Skip to main content
Top
Published in: World Wide Web 4/2019

23-11-2018

Proximal spatial vector and affinity coefficient for multimodal biometric secured social network communication

Authors: Jayanthi Sivasubramaniam, C. Chandrasekar

Published in: World Wide Web | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Using multimodalities, the field of biometric is receiving widespread acceptance for efficient communication between users in social network. Hence, suitable designing of authentication and access control is highly required to perform analysis of system in social network domain. In this work, a Proximal Spatial Vector and Affinity Coefficient (PSV-AC) framework is designed with the objective of ensuring authentic communication between users in social network using face and fingerprint. Initially, multimodal user biometric features with proximal feature pixel stored in spatial vector are gene encoded to obtain biometric identity keys. User authenticity is authorized by decoding gene encoded biometric features using biometric identity keys. User Affinity Coefficient is calculated via antecedent instances shared between different social users. The social network user’s affinity coefficient is ordered in a matrix. Matrix ranking is then performed to identify whether authentic user social communication happened in network. Experiments have been carried out using BioSecure datasets to measure the performance in terms of number of social users, social network authentication time, access control time, multimodal biometric feature template size, and true positive rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al Bouna B., Chbeir R., Marrara S.: Enforcing role based access control model with multimedia signatures. Elsevier, J. Syst. Archit., 55(4): 264–274 (2009) Al Bouna B., Chbeir R., Marrara S.: Enforcing role based access control model with multimedia signatures. Elsevier, J. Syst. Archit., 55(4): 264–274 (2009)
2.
go back to reference Althobaiti O., Al-Rodhaan M, Al-Dhelaan A.: An efficient biometric authentication protocol for wireless sensor networks”, Hindawi, International Journal of Distributed Sensor Networks, 2013, 1–13 (2013) Althobaiti O., Al-Rodhaan M, Al-Dhelaan A.: An efficient biometric authentication protocol for wireless sensor networks”, Hindawi, International Journal of Distributed Sensor Networks, 2013, 1–13 (2013)
3.
go back to reference Chen, S., Fan, J.: Measuring corporate social responsibility based on a fuzzy analytical hierarchy process. I. J. Computer Network and Information Security. 3, 13–22 (2011)CrossRef Chen, S., Fan, J.: Measuring corporate social responsibility based on a fuzzy analytical hierarchy process. I. J. Computer Network and Information Security. 3, 13–22 (2011)CrossRef
4.
go back to reference Hongxin, H., Ahn, G.-J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614–1627 (2013)CrossRef Hongxin, H., Ahn, G.-J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614–1627 (2013)CrossRef
5.
go back to reference Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation. Computer and Communications Security. 411–415 (2011) Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation. Computer and Communications Security. 411–415 (2011)
6.
go back to reference Kanhangad, V., Kumar, A., Zhang, D.: Contactless and pose invariant biometric identification using hand surface. IEEE Trans. Image Process. 20(5), 1415–1424 (2011)MathSciNetCrossRefMATH Kanhangad, V., Kumar, A., Zhang, D.: Contactless and pose invariant biometric identification using hand surface. IEEE Trans. Image Process. 20(5), 1415–1424 (2011)MathSciNetCrossRefMATH
7.
go back to reference Lai, L., Ho, S.-W., Poor, H.V.: Privacy–security trade-offs in biometric security systems—part I: single use case. IEEE Transactions on Information Forensics and Security. 6(1), 122–139 (2011)CrossRef Lai, L., Ho, S.-W., Poor, H.V.: Privacy–security trade-offs in biometric security systems—part I: single use case. IEEE Transactions on Information Forensics and Security. 6(1), 122–139 (2011)CrossRef
8.
go back to reference Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web. Springer 14(4), 407–430 (2011) Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web. Springer 14(4), 407–430 (2011)
9.
go back to reference Limsaiprom, P., Praneetpolgrang, P., Subsermsri, P.: Visualization of influencing nodes in online social networks. I. J. Computer Network and Information Security. 6, 9–20 (2014)CrossRef Limsaiprom, P., Praneetpolgrang, P., Subsermsri, P.: Visualization of influencing nodes in online social networks. I. J. Computer Network and Information Security. 6, 9–20 (2014)CrossRef
