Skip to main content
Log in

Multimodal biometric decision fusion security technique to evade immoral social networking sites for minors

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Online Social Networks (OSNs) are quickly becoming the most popular platform, with practically everyone using them on a daily basis. Recent advancements in neosocial networking sites have sparked interest among people, particularly young people. In this paper, a unique method that provides access control for minors is proposed. The biometric features collected from users are verified using the individual’s Unique Identity (UID). To address this issue, numerous multimodal authentication systems have been devised that partially solve the problem, however challenges in classifier selection and decision level fusion in a multimodal biometric system are still being investigated. Hence, the Multimodal Biometric Authentication System Utilizing Game Theoretic Social Network Analysis (GTSNA) is designed as a one-of-a-kind technique for identifying minors by verifying their age using the UID repository. As a result, two systems are built: one to authenticate a user with a Genuine Acceptance Rate (GAR) of 100% and a False Acceptance Rate (FAR) of 1%, and the other to govern minors accessing immoral information on the web using this newly designed Multimodal system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. https://news.biharprabha.com/2014/07/india-records-highest-social-networking-growth-study/

  2. Ito M, Horst H, Bittani M 2010 Living and Learning with New Media: Summary of Findings from the Digital Youth Project. Chicago, IL: John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning. Available at: http://digitalyosuth.ischool.berkeley.Edu/files/report/digitalyouthTwoPageSummary.pdf. Accessed July 16, 2010

  3. https://www.mayoclinic.org/healthy-lifestyle/tween-and-teen-health/in-depth/teens-and-Social-media-use/art-20474437

  4. Hinduja S, Patchin J (2007) Offline consequences of online victimization: school violence and delinquency. J Sch Violence 6(3):89–112

  5. Patchin JW, Hinduja S (2006) Bullies move beyond the schoolyard: a preliminary look at cyber-bullying. Youth Violence Juv Justice 4(2):148–169

    Article  Google Scholar 

  6. A thin line: 2009 AP-TVT digital abuse study. Available at: www.athinline.org/MTV-AP-Digital-Abuse-Study-ExecutiveSummary.pdf. Accessed 16 July 2010

  7. Christakis DA, Moreno MA (2009) Trapped in the Net:Will internet addiction become a 21stcentury epidemic?. Arch Pediatr Adolesc Med 163(10):959–960. https://doi.org/10.1001/archpediatrics.2009.162

  8. Jain AK, Ross A (2004) Member and Salil Prabhakar. An Introduction to Biometric Recognition. IEEE Transactions On Circuits And Systems For Video Technology 14(1)

  9. https://blog.ipswitch.com/3-reasons-biometrics-are-not-secure

  10. The Unique Identification Authority of India website. [Online]. Available: http://uidai.gov.in/

  11. Prabhakar S, PankantiS JainAK (2003) Biometric recognition: Security and privacy concerns IEEE Secure. Privacy 1(2):33–42

    Article  Google Scholar 

  12. 10 Best Internet Filter Software Products, By LaptopMag.com. https://www.laptopmag.com/best-internet-filter-software

  13. Sathish Kumar M, Nanda Kumar P, Deepa R (2016) Protection against Pornography” 2nd IEEE International Conference on Engineering and Technology (ICETECH) pp. 1–3. https://doi.org/10.1109/ICETECH.2016.7569365

  14. Oloyede MO, Hancke GP (2016) “Unimodal and Multimodal Biometric Sensing Systems: A Review” IEEE Access vol 4, Digital Object Identifier pp. 7532–7555. https://doi.org/10.1109/ACCESS.2016.2614720

  15. Monwar M, Marina L (2009) Gavrilova “Multimodal Biometric System Using Rank-Level Fusion Approach” IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics”, Digital Object Identifier 39(4). https://doi.org/10.1109/TSMCB.2008.2009071

  16. Ahmad F, Roy K, O‟Connor B, Shelton J, Arias P, Esterline A, Dozier G (2015) Facial Recognition Utilizing Patch Based Game Theory. Int J Mach Learn Comput 5(4). https://doi.org/10.7763/IJMLC.2015.V5.530

  17. Ahmad F, Shelton J, Roy K (2017) Computer Science Department, North Carolina A&T State University, Greensboro, NC, USA “Multispectral Iris Recognition based on Group Selection and Game Theory” Pattern Recognition and Tracking, Proc. of SPIE Vol. 10203, 1020309. https://doi.org/10.1117/12.2262607

  18. Veluchamy S, Karlmarx R (2017) System for multimodal biometric recognition based on finger knuckle and finger vein using feature-level fusion and k-support vector machine classifier” IET Biometrics 6(3):232–242. https://doi.org/10.1049/iet-bmt.2016.0112

