Conference PaperPDF Available

Multimodal Biometric Authentication System using Deep Learning Method

Authors:

Abstract and Figures

For specific identification process, Identity Management details an ailment of supplying authorized owners with secure and easy admittance to information and solutions. For choosing the individual's identity, the primary goal is actually executing secured identification feature. PINs, keys, gain access to cards, passwords, tokens are actually the private determining elements which are actually utilized within standard methods which may have a tendency to drawbacks such as cracking, stealing, copying and posting. Biometrics grounded identification is needed having a perspective to stay away from the drawbacks. Due to intra category variants, non-universality, sound as well as spoof strikes are impacted. Multimodal biometrics are actually employed to get rid of the episodes which are actually a grouping of countless modalities. For an authentication supply, Fingerprint and Palmprint identification are popular systems these days. For minutiae thing detection as well as attribute extraction, with this paper, rich neural community (DNN) were definitely projected. The confinements of unimodal biometric structure lead to substantial False Acceptance Rate (FAR) along with False Rejection Rate (FRR), limited splitting up skill, top bound within delivery therefore the multimodal biometric product is designed to satisfy the strict delivery demands. For minutiae corresponding, values of Euclidean distance are actually used. The better identification pace is actually attained throughout the suggested procedure & it's extremely safe only in loud problem.
Content may be subject to copyright.
Multimodal Biometric Authentication System using
Deep Learning Method
Sandeep Singh Sengar
Department of Computer Science and
Engineering
SRM University-AP, Amaravati
Andhra Pradesh, INDIA
sandeep.iitdhanbad@gmail.com
U. Hariharan
Department of Information Technology
Galgotias College of Engineering and
Technology
Greater Noida, Uttar Pradesh, India
*udhayakumarhariharan@gmail.com
K. Rajkumar
Department of Information Technology
Galgotias College of Engineering and
Technology
Greater Noida, Uttar Pradesh, India
rajonline7@gmail.com
AbstractFor specific identification process, Identity
Management details an ailment of supplying authorized
owners with secure and easy admittance to information and
solutions. For choosing the individual's identity, the primary
goal is actually executing secured identification feature. PINs,
keys, gain access to cards, passwords, tokens are actually the
private determining elements which are actually utilized within
standard methods which may have a tendency to drawbacks
such as cracking, stealing, copying and posting. Biometrics
grounded identification is needed having a perspective to stay
away from the drawbacks. Due to intra category variants, non-
universality, sound as well as spoof strikes are impacted.
Multimodal biometrics are actually employed to get rid of the
episodes which are actually a grouping of countless modalities.
For an authentication supply, Fingerprint and Palmprint
identification are popular systems these days. For minutiae
thing detection as well as attribute extraction, with this paper,
rich neural community (DNN) were definitely projected. The
confinements of unimodal biometric structure lead to
substantial False Acceptance Rate (FAR) along with False
Rejection Rate (FRR), limited splitting up skill, top bound
within delivery therefore the multimodal biometric product is
designed to satisfy the strict delivery demands. For minutiae
corresponding, values of Euclidean distance are actually used.
The better identification pace is actually attained throughout
the suggested procedure & it's extremely safe only in loud
problem.
KeywordsDNN, Biometrics, FAR, FRR, 2D Gabor Filter,
Deep Neural Network, Euclidean distance.
I. INTRODUCTION
The zone of unique identification is actually mistreating
computer aided devices as a far more protected also
progressively impressive way as well as biometrics is
actually a standout amidst most reliable characteristics which
could be used for specific recognition. For conventional
identification method passwords [1,2] ID cards are already
used to moderate permission to access restricted methods. Be
this since it might, protection could be broken off when an
unapproved prospect or maybe fake endeavours to abuse
them. Inconvenience with making use of conventional
solutions triggered fast increment from the usage of
biometrics. Biometrics are actually an instant identification
which alludes to a searching of decomposing, estimating as
well as evaluating an individual's persona influenced by the
social or physiological characteristics associated together
with the prospect [3]. You will find two types of biometrics
to become Multimodal, Unimodal, and specific. The typical
area biometric capabilities are palm prints, hand geometry,
discourse designs, iris designs, facial features, and
fingerprints. A biometric confirmation structure works within
2 modes, for instance, enlistment function as well as examine
function. Inside enlistment function, the device recognizes an
individual by looking the layouts of significant amount of
clientele within the data source for a match up. Within the
confirmation function, structure approves character of
specific by evaluating the found biometric details together
with the possession of biometric template(s) that are stored
method repository.