10.
go back to reference Meligy, A.M., M. Ibrahim, H., F. Torky, M.: Identity verification mechanism for detecting fake profiles in online social networks. I. J. Computer Network and Information Security. 9, 31–39 (2017)CrossRef Meligy, A.M., M. Ibrahim, H., F. Torky, M.: Identity verification mechanism for detecting fake profiles in online social networks. I. J. Computer Network and Information Security. 9, 31–39 (2017)CrossRef
11.
go back to reference Park, H.-A., Hong, J.W., Park, J.H., Zhan, J., Lee, D.H.: Combined authentication-based multilevel access control in Mobile application for daily life service. IEEE Trans. Mob. Comput. 9(6), 824–837 (2010)CrossRef Park, H.-A., Hong, J.W., Park, J.H., Zhan, J., Lee, D.H.: Combined authentication-based multilevel access control in Mobile application for daily life service. IEEE Trans. Mob. Comput. 9(6), 824–837 (2010)CrossRef
12.
go back to reference Shehab, M., Squicciarini, A., Ahn, G.-J., Kokkinou, I.: Access control for online social networks third party applications. Elsevier, Computers & Security. 31(8), 897–911 (2012)CrossRef Shehab, M., Squicciarini, A., Ahn, G.-J., Kokkinou, I.: Access control for online social networks third party applications. Elsevier, Computers & Security. 31(8), 897–911 (2012)CrossRef
13.
go back to reference Shu, Y., Gu, Y., Chen, J.: Dynamic authentication with sensory information for the access control systems. IEEE Transactions on Parallel and Distributed systems. 25(2), 427–436 (2013) Shu, Y., Gu, Y., Chen, J.: Dynamic authentication with sensory information for the access control systems. IEEE Transactions on Parallel and Distributed systems. 25(2), 427–436 (2013)
14.
go back to reference Sitova, Z., Sedenka, J., Yang, Q., Ge, P., Zhou, G., Gastiy, P., Balagani, K.: HMOG: new behavioral biometric features for continuous authentication of smart phone users. IEEE Transactions on Information Forensics and Security. 1–16 (2015) Sitova, Z., Sedenka, J., Yang, Q., Ge, P., Zhou, G., Gastiy, P., Balagani, K.: HMOG: new behavioral biometric features for continuous authentication of smart phone users. IEEE Transactions on Information Forensics and Security. 1–16 (2015)
15.
go back to reference Sobh, T.S.: Wi-fi networks security and accessing control. I. J. Computer Network and Information Security. 5, 9–20 (2013)CrossRef Sobh, T.S.: Wi-fi networks security and accessing control. I. J. Computer Network and Information Security. 5, 9–20 (2013)CrossRef
16.
go back to reference Stokkenes, M., Ramachandra, R., Busch, C.: Biometric authentication protocols on smartphones – An Overview. International Conference on Security of Information and Networks. 136–140 (2016) Stokkenes, M., Ramachandra, R., Busch, C.: Biometric authentication protocols on smartphones – An Overview. International Conference on Security of Information and Networks. 136–140 (2016)
17.
go back to reference Suna, X., Li, M., Wang, H.: A family of enhanced (L, α)-diversity models for privacy preserving data publishing. Futur. Gener. Comput. Syst., Elsevier, July 2010 Suna, X., Li, M., Wang, H.: A family of enhanced (L, α)-diversity models for privacy preserving data publishing. Futur. Gener. Comput. Syst., Elsevier, July 2010
18.
go back to reference Trewin, S., Swart, C., Koved, L., Martino, J., Singh, K., David, S.B.: Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption. Computer Security Applications. 159–168 (2012) Trewin, S., Swart, C., Koved, L., Martino, J., Singh, K., David, S.B.: Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption. Computer Security Applications. 159–168 (2012)
19.
go back to reference Wang, H., Sun, L.: Trust-involved access control in collaborative open social networks”, 2010 Fourth International Conference on Network and System Security Wang, H., Sun, L.: Trust-involved access control in collaborative open social networks”, 2010 Fourth International Conference on Network and System Security
20.
go back to reference Zhang, J., Tao, X., Wang, H.: Outlier detection from large distributed databases. World Wide Web, Springer, May 2013 Zhang, J., Tao, X., Wang, H.: Outlier detection from large distributed databases. World Wide Web, Springer, May 2013
Metadata
Title
Proximal spatial vector and affinity coefficient for multimodal biometric secured social network communication
Authors
Jayanthi Sivasubramaniam
C. Chandrasekar
Publication date
23-11-2018
Publisher
Springer US
Published in
World Wide Web / Issue 4/2019
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-018-0644-4

Other articles of this Issue 4/2019

World Wide Web 4/2019 Go to the issue

Premium Partner