Sign in to use this feature.

Years

Between: -

Search Results (26)

Search Parameters:
Keywords = Biometric Authentication Framework

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 2171 KiB  
Article
Digital Identity in the EU: Promoting eIDAS Solutions Based on Biometrics
by Pietro Ruiu, Salvatore Saiu and Enrico Grosso
Future Internet 2024, 16(7), 228; https://doi.org/10.3390/fi16070228 - 28 Jun 2024
Viewed by 1168
Abstract
Today, more than ever before, technological progress is evolving rapidly, and in the absence of adequate regulatory frameworks, the big players in the digital market (the so-called Big Techs) are exploiting personal data (name, address, telephone numbers) and private data (political opinions, religious [...] Read more.
Today, more than ever before, technological progress is evolving rapidly, and in the absence of adequate regulatory frameworks, the big players in the digital market (the so-called Big Techs) are exploiting personal data (name, address, telephone numbers) and private data (political opinions, religious beliefs, financial information, or health status) in an uncontrolled manner. A crucial role in this scenario is played by the weakness of international regulatory frameworks due to the slow response time of legislators who are incapable, from a regulatory point of view, of keeping pace with technological evolution and responding to the new requirements coming from the social context, which is increasingly characterized by the pervasive presence of new technologies, such as smartphones and wearable devices. At the European level, the General Data Protection Regulation (GDPR) and the Regulation on Electronic Identification, Authentication and Trust Services (eIDAS) have marked a significant turning point in the regulatory landscape. However, the mechanisms proposed present clear security issues, particularly in light of emerging concepts such as digital identity. Moreover, despite the centrality of biometric issues within the European regulatory framework and the practical introduction of biometric data within electronic national identity (eID) cards, there are still no efforts to use biometric features for the identification and authentication of a person in a digital context. This paper clarifies and precisely defines the potential impact of biometric-based digital identity and hypothesizes its practical use for accessing network-based services and applications commonly used in daily life. Using the Italian eID card as a model, an authentication scheme leveraging biometric data is proposed, ensuring full compliance with GDPR and eIDAS regulations. The findings suggest that such a scheme can significantly improve the security and reliability of electronic identification systems, promoting broader adoption of eIDAS solutions. Full article
Show Figures

Figure 1

23 pages, 2355 KiB  
Article
Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment
by Saeed Bamashmos, Naveen Chilamkurti and Ahmad Salehi Shahraki
Sensors 2024, 24(11), 3575; https://doi.org/10.3390/s24113575 - 1 Jun 2024
Viewed by 730
Abstract
Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- [...] Read more.
Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for IoT devices, one that considers secret keys, geographical location, and physically unclonable function (PUF). Proof-of-authentication (PoAh) and elliptic curve Diffie–Hellman are followed for lightweight and low latency support. Second-level authentication for IoT users, which are sub-categorized into four levels, each defined by specific factors such as identity, password, and biometrics. The first level involves a matrix-based password; the second level utilizes the elliptic curve digital signature algorithm (ECDSA); and levels 3 and 4 are secured with iris and finger vein, providing comprehensive and robust authentication. We deployed fuzzy logic to validate the authentication and make the system more robust. The 2L-MFA model significantly improves performance, reducing registration, login, and authentication times by up to 25%, 50%, and 25%, respectively, facilitating quicker cloud access post-authentication and enhancing overall efficiency. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

