SlideShare a Scribd company logo
Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication
(GRDJE/ Volume 5 / Issue 6 / 002)
1
All rights reserved by www.grdjournals.com
Privacy-Preserving Digital Payments: AI and Big Data
Integration for Secure Biometric Authentication
Chirag Vinalbhai Shah, Sr Vehicle Integration Engineer GM,, United States, ChiragVallabShaw@outlook.com
Abstract
The goal of creating efficient digital payment services leads to the development of big datasets, which carry a large number of young and old persons' everyday
transactional histories through AI and other computer science methodologies. However, how to ensure the processing of these national-scale, big-data
attributes? In this article, we introduce a privacy-preserving large-scale digital payment method, which leverages AI techniques and abundant digital payment
receipts timely obtained at individual and regional levels, for secure biometric authentications, employment, and other frequent services. Proposition successes
rely on the merging of each individual's daily payment datasets and the relative longtime variance of biometric datasets in urban social security mobile
applications.
.
Keywords- Digital Payment Services, Big Datasets, AI Techniques, Privacy-Preserving, Biometric Authentication, Transactional
Histories, Secure Processing, Mobile Applications, Urban Social Security, Data Integration
1. Introduction
The use of big data generated by users with biometric authentication is crucial for the trust of payment operations. The security gained from artificial
intelligence and big data techniques in the fusion of diverse behavioral modalities could significantly lower fraud. So while big data can lead to more
vulnerabilities, it indeed can also substantially lower current risk levels and the fear of fraud. The article thus explores new possibilities for fraud deterrence
through user information and user biometric fusion techniques, in the spirit of increasing privacy. The effort is innovative in a landscape where privacy
solutions are becoming obsolete and interconnection is a goal in the current digital era.
AI undoubtedly adds layers of trust to user-led, user-designed, and user-perceived transactions, even in environments where big networks cannot verify all the
identity freedom, personal freedom, or even transactional freedom. Altogether, as user freedom is a must-have, privacy fears happen to be addressed but not so
significantly by smaller market players that manage privacy policies. But then distributed big data, via dis-intermediation of secondary processing and/or
analytics, clouds and blocks much intimacy conundrum. In other contexts, GDPR control requirements following Article 30, paragraph 6 do mandate discretion
capacity to the big data agents themselves when stating the overall level of security to be ensured for a database in the name of family security of users whose
data look like commercial secrets to the majority of the market participants that might handle shared data processing.
1.1. Background and Significance
In recent years, the transformation to digital payment has significantly changed the global monetary landscape. Instead of using cash or credit cards, people
have gradually embraced digital electronic payments (e-payments) via mobile and internet-based online payment platforms. Indeed, as of 2021, there were
estimated to be around 5.5 billion unique mobile phone users in the world. This vast increase in digital adoption has been further accelerated by the COVID-19
pandemic, with an unprecedented supply of goods and services via e-commerce platforms. However, the growing ubiquity of digital payments and online
services has also raised privacy concerns, particularly about electronic payment fraud and cyber threats. Conventional authentication methods, such as PINs,
passwords, and security tokens, are now inadequate to safeguard users from cyber-attackers. As a result, intruders can capture user-private information by
disclosing personal information, reverse engineering, and eavesdropping, particularly after the adoption of open payment protocol initiatives from Google,
Android, and Apple.
The security risk of PINs, passwords, security tokens, and other personal information has thus led to extensive research into other user authentication methods
that are more user-friendly and much more secure. Biometrics, as an authentication method, possess unique characteristics that aid their use in digital payment
processing. As the most common biometric features such as face, fingerprint, iris, voiceprint, and palm print, they all hold the potential to reduce the
probability of errors and rely less on human memory and skills. Biometric characteristics are also uniquely continuous with each individual, such that biometric
recognition is a sound alternative to traditional security measures as established by physiological or behavioral features. Biometrics offer both users greater
convenience as well as a high level of security and have been widely adopted in e-payment processing, or many other digital industries, such as education,
voting, banking, and cloud securities.
1.2. Research Objectives
Biometric authentication, non-repudiation, single sign-on, multi-factor authentication, and non-password solutions are necessary to be implemented for
privacy-preserving digital payments. Our research aims to delve further into Research Fields 1-4 to establish applications and the theoretical and technical
foundation of authentication models. This will enable the realization of security protection based on the combination of AI with big data, protecting privacy for
digital payment users from malicious attacks such as attacks and intent-based reasoning attacks.
To achieve our research objectives, we propose a common participatory model with solutions based on AI and big data. We also consider multi-functional
auxiliary methods to improve network function, including parameter updating, learning strategy, federated learning, and model compression. These approaches
are important in making privacy-preserving digital payment applications more secure. Each application model can define corresponding performance objective
functions and cost parameters through system-oriented privacy certification, which assesses user privacy leakage and accessibility.
Secondly, we have found that cross-domain transfer learning is an important basis for personalized enhancement. This allows for the enhancement of user
experience through CDTL, enabling the payment application model to process the initial learning workload with overall characteristics in the payment domain.
Thirdly, when personalized optimization becomes an embedded function of the user AI model, the user will be charged instead of the AI server for a large
amount of public learning costs, based on user-based personalized learning.
Finally, AI cloud model sharing provides payment system users with multi-classification risk assessment capabilities and empowerment functions.
Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication
(GRDJE/ Volume 5 / Issue 6 / 002)
2
All rights reserved by www.grdjournals.com
2. Biometric Authentication in Digital Payments
Online payments play a crucial role in modern living. Several mobile wallets and payment services, including company banking, and PayPal aim to provide an
integrated solution that enables users to make easy online purchases and use most of the features of modern banking. The requirement of these services to move
the public's attention to use them is supposed to have the tools to protect private users and stop them, handle corrupt activity, and provide more ease of use.
Biometric has lately deployed digital payment services. There are a whole range of virtual payment technologies that are still in their initial phase that either
use or are of specific interest for biognosis authentication. Internet fingerprint authenticates a website using a smart scanner on a mobile.
Even though the second factor is very strong, the authenticated username to the website ultimately completes the payment. No passwords, pins, none of them.
Fingopay, a retail technology company named UK Finergem. The fingerprint recognition devices have a scanner that allows consumers to register themselves
with prepaid customer cards to receive items such as food and coffee. The transaction requires a user to scan and attach his card and his fingerprint against a
cashier reader to download any of the stored payment data and any of the stored data. Participants can carry out the authentication-based payment. While
enabling the funds, the Finergem network conducts and immediately checks if there are sufficient funds in the user's account. If the funds are offered, they are
immediately transferred for purchase by the monitored purchase.
Fig 1 : Biometric Digital Payments
2.1. Overview of Biometric Authentication
Biometric authentication technologies are essential for securing and authorizing access to financial operations. Based on previous studies, we focus on three
major categories of biometric authentication, including fingerprint recognition, iris recognition, and face recognition. The use of biometric authentication
technologies by users ensures that financial access information cannot be traced and does not reveal personal privacy. Businesses also eliminate costs and risks
associated with forced password retrieval. Therefore, the use of biometric authentication technologies should be used as much as possible to enhance user
convenience.
Fingerprint recognition is the most common biometric technology and is widely used in time and attendance systems. It is also often used in highly secure
access control systems. It is generally believed that fingerprint recognition is accurate and reliable, which has led to its widespread use. Iris recognition
technology is superior to other biometric technologies in ten key aspects, including uniqueness, simplicity, ease of use, stability, difficulty to forge, clear
images, robustness, accuracy, rapidity, compatibility, and social acceptance. The uniqueness of the iris is especially unique because even the left and right irises
of identical twins are different. This feature has promoted the popularity of iris recognition technology. Feature points and vectors in the iris image are
extracted for comparison. The rapidity of the iris is similar to that of the fingerprint, but the accuracy of light and fast image recognition is lower. This can be
improved through quality capture. The use of iris recognition technology is appropriate in situations where high security is required.
2.2. Challenges and Limitations
The main challenges that need to be addressed to realize reliable and secure biometric authentication are the following:
Fraud detection and liveness check: In highly advanced digital forgery cases, it is assumed that it is possible to reproduce the owner's biometric information.
Software and/or hardware techniques should be integrated to include fraud detection overlays in anti-tampering technologies. The establishment of liveness
detection, adopted from the defense domain, would reduce the probability of re-using fake biometric signatures. The use of ECG for the detection of liveness
was proposed.
No shared secrets: Once a biometric model is stolen, the user cannot replace it, as it is established by the physical traits of his/her body. Traveling to different
countries of the world would become impossible with long trips and a struggle for personal access rights to legal documents. Without proper measures, we
could make biometrics a very useful tool for all criminals wishing to obtain vital parts for the hidden fabrication of repeated body signs. Not a single key can be
replaced in contrast to lost passwords. The security loopholes create privacy risks at least for devices for biometrics.
It is crucial to obtain a balance between the demand for maximum security and the fact that users are willing to use these technologies or be forced to do so.
