Skip to main content
Log in

Proximal spatial vector and affinity coefficient for multimodal biometric secured social network communication

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Using multimodalities, the field of biometric is receiving widespread acceptance for efficient communication between users in social network. Hence, suitable designing of authentication and access control is highly required to perform analysis of system in social network domain. In this work, a Proximal Spatial Vector and Affinity Coefficient (PSV-AC) framework is designed with the objective of ensuring authentic communication between users in social network using face and fingerprint. Initially, multimodal user biometric features with proximal feature pixel stored in spatial vector are gene encoded to obtain biometric identity keys. User authenticity is authorized by decoding gene encoded biometric features using biometric identity keys. User Affinity Coefficient is calculated via antecedent instances shared between different social users. The social network user’s affinity coefficient is ordered in a matrix. Matrix ranking is then performed to identify whether authentic user social communication happened in network. Experiments have been carried out using BioSecure datasets to measure the performance in terms of number of social users, social network authentication time, access control time, multimodal biometric feature template size, and true positive rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5

Similar content being viewed by others

References

  1. Al Bouna B., Chbeir R., Marrara S.: Enforcing role based access control model with multimedia signatures. Elsevier, J. Syst. Archit., 55(4): 264–274 (2009)

  2. Althobaiti O., Al-Rodhaan M, Al-Dhelaan A.: An efficient biometric authentication protocol for wireless sensor networks”, Hindawi, International Journal of Distributed Sensor Networks, 2013, 1–13 (2013)

  3. Chen, S., Fan, J.: Measuring corporate social responsibility based on a fuzzy analytical hierarchy process. I. J. Computer Network and Information Security. 3, 13–22 (2011)

    Article  Google Scholar 

  4. Hongxin, H., Ahn, G.-J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614–1627 (2013)

    Article  Google Scholar 

  5. Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation. Computer and Communications Security. 411–415 (2011)

  6. Kanhangad, V., Kumar, A., Zhang, D.: Contactless and pose invariant biometric identification using hand surface. IEEE Trans. Image Process. 20(5), 1415–1424 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  7. Lai, L., Ho, S.-W., Poor, H.V.: Privacy–security trade-offs in biometric security systems—part I: single use case. IEEE Transactions on Information Forensics and Security. 6(1), 122–139 (2011)

    Article  Google Scholar 

  8. Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web. Springer 14(4), 407–430 (2011)

  9. Limsaiprom, P., Praneetpolgrang, P., Subsermsri, P.: Visualization of influencing nodes in online social networks. I. J. Computer Network and Information Security. 6, 9–20 (2014)

    Article  Google Scholar 

  10. Meligy, A.M., M. Ibrahim, H., F. Torky, M.: Identity verification mechanism for detecting fake profiles in online social networks. I. J. Computer Network and Information Security. 9, 31–39 (2017)

    Article  Google Scholar 

  11. Park, H.-A., Hong, J.W., Park, J.H., Zhan, J., Lee, D.H.: Combined authentication-based multilevel access control in Mobile application for daily life service. IEEE Trans. Mob. Comput. 9(6), 824–837 (2010)

    Article  Google Scholar 

  12. Shehab, M., Squicciarini, A., Ahn, G.-J., Kokkinou, I.: Access control for online social networks third party applications. Elsevier, Computers & Security. 31(8), 897–911 (2012)

    Article  Google Scholar 

  13. Shu, Y., Gu, Y., Chen, J.: Dynamic authentication with sensory information for the access control systems. IEEE Transactions on Parallel and Distributed systems. 25(2), 427–436 (2013)

    Google Scholar 

  14. Sitova, Z., Sedenka, J., Yang, Q., Ge, P., Zhou, G., Gastiy, P., Balagani, K.: HMOG: new behavioral biometric features for continuous authentication of smart phone users. IEEE Transactions on Information Forensics and Security. 1–16 (2015)

  15. Sobh, T.S.: Wi-fi networks security and accessing control. I. J. Computer Network and Information Security. 5, 9–20 (2013)

    Article  Google Scholar 

  16. Stokkenes, M., Ramachandra, R., Busch, C.: Biometric authentication protocols on smartphones – An Overview. International Conference on Security of Information and Networks. 136–140 (2016)

  17. Suna, X., Li, M., Wang, H.: A family of enhanced (L, α)-diversity models for privacy preserving data publishing. Futur. Gener. Comput. Syst., Elsevier, July 2010

  18. Trewin, S., Swart, C., Koved, L., Martino, J., Singh, K., David, S.B.: Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption. Computer Security Applications. 159–168 (2012)

  19. Wang, H., Sun, L.: Trust-involved access control in collaborative open social networks”, 2010 Fourth International Conference on Network and System Security

  20. Zhang, J., Tao, X., Wang, H.: Outlier detection from large distributed databases. World Wide Web, Springer, May 2013

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jayanthi Sivasubramaniam.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sivasubramaniam, J., Chandrasekar, C. Proximal spatial vector and affinity coefficient for multimodal biometric secured social network communication. World Wide Web 22, 1751–1764 (2019). https://doi.org/10.1007/s11280-018-0644-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-018-0644-4

Keywords

Navigation