A hybrid biometric identification framework for high security applications

Xuzhou LI , Yilong YIN , Yanbin NING , Gongping YANG , Lei PAN

Front. Comput. Sci. ›› 2015, Vol. 9 ›› Issue (3) : 392 -401.

PDF (603KB)
Front. Comput. Sci. ›› 2015, Vol. 9 ›› Issue (3) : 392 -401. DOI: 10.1007/s11704-014-4070-1
RESEARCH ARTICLE

A hybrid biometric identification framework for high security applications

Author information +
History +
PDF (603KB)

Abstract

Research on biometrics for high security applications has not attracted as much attention as civilian or forensic applications. Limited research and deficient analysis so far has led to a lack of general solutions and leaves this as a challenging issue. This work provides a systematic analysis and identification of the problems to be solved in order to meet the performance requirements for high security applications, a double low problem. A hybrid ensemble framework is proposed to solve this problem. Setting an adequately high threshold for each matcher can guarantee a zero false acceptance rate (FAR) and then use the hybrid ensemble framework makes the false reject rate (FRR) as low as possible. Three experiments are performed to verify the effectiveness and generalization of the framework. First, two fingerprint verification algorithms are fused. In this test only 10.55% of fingerprints are falsely rejected with zero false acceptance rate, this is significantly lower than other state of the art methods. Second, in face verification, the framework also results in a large reduction in incorrect classification. Finally, assessing the performance of the framework on a combination of face and gait verification using a heterogeneous database show this framework can achieve both 0% false rejection and 0% false acceptance simultaneously.

Keywords

biometric verification / hybrid ensemble framework / high security applications

Cite this article

Download citation ▾
Xuzhou LI, Yilong YIN, Yanbin NING, Gongping YANG, Lei PAN. A hybrid biometric identification framework for high security applications. Front. Comput. Sci., 2015, 9(3): 392-401 DOI:10.1007/s11704-014-4070-1

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Jain A K, Ross A, Pankanti S. Biometrics. A tool for information security. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 125-143

[2]

Tabor Z, Karpisz D, Wojnar L, Kowalski P. An automatic recognition of the frontal sinus in X-ray images of skull. IEEE Transactions on Biomedical Engineering, 2009, 56(2): 361-368

[3]

Jain A K, Klare B, Park U. Face recognition: some challenges in forensics. In: Proceedings of the 2011 IEEE International Conference on Automatic Face and Gesture Recognition and Workshops. 2011, 726-733

[4]

Jain A K, Feng J J. Latent fingerprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011, 33(1): 88-100

[5]

Yoon S, Feng J J, Jain A K. On latent fingerprint enhancement. In: Proceedings of SPIE, Biometric Technology for Human Verification VII. 2010, 7-17

[6]

Nakajima K, Mizukami Y, Tanaka K, Tamura T. Footprint-based personal recognition. IEEE Transactions on Biomedical Engineering, 2000, 47(11): 1534-1537

[7]

Prabhakar S, Pankanti S, Jain A K. Biometric recognition: security and privacy concerns. IEEE Security Privacy, 2003, 1(2): 33-42

[8]

Ratha N K, Connell J H, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 2001, 40(3): 614-634

[9]

Liu S, Silverman M. A practical guide to biometric security technology. IT Professional, 2001, 3(1): 27-32

[10]

Marcialis G, Roli F. High security fingerprint verification by perceptron-based fusion of multiple matchers. Multiple Classifier Systems, 2004, 3077: 364-373

[11]

Jain A K, Prabhakar S, Chen S Y. Combining multiple matchers for a high security fingerprint verification system. Pattern Recognition Letter, 1999, 20(11-13): 1371-1379

[12]

Siew C C, Beng J A T, Chek L D N. High security iris verification system based on random secret integration. Computer Vision and Image Understanding, 2006, 102(2): 169-177

[13]

