Vous êtes sur la page 1sur 7

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-4, Issue-3, Mar- 2017]

https://dx.doi.org/10.22161/ijaers.4.3.39 ISSN: 2349-6495(P) | 2456-1908(O)

Hybrid Model Based on User Tags and Textual


Passwords and Pearsonian Type III Mixture
Model
Pavan Gujjar Panduranga Rao1, Dr.P.Srinivasa Rao2, Dr. G. Lavanya Devi3
1
Research Scholar, Department of Computer Science and System Engineering, Andhra University College of Engineering
(A),Vishkhapatanam, Andhra University, India
2,3
Professor, Department of Computer Science and System Engineering, Andhra University College of Engineering(A),
Andhra University, Vishkhapatanam, Andhra Pradesh, India

Abstract The latest advancements in Science and vector in the image regions are left skewed. But in some
Technology, have witnessed radical changes in the image the pixel intensities of the image regions may not
banking system. Today most of the banks adopt the net be left skewed. They may have long upper tail with a
banking facility and most of the users are also addicted to right skewed nature. To segment these types of images, it
this system. Accordingly, most of the transactions are now is needed to consider that the pixel intensities of the
online based and much emphasis is therefore needed to image regions follow a right skewed distribution. Hence,
ensure the security of authenticating a person and in this research article we develop and analyze image
validating the transaction. Many models are therefore segmentation method based on mixture of Pearsonian
proposed in the literature. Most of these are an Type III Distribution. The Pearsonian Type III
alphanumeric based password schemes or biometric Distribution is capable of portraying right skewed and
schemes or graphical password based schemes. Each of long upper tail distributions. Here, it is assumed that the
these models is proposed by underlying an advantage. pixel intensities of each image region follow Type III
The alphanumeric passwords are proposed, with the Pearsonian Distribution and the pixel intensities in the
assumption that generating the password is easy and the whole image is characterized by a finate mixture of
generated password is unique, the biometric password Pearsonian Type III Model.
schemes are proposed with the assumption that tampering
a biometric is next to impossible. Graphical passwords II. PEARSONIAN TYPE III MIXTURE
are proposed with an option to the user so that he can DISTRIBUTION
select an image of his choice and then select some points In any image analysis, the entire image is considered as a
which is called a click pattern, which is unique to every union of several image regions. In each image region the
user. image data is quantified by pixel intensities. The pixel
Keywords Graphical Password Authentication, intensity z = f ( x , y ) for a given point (pixel) (x, y) is a
Pearsonian Type III Mixture Model, Statistics, random variable, because of the fact that the brightness
Probabilistic model, MIR Flickr. measured at a point in the image is influenced by various
random factors like vision, lighting, moisture,
I. INTRODUCTION- PEARSONIAN TYPE III environmental conditions etc. To model the pixel
MIXTURE MODEL intensities of the animal and human image regions, it is
In the earlier research work, we developed and analyzed a assumed that the pixel intensities of the region follow a
model for segmentation based on the mixture Pearsonian Pearsonian Type III Distribution (PTIIID). The
Type I Distribution with K-means algorithm. These probability density function of the pixel intensity is
models are useful when the pixel intensities of the feature

qi ai
q a l ai ai
z
f i z | ai , qi q a
i i

e q z l s
i s
,ai zs , q1
e aqi ai l
(Equation-1)
a1
i i

amma Function

www.ijaers.com Page | 245


International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-4, Issue-3, Mar- 2017]
https://dx.doi.org/10.22161/ijaers.4.3.39 ISSN: 2349-6495(P) | 2456-1908(O)
For different values of the parameters the various shapes Z1, Z2,.,ZN drawn from an image with probability
of probability curves associated with Pearsonian Type III density function is given in
Distribution are shown in Figure-1. equation 1.


