Abstract
Online Social Networks (OSNs) are quickly becoming the most popular platform, with practically everyone using them on a daily basis. Recent advancements in neosocial networking sites have sparked interest among people, particularly young people. In this paper, a unique method that provides access control for minors is proposed. The biometric features collected from users are verified using the individual’s Unique Identity (UID). To address this issue, numerous multimodal authentication systems have been devised that partially solve the problem, however challenges in classifier selection and decision level fusion in a multimodal biometric system are still being investigated. Hence, the Multimodal Biometric Authentication System Utilizing Game Theoretic Social Network Analysis (GTSNA) is designed as a one-of-a-kind technique for identifying minors by verifying their age using the UID repository. As a result, two systems are built: one to authenticate a user with a Genuine Acceptance Rate (GAR) of 100% and a False Acceptance Rate (FAR) of 1%, and the other to govern minors accessing immoral information on the web using this newly designed Multimodal system.
Similar content being viewed by others
References
https://news.biharprabha.com/2014/07/india-records-highest-social-networking-growth-study/
Ito M, Horst H, Bittani M 2010 Living and Learning with New Media: Summary of Findings from the Digital Youth Project. Chicago, IL: John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning. Available at: http://digitalyosuth.ischool.berkeley.Edu/files/report/digitalyouthTwoPageSummary.pdf. Accessed July 16, 2010
Hinduja S, Patchin J (2007) Offline consequences of online victimization: school violence and delinquency. J Sch Violence 6(3):89–112
Patchin JW, Hinduja S (2006) Bullies move beyond the schoolyard: a preliminary look at cyber-bullying. Youth Violence Juv Justice 4(2):148–169
A thin line: 2009 AP-TVT digital abuse study. Available at: www.athinline.org/MTV-AP-Digital-Abuse-Study-ExecutiveSummary.pdf. Accessed 16 July 2010
Christakis DA, Moreno MA (2009) Trapped in the Net:Will internet addiction become a 21stcentury epidemic?. Arch Pediatr Adolesc Med 163(10):959–960. https://doi.org/10.1001/archpediatrics.2009.162
Jain AK, Ross A (2004) Member and Salil Prabhakar. An Introduction to Biometric Recognition. IEEE Transactions On Circuits And Systems For Video Technology 14(1)
https://blog.ipswitch.com/3-reasons-biometrics-are-not-secure
The Unique Identification Authority of India website. [Online]. Available: http://uidai.gov.in/
Prabhakar S, PankantiS JainAK (2003) Biometric recognition: Security and privacy concerns IEEE Secure. Privacy 1(2):33–42
10 Best Internet Filter Software Products, By LaptopMag.com. https://www.laptopmag.com/best-internet-filter-software
Sathish Kumar M, Nanda Kumar P, Deepa R (2016) Protection against Pornography” 2nd IEEE International Conference on Engineering and Technology (ICETECH) pp. 1–3. https://doi.org/10.1109/ICETECH.2016.7569365
Oloyede MO, Hancke GP (2016) “Unimodal and Multimodal Biometric Sensing Systems: A Review” IEEE Access vol 4, Digital Object Identifier pp. 7532–7555. https://doi.org/10.1109/ACCESS.2016.2614720
Monwar M, Marina L (2009) Gavrilova “Multimodal Biometric System Using Rank-Level Fusion Approach” IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics”, Digital Object Identifier 39(4). https://doi.org/10.1109/TSMCB.2008.2009071
Ahmad F, Roy K, O‟Connor B, Shelton J, Arias P, Esterline A, Dozier G (2015) Facial Recognition Utilizing Patch Based Game Theory. Int J Mach Learn Comput 5(4). https://doi.org/10.7763/IJMLC.2015.V5.530
Ahmad F, Shelton J, Roy K (2017) Computer Science Department, North Carolina A&T State University, Greensboro, NC, USA “Multispectral Iris Recognition based on Group Selection and Game Theory” Pattern Recognition and Tracking, Proc. of SPIE Vol. 10203, 1020309. https://doi.org/10.1117/12.2262607
Veluchamy S, Karlmarx R (2017) System for multimodal biometric recognition based on finger knuckle and finger vein using feature-level fusion and k-support vector machine classifier” IET Biometrics 6(3):232–242. https://doi.org/10.1049/iet-bmt.2016.0112
