The power infrastructure of the power system is massive in size and dispersed throughout the system.Therefore,how to protect the information security in the operation and maintenance of power equipment is a difficult ...The power infrastructure of the power system is massive in size and dispersed throughout the system.Therefore,how to protect the information security in the operation and maintenance of power equipment is a difficult problem.This paper proposes an improved time-stamped blockchain technology biometric fuzzy feature for electrical equipment maintenance.Compared with previous blockchain transactions,the time-stamped fuzzy biometric signature proposed in this paper overcomes the difficulty that the key is easy to be stolen by hackers and can protect the security of information during operation and maintenance.Finally,the effectiveness of the proposed method is verified by experiments.展开更多
Along with the rapid development of informatization, people habitually rely on electronic devices. For the convenience and efficiency provided by various devices, people could dispose almost everything by their phones...Along with the rapid development of informatization, people habitually rely on electronic devices. For the convenience and efficiency provided by various devices, people could dispose almost everything by their phones and PC. In this respect, the security of the electronic devices that people use in daily life becomes much more important. In this area, exerts has tried many ways to keep data and uses safe from attacks. This paper has designed a Voice Based Biometric Security System, which is able to reinforce the security level of the target device. With its help, the electronic devices will be more security.展开更多
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password.Unfortunately,this approach has many security problems b...Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password.Unfortunately,this approach has many security problems because personal data can be stolen or recognized by hackers.This paper aims to present a cloud-based biometric authentication model(CBioAM)for improving and securing cloud services.The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system(CBioAS),where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’information.The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy,sensitivity,and specificity.The research study introduces a novel algorithm called“Bio_Authen_as_a_Service”for implementing and evaluating the proposed model.The proposed system performs the biometric authentication process securely and preserves the privacy of user information.The experimental result was highly promising for securing cloud services using the proposed model.The experiments showed encouraging results with a performance average of 93.94%,an accuracy average of 96.15%,a sensitivity average of 87.69%,and a specificity average of 97.99%.展开更多
In this paper, we propose a novel method for finger-vein recognition. We extract the features of the vein patterns for recognition. Then, the minutiae features included bifurcation points and ending points are extract...In this paper, we propose a novel method for finger-vein recognition. We extract the features of the vein patterns for recognition. Then, the minutiae features included bifurcation points and ending points are extracted from these vein patterns. These feature points are used as a geometric representation of the vein patterns shape. Finally, the modified Hausdorff distance algorithm is provided to evaluate the identifica-tion ability among all possible relative positions of the vein patterns shape. This algorithm has been widely used for comparing point sets or edge maps since it does not require point cor-respondence. Experimental results show these minutiae feature points can be used to perform personal verification tasks as a geometric rep-resentation of the vein patterns shape. Fur-thermore, in this developed method. we can achieve robust image matching under different lighting conditions.展开更多
基金This research was funded by science and technology project of State Grid JiangSu Electric Power Co.,Ltd.(Research on Key Technologies of power network security digital identity authentication and management and control based on blockchain,Grant No.is J2021021).
文摘The power infrastructure of the power system is massive in size and dispersed throughout the system.Therefore,how to protect the information security in the operation and maintenance of power equipment is a difficult problem.This paper proposes an improved time-stamped blockchain technology biometric fuzzy feature for electrical equipment maintenance.Compared with previous blockchain transactions,the time-stamped fuzzy biometric signature proposed in this paper overcomes the difficulty that the key is easy to be stolen by hackers and can protect the security of information during operation and maintenance.Finally,the effectiveness of the proposed method is verified by experiments.
文摘Along with the rapid development of informatization, people habitually rely on electronic devices. For the convenience and efficiency provided by various devices, people could dispose almost everything by their phones and PC. In this respect, the security of the electronic devices that people use in daily life becomes much more important. In this area, exerts has tried many ways to keep data and uses safe from attacks. This paper has designed a Voice Based Biometric Security System, which is able to reinforce the security level of the target device. With its help, the electronic devices will be more security.
基金funding for this study from King Khalid University,Grant Number(GRP-35–40/2019).
文摘Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password.Unfortunately,this approach has many security problems because personal data can be stolen or recognized by hackers.This paper aims to present a cloud-based biometric authentication model(CBioAM)for improving and securing cloud services.The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system(CBioAS),where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’information.The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy,sensitivity,and specificity.The research study introduces a novel algorithm called“Bio_Authen_as_a_Service”for implementing and evaluating the proposed model.The proposed system performs the biometric authentication process securely and preserves the privacy of user information.The experimental result was highly promising for securing cloud services using the proposed model.The experiments showed encouraging results with a performance average of 93.94%,an accuracy average of 96.15%,a sensitivity average of 87.69%,and a specificity average of 97.99%.
文摘In this paper, we propose a novel method for finger-vein recognition. We extract the features of the vein patterns for recognition. Then, the minutiae features included bifurcation points and ending points are extracted from these vein patterns. These feature points are used as a geometric representation of the vein patterns shape. Finally, the modified Hausdorff distance algorithm is provided to evaluate the identifica-tion ability among all possible relative positions of the vein patterns shape. This algorithm has been widely used for comparing point sets or edge maps since it does not require point cor-respondence. Experimental results show these minutiae feature points can be used to perform personal verification tasks as a geometric rep-resentation of the vein patterns shape. Fur-thermore, in this developed method. we can achieve robust image matching under different lighting conditions.