Skip to main content

Advertisement

Log in

Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

The authentication of the Wireless Body Area Networks (WBANs) nodes is a vital factor in its medical applications. This paper, investigates methods of authentication over these networks. Also, an effective unimodal and multimodal biometrics identification approaches based on individual face and voice recognition or combined using different fusion types are presented. The cryptography and non-cryptography-based authentication are discussed in this research work and its suitability with the medical applications. Cryptographic based authentication is not suitable for WBANs. The biometrics authentication is discussed and its challenges. In this work, different fusion types in multimodal biometric are presented. There are two unimodal schemes have been presented based on using the voice and face image individually, these two biometrics have been used in the multimodal biometric scheme. The presneted multimodal scheme is evaluated and applied using the feature and score fusion. The mechanism operation of presented algorithm starts with capturing the biometics signals ‘Face/Voice’, the second step is the feature extracting from each biometric individually. The Artificial Neural Network (ANN), The Support Vector Machine (SVM) and the Gaussian Mixture Model (GMM) classifiers have been employed to perform the classification process individually. The computer simulation experiments reveal that the cepstral coefficients and statistical coefficients for voice recognition performed better for the voice scenario. Also, the Eigenface and support vector machine tools in the face recognition scheme performed better than other schemes. The multimodal results better than the unimodal schemes. Also, the results of the scores fusion-based multimodal biometric scheme is better than the feature fusion-based scheme. Hence, the biometric-based authentication is effective and applicable for the WBANs authentication and personality continuous authentication on these medical applications wireless networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abdel Karim N, Shukur Z (2015) Review of user authentication methods in online examination. Asian Journal of Information Technology 14(5):166–175

    Google Scholar 

  2. Abhishree TM, Latha J, Manikantan K, Ramachandran S (2015) Face recognition using gabor filter based feature extraction with anisotropic diffusion as a pre-processing technique. Procedia Computer Science 45:312–321

    Google Scholar 

  3. Agashe NM, Nimbhorkar S (2015) A survey paper on continuous authentication by multimodal biometric. Int J Adv Res Comput Eng Technol 4(11)

  4. Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In: 2016 8th IFIP international conference on new technologies, mobility and security (NTMS). https://doi.org/10.1109/NTMS.2016.7792489

  5. Altinok A, Turk M (2013) Temporal integration for continuous multimodal biometrics. In: Proc. workshop on multimodal user authentication, pp 131–137

  6. Asim M, Yautsiukhin A, Brucker AD, Baker T, Shi Q, Lempereur B (2018) Security policy monitoring of BPMN-based service compositions. Journal Software: Evaluation and Process 30(9). https://doi.org/10.1002/smr.1944

  7. Azzini A, Marrara S (2009) Impostor users discovery using a multimodal biometric continuous authentication, Fuzzy system, lecture notes in artificial intelligence, vol 5178. Proceedings of the 12th international conference on knowledge - based intelligent information and engineering systems, part II, section II, pp 371–378

  8. Azzini A, Marrara S, Sassi R, Scotti F (2010) A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optim Decis Making 7:243–256

    MathSciNet  Google Scholar 

  9. Baken RJ, Orlikoff RF (2000) Clinical measurement of speech and voice – second edition. Singular Publishing Group

  10. Baken RJ, Orlikoff RF (2016) Evaluating the diagnostic accuracy of Arabic SNAP test for children with hypernasality. Singular Publishing Group 85:102

    Google Scholar 

  11. Baker T, Mackay M, Shaheed A, Aldawsari B (2015) Security-oriented cloud platform for SOA-based SCADA. In: 15th IEEE/ACM international symposium on cluster, cloud and grid computing. https://doi.org/10.1109/CCGrid.2015.37

  12. Burges C (1998) A tutorial on support vector machines for pattern recognition. In: Data mining and knowledge discovery, vol 2. Kluwer Academic Publishers, Boston

  13. Cai L, Zeng K, Chen H, Mohapatra P (2011) Good neighbor: ad hoc pairing of nearby wireless devices by multiple antennas. In: Network and distributed system security symposium