Biometric methods that rely on the evidence associated
with an one particular wellspring of information for
validation are actually labelled as Unimodal method [4].
Unimodal biometric methods endure an assortment of
problems, for instance, Commotion within detecting
information, Intra class variations, Uniqueness capability.
The confinements of unimodal biometric structure lead to
substantial False Acceptance Rate (FAR) along with False
Rejection Rate (FRR), limited splitting up skill, top bound
within delivery therefore the multimodal biometric product is
designed to satisfy the strict delivery demands. A biometric
os and that is determined by the nearness of several pieces of
evidence of specific identification is known as multimodal
biometric structure [5]. A biometric os and that is determined
by the nearness of several pieces of evidence of specific
identification is known as multimodal biometric phone
system. It fuses some variety of autonomous biometrics as
well as overcomes a percentage on the restrictions created by
making use of Unimodal biometric. Multimodal biometrics
are progressively important to phony advances, since it's a lot
more difficult to generate numerous biometric characteristics
when compared with fashioning an one particular biometric
trademark hence provides larger accuracy fee as well as from
spoofing steps by which makes it troublesome for an
interloper to simultaneously spoof the a number of biometric
attributes of a real customer [6]. The delivery markers for
specific recognition feature include things like False
Acceptance Rate (FAR) along with False Rejection Rate
(FRR).
False Acceptance Rate (FAR): When the biometric
telephone system improperly accepts a gain access to try of
an unauthorized pc user is actually recognized as False
Acceptance Rate (FAR). A system's FAR says when the ratio
involving the variety of phony acceptances as well as variety
of identification tries.
ܨ݈ܽݏ݁ܣܴΨൌ൬ܨܣ
ܰכͳͲͲሺͳሻ
Wherever FA - Lots of incidents of phony acceptances, N
- Total amount of samples.
2020 International Conference on Emerging Smart Computing and Informatics (ESCI)
A
ISSMS Institute of Information Technology, Pune, India. Mar 12-14, 2020
978-1-7281-5263-9/20/$31.00 ©2020 IEEE 309
Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 04:33:25 UTC from IEEE Xplore. Restrictions apply.
False Rejection Rate (FRR): When the biometric
telephone system improperly rejects a gain access to try of an
authorized pc user is actually recognized as False Rejection
Rate (FRR).A system's FRR states since the ratio in between
quantity of phony acceptances as well as variety of
identification tries.
ܨܴܴΨൌ൬ܨܴ
ܰכͳͲͲሺʹሻ
FR - Lots of incidents of phony acceptances. N - Total
amount of samples. Therefore, the equations (one) as well as
(two) are actually utilized for general performance analysis
within biometric methods.
With this paper, fingerprint or palm print documents
biometrics are actually utilized for multimodal biometric
phone system. The characteristics are actually extracted
making use of the distinction algorithm Deep Neural
Networks (DNN). Minutiae based mostly extraction as well
as detection is completed by using Multilayer Perceptron
(MLP) as well as Backpropagation Algorithm.
II. PROPOSED MODEL
The suggested method depends upon Multimodal
biometrics whereby all fingerprint as well as palmprint
biometric is actually used like a wellspring of authentication.
Fig. 1 suggests multimodal biometrics of palmprint as well
as fingerprint. They're viewed as essentially the most
popular, reliable as well as top biometrics. Automated
Fingerprint Identification System (AFIS) makes use of
methods generally determined by specifics concentrates.
Palmprint has edges, central lines, wrinkles, for example, and
features by what specifics concentrates could be extricated
[7]. Because of abundant floor information fingerprint as
well as palmprint are believed to be as incredible techniques
to come down with around house identification. Artificial
Neural Networks
(ANN), one of several Soft Computing methods [8] used for
Multimodal biometric identification.
Fig. 1. Multimodal Biometric
A. Image Acquisition
The info impression received is actually for starters
standardized to reduce variations to come down with dark
dimension esteems on the tips as well as valleys. Histogram
feature is actually carried out to enhance the clearness of this
picture [15]. Binarization is actually carried out to alter 8 bit
dim scope picture directly into twofold picture with zero
share for tips as well as one share for valleys. Advantage
segmentation is completed to determine advantage finishing,
edge department as well as distinguish return on first capital
expense. Within that time, the launch treatment is actually
carried out to split up the parallel picture in w *w squares
[8]. Fig. 2 shows the information stream chart for picture
securing.
Fig. 2. Flow Sequence of Image Acquisition
B. Feature Extraction
Extraction of appropriate feature of the brother ql is
easily the most crucial task. DNN is actually used for
element extraction. It's a distinction algorithm which is made
up of big amount of neurons (units) interconnected as levels.
Information is delivered only one means and possesses
absolutely no cycles or even sectors. The information
concentrates are actually divided by DNN show in Fig. 3
coming from the edges, valleys, wrinkles [14]. Deep-learning
networks and rule lines are actually realized using the much
more normal single concealed level neural networks by the
profundity of theirs; that's, the volume of hub levels whereby
info needs to go within a multistep process of instance
acknowledgment. Prior versions of neural networks, for
instance, the very first perceptron’s had been superficial,
produced from 1 info as well as one particular yield level, as
well as a maximum of 1 shrouded level within the centre.
Several levels (counting info as well as yield) qualifies as
"deep" learning [9]. Therefore deeply is not merely a
fashionable phrase to affect computations to show up as
although they come across Tune and also Sartre directly into
organizations you have not understood around just yet. It's a
meticulously recognized phrase which suggests greater than
a person shrouded level.
Within deep learning networks, every level of nodes
preps on an unmistakable plan of spotlights determined by
history layer's yield [15]. The additional you progress
straight into the neural web, the greater perplexing the
spotlights the nodes of yours are able to perceive, as they
total as well as recombine spotlights as a result of history
coating.
C. Minutiae Detection
Multilayer Perceptron (MLP) strategy is used to
distinguish the specifics, regardless of whether it's on
advantage department or even edge finishing. It contains
several levels, for instance, feedback, covered up as well as
yield levels [12]. The networking is actually divided using
Back propagation algorithm that is cooking or even
mastering algorithm in which a community process is
actually done by isolating the picture directly into 3*3
310
Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 04:33:25 UTC from IEEE Xplore. Restrictions apply.
windowpane square measurement, if the windowpane is
actually placed on specifics the self-esteem is actually one or
even different zero. If perhaps within pixel worth is actually
one and possesses simply 1 one self-esteem neighbor, then
simply particulars factor is actually on advantage completing
[11]. On the away possibility which center pixel worth is
actually one and possesses simply 3 one self-esteem
neighbor, then specifics factor is actually on advantage
department. With lengthy final, Euclidean splitting up is
actually discovered in between specifics concentrates and set
away within a repository.
Fig. 3. A Sample DNN
D. Minutiae Matching
Specifics coordinating are actually completed by
evaluating the specifics esteems place at bay within data
source using the specified info picture. Specifics scores are
actually produced having a stove someplace inside all the
different zero as well as one. If perhaps the coordinating
score is much more noteworthy compared to predefined cap
worth, the prospect is actually accredited mostly is a faker
[5].