18 pages, 2514 KiB  
Article
Decentralized Identity Authentication Mechanism: Integrating FIDO and Blockchain for Enhanced Security
by Hsia-Hung Ou, Chien-Hsiu Pan, Yang-Ming Tseng and Iuon-Chang Lin
Appl. Sci. 2024, 14(9), 3551; https://doi.org/10.3390/app14093551 - 23 Apr 2024
Viewed by 1284
Abstract
FIDO (Fast Identity Online) is a set of network identity standards established by the FIDO Alliance. It employs a framework based on public key cryptography to facilitate multi-factor authentication (MFA) and biometric login, ensuring the robust protection of personal data associated with cloud [...] Read more.
FIDO (Fast Identity Online) is a set of network identity standards established by the FIDO Alliance. It employs a framework based on public key cryptography to facilitate multi-factor authentication (MFA) and biometric login, ensuring the robust protection of personal data associated with cloud accounts and ensuring the security of server-to-terminal device protocols during the login process. The FIDO Alliance has established three standards: FIDO Universal Second Factor (FIDO U2F), FIDO Universal Authentication Framework (FIDO UAF), and the Client to Authenticator Protocols (CTAP). The newer CTAP, also known as FIDO2, integrates passwordless login and two-factor authentication. Importantly, FIDO2’s support for major browsers enables users to authenticate their identities via FIDO2 across a broader range of platforms and devices, ushering in the era of passwordless authentication. In the FIDO2 framework, if a user’s device is stolen or compromised, then the private key may be compromised, and the public key stored on the FIDO2 server may be tampered with by attackers attempting to impersonate the user for identity authentication, posing a high risk to information security. Recognizing this, this study aims to propose a solution based on the FIDO2 framework, combined with blockchain technology and access control, called the FIDO2 blockchain architecture, to address existing security vulnerabilities in FIDO2. By leveraging the decentralized nature of the blockchain, the study addresses potential single points of failure in FIDO2 server centralized identity management systems, thereby enhancing system security and availability. Furthermore, the immutability of the blockchain ensures the integrity of public keys once securely stored on the chain, effectively reducing the risk of attackers impersonating user identities. Additionally, the study implements an access control mechanism to manage user permissions effectively, ensuring that only authorized users can access corresponding permissions and preventing unauthorized modifications and abuse. In addition to proposing practical solutions and steps, the study explains and addresses security concerns and conducts performance evaluations. Overall, this study brings higher levels of security and trustworthiness to FIDO2, providing a robust identity authentication solution. Full article
Show Figures

Figure 1

24 pages, 20100 KiB  
Article
Continuous Authentication in the Digital Age: An Analysis of Reinforcement Learning and Behavioral Biometrics
by Priya Bansal and Abdelkader Ouda
Computers 2024, 13(4), 103; https://doi.org/10.3390/computers13040103 - 18 Apr 2024
Cited by 1 | Viewed by 1777
Abstract
This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique behavioral biometric signatures, while a reward-driven RL model is deployed to authenticate [...] Read more.
This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique behavioral biometric signatures, while a reward-driven RL model is deployed to authenticate users throughout their sessions. The proposed system augments conventional authentication mechanisms, fortifying them with an additional layer of security to create a robust continuous authentication framework compatible with static authentication systems. The methodology entails training an RL model to discern atypical user typing patterns and identify potentially suspicious activities. Each user’s historical data are utilized to train an agent, which undergoes preprocessing to generate episodes for learning purposes. The environment involves the retrieval of observations, which are intentionally perturbed to facilitate learning of nonlinear behaviors. The observation vector encompasses both ongoing and summarized features. A binary and minimalist reward function is employed, with principal component analysis (PCA) utilized for encoding ongoing features, and the double deep Q-network (DDQN) algorithm implemented through a fully connected neural network serving as the policy net. Evaluation results showcase training accuracy and equal error rate (EER) ranging from 94.7% to 100% and 0 to 0.0126, respectively, while test accuracy and EER fall within the range of approximately 81.06% to 93.5% and 0.0323 to 0.11, respectively, for all users as encoder features increase in number. These outcomes are achieved through RL’s iterative refinement of rewards via trial and error, leading to enhanced accuracy over time as more data are processed and incorporated into the system. Full article
(This article belongs to the Section ICT Infrastructures for Cybersecurity)
Show Figures