  19. Eskandari M, Sharifi O (2017) Optimum scheme selection for face and iris biometric. IET Biometrics 6(5):334–341

  20. Cheniti M, Boukezzoula N-E, Akhtar Z (2018) Symmetric sum-based biometric score fusion. IET Biometrics 7(5):391–395

  21. Rajasekar V, Premalatha J, Sathya K (2020) Enhanced Biometric Recognition for Secure Authentication Using Iris Preprocessing and Hyper elliptic Curve Cryptography. Hindawi Wireless Communications and Mobile Computing 2020(8841021):15. https://doi.org/10.1155/2020/8841021

  22. Nguyen LT, Nguyen HT, Afanasiev AD, Nguyen TV (2021) Automatic Identification Fingerprint Based on Machine Learning Method. J Oper Res Soc China. https://doi.org/10.1007/s40305-020-00332-7

  23. Leghari M, Memon S, Dhomeja LD, Jalbani AH, Chandio AA (2021) Deep Feature Fusion of Fingerprint and Online Signature for Multimodal Biometrics. Computers. https://doi.org/10.3390/computers10020021

  24. Paul PP, Gavrilova ML, Alhajj R (2014) Decision Fusion for Multimodal Biometrics Using Social Network Analysis. IEEE Transactions On Systems, Man and Cybernetics: Systems 44(11)

  25. Nguyen LAT (2017) Facial Recognition based on Histogram Matching with Adaptive Threshold” Communications on Applied Electronics (CAE)-ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USA 7(8). www.caeaccess.org

  26. Kaur M, Singh M, Girdhar A, Sandhu PS (2008) Fingerprint Verification System using Minutiae Extraction Technique. International Scholarly and Scientific Research & Innovation, World Academy of Science, Engineering and Technology 22

  27. Ma L, Wang Y, Tan T (2002) Iris Recognition Based on Multichannel Gabor Filtering. ACCV2002: The 5th Asian Conference on Computer Vision, Melbourne, Australia 23–25

  28. Nanavati RNAA (2012) Game Theoretic Models for Social Network Analysis. https://researcher.watson.ibm.com/researcher/files/inramasurn/AAAI-2012-Suri-Amit.pdf

  29. Technical Document about FAR, FRR and EER Version 1.0 @2004 by Syris Technology Corp.

  30. Xia F, Liu L, Li J, Ma J, Vasilakos AV (2015) Socially Aware Networking: A Survey. IEEE Syst J 9(3)

  31. Estrada E, Rodriguez-Velazquez JA. Subgraph Centrality in Complex Networks Complex Systems Research Group, X-Rays Unit, RIAIDT, Edificio CACTUS, University of Santiago de Compostela, 15706 Santiago de Compostela, Spain and Department of Mathematics, University Carlos III de Madrid, 28911 Leganes (Madrid), Spain

  32. https://cambridge-intelligence.com/eigencentrality-pagerank/

  33. https://en.wikipedia.org/wiki/PageRank

  34. https://www.geeksforgeeks.org/katz-centrality-centrality-measure/

  35. Tarkowski MK, Michalak TP, Rahwan T, Wooldridge M (2018) Game-theoretic Network Centrality: A Review. https://doi.org/10.48550/arXiv.1801.00218

  36.  http://bias.csr.unibo.it/fvc2002/download.asp

  37. https://www.nist.gov/itl/iad/image-group/special-database-32-multipleencounter-dataset-meds

  38. Dobes M, Machala L, Tichavsky P, Pospisil J (2004) Human Eye Iris Recognition Using theMutualInformation. Optik 115(9):399–405. http://phoenix.inf.upol.cz/iris/

  39. https://www.statisticshowto.com/probability-and-statistics/correlation-coefficient-formula

  40. http://www.sthda.com/english/wiki/correlation-test-between-two-variables-in-r

  41. Purohit H, Ajmera PK (2021) Optimal feature level fusion for secured human authentication in multimodal biometric system. Mach Vis Appl 32:24. https://doi.org/10.1007/s00138-020-01146-6

  42. Gunasekaran K, Raja J, Pitchai R (2019) Deep multimodal biometric recognition using contourlet derivative weighted rank fusion with human face, fingerprint and iris images, Automatika. https://doi.org/10.1080/00051144.2019.1565681

  43. Zhang H, Patel VM, Chellappa R (2017) Low-rank and joint sparse representations for multi-modal recognition. IEEE Trans Image Process 26(10):1–13

  44. Haghighat M, Abdel-Mottaleb M, Alhalabi W (2016) Discriminant correlation analysis: real-time feature level fusion for multimodal biometric recognition. IEEE Trans Inf Forensics Secur 11(9):1–13

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shalini P .

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shalini P, Shankaraiah Multimodal biometric decision fusion security technique to evade immoral social networking sites for minors. Appl Intell 53, 2751–2776 (2023). https://doi.org/10.1007/s10489-022-03538-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-022-03538-9

Keywords

Navigation