Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2024, Volume 39 Issue 1   
    Article

    AN EFFICIENT SECURED LS AUTHENTICATION SYSTEM THROUGH FREQUENT PATTERN-GROWTH (FP-GROWTH) TECHNIQUE
    1Dr. A. Devi, 2Ms. R. Lavanya, 3Mr. T. Kumersan.
    Journal of Data Acquisition and Processing, 2024, 39 (1): 770-779 . 

    Abstract

    Laser speckle has been planned in a very variety of works as a high-entropy supply of unpredictable bits to be used in security applications. Bit strings derived from speckle may be used for a range of security functions like identification, authentication, anti-counterfeiting, secure key storage, random variety generation and tamper protection. The selection of laser speckle as a supply of random keys is kind of natural, given the chaotic properties of speckle. This work proposes an optical device speckle recognition system for credibility verification. Owing to the distinctive state surfaces of objects, laser speckle provides diagnosable features for authentication. A Gabor filter, SIFT (Scale-Invariant Feature Transform), and projection were wont to extract the features of optical device speckle images. To accelerate the matching method, the extracted Gabor features were organized into an indexing structure using the modified K-means algorithm. The special relations among the matching points are then remodeled to 9DLT (Direction Lower Triangular) representations. Then, the Frequent Pattern Growth (FP-Growth) algorithm mines frequent patterns therefore a helpful association rule is obtained because the feature to spot the similarity between every of the speckle pictures for the aim of credibility verification. Plastic cards were used because the target objects within the planned system and also the hardware of the speckle capturing system was designed. The experimental results showed that the retrieval performance of the planned methodology is correct once the information contains 516 optical device speckle pictures. The planned system is powerful and possible for credibility verification.

    Keyword

    Image Processing, Imaging Systems, Pattern Recognition, Optical Security and Encryption, K-means algorithm, FP-Growth algorithm, Direction Lower Triangular.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved