A hybrid biometric identification framework for high security applications

Xuzhou LI, Yilong YIN, Yanbin NING, Gongping YANG, Lei PAN

PDF(603 KB)
PDF(603 KB)
Front. Comput. Sci. ›› 2015, Vol. 9 ›› Issue (3) : 392-401. DOI: 10.1007/s11704-014-4070-1
RESEARCH ARTICLE

A hybrid biometric identification framework for high security applications

Author information +
History +

Abstract

Research on biometrics for high security applications has not attracted as much attention as civilian or forensic applications. Limited research and deficient analysis so far has led to a lack of general solutions and leaves this as a challenging issue. This work provides a systematic analysis and identification of the problems to be solved in order to meet the performance requirements for high security applications, a double low problem. A hybrid ensemble framework is proposed to solve this problem. Setting an adequately high threshold for each matcher can guarantee a zero false acceptance rate (FAR) and then use the hybrid ensemble framework makes the false reject rate (FRR) as low as possible. Three experiments are performed to verify the effectiveness and generalization of the framework. First, two fingerprint verification algorithms are fused. In this test only 10.55% of fingerprints are falsely rejected with zero false acceptance rate, this is significantly lower than other state of the art methods. Second, in face verification, the framework also results in a large reduction in incorrect classification. Finally, assessing the performance of the framework on a combination of face and gait verification using a heterogeneous database show this framework can achieve both 0% false rejection and 0% false acceptance simultaneously.

Keywords

biometric verification / hybrid ensemble framework / high security applications

Cite this article

Download citation ▾
Xuzhou LI, Yilong YIN, Yanbin NING, Gongping YANG, Lei PAN. A hybrid biometric identification framework for high security applications. Front. Comput. Sci., 2015, 9(3): 392‒401 https://doi.org/10.1007/s11704-014-4070-1

