This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subjects and it achieved 94% recognition accuracy. A crypto-tool software was used to perform the randomness test on the proposed RSA and SHA256.
Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreLow-Density-Parity-Check (LDPC) codes are a cornerstone for achieving robust error correction capabilities in 5G New Radio applications, significantly improving the reliability of data transmission across noisy and unpredictable wireless channels. Since an evaluation and discussion of the performance with channel coding is significantly absent in two-dimensional Index Modulation (IM)-Differential Chaos Shift Keying (DCSK) schemes. Therefore, in this study, the 5G new radio LDPC codes based generalized joint subcarrier-time index modulation DCSK system (5G NR-LDPC-GJSTIM-DCSK) is proposed, where 5G NR-LDPC codes are used as channel coding. The aim is to improve the system’s performance specifically across AWGN (additive white gauss
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreThe accurate 3-D coordinate's measurements of the global positioning systems are essential in many fields and applications. The GPS has numerous applications such as: Frequency Counters, Geographic Information Systems, Intelligent Vehicle Highway Systems, Car Navigation Systems, Emergency Systems, Aviations, Astronomical Pointing Control, and Atmospheric Sounding using GPS signals, tracking of wild animals, GPS Aid for the Blind, Recorded Position Information, Airborne Gravimetry and other uses. In this paper, the RTK DGPS mode has been used to create precise 3-D coordinates values for four rover stations in Baghdad university camp. The HiPer-II Receiver of global positioning system was used to navigate the coordinate value. The results wil
... Show MoreGender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea
... Show MoreMaintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the
... Show More