, Ting-Le
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 1901 - 1924
  • [37] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Iuon-Chang Lin
    Hung-Huei Hsu
    Chen-Yang Cheng
    Journal of Network and Systems Management, 2015, 23 : 978 - 997
  • [38] A novel protocol for efficient authentication in cloud-based IoT devices
    Irfan Alam
    Manoj Kumar
    Multimedia Tools and Applications, 2022, 81 : 13823 - 13843
  • [39] A Cloud-based RFID Authentication Protocol with Insecure Communication Channels
    Xiao, Hannan
    Alshehri, Awatif Ali
    Christianson, Bruce
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 332 - 339
  • [40] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    Cheng, Chen-Yang
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (04) : 978 - 997