Eskandari M, Sharifi O (2017) Optimum scheme selection for face and iris biometric. IET Biometrics 6(5):334–341
Cheniti M, Boukezzoula N-E, Akhtar Z (2018) Symmetric sum-based biometric score fusion. IET Biometrics 7(5):391–395
Rajasekar V, Premalatha J, Sathya K (2020) Enhanced Biometric Recognition for Secure Authentication Using Iris Preprocessing and Hyper elliptic Curve Cryptography. Hindawi Wireless Communications and Mobile Computing 2020(8841021):15. https://doi.org/10.1155/2020/8841021
Nguyen LT, Nguyen HT, Afanasiev AD, Nguyen TV (2021) Automatic Identification Fingerprint Based on Machine Learning Method. J Oper Res Soc China. https://doi.org/10.1007/s40305-020-00332-7
Leghari M, Memon S, Dhomeja LD, Jalbani AH, Chandio AA (2021) Deep Feature Fusion of Fingerprint and Online Signature for Multimodal Biometrics. Computers. https://doi.org/10.3390/computers10020021
Paul PP, Gavrilova ML, Alhajj R (2014) Decision Fusion for Multimodal Biometrics Using Social Network Analysis. IEEE Transactions On Systems, Man and Cybernetics: Systems 44(11)
Nguyen LAT (2017) Facial Recognition based on Histogram Matching with Adaptive Threshold” Communications on Applied Electronics (CAE)-ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USA 7(8). www.caeaccess.org
Kaur M, Singh M, Girdhar A, Sandhu PS (2008) Fingerprint Verification System using Minutiae Extraction Technique. International Scholarly and Scientific Research & Innovation, World Academy of Science, Engineering and Technology 22
Ma L, Wang Y, Tan T (2002) Iris Recognition Based on Multichannel Gabor Filtering. ACCV2002: The 5th Asian Conference on Computer Vision, Melbourne, Australia 23–25
Nanavati RNAA (2012) Game Theoretic Models for Social Network Analysis. https://researcher.watson.ibm.com/researcher/files/inramasurn/AAAI-2012-Suri-Amit.pdf
Technical Document about FAR, FRR and EER Version 1.0 @2004 by Syris Technology Corp.
Xia F, Liu L, Li J, Ma J, Vasilakos AV (2015) Socially Aware Networking: A Survey. IEEE Syst J 9(3)
Estrada E, Rodriguez-Velazquez JA. Subgraph Centrality in Complex Networks Complex Systems Research Group, X-Rays Unit, RIAIDT, Edificio CACTUS, University of Santiago de Compostela, 15706 Santiago de Compostela, Spain and Department of Mathematics, University Carlos III de Madrid, 28911 Leganes (Madrid), Spain
https://cambridge-intelligence.com/eigencentrality-pagerank/
https://www.geeksforgeeks.org/katz-centrality-centrality-measure/
Tarkowski MK, Michalak TP, Rahwan T, Wooldridge M (2018) Game-theoretic Network Centrality: A Review. https://doi.org/10.48550/arXiv.1801.00218
https://www.nist.gov/itl/iad/image-group/special-database-32-multipleencounter-dataset-meds
Dobes M, Machala L, Tichavsky P, Pospisil J (2004) Human Eye Iris Recognition Using theMutualInformation. Optik 115(9):399–405. http://phoenix.inf.upol.cz/iris/
https://www.statisticshowto.com/probability-and-statistics/correlation-coefficient-formula
http://www.sthda.com/english/wiki/correlation-test-between-two-variables-in-r
Purohit H, Ajmera PK (2021) Optimal feature level fusion for secured human authentication in multimodal biometric system. Mach Vis Appl 32:24. https://doi.org/10.1007/s00138-020-01146-6
Gunasekaran K, Raja J, Pitchai R (2019) Deep multimodal biometric recognition using contourlet derivative weighted rank fusion with human face, fingerprint and iris images, Automatika. https://doi.org/10.1080/00051144.2019.1565681
Zhang H, Patel VM, Chellappa R (2017) Low-rank and joint sparse representations for multi-modal recognition. IEEE Trans Image Process 26(10):1–13
Haghighat M, Abdel-Mottaleb M, Alhalabi W (2016) Discriminant correlation analysis: real-time feature level fusion for multimodal biometric recognition. IEEE Trans Inf Forensics Secur 11(9):1–13
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shalini P, Shankaraiah Multimodal biometric decision fusion security technique to evade immoral social networking sites for minors. Appl Intell 53, 2751–2776 (2023). https://doi.org/10.1007/s10489-022-03538-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-022-03538-9