III. SYSTEM IMPLEMENTATION
The structure consists of 2 phase forms: Identification
and also Enlistment. Fig. 4 suggests System Design for
Particulars Coordinating Based Individual Identification
System. Amid enlistment procedure, the prospect enlists
equally palmprint as well as fingerprint as character. The
functions, for instance, tips, valleys, main collections, lines
and wrinkles are actually extricated of specifics concentrates
are actually acquired. With, specifics recognition, the
information concentrates are actually divided as end as well
as bifurcation (edge endings) concentrates [10,11]. At this
point together with the information concentrates, the
Euclidean splitting up esteems are actually computed and set
away inside repository. Amid identification process,
fingerprint as well as palmprint are actually procured for
identification. Similar process occurs till particulars
recognition. With specifics coordinating, the coordinating
score esteems are actually computed by evaluating the
specifics contained in the specified information and also the
camera put away inside repository. The option is performed
influenced by the coordinating score. On the away possibility
which coordinating score tends to be more noteworthy
compared to the advantage worth, the prospect is actually
accredited as well as recognized. Another thing, prospect is
actually unapproved as well as rejected.
Fig. 4. System Architecture
IV. RESULTS AND DISCUSSIONS
Making use of Matlab, the pictures of all fingerprint as
well as palmprint are actually selected and set away within
an MS - Access repository. At this point amid the
identification process, the pictures are actually packed for
picture enhancement in which standardization, histogram
getting used to as well as advantage launch are actually
performed [10]. With the much better photos, the specifics
concentration are actually divided. Within the first coat level
the bifurcation as well as advantage endings are actually
realized by executing community process. Euclidean
splitting up computation is actually performed [13]. The
information esteems coordinating are actually completed by
computing the scores as well as validation is actually
examined. The delivery of Gabor channel switches for both
real component as well as fanciful component as much as
FAR and also FRR influenced by the amount of assessments.
The variations are showing up Table I as well as Table II.
The delivery on the suggested means with different
limitations, Tar, and they limit the phony accept pace as well
as bogus refuse pace is actually been seen [3]. Therefore, the
suggested strategy grounded techniques to enhance
distinction exactness involving frauds and also genuine
clientele the prediction of FAR and FRR shown in Table III.
TABLE I. RELIABILITY MEASURES FOR GABOR REAL PART
No. of Samples
FRR FAR ACCURACY
25 1.10 3.0 91.00
125 0.70 2.3 96.23
600 0.02 1.3 97.60
TABLE II. RELIABILITY MEASURES FOR GABOR IMAGINARY
PART
No. of Samples
FRR FAR ACCURACY
25 1.10 2.0 91.00
125 0.70 1.4 96.23
600 0.02 01.4 97.60
311
Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 04:33:25 UTC from IEEE Xplore. Restrictions apply.
TABLE III. TEST RESULTS ON DESIGNATED THRESHOLD
STANDARDS
Threshold Tar
False Accept Rate(%)
False Reject Rate(%)
0.325 0.00 1.46
0.335 0.00 0.81
0.345 0.27 0.55
0.355 0.82 0.55
0.365 2.40 0.29
0.375 5.26 0.11
V. CONCLUSION
Biometrics assumes a crucial task within around house
identification. The goal is actually actualizing a secured
unique identification device continues to be dependably
achieved by techniques for making use of Multimodal
Biometrics. Fingerprint as well as Palmprint that are wealthy
within floor information achieves top exactness. DNN
grounded distinction becomes excellent identification fee.
Together the collections, the recommended technique betters
noteworthy delivery as well as distinction accuracy within
factors that are fresh . The results provide far better accuracy
for your offered approach.
REFERENCES
[1] Shankar, K., Elhoseny, M., Kumar, R.S., Lakshmanaprabu, S.K. and
Yuan, X., 2018. Secret image sharing scheme with encrypted shadow
images using optimal homomorphic encryption technique. Journal of
Ambient Intelligence and Humanized Computing, pp.1-13.
[2] Shankar, K., Elhoseny, M., Chelvi, E.D., Lakshmanaprabu, S.K. and
Wu, W., 2018. An Efficient Optimal Key Based Chaos Function for
Medical Image Security. IEEE Access, 6, pp.77145-77154.
[3] A.K. Jain, A. Ross & S. Prabhakar, “An Introduction to Biometric
Recognition”, In: IEEE Transactions on Circuits and Systems for
Video Technology, Vol. 14, N. 1, pp 4-20, January 2004.
