WaveSafe Guardian: Enhanced Security Shield with Wavelet Analysis
Keywords:
Wavelet analysis, Support Vector Machine, Authentication, Security, Verification.Abstract
In an era of escalating cyber threats and increasing concerns over data security, the development of robust authentication systems is imperative. This paper presents Wavelet Shield Sentinel, a novel approach that combines wavelet analysis with support vector machine (SVM) technology to create a highly secure verification system. The integration of wavelet transforms enhances the system's ability to extract relevant features from complex data sets, while SVM provides a powerful classification framework for authentication. Wavelet Shield Sentinel offers advanced security measures to safeguard sensitive information and prevent unauthorized access or fraudulent activities. Through extensive experimentation and evaluation, we demonstrate the effectiveness and reliability of Wavelet Shield Sentinel in various real-world applications.
Downloads
References
Mallat, S. (2009). A Wavelet Tour of Signal Processing: The Sparse Way (3rd ed.). Academic Press. https://doi.org/10.1016/B978-0-12-374370-1.X0001-8
Zhang, Q., Liu, H., & Wang, S. (2024). Keystroke Dynamics Authentication Using Wavelet Packet Decomposition and Deep Learning. IEEE Transactions on Information Forensics and Security, 19(3), 550-565.
Li, X., Chen, J., & Zhang, L. (2023). Wavelet-Based Feature Extraction for Robust Facial Recognition Authentication. Pattern Recognition Letters, 45(6), 890-905.
Chen, J., Zhang, L., & Li, X. (2022). Wavelet-Based Multimodal Biometric Authentication: Fingerprint and Iris Fusion. Journal of Information Security, 20(4), 789-802.
Wang, Y., Liu, Q., & Zhang, W. (2021). Wavelet Analysis in Speech-Based Authentication Systems. IEEE Transactions on Audio, Speech, and Language Processing, 30(5), 1089-1102.
Jain, A. K., & Ross, A. (2008). Handbook of Biometrics (Vol. 3). Springer Science & Business Media.
Prasanth, K. R., & Patnaik, L. M. (2011). Multimodal Biometrics: Human Recognition Systems. Springer Science & Business Media.
Yang, J., Zhang, D., & Frangi, A. F. (2011). Two-dimensional PCA: a new approach to appearance-based face representation and recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(7), 1315-1320.
Hong, B., & You, J. (2013). Multimodal Biometric Fusion Using Wavelet Packet Decomposition. International Journal of Control and Automation, 6(5), 281-288.
Zhang, X., Zhao, D., & Li, W. (2015). Multimodal Biometric Recognition Based on Wavelet Packet Transform. Journal of Applied Mathematics, 2015, 1-8.
Yu, J., & Chen, Z. (2016). A Novel Authentication Algorithm Based on Wavelet Transform. Security and Communication Networks, 9(18), 5171-5179.
Liu, J., Wu, J., & Xu, H. (2018). Wavelet Entropy and Ensemble Empirical Mode Decomposition for Multi-Modal Biometric Fusion. Neurocomputing, 275, 1686-1693.
Kim, D., & Kim, H. (2019). Multimodal Biometric Authentication Using Wavelet Transform and Convolutional Neural Networks. Journal of Information Processing Systems, 15(5), 1154-1163.
Zhang, H., Li, J., & Li, L. (2020). A Novel Multimodal Biometric Authentication System Based on Adaptive Wavelet Packet Transform and Deep Learning. Journal of Ambient Intelligence and Humanized Computing, 11, 1-14.
Chen, Y., Zhang, H., & Liu, Q. (2021). Multimodal Biometric Authentication Using Wavelet Transform and Extreme Learning Machine. Computers, Materials & Continua, 66(1), 541-552.
Goh, K. T., & Heng, S. H. (2022). Fusion of Iris and Palmprint Biometrics Using Wavelet-Based Feature Extraction. IEEE Access, 10, 17896-17909.
Bokefode, S. B., & Mathur, H. (2021). Robust Image Forgery Detection Methodology Based On Glow-Worm Optimization And Support Vector Machine. Webology, 18(6), 3697. ISSN: 1735-188X. http:/www.webology.org
Bokefode Shudhodhan Balbhim, Harsh Mathur. (2022). Performance Analysis Of Image Forgery Detection Using Transform Function And Machine Learning Algorithms. Turkish Journal Of Computer And Mathematics Education (Turcomat), 11(3),2033–2044. https://doi.org/10.17762/turcomat.v11i3.12075
Bokefode, S., Sarwade, J., Sakure, K., Bankar, S., Janrao, S., & Patil, R. (2024). "Using A Clustering Algorithm And A Transform Function, Identify Forged Images." International Research Journal Of Multidisciplinary Studies, 5(1), 781-789. DOI: 10.47857/irjms. 2024.v05i01.0299
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.