  14. Ceccarelli A, Montecchi L, Brancati F, Lollini P, Bondavalli A (2013) Continuous and transparent user identity verification for secure internet services. IEEE Transactions On Dependable And Secure Computing

  15. Chetty G, Wagner M (2008) A multibiometric speaker authentication system with SVM audio reliability. Image Vis Comput 26:1249

    Google Scholar 

  16. Chetty G, Wagner M (2008) Robust face-voice based speaker identity verification using multilevel fusion. Image Vis Comput 26:1249–1260

    Google Scholar 

  17. Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other kernel-based learning methods. Cambridge University Press

  18. De A, Saha A, Pal MC (2015) A human facial expression recognition model based on eigen face approach. Procedia Computer Science 45:282

    Google Scholar 

  19. De A, Saha A, Pal MC (2015) A human facial expression recognition model based on Eigen face Approac. Procedia Computer Science 45:282–289

    Google Scholar 

  20. Dodangeh P, Jahangir AH (2018) A biometric security scheme for wireless body area networks. Journal of Information Security and Applications 41:62–74. https://doi.org/10.1016/j.jisa.2018.06.001

    Article  Google Scholar 

  21. Du W, Deng J, Han Y, Varshney P, Katz J, Khalili A (2005) A pairwise key predistribution scheme for wireless sensor networks. ACM Trans Inf Syst Secur 8(2):228–258

    Google Scholar 

  22. Kasban H, El-Bendary MAM (2017) Performance improvement of digital image transmission over mobile WiMAX networks. Wirel Pers Commun 94:1087–1103. https://doi.org/10.1007/s11277-016-3671-4

  23. El-Bendary MAM (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attack. Multimed Tools Appl 76(24):26463–26501

    Google Scholar 

  24. Elmir Y, Elberrichi Z, Adjoudj R (2014) Multimodal biometric using a hierarchical fusion of a person’s face, voice, and online signature. J Inf Process Syst

  25. Abouelfadl AA, MAM El-Bendary, F Shawki (2014) Enhancing transmission over wireless image sensor networks based on ZigBee Network. Life Sci 11(8):342–354

  26. Fookes C, Lin F, Chandran V, Sridharan S (2012) Face recognition performance with superresolution. J Vis Commun Image Represent 23(1):75

    Google Scholar 

  27. Fookes C, Lin F, Chandran V, Sridharan S (2012) Evaluation of image resolution and super-resolution on face recognition performance. J Vis Commun Image Represent 23(1):75–93

    Google Scholar 

  28. Gad R, El-Fishawy N, El-Sayed A, Zorkany M (2015) Multi-biometric systems: a state of the art survey and research directions. Int J Adv Comput Sci Appl 6(6)

  29. Galka J, Masior M, Salasa M (2014) Automatic speech segmentation in syllable centric speech recognition system. IEEE Trans Consum Electron 60(4):653

    Google Scholar 

  30. Galka J, Masior M, Salasa M (2014) Voice authentication embedded solution for secured access control. IEEE Trans Consum Electron 60(4):653–661

    Google Scholar 

  31. Halvia S, Ramapurb N, Rajac KB, Prasadd S (2017) Fusion based face recognition system using 1D transform domains. Procedia Computer Science 115:383–390

    Google Scholar 

  32. Holig C, Focker J, Best A, Roder B, Buchel C (2014) Cross-modal processing of voices and faces in developmental prosopagnosia and developmental phonagnosia. NeuroImage 103:374

    Google Scholar 

  33. Hussain AJ, Marcinonyte DM, Iqbal F (2018) Smart home systems security. In: 2018 IEEE 20th international conference on high performance computing and communications. https://doi.org/10.1109/HPCC/SmartCity/DSS.2018.00235

  34. Inthavisas K, Lopresti D (2012) Secure speech biometric templates for user authentication. IET Biometrics 1(1):46–54

    Google Scholar 

  35. Jain AK, Prabhakar S, Chen S (1999) Combining multiple matchers for a high SecurityFingerprint verification system. Pattern Recogn Lett 20(11–13):1371–1379

    Google Scholar 

  36. Jain AK, Dass SC, Nandakumar K (2004) Soft biometric traits for personal recognition systems. LNCS 3072:731–738

    Google Scholar 

  37. Jain A, Nandakumar K, Ross A (2005) Score normalizations in multimodal biometric systems. Pattern Recogn 38:2270–2285

    Google Scholar 

  38. Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MAM, Abd El-Samie FE, Faragallah OS (2016) Content verification of encrypted images transmitted over wireless AWGN channels. Wirel Pers Commun 88:479–491. https://doi.org/10.1007/s11277-015-3142-3

  39. Jain A, Nandakumar K, Ross A (2005) Score normalisation in multimodal biometric systems. Pattern Recogn 38:2270–2285

    Google Scholar 

  40. Jain AK, Ross A, Pankanti S (2013) Biometrics: a tool for information security. IEEE Trans Inf Forensics Secur 1(2):125–143

    Google Scholar 

  41. Jain AK, Ross A, Prabhakar S (2014) An introduction to bio - metric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20

    Google Scholar 

  42. Kang H-B, Ju M-H (2012) Multi - modal feature integration for secure authentication. In: International conference on intelligent computing, pp 1191–1200

  43. Karam Y, Baker T, Taleb-Bendiab A (2012) Security support for intention driven elastic cloud computing. In: 2012 sixth UKSim/AMSS european symposium on computer modeling and simulation. https://doi.org/10.1109/EMS.2012.17

  44. Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, (SenSys '04), Baltimore, Md, USA, pp 162–175

  45. Kasban H (2017) A robust multimodal biometric authentication scheme with voice and face recognition. Arab Journal of Nuclear Sciences and Applications 50(3):120–130

    Google Scholar 

  46. Kinnunen T, Karpov E, Franti P (2006) Efficient speaker recognition for mobile devices. IEEE Trans Audio Speech Lang Process 14(1):277

    Google Scholar 

  47. Kinnunen T, Karpov E, Franti P (2006) Real time speaker identification and verification. IEEE Trans Audio Speech Lang Process 14(1):277–288

    MATH  Google Scholar 

  48. Kumar HCS, Janardhan NA (2016) An efficient personnel authentication through multi modal biometric system. International Journal of Scientific Engineering and Applied Science 2(1)

  49. Kumar S, Sim T, Janakiraman R, Zhang S Using continuous biometric verification to protect inter-active login sessions. School of Computing, National University of Singapore

  50. Li H, Suen CY (2016) A methodology for feature selection using multiobjective genetic algorithms for handwritten digit string recognition. Pattern Recogn 60:13

    Google Scholar 

  51. Li H, Suen CY (2016) Robust face recognition based on dynamic rank representation. Pattern Recogn 60:13–24

    Google Scholar 

  52. Liu Z, Wang H (2014) A novel speech content authentication algorithm based on Bessel–Fourier moments. Digital Signal Process 24:197–208

    MathSciNet  Google Scholar 

  53. Liu T, Mi JX, Liu Y, Li C (2016) Multi-step linear representation-based classification for face recognition. Neurocomputing 214:944

    Google Scholar 

  54. Liu T, Mi JX, Liu Y, Li C (2016) Robust face recognition via sparse boosting representation. Neurocomputing 214:944–957

    Google Scholar 

  55. Lu S, Li M, Yu S, Yuan J BANA: body area network authentication exploiting channel characteristics. In: Proceedings of the fifth ACM conference on security and privacy in wireless and mobile networks, April 16-18, 2012, Tucson, Arizona, USA

  56. Lumini A, Nanni L (2017) Overview of the combination of biometric matchers. Information Fusion 33:71–85

    Google Scholar 

  57. Morgen B (2012) Voice biometrics for customer authentication. Biom Technol Today 2012(2):8–11

    Google Scholar 

  58. Palanivel S, Yegnanarayana B (2008) Multimodal person authentication using face and speech. Comput Vis Image Underst 109:44

    Google Scholar 

  59. Palanivel S, Yegnanarayana B (2008) Multimodal person authentication using speech, face and visual speech. Comput Vis Image Underst 109:44–55

    Google Scholar 

  60. Poh N, Korczak J (2001) Hybrid biometric person authentication using face and voice features. In: International conference, audio and video based biometric person authentication, Halmstad, Sweden, pp 348–353

