A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques
This research aims to develop a new method to secure finger-vein (FV) biometric information during user authentication process against different types of network security attacks. Hence, a novel method was proposed to solve the existing problem in biometric authentication systems, which is the leaka...
Saved in:
Main Author: | |
---|---|
Format: | thesis |
Language: | eng |
Published: |
2019
|
Subjects: | |
Online Access: | https://ir.upsi.edu.my/detailsg.php?det=6799 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
oai:ir.upsi.edu.my:6799 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Pendidikan Sultan Idris |
collection |
UPSI Digital Repository |
language |
eng |
topic |
|
spellingShingle |
Alkinani,Al Hadi Mohsin A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques |
description |
This research aims to develop a new method to secure finger-vein (FV) biometric information during user authentication process against different types of network security attacks. Hence, a novel method was proposed to solve the existing problem in biometric authentication systems, which is the leakage of biometric information. Our proposed method meets information security definition standard requirements (CIA). The research design was carried out in two stages. In the first stage, the researcher developed a new merge algorithm in order to produce a new hybrid biometric pattern by merging Radio Frequency Identification (RFID) features with FV biometric features to increase the randomization, and enhance the security and structure of the new pattern. While, in the second stage, a new secure user verification method is developed based on blockchain technique, AES algorithm and a new steganography method that is based on Particle Swarm Optimization (PSO) algorithm. A dataset was used comprising of 6000 samples of FV images. The experimental results showed the effectiveness of the proposed authentication method. Where, this method achieved a high level of performance accuracy of 97.9% during the implementation of this method using FV biometric for 106 users. Furthermore, the proposed method has an advantage 55.56% higher than the benchmark method as a result of the comparison between the proposed method and benchmark method, depending on some security issues where, the proposed method covered 100% of these issues. Whereas, the benchmark method covered only 44.44% as indicated in Chapter 5. Moreover, the results showed that the structure of hybrid pattern is robust and immune towards detection by the attacker, and is flexible to being cancelable and reconstructed again in case of loss of this pattern. More so, the proposed method showed high resistance against spoofing and brute-force attacks. Clearly, such empirical results suggest that the FV information are confidential, integrated and available only for specific authorized persons only in the entire steps of the authentication process.The implication of this study is that, the proposed method can be applied in decentralised network architectures by eliminating the central point, and addressing the network failure problem and security at the same time. |
format |
thesis |
qualification_name |
|
qualification_level |
Doctorate |
author |
Alkinani,Al Hadi Mohsin |
author_facet |
Alkinani,Al Hadi Mohsin |
author_sort |
Alkinani,Al Hadi Mohsin |
title |
A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques |
title_short |
A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques |
title_full |
A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques |
title_fullStr |
A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques |
title_full_unstemmed |
A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques |
title_sort |
novel method for secure finger vein biometric during user authentication process based on blockchain-pso-aes techniques |
granting_institution |
Universiti Pendidikan Sultan Idris |
granting_department |
Fakulti Seni, Komputeran dan Industri Kreatif |
publishDate |
2019 |
url |
https://ir.upsi.edu.my/detailsg.php?det=6799 |
_version_ |
1747833312031801344 |
spelling |