[4] Sengar, S.S. and Mukhopadhyay, S. (2017). Moving object detection
based on frame difference and W4. Signal, Image and Video
Processing, 11(7), pp.1357-1364.
[5] Mir. A.H, Rubab .S, Jhat .Z.A,” Biometric Verification: A Literature
Survey “, International Journal of Computing & ICT Research,
Vol.05, No.02, December 2011.
[6] Fawaz Alsaade,” Neuro-Fuzzy Logic Decision in a Multimodal
Biometric Fusion System”, Scientific Journal of King Faisal
University (Basic and Applied Sciences), Vol.11, No.02, 2010.
[7] MuthuKumar .A, Kasturi .C and Kannan .S, ”Multimodal Biometric
Authentication using Particle Swarm Optimization Algorithm with
Fingerprint and Iris”, ICTACT Journal on Image and Video
Processing, Vol.02, No.03, Feburary 2012.
[8] Sengar, S.S. and Mukhopadhyay, S. (2016). Moving object area
detection using normalized self adaptive optical flow. Optik, 127(16),
pp.6258-6267.
[9] K.Shanmugapriyal, M.Karthika, Dr.S.Valarmathy, M.Arunkumar
“Performance Evaluation of Contourlet Transform based Palmprint
Recognition using Nearest Neighbour Classifier” International
Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified
Journal, Volume 3, Issue 1, January 2013.
[10] Sengar, S.S., Mukhopadhyay, S. (2017). Foreground Detection via
Background Subtraction and Improved Three-Frame
Differencing, Arabian Journal for Science and Engineering, vol. 42,
pp. 3621.
[11] SitalakshmiVenkataraman,”A Grid-Based Neural Network
Framework for Multimodal Biometrics”, World Academy of Science ,
Engineering and Technology,2010.
[12] Murugan, B.S., Elhoseny, M., Shankar, K. and Uthayakumar, J.,
2019. Region-based scalable smart system for anomaly detection in
pedestrian walkways. Computers & Electrical Engineering, 75,
pp.146-160.
[13] Sengar, S. (2017). Detection of moving objects based on enhancement
of optical flow. Science Direct, Vol. 145, pp.131-141.
[14] Uthayakumar, J., Metawa, N., Shankar, K. and Lakshmanaprabu,
S.K., 2018. Financial crisis prediction model using ant colony
optimization. International Journal of Information Management.
[15] Sengar, S. S., and Mukhopadhyay, S. (2017). Motion detection using
block based bi-directional optical flow method. Journal of Visual
Communication and Image Representation, 49, 89-103.
312
Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 04:33:25 UTC from IEEE Xplore. Restrictions apply.
... However, despite its considerable potential, the widespread adoption of deep learning in security informatics has challenges and limitations. One of the primary concerns is the robustness and reliability of deep learning models in the face of adversarial attacks and evasion techniques (Sengar & Rajkumar, 2020). Adversaries can exploit vulnerabilities in deep learning systems by crafting subtle perturbations to input data, causing misclassification or erroneous predictions. ...
Article
The utilization of deep learning algorithms in security informatics has revolutionized cybersecurity, offering advanced solutions for threat detection and mitigation. This paper presents findings from research exploring the efficacy of deep learning in various security domains, including anomaly detection, malware detection, phishing detection, and threat intelligence analysis. Results demonstrate high detection rates and accuracy, with anomaly detection achieving a remarkable 98.5% detection rate and malware detection showcasing a classification accuracy of 99.2%. Phishing detection also yielded promising results with a detection accuracy of 95.8%. These findings underscore the potential of deep learning in enhancing security defenses. However, challenges such as interpretability and robustness remain, necessitating further research and development. By addressing these challenges and prioritizing robust security measures, organizations can leverage deep learning to create more effective and trustworthy security solutions, thereby mitigating cyber threats and safeguarding digital assets.