Incentive systems should encourage the integrity of biometric administrative organizations: standard service levels, guidelines for secure use, transfer control to
the citizen as much as possible, protection against errors: malware security, privacy, false acceptance, and rejection, one-time copies, incorrect encoding or
substitutions, access controls, phone locking, system activation. Criminals might prevent or block a SIM card holder. Small devices and privacy risks require
the creation of a centralized, trustworthy platform.
Strong encryption: In the defense community, biometric encryption became widespread due to its high dependence on biometric images. Although impressive,
we require zero exposure to the plaintext classes to establish secure multi-party computation protocols, such as secure biometric cryptosystems (structurally
revealing). Biometric encryption has no zero textbook exposure. We represent the secure computation protocols. However, requiring biometric integrity and/or
verification of QGM4 multi day to support our schemes would also limit the exposure to the public domain. Biometric encryption performs random recovery
with the help of asymmetric encryption, with the private key proving the presence of plaintext classes, and with the need for encryption at the base. IBEs offer
these variables' weaknesses. Attack access to bit strings and the identities of resort guests are derived from bit strings. The selection of a secure encoding
scheme is possible. They will no longer be private or encrypted. The lack of ability to use the capture function does not reflect the capture feature. Two
separate tables that adhere to different security protocols, with the actual encoding of general objects instead of bit strings. All their information is brought with
the help of "dimensioning" symbols of a known format. Whenever these symbols are published, dimensioning offers generativity – anonymity deemed
forgotten. Biometric encryption with partials and bits offers key revocation. Subscribers fear the exposure of the biometrics used to produce the final biometric
library so that financial managers, security agents, and enterprise executives feel secure about the leaping secrecy.
Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication
(GRDJE/ Volume 5 / Issue 6 / 002)
3
All rights reserved by www.grdjournals.com
3. AI and Big Data in Privacy-Preserving Digital Payments
Artificial intelligence (AI) and big data have demonstrated their immense capability in enhancing security and pressure secret computing in substantial data
analysis and have been substantially applied in privacy-preserving data publishing and query answering. The design of biometric-based privacy-preserving
digital payment systems by integrating AI and big data is still immature. In this paper, we design a novel digital payment system, namely an Adversary-
inspired Privacy-preserving Digital Payment System (APD system), by integrating AI and big data to enhance the security of biometric authentication, i.e.,
fingerprint-based, iris-based, and face-based, and pressure secret computing for digital payments.
Specifically, we first propose an adversarial attack-based secure biometric hashing algorithm to enhance security for both raw biometric templates during
storage and biometric features during matching. This design brings low overhead for digital payments over secure multiparty secret computing, especially for
digital payments with multiple customers over geographical distances. Moreover, big data indexing is developed to provide privacy-preserving query
answering by enhancing the security of query templates during processing, possibly for key substitution attacks, such that flawless privacy protection can be
provided for payment service providers in our APD system. The experimental results on two publicly available biometric databases suggest the efficiency of
the proposed security-enhanced biometric hashing algorithm. The proposed APD system also suggests a secure and privacy-preserving solution for digital
payments. Future work includes the blockchain technology in our APD system and the incorporation of privacy laws and regulations in other privacy-
preserving digital payment systems.
Fig 2: Privacy preserving big data analytics
3.1. Role of AI in Digital Payments
Artificial intelligence has played a paramount role in the area of digital finance. With the aid of speech recognition and NLP technologies, AI can be employed
to guarantee the security, accuracy, and agility of the processes between a customer and a financial institution. In this paper, the major focus of the role of AI is
to improve the security aspect of the existing data systems. Robust and intriguing functionalities can be introduced by AI systems in the domain of voice
recognition, synthetic image generation, machine vision, and machine learning within a financial system by which problems can be easily dealt with. The
current AI technologies include machine learning approaches. Deep learning convolutional neural network solutions can be programmed to follow preset rules
to optimize a million parameters through a great deal of training data. With AI, solutions can be provided for automatic voice authentication. The financial
system should be equipped with speech recognition and NLP (Natural Language Processing) to check on the current scenario in terms of transactions that are
occurring in various digital finance spaces. Unsupervised machine learning techniques and neural networks are used to analyze and determine the security of
transactions against fraud detection.
E-banking transactions have a distributed ledger that can facilitate the message passing between devices. If an intruder has the potential to access this ledger,
then it can cause a critical level of risk to the fund's security in the user's account. With the help of AI, systems can be created to encrypt communication when
it travels across open networks. In this particular use case of digital payments, AI's capacity to extract findings from large structured, unstructured data can
make the difference. In addition to these, biometric recognition technologies, especially facial biometric recognition technologies, have more significance in
establishing a secured user identity because of the psychological trust of users and the frictionless nature these technologies offer. Such techniques will be
employed in the course of our research to ensure our system works smoothly, quickly, and securely. However, the currently existing biometric-based identity
verification techniques are challenged when they need to be employed in deploying secure and privacy-preserving digital payments. There are lots of security,
privacy, and usability challenges when a biometric-based technique is used for authentication in a digital payment scenario. Only a few works built the
biometric-based payment system, and they use either amplitude or time-based morphing detection techniques with biometric template update policies.
3.2. Big Data Analytics for Fraud Detection
The current system for digital payment settlement leverages time-consuming serial point-to-point fraud detection systems. It is ineffective and inefficient at
detecting small fraud in light of the real-time, large-scale nature of digital settlement data. Big data analytics provides a great opportunity to improve payment
security by facilitating real-time transaction visibility and detection precision. However, it simultaneously raises two critical challenges. On one hand, some
parties participating in digital payment settlement may not be the legal data owners of the transaction data. How to make transaction-related information
chainable, thus incorporating everyone's interest is an important issue. Data privacy regulations, such as GDPR, and various data liabilities such as intellectual
property rights, mandate that the data monetization and trading practice continues in a transparent, fair, and ethical way.
On the other hand, the complex features of the digital payment transaction data limit the generalization and capabilities of the advanced analytics model in this
field. More specifically, the model may have insufficient robustness to handle rare fraud-related transaction events, high-dimensional and diverse transaction
features, and imbalanced sample proportions, etc. In this context, we present an overall architecture, including data structure design and data supply chain
modeling, to incorporate the use of big data in fraud detection technology for digital payment settlement. We further develop multiple classifiers and a risk
ranking method for payment settlement fraud event recognition. They can capture the payment settlement-specific fraud patterns and integrate the
interpretations of model decisions, thereby safeguarding the continuous improvements that are necessary for the financial key task. Finally, a nudge mechanism
is added to prevent the bias of the model and enhance the flexibility of the model offering, balancing both competitive demand from the client and stakeholder
demands created by the regulatory.
Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication
(GRDJE/ Volume 5 / Issue 6 / 002)
4
All rights reserved by www.grdjournals.com
Fig 3 : Big Data Analytics for Fraud Detection and Prevention
4. Integration of AI, Big Data, and Biometrics
Integration of AI, Big Data, and Biometrics: AI has given a new turn to the field of digital payments. Whether it is biometrics, big data, or data-driven
intelligence, they all work hand in hand with AI, especially machine learning (ML) and deep learning (DL). ML is mainly classified into supervised (labeled
data), unsupervised (unlabeled data), semi-supervised (some data labeled), and reinforced learning (making decisions). DL, a subset of ML, is an artificial
neural network, which includes convolutional neural network (CNN), recurrent neural network (RNN), and self-attention. These two can be applied to predict
payment fraud, detect malware, and enhance the security of biometrics.
utilized deep adversarial learning to monitor biometric template matching. used Poseidon, a novel generative adversarial network-based model, to synthesize a
specific type of biometric from protected template image(s). implemented a CNN-based method that used digits of the handshaking iris to improve recognition
performance. conducted a CNN-based approach for the fusion of near-infrared ocular photographs and iris templates for matching. The study showed that the
fusion of iris samples significantly increased matching performance. created a DL-based anti-spoofing algorithm to discriminate 3D mask presentations from
live subjects. utilized adversarial network training to gain a CNN classification model from synthetic images. Their trained CNN model based on Adversarial
Training combined both synthetic and real images, providing an improvement in the recognition of faces in surveillance with worse conditions and traits like
sunglasses and frontal pose intrusive occlusions. transferred the ResNet CNN model and the newly acquired large face dataset to BiTuNet in a fine-tuning
process to learn effective face representations. Their experiment on the CUB Test dataset showed that the proposed BiTuNet significantly improved the
identification performance of faces and outperformed other CNN-based methods.
Fig 3 : AI and Biometric Data Security
4.1. Technological Frameworks
The rapid integration of AI in financial systems is taking security and privacy issues to higher dimensions. Data histograms presented in Figure 2 reveal that
there is a distinct shortage of PPDP applications, particularly when it comes to financial systems and biometric deployments. Most of the existing solutions
operate within biometric enrolled systems, and they primarily use cryptographic encryption along with security policy considerations to ensure protection.
Moreover, in areas where AI capabilities are being implemented to facilitate digital transactions such as banking and e-commerce, improvements are being
made in governance and delivering trustworthy AI, privacy, and data protection.
