Abstract
In this paper the need of biometric authentication with synthetic data is analyzed for increasing the security of data in each transmission systems. Since more biometric patterns are represented the complexity of recognition changes where low security features are enabled in transmission process. Hence the process of increasing security is carried out with image biometric patterns where synthetic data is created with explainable artificial intelligence technique thereby appropriate decisions are made. Further sample data is generated at each case thereby all changing representations are minimized with increase in original image set values. Moreover the data flows at each identified biometric patterns are increased where partial decisive strategies are followed in proposed approach. Further more complete interpretabilities that are present in captured images or biometric patterns are reduced thus generated data is maximized to all end users. To verify the outcome of proposed approach four scenarios with comparative performance metrics are simulated where from the comparative analysis it is found that the proposed approach is less robust and complex at a rate of 4% and 6% respectively.
Official URL
More Information
Divisions: | School of Built Environment, Engineering and Computing |
---|---|
Identification Number: | https://doi.org/10.1016/j.imavis.2025.105429 |
Status: | Published |
Refereed: | Yes |
Publisher: | Elsevier BV |
Additional Information: | © 2025 The Author(s). |
Uncontrolled Keywords: | 0801 Artificial Intelligence and Image Processing; 0906 Electrical and Electronic Engineering; Artificial Intelligence & Image Processing; 4007 Control engineering, mechatronics and robotics; 4603 Computer vision and multimedia computation; 4611 Machine learning |
SWORD Depositor: | Symplectic |
Depositing User (symplectic) | Deposited by Mann, Elizabeth |
Date Deposited: | 06 Feb 2025 13:35 |
Last Modified: | 06 Feb 2025 13:35 |
Item Type: | Article |
Export Citation
Explore Further
Read more research from the author(s):