Filters








22,347 Hits in 2.8 sec

Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme

Supriya Narad, Pallavi Chavan
2016 Procedia Computer Science  
This paper proposes the Shamir Secret Sharing Scheme along with Cascade forward back propagation neural network.  ...  The neural network is already trained for RGB image database and images are stored in particular group having a group category number which is to be predicted as output of neural network.  ...  Proposed work The proposed methodology is based on Cascade forward back propagation neural network.  ... 
doi:10.1016/j.procs.2016.02.032 fatcat:mg2kvrw74fhxheregsstwef3qa

A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords

P. S.V.Vachaspati, A. S. N. Chakravarthy, P. S. Avadhani
2013 International Journal of Computer Applications  
User with his password clicks some pass characters which are different for different sessions and explained in proposed scheme. To provide better results Neural Network is used for the authentication.  ...  To overcome the problem of shoulder surfing we introduced a novel scheme called S3PA (Scalable Shoulder Surfing Resistant Textual-Graphical Password Authentication Scheme) .  ...  ACKNOWLEDGMENTS The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble presentation.  ... 
doi:10.5120/12397-8776 fatcat:npxqhom6vvfednemlkxt42baoi

Software engineering based secured E-payment system

Muayad Sadik Croock, Rawan Ali Taaban
2021 International Journal of Power Electronics and Drive Systems (IJPEDS)  
It uses the neural network back-propagation method for ensuring the security of generated keys that have sufficient random levels.  ...  This system uses different proposed algorithms for applying authentication to the devices of users as mobile application. They are used to control the key management in the system.  ...  It is generated automatically depending on the user information and encrypted using back-propagation neural network algorithm explained earlier.  ... 
doi:10.11591/ijece.v11i5.pp4413-4422 fatcat:zwu4fjsbdffc7c7vwhkbxmgs3q

An Initial Framework of Fuzzy Neural Network Approach for Online Learner Verification Process

Siti Fairuz Nurr Sadikan, Universiti Tun Hussein Onn Malaysia, 86400 Batu Pahat, Johor Darul Takzim, Malaysia,
2019 International Journal of Advanced Trends in Computer Science and Engineering  
A fuzzy neural network is used to train and validate the online learner's identity. The proposed framework can be implementing in any online learning environment for verifying online learner identity.  ...  The student authentication as online learner is widely seen as a major concern for online assessment.  ...  table which implements feed forward neural network analysis with back propagation.  ... 
doi:10.30534/ijatcse/2019/3781.32019 fatcat:rss3vm5iyvdlxaa5p655bei63u

Performance Evaluation of Password Authentication using Associative Neural Memory Models

P.E.S.N Krishna Prasasd
2012 International Journal of Advanced Information Technology  
They are many ways of providing security to user resources. Password authentication is a very important system security procedure to secure user resources.  ...  In order to solve the problems with traditional password authentication several methods have been introduced to provide password authentication using Associative Memories like Back Propagation Neural Network  ...  ACKNOWLEDGEMENTS The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble presentation.  ... 
doi:10.5121/ijait.2012.2107 fatcat:mjetdiyuk5fahfapj7jotlpmz4

How to improve performance of Neural Network in the hardened password mechanism

Narainsamy Pavaday, Insah Bhurtah, Dr. K.M.Sunjiv Soyjaudah
2011 GSTF International Journal on Computing  
Current systems are based on the three vertex of the authentication triangle which are, possession of the token, knowledge of a secret and possessing the required biometric.  ...  This correspondence investigates possibility and ways for optimising performance of hardened password mechanism using the widely accepted Neural Network classifier.  ...  Another work worth mentioning is the one where the authors applied keystroke dynamics to strengthen a code of six digits using Neural Network with a multi-layer perceptron for each user with back-propagation  ... 
doi:10.5176/2010-2283_1.2.42 fatcat:ipd45p4sdjdpzgeaji57iwifoe

Simulation of Biometric Data in VANETs using Layer Recurrent Model

2019 International journal of recent technology and engineering  
Biometric identification methods like fingerprints are used throughout the world for authentication such methods are now being researched worldwide for VANETs too.  ...  In this paper we proposed to design and simulate the storage of such biometric data in the form of network parameters of a Neural Network.  ...  LAYER RECURRENT NEURAL NETWORK Layer recurrent is the special type of back propagation model which basically depends on time so it is also called back propagation through time [3] .  ... 
doi:10.35940/ijrte.d8578.118419 fatcat:cgo2r6nupbehtok66wmxklyko4

