期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
1
作者 Iman Almomani Walid El-Shafai +3 位作者 Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa 《Computers, Materials & Continua》 SCIE EI 2023年第2期3515-3537,共23页
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s... Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively. 展开更多
关键词 Biometric security deep learning AE network 2D CLM cybersecurity and authentication applications feature extraction unsupervised learning
下载PDF
Microsatellite Development and Potential Application in Authentication, Conservation, and Genetic Improvement of Chinese Medicinal Plants
2
作者 Jian-jun Chen Ying Wang 《Chinese Herbal Medicines》 CAS 2015年第2期123-134,共12页
Medicinal plants are popular and widely used as a major source of herbal drugs and pharmaceutical compounds. Ever-growing demands make medicinal plants faced to several problems including efficacy and safety to meet b... Medicinal plants are popular and widely used as a major source of herbal drugs and pharmaceutical compounds. Ever-growing demands make medicinal plants faced to several problems including efficacy and safety to meet business requirements, conservation, and artificially assisted breeding. As a powerful molecular tool, microsatellites offer the great potentials for various purposes in plants. This review provides a scenario of microsatellites in medicinal plants including development from genomic or expressed sequence tag libraries, cross-species transferability, genotyping, and potential applications. We emphasized on the authentication of medicinal plants by microsatellite markers. 展开更多
关键词 authentication cross-species transferability medicinal plants microsatellites potential applications
原文传递
A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication 被引量:3
3
作者 Bo Zhao Yu Xiao +1 位作者 Yuqing Huang Xiaoyu Cui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期218-225,共8页
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka... In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security. 展开更多
关键词 embedded system TrustZone Trusted application(TA) identity authentication private data protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部