Authentication of multiple transaction using enhanced Elman spike neural network optimized with glowworm swarm optimization

IF 2.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Wireless Networks Pub Date : 2024-06-23 DOI:10.1007/s11276-024-03797-z
S. Mary Joans, J. S. Leena Jasmine, P. Ponsudha
{"title":"Authentication of multiple transaction using enhanced Elman spike neural network optimized with glowworm swarm optimization","authors":"S. Mary Joans, J. S. Leena Jasmine, P. Ponsudha","doi":"10.1007/s11276-024-03797-z","DOIUrl":null,"url":null,"abstract":"<p>Secure user authentication has grown importance in today’s modern culture. It is significant to authenticate the user identity in numerous consumer applications particularly financial transactions. Traditional authentication methods rely on easy-to-guess passwords, PIN numbers, or tokens with several security flaws, such as those printed on the back of credit cards for PIN numbers. As an alternative to current systems, biometric authentication techniques based on physical and behavioral characteristics have been proposed. Multibiometric systems, which combine several biometrics, are developed as a result of the difficulties that single-biometric authentication systems encountered in real-world applications including lack of precision and noisy data. The proposed system provides better performance and greater accuracy compared with other authentication techniques. The majority of them is inconvenient and demand complicated user interactions. This paper proposes Enhanced Elman Spike Neural Network along Glowworm Swarm Optimization (EESNN-GSO-AMT) for Multiple Transaction Authentication. The images are collected via SDUMLA-HMTalong CASIA V5 dataset. The pictures are provided to pre-processing to enhance the images quality utilizing Learnable Edge Collaborative Filter (LECF). The preprocessed images are fed to feature extraction using Adaptive and concise empirical wavelet transform (ACEWT) and the features are extracted such as entropy, homogeneity, energy and contrast. The extracting features are provided to EESNN classifier to categorize authorized or unauthorized persons. In general, the EESNN classifier does not express adapting optimization methods to determine ideal parameters to ensure accurately. Therefore, it is proposed to utilize the Glowworm Swarm Optimization to enhanceEESNN, which accurately categorizes the authorized and unauthorized person. The efficiency of the proposed approach is assessed usingsome metrics. The proposed EESNN-GSO-AMT method attains higher accuracy 20.54%, 21.76% and 23.89%; greater sensitivity 20.12% 20.34% and 21.43%; higher precision 23.34%, 22.68% and 24.34% are analyzed to the existing methods, like Optimal feature level fusion for safe human authentication in multimodal biometric scheme (OptGWO-AMT-FV), Joint attention network for finger vein authentication (JAnet-AMT-FV), Finger Vein Recognition Utilizing Deep Learning Technique (DCNN-AMT-FV) respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"213 1","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2024-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Networks","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11276-024-03797-z","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Secure user authentication has grown importance in today’s modern culture. It is significant to authenticate the user identity in numerous consumer applications particularly financial transactions. Traditional authentication methods rely on easy-to-guess passwords, PIN numbers, or tokens with several security flaws, such as those printed on the back of credit cards for PIN numbers. As an alternative to current systems, biometric authentication techniques based on physical and behavioral characteristics have been proposed. Multibiometric systems, which combine several biometrics, are developed as a result of the difficulties that single-biometric authentication systems encountered in real-world applications including