{"title":"Authentication of multiple transaction using enhanced Elman spike neural network optimized with glowworm swarm optimization","authors":"S. Mary Joans, J. S. Leena Jasmine, P. Ponsudha","doi":"10.1007/s11276-024-03797-z","DOIUrl":null,"url":null,"abstract":"<p>Secure user authentication has grown importance in today’s modern culture. It is significant to authenticate the user identity in numerous consumer applications particularly financial transactions. Traditional authentication methods rely on easy-to-guess passwords, PIN numbers, or tokens with several security flaws, such as those printed on the back of credit cards for PIN numbers. As an alternative to current systems, biometric authentication techniques based on physical and behavioral characteristics have been proposed. Multibiometric systems, which combine several biometrics, are developed as a result of the difficulties that single-biometric authentication systems encountered in real-world applications including lack of precision and noisy data. The proposed system provides better performance and greater accuracy compared with other authentication techniques. The majority of them is inconvenient and demand complicated user interactions. This paper proposes Enhanced Elman Spike Neural Network along Glowworm Swarm Optimization (EESNN-GSO-AMT) for Multiple Transaction Authentication. The images are collected via SDUMLA-HMTalong CASIA V5 dataset. The pictures are provided to pre-processing to enhance the images quality utilizing Learnable Edge Collaborative Filter (LECF). The preprocessed images are fed to feature extraction using Adaptive and concise empirical wavelet transform (ACEWT) and the features are extracted such as entropy, homogeneity, energy and contrast. The extracting features are provided to EESNN classifier to categorize authorized or unauthorized persons. In general, the EESNN classifier does not express adapting optimization methods to determine ideal parameters to ensure accurately. Therefore, it is proposed to utilize the Glowworm Swarm Optimization to enhanceEESNN, which accurately categorizes the authorized and unauthorized person. The efficiency of the proposed approach is assessed usingsome metrics. The proposed EESNN-GSO-AMT method attains higher accuracy 20.54%, 21.76% and 23.89%; greater sensitivity 20.12% 20.34% and 21.43%; higher precision 23.34%, 22.68% and 24.34% are analyzed to the existing methods, like Optimal feature level fusion for safe human authentication in multimodal biometric scheme (OptGWO-AMT-FV), Joint attention network for finger vein authentication (JAnet-AMT-FV), Finger Vein Recognition Utilizing Deep Learning Technique (DCNN-AMT-FV) respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"213 1","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2024-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Networks","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11276-024-03797-z","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Secure user authentication has grown importance in today’s modern culture. It is significant to authenticate the user identity in numerous consumer applications particularly financial transactions. Traditional authentication methods rely on easy-to-guess passwords, PIN numbers, or tokens with several security flaws, such as those printed on the back of credit cards for PIN numbers. As an alternative to current systems, biometric authentication techniques based on physical and behavioral characteristics have been proposed. Multibiometric systems, which combine several biometrics, are developed as a result of the difficulties that single-biometric authentication systems encountered in real-world applications including lack of precision and noisy data. The proposed system provides better performance and greater accuracy compared with other authentication techniques. The majority of them is inconvenient and demand complicated user interactions. This paper proposes Enhanced Elman Spike Neural Network along Glowworm Swarm Optimization (EESNN-GSO-AMT) for Multiple Transaction Authentication. The images are collected via SDUMLA-HMTalong CASIA V5 dataset. The pictures are provided to pre-processing to enhance the images quality utilizing Learnable Edge Collaborative Filter (LECF). The preprocessed images are fed to feature extraction using Adaptive and concise empirical wavelet transform (ACEWT) and the features are extracted such as entropy, homogeneity, energy and contrast. The extracting features are provided to EESNN classifier to categorize authorized or unauthorized persons. In general, the EESNN classifier does not express adapting optimization methods to determine ideal parameters to ensure accurately. Therefore, it is proposed to utilize the Glowworm Swarm Optimization to enhanceEESNN, which accurately categorizes the authorized and unauthorized person. The efficiency of the proposed approach is assessed usingsome metrics. The proposed EESNN-GSO-AMT method attains higher accuracy 20.54%, 21.76% and 23.89%; greater sensitivity 20.12% 20.34% and 21.43%; higher precision 23.34%, 22.68% and 24.34% are analyzed to the existing methods, like Optimal feature level fusion for safe human authentication in multimodal biometric scheme (OptGWO-AMT-FV), Joint attention network for finger vein authentication (JAnet-AMT-FV), Finger Vein Recognition Utilizing Deep Learning Technique (DCNN-AMT-FV) respectively.
期刊介绍:
The wireless communication revolution is bringing fundamental changes to data networking, telecommunication, and is making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN''s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere.
Focusing on the networking and user aspects of the field, Wireless Networks provides a global forum for archival value contributions documenting these fast growing areas of interest. The journal publishes refereed articles dealing with research, experience and management issues of wireless networks. Its aim is to allow the reader to benefit from experience, problems and solutions described.