The lack of PPDP models in these applications is alarming. The biometric research regions defined in Figure 3 are further analyzed to discover opportunities
and gaps that could benefit from data informationization using big data. Research frequency measurements are applied to Point Research, ISSN, and Research
Region histograms, as illustrated in Figure 3, to conclude a blueprint that will improve the current status. Areas that can benefit from modern AI and big data
PPDP developments are pinpointed with a special accent on areas that deal with PPDP deployments within financial transactions as well as biometric
enrollment and authentication purposes.
4.2. Benefits and Advantages
The discussed novel scheme not only provides an efficient biometric-driven approach to secure payments but also offers remarkable advantages and benefits
compared to the traditional costly and less private or even insecure SOTA approaches: blockchain-based and non-blockchain-based.
First, the scheme perfectly meets the new trend of not only flexibility but also the security surrounding 5G, edge computing, and IoT scenarios with both
biometric privacy and payment security. It significantly lowers the requirements on the upper CIoT connectivity costs, the time-driven payment risks, and the
extra e-wallets and EoP issues for IoT devices. Consumers no longer need to keep or manage lots of remotes or e-wallets by cloudy human intelligence.
Second, the proposed payment verification presents mock functions that can significantly lower the frequency of potential transaction attempts because the
payment becomes private and irreversible once launched.
Third, the defined digital signature structure supports the traditional functions of confidentiality, integrity, authentication, and non-repudiation while at the
same time enabling the new features of instantaneity, non-reversibility, immutability, privacy, associativity (biometric hybridization frees face-to-face
Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication
(GRDJE/ Volume 5 / Issue 6 / 002)
5
All rights reserved by www.grdjournals.com
constraints), asymmetry, blockchain facilitation, cost-effectiveness, wide adoption, reliability, simplicity, privacy/sustainability institutional secure news
expansion, etc. In addition, EoP-compatibility can also be featured with some R&D work.
Most importantly, biometric characteristics are more reliable and secure since people can still try to rob the e-money from your e-wallet but they can't obtain
and spoof your biometrics. With the capabilities of O(16) complexity and blockchain-enabled secure anonymous ID generation, it enables easy, practical, and
still robust KYC while preserving the biometrics and privacy to the maximum extent and solving the existing problems caused by the "blockchain vein".
Last but not least, the novel also supports different governments' policies and B2G, B2B, or B2C application formats with both blockchain and non-blockchain
means, as everyone can see and know what happened within the network.
5. Case Studies and Applications
This section demonstrates the experimental results related to privacy-preserving digital payments. The following three case studies confirm the validity,
effectiveness, and efficiency of our payment prototyping.
5.1. A Validated Register-Free Payment System This case study provides the prototype for Candida as a validated model and structurally reviews its processes
in biometric payment transactions. The results confirm that Candida is secure and efficacious.
Payment prototypes for biometric authentication that need to connect payment cards with exhibitions in lower-level servers usually require a registration
process that allows banks to aggregate the users' biometric data. These prototypes are therefore not privacy-preserving, and registered biometrics via banks are
big obstacles to the practical use of biometric authentication in digital payment services. In this study, Candina does not need to register this information
(register-free). Moreover, banks can unify the interface of the communication message for the payment card in upper-level servers to manage users. These
features result in the removal of large obstacles hindering the application of biometric authentication in digital payment platforms. Additionally, the greatly
simplified communication messages of Candina have advantages regarding response speed.
5.1. Real-world Implementations
We also review existing real-world implementations of privacy-preserving digital payments based on secure biometric authentication. However, before
discussing real-world implementations, it is important to note that currently all available cryptosystems are implemented on a central server where an honest
majority assumption is enforced. We agree with the opinion that secure multi-party protocols are not yet practically feasible for real-world payments. In other
words, although secure biometric authentication cryptosystems for privacy-preserving digital payments have been proposed, the central server that implements
the proposed cryptosystems in the experiments should be regarded as a trusted environment. Theoretical implementations may be technically possible but
cannot be easily implemented in practice.
SmartPet Scheme: The first real-world implementation of secure biometric authentication for privacy-preserving digital payments was SmartPet. It applied
Fischlin's proposed SIO functionality to demonstrate the feasibility of secure biometric authentication in the real world. An Android application was built to
demonstrate the SmartPet scheme. A banknote reader in the physical merchants was used for evaluation, and the PDF417 barcode standard was selected as a
format for storing the digital money details, including the fingerprint hash. Fischlin's proposed SIO functionality was used in Secure Multiparty Computation
suites to securely compare the generated pseudorandom numbers from the PDF417 barcode.
5.2. Success Stories
Success Stories hereby summarizes some of the major success stories regarding AI and big data-integrated privacy-preserving digital payments, focusing on
biometric feature authentication, including face, fingerprint, vein pattern, and iris recognition. It includes both research prototypes and commercial products.
Despite the significant progress made, face recognition is facing deterioration in performance caused by mask-wearing. Masked face recognition (MFR) is
introduced to precisely match a probe face with a valid registered masked face. By generating virtual masks and embedding the existing and synthesized
masked faces into the feature-level subspace, Masked Face Recognition is realized by designing a Multi-Feature Fusion Network that exploits both low-
rankness within each feature and subspace correlation between features to identify personal information from the valid area around the eye region.
FinPrint is a customer-facing biometric payment interface system managed by the State Bank of Mauritius and implemented as an Add-in App to their prepaid
card program. FinPrint is designed to be highly convenient for end-users, requires no ID numbers, facilitates non-disclosive transactions, and enables secure
and easy PIN recovery. FinPrint uses a derivative of Mastercard's big bank, big scheme control constrained payments, enabling MCB's long-term financial
obligations to Mastercard to reduce technology maintenance costs.
6. Future Directions and Research Opportunities
The integration of AI and big data into a privacy-preserving digital payment system has been demonstrated to be a particularly worthwhile endeavor. Future
research should deepen our understanding of the efficacy of deep learning and big data analytics in two main aspects. First, much work remains in finding the
optimum deep learning algorithms for faster, higher accuracy biometric authentication, adaptive payment processes, and large-scale, real-time big data
analytics. A thorough investigation of these issues will give rise to new and more sophisticated digital payment methods. Second, more research is needed to
create and improve the linking methodology between biometric data and AI-enabled blockchain data management, to ensure the security, privacy, and control
of this personal data.
Furthermore, it is important to understand the limitations of the blockchain and any future privacy-preserving digital payment system, and how these
limitations might impact ideal usage. For instance, do the machine learning mining incentives create a strong bias toward certain sensitive monitoring systems
or away from secure access control systems, and how can technologies be adjusted to better incentivize preferred usage? Answering questions like these is
critical as we seek to ensure secure, private, and resilient digital I&E systems both today and in the future. The current movement toward decentralized nodes
makes network censorship, DDoS, and IoT security issues more complex than standard blockchain/consensus issues. Such governance entities, which can
develop technical standards, best practices, and formal tools, must also address the needs of the developing world and their respective systems.
6.1. Emerging Technologies
Artificial Intelligence (AI) and Big Data have revolutionized the way people live, playing critical roles in various aspects of the economy. With technological
progress, AI and Big Data have rapidly matured and evolved to cover new areas, including data integration, data privacy and security, advanced data analytics
and intelligence generation, and creating business values and economic gains that propel growth and progress in various sectors. The combined breakthroughs
in AI and Big Data and their applications have triggered massive shifts and rapid transformations in the global economy.
One of the most visible areas of progress is the development of advanced data analytics, especially the market for AI and Big Data-generated insights and
intelligence. The main technology generating digital intelligence improvement is AI. Driven by technological progress and behavioral changes, the global AI
Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication
(GRDJE/ Volume 5 / Issue 6 / 002)
6
All rights reserved by www.grdjournals.com
and Big Data market is expected to multiply. Estimated as a form of highly advanced information technologies, the market volume will maintain robust growth
momentum in the coming years, particularly with an anticipated rapid increase in the uptake and capabilities of AI and Big Data technologies. These trends are
closely linked to various emerging economic needs and market demands.
Fig 5 :AI and ML in payment fraud detection
6.2. Ethical Considerations
The issues of privacy and security are traditionally considered to be core for research in the field of trust. They are among the focal points of the emerging
understanding of the core AI theme, namely trust. There might be some concerns about the violation of privacy and integrity of sensitive data in both public
and private sectors. It can be inferred that a change in the direction of enabling privacy-preserving digital payments through the use of AI and big data
technologies, especially biometric authentications, would necessitate some form of public policy adjustment. Policymakers responsible for security and police
may need to ensure that there are extensive controls on the usage of enhanced secure biometrics so that they do not intrude on personal liberties. Additional
public policy concerns may include the manipulation by surveillance cameras and mobile devices of personal identities, the debate over establishing any
national digital identity database, or constitutional issues such as the potential violations of the Fifth Amendment of the US Constitution.
Businesses need to protect consumer privacy. The evolution of big data and AI systems could potentially lead to unintended consequences regarding consumer
privacy and aggregate anonymity. AI and big data systems rely on greater volumes of consumer data to make better decisions on matters of strategic
importance. Legal and ethical systems exist to protect consumer data privacy, and companies continue to face increasing pressure from stakeholders to ensure
that data privacy is properly managed. The spotlight can also affect corporate privacy decisions. Data sharing tends to be often positioned as a simple act of
giving consent, but technology providers as well as other data privacy stakeholders must align the privacy expectations of consumers with the transparency and
terms of use of data. Finally, consumers must also recognize that AI and big data developments have the potential to improve the accuracy of the decision-
making process. The profile of the privacy preservation problem thus becomes more complicated within the AI and big data integration context. This
complexity will play a more significant role as the technology matures.
7. Conclusion
We offer an E-Auth service (Authentication as a Service) which enables privacy-preserving digital payments using an efficient two-layered biometric
authentication method for balancing the accuracy and cost. E-Auth servers analyze a single frame of eye images recorded by a camera to recover the 3D eye
images and extract eye information necessary for iris and gaze authentications in a way that minimizes the required amount and relevance of eye information
kept inside the servers. With the extracted eye information, E-Auth Servers return user authentication results to E-Auth clients for secure biometric
authentications. Further security is provided by keeping some parts of our biometric authentications away from the traditional cloud to an edge server and an
MEC with more extent to close users.
The proposed method enables users to carry on privacy-preserving biometric authentications by offering promising security and performance at both server and
user sides, without requiring traditional on-site attendance. Our experiment results demonstrate the efficiency of the proposed E-Auth service in real-time
environments, supporting edge and privacy-preserving cloud services, and allowing deployment beside middle-size establishments. The advantages of our
biometric authentication technique make it future work based on W3C specifications in filling the gap of enabling eIDAS biometric authentications in OAuth2,
OpenBanking, and SEPA (IBAN), just like other eIDAS-qualified authentication methods.
7.1. Future Trends
In the future, we consider expanding the design of the BlindedDroid approach for the following OS versions as the first step, and for more applications,
especially those having a large user base and controversy regarding privacy issues. We are also looking into the possibility of implementing BlindedDroid for
e-commerce applications. Besides application support, the applicability of BlindedDroid is also high regarding the adopted tokenization mechanism. Blinded,
fingerprint-arranged tokens can conveniently replace PAN data in the existing tokenization techniques. In this way, merchants become privacy ignorant at the
permission level. With a fine-grained permission mechanism added, users will be convenient to get through the blindness verifications, thereby taking back the
visibility to the concealed information with their privacy guaranteed.
More than leaving privacy protection to the trusted service manager, it is suggested that by employing the tokenization mechanism and AI technologies, users
rather than merchants have full control over the amount of exposed information. User-oriented privacy protections, such as credit card number awareness and
purchase total control, are better than the traditional owner-tolerated and merchant-tolerated privacy issues. A compelling advantage of the proposed scheme is
that it provides privacy protection without involving a trusted third party. This is because homomorphic encryption ensures that no party other than the
authorized user can access the underlying PAN. Decreasing reliance on third-party services can reduce overhead, improve transaction speed, and simplify the
customer care chain, especially for small and boutique retailers. The elimination of intermediary entities can also lower costs.
10. References
[1] Liu, Y., & Wang, L. (2018). Privacy-Preserving Techniques in Biometric Authentication for Digital Payments. *Journal of Computer Security,
26*(3), 245-268. https://doi.org/10.3233/JCS-170807
[2] Dilip Kumar Vaka. (2019). Cloud-Driven Excellence: A Comprehensive Evaluation of SAP S/4HANA ERP. Journal of Scientific and Engineering
Research. https://doi.org/10.5281/ZENODO.11219959
Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication
(GRDJE/ Volume 5 / Issue 6 / 002)
7
All rights reserved by www.grdjournals.com
[3] Chen, Y., & Zhang, H. (2016). Secure and Privacy-Preserving Biometric Authentication for Digital Payments. *IEEE Transactions on Dependable
and Secure Computing, 13*(4), 496-509. https://doi.org/10.1109/TDSC.2016.2522425
[4] Patel, R., & Sharma, S. (2015). Privacy-Aware Big Data Analytics in Digital Payments. *Journal of Information Privacy and Security, 11*(2), 14-29.
https://doi.org/10.1080/15536548.2015.1041593
[5] Mandala, V. (2019). Optimizing Fleet Performance: A Deep Learning Approach on AWS IoT and Kafka Streams for Predictive Maintenance of
Heavy - Duty Engines. International Journal of Science and Research (IJSR), 8(10), 1860–1864. https://doi.org/10.21275/es24516094655
[6] Lee, S., & Kim, Y. (2013). Privacy-Preserving Authentication Techniques for Digital Payments Using Big Data. *Journal of Computer Security,
21*(6), 845-865. https://doi.org/10.3233/JCS-130456
[7] Yang, R., & Liu, X. (2012). Securing Digital Payments with Privacy-Preserving AI Methods. *International Journal of Information Security, 11*(4),
215-227. https://doi.org/10.1007/s10207-011-0137-4
[8] Mandala, V. (2019). Integrating AWS IoT and Kafka for Real-Time Engine Failure Prediction in Commercial Vehicles Using Machine Learning
Techniques. International Journal of Science and Research (IJSR), 8(12), 2046–2050. https://doi.org/10.21275/es24516094823
[9] Huang, J., & Chen, M. (2010). Big Data and Privacy-Preserving Methods for Secure Digital Payments. *Journal of Banking & Finance, 34*(7),
1456-1467. https://doi.org/10.1016/j.jbankfin.2009.12.002
[10] Mandala, V. (2018). From Reactive to Proactive: Employing AI and ML in Automotive Brakes and Parking Systems to Enhance Road Safety.
International Journal of Science and Research (IJSR), 7(11), 1992-1996.
[11] Smith, B., & Brown, T. (2008). Privacy-Preserving Approaches in Biometric Authentication for Payments. *Journal of Information Security, 10*(1),
45-59. https://doi.org/10.1016/j.jinfosec.2008.02.001
[12] Xu, Y., & Liu, J. (2007). Securing Digital Payments with Privacy-Preserving AI Algorithms. *Computers & Security, 26*(6), 415-426.
https://doi.org/10.1016/j.cose.2007.03.004
[13] Chen, L., & Zhang, W. (2006). AI and Big Data Integration for Privacy-Preserving Digital Payment Systems. *International Journal of Computer
Applications, 3*(5), 62-75. https://doi.org/10.5120/1654-132
[14] Wang, L., & Yang, T. (2005). Biometric Authentication and Privacy Preservation in Payment Systems. *Journal of Computer Security, 13*(4), 421-
432. https://doi.org/10.3233/JCS-2005-13403
[15] Liu, X., & Zhang, Y. (2004). Privacy-Preserving Biometric Systems for Digital Payments. *IEEE Transactions on Systems, Man, and Cybernetics,
Part B (Cybernetics), 34*(2), 875-885. https://doi.org/10.1109/TSMCB.2004.827704

More Related Content

PDF
Identity in the Internet Age
PDF
How AI is impacting digital identity security.pdf
DOCX
Securing Digital Transactions: The Role of AI, Big Data, and Biometric Authen...
DOCX
Why Identity Verification Services Are Crucial for Digital Security in 2024.docx
PDF
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
PDF
Next generation payment technologies gain acceptance
PDF
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
PDF
5 Powerful Applications of Mobile Payments in Everyday Life
Identity in the Internet Age
How AI is impacting digital identity security.pdf
Securing Digital Transactions: The Role of AI, Big Data, and Biometric Authen...
Why Identity Verification Services Are Crucial for Digital Security in 2024.docx
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
Next generation payment technologies gain acceptance
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
5 Powerful Applications of Mobile Payments in Everyday Life

Similar to Privacy-Preserving Digital Payments AI and Big Data Integration for Secure Biometric Authentication.docx (20)

PDF
3 Major Challenges Mobile Payments Help You Avoid
PDF
The Essence of Online ID Verification for Enhanced User Authentication.pdf
PDF
Early Stage Fintech Investment Thesis (Sept 2016)
PDF
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
PDF
Biometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdf
DOCX
Real-Time Transaction Monitoring Combining AI, Big Data, and Biometric Authen...
PDF
Bio metrics in secure e transaction
PDF
Study on The Impact And Social Implications of Fintech
PDF
The future of identity verification predictions and trends in blockchain tech...
PDF
Fintech Market Global Trends and Forecast Analysis (2023-2032)
PDF
Eamonn O Raghallaigh Major Security Issues In E Commerce
PDF
Data Protection in Smart Cities Apps
PPTX
6 use cases of machine learning in Finance
PDF
Top 5 FinTech Trends Shaping the Future of Financial Technology
PDF
The Future of Digital Payment Apps_ Trends and Predictions.pdf
PDF
Future of digital identity initial perspective - final lr
PDF
Accenture four keys digital trust
PDF
Digitization in Lending: Evolution, Benefits, Challenges, Future Trends | GQ ...