Figure 1

16 pages, 2880 KiB  
Article
Customizable Presentation Attack Detection for Improved Resilience of Biometric Applications Using Near-Infrared Skin Detection
by Tobias Scheer, Markus Rohde, Ralph Breithaupt, Norbert Jung and Robert Lange
Sensors 2024, 24(8), 2389; https://doi.org/10.3390/s24082389 - 9 Apr 2024
Viewed by 820
Abstract
Due to their user-friendliness and reliability, biometric systems have taken a central role in everyday digital identity management for all kinds of private, financial and governmental applications with increasing security requirements. A central security aspect of unsupervised biometric authentication systems is the presentation [...] Read more.
Due to their user-friendliness and reliability, biometric systems have taken a central role in everyday digital identity management for all kinds of private, financial and governmental applications with increasing security requirements. A central security aspect of unsupervised biometric authentication systems is the presentation attack detection (PAD) mechanism, which defines the robustness to fake or altered biometric features. Artifacts like photos, artificial fingers, face masks and fake iris contact lenses are a general security threat for all biometric modalities. The Biometric Evaluation Center of the Institute of Safety and Security Research (ISF) at the University of Applied Sciences Bonn-Rhein-Sieg has specialized in the development of a near-infrared (NIR)-based contact-less detection technology that can distinguish between human skin and most artifact materials. This technology is highly adaptable and has already been successfully integrated into fingerprint scanners, face recognition devices and hand vein scanners. In this work, we introduce a cutting-edge, miniaturized near-infrared presentation attack detection (NIR-PAD) device. It includes an innovative signal processing chain and an integrated distance measurement feature to boost both reliability and resilience. We detail the device’s modular configuration and conceptual decisions, highlighting its suitability as a versatile platform for sensor fusion and seamless integration into future biometric systems. This paper elucidates the technological foundations and conceptual framework of the NIR-PAD reference platform, alongside an exploration of its potential applications and prospective enhancements. Full article
(This article belongs to the Section Optical Sensors)
Show Figures

Figure 1

29 pages, 13611 KiB  
Article
Fourier Synchrosqueezing Transform-ICA-EMD Framework Based EOG-Biometric Sustainable and Continuous Authentication via Voluntary Eye Blinking Activities
by Kutlucan Gorur
Biomimetics 2023, 8(4), 378; https://doi.org/10.3390/biomimetics8040378 - 18 Aug 2023
Cited by 1 | Viewed by 1848
Abstract
In recent years, limited works on EOG (electrooculography)-based biometric authentication systems have been carried out with eye movements or eye blinking activities in the current literature. EOGs have permanent and unique traits that can separate one individual from another. In this work, we [...] Read more.
In recent years, limited works on EOG (electrooculography)-based biometric authentication systems have been carried out with eye movements or eye blinking activities in the current literature. EOGs have permanent and unique traits that can separate one individual from another. In this work, we have investigated FSST (Fourier Synchrosqueezing Transform)-ICA (Independent Component Analysis)-EMD (Empirical Mode Decomposition) robust framework-based EOG-biometric authentication (one-versus-others verification) performances using ensembled RNN (Recurrent Neural Network) deep models voluntary eye blinkings movements. FSST is implemented to provide accurate and dense temporal-spatial properties of EOGs on the state-of-the-art time-frequency matrix. ICA is a powerful statistical tool to decompose multiple recording electrodes. Finally, EMD is deployed to isolate EOG signals from the EEGs collected from the scalp. As our best knowledge, this is the first research attempt to explore the success of the FSST-ICA-EMD framework on EOG-biometric authentication generated via voluntary eye blinking activities in the limited EOG-related biometric literature. According to the promising results, improved and high recognition accuracies (ACC/Accuracy: ≥99.99% and AUC/Area under the Curve: 0.99) have been achieved in addition to the high TAR (true acceptance rate) scores (≥98%) and low FAR (false acceptance rate) scores (≤3.33%) in seven individuals. On the other hand, authentication and monitoring for online users/students are becoming essential and important tasks due to the increase of the digital world (e-learning, e-banking, or e-government systems) and the COVID-19 pandemic. Especially in order to ensure reliable access, a highly scalable and affordable approach for authenticating the examinee without cheating or monitoring high-data-size video streaming is required in e-learning platforms and online education strategies. Hence, this work may present an approach that offers a sustainable, continuous, and reliable EOG-biometric authentication of digital applications, including e-learning platforms for users/students. Full article
Show Figures

