WaveSafe Guardian: Enhanced Security Shield with Wavelet Analysis

Authors

  • Shudhodhan Bokefode, Jayesh Sarwade, Kishor Sakure, Sonali Rangdale, Pournima Sutar, Somnath Mule Sachin Rathod

Keywords:

Wavelet analysis, Support Vector Machine, Authentication, Security, Verification.

Abstract

In an era of escalating cyber threats and increasing concerns over data security, the development of robust authentication systems is imperative. This paper presents Wavelet Shield Sentinel, a novel approach that combines wavelet analysis with support vector machine (SVM) technology to create a highly secure verification system. The integration of wavelet transforms enhances the system's ability to extract relevant features from complex data sets, while SVM provides a powerful classification framework for authentication. Wavelet Shield Sentinel offers advanced security measures to safeguard sensitive information and prevent unauthorized access or fraudulent activities. Through extensive experimentation and evaluation, we demonstrate the effectiveness and reliability of Wavelet Shield Sentinel in various real-world applications.

Downloads

Download data is not yet available.

References

Mallat, S. (2009). A Wavelet Tour of Signal Processing: The Sparse Way (3rd ed.). Academic Press. https://doi.org/10.1016/B978-0-12-374370-1.X0001-8

Zhang, Q., Liu, H., & Wang, S. (2024). Keystroke Dynamics Authentication Using Wavelet Packet Decomposition and Deep Learning. IEEE Transactions on Information Forensics and Security, 19(3), 550-565.

Li, X., Chen, J., & Zhang, L. (2023). Wavelet-Based Feature Extraction for Robust Facial Recognition Authentication. Pattern Recognition Letters, 45(6), 890-905.

Chen, J., Zhang, L., & Li, X. (2022). Wavelet-Based Multimodal Biometric Authentication: Fingerprint and Iris Fusion. Journal of Information Security, 20(4), 789-802.

Wang, Y., Liu, Q., & Zhang, W. (2021). Wavelet Analysis in Speech-Based Authentication Systems. IEEE Transactions on Audio, Speech, and Language Processing, 30(5), 1089-1102.

Jain, A. K., & Ross, A. (2008). Handbook of Biometrics (Vol. 3). Springer Science & Business Media.

Prasanth, K. R., & Patnaik, L. M. (2011). Multimodal Biometrics: Human Recognition Systems. Springer Science & Business Media.

Yang, J., Zhang, D., & Frangi, A. F. (2011). Two-dimensional PCA: a new approach to appearance-based face representation and recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(7), 1315-1320.

Hong, B., & You, J. (2013). Multimodal Biometric Fusion Using Wavelet Packet Decomposition. International Journal of Control and Automation, 6(5), 281-288.

Zhang, X., Zhao, D., & Li, W. (2015). Multimodal Biometric Recognition Based on Wavelet Packet Transform. Journal of Applied Mathematics, 2015, 1-8.

Yu, J., & Chen, Z. (2016). A Novel Authentication Algorithm Based on Wavelet Transform. Security and Communication Networks, 9(18), 5171-5179.

Liu, J., Wu, J., & Xu, H. (2018). Wavelet Entropy and Ensemble Empirical Mode Decomposition for Multi-Modal Biometric Fusion. Neurocomputing, 275, 1686-1693.

Kim, D., & Kim, H. (2019). Multimodal Biometric Authentication Using Wavelet Transform and Convolutional Neural Networks. Journal of Information Processing Systems, 15(5), 1154-1163.

Zhang, H., Li, J., & Li, L. (2020). A Novel Multimodal Biometric Authentication System Based on Adaptive Wavelet Packet Transform and Deep Learning. Journal of Ambient Intelligence and Humanized Computing, 11, 1-14.

Chen, Y., Zhang, H., & Liu, Q. (2021). Multimodal Biometric Authentication Using Wavelet Transform and Extreme Learning Machine. Computers, Materials & Continua, 66(1), 541-552.

Goh, K. T., & Heng, S. H. (2022). Fusion of Iris and Palmprint Biometrics Using Wavelet-Based Feature Extraction. IEEE Access, 10, 17896-17909.

Bokefode, S. B., & Mathur, H. (2021). Robust Image Forgery Detection Methodology Based On Glow-Worm Optimization And Support Vector Machine. Webology, 18(6), 3697. ISSN: 1735-188X. http:/www.webology.org

Bokefode Shudhodhan Balbhim, Harsh Mathur. (2022). Performance Analysis Of Image Forgery Detection Using Transform Function And Machine Learning Algorithms. Turkish Journal Of Computer And Mathematics Education (Turcomat), 11(3),2033–2044. https://doi.org/10.17762/turcomat.v11i3.12075

Bokefode, S., Sarwade, J., Sakure, K., Bankar, S., Janrao, S., & Patil, R. (2024). "Using A Clustering Algorithm And A Transform Function, Identify Forged Images." International Research Journal Of Multidisciplinary Studies, 5(1), 781-789. DOI: 10.47857/irjms. 2024.v05i01.0299

Downloads

Published

24.03.2024

How to Cite

Jayesh Sarwade, Kishor Sakure, Sonali Rangdale, Pournima Sutar, Somnath Mule Sachin Rathod , . S. B. (2024). WaveSafe Guardian: Enhanced Security Shield with Wavelet Analysis. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 2492–2499. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5721

Issue

Section

Research Article