|
|
A hybrid biometric identification framework for high security applications |
Xuzhou LI1,2,Yilong YIN1,*( ),Yanbin NING1,Gongping YANG1,Lei PAN1 |
1. School of Computer Science and Technology, Shandong University, Jinan 250101, China 2. Key Laboratory of Information Security and Intelligent Control of Shandong Province, Shandong Youth University of Political Science, Jinan 250103, China |
|
|
Abstract Research on biometrics for high security applications has not attracted as much attention as civilian or forensic applications. Limited research and deficient analysis so far has led to a lack of general solutions and leaves this as a challenging issue. This work provides a systematic analysis and identification of the problems to be solved in order to meet the performance requirements for high security applications, a double low problem. A hybrid ensemble framework is proposed to solve this problem. Setting an adequately high threshold for each matcher can guarantee a zero false acceptance rate (FAR) and then use the hybrid ensemble framework makes the false reject rate (FRR) as low as possible. Three experiments are performed to verify the effectiveness and generalization of the framework. First, two fingerprint verification algorithms are fused. In this test only 10.55% of fingerprints are falsely rejected with zero false acceptance rate, this is significantly lower than other state of the art methods. Second, in face verification, the framework also results in a large reduction in incorrect classification. Finally, assessing the performance of the framework on a combination of face and gait verification using a heterogeneous database show this framework can achieve both 0% false rejection and 0% false acceptance simultaneously.
|
Keywords
biometric verification
hybrid ensemble framework
high security applications
|
Corresponding Author(s):
Yilong YIN
|
Issue Date: 18 May 2015
|
|
1 |
Jain A K, Ross A, Pankanti S. Biometrics. A tool for information security. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 125-143
https://doi.org/10.1109/TIFS.2006.873653
|
2 |
Tabor Z, Karpisz D, Wojnar L, Kowalski P. An automatic recognition of the frontal sinus in X-ray images of skull. IEEE Transactions on Biomedical Engineering, 2009, 56(2): 361-368
https://doi.org/10.1109/TBME.2008.2003090
|
3 |
Jain A K, Klare B, Park U. Face recognition: some challenges in forensics. In: Proceedings of the 2011 IEEE International Conference on Automatic Face and Gesture Recognition and Workshops. 2011, 726-733
https://doi.org/10.1109/fg.2011.5771338
|
4 |
Jain A K, Feng J J. Latent fingerprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011, 33(1): 88-100
https://doi.org/10.1109/TPAMI.2010.59
|
5 |
Yoon S, Feng J J, Jain A K. On latent fingerprint enhancement. In: Proceedings of SPIE, Biometric Technology for Human Verification VII. 2010, 7-17
https://doi.org/10.1117/12.851411
|
6 |
Nakajima K, Mizukami Y, Tanaka K, Tamura T. Footprint-based personal recognition. IEEE Transactions on Biomedical Engineering, 2000, 47(11): 1534-1537
https://doi.org/10.1109/10.880106
|
7 |
Prabhakar S, Pankanti S, Jain A K. Biometric recognition: security and privacy concerns. IEEE Security Privacy, 2003, 1(2): 33-42
https://doi.org/10.1109/MSECP.2003.1193209
|
8 |
Ratha N K, Connell J H, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 2001, 40(3): 614-634
https://doi.org/10.1147/sj.403.0614
|
9 |
Liu S, Silverman M. A practical guide to biometric security technology. IT Professional, 2001, 3(1): 27-32
https://doi.org/10.1109/6294.899930
|
10 |
Marcialis G, Roli F. High security fingerprint verification by perceptron-based fusion of multiple matchers. Multiple Classifier Systems, 2004, 3077: 364-373
https://doi.org/10.1007/978-3-540-25966-4_36
|
11 |
Jain A K, Prabhakar S, Chen S Y. Combining multiple matchers for a high security fingerprint verification system. Pattern Recognition Letter, 1999, 20(11-13): 1371-1379
https://doi.org/10.1016/S0167-8655(99)00108-7
|
12 |
Siew C C, Beng J A T, Chek L D N. High security iris verification system based on random secret integration. Computer Vision and Image Understanding, 2006, 102(2): 169-177
https://doi.org/10.1016/j.cviu.2006.01.002
|
13 |