N
L p Z s , 1
S 1
N
K
That is L 1 f i Z S ,
S 1 i l
This implies
K
K
L log i f i Z S ,
S l i l
i,i=1,2,K) is the set of parameters
N K (q a ) z
qi ai

log L( ) log qi ai i i i e qi zs 1 s
e ai (qi ai 1)
s 1
i 1 ai

(Equation-2)
The beginning step of the Expectation Maximization
algorithm requires the initialization of two parameters
( ai qi ; i=1,2,k) and component weights
Fig.1: Frequency Curves of Pearsonian Type III ( i ; i 1,2,..., K ) from the observed values. The idea
Distribution
of EM algorithm is to iteratively calculate Maximum
likelihood estimates of unknown parameters
The entire animal and human image is a collection of
regions which are characterized by Pearsonian Type III (ai qi i; i 1,2,...,K )
Distribution. Here, it is assumed that the pixel intensities
of the whole image follow a K-component mixture of E-STEP :
Pearsonian Type III Distribution and its probability In the expectation (E) step, the expectation value
density function is of the form: of log L( ) with respect to the initial parameter vector
(0)
K
pz i f i z | ai , qi
i l
Q ; (0) E ( 0 ) log L( ) / z
Where, K is number of regions, 0 i 1 are weights
Given the initial parameters
(0)
, one can compute the
such that i 1 and is f i z | ai , qi as given in
density of pixel intensity z s as
equation (1) i is the weight associated with ith region K N
p( zs , (1) ) i fi ( zs , (1) ),L( ) p(zs , (1) )
(1)
in the whole image.
In general the pixel intensities in the image regions are i1 s1

statistically correlated and these correlations can be K K



reduced by spatial sampling (Lei T. and Sewehand W. This implies log L( ) log i f i ( zs , (1) )
(1992)) or spatial averaging (Kelly P.A.et al (1998)). i 1 i1
After reduction of correlation, the pixels are considered to (Equation-3)
be uncorrelated and independent. The mean pixel The conditional probability of any observation z s ,
K belongs to any region K is
intensity of the whole image is E Z i i
i l (1) f k ( z s , (1) (1) f ( z , (1)
t k ( z s , (1) ) k k k s
p( z s , ) (1)

K
(1)

(1)
i 1 k f k ( z s , )
III. INDENTATIONS AND EQUATIONS

In this section, it is derived estimates of the model


parameters using Expectation Maximization (EM) The conditional of the log likelihood function of the
sample is

algorithm. The likelihood function of the observations
given by
Q ; (0) E ( 0 ) log L( ) / z

www.ijaers.com Page | 246


International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-4, Issue-3, Mar- 2017]
https://dx.doi.org/10.22161/ijaers.4.3.39 ISSN: 2349-6495(P) | 2456-1908(O)
Following the heuristic arguments of Jeff A. Bilmes For obtaining the estimation of the model parameters one
(1997) we have
has to maximize Q ;
such that 1 . This
(1)
i 1
K

t ( z log
K N
Q ; , ) log f i ( z s ,
(1) (1) (1) (l )
i s i )) can be solved by applying the standard solution method
i 1 s 1

(Equation-4) for constrained maximum by constructing the first order


But we have Lagrange type function,
K
(l )
qi ai s E (log L( )) 1 i
z
( qi ai 1)
(l )

(qi , ai ) i 1
f i ( z / ai , qi ) e qi zs 1 s
e ai (qi , ai 1)
qi ,ai
ai (Equation-5)
Where, is Lagrange multipliers combining the
and constraint with the log likelihood function to be
(t ( z
K N
Q ; (1) , (1) ) log f i ( z s , (1) log i maximized
(l )
i s )
i 1 s 1
S
Hence, 0
M-STEP: i

This implies

qi ai
qi zs zs
( qi ai 1)
K N
(1) (qi , ai ) 1 i 0
K

i s
i i1 s1
(t ( z , ) l o g
e qi ,ai ai (qi , ai 1)
e 1 l o g i
i 1
ai


This implies
Summing both sides over all observations, we get
N
1 N
i
N
t (z
s 1
i s , (1) )
Therefore
i th
The updated equation of for (l+1) iteration is

N
1
t ( z ,
( l 1)
i i s
(1)
)
N s 1


1 N ( l ) f ( z , (1) )

N

s 1
K
i i s

i
(l ) (1)
f i ( z s , )
i 1
(Equation-6)

For updating the parameter ai ; i=1,2,k we consider the derivative of Q ; (1)



with respect to ai and equate it to zero.

We have

Q ; (1) E (log L( (l ) )

Therefore i

Q ; (1) 0
implies
E (log L( (l ) ) 0

www.ijaers.com Page | 247


International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-4, Issue-3, Mar- 2017]
https://dx.doi.org/10.22161/ijaers.4.3.39 ISSN: 2349-6495(P) | 2456-1908(O)

K N (l )
i s
i i 1 s 1
(t ( z , (1)
)(log f i ( z s , (1)
) log i )) 0


K N qi ai
qi zs zs

( qi ai 1)
(qi , ai ) 0
(1)
log i
(l )
(t ( z , )

e 1
i i1 s1 log e ai (qi , ai 1)
i s qi ,ai
ai

K N z
i
(q a 1) log(q a ) log a q a log((q a 1)) q z
i i i i i i i i i i s qi ai log1 s ti ( z s , (1) ) 0
i 1 s 1 ai
N
(qi ai 1) z zs
(q ) log(q a )
i i i qi qi qi log1 s qi (qi ai 1)ti ( zs , ) 0
ai ai zs
(1)

s 1 qi ai
N a zs ai z s
q qi (qi ai 1)ti ( z s , ) 0
1
(1)
logqi ai i
ai z s
i
s 1
ai ai
N
ai z s 1 N


s 1 ai z s
qi (qi ai 1) qi log(qi (ai z s )) ti ( z s , (1) ) t ( z ,
i s
(1)
)
ai s 1
N
t i ( z s , (1) )
ai
s 1 ai z s
qi ( qi ai 1) qi log( qi ( ai z s )) t i ( z s , (1) )
ai z s
The updated equation of ai at (l+l)th iteration is

ai l l

N

t i Z s , l
l
qi z s
s 1
l qil qil ail 1 q logq a a
l l l

z s ti z s , 1
ai z s
i i i i

i1 f i z s , (1)
Where ti z s , (1)
f z ,
K
1 (1)
i i s
i 1

For updating the parameter qi, i=1,2,.,K we consider the derivative of Q


With respect to qi and equate it to zero
We have Q( ; (l ) E log L( ; (l )
log L( ; ( l )
Therefore q Q( ; ) 0 implies 0
(l )
E
i
qi
K N

qi i 1 s 1

(ti zs , 1 (log fi ( zs , 1 log i )) 0
(l )


z
qi ai log1 s ti zs , 1 0
K N

qi
(q a 1) log(q a ) log a q a log((q a 1)) q z
i i i i i i i i i i s
i 1 s 1 ai

www.ijaers.com Page | 248


International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-4, Issue-3, Mar- 2017]
https://dx.doi.org/10.22161/ijaers.4.3.39 ISSN: 2349-6495(P) | 2456-1908(O)

zs

K N

qi


( q a
i i 1) log( q a
i i ) log ai q a
i i log( ( q a
i i 1)) q z
i s q a
i i log 1
1 ti zs , 0
i 1 s 1 ai
l


qi ai zs
z a e log z dz
log( q a ) (qi ai 1)ai q z a log 1 zs 0
N s i s s
t z , 1 0
i i i i s i l
i s
qi ai ai
0 zs aie dzs
s 1 qi ai zs


l


qi ai zs
z a e log z dz
log( q a ) (qi ai 1) (q z ) a log 1 zs 0
N s i s s
t z , 1 0
i i i i s i l
i s
qi ai ai

s 1 qi ai zs
zs ai e dzs
0
zs ai (qi ai 1) ai (qi ai 1) 0 (qi ai 1)

N

ai log qi ai (ai zs )
0 (qi ai 1)
1
ti zs , 0

s 1 ai qi
N z ai q a 1 a q a 1t z , 1 0
ai z s i i
ai log qi ai s i i i i s
s l ai qi

qi ai z s ai
N

qi ai q a
i i 1 ai z s ai log a

s 1 i
qi 1 (Equation-7)

N
ai ti z s , 1
s 1
The updated equation of qil (l+1)th iteration is

l l l l l z s ail

N

qi ia qi ai 1 ai
l
z s ai
l
log qi ai
a l

s 1 i
q l 1 1 (Equation-8)

t z ,
i N
l 1
ai i s
s 1

il 1 f i z s , (1)

Where ti z s , (1)

K

i 1
i
l 1
f i z s , (1)
data set as initial clusters. These data points
IV. K-MEANS CLUSTERTING ALGORITHM represent initial cluster centroids.
The K-means algorithm is one of the simplest clustering 2. Calculate Euclidean distance of each data point
technique for which the objective is to find the partition from each cluster center and assign the data points
of the data which minimizes the squared error or the sum to its nearest cluster center.
of squared distances between all points and their 3. Calculate new cluster center so that squared error
respective cluster centers (Rose H. Turi, (2001)). K- distance of each cluster should be minimum.
means algorithm uses an iterative procedure that 4. Repeat step II and III until clustering centers do
minimizes the sum of distances from each object to its not change.
cluster centroid, over all clusters. This evaluational 5. Stop the process.
procedure consists of the following steps. In the above algorithm, the cluster centers are only
1. Randomly choose K data points from the whole updated once all points have been allocated to their

www.ijaers.com Page | 249


International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-4, Issue-3, Mar- 2017]
https://dx.doi.org/10.22161/ijaers.4.3.39 ISSN: 2349-6495(P) | 2456-1908(O)
closed cluster center. The advantage of K-Means [4] Ku W. C. and Chang S. T., Impersonation attack on
algorithm is that it is a very simple method, and it is a dynamic ID based remote user authentication using
based on intuition about the nature of a cluster, which is smartcards, IEICE Transaction on Communication,
that the within cluster error should be as small as Vol.88 b, No.5, May 2005.
possible. The disadvantage of this method is that the [5] L. D. Paulson, Taking a Graphical Approach to the
number of clusters must be supplied as a parameter, Password," Computer, vol. 35, 2002, Pg. No.19.
leading to the user having to decide what the best number [6] L.Lamport, Password authentication with insecure
of clusters for the image is (Rose H. Turi, (2001)). communication, Communications of the ACM,
Success of K-means algorithm depends on the parameter v.24 n.11, November 1981, Pg. No. 770-772.
K, number of clusters in image. [7] Learning and Cybernetics, Vol. 6, Issue 12-15, 08,
After determining the final value of K (number of Pg 3283 3287
regions), we obtain the initial estimates ai, qi, and i of [8] Lei T. and Udupa J. (2003) Performance evaluation
for the ith region using the segmented region pixel of fini e normal mixture model-based image
intensities with Pearsonian Type III Distribution. The segmentation techniques, IEEE Transactions on
initial estimate ai, ai=l/K, where is taken as i=1,2,...,K. Image Processing, vol. 12, no.10, Pg. 11531169.
The parameters ai and qi are estimated by the method of [9] Lerner, J. 2010. The Litigation of Financial
moments 1 as first moment i and its three central Innovations. Journal of Law and Economics, 53(4),
moments 2 3 and 4. Pg. 807-831.
[10] Li Gong, A Security Risk of Depending on
V. CONCLUSION Synchronized clocks in ACM Operating Systems
The number of image regions is estimated by utilizing the Review, Vol 26, No. 1, Jan 92, Pg. 49-53.
image histogram. The model parameters are estimated by [11] Lie. T and Sewehand. W (1992), Statistical
deriving the updated equations of EM algorithm. The approach to X -ray CT imaging and its Applications
initialization of the model parameters is done through K- in image analysis, IEEE Trans. Med. Imag. Vol.11,
means algorithm and moment method of estimation. The No.1, Pg 53 -61.
segmentation algorithm is developed through maximizing [12] M Sreelatha, M Shashi, M Anirudh, Md Sultan
the component likelihood under Bayes framework applied Ahamer, V Manoj Kumar, "International Journal of
in MIR Flickr . Network Security & Its Applications (IJNSA)",
ACKNOWLEDGEMENT Vol.3, No.3, May 2011.
I Pavan Gujjar P, working as Professor and Head in [13] M. Burrows, M. Abadi, and R. Needham. Logic of
Computer Engineering Department sincerely authentication, ACM Transactions on Computer
acknowledge thanks to St.John College of Engineering Systems, Vol. 8(1), 90, Pg: 18-36.
and Management (SJCEM), Palghar for Providing the [14] M. Jordan and R. Jacobs (1994) "Hierarchical
infrastructure support in publishing this research article mixtures of experts and the EM algorithm", Neural
under ALDEL Educational and Research Consultancy Computation, 6: Pg. 181214.
Services. [15] M. Naor and B. Pinkas, Efficient Oblivious Transfer
Protocols, Proceedings of 12th SIAM Symposium on
REFERENCES Discrete Algorithms (SODA), January 7-9 2001,
[1] K.Srinivasa Rao, M.Seshashayee, Ch.Satyanarayana, Washington DC, Pg. 448457.
P.Srinivasa Rao, (2012), Performance of Hybrid [16] M.Frank, R.Biedert, E.Ma, I.Martinovic, and D.Song,
Imag e Segmentation Based On New Symmetric (2013) Touchalytics: On
Mixture Model and Hierarchical Clustering, the applicability of touch screen input as a behavioral
International Journal of Graphics and Image biometric for continuous authentication, IEEE
Processing, vol 2, issue 3. Trans. Information Forensics Security, vol. 8, no. 1,
[2] Kelly .P.A et al(1988), Adaptive segmentation of Pg. 136148.
speckled images using a hierarchical random field [17] M.Martinez-Diaz, J.Fierrez, and J.Galbally,(2013)
model. IEEE Transactions Acoust. Speech. Signal The DooDB graphical password database: Data
Processing, Vol.36, No.10, Pg.1628-1641. analysis and benchmark results, IEEE Access, vol.
[3] Komanduri, S. & Hutchings, D.R. (2008), "Order and 1, Pg. 596605.
entropy in picture passwords", Proceedings of [18] M.Seshashayee, K.Srinivasa Rao, Ch.Satyanarayana
graphics interface 2008, Canadian Information And P.Srinivasa Rao, (2011) "Image Segmentation
Processing Society, Based on a Finite Generalized New Symmetric
Pg. No. 115. Mixture Model with KMeans", International journal

www.ijaers.com Page | 250


International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-4, Issue-3, Mar- 2017]
https://dx.doi.org/10.22161/ijaers.4.3.39 ISSN: 2349-6495(P) | 2456-1908(O)
of Computer Science Issues,Vol.8, No.3,
Pg. 324-331.
[19] M.Shahzad, A.X.Liu, and A.Samuel, Secure
unlocking of mobile touch screen devices by simple
gestures: You can see it but you cannot do it, in
Proc. 19th Ann. Int. Conf. Mobile computer
Networks, 2013, Pg.3950.
[20] Marcos Martinez-Diaz, Julian Fierrez, and Javier
Galbally, The DooDB Graphical Password
Database: Data Analysis and Benchmark Results,
IEEE Access, September 2013.
[21] Mclanchlan G. And Krishnan T (1997)., The EM
Algorithm and Extensions, John Wiley and Sons,
New York -1997.
[22] Mclanchlan G. and Peel D.(2000), The EM
Algorithm For Parameter Estimations, John
Wileyand Sons, New York - 2000.
[23] Michael Sherman, Gradeigh Clark, Yulong Yang,
Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti
Oulasvirta, and Teemu Roos, 2014. User-generated
free-form gestures for authentication: security and
memorability, In Proceedings of the 12th annual
international conference on Mobile systems,
applications, and services (MobiSys '14). ACM, New
York, NY, USA, Pg. 176-189.
[24] Michael Toomim, Travis Kriplean, Claus Portner,
and James Landay. 2011. Utility of Human-
Computer Interactions: Toward a Science of
Preference Measurement. In Proc. CHI11: 29th
Annual ACM Conference on Human Factors in
Computing Systems.
http://doi.acm.org/10.1145/1978942.1979277.
[25] Min-Shiang Hwang and L. H. Li, "A new remote
user authentication scheme using smart cards," IEEE
Transactions on Consumer Electronics, vol. 46, no. 1,
2000,Pg. 28-30.
[26] Misbahuddin M, Ahmed M.A, Rao A.A, Bindu C.S,
Khan M.A.M, A Novel Dynamic ID-Based Remote
User Authentication Scheme, in the proceedings of
Annual IEEE Indicon Conference, Delhi, 2006.

www.ijaers.com Page | 251

Vous aimerez peut-être aussi