World Wide Web

, Volume 22, Issue 4, pp 1751–1764 | Cite as

Proximal spatial vector and affinity coefficient for multimodal biometric secured social network communication

  • Jayanthi SivasubramaniamEmail author
  • C. Chandrasekar


Using multimodalities, the field of biometric is receiving widespread acceptance for efficient communication between users in social network. Hence, suitable designing of authentication and access control is highly required to perform analysis of system in social network domain. In this work, a Proximal Spatial Vector and Affinity Coefficient (PSV-AC) framework is designed with the objective of ensuring authentic communication between users in social network using face and fingerprint. Initially, multimodal user biometric features with proximal feature pixel stored in spatial vector are gene encoded to obtain biometric identity keys. User authenticity is authorized by decoding gene encoded biometric features using biometric identity keys. User Affinity Coefficient is calculated via antecedent instances shared between different social users. The social network user’s affinity coefficient is ordered in a matrix. Matrix ranking is then performed to identify whether authentic user social communication happened in network. Experiments have been carried out using BioSecure datasets to measure the performance in terms of number of social users, social network authentication time, access control time, multimodal biometric feature template size, and true positive rate.


Multimodal biometric Social network Spatial vector Affinity coefficient Matrix ranking 



  1. 1.
    Al Bouna B., Chbeir R., Marrara S.: Enforcing role based access control model with multimedia signatures. Elsevier, J. Syst. Archit., 55(4): 264–274 (2009)Google Scholar
  2. 2.
    Althobaiti O., Al-Rodhaan M, Al-Dhelaan A.: An efficient biometric authentication protocol for wireless sensor networks”, Hindawi, International Journal of Distributed Sensor Networks, 2013, 1–13 (2013)Google Scholar
  3. 3.
    Chen, S., Fan, J.: Measuring corporate social responsibility based on a fuzzy analytical hierarchy process. I. J. Computer Network and Information Security. 3, 13–22 (2011)CrossRefGoogle Scholar
  4. 4.
    Hongxin, H., Ahn, G.-J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614–1627 (2013)CrossRefGoogle Scholar
  5. 5.
    Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation. Computer and Communications Security. 411–415 (2011)Google Scholar
  6. 6.
    Kanhangad, V., Kumar, A., Zhang, D.: Contactless and pose invariant biometric identification using hand surface. IEEE Trans. Image Process. 20(5), 1415–1424 (2011)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Lai, L., Ho, S.-W., Poor, H.V.: Privacy–security trade-offs in biometric security systems—part I: single use case. IEEE Transactions on Information Forensics and Security. 6(1), 122–139 (2011)CrossRefGoogle Scholar
  8. 8.
    Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web. Springer 14(4), 407–430 (2011)Google Scholar
  9. 9.
    Limsaiprom, P., Praneetpolgrang, P., Subsermsri, P.: Visualization of influencing nodes in online social networks. I. J. Computer Network and Information Security. 6, 9–20 (2014)CrossRefGoogle Scholar
  10. 10.
    Meligy, A.M., M. Ibrahim, H., F. Torky, M.: Identity verification mechanism for detecting fake profiles in online social networks. I. J. Computer Network and Information Security. 9, 31–39 (2017)CrossRefGoogle Scholar
  11. 11.
    Park, H.-A., Hong, J.W., Park, J.H., Zhan, J., Lee, D.H.: Combined authentication-based multilevel access control in Mobile application for daily life service. IEEE Trans. Mob. Comput. 9(6), 824–837 (2010)CrossRefGoogle Scholar
  12. 12.
    Shehab, M., Squicciarini, A., Ahn, G.-J., Kokkinou, I.: Access control for online social networks third party applications. Elsevier, Computers & Security. 31(8), 897–911 (2012)CrossRefGoogle Scholar
  13. 13.
    Shu, Y., Gu, Y., Chen, J.: Dynamic authentication with sensory information for the access control systems. IEEE Transactions on Parallel and Distributed systems. 25(2), 427–436 (2013)Google Scholar
  14. 14.
    Sitova, Z., Sedenka, J., Yang, Q., Ge, P., Zhou, G., Gastiy, P., Balagani, K.: HMOG: new behavioral biometric features for continuous authentication of smart phone users. IEEE Transactions on Information Forensics and Security. 1–16 (2015)Google Scholar
  15. 15.
    Sobh, T.S.: Wi-fi networks security and accessing control. I. J. Computer Network and Information Security. 5, 9–20 (2013)CrossRefGoogle Scholar
  16. 16.
    Stokkenes, M., Ramachandra, R., Busch, C.: Biometric authentication protocols on smartphones – An Overview. International Conference on Security of Information and Networks. 136–140 (2016)Google Scholar
  17. 17.
    Suna, X., Li, M., Wang, H.: A family of enhanced (L, α)-diversity models for privacy preserving data publishing. Futur. Gener. Comput. Syst., Elsevier, July 2010Google Scholar
  18. 18.
    Trewin, S., Swart, C., Koved, L., Martino, J., Singh, K., David, S.B.: Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption. Computer Security Applications. 159–168 (2012)Google Scholar
  19. 19.
    Wang, H., Sun, L.: Trust-involved access control in collaborative open social networks”, 2010 Fourth International Conference on Network and System SecurityGoogle Scholar
  20. 20.
    Zhang, J., Tao, X., Wang, H.: Outlier detection from large distributed databases. World Wide Web, Springer, May 2013Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Research ScholarBharathiar UniversityCoimbatoreIndia
  2. 2.Department of Computer SciencePeriyar University (State Govt.)SalemIndia

Personalised recommendations