Yin Y L, Ning Y B, Yang Z G. A hybrid fusion method of fingerprint identification for high security applications. In: Proceedings of the 17th IEEE International Conference on Image Processing. 2010, 3101-3104
https://doi.org/10.1109/icip.2010.5654191
|
14 |
Feng J J. Combining minutiae descriptors for fingerprint matching. Pattern Recognition, 2008, 41(1): 342-352
https://doi.org/10.1016/j.patcog.2007.04.016
|
15 |
Maltoni D, Maio D, Jain A K, Prabhakar, S. Handbook of fingerprint recognition. New York: Springer-Verlag, 2009, 224-231
https://doi.org/10.1007/978-1-84882-254-2
|
16 |
Maio D, Maltoni D, Cappelli R, Wayman J L, Jain A K. FVC2002: Fingerprint verification competition. In: Proceedings of the 2002 International Conference Pattern Recognition. 2002, 744-747
https://doi.org/10.1109/icpr.2002.1048144
|
17 |
Monwar M M, Gavrilova M L. FES: A system for combining face, ear and signature biometrics using rank level fusion. In: Proceedings of the 5th International Conference on Information Technology: New Generations. 2008, 922-927
https://doi.org/10.1109/itng.2008.254
|
18 |
Monwar M M, Gavrilova M L. Multimodal biometric system using rank-level fusion approach. IEEE Transaction on Systems, Man, and Cybernetics, Part B: Cybernetics, Part B-Cybernetics, 2009, 39(4): 867-878
https://doi.org/10.1109/TSMCB.2008.2009071
|
19 |
Bhatnagar J, Kumar A, Saggar N. A novel approach to improve biometric recognition using rank level fusion. In: Proceedings of the 2007 IEEE Conference on Computer Vision and Pattern Recognition. 2007, 2978-2983
https://doi.org/10.1109/CVPR.2007.383387
|
20 |
Ross A A, Nandakumar K, Jain A K. Handbook of multibiometrics. New York: Springer-Verlag, 2006, 59-82
|
21 |
Jiang X D, Yau W Y. Fingerprint minutiae matching based on the local and global structures. In: Proceedings of the 15th International Conference on Pattern Recognition. 2000, 1038-1041
|
22 |
Feng J J, Ou Y Z Y, Cai A N. Fingerprint matching using ridges. Pattern Recognition, 2006, 39(11): 2131-2140
https://doi.org/10.1016/j.patcog.2006.05.001
|
23 |
Turk M A, Pentland A P. Face recognition using eigenfaces. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. 1991, 586-591
https://doi.org/10.1109/cvpr.1991.139758
|
24 |
Turk M A, Pentland A P. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991, 3(1): 71-86
https://doi.org/10.1162/jocn.1991.3.1.71
|
25 |
Ahonen T, Hadid A, Pietik?inen M. Face recognition with local binary patterns. In: Proceedings of the 8th European Conference of Computer Vision. 2004, 469-481
https://doi.org/10.1007/978-3-540-24670-1_36
|
26 |
Ahonen T, Hadid A, Pietik?inen M. Face description with local binary patterns: application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006, 28(12): 2037-2041
https://doi.org/10.1109/TPAMI.2006.244
|
27 |
Samaria F. Face Recognition Using Hidden Markov Models. PhD thesis<?Pub Caret?>, University of Cambridge, 1994
|
28 |
Belhumeur N, Hespanha P, Kriegman J. Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7) (1997) 711-720
https://doi.org/10.1109/34.598228
|
29 |
Black J A, Gargesha M, Kahol K, Panchanathan S. A framework for performance evaluation of face recognition algorithms. In: Proceedings of the International Conference on ITCOM, Internet Multimedia Systems II. 2002, 163-174
|
30 |
Little G, Krishna S, Black J. A methodology for evaluating robustness of face recognition algorithms with respect to variations in pose angle and illumination angle. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing. 2005, 89-92
https://doi.org/10.1109/icassp.2005.1415348
|
31 |
Gao W, Cao B, Shan S G, Chen X L, Zhou D L, Zhang X H, Zhao D B. The CAS-PEAL large-scale Chinese face database and baseline evaluations. IEEE Transactions on Systems, Man, and Cybernetics, Part a-Systems Humans, 2008, 38(1): 149-161
|
32 |
Liu L L, Yin Y L, Qin W. Gait recognition based on outermost contour. In: Proceedings of the 5th International Conference on Rough Sets and Knowledge Technology. 2010, 395-402
https://doi.org/10.1007/978-3-642-16248-0_56
|
33 |
Yu S Q, Tan D L, Tan T N. A framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition. In: Proceedings of the 18th International Conference on Pattern Recognition. 2006, 441-444
|
[1] |
Supplementary Material-Highlights in 3-page ppt
|
Download
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|