Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
8 results
Search Results
Item A Novel Fingerprint Image Enhancement based on Super Resolution(Institute of Electrical and Electronics Engineers Inc., 2020) Muhammed, A.; Pais, A.R.Fingerprint is a most common and broadly accepted biometric trait used for personal authentication. In fingerprint-based authentication, the feature extraction module extract features, and these extracted characteristics are used for authentication. In fingerprints, the feature extraction module heavily depends on the status of the image. However, in practice, always getting a good quality fingerprint image is not possible. Moreover, a notable number of fingerprints collected are of poor quality. The accurate extraction of fingerprint characteristics from a lesser quality fingerprint image is a challenging problem. Fingerprint enhancement is introduced to resolve this issue. Hence in this paper, we introduce a fingerprint enhancement technique using a Deep Convolution Neural Network (DCNN), which improves image quality. The proposed method consists of super-resolution, followed by filtering and enhancement. The proposed method provides better results as compared with the conventional fingerprint enhancement methods. The experimental results determine that the proposed strategy improves the visual clarity of low-quality images and reduces the error rates during the fingerprint matching. © 2020 IEEE.Item Impact of Rhetorical Roles in Abstractive Legal Document Summarization(Institute of Electrical and Electronics Engineers Inc., 2024) Muhammed, A.; Muslihuddeen, H.; Sankar, S.; Anand Kumar, M.This paper explores the relationships between rhetorical roles and the summarization of legal documents. By employing automated interpretation techniques, we segment legal judgment documents and identify rhetorical roles, treating it as a 13-class labeling problem. Using CRFs and a BiLSTM architecture, we extract rhetorical roles. Our study extends further by employing an ensemble summarizer to examine the impact of each rhetorical role on the summarization process and evaluate the same using ROGUE and BLEU scores. Through experimentation, we explore the impact of selecting individual rhetorical roles from the documents, thereby facilitating a comprehensive analysis of its effect on various scoring metrics. Our analysis reveals that certain roles, such as FAC and ANALYSIS, contribute significantly to summary quality, while others like ISSUE, have a less pronounced impact which interestingly also tend to be included in the summary almost verbatim, underscoring their inherent utility in the summarization process. By shedding light on this process, our research aims to equip researchers with valuable insights into streamlining summarization techniques, potentially reducing the volume of text data processed. Ultimately, these findings could pave the way for the development of more efficient summarization algorithms tailored to different roles in legal documents, enhancing accessibility and comprehension for professionals and researchers alike. © 2024 IEEE.Item A Novel Cancelable Fingerprint Template Generation Mechanism Using Visual Secret Sharing(Springer Science and Business Media Deutschland GmbH, 2024) Muhammed, A.; Pais, A.R.In fingerprint-based authentication system, cancelable fingerprint templates are generated to defend the fingerprint information. In this paper, we proposed a novel cancelable fingerprint template using Visual Secret Sharing (VSS). Using VSS, each fingerprint image is encrypted into different shares. Finally, these shares are preserved in distinct databases and treated as fingerprint template. Traditional VSS schemes are suffering from pixel expansion and contrast reduction. We have used grid-based VSS and data embedding mechanisms to succeed these limitations. The proposed fingerprint templates satisfy ideal properties of cancelable templates such as non-invertibility, diversity, and revocability without altering the performance of the authentication system. To enhance the speed of the template generation and reconstruction, we have used General Purpose Graphical Processing Unit (GPGPU) to fulfill the operations. The experimental evaluation validates that the reconstructed fingerprints have equivalent performance as the initial fingerprints with upgraded security. © Springer Nature Switzerland AG 2024.Item Assessment on durability of lightweight concrete using alkali modified fly ash based atrificial coarse aggregate (FACA)(Taylor and Francis Ltd., 2023) Muhammed, A.; Palanisamy, T.; Shanmugamoorthy, S.Thermal power plant is the backbone of India’s energy generation comprising of more than 50%. Since Indian coal is of low grade with ash content of the order of 30–55% in comparison with imported coal which has low ash content of the order of 3–15%, huge piles of fly ash is left over which poses environmental degradation. In order to reduce its harmful effects on environment, we have to reuse/recycle this industrial by-product. As concrete contains 80% coarse aggregate, huge quantity of fly ash waste can be utilized if we reuse it as artificial coarse aggregate. This work compiles the results of a pilot scale study on durability properties of concrete made from fly ash-based artificial coarse aggregate (FACA). The molarity of NaOH, NaOH-to-Na2SiO3 ratio and alkaline-solution-to-fly-ash ratio used in this research are 8 M, 0.5 and 0.4 respectively. The coarse aggregate is produced by crushing the geopolymer mass in a crusher. The fundamental durability properties of the concrete (FACACRETE) prepared from FACA is compared with the conventional concrete (using crushed granite stone) at M20, M25 and M30 grades of concrete. It is observed that on increasing the grade of concrete, the ultrasonic pulse velocity test gives better result for both conventional concrete and FACACRETE. © 2022 Taylor & Francis Group, LLC.Item Experimental Investigation on FACA and FACACRETE — An Innovative Building Material(Springer Verlag service@springer.de, 2019) Muhammed, A.; Palanisamy, P.Recently, many studies are put forward by researchers to utilize waste materials like fly ash, GGBS, etc. in the construction industry due to the problems arise in the disposal of these materials. A novel study on incorporating the FACA (fly ash artificial coarse aggregate) in concrete is illustrated in this paper by comparing fly ash artificial coarse aggregate concrete (FACACRETE) with normal concrete. Different mixtures of geo-polymers were prepared using different molarities of NaOH solution and varying alkaline solution to fly ash ratio. These mixtures were cast to form a hard mass and cured. It is then pulverized in to fly ash artificial coarse aggregates (FACA). The properties of FACA were determined and are compared with conventional coarse aggregates. From the experiment, it is found that the FACA is a lightweight aggregate. It can be used for wearing as well as non - wearing surfaces as per IS: 383 - 2016. It is found that 8MA1 (8 Molar NaOH solution and 0.4 is the alkaline solution to fly ash ratio) is economical and can be used for further research as NaOH needed is less. This mix (8MA1) of FACA is used to prepare fly ash artificial coarse aggregate concrete (FACACRETE). The mechanical properties of both normal concrete and FACACRETE are compared and the results suggest that the compressive, splitting tensile, flexural strengths and the stress - strain relationship of FACACRETE is comparable with conventional concrete of same grade as per IS 456. The compressive toughness and compressive index of the FACACRETE is found to be more than the conventional concrete. The failure pattern of FACACRETE is associated with multiple cracking and that of normal concrete is localized failure. On considering the experimental investigations conducted here, it is found that the FACA can be used to replace conventional coarse aggregate in concrete. © 2019, Korean Society of Civil Engineers.Item A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution(Springer, 2021) Muhammed, A.; Mhala, N.C.; Pais, A.R.Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into n shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.Item Secure latent fingerprint storage and self-recovered reconstruction using POB number system(Elsevier B.V., 2023) Muhammed, A.; Pais, A.R.Latent fingerprints are the unintentionally deposited fingerprint impressions gathered from the crime scenes. Many criminal investigation agencies consider latent fingerprints as a significant court accepted evidence. A typical latent fingerprint comes in low quality. Hence, a slight modification in the latent fingerprint may induce a marked shift in the recognition performance. Due to this, wrongdoers behind the crime scenes may try to remove or alter the latent fingerprint information by accessing the fingerprint database. Unlike regular fingerprint enrollment, retaking a latent fingerprint is not always possible. Preserving the latent fingerprints in a single database makes it vulnerable to single-point attacks. Hence, this paper presents a secure way to store and retrieve latent fingerprint information using POB-based (n,n) VSS technique. The proposed method encrypts each latent fingerprint as n secret shares, and stores them in n distinct databases. The distributed storage protects the data from single-point attacks. Along with secure storage, we also introduce a self-recovery mechanism in the case of fingerprint share tampering. The self-recovery mechanism protects the latent fingerprint from different tampering attacks. The proposed method has been evaluated using NIST Special Database4 (NIST-SD4) and IIIT Delhi latent fingerprint datasets. The experimental results show that the proposed technique offers secure distributed storage with lossless reconstruction of latent fingerprint images whenever needed. The proposed self-recovery mechanism enables the recovery of latent fingerprint images even in the case of share tampering. © 2023Item A secure fingerprint template generation mechanism using visual secret sharing with inverse halftoning(Academic Press Inc., 2023) Muhammed, A.; Pais, A.R.Fingerprints are the most popular and widely practiced biometric trait for human recognition and authentication. Due to the wide approval, reliable fingerprint template generation and secure saving of the generated templates are highly vital. Since fingers are permanently connected to the human body, loss of fingerprint data is irreversible. Cancelable fingerprint templates are used to overcome this problem. This paper introduces a novel cancelable fingerprint template generation mechanism using Visual Secret Sharing (VSS), data embedding, inverse halftoning, and super-resolution. During the fingerprint template generation, VSS shares with some hidden information are formulated as the secure cancelable template. Before authentication, the secret fingerprint image is reconstructed back from the VSS shares. The experimental results show that the proposed cancelable templates are simple, secure, and fulfill all the properties of the ideal cancelable templates, such as security, accuracy, non-invertibility, diversity, and revocability. The experimental analysis shows that the reconstructed fingerprint images are similar to the original fingerprints in terms of visual parameters and matching error rates. © 2023 Elsevier Inc.