Figure 1

36 pages, 6158 KiB  
Article
An Experimental Analysis on Multicepstral Projection Representation Strategies for Dysphonia Detection
by Rodrigo Colnago Contreras , Monique Simplicio Viana , Everthon Silva Fonseca , Francisco Lledo dos Santos, Rodrigo Bruno Zanin  and Rodrigo Capobianco Guido 
Sensors 2023, 23(11), 5196; https://doi.org/10.3390/s23115196 - 30 May 2023
Cited by 2 | Viewed by 1677
Abstract
Biometrics-based authentication has become the most well-established form of user recognition in systems that demand a certain level of security. For example, the most commonplace social activities stand out, such as access to the work environment or to one’s own bank account. Among [...] Read more.
Biometrics-based authentication has become the most well-established form of user recognition in systems that demand a certain level of security. For example, the most commonplace social activities stand out, such as access to the work environment or to one’s own bank account. Among all biometrics, voice receives special attention due to factors such as ease of collection, the low cost of reading devices, and the high quantity of literature and software packages available for use. However, these biometrics may have the ability to represent the individual impaired by the phenomenon known as dysphonia, which consists of a change in the sound signal due to some disease that acts on the vocal apparatus. As a consequence, for example, a user with the flu may not be properly authenticated by the recognition system. Therefore, it is important that automatic voice dysphonia detection techniques be developed. In this work, we propose a new framework based on the representation of the voice signal by the multiple projection of cepstral coefficients to promote the detection of dysphonic alterations in the voice through machine learning techniques. Most of the best-known cepstral coefficient extraction techniques in the literature are mapped and analyzed separately and together with measures related to the fundamental frequency of the voice signal, and its representation capacity is evaluated on three classifiers. Finally, the experiments on a subset of the Saarbruecken Voice Database prove the effectiveness of the proposed material in detecting the presence of dysphonia in the voice. Full article
(This article belongs to the Special Issue Signal and Image Processing in Biometric Detection)
Show Figures

Figure 1

20 pages, 5722 KiB  
Article
A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0
by Ayman Altameem, Prabu P, Senthilnathan T, Ramesh Chandra Poonia and Abdul Khader Jilani Saudagar
Systems 2023, 11(1), 28; https://doi.org/10.3390/systems11010028 - 5 Jan 2023
Cited by 3 | Viewed by 2428
Abstract
The Internet of Things (IoT) is being applied in multiple domains, including smart homes and energy management. This work aims to tighten security in IoTs using fingerprint authentications and avoid unauthorized access to systems for safeguarding user privacy. Captured fingerprints can jeopardize the [...] Read more.
The Internet of Things (IoT) is being applied in multiple domains, including smart homes and energy management. This work aims to tighten security in IoTs using fingerprint authentications and avoid unauthorized access to systems for safeguarding user privacy. Captured fingerprints can jeopardize the security and privacy of personal information. To solve privacy- and security-related problems in IoT-based environments, Biometric Authentication Frameworks (BAFs) are proposed to enable authentications in IoTs coupled with fingerprint authentications on edge consumer devices and to ensure biometric security in transmissions and databases. The Honeywell Advanced Encryption Security-Cryptography Measure (HAES-CM) scheme combined with Hybrid Advanced Encryption Standards with Chaotic Map Encryptions is proposed. BAFs enable private and secure communications between Industry 4.0’s edge devices and IoT. This work’s suggested scheme’s evaluations with other encryption methods reveal that the suggested HAES-CM encryption strategy outperforms others in terms of processing speeds. Full article
(This article belongs to the Section Systems Engineering)
Show Figures

