Guest editorial

Pages1-1
Published date17 February 2020
DOIhttps://doi.org/10.1108/IDD-02-2020-085
Date17 February 2020
AuthorGang Li,Srikanth Prabhu,Qingfeng Chen,Jia Wu
Subject MatterLibrary & information science,Library & information services,Lending,Document delivery,Collection building & management,Stock revision,Consortia
Guest editorial
Editorial of special issue on information security
and biometrics
As the advances of information technology, an enormously
volume of data is available in different areas,and the capacity to
electronicallystore, transfer and processthose data continues to
grow exponentially. Accordingly, issues such as information
security and data privacy are more challenging,especially when
combined in cyberspace. For example, large volume of data
providesthe potentials to identify personalsensitive information
through privacy attacks together with simple background
knowledge.This serious violation may notbe easy to implement
previously but become possible in the Big Data era. On the
other hand, Biometrics are the emerging measure to quantify a
person using his/her biological properties such as nger print,
face, retina, DNA. To perform any experiment using
information security, feature extraction and classication are
potentially empowered by the biometrics. The eld of
biometrics normally does not go independently, and it is also
possibleto emulate security featuresof biological properties.
BasedonthesubmissionsinInternational Conference on
Applications and Techniques in Information Security (ATIS
2018)and an open call for papers procedure, we selected 5
representative research articles for publication after rigorous peer-
review processes. Towards those above-mentioned challenges,
these articles propose promising solutions and excellent literature
reviews for information security and biometrics. Here, we provide
an integrative perspective of this special issue by summarizing
some of the contribution contained therein.
Palmprints, compared with ot her biometric modalities,
satisfy the critical properties of bi ometric characteristics such
as universality, individuality, stab ility and collectability. But
for images taken from low-cost de vices, how to make the
systems efcient and effective call s for some promising
alternative biometric authent ication. Taouche and Belhadef
(2019) proposed to use multimoda l biometrics by combining
left and right palmprints of an individ ual into an
authentication system. New feat ure descriptors, MB-LDP,
MB-ELDP and MB-LDN are proposed , and then the GA and
BSA are applied to do feature selectio n. Their prototype
system and empirical results show tha t those new features
bring the boost of performance in terms of recognit ion rate.
For online data exchange, sensitiv e information needs to be
protected and transferred by using a re liable mechanism.
Entity authentication in wirele ss networks is challenging for
resource constrained devices su ch as mobile phones, because
this process involves the complex c omputation. In
Prakasha et al. (2019), proposed an en hanced authenticated
key agreement scheme by incorpora ting fast cryptographic
algorithms. Entity authenticat ion is often coupled with the
distribution of session keywith the c ommunicating entity,
and the session key generated is used later to achieve
condentiality and integrity. The formal validation of
the proposed scheme using AVISPA sho ws that the scheme is
safe and secure from potential at tacks. The performance
evaluation of the proposed method d epicts that it also
increases the speed of authentic ation process.
For video surveillance, maintaining the captured videos
usually calls for background modelling, which has played an
imperative role in the moving object detection as progress of
foreground extraction during video analysis. Shahidha and
Maheswari (2019) proposed a background modellingtechnique
that exploits the region-based background subtraction. It also
provides quick response to the real-time scenario with data
inconsistency. Furthermore, RRH algorithm is introduced to
model the background that selects thespecic region in a faster
manner and promotes efcient foreground segmentation.Their
experimental result shows that the proposed mechanism works
well in mostsituations with varying conditions.
Although in this special issue signicant efforts have been made
from the perspectives of different area of information security and
biometrics, we should note that many other exciting areas such as
data privacy and privacy-aware learning are also worthy of being
explored in future. Before the end of this editorial, we would like to
thank the anonymous reviewers for their great efforts in reviewing
the submitted manuscripts; without them this special issue would
not have been published with such high quality. We would also
like to thank the editor-in-chief ofce of Information Discovery and
Delivery for their supportive guidance during the whole process in
the organization of this special issue.
Gang Li
School of Information Technology, Deakin University,
Melbourne, Australia
Srikanth Prabhu
Manipal Academy of Higher Education, Manipal, India
Qingfeng Chen
Guangxi University, Nanning, China, and
Jia Wu
Department of Computing, Macquarie University,
Sydney, Australia
References
Prakasha, K., Muniyal, B. and Acharya, V. (2019),Enhanced
authentication and key agreement for end to end security in
mobile commerce using wireless public key infrastructure,
InformationDiscovery and Delivery, Vol. 1.
Shahidha, B.S. and Maheswari, N. (2019), An effective
foreground segmentation using adaptive region based
background modelling,Information Discovery and Delivery.
Taouche, C. and Belhadef, H. (2019), Multimodalbiometric
system combining left and right palmprints,Information
Discovery and Delivery,Vol. 1.
Thecurrentissueandfulltextarchiveofthisjournalisavailableon
Emerald Insight at: https://www.emerald.com/insight/2398-6247.htm
Information Discovery and Delivery
48/1 (2020) 1
© Emerald Publishing Limited [ISSN 2398-6247]
[DOI 10.1108/IDD-02-2020-085]
1

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT