Browsing by Author "Akosu, N.I"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Open Access Electronic Voting: A Panacea for Electoral Irregularities in Developing Countries(Department of Computer Science, Nasarawa State University Keffi, 2009-02-06) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan Osaze; Akosu, N.IThis study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. The study discribe, the potential benefits and risks of electronic voting technology as well as desirable characteristics of voting systems. This study concludes with the design and implementation of an electronic voting system by using cutting edge programming development toolsItem Open Access A Hybrid Cyprosystem for Multibiometric Authentication and Template Protection(Department of Computer Science, Nasarawa State University Keffi, 2019-12-09) Jegede, Abayomi Joshau; Akosu, N.I; Aimufua, Gilbert Imuetinyan OsazeThis paper proposes and implements a multilayer authentication and template protection scheme known as the hybrid scheme. The hybrid scheme is based on the integration of modified shielding function with matrix transformation. It is a 2-in-1 approach which provides good recognition accuracy, security of stored templates and user privacy. The recognition accuracy of the proposed approach is evaluated using a multi-biometric dataset obtained from the fusion of face and iris images. The multibiometric dataset is constructed using feature level fusion to combine face images in CASIA Near Infrared Database and iris images in CASIA Iris Database version 1. Security analysis is used to determine the robustness of the hybrid scheme against security threats such as guessing and key exhaustion (or brute force) attacks. This is carried out using complexity analysis to determine the level of difficulty an attacker faces in an attempt to launch compromise the authentication scheme. The privacy capability of the hybrid scheme is analyzed using the requirements proposed in the ISO/IEC JTC 1/SC 27 standard. Experimental results as well as security and privacy analyses show that the approach provides good recognition accuracy as well as high-level template security and user privacy.