The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteri...
详细信息
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteristics, offers unparalleled precision in individual identification. However, the integrity and confidentiality of biometric data remain paramount concerns, given its susceptibility to compromise. This research delineates the development and implementation of an innovative framework for cancellable biometrics, focusing on facial and fingerprint recognition. This study introduces a novel cancellable biometrics framework that integrates graph theory encryption with three-dimensional chaotic logistic mapping. The methodology encompasses a multifaceted approach: initially employing graph theory for the secure and efficient encryption of biometric data, subsequently enhanced by the complexity and unpredictability of three-dimensional chaotic logistic mapping. This dual-layered strategy ensures the robustness of the encryption, thereby significantly elevating the security of biometric data against unauthorized access and potential compromise. Thus, the resulting cancellable biometrics, characterized by the ability to transform biometric data into an adjustable representation, addresses critical challenges in biometric security. It allows for the revocation and reissuance of biometric credentials, thereby safeguarding the original biometric characteristics of individuals. This feature not only enhances user privacy and data security but also introduces a dynamic aspect to biometric authentication, facilitating adaptability across diverse systems and applications. Preliminary evaluations of the proposed framework demonstrate a marked improvement in the security of face and fingerprint recognition systems. Through the application of graph theory encryption, coupled with three-dimensional chaotic logistic mapping, our framework mitigates the risks associated with t
Marine weak magnetic survey is one of the important research directions at present. The typical signal of marine magnetic anomaly is low frequency, of which the magnetic field intensity is pT or even fT. In order to i...
详细信息
Simplicial convolutional filters can process signals defined over levels of a simplicial complex such as nodes, edges, triangles, and so on with applications in e.g., flow prediction in transportation or financial net...
详细信息
For healthcare IT is essential, as it determines the quality of people's lives, it creates patterns that help organize medical prevention activity conceptually, therefore it determines the quality of medical care,...
详细信息
This study employed a l0-fold cross-validation approach to train and validate neural networks to predict the RSSI (received signal strength indicator) in LoRaWAN communication. The model's performance was accurate...
详细信息
This paper presents the real implementation of a fog computing environment for the execution of color tracking applications by using FogBus2 framework and an artificial intelligence based docker container scheduling. ...
详细信息
Replacing public internal combustion engines transport with electric buses is a solution that many cities around the world have adopted in order to increase air quality and reduce the level of particles harmful to hum...
详细信息
A SQUID based fetal magnetocardiography (fMCG) can be used for prenatal prognosis of many fetal diseases. Due to the weak fMCG signal, a stable environment is required in addition to the SQUID gradiometer. This paper ...
详细信息
Nowadays security issues concern also mail correspondence, therefore we consider mandatory before open or even get closer to a letter or a postal collet to have information about the type of correspondence, informatio...
详细信息
This paper deals with a direction-of-arrival estimation (DOA) using an optimized transmitarray and a single receiving *** transmitarray consists of 1-bit elements with 0° and 180° transmission *** transmissi...
详细信息
暂无评论