Figure 1

15 pages, 1647 KiB  
Article
Late Deep Fusion of Color Spaces to Enhance Finger Photo Presentation Attack Detection in Smartphones
by Emanuela Marasco and Anudeep Vurity
Appl. Sci. 2022, 12(22), 11409; https://doi.org/10.3390/app122211409 - 10 Nov 2022
Cited by 5 | Viewed by 1470
Abstract
Finger photo recognition represents a promising touchless technology that offers portable and hygienic authentication solutions in smartphones, eliminating physical contact. Public spaces, such as banks and staff-less stores, benefit from contactless authentication considering the current public health sphere. The user captures the image [...] Read more.
Finger photo recognition represents a promising touchless technology that offers portable and hygienic authentication solutions in smartphones, eliminating physical contact. Public spaces, such as banks and staff-less stores, benefit from contactless authentication considering the current public health sphere. The user captures the image of their own finger by using the camera integrated in a mobile device. Although recent research has pushed boundaries of finger photo matching, the security of this biometric methodology still represents a concern. Existing systems have been proven to be vulnerable to print attacks by presenting a color paper-printout in front of the camera and photo attacks that consist of displaying the original image in front of the capturing device. This paper aims to improve the performance of finger photo presentation attack detection (PAD) algorithms by investigating deep fusion strategies to combine deep representations obtained from different color spaces. In this work, spoofness is described by combining different color models. The proposed framework integrates multiple convolutional neural networks (CNNs), each trained using patches extracted from a specific color model and centered around minutiae points. Experiments were carried out on a publicly available database of spoofed finger photos obtained from the IIITD Smartphone Finger photo Database with spoof data, including printouts and various display attacks. The results show that deep fusion of the best color models improved the robustness of the PAD system and competed with the state-of-the-art. Full article
(This article belongs to the Special Issue Application of Biometrics Technology in Security)
Show Figures

Figure 1

21 pages, 704 KiB  
Article
BioShare: An Open Framework for Trusted Biometric Authentication under User Control
by Quan Sun, Jie Wu and Wenhai Yu
Appl. Sci. 2022, 12(21), 10782; https://doi.org/10.3390/app122110782 - 25 Oct 2022
Viewed by 1788
Abstract
Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode. In the former mode, each user has full control of his/her biometric data, but the authentication service is restricted to local mobile apps. In [...] Read more.
Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode. In the former mode, each user has full control of his/her biometric data, but the authentication service is restricted to local mobile apps. In the latter mode, the authentication service can be opened up to network applications, but the owners have no control of their private data. It has become a difficult problem for biometric applications to provide open and trusted authentication services under user control. Existing approaches address these concerns in ad-hoc ways. In this work, we propose BioShare, a framework that provides trusted biometric authentication services to network applications while giving users full control of their biometric data. Our framework is designed around three key principles: each user has full control of his/her biometric data; biometric data is stored and processed in trusted environments to prevent privacy leaks; and the open biometric-authentication service is efficiently provided to network applications. We describe our current design and sample implementation, and illustrate how it provides an open face-recognition service with standard interfaces, combines terminal trusted environments with server enclaves, and enables each user to control his/her biometric data efficiently. Finally, we analyze the security of the framework and measure the performance of the implementation. Full article
(This article belongs to the Special Issue Artificial Intelligence in Industrial Engineering)
Show Figures

Figure 1

20 pages, 5178 KiB  
Article
Match-Level Fusion of Finger-Knuckle Print and Iris for Human Identity Validation Using Neuro-Fuzzy Classifier
by Rohit Srivastava, Ved Prakash Bhardwaj, Mohamed Tahar Ben Othman, Mukesh Pushkarna, Anushree, Arushi Mangla, Mohit Bajaj, Ateeq Ur Rehman, Muhammad Shafiq and Habib Hamam
Sensors 2022, 22(10), 3620; https://doi.org/10.3390/s22103620 - 10 May 2022
Cited by 11 | Viewed by 2357
Abstract
Biometrics is the term for measuring human characteristics. If the term is divided into two parts, bio means life, and metric means measurement. The measurement of humans through different computational methods is performed to authorize a person. This measurement can be performed via [...] Read more.
Biometrics is the term for measuring human characteristics. If the term is divided into two parts, bio means life, and metric means measurement. The measurement of humans through different computational methods is performed to authorize a person. This measurement can be performed via a single biometric or by using a combination of different biometric traits. The combination of multiple biometrics is termed biometric fusion. It provides a reliable and secure authentication of a person at a higher accuracy. It has been introduced in the UIDIA framework in India (AADHAR: Association for Development and Health Action in Rural) and in different nations to figure out which biometric characteristics are suitable enough to authenticate the human identity. Fusion in biometric frameworks, especially FKP (finger–knuckle print) and iris, demonstrated to be a solid multimodal as a secure framework. The proposed approach demonstrates a proficient and strong multimodal biometric framework that utilizes FKP and iris as biometric modalities for authentication, utilizing scale-invariant feature transform (SIFT) and speeded up robust features (SURF). Log Gabor wavelet is utilized to extricate the iris feature set. From the extracted region, features are computed using principal component analysis (PCA). Both biometric modalities, FKP and iris, are combined at the match score level. The matching is performed using a neuro-fuzzy neural network classifier. The execution and accuracy of the proposed framework are tested on the open database Poly-U, CASIA, and an accuracy of 99.68% is achieved. The accuracy is higher compared to a single biometric. The neuro-fuzzy approach is also tested in comparison to other classifiers, and the accuracy is 98%. Therefore, the fusion mechanism implemented using a neuro-fuzzy classifier provides the best accuracy compared to other classifiers. The framework is implemented in MATLAB 7.10. Full article
(This article belongs to the Special Issue Advances in IoMT for Healthcare Systems)
Show Figures