References

[1]
Jain A K, Ross A, Pankanti S. Biometrics. A tool for information security. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 125-143
CrossRef Google scholar
[2]
Tabor Z, Karpisz D, Wojnar L, Kowalski P. An automatic recognition of the frontal sinus in X-ray images of skull. IEEE Transactions on Biomedical Engineering, 2009, 56(2): 361-368
CrossRef Google scholar
[3]
Jain A K, Klare B, Park U. Face recognition: some challenges in forensics. In: Proceedings of the 2011 IEEE International Conference on Automatic Face and Gesture Recognition and Workshops. 2011, 726-733
CrossRef Google scholar
[4]
Jain A K, Feng J J. Latent fingerprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011, 33(1): 88-100
CrossRef Google scholar
[5]
Yoon S, Feng J J, Jain A K. On latent fingerprint enhancement. In: Proceedings of SPIE, Biometric Technology for Human Verification VII. 2010, 7-17
CrossRef Google scholar
[6]
Nakajima K, Mizukami Y, Tanaka K, Tamura T. Footprint-based personal recognition. IEEE Transactions on Biomedical Engineering, 2000, 47(11): 1534-1537
CrossRef Google scholar
[7]
Prabhakar S, Pankanti S, Jain A K. Biometric recognition: security and privacy concerns. IEEE Security Privacy, 2003, 1(2): 33-42
CrossRef Google scholar
[8]
Ratha N K, Connell J H, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 2001, 40(3): 614-634
CrossRef Google scholar
[9]
Liu S, Silverman M. A practical guide to biometric security technology. IT Professional, 2001, 3(1): 27-32
CrossRef Google scholar
[10]
Marcialis G, Roli F. High security fingerprint verification by perceptron-based fusion of multiple matchers. Multiple Classifier Systems, 2004, 3077: 364-373
CrossRef Google scholar
[11]
Jain A K, Prabhakar S, Chen S Y. Combining multiple matchers for a high security fingerprint verification system. Pattern Recognition Letter, 1999, 20(11-13): 1371-1379
CrossRef Google scholar
[12]
Siew C C, Beng J A T, Chek L D N. High security iris verification system based on random secret integration. Computer Vision and Image Understanding, 2006, 102(2): 169-177
CrossRef Google scholar
[13]
Yin Y L, Ning Y B, Yang Z G. A hybrid fusion method of fingerprint identification for high security applications. In: Proceedings of the 17th IEEE International Conference on Image Processing. 2010, 3101-3104
CrossRef Google scholar
[14]
Feng J J. Combining minutiae descriptors for fingerprint matching. Pattern Recognition, 2008, 41(1): 342-352
CrossRef Google scholar
[15]
Maltoni D, Maio D, Jain A K, Prabhakar, S. Handbook of fingerprint recognition. New York: Springer-Verlag, 2009, 224-231
CrossRef Google scholar
[16]
Maio D, Maltoni D, Cappelli R, Wayman J L, Jain A K. FVC2002: Fingerprint verification competition. In: Proceedings of the 2002 International Conference Pattern Recognition. 2002, 744-747
CrossRef Google scholar
[17]
Monwar M M, Gavrilova M L. FES: A system for combining face, ear and signature biometrics using rank level fusion. In: Proceedings of the 5th International Conference on Information Technology: New Generations. 2008, 922-927
CrossRef Google scholar
[18]
Monwar M M, Gavrilova M L. Multimodal biometric system using rank-level fusion approach. IEEE Transaction on Systems, Man, and Cybernetics, Part B: Cybernetics, Part B-Cybernetics, 2009, 39(4): 867-878
CrossRef Google scholar
[19]
Bhatnagar J, Kumar A, Saggar N. A novel approach to improve biometric recognition using rank level fusion. In: Proceedings of the 2007 IEEE Conference on Computer Vision and Pattern Recognition. 2007, 2978-2983
CrossRef Google scholar
[20]
Ross A A, Nandakumar K, Jain A K. Handbook of multibiometrics. New York: Springer-Verlag, 2006, 59-82
[21]
Jiang X D, Yau W Y. Fingerprint minutiae matching based on the local and global structures. In: Proceedings of the 15th International Conference on Pattern Recognition. 2000, 1038-1041
[22]
Feng J J, Ou Y Z Y, Cai A N. Fingerprint matching using ridges. Pattern Recognition, 2006, 39(11): 2131-2140
CrossRef Google scholar
[23]
Turk M A, Pentland A P. Face recognition using eigenfaces. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. 1991, 586-591
CrossRef Google scholar
[24]
Turk M A, Pentland A P. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991, 3(1): 71-86
CrossRef Google scholar
[25]
Ahonen T, Hadid A, Pietikäinen M. Face recognition with local binary patterns. In: Proceedings of the 8th European Conference of Computer Vision. 2004, 469-481
CrossRef Google scholar
[26]
Ahonen T, Hadid A, Pietikäinen M. Face description with local binary patterns: application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006, 28(12): 2037-2041
CrossRef Google scholar
[27]
Samaria F. Face Recognition Using Hidden Markov Models. PhD thesis<?Pub Caret?>, University of Cambridge, 1994
[28]
Belhumeur N, Hespanha P, Kriegman J. Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7) (1997) 711-720
CrossRef Google scholar
[29]
Black J A, Gargesha M, Kahol K, Panchanathan S. A framework for performance evaluation of face recognition algorithms. In: Proceedings of the International Conference on ITCOM, Internet Multimedia Systems II. 2002, 163-174
[30]
Little G, Krishna S, Black J. A methodology for evaluating robustness of face recognition algorithms with respect to variations in pose angle and illumination angle. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing. 2005, 89-92
CrossRef Google scholar
[31]
Gao W, Cao B, Shan S G, Chen X L, Zhou D L, Zhang X H, Zhao D B. The CAS-PEAL large-scale Chinese face database and baseline evaluations. IEEE Transactions on Systems, Man, and Cybernetics, Part a-Systems Humans, 2008, 38(1): 149-161
[32]
Liu L L, Yin Y L, Qin W. Gait recognition based on outermost contour. In: Proceedings of the 5th International Conference on Rough Sets and Knowledge Technology. 2010, 395-402
CrossRef Google scholar
[33]
Yu S Q, Tan D L, Tan T N. A framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition. In: Proceedings of the 18th International Conference on Pattern Recognition. 2006, 441-444

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(603 KB)

Accesses

Citations

Detail

Sections
Recommended

/