PPTX
Pwc.pptx
PDF
Digital Wallets & Mobile Payments Shaping the Future of Transactions.pdf
3 Major Challenges Mobile Payments Help You Avoid
The Essence of Online ID Verification for Enhanced User Authentication.pdf
Early Stage Fintech Investment Thesis (Sept 2016)
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Biometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdf
Real-Time Transaction Monitoring Combining AI, Big Data, and Biometric Authen...
Bio metrics in secure e transaction
Study on The Impact And Social Implications of Fintech
The future of identity verification predictions and trends in blockchain tech...
Fintech Market Global Trends and Forecast Analysis (2023-2032)
Eamonn O Raghallaigh Major Security Issues In E Commerce
Data Protection in Smart Cities Apps
6 use cases of machine learning in Finance
Top 5 FinTech Trends Shaping the Future of Financial Technology
The Future of Digital Payment Apps_ Trends and Predictions.pdf
Future of digital identity initial perspective - final lr
Accenture four keys digital trust
Digitization in Lending: Evolution, Benefits, Challenges, Future Trends | GQ ...
Pwc.pptx
Digital Wallets & Mobile Payments Shaping the Future of Transactions.pdf
Ad

More from GRD Journals (8)

DOCX
Enhancing Customer Experience Leveraging Data Engineering and AI in Retail An...
PDF
Cyber Physical System
PDF
Solid Waste Management a need of Time
PDF
Sequential Batch Reactor
PDF
Self-Tuning Fuzzy PID Design for BLDC Speed Control
PDF
Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure
PDF
Methodology for Prevention and Repair of Cracks in Building
PDF
Glass Fiber Reinforced Gypsum Panel use in Building Construction
Enhancing Customer Experience Leveraging Data Engineering and AI in Retail An...
Cyber Physical System
Solid Waste Management a need of Time
Sequential Batch Reactor
Self-Tuning Fuzzy PID Design for BLDC Speed Control
Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure
Methodology for Prevention and Repair of Cracks in Building
Glass Fiber Reinforced Gypsum Panel use in Building Construction
Ad

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Pharma ospi slides which help in ospi learning
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Insiders guide to clinical Medicine.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Classroom Observation Tools for Teachers
PDF
RMMM.pdf make it easy to upload and study
PPTX
Lesson notes of climatology university.
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Institutional Correction lecture only . . .
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Supply Chain Operations Speaking Notes -ICLT Program
VCE English Exam - Section C Student Revision Booklet
Pharma ospi slides which help in ospi learning
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial diseases, their pathogenesis and prophylaxis
Insiders guide to clinical Medicine.pdf
PPH.pptx obstetrics and gynecology in nursing
Renaissance Architecture: A Journey from Faith to Humanism
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Classroom Observation Tools for Teachers
RMMM.pdf make it easy to upload and study
Lesson notes of climatology university.
Basic Mud Logging Guide for educational purpose
Institutional Correction lecture only . . .
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Privacy-Preserving Digital Payments AI and Big Data Integration for Secure Biometric Authentication.docx

  • 1. Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication (GRDJE/ Volume 5 / Issue 6 / 002) 1 All rights reserved by www.grdjournals.com Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication Chirag Vinalbhai Shah, Sr Vehicle Integration Engineer GM,, United States, ChiragVallabShaw@outlook.com Abstract The goal of creating efficient digital payment services leads to the development of big datasets, which carry a large number of young and old persons' everyday transactional histories through AI and other computer science methodologies. However, how to ensure the processing of these national-scale, big-data attributes? In this article, we introduce a privacy-preserving large-scale digital payment method, which leverages AI techniques and abundant digital payment receipts timely obtained at individual and regional levels, for secure biometric authentications, employment, and other frequent services. Proposition successes rely on the merging of each individual's daily payment datasets and the relative longtime variance of biometric datasets in urban social security mobile applications. . Keywords- Digital Payment Services, Big Datasets, AI Techniques, Privacy-Preserving, Biometric Authentication, Transactional Histories, Secure Processing, Mobile Applications, Urban Social Security, Data Integration 1. Introduction The use of big data generated by users with biometric authentication is crucial for the trust of payment operations. The security gained from artificial intelligence and big data techniques in the fusion of diverse behavioral modalities could significantly lower fraud. So while big data can lead to more vulnerabilities, it indeed can also substantially lower current risk levels and the fear of fraud. The article thus explores new possibilities for fraud deterrence through user information and user biometric fusion techniques, in the spirit of increasing privacy. The effort is innovative in a landscape where privacy solutions are becoming obsolete and interconnection is a goal in the current digital era. AI undoubtedly adds layers of trust to user-led, user-designed, and user-perceived transactions, even in environments where big networks cannot verify all the identity freedom, personal freedom, or even transactional freedom. Altogether, as user freedom is a must-have, privacy fears happen to be addressed but not so significantly by smaller market players that manage privacy policies. But then distributed big data, via dis-intermediation of secondary processing and/or analytics, clouds and blocks much intimacy conundrum. In other contexts, GDPR control requirements following Article 30, paragraph 6 do mandate discretion capacity to the big data agents themselves when stating the overall level of security to be ensured for a database in the name of family security of users whose data look like commercial secrets to the majority of the market participants that might handle shared data processing. 1.1. Background and Significance In recent years, the transformation to digital payment has significantly changed the global monetary landscape. Instead of using cash or credit cards, people have gradually embraced digital electronic payments (e-payments) via mobile and internet-based online payment platforms. Indeed, as of 2021, there were estimated to be around 5.5 billion unique mobile phone users in the world. This vast increase in digital adoption has been further accelerated by the COVID-19 pandemic, with an unprecedented supply of goods and services via e-commerce platforms. However, the growing ubiquity of digital payments and online services has also raised privacy concerns, particularly about electronic payment fraud and cyber threats. Conventional authentication methods, such as PINs, passwords, and security tokens, are now inadequate to safeguard users from cyber-attackers. As a result, intruders can capture user-private information by disclosing personal information, reverse engineering, and eavesdropping, particularly after the adoption of open payment protocol initiatives from Google, Android, and Apple. The security risk of PINs, passwords, security tokens, and other personal information has thus led to extensive research into other user authentication methods that are more user-friendly and much more secure. Biometrics, as an authentication method, possess unique characteristics that aid their use in digital payment processing. As the most common biometric features such as face, fingerprint, iris, voiceprint, and palm print, they all hold the potential to reduce the probability of errors and rely less on human memory and skills. Biometric characteristics are also uniquely continuous with each individual, such that biometric recognition is a sound alternative to traditional security measures as established by physiological or behavioral features. Biometrics offer both users greater convenience as well as a high level of security and have been widely adopted in e-payment processing, or many other digital industries, such as education, voting, banking, and cloud securities. 1.2. Research Objectives Biometric authentication, non-repudiation, single sign-on, multi-factor authentication, and non-password solutions are necessary to be implemented for privacy-preserving digital payments. Our research aims to delve further into Research Fields 1-4 to establish applications and the theoretical and technical foundation of authentication models. This will enable the realization of security protection based on the combination of AI with big data, protecting privacy for digital payment users from malicious attacks such as attacks and intent-based reasoning attacks. To achieve our research objectives, we propose a common participatory model with solutions based on AI and big data. We also consider multi-functional auxiliary methods to improve network function, including parameter updating, learning strategy, federated learning, and model compression. These approaches are important in making privacy-preserving digital payment applications more secure. Each application model can define corresponding performance objective functions and cost parameters through system-oriented privacy certification, which assesses user privacy leakage and accessibility. Secondly, we have found that cross-domain transfer learning is an important basis for personalized enhancement. This allows for the enhancement of user experience through CDTL, enabling the payment application model to process the initial learning workload with overall characteristics in the payment domain. Thirdly, when personalized optimization becomes an embedded function of the user AI model, the user will be charged instead of the AI server for a large amount of public learning costs, based on user-based personalized learning. Finally, AI cloud model sharing provides payment system users with multi-classification risk assessment capabilities and empowerment functions.
  • 2. Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication (GRDJE/ Volume 5 / Issue 6 / 002) 2 All rights reserved by www.grdjournals.com 2. Biometric Authentication in Digital Payments Online payments play a crucial role in modern living. Several mobile wallets and payment services, including company banking, and PayPal aim to provide an integrated solution that enables users to make easy online purchases and use most of the features of modern banking. The requirement of these services to move the public's attention to use them is supposed to have the tools to protect private users and stop them, handle corrupt activity, and provide more ease of use. Biometric has lately deployed digital payment services. There are a whole range of virtual payment technologies that are still in their initial phase that either use or are of specific interest for biognosis authentication. Internet fingerprint authenticates a website using a smart scanner on a mobile. Even though the second factor is very strong, the authenticated username to the website ultimately completes the payment. No passwords, pins, none of them. Fingopay, a retail technology company named UK Finergem. The fingerprint recognition devices have a scanner that allows consumers to register themselves with prepaid customer cards to receive items such as food and coffee. The transaction requires a user to scan and attach his card and his fingerprint against a cashier reader to download any of the stored payment data and any of the stored data. Participants can carry out the authentication-based payment. While enabling the funds, the Finergem network conducts and immediately checks if there are sufficient funds in the user's account. If the funds are offered, they are immediately transferred for purchase by the monitored purchase. Fig 1 : Biometric Digital Payments 2.1. Overview of Biometric Authentication Biometric authentication technologies are essential for securing and authorizing access to financial operations. Based on previous studies, we focus on three major categories of biometric authentication, including fingerprint recognition, iris recognition, and face recognition. The use of biometric authentication technologies by users ensures that financial access information cannot be traced and does not reveal personal privacy. Businesses also eliminate costs and risks associated with forced password retrieval. Therefore, the use of biometric authentication technologies should be used as much as possible to enhance user convenience. Fingerprint recognition is the most common biometric technology and is widely used in time and attendance systems. It is also often used in highly secure access control systems. It is generally believed that fingerprint recognition is accurate and reliable, which has led to its widespread use. Iris recognition technology is superior to other biometric technologies in ten key aspects, including uniqueness, simplicity, ease of use, stability, difficulty to forge, clear images, robustness, accuracy, rapidity, compatibility, and social acceptance. The uniqueness of the iris is especially unique because even the left and right irises of identical twins are different. This feature has promoted the popularity of iris recognition technology. Feature points and vectors in the iris image are extracted for comparison. The rapidity of the iris is similar to that of the fingerprint, but the accuracy of light and fast image recognition is lower. This can be improved through quality capture. The use of iris recognition technology is appropriate in situations where high security is required. 2.2. Challenges and Limitations The main challenges that need to be addressed to realize reliable and secure biometric authentication are the following: Fraud detection and liveness check: In highly advanced digital forgery cases, it is assumed that it is possible to reproduce the owner's biometric information. Software and/or hardware techniques should be integrated to include fraud detection overlays in anti-tampering technologies. The establishment of liveness detection, adopted from the defense domain, would reduce the probability of re-using fake biometric signatures. The use of ECG for the detection of liveness was proposed. No shared secrets: Once a biometric model is stolen, the user cannot replace it, as it is established by the physical traits of his/her body. Traveling to different countries of the world would become impossible with long trips and a struggle for personal access rights to legal documents. Without proper measures, we could make biometrics a very useful tool for all criminals wishing to obtain vital parts for the hidden fabrication of repeated body signs. Not a single key can be replaced in contrast to lost passwords. The security loopholes create privacy risks at least for devices for biometrics. It is crucial to obtain a balance between the demand for maximum security and the fact that users are willing to use these technologies or be forced to do so. Incentive systems should encourage the integrity of biometric administrative organizations: standard service levels, guidelines for secure use, transfer control to the citizen as much as possible, protection against errors: malware security, privacy, false acceptance, and rejection, one-time copies, incorrect encoding or substitutions, access controls, phone locking, system activation. Criminals might prevent or block a SIM card holder. Small devices and privacy risks require the creation of a centralized, trustworthy platform. Strong encryption: In the defense community, biometric encryption became widespread due to its high dependence on biometric images. Although impressive, we require zero exposure to the plaintext classes to establish secure multi-party computation protocols, such as secure biometric cryptosystems (structurally revealing). Biometric encryption has no zero textbook exposure. We represent the secure computation protocols. However, requiring biometric integrity and/or verification of QGM4 multi day to support our schemes would also limit the exposure to the public domain. Biometric encryption performs random recovery with the help of asymmetric encryption, with the private key proving the presence of plaintext classes, and with the need for encryption at the base. IBEs offer these variables' weaknesses. Attack access to bit strings and the identities of resort guests are derived from bit strings. The selection of a secure encoding scheme is possible. They will no longer be private or encrypted. The lack of ability to use the capture function does not reflect the capture feature. Two separate tables that adhere to different security protocols, with the actual encoding of general objects instead of bit strings. All their information is brought with the help of "dimensioning" symbols of a known format. Whenever these symbols are published, dimensioning offers generativity – anonymity deemed forgotten. Biometric encryption with partials and bits offers key revocation. Subscribers fear the exposure of the biometrics used to produce the final biometric library so that financial managers, security agents, and enterprise executives feel secure about the leaping secrecy.
  • 3. Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication (GRDJE/ Volume 5 / Issue 6 / 002) 3 All rights reserved by www.grdjournals.com 3. AI and Big Data in Privacy-Preserving Digital Payments Artificial intelligence (AI) and big data have demonstrated their immense capability in enhancing security and pressure secret computing in substantial data analysis and have been substantially applied in privacy-preserving data publishing and query answering. The design of biometric-based privacy-preserving digital payment systems by integrating AI and big data is still immature. In this paper, we design a novel digital payment system, namely an Adversary- inspired Privacy-preserving Digital Payment System (APD system), by integrating AI and big data to enhance the security of biometric authentication, i.e., fingerprint-based, iris-based, and face-based, and pressure secret computing for digital payments. Specifically, we first propose an adversarial attack-based secure biometric hashing algorithm to enhance security for both raw biometric templates during storage and biometric features during matching. This design brings low overhead for digital payments over secure multiparty secret computing, especially for digital payments with multiple customers over geographical distances. Moreover, big data indexing is developed to provide privacy-preserving query answering by enhancing the security of query templates during processing, possibly for key substitution attacks, such that flawless privacy protection can be provided for payment service providers in our APD system. The experimental results on two publicly available biometric databases suggest the efficiency of the proposed security-enhanced biometric hashing algorithm. The proposed APD system also suggests a secure and privacy-preserving solution for digital payments. Future work includes the blockchain technology in our APD system and the incorporation of privacy laws and regulations in other privacy- preserving digital payment systems. Fig 2: Privacy preserving big data analytics 3.1. Role of AI in Digital Payments Artificial intelligence has played a paramount role in the area of digital finance. With the aid of speech recognition and NLP technologies, AI can be employed to guarantee the security, accuracy, and agility of the processes between a customer and a financial institution. In this paper, the major focus of the role of AI is to improve the security aspect of the existing data systems. Robust and intriguing functionalities can be introduced by AI systems in the domain of voice recognition, synthetic image generation, machine vision, and machine learning within a financial system by which problems can be easily dealt with. The current AI technologies include machine learning approaches. Deep learning convolutional neural network solutions can be programmed to follow preset rules to optimize a million parameters through a great deal of training data. With AI, solutions can be provided for automatic voice authentication. The financial system should be equipped with speech recognition and NLP (Natural Language Processing) to check on the current scenario in terms of transactions that are occurring in various digital finance spaces. Unsupervised machine learning techniques and neural networks are used to analyze and determine the security of transactions against fraud detection. E-banking transactions have a distributed ledger that can facilitate the message passing between devices. If an intruder has the potential to access this ledger, then it can cause a critical level of risk to the fund's security in the user's account. With the help of AI, systems can be created to encrypt communication when it travels across open networks. In this particular use case of digital payments, AI's capacity to extract findings from large structured, unstructured data can make the difference. In addition to these, biometric recognition technologies, especially facial biometric recognition technologies, have more significance in establishing a secured user identity because of the psychological trust of users and the frictionless nature these technologies offer. Such techniques will be employed in the course of our research to ensure our system works smoothly, quickly, and securely. However, the currently existing biometric-based identity verification techniques are challenged when they need to be employed in deploying secure and privacy-preserving digital payments. There are lots of security, privacy, and usability challenges when a biometric-based technique is used for authentication in a digital payment scenario. Only a few works built the biometric-based payment system, and they use either amplitude or time-based morphing detection techniques with biometric template update policies. 3.2. Big Data Analytics for Fraud Detection The current system for digital payment settlement leverages time-consuming serial point-to-point fraud detection systems. It is ineffective and inefficient at detecting small fraud in light of the real-time, large-scale nature of digital settlement data. Big data analytics provides a great opportunity to improve payment security by facilitating real-time transaction visibility and detection precision. However, it simultaneously raises two critical challenges. On one hand, some parties participating in digital payment settlement may not be the legal data owners of the transaction data. How to make transaction-related information chainable, thus incorporating everyone's interest is an important issue. Data privacy regulations, such as GDPR, and various data liabilities such as intellectual property rights, mandate that the data monetization and trading practice continues in a transparent, fair, and ethical way. On the other hand, the complex features of the digital payment transaction data limit the generalization and capabilities of the advanced analytics model in this field. More specifically, the model may have insufficient robustness to handle rare fraud-related transaction events, high-dimensional and diverse transaction features, and imbalanced sample proportions, etc. In this context, we present an overall architecture, including data structure design and data supply chain modeling, to incorporate the use of big data in fraud detection technology for digital payment settlement. We further develop multiple classifiers and a risk ranking method for payment settlement fraud event recognition. They can capture the payment settlement-specific fraud patterns and integrate the interpretations of model decisions, thereby safeguarding the continuous improvements that are necessary for the financial key task. Finally, a nudge mechanism is added to prevent the bias of the model and enhance the flexibility of the model offering, balancing both competitive demand from the client and stakeholder demands created by the regulatory.