Yin Y L, Ning Y B, Yang Z G. A hybrid fusion method of fingerprint identification for high security applications. In: Proceedings of the 17th IEEE International Conference on Image Processing. 2010, 3101-3104

[14]

Feng J J. Combining minutiae descriptors for fingerprint matching. Pattern Recognition, 2008, 41(1): 342-352

[15]

Maltoni D, Maio D, Jain A K, Prabhakar, S. Handbook of fingerprint recognition. New York: Springer-Verlag, 2009, 224-231

[16]

Maio D, Maltoni D, Cappelli R, Wayman J L, Jain A K. FVC2002: Fingerprint verification competition. In: Proceedings of the 2002 International Conference Pattern Recognition. 2002, 744-747

[17]

Monwar M M, Gavrilova M L. FES: A system for combining face, ear and signature biometrics using rank level fusion. In: Proceedings of the 5th International Conference on Information Technology: New Generations. 2008, 922-927

[18]

Monwar M M, Gavrilova M L. Multimodal biometric system using rank-level fusion approach. IEEE Transaction on Systems, Man, and Cybernetics, Part B: Cybernetics, Part B-Cybernetics, 2009, 39(4): 867-878

[19]

Bhatnagar J, Kumar A, Saggar N. A novel approach to improve biometric recognition using rank level fusion. In: Proceedings of the 2007 IEEE Conference on Computer Vision and Pattern Recognition. 2007, 2978-2983

[20]

Ross A A, Nandakumar K, Jain A K. Handbook of multibiometrics. New York: Springer-Verlag, 2006, 59-82

[21]

Jiang X D, Yau W Y. Fingerprint minutiae matching based on the local and global structures. In: Proceedings of the 15th International Conference on Pattern Recognition. 2000, 1038-1041

[22]

Feng J J, Ou Y Z Y, Cai A N. Fingerprint matching using ridges. Pattern Recognition, 2006, 39(11): 2131-2140

[23]

Turk M A, Pentland A P. Face recognition using eigenfaces. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. 1991, 586-591

[24]

Turk M A, Pentland A P. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991, 3(1): 71-86

[25]

Ahonen T, Hadid A, Pietikäinen M. Face recognition with local binary patterns. In: Proceedings of the 8th European Conference of Computer Vision. 2004, 469-481

[26]

Ahonen T, Hadid A, Pietikäinen M. Face description with local binary patterns: application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006, 28(12): 2037-2041

[27]

Samaria F. Face Recognition Using Hidden Markov Models. PhD thesis<?Pub Caret?> University of Cambridge, 1994

[28]

Belhumeur N, Hespanha P, Kriegman J. Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7) (1997) 711-720

[29]

Black J A, Gargesha M, Kahol K, Panchanathan S. A framework for performance evaluation of face recognition algorithms. In: Proceedings of the International Conference on ITCOM, Internet Multimedia Systems II. 2002, 163-174

[30]

Little G, Krishna S, Black J. A methodology for evaluating robustness of face recognition algorithms with respect to variations in pose angle and illumination angle. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing. 2005, 89-92

[31]

Gao W, Cao B, Shan S G, Chen X L, Zhou D L, Zhang X H, Zhao D B. The CAS-PEAL large-scale Chinese face database and baseline evaluations. IEEE Transactions on Systems, Man, and Cybernetics, Part a-Systems Humans, 2008, 38(1): 149-161

[32]

Liu L L, Yin Y L, Qin W. Gait recognition based on outermost contour. In: Proceedings of the 5th International Conference on Rough Sets and Knowledge Technology. 2010, 395-402

[33]

Yu S Q, Tan D L, Tan T N. A framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition. In: Proceedings of the 18th International Conference on Pattern Recognition. 2006, 441-444

RIGHTS & PERMISSIONS

Higher Education Press and Springer-Verlag Berlin Heidelberg

AI Summary AI Mindmap
PDF (603KB)

Supplementary files

Supplementary Material-Highlights in 3-page ppt

994

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/