IoT and Blockchain Based Intelligence Security System For Human Detection Using An Improved ACO and Heap Algorithm
IoT and Blockchain Based Intelligence Security System For Human Detection Using An Improved ACO and Heap Algorithm
fingerprint example and it born-again into a computer memory E. Software Level Design
unit stream and detain an information. Software level design can be included minutiae
IV. OBJECTIVES AND SPECIFIC AIMS extraction, template construction, storing the template or
processing data as byte streams to decentralized Blockchain
The main objectives and specific aims are: database system and fingerprint matcher.
x To study and find the limitations of Basic ACO
Algorithm.
x To develop the improved version of Basic ACO
Algorithm by removing the limitations.
x To apply the improved version of Basic ACO
Algorithm in the required steps of our IoT and
Blockchain based Intelligence Security System.
x To increase the image quality.
x To keep data in database (Decentralized Blockchain)
as byte stream.
x To establish a better security system.
x To develop an IoT and Blockchain based Intelligence
Security System.
x To get a better accuracy (Recognition Rate).
x To detect the Human (Male or Female).
V. METHODOLOGY
A. System Implementation
Our IoT and Blockchain based intelligence security
system for human detection using an improved version of
ACO algorithm and Heap algorithm consist of three parts as
shown in fig.1.
x To improve the ACO algorithm
x To detect human using this improved ACO algorithm
and Heap algorithm
x To store the data in decentralized Blockchain as byte
streams for ensuring the security of our system using
Secure Hash Algorithm (SHA).
B. Improving ACO Algorithm
Graph based basic ACO works as without local search
and without degree constraint. We have proposed to modify
the basic ACO algorithm with local search and with degree
constraint. This improved ACO algorithm can be used to Fig. 1. Proposed Methodology
represent the fingerprint data by detecting the core point of
fingerprint which can be the root of Heap tree and minutiae
i.e., bifurcation and end point can be the child node of Heap
tree.
C. Detecting Human
We have proposed here an IoT and Blockchain based
Intelligence Security System for Human Detection by
fingerprint recognition using an Improved ACO and Heap
Algorithm. We proposed IoT and Blockchain Based
Technology for ensuring the security of our system.
D. Hardware Level Design: Sensor Fig. 2. Fingerprint Sensor (IoT device)[13]
Fingerprint image can be live scanned or captured by an
electronic device called scanner or sensor device as shown in F. Minutiae Extractor
fig. 2 . For the development of a minutia extractor, we can
process the pre-processing, minutia extraction and post-
processing stages.
1793
Authorized licensed use limited to: Bahria University. Downloaded on April 05,2024 at 14:25:28 UTC from IEEE Xplore. Restrictions apply.
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
G. Pre-processing
In pre-processing stage, we can do two vital operations
such as fingerprint image enhancement and binarization. Then
next step is binarization by using ACO algorithm.
H. Image Enhancement
We can enhance the inputting fingerprint image by using
us modified ACO algorithm for increasing the image quality.
It is very necessary to get accurate result from final stage.
I. Image Binarization Fig. 3. Minimum heap tree from minutiae points
J. Minutiae extraction
The minutiae extraction can be done by following two
steps as the thinning process and minutiae marking process. Fig. 4. Template storing process in our system
1794
Authorized licensed use limited to: Bahria University. Downloaded on April 05,2024 at 14:25:28 UTC from IEEE Xplore. Restrictions apply.
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
1795
Authorized licensed use limited to: Bahria University. Downloaded on April 05,2024 at 14:25:28 UTC from IEEE Xplore. Restrictions apply.