oai:ir.upsi.edu.my:67992022-02-22 A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques 2019 Alkinani,Al Hadi Mohsin This research aims to develop a new method to secure finger-vein (FV) biometric information during user authentication process against different types of network security attacks. Hence, a novel method was proposed to solve the existing problem in biometric authentication systems, which is the leakage of biometric information. Our proposed method meets information security definition standard requirements (CIA). The research design was carried out in two stages. In the first stage, the researcher developed a new merge algorithm in order to produce a new hybrid biometric pattern by merging Radio Frequency Identification (RFID) features with FV biometric features to increase the randomization, and enhance the security and structure of the new pattern. While, in the second stage, a new secure user verification method is developed based on blockchain technique, AES algorithm and a new steganography method that is based on Particle Swarm Optimization (PSO) algorithm. A dataset was used comprising of 6000 samples of FV images. The experimental results showed the effectiveness of the proposed authentication method. Where, this method achieved a high level of performance accuracy of 97.9% during the implementation of this method using FV biometric for 106 users. Furthermore, the proposed method has an advantage 55.56% higher than the benchmark method as a result of the comparison between the proposed method and benchmark method, depending on some security issues where, the proposed method covered 100% of these issues. Whereas, the benchmark method covered only 44.44% as indicated in Chapter 5. Moreover, the results showed that the structure of hybrid pattern is robust and immune towards detection by the attacker, and is flexible to being cancelable and reconstructed again in case of loss of this pattern. More so, the proposed method showed high resistance against spoofing and brute-force attacks. Clearly, such empirical results suggest that the FV information are confidential, integrated and available only for specific authorized persons only in the entire steps of the authentication process.The implication of this study is that, the proposed method can be applied in decentralised network architectures by eliminating the central point, and addressing the network failure problem and security at the same time. 2019 thesis https://ir.upsi.edu.my/detailsg.php?det=6799 https://ir.upsi.edu.my/detailsg.php?det=6799 text eng closedAccess Doctoral Universiti Pendidikan Sultan Idris Fakulti Seni, Komputeran dan Industri Kreatif Bhattacharya, T., Bhowmik, S., & Chaudhuri, S. R. B. (2008). A steganographic approach by using Session based Stego-Key, genetic algorithm and variable bit replacement technique. Proceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008, 5155. https://doi.org/10.1109/ICCEE.2008.108Chavez-Galaviz, J., Ruiz-Rojas, J., & Garcia-Gonzalez, A. (2015). Embedded biometric cryptosystem based on finger vein patterns. 2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2015, 16. https://doi.org/10.1109/ICEEE.2015.7357994Cheng, Y., Chen, H., & Cheng, B. (2016). Special point representations for reducing data space requirements of finger-vein recognition applications. Multimedia Tools and Applications, 76(278). https://doi.org/10.1007/s11042-016-3300-yCresitello-Dittmar, B. (2016). Application of the Blockchain For Authentication and Verification of Identity. Retrieved from http://www.cs.tufts.edu/comp/116/archive/fall2016/bcresitellodittmar.pdfDamavandinejadmonfared, S., Mobarakeh, A. K., Suandi, S. A., & Rosdi, B. A. (2012). Evaluate and determine the most appropriate method to identify finger vein. Procedia Engineering, 41(Iris), 516521. https://doi.org/10.1016/j.proeng.2012.07.206Dong, L., Yang, G., Yin, Y., Liu, F., & Xi, X. (2012). Finger Vein Verification Based on a Personalized Best Patches Map.Dong, L., Yang, G., Yin, Y., Xi, X., Yang, L., & Liu, F. (2015). Finger Vein Verification with Vein Textons. International Journal of Pattern Recognition and Artificial Intelligence, 29(04), 1556003. https://doi.org/10.1142/S0218001415560030Eberhart, R. C., & Yuhui Shi. (2001). Particle swarm optimization: developments, applications and resources. Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546), 1, 8186. https://doi.org/10.1109/CEC.2001.934374Elshoura, S. M., & Megherbi, D. B. (2013). A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments. Signal Processing: Image Communication, 28(5), 531552. https://doi.org/10.1016/j.image.2012.12.005Eui Chul Lee, 1 Hyeon Chang Lee, 2 Kang Ryoung Park2. (2009). Finger Vein Recognition Using Minutia-Based Alignment and Local Binary Pattern-Based Feature Extraction. International Journal of Imaging Systems and Technology, 19(3), 179186. https://doi.org/10.1002/ima.20193Fard, a. M., & Varasteh-A., F. (2006). A New Genetic Algorithm Approach for Secure JPEG Steganography. 2006 IEEE International Conference on Engineering of Intelligent Systems, 16. https://doi.org/10.1109/ICEIS.2006.1703168Fariba. (2013). Analysis of Methods for Finger Vein Recognition. (November), 128. Retrieved from http://etd.lib.metu.edu.tr/upload/12616645/index.pdfFateme Saadat, M. N. (2015). A Multibiometric Finger Vein Verification System Based On Score Level Fusion Strategy. Second International Congress on Technology, Communication and Knowledge (ICTCK 2015) November, 11-12, 2015 - Mashhad Branch, Islamic Azad University, Mashhad, Iran, (Ictck), 1112.Fayyaz, M., Hajizadeh-Saffar, M., Sabokrou, M., Hoseini, M., & Fathy, M. (2016). A novel approach for Finger Vein verification based on self-taught learning. Iranian Conference on Machine Vision and Image Processing, MVIP, 2016-Febru, 8891. https://doi.org/10.1109/IranianMVIP.2015.7397511Fernndez-carams, T. M., & Member, S. (2018). A Review on the Use of Blockchain for the Internet of Things. 3536(c), 123. https://doi.org/10.1109/ACCESS.2018.2842685Ghasemi, E., & Shanbehzadeh, J. (2010). An imperceptible steganographic method based on Genetic Algorithm. 2010 5th International Symposium on Telecommunications, 836839. https://doi.org/10.1109/ISTEL.2010.5734138Gonzlez, J. A., & Pino, R. (1999). Random number generator based on unpredictable chaotic functions. Computer Physics Communications, 120(2), 109114. https://doi.org/10.1016/S0010-4655(99)00233-7Goudelis, G., Tefas, A., & Pitas, I. (2009). Emerging biometric modalities: A survey. Journal on Multimodal User Interfaces, 2(3), 217235. https://doi.org/10.1007/s12193-009-0020-xGupta, P., & Gupta, P. (2015). An accurate finger vein based verification system. Digital Signal Processing: A Review Journal, 38, 4352. https://doi.org/10.1016/j.dsp.2014.12.003Hartung, D., Martin, S., & Busch, C. (2011). Quality estimation for vascular pattern recognition. 2011 International Conference on Hand-Based Biometrics, ICHB 2011 - Proceedings, 258263. https://doi.org/10.1109/ICHB.2011.6094332He, M., Horng, S.-J., Fan, P., Run, R.-S., Chen, R.-J., Lai, J.-L., Sentosa, K. O. (2010). Performance evaluation of score level fusion in multimodal biometric systems.Pattern Recognition, 43(5), 17891800. https://doi.org/10.1016/j.patcog.2009.11.018Horng, S. J., Chen, Y. H., Run, R. S., Chen, R. J., Lai, J. L., & Sentosal, K. O. (2009). An improved score level fusion in multimodal biometric systems. Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, (c), 239246. https://doi.org/10.1109/PDCAT.2009.82Huang, H., Liu, S., Zheng, H., Ni, L., Zhang, Y., & Li, W. (2017). DeepVein: Novel finger vein verification methods based on Deep Convolutional Neural Networks. 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017, (5). https://doi.org/10.1109/ISBA.2017.7947683Hussain, M., Abdul Wahab, A. W., Batool, I., & Arif, M. (2015). Secure password transmission for web applications over internet using cryptography and image steganography. International Journal of Security and Its Applications, 9(2), 179188. https://doi.org/10.14257/ijsia.2015.9.2.17Ibrahim, M. M. S., Al-namiy, F. S., Beno, M., & Rajaji, L. (2011). Biometric Authentication for secured Transaction using Finger Vein Technology. (Seiscon), 760763.Jadhav, M., & Nerkar, P. M. (2016). Implementation of an embedded hardware of FVRS on FPGA. Proceedings - IEEE International Conference on Information Processing, ICIP 2015, 4853. https://doi.org/10.1109/INFOP.2015.7489349Jagadiswary, D., & Saraswady, D. (2016). Biometric Authentication using Fused Multimodal Biometric. Procedia - Procedia Computer Science, 85(Cms), 109116. https://doi.org/10.1016/j.procs.2016.05.187Jain, M., & Kumar, A. (2017). RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. International Journal of Machine Learning and Cybernetics, 8(5), 16951705. https://doi.org/10.1007/s13042-016-0542-yJaiswal, S., Bhadauria, D. S. S., & Jadon, D. R. S. (2011). Biometric: Case Study. Journal of Global Research in Computer Science, 2(10), 1948.Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, X. N. (2014). Finger multibiometric cryptosystems: fusion strategy and template security. Journal of Biomedical Optics, 19(2), 020901. https://doi.org/10.1117/1Kanan, H. R., & Nazeri, B. (2014). A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications, 41(14), 61236130. https://doi.org/10.1016/j.eswa.2014.04.022Karimov, A. I., Butusov, D. N., Rybin, V. G., & Karimov, T. I. (2017). The study of the modified Chirikov map. Proceedings of 2017 20th IEEE International Conference on Soft Computing and Measurements, SCM 2017, (May), 341344. https://doi.org/10.1109/SCM.2017.7970579Khalil-Hani, M., & Eng, P. C. (2011). Personal verification using finger vein biometrics in FPGA-based System-on-Chip. 2011 7th International Conference on Electrical and Electronics Engineering (ELECO), II-171-II176.Khalil-Hani, M., & Lee, Y. H. (2013). FPGA embedded hardware system for finger vein biometric recognition. IECON Proceedings (Industrial Electronics Conference), 22732278. https://doi.org/10.1109/IECON.2013.6699485Kshetri, N. (2017). Blockchains roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, (June), 112. https://doi.org/10.1016/j.telpol.2017.09.003Kundi, D. S., Aziz, A., & Ikram, N. (2016). A high performance ST-Box based unified AES encryption/decryption architecture on FPGA. Microprocessors and Microsystems, 41, 3746. https://doi.org/10.1016/j.micpro.2015.11.015Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2017). A survey on the security of blockchain systems. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.08.020Li, Z., Sun, D., Di, L., & Hao, L. (2010). Two modality-based bi-finger vein verification system. International Conference on Signal Processing Proceedings, ICSP, 1690 1693. https://doi.org/10.1109/ICOSP.2010.5656847Liu, F., Yang, G., Yin, Y., & Wang, S. (2014). Singular value decomposition based minutiae matching method for finger vein recognition. Neurocomputing, 145, 7589. https://doi.org/10.1016/j.neucom.2014.05.069Liu, T., Xie, J., Yan, W., Li, P., & Lu, H. (2015). Finger-vein pattern restoration with Direction-Variance-Boundary Constraint Search. Engineering Applications of Artificial Intelligence, 46, 131139. https://doi.org/10.1016/j.engappai.2015.09.004Liu, Z., Yin, Y., Wang, H., Song, S., & Li, Q. (2010). Finger vein recognition with manifold learning. Journal of Network and Computer Applications, 33(3), 275282. https://doi.org/10.1016/j.jnca.2009.12.006Lu, Y., Wu, S., Fang, Z., Xiong, N., Yoon, S., & Park, D. S. (2017). Exploring finger vein based personal authentication for secure IoT. Future Generation Computer Systems, 77, 149160. https://doi.org/10.1016/j.future.2017.07.013Lu, Y., Xie, S. J., Yoon, S., Wang, Z., & Park, D. S. (2013). An available database for the research of finger vein recognition. Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 1(February 2015), 410415. https://doi.org/10.1109/CISP.2013.6744030Lu, Y., Xie, S. J., Yoon, S., Yang, J., & Park, D. S. (2013). Robust finger vein ROI localization based on flexible segmentation. Sensors (Switzerland), 13(11), 14339 14366. https://doi.org/10.3390/s131114339M. Khalil-Hani, Eng, P. C. (2010). FPGA-Based Embedded System Implementation of Finger Vein Biometrics. 2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2010), October 3-5, 2010, Penang, Malaysia FPGA-Based, (Isiea), 700705.Marius Iulian Mihailescu. (2011). Vulnerabilities in Biometric Systems. 32. Retrieved from https://www.box.com/s/hesc4krm15yg36wvq375Mathur, N., & Bansode, R. (2016). AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection. Procedia Computer Science, 79, 10361043. https://doi.org/10.1016/j.procs.2016.03.131Miura, N., Nagasaka, A., & Miyatake, T. (2004). Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Machine Vision and Applications, 15(4), 194203.Mohd Asaari, M. S., Suandi, S. A., & Rosdi, B. A. (2014). Fusion of Band Limited Phase only Correlation and Width Centroid Contour Distance for finger based biometrics. Expert Systems with Applications, 41(7), 33673382. https://doi.org/10.1016/j.eswa.2013.11.033Murakami, T., Ohki, T., & Takahashi, K. (2016). Optimal sequential fusion for multibiometric cryptosystems. Information Fusion, 32, 93108. https://doi.org/10.1016/j.inffus.2016.02.002N.Sugandhi, M.Mathankumar, V. P. (2014). Real Time Authentication System using Advanced Finger Vein Recognition Technique. International Conference on Communication and Signal Processing, April 3-5, 2014, India, 11831187.Nandhinipreetha, A., & Radha, N. (2016). Multimodal biometric template authentication of finger vein and signature using visual cryptography. 2016 International Conference on Computer Communication and Informatics, ICCCI 2016, 710. https://doi.org/10.1109/ICCCI.2016.7479963Naoto Miura, Nagasaka, A., & Miyatake, T. (2005). Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profile. Conference on Machine VIsion Applications, May 16-18, 2005 Tsukuba Science City, Japan, 34(4), 444448.Nassar, S. S., Ayad, N. M., Kelash, H. M., El-sayed, H. S., El-Bendary, M. A. M., Abd El- Samie, F. E., & Faragallah, O. S. (2016). Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering. Wireless Personal Communications, 91(3), 10231049. https://doi.org/10.1007/s11277-016-3387-5Noori Hoshyar, A., & Sulaiman, R. (2011). Vein matching using artificial neural network in vein authentication systems. Conference on Graphic and Image Processing (ICGIP 2011), 8285(Icgip), 82850Z. https://doi.org/10.1117/12.913380Ong, T. S., Teng, J. H., Muthu, K. S., & Teoh, A. B. J. (2013). Multi-instance finger vein recognition using minutiae matching. Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3(Cisp), 17301735. https://doi.org/10.1109/CISP.2013.6743955Parthiban, K., Wahi, A., Sundaramurthy, S., & Palanisamy, C. (2014). Finger vein extraction and authentication based on gradient feature selection algorithm. 5th International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2014, 143147. https://doi.org/10.1109/ICADIWT.2014.6814681Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78(December 2015), 617624. https://doi.org/10.1016/j.procs.2016.02.108Peng, J., El-Latif, A. A. A., Li, Q., & Niu, X. (2014). Multimodal biometric authentication based on score level fusion of finger biometrics. Optik, 125(23), 68916897. https://doi.org/10.1016/j.ijleo.2014.07.027Peng, J., Wang, N., El-Latif, A. a. A., Li, Q., & Niu, X. (2012). Finger-vein Verification Using Gabor Filter and SIFT Feature Matching. 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 4548. https://doi.org/10.1109/IIH-MSP.2012.17Pflug, A., Hartung, D., & Busch, C. (2012). Feature extraction from vein images using spatial information and chain codes. Information Security Technical Report, 17(12), 2635. https://doi.org/10.1016/j.istr.2012.02.003Pujari, M. A. A., & Shinde, M. S. S. (2016). Data Security using Cryptography and Steganography. IOSR Journal of Computer Engineering, 18(04), 130139. https://doi.org/10.9790/0661-180405130139Qin, H., & A. El Yacoubi, M. (2017). Deep Representation for Finger-vein Image Quality Assessment. IEEE Transactions on Circuits and Systems for Video Technology, 8215(c), 1. https://doi.org/10.1109/TCSVT.2017.2684826Qin, H., & El-Yacoubi, M. A. (2015). Finger-Vein Quality Assessment by Representation Learning from Binary Images. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9489, pp. 421431). https://doi.org/10.1007/978-3-319-26532-2_46Qin, H., & El-Yacoubi, M. A. (2017). Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification. IEEE Transactions on Information Forensics and Security, 12(8), 18161829. https://doi.org/10.1109/TIFS.2017.2689724Qin, H., He, X., Yao, X., & Li, H. (2017). Finger-vein verification based on the curvature in Radon space. Expert Systems with Applications, 82, 151161. https://doi.org/10.1016/j.eswa.2017.03.068Qiu, X., Kang, W., Tian, S., Jia, W., & Huang, Z. (2018). Finger Vein Presentation Attack Detection Using Total Variation Decomposition. IEEE Transactions on Information Forensics and Security, 13(2), 465477. https://doi.org/10.1109/TIFS.2017.2756598Raghavendra, R., Raja, K. B., Surbiryala, J., & Busch, C. (2014a). A low-cost multimodal biometric sensor to capture finger vein and fingerprint. IJCB 2014 - 2014 IEEE/IAPR International Joint Conference on Biometrics. https://doi.org/10.1109/BTAS.2014.6996225Raghavendra, R., Raja, K. B., Surbiryala, J., & Busch, C. (2014b). Finger vascular pattern imaging - A comprehensive evaluation. 2014 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014. https://doi.org/10.1109/APSIPA.2014.7041520Raghavendra, R., Surbiryala, J., Raja, K. B., & Busch, C. (2014). Novel finger vascular pattern imaging device for robust biometric verification. IST 2014 - 2014 IEEE International Conference on Imaging Systems and Techniques, Proceedings, 148 152. https://doi.org/10.1109/IST.2014.6958463Razzak, M. I., & Yusof, R. (2010). Multimodal face and finger veins biometric authentication. Scientific Research and Essays, 5(17), 25292534. Retrieved from http://www.academicjournals.org/SRE/PDF/pdf2010/4Sep/Razzak%5Cnet%5Cnal.p dfRosdi, B. A., Shing, C. W., & Suandi, S. A. (2011). Finger Vein Recognition Using Local Line Binary Pattern. Sensors, 11(12), 1135711371. https://doi.org/10.3390/s111211357Shen, H., Shen, J., Khan, M. K., & Lee, J.-H. (2017). Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things. Wireless Personal Communications, 96(4), 52535266. https://doi.org/10.1007/s11277-016-3739-1Singh, G. (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications, 67(19), 975 8887. https://doi.org/10.5120/11507-7224Skillen, A., & Mannan, M. (2014). Mobiflage: Deniable storage encryption for mobile devices. IEEE Transactions on Dependable and Secure Computing, 11(3), 224237. https://doi.org/10.1109/TDSC.2013.56Song, W., Kim, T., Kim, H. C., Choi, J. H., Kong, H. J., & Lee, S. R. (2011). A finger-vein verification system using mean curvature. Pattern Recognition Letters, 32(11), 1541 1547. https://doi.org/10.1016/j.patrec.2011.04.021Suzuki, H., Suzuki, M., Urabe, T., & Obi, T. (2013). Secure biometric image sensor and authentication scheme based on compressed sensing. Applied Optics, 52(33), 8161 8168. https://doi.org/Doi 10.1364/Ao.52.008161Tang, D., Huang, B., Li, R., & Li, W. (2010). A person retrieval solution using finger vein patterns. Proceedings - International Conference on Pattern Recognition, 13061309. https://doi.org/10.1109/ICPR.2010.325Tang, D., Huang, B., Li, R., Li, W., & Li, X. (2012). Finger vein verification using Occurrence Probability Matrix (OPM). Proceedings of the International Joint Conference on Neural Networks, 2126. https://doi.org/10.1109/IJCNN.2012.6252518Tang, D., Huang, B., Li, W., & Li, X. (2012). A method of evolving finger vein template. Proceedings - 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012, 96101. https://doi.org/10.1109/ISBAST.2012.21Tian, F. (2016). An Agri-food Supply Chain Traceability System for China Based on RFID & Blockchain Technology. 2016 13th International Conference on Service Systems and Service Management (ICSSSM), 16. https://doi.org/10.1109/ICSSSM.2016.7538424Tseng, L. Y., Chan, Y. K., Ho, Y. A., & Chu, Y. P. (2008). Image hiding with an improved genetic algorithm and an optimal pixel adjustment process. Proceedings - 8th International Conference on Intelligent Systems Design and Applications, ISDA 2008, 3, 320325. https://doi.org/10.1109/ISDA.2008.235Vard, A. R., Moallem, P., & Nilchi, A. R. N. (2009). Texture-based parametric active contour for target detection and tracking. International Journal of Imaging Systems and Technology, 19(3), 179186. https://doi.org/10.1002/ima.20193Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97102. https://doi.org/10.1016/j.cose.2013.04.004Walu?, M., Bernacki, K., & Konopacki, J. (2017). Impact of NIR wavelength lighting in image acquisition on finger vein biometric system effectiveness. Opto-Electronics Review, 25(4), 263268. https://doi.org/10.1016/j.opelre.2017.07.003Wang, J., Xiao, J., Lin, W., & Luo, C. (2015). Discriminative and generative vocabulary tree: With application to vein image authentication and recognition. Image and Vision Computing, 34, 5162. https://doi.org/10.1016/j.imavis.2014.10.014Wang, S., Yang, B., & Niu, X. (2010). A Secure Steganography Method based on Genetic Algorithm. 