  61. Qia M, Chena J, Chen Y (2018) A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC. Comput Methods Prog Biomed 164:101–109

    Google Scholar 

  62. Raghavendra R, Rao A, Kumar GH (2010) Multimodal person verification system using face and speech. Procedia Computer Science 2:181–187

    Google Scholar 

  63. Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted Guassian mixture models. Digital Signal Process 10:19–41

    Google Scholar 

  64. Sim T, Zhang S, Janakiraman R, Kumar S (2011) Continuous verification using multimodal biometrics. IEEE Trans Pattern Anal Mach Intell 29(4):687–700

    Google Scholar 

  65. Soltane M (2015) State of the Art of finite GMM based biometrics face authentication systems. Int J Eng Technol 03:52

    Google Scholar 

  66. Soltane M (2015) Greedy expectation maximization tuning algorithm of finite GMM based face, voice and signature multi-modal biometric verification fusion systems. Int J Eng Technol 15(03):41–52

    Google Scholar 

  67. Suo X, Zhu Y, Owen G (2012) Graphical passwords: a survey. In: Proc. annu. computer security applications, pp 463–472

  68. Szczechowiak P, Oliveira LB, Scott M, Collier M, Dahab R (2008) NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Proceedings of the 5th European conference on wireless sensor networks, Bologna, Italy, pp 305–320

  69. Tan CC, Wang H, Zhong S, Li Q (2008) Body sensor network security: an identity-based cryptography approach. In: ACM WiSec ‘08, pp 148–153

  70. Tariq N, Asim M, Al-Obeidat F, Farooqi MZ, Baker T, Hammoudeh M, Ghafir I (2019) The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors 19(8). https://doi.org/10.3390/s19081788

  71. Turk M, Pentland A (1991) Eigenfaces for face detection/recognition. J Cogn Neurosci 3(1):71

    Google Scholar 

  72. Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3(1):71–86

    Google Scholar 

  73. Varun R, Kini YV, Manikantan K, Ramachandran S (2015) Face recognition using Hough transform based feature extraction. Procedia Computer Science 46:1491–1500

    Google Scholar 

  74. Venkatasubramanian K, Gupta S (2010) Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans Sen Netw 6(4):1–36

    Google Scholar 

  75. Venkatasubramanian KK, Gupta SKS (2010) Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans Sen Netw 6:31:1–31:36

    Google Scholar 

  76. Xu F, Qin Z, Tan C, Wang B, Li Q (2011) Imdguard: Securing implantable medical devices with the external wearable guardian. In: The 30th IEEE international conference on computer communications (INFOCOM 2011), Shanghai, P.R.China, pp 1862–1870

  77. Xuan S, Xiang S, Ma H (2016) Person Re-identification by encoding free energy feature maps. Computer Vision 10(6):493

    Google Scholar 

  78. Xuan S, Xiang S, Ma H (2016) Subclass representation-based face-recognition algorithm derived from the structure scatter of training samples. Computer Vision 10(6):493–502

    Google Scholar 

  79. Zhang S, Janakiraman R, Sim T, Kumar S (2010) Continuous verification using multimodal biometrics. In: Proc.Second Int’l Conf. Biometrics, pp 562–570

  80. Zheng CH, Hou YF, Zhang J (2016) Bi-dimensional empirical mode decomposition and nonconvex penalty minimization L q (q = 0.5) regular sparse representation-based classification for image recognition. Neurocomputing 198:114

    Google Scholar 

  81. Zheng CH, Hou YF, Zhang J (2016) Improved sparse representation with low-rank representation for robust face recognition. Neurocomputing 198:114–124

    Google Scholar 

  82. Zhou Z, Du EY, Thomas NL, Delp EJ (2012) A new human identification method: sclera recognition. IEEE Trans Syst Man Cybern Syst Hum 42(3)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen A. M. El-Bendary.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

El-Bendary, M.A.M., Kasban, H., Haggag, A. et al. Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security. Multimed Tools Appl 79, 24507–24535 (2020). https://doi.org/10.1007/s11042-020-08926-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08926-2

Keywords

Navigation