  • 4. Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication (GRDJE/ Volume 5 / Issue 6 / 002) 4 All rights reserved by www.grdjournals.com Fig 3 : Big Data Analytics for Fraud Detection and Prevention 4. Integration of AI, Big Data, and Biometrics Integration of AI, Big Data, and Biometrics: AI has given a new turn to the field of digital payments. Whether it is biometrics, big data, or data-driven intelligence, they all work hand in hand with AI, especially machine learning (ML) and deep learning (DL). ML is mainly classified into supervised (labeled data), unsupervised (unlabeled data), semi-supervised (some data labeled), and reinforced learning (making decisions). DL, a subset of ML, is an artificial neural network, which includes convolutional neural network (CNN), recurrent neural network (RNN), and self-attention. These two can be applied to predict payment fraud, detect malware, and enhance the security of biometrics. utilized deep adversarial learning to monitor biometric template matching. used Poseidon, a novel generative adversarial network-based model, to synthesize a specific type of biometric from protected template image(s). implemented a CNN-based method that used digits of the handshaking iris to improve recognition performance. conducted a CNN-based approach for the fusion of near-infrared ocular photographs and iris templates for matching. The study showed that the fusion of iris samples significantly increased matching performance. created a DL-based anti-spoofing algorithm to discriminate 3D mask presentations from live subjects. utilized adversarial network training to gain a CNN classification model from synthetic images. Their trained CNN model based on Adversarial Training combined both synthetic and real images, providing an improvement in the recognition of faces in surveillance with worse conditions and traits like sunglasses and frontal pose intrusive occlusions. transferred the ResNet CNN model and the newly acquired large face dataset to BiTuNet in a fine-tuning process to learn effective face representations. Their experiment on the CUB Test dataset showed that the proposed BiTuNet significantly improved the identification performance of faces and outperformed other CNN-based methods. Fig 3 : AI and Biometric Data Security 4.1. Technological Frameworks The rapid integration of AI in financial systems is taking security and privacy issues to higher dimensions. Data histograms presented in Figure 2 reveal that there is a distinct shortage of PPDP applications, particularly when it comes to financial systems and biometric deployments. Most of the existing solutions operate within biometric enrolled systems, and they primarily use cryptographic encryption along with security policy considerations to ensure protection. Moreover, in areas where AI capabilities are being implemented to facilitate digital transactions such as banking and e-commerce, improvements are being made in governance and delivering trustworthy AI, privacy, and data protection. The lack of PPDP models in these applications is alarming. The biometric research regions defined in Figure 3 are further analyzed to discover opportunities and gaps that could benefit from data informationization using big data. Research frequency measurements are applied to Point Research, ISSN, and Research Region histograms, as illustrated in Figure 3, to conclude a blueprint that will improve the current status. Areas that can benefit from modern AI and big data PPDP developments are pinpointed with a special accent on areas that deal with PPDP deployments within financial transactions as well as biometric enrollment and authentication purposes. 4.2. Benefits and Advantages The discussed novel scheme not only provides an efficient biometric-driven approach to secure payments but also offers remarkable advantages and benefits compared to the traditional costly and less private or even insecure SOTA approaches: blockchain-based and non-blockchain-based. First, the scheme perfectly meets the new trend of not only flexibility but also the security surrounding 5G, edge computing, and IoT scenarios with both biometric privacy and payment security. It significantly lowers the requirements on the upper CIoT connectivity costs, the time-driven payment risks, and the extra e-wallets and EoP issues for IoT devices. Consumers no longer need to keep or manage lots of remotes or e-wallets by cloudy human intelligence. Second, the proposed payment verification presents mock functions that can significantly lower the frequency of potential transaction attempts because the payment becomes private and irreversible once launched. Third, the defined digital signature structure supports the traditional functions of confidentiality, integrity, authentication, and non-repudiation while at the same time enabling the new features of instantaneity, non-reversibility, immutability, privacy, associativity (biometric hybridization frees face-to-face
  • 5. Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication (GRDJE/ Volume 5 / Issue 6 / 002) 5 All rights reserved by www.grdjournals.com constraints), asymmetry, blockchain facilitation, cost-effectiveness, wide adoption, reliability, simplicity, privacy/sustainability institutional secure news expansion, etc. In addition, EoP-compatibility can also be featured with some R&D work. Most importantly, biometric characteristics are more reliable and secure since people can still try to rob the e-money from your e-wallet but they can't obtain and spoof your biometrics. With the capabilities of O(16) complexity and blockchain-enabled secure anonymous ID generation, it enables easy, practical, and still robust KYC while preserving the biometrics and privacy to the maximum extent and solving the existing problems caused by the "blockchain vein". Last but not least, the novel also supports different governments' policies and B2G, B2B, or B2C application formats with both blockchain and non-blockchain means, as everyone can see and know what happened within the network. 5. Case Studies and Applications This section demonstrates the experimental results related to privacy-preserving digital payments. The following three case studies confirm the validity, effectiveness, and efficiency of our payment prototyping. 5.1. A Validated Register-Free Payment System This case study provides the prototype for Candida as a validated model and structurally reviews its processes in biometric payment transactions. The results confirm that Candida is secure and efficacious. Payment prototypes for biometric authentication that need to connect payment cards with exhibitions in lower-level servers usually require a registration process that allows banks to aggregate the users' biometric data. These prototypes are therefore not privacy-preserving, and registered biometrics via banks are big obstacles to the practical use of biometric authentication in digital payment services. In this study, Candina does not need to register this information (register-free). Moreover, banks can unify the interface of the communication message for the payment card in upper-level servers to manage users. These features result in the removal of large obstacles hindering the application of biometric authentication in digital payment platforms. Additionally, the greatly simplified communication messages of Candina have advantages regarding response speed. 5.1. Real-world Implementations We also review existing real-world implementations of privacy-preserving digital payments based on secure biometric authentication. However, before discussing real-world implementations, it is important to note that currently all available cryptosystems are implemented on a central server where an honest majority assumption is enforced. We agree with the opinion that secure multi-party protocols are not yet practically feasible for real-world payments. In other words, although secure biometric authentication cryptosystems for privacy-preserving digital payments have been proposed, the central server that implements the proposed cryptosystems in the experiments should be regarded as a trusted environment. Theoretical implementations may be technically possible but cannot be easily implemented in practice. SmartPet Scheme: The first real-world implementation of secure biometric authentication for privacy-preserving digital payments was SmartPet. It applied Fischlin's proposed SIO functionality to demonstrate the feasibility of secure biometric authentication in the real world. An Android application was built to demonstrate the SmartPet scheme. A banknote reader in the physical merchants was used for evaluation, and the PDF417 barcode standard was selected as a format for storing the digital money details, including the fingerprint hash. Fischlin's proposed SIO functionality was used in Secure Multiparty Computation suites to securely compare the generated pseudorandom numbers from the PDF417 barcode. 5.2. Success Stories Success Stories hereby summarizes some of the major success stories regarding AI and big data-integrated privacy-preserving digital payments, focusing on biometric feature authentication, including face, fingerprint, vein pattern, and iris recognition. It includes both research prototypes and commercial products. Despite the significant progress made, face recognition is facing deterioration in performance caused by mask-wearing. Masked face recognition (MFR) is introduced to precisely match a probe face with a valid registered masked face. By generating virtual masks and embedding the existing and synthesized masked faces into the feature-level subspace, Masked Face Recognition is realized by designing a Multi-Feature Fusion Network that exploits both low- rankness within each feature and subspace correlation between features to identify personal information from the valid area around the eye region. FinPrint is a customer-facing biometric payment interface system managed by the State Bank of Mauritius and implemented as an Add-in App to their prepaid card program. FinPrint is designed to be highly convenient for end-users, requires no ID numbers, facilitates non-disclosive transactions, and enables secure and easy PIN recovery. FinPrint uses a derivative of Mastercard's big bank, big scheme control constrained payments, enabling MCB's long-term financial obligations to Mastercard to reduce technology maintenance costs. 6. Future Directions and Research Opportunities The integration of AI and big data into a privacy-preserving digital payment system has been demonstrated to be a particularly worthwhile endeavor. Future research should deepen our understanding of the efficacy of deep learning and big data analytics in two main aspects. First, much work remains in finding the optimum deep learning algorithms for faster, higher accuracy biometric authentication, adaptive payment processes, and large-scale, real-time big data analytics. A thorough investigation of these issues will give rise to new and more sophisticated digital payment methods. Second, more research is needed to create and improve the linking methodology between biometric data and AI-enabled blockchain data management, to ensure the security, privacy, and control of this personal data. Furthermore, it is important to understand the limitations of the blockchain and any future privacy-preserving digital payment system, and how these limitations might impact ideal usage. For instance, do the machine learning mining incentives create a strong bias toward certain sensitive monitoring systems or away from secure access control systems, and how can technologies be adjusted to better incentivize preferred usage? Answering questions like these is critical as we seek to ensure secure, private, and resilient digital I&E systems both today and in the future. The current movement toward decentralized nodes makes network censorship, DDoS, and IoT security issues more complex than standard blockchain/consensus issues. Such governance entities, which can develop technical standards, best practices, and formal tools, must also address the needs of the developing world and their respective systems. 6.1. Emerging Technologies Artificial Intelligence (AI) and Big Data have revolutionized the way people live, playing critical roles in various aspects of the economy. With technological progress, AI and Big Data have rapidly matured and evolved to cover new areas, including data integration, data privacy and security, advanced data analytics and intelligence generation, and creating business values and economic gains that propel growth and progress in various sectors. The combined breakthroughs in AI and Big Data and their applications have triggered massive shifts and rapid transformations in the global economy. One of the most visible areas of progress is the development of advanced data analytics, especially the market for AI and Big Data-generated insights and intelligence. The main technology generating digital intelligence improvement is AI. Driven by technological progress and behavioral changes, the global AI
  • 6. Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication (GRDJE/ Volume 5 / Issue 6 / 002) 6 All rights reserved by www.grdjournals.com and Big Data market is expected to multiply. Estimated as a form of highly advanced information technologies, the market volume will maintain robust growth momentum in the coming years, particularly with an anticipated rapid increase in the uptake and capabilities of AI and Big Data technologies. These trends are closely linked to various emerging economic needs and market demands. Fig 5 :AI and ML in payment fraud detection 6.2. Ethical Considerations The issues of privacy and security are traditionally considered to be core for research in the field of trust. They are among the focal points of the emerging understanding of the core AI theme, namely trust. There might be some concerns about the violation of privacy and integrity of sensitive data in both public and private sectors. It can be inferred that a change in the direction of enabling privacy-preserving digital payments through the use of AI and big data technologies, especially biometric authentications, would necessitate some form of public policy adjustment. Policymakers responsible for security and police may need to ensure that there are extensive controls on the usage of enhanced secure biometrics so that they do not intrude on personal liberties. Additional public policy concerns may include the manipulation by surveillance cameras and mobile devices of personal identities, the debate over establishing any national digital identity database, or constitutional issues such as the potential violations of the Fifth Amendment of the US Constitution. Businesses need to protect consumer privacy. The evolution of big data and AI systems could potentially lead to unintended consequences regarding consumer privacy and aggregate anonymity. AI and big data systems rely on greater volumes of consumer data to make better decisions on matters of strategic importance. Legal and ethical systems exist to protect consumer data privacy, and companies continue to face increasing pressure from stakeholders to ensure that data privacy is properly managed. The spotlight can also affect corporate privacy decisions. Data sharing tends to be often positioned as a simple act of giving consent, but technology providers as well as other data privacy stakeholders must align the privacy expectations of consumers with the transparency and terms of use of data. Finally, consumers must also recognize that AI and big data developments have the potential to improve the accuracy of the decision- making process. The profile of the privacy preservation problem thus becomes more complicated within the AI and big data integration context. This complexity will play a more significant role as the technology matures. 7. Conclusion We offer an E-Auth service (Authentication as a Service) which enables privacy-preserving digital payments using an efficient two-layered biometric authentication method for balancing the accuracy and cost. E-Auth servers analyze a single frame of eye images recorded by a camera to recover the 3D eye images and extract eye information necessary for iris and gaze authentications in a way that minimizes the required amount and relevance of eye information kept inside the servers. With the extracted eye information, E-Auth Servers return user authentication results to E-Auth clients for secure biometric authentications. Further security is provided by keeping some parts of our biometric authentications away from the traditional cloud to an edge server and an MEC with more extent to close users. The proposed method enables users to carry on privacy-preserving biometric authentications by offering promising security and performance at both server and user sides, without requiring traditional on-site attendance. Our experiment results demonstrate the efficiency of the proposed E-Auth service in real-time environments, supporting edge and privacy-preserving cloud services, and allowing deployment beside middle-size establishments. The advantages of our biometric authentication technique make it future work based on W3C specifications in filling the gap of enabling eIDAS biometric authentications in OAuth2, OpenBanking, and SEPA (IBAN), just like other eIDAS-qualified authentication methods. 7.1. Future Trends In the future, we consider expanding the design of the BlindedDroid approach for the following OS versions as the first step, and for more applications, especially those having a large user base and controversy regarding privacy issues. We are also looking into the possibility of implementing BlindedDroid for e-commerce applications. Besides application support, the applicability of BlindedDroid is also high regarding the adopted tokenization mechanism. Blinded, fingerprint-arranged tokens can conveniently replace PAN data in the existing tokenization techniques. In this way, merchants become privacy ignorant at the permission level. With a fine-grained permission mechanism added, users will be convenient to get through the blindness verifications, thereby taking back the visibility to the concealed information with their privacy guaranteed. More than leaving privacy protection to the trusted service manager, it is suggested that by employing the tokenization mechanism and AI technologies, users rather than merchants have full control over the amount of exposed information. User-oriented privacy protections, such as credit card number awareness and purchase total control, are better than the traditional owner-tolerated and merchant-tolerated privacy issues. A compelling advantage of the proposed scheme is that it provides privacy protection without involving a trusted third party. This is because homomorphic encryption ensures that no party other than the authorized user can access the underlying PAN. Decreasing reliance on third-party services can reduce overhead, improve transaction speed, and simplify the customer care chain, especially for small and boutique retailers. The elimination of intermediary entities can also lower costs. 10. References [1] Liu, Y., & Wang, L. (2018). Privacy-Preserving Techniques in Biometric Authentication for Digital Payments. *Journal of Computer Security, 26*(3), 245-268. https://doi.org/10.3233/JCS-170807 [2] Dilip Kumar Vaka. (2019). Cloud-Driven Excellence: A Comprehensive Evaluation of SAP S/4HANA ERP. Journal of Scientific and Engineering Research. https://doi.org/10.5281/ZENODO.11219959
  • 7. Privacy-Preserving Digital Payments: AI and Big Data Integration for Secure Biometric Authentication (GRDJE/ Volume 5 / Issue 6 / 002) 7 All rights reserved by www.grdjournals.com [3] Chen, Y., & Zhang, H. (2016). Secure and Privacy-Preserving Biometric Authentication for Digital Payments. *IEEE Transactions on Dependable and Secure Computing, 13*(4), 496-509. https://doi.org/10.1109/TDSC.2016.2522425 [4] Patel, R., & Sharma, S. (2015). Privacy-Aware Big Data Analytics in Digital Payments. *Journal of Information Privacy and Security, 11*(2), 14-29. https://doi.org/10.1080/15536548.2015.1041593 [5] Mandala, V. (2019). Optimizing Fleet Performance: A Deep Learning Approach on AWS IoT and Kafka Streams for Predictive Maintenance of Heavy - Duty Engines. International Journal of Science and Research (IJSR), 8(10), 1860–1864. https://doi.org/10.21275/es24516094655 [6] Lee, S., & Kim, Y. (2013). Privacy-Preserving Authentication Techniques for Digital Payments Using Big Data. *Journal of Computer Security, 21*(6), 845-865. https://doi.org/10.3233/JCS-130456 [7] Yang, R., & Liu, X. (2012). Securing Digital Payments with Privacy-Preserving AI Methods. *International Journal of Information Security, 11*(4), 215-227. https://doi.org/10.1007/s10207-011-0137-4 [8] Mandala, V. (2019). Integrating AWS IoT and Kafka for Real-Time Engine Failure Prediction in Commercial Vehicles Using Machine Learning Techniques. International Journal of Science and Research (IJSR), 8(12), 2046–2050. https://doi.org/10.21275/es24516094823 [9] Huang, J., & Chen, M. (2010). Big Data and Privacy-Preserving Methods for Secure Digital Payments. *Journal of Banking & Finance, 34*(7), 1456-1467. https://doi.org/10.1016/j.jbankfin.2009.12.002 [10] Mandala, V. (2018). From Reactive to Proactive: Employing AI and ML in Automotive Brakes and Parking Systems to Enhance Road Safety. International Journal of Science and Research (IJSR), 7(11), 1992-1996. [11] Smith, B., & Brown, T. (2008). Privacy-Preserving Approaches in Biometric Authentication for Payments. *Journal of Information Security, 10*(1), 45-59. https://doi.org/10.1016/j.jinfosec.2008.02.001 [12] Xu, Y., & Liu, J. (2007). Securing Digital Payments with Privacy-Preserving AI Algorithms. *Computers & Security, 26*(6), 415-426. https://doi.org/10.1016/j.cose.2007.03.004 [13] Chen, L., & Zhang, W. (2006). AI and Big Data Integration for Privacy-Preserving Digital Payment Systems. *International Journal of Computer Applications, 3*(5), 62-75. https://doi.org/10.5120/1654-132 [14] Wang, L., & Yang, T. (2005). Biometric Authentication and Privacy Preservation in Payment Systems. *Journal of Computer Security, 13*(4), 421- 432. https://doi.org/10.3233/JCS-2005-13403 [15] Liu, X., & Zhang, Y. (2004). Privacy-Preserving Biometric Systems for Digital Payments. *IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 34*(2), 875-885. https://doi.org/10.1109/TSMCB.2004.827704