Figure 1

16 pages, 1057 KiB  
Article
A Fingerprint-Based Verification Framework Using Harris and SURF Feature Detection Algorithms
by Samy Bakheet, Ayoub Al-Hamadi and Rehab Youssef
Appl. Sci. 2022, 12(4), 2028; https://doi.org/10.3390/app12042028 - 15 Feb 2022
Cited by 16 | Viewed by 5945
Abstract
Amongst all biometric-based personal authentication systems, a fingerprint that gives each person a unique identity is the most commonly used parameter for personal identification. In this paper, we present an automatic fingerprint-based authentication framework by means of fingerprint enhancement, feature extraction, and matching [...] Read more.
Amongst all biometric-based personal authentication systems, a fingerprint that gives each person a unique identity is the most commonly used parameter for personal identification. In this paper, we present an automatic fingerprint-based authentication framework by means of fingerprint enhancement, feature extraction, and matching techniques. Initially, a variant of adaptive histogram equalization called CLAHE (contrast limited adaptive histogram equalization) along with a combination of FFT (fast Fourier transform), and Gabor filters are applied to enhance the contrast of fingerprint images. The fingerprint is then authenticated by picking a small amount of information from some local interest points called minutiae point features. These features are extracted from the thinned binary fingerprint image with a hybrid combination of Harris and SURF feature detectors to render significantly improved detection results. For fingerprint matching, the Euclidean distance between the corresponding Harris-SURF feature vectors of two feature points is used as a feature matching similarity measure of two fingerprint images. Moreover, an iterative algorithm called RANSAC (RANdom SAmple Consensus) is applied for fine matching and to automatically eliminate false matches and incorrect match points. Quantitative experimental results achieved on FVC2002 DB1 and FVC2000 DB1 public domain fingerprint databases demonstrate the good performance and feasibility of the proposed framework in terms of achieving average recognition rates of 95% and 92.5% for FVC2002 DB1 and FVC2000 DB1 databases, respectively. Full article
(This article belongs to the Topic Artificial Intelligence in Sensors)
Show Figures

Figure 1

14 pages, 2100 KiB  
Article
Deep Q-Learning-Based Neural Network with Privacy Preservation Method for Secure Data Transmission in Internet of Things (IoT) Healthcare Application
by Nirmala Devi Kathamuthu, Annadurai Chinnamuthu, Nelson Iruthayanathan, Manikandan Ramachandran and Amir H. Gandomi
Electronics 2022, 11(1), 157; https://doi.org/10.3390/electronics11010157 - 4 Jan 2022
Cited by 33 | Viewed by 3819
Abstract
The healthcare industry is being transformed by the Internet of Things (IoT), as it provides wide connectivity among physicians, medical devices, clinical and nursing staff, and patients to simplify the task of real-time monitoring. As the network is vast and heterogeneous, opportunities and [...] Read more.
The healthcare industry is being transformed by the Internet of Things (IoT), as it provides wide connectivity among physicians, medical devices, clinical and nursing staff, and patients to simplify the task of real-time monitoring. As the network is vast and heterogeneous, opportunities and challenges are presented in gathering and sharing information. Focusing on patient information such as health status, medical devices used by such patients must be protected to ensure safety and privacy. Healthcare information is confidentially shared among experts for analyzing healthcare and to provide treatment on time for patients. Cryptographic and biometric systems are widely used, including deep-learning (DL) techniques to authenticate and detect anomalies, andprovide security for medical systems. As sensors in the network are energy-restricted devices, security and efficiency must be balanced, which is the most important concept to be considered while deploying a security system based on deep-learning approaches. Hence, in this work, an innovative framework, the deep Q-learning-based neural network with privacy preservation method (DQ-NNPP), was designed to protect data transmission from external threats with less encryption and decryption time. This method is used to process patient data, which reduces network traffic. This process also reduces the cost and error of communication. Comparatively, the proposed model outperformed some standard approaches, such as thesecure and anonymous biometric based user authentication scheme (SAB-UAS), MSCryptoNet, and privacy-preserving disease prediction (PPDP). Specifically, the proposed method achieved accuracy of 93.74%, sensitivity of 92%, specificity of 92.1%, communication overhead of 67.08%, 58.72 ms encryption time, and 62.72 ms decryption time. Full article
(This article belongs to the Section Artificial Intelligence Circuits and Systems (AICAS))
Show Figures