lack of precision and noisy data. The proposed system provides better performance and greater accuracy compared with other authentication techniques. The majority of them is inconvenient and demand complicated user interactions. This paper proposes Enhanced Elman Spike Neural Network along Glowworm Swarm Optimization (EESNN-GSO-AMT) for Multiple Transaction Authentication. The images are collected via SDUMLA-HMTalong CASIA V5 dataset. The pictures are provided to pre-processing to enhance the images quality utilizing Learnable Edge Collaborative Filter (LECF). The preprocessed images are fed to feature extraction using Adaptive and concise empirical wavelet transform (ACEWT) and the features are extracted such as entropy, homogeneity, energy and contrast. The extracting features are provided to EESNN classifier to categorize authorized or unauthorized persons. In general, the EESNN classifier does not express adapting optimization methods to determine ideal parameters to ensure accurately. Therefore, it is proposed to utilize the Glowworm Swarm Optimization to enhanceEESNN, which accurately categorizes the authorized and unauthorized person. The efficiency of the proposed approach is assessed usingsome metrics. The proposed EESNN-GSO-AMT method attains higher accuracy 20.54%, 21.76% and 23.89%; greater sensitivity 20.12% 20.34% and 21.43%; higher precision 23.34%, 22.68% and 24.34% are analyzed to the existing methods, like Optimal feature level fusion for safe human authentication in multimodal biometric scheme (OptGWO-AMT-FV), Joint attention network for finger vein authentication (JAnet-AMT-FV), Finger Vein Recognition Utilizing Deep Learning Technique (DCNN-AMT-FV) respectively.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用经萤火虫群优化的增强型埃尔曼尖峰神经网络进行多重交易验证
在当今的现代文化中,安全用户身份验证的重要性与日俱增。在许多消费应用中,尤其是在金融交易中,验证用户身份非常重要。传统的身份验证方法依赖于易于猜测的密码、PIN 码或存在若干安全缺陷的令牌,如印在信用卡背面的 PIN 码。作为现有系统的替代方案,人们提出了基于物理和行为特征的生物识别身份验证技术。由于单一生物识别身份验证系统在实际应用中遇到的困难,包括缺乏精确度和数据嘈杂,因此开发了结合多种生物识别技术的多重生物识别系统。与其他身份验证技术相比,拟议的系统具有更好的性能和更高的准确性。然而,大多数生物特征识别技术都存在使用不便、用户交互复杂等问题。本文提出了增强型 Elman Spike 神经网络和萤火虫群优化(EESNN-GSO-AMT)用于多重交易身份验证。图像通过 SDUMLA-HMTalong CASIA V5 数据集收集。图片经过预处理,利用可学习边缘协同过滤器(LECF)提高图像质量。预处理后的图像利用自适应简明经验小波变换(ACEWT)进行特征提取,提取的特征包括熵、同质性、能量和对比度。提取的特征将提供给 EESNN 分类器,用于对授权或未授权人员进行分类。一般来说,EESNN 分类器并不能通过自适应优化方法来确定理想参数,以确保准确性。因此,建议利用萤火虫群优化来增强 EESNN,从而准确地对授权和非授权人员进行分类。我们使用一些指标来评估拟议方法的效率。与现有方法相比,拟议的 EESNN-GSO-AMT 方法获得了更高的准确率 20.54%、21.76% 和 23.89%;更高的灵敏度 20.12%、20.34% 和 21.43%;更高的精确度 23.34%、22.68% 和 24.34%。与现有方法相比,该方法的准确率更高,分别为 20.54%、21.76% 和 23.89%;灵敏度更高,分别为 20.12%、20.34% 和 21.43%;精确度更高,分别为 23.34%、22.68% 和 24.34%,例如多模态生物识别方案中用于安全人体认证的最佳特征级融合(OptGWO-AMT-FV)、用于指静脉认证的联合注意力网络(JAnet-AMT-FV)、利用深度学习技术的指静脉识别(DCNN-AMT-FV)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Wireless Networks
Wireless Networks 工程技术-电信学
CiteScore
7.70
自引率
3.30%
发文量
314
审稿时长
5.5 months
期刊介绍: The wireless communication revolution is bringing fundamental changes to data networking, telecommunication, and is making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN''s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere. Focusing on the networking and user aspects of the field, Wireless Networks provides a global forum for archival value contributions documenting these fast growing areas of interest. The journal publishes refereed articles dealing with research, experience and management issues of wireless networks. Its aim is to allow the reader to benefit from experience, problems and solutions described.
期刊最新文献
An EEG signal-based music treatment system for autistic children using edge computing devices A DV-Hop localization algorithm corrected based on multi-strategy sparrow algorithm in sea-surface wireless sensor networks Multi-Layer Collaborative Federated Learning architecture for 6G Open RAN Cloud-edge collaboration-based task offloading strategy in railway IoT for intelligent detection Exploiting data transmission for route discoveries in mobile ad hoc networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1