Brunel University Research Archive (BURA) >
College of Engineering, Design and Physical Sciences >
Dept of Electronic and Computer Engineering >
Dept of Electronic and Computer Engineering Thesis >
Please use this identifier to cite or link to this item:
|Title: ||Multibiometric security in wireless communication systems|
|Authors: ||Sepasian, Mojtaba|
|Advisors: ||Balachandran, W|
|Keywords: ||Voice recognition|
|Publication Date: ||2010|
|Publisher: ||Brunel University School of Engineering and Design PhD Theses|
|Abstract: ||This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and
WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition.
First is the enrolment phase by which the database of watermarked fingerprints with
memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel.
Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user.
The following three steps then involve speaker recognition including the user
responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user.
In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint
image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and
sliding neighborhood) have been followed with further two steps for embedding, and
extracting the watermark into the enhanced fingerprint image utilising Discrete
Wavelet Transform (DWT).
In the speaker recognition stage, the limitations of this technique in wireless
communication have been addressed by sending voice feature (cepstral coefficients)
instead of raw sample. This scheme is to reap the advantages of reducing the
transmission time and dependency of the data on communication channel, together
with no loss of packet. Finally, the obtained results have verified the claims.|
|Description: ||This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.|
|Appears in Collections:||Electronic and Computer Engineering|
Dept of Electronic and Computer Engineering Thesis
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.