A Grid-Based Neural Network Framework For Multimodal Biometrics

Sitalakshmi Venkataraman
2010 Zenodo  
reliable authentication system.  ...  The framework combines the concept of Grid services for reliable brokering and privacy policy management of shared biometric resources along with a momentum back propagation ANN (MBPANN) model of machine  ...  Such a Grid-based neural network framework that uses momentum back propagation for multimodal biometric fusion and authentication is capable of taking advantage of Grid services for seamless integration  ... 
doi:10.5281/zenodo.1073095 fatcat:h6o4guwexra7xbqiyq2x2lhufy

Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network

Jaspreet Kaur, Rupinder Singh, Pawandeep Kaur
2015 International Journal of Computer Applications  
Whenever the users make use of any web application, all the activities of the users get automatically get appended into the web log files.  ...  In this paper, a new technique has been proposed to prevent the log file data from the two most common attacks: Brute force attack and DDoS attack.  ...  Fig 2 : 2 Fig 2: A simple Neural Network Fig 3 : 3 Fig 3: Methodology for DDoS and Brute Force attack prevention Initialize back propagation feed forward neural network If (Neural network.e.file >  ... 
doi:10.5120/21399-4406 fatcat:fbmjfbjwefauxjycx2qphauzbu

Simulating Manual Signature using Elman Back Propagation Model to Create Pseudo Digital Signature

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Back Propagation Algorithm to create pseudo digital signature.  ...  Manual Signatures are used in authentication worldwide. But they are still not used in VANETs and in ad hoc networks for security.  ...  After that, network trained by using Elman Back Propagation Model of Artificial Neural Network so that verification process did not take much time.  ... 
doi:10.35940/ijitee.b6452.129219 fatcat:wh6dmtqrh5ecbob24tdknchdru

Authenticating On-Body IoT Devices: An Adversarial Learning Approach [article]

Yong Huang, Wei Wang, Hao Wang, Tao Jiang, Qian Zhang
2020 arXiv   pre-print
radio propagation patterns and facilitate on-body device authentication.  ...  We build a prototype of our system using Universal Software Radio Peripheral (USRP) devices and conduct extensive experiments with various static and dynamic body motions in typical indoor and outdoor  ...  Our system adopts an adversarial neural network for wireless device authentication.  ... 
arXiv:2005.11170v1 fatcat:twtvl3nq2jamfewr2jcj3l5zpq

Inventions on LDAP Security - A TRIZ Based Analysis

Umakant Mishra
2006 Social Science Research Network  
US Patent 6438549 discloses a method of securing sparse Access Control List (ACL) data in a relational database used as a backing store for LDAP.  ...  Solution provided by US Patent 6708170: US Patent 6708170 finds a method of maintaining authentication information in a distributed network of servers using LDAP directories.  ... 
doi:10.2139/ssrn.925928 fatcat:lqbgwpjtffavvdoftcniqfurw4

Online Signature Forgery Prevention

Shalini Bhatia, Pratik Bhatia, Dheeraj Nagpal, Sandhya Nayak
2013 International Journal of Computer Applications  
A signature verification system using Error Back Propagation Training Algorithm is designed using Neural Network Toolbox of MATLAB to verify the signatures.  ...  Both the steps are carried out by Neural Networks trained using Error Back-Propagation Training Algorithm.  ...  This paper presents an Online Signature Forgery Prevention system created using Neural Networks which are trained using Error Back-Propagation Training Algorithm.  ... 
doi:10.5120/13172-0849 fatcat:fjrq4ugwtfev7lzmq62behunvu

Offline Signature Recognition Using Image Processing Techniques and Back Propagation Neuron Network System

P. Kiran, B. D. Parameshachari, J. Yashwanth, K. N. Bharath
2021 SN Computer Science  
Processed image feature is extracted using back propagation neuron network system with defined number of neurons and hidden layers.  ...  In this paper, offline signature recognition using back propagation neuron network system and image processing techniques has been proposed.  ...  Conclusion Offline signature recognition using image processing techniques and back propagation neuron network system has been proposed.  ... 
doi:10.1007/s42979-021-00591-y fatcat:vgkejaghefbyhmi7z4ifz5tkki

Joint pollution detection and attacker identification in peer-to-peer live streaming

Bo Hu, H. Vicky Zhao
2010 2010 IEEE International Conference on Acoustics, Speech and Signal Processing  
To resist pollution attacks and stimulate user cooperation in P2P live streaming, this paper proposes a joint pollution detection and attacker identification system, where polluted chunks are detected  ...  In the emerging peer-to-peer (P2P) live streaming, users cooperate with each other to support efficient delivery of video over networks.  ...  Each chunk piggies back the group digital signature and its corresponding authentication information before being transmitted over networks.  ... 
doi:10.1109/icassp.2010.5496015 dblp:conf/icassp/HuZ10 fatcat:fuso7gvqsbemtfgb22yhpjmhzi
« Previous Showing results 1 — 15 out of 22,347 results