1(1), 2835.Wang, Y., Wang, L., & Xue, C. ao. (2018). Medical information security in the era of artificial intelligence. Medical Hypotheses, 115(February), 5860. https://doi.org/10.1016/j.mehy.2018.03.023William, A., Ong, T. S., Lau, S. H., & Goh, M. K. O. (2016). Finger Vein verification using local histogram of hybrid texture descriptors. IEEE 2015 International Conference on Signal and Image Processing Applications, ICSIPA 2015 - Proceedings, 304308. https://doi.org/10.1109/ICSIPA.2015.7412209Williamson, Avery, Tsay, L.-S., Kateeb, I. A., & Burton, L. (2013). Solutions for RFID Smart Tagged Card Security Vulnerabilities. AASRI Procedia, 4, 282287. https://doi.org/10.1016/j.aasri.2013.10.042Wu, J. Da, & Liu, C. T. (2011a). Finger-vein pattern identification using principal component analysis and the neural network technique. Expert Systems with Applications, 38(5), 54235427. https://doi.org/10.1016/j.eswa.2010.10.013Wu, J. Da, & Liu, C. T. (2011b). Finger-vein pattern identification using SVM and neural network technique. Expert Systems with Applications, 38(5), 54235427. https://doi.org/10.1016/j.eswa.2010.10.013Wu, J. Da, & Ye, S. H. (2009). Driver identification using finger-vein patterns with Radon transform and neural network. Expert Systems with Applications, 36(3 PART 2), 57935799. https://doi.org/10.1016/j.eswa.2008.07.042Wu, J.-D., Liu, C.-T., Tsai, Y.-J., Liu, J.-C., & Chang, Y.-W. (2010). Development of neural network techniques for finger-vein pattern classification. SECOND INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING 26-28 February 2010 Singapore, Singapore, 7546, 75460F. https://doi.org/10.1117/12.852799Wu, Z., Tian, L., Li, P., Wu, T., Jiang, M., & Wu, C. (2016). Generating stable biometric keys for flexible cloud computing authentication using finger vein. Information Sciences, 0, 117. https://doi.org/10.1016/j.ins.2016.12.048Xi, X., Yang, L., & Yin, Y. (2017). Learning discriminative binary codes for finger vein recognition. Pattern Recognition, 66(July 2016), 2633. https://doi.org/10.1016/j.patcog.2016.11.002Xin, Y., Liu, Z., Zhang, H., & Zhang, H. (2012). Finger vein verification system based on sparse representation. Applied Optics, 51(25), 62526258. https://doi.org/10.1364/AO.51.006252Yang, J., Shi, Y., & Yang, J. (2011). Personal identification based on finger-vein features. Computers in Human Behavior, 27(5), 15651570. https://doi.org/10.1016/j.chb.2010.10.029Yang, L., Yang, G., Yin, Y., & Xi, X. (2014). Exploring soft biometric trait with finger vein recognition. Neurocomputing, 135, 218228. https://doi.org/10.1016/j.neucom.2013.12.029Yang, W., Huang, X., Zhou, F., & Liao, Q. (2014). Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion q. Information Sciences, 268, 2032. https://doi.org/10.1016/j.ins.2013.10.010Yang, X., Li, Z., Wang, A., & Wen, S. (2011). Design research of the des against power analysis attacks based on FPGA. Microprocessors and Microsystems, 35(1), 1822. https://doi.org/10.1016/j.micpro.2010.11.002Ye, Y., Zheng, H., Ni, L., Liu, S., & Li, W. (2016). A study on the individuality of finger vein based on statistical analysis. 2016 International Conference on Biometrics, ICB 2016, 15. https://doi.org/10.1109/ICB.2016.7550089Yun-peng, Z. (2009). Digital Image Encryption Algorithm Based on Chaos and Improved DES. (October), 480485.Zhang, F., Guo, S., & Qian, X. (2010). Segmentation for finger vein image based on PDEs denoising. Proceedings - 2010 3rd International Conference on Biomedical Engineering and Informatics, BMEI 2010, 2(Bmei), 531535. https://doi.org/10.1109/BMEI.2010.5639983Zheng, H., Ni, L., Xian, R., Liu, S., & Li, W. (2015). BMDT: An optimized method for Biometric Menagerie Detection. 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015. https://doi.org/10.1109/BTAS.2015.7358751 |