Figure 1

20 pages, 4532 KiB  
Review
Applications of Recurrent Neural Network for Biometric Authentication & Anomaly Detection
by Joseph M. Ackerson, Rushit Dave and Naeem Seliya
Information 2021, 12(7), 272; https://doi.org/10.3390/info12070272 - 1 Jul 2021
Cited by 54 | Viewed by 7889
Abstract
Recurrent Neural Networks are powerful machine learning frameworks that allow for data to be saved and referenced in a temporal sequence. This opens many new possibilities in fields such as handwriting analysis and speech recognition. This paper seeks to explore current research being [...] Read more.
Recurrent Neural Networks are powerful machine learning frameworks that allow for data to be saved and referenced in a temporal sequence. This opens many new possibilities in fields such as handwriting analysis and speech recognition. This paper seeks to explore current research being conducted on RNNs in four very important areas, being biometric authentication, expression recognition, anomaly detection, and applications to aircraft. This paper reviews the methodologies, purpose, results, and the benefits and drawbacks of each proposed method below. These various methodologies all focus on how they can leverage distinct RNN architectures such as the popular Long Short-Term Memory (LSTM) RNN or a Deep-Residual RNN. This paper also examines which frameworks work best in certain situations, and the advantages and disadvantages of each proposed model. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

27 pages, 572 KiB  
Article
A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications
by Priscila Morais Argôlo Bonfim Estrela, Robson de Oliveira Albuquerque, Dino Macedo Amaral, William Ferreira Giozza and Rafael Timóteo de Sousa Júnior
Sensors 2021, 21(12), 4212; https://doi.org/10.3390/s21124212 - 19 Jun 2021
Cited by 17 | Viewed by 3741
Abstract
As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authentication countermeasures based on biometrics, whether physiological or behavioral, have been developed, [...] Read more.
As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authentication countermeasures based on biometrics, whether physiological or behavioral, have been developed, including those based on touch dynamics biometrics. These measures take into account the unique behavior of a person when interacting with touchscreen devices, thus hindering identitification fraud because it is hard to impersonate natural user behaviors. Behavioral biometric measures also balance security and usability because they are important for human interfaces, thus requiring a measurement process that may be transparent to the user. This paper proposes an improvement to Biotouch, a supervised Machine Learning-based framework for continuous user authentication. The contributions of the proposal comprise the utilization of multiple scopes to create more resilient reasoning models and their respective datasets for the improved Biotouch framework. Another contribution highlighted is the testing of these models to evaluate the imposter False Acceptance Error (FAR). This proposal also improves the flow of data and computation within the improved framework. An evaluation of the multiple scope model proposed provides results between 90.68% and 97.05% for the harmonic mean between recall and precision (F1 Score). The percentages of unduly authenticated imposters and errors of legitimate user rejection (Equal Error Rate (EER)) are between 9.85% and 1.88% for static verification, login, user dynamics, and post-login. These results indicate the feasibility of the continuous multiple-scope authentication framework proposed as an effective layer of security for banking applications, eventually operating jointly with conventional measures such as password-based authentication. Full article
Show Figures

Figure 1

Back to TopTop