Fusion Net-3: Denoising-based secure biometric authentication using fingerprints
R. Sreemol , M. B. Santosh Kumar , A. Sreekumar
International Journal of Systematic Innovation ›› 2025, Vol. 9 ›› Issue (4) : 84 -105.
Fusion Net-3: Denoising-based secure biometric authentication using fingerprints
Fingerprint-based authentication is a critical biometric approach for ensuring security and accuracy. Traditional methods often face challenges such as noise and suboptimal feature extraction. To address the challenges, Fusion Net-3, an extensive model, is proposed to improve the speed, precision, and security level of fingerprint-based authentication systems. Fusion Net-3 operates through two separate stages: enrollment and authentication. During the enrollment phase, advanced pre-processing of fingerprint images was performed, incorporating an enhanced bilateral filter optimized with the seagull optimization algorithm. After pre-processing, features were obtained using a two-phase method: Zernike moments for shape-based features and local binary patterns for texture-based features. This helped ensure that fingerprint features were considered comprehensive for representation. For feature selection optimization, the falcon-inspired jackal optimization algorithm was proposed, a hybrid method combining the strengths of the golden jackal optimization and falcon optimization algorithm. Then, the selected features were combined using a combination of the geometric mean and the Fisher score to facilitate classification for a balanced and novel representation. During authentication, fingerprints were processed using similar techniques for consistency. Each fingerprint was labeled as genuine or fraudulent with the aid of the Fusion Net-3 model, which leverages the combined strengths of convolutional neural networks, ResNet-50, and U-Net. The model achieved an accuracy of 98.956% and a mean squared error of 0.0234 when implemented on a Python platform. Overall, the Fusion Net-3 model demonstrated superior performance compared to existing methods, effectively enhancing authentication accuracy and security.
Authentication / Bilateral Filtering / Enrollment / Falcon Optimization / Fusion Net-3 / Golden Jackal Optimization / Seagull Optimization
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
|
| [35] |
|
| [36] |
|
| [37] |
|
| [38] |
|
| [39] |
|
| [40] |
|
| [41] |
|
| [42] |
|
| [43] |
|
| [44] |
|
| [45] |
|
| [46] |
|
| [47] |
|
| [48] |
|
| [49] |
|
| [50] |
|
| [51] |
|
| [52] |
|
| [53] |
|
| [54] |
|
/
| 〈 |
|
〉 |