... Implementation of biometric authentication ensures heightened security measures, governing access to sensitive areas, EHRs, and medical devices. ML algorithms play a crucial role in processing and analyzing these biometric patterns to enable swift and accurate verification [182], [183]. • Patient Identification and Record Matching: employing biometric identifiers such as fingerprints or iris scans ensures precise linkage of patients to their health records, minimizing the risk of identification errors [184]- [187]. ...
Preprint
Full-text available
Wearable devices and medical sensors revolutionize health monitoring, raising concerns about data privacy in Machine Learning (ML) for healthcare. This tutorial explores Federated Learning (FL) and Blockchain (BC) integration, offering a secure and privacy-preserving approach to healthcare analytics. FL enables decentralized model training on local devices at healthcare institutions, keeping patient data localized. This facilitates collaborative model development without compromising privacy. However, FL introduces vulnerabilities. BC, with its tamper-proof ledger and smart contracts, provides a robust framework for secure collaborative learning in FL. After presenting a taxonomy for the various types of data used in ML in medical applications, and a concise review of ML techniques for healthcare use cases, this tutorial explores three integration architectures for balancing decentralization, scalability, and reliability in healthcare data. Furthermore, it investigates how Blockchain-based Federated Learning (BCFL) enhances data security and collaboration in disease prediction, medical image analysis, patient monitoring, and drug discovery. By providing a tutorial on FL, blockchain, and their integration, along with a review of BCFL applications, this paper serves as a valuable resource for researchers and practitioners seeking to leverage these technologies for secure and privacy-preserving healthcare ML. It aims to accelerate advancements in secure and collaborative healthcare analytics, ultimately improving patient outcomes.
... The fusion took place at the score and decision levels, with a recognition rate of around 86.66% for the min-max based normalization technique. Sengar et al [20] developed a palm print and fingerprint-based multibiometric system based on Deep Neural Network that achieves an accuracy of around 91% with 1.10% FAR and 3% FRR. Figure 1 depicts the schematic of the proposed finger vein-based biometric system. Convolutional Neural Network [21][22][23] is utilized during the enrollment phase to extract deep feature sets from index, middle, and ring finger vein images from both the right and left hands. ...
... With the rapid development of computer technology, the world has entered the information age. More and more communication and interaction take place on the Internet [29][30][31]. Considerable amounts of personal information, as well as important information about enterprises and governments, are spread in the network. However, there would be a huge security risk once important information is intercepted or leaked. ...
Article
Full-text available
With the increasing connectivity between multiple smart devices in the Internet of Vehicles, privacy and security have become stringent threats due to unauthorized access. To overcome this issue, designing continuous authentication systems has become an important research topic because of the advantages of continuous monitoring of users after the initial access to the smart devices. Unfortunately, the existing systems are based on a third-party centralized structure, and most of them suffer storage pressure on equipment, thus resulting in significant security hazards and limited performance. In this paper, we propose a multistage continuous authentication system based on blockchain technology and the IPFS, which achieves decentralization and reduces storage pressure. In the first stage of authentication, we adopt Hyperledger Fabric to implement the underlying technical architecture of the blockchain to enhance the security and reliability of identity parameters. The preoutputs of the first-stage authentication are compared against behavioral biometric characteristics stored in the IPFS that aim to accomplish the final authentication. In particular, we use fuzzy extractors to deal with behavioral biometric feature templates, thus solving the privacy problem caused by user information leakage. To evaluate the security of our system, we prove the correctness of the communication protocol and two-way authentication of the scheme using BAN Logic. Furthermore, we use Hyperledger Caliper to analyze the impact of the sending rate of authentication requests on various performance parameters such as throughput, memory, and CPU utilization of the authentication system. Security and experimental results show that: (i) We solve the problem of centralized authentication and can resist replay attacks. (ii) Our scheme can maintain high throughput and effectively reach consensus. Compared to related works, the throughput is improved by 8.6%.
Article
Over the last decade, biometric authentication systems have significantly progressed and in the upcoming years, their domain specific application is likely to boost. Multimodal biometric systems have been able to alleviate some issues faced by their unimodal counterparts. Since distinct modalities are being combined and distinct algorithms are applied to improve previous research results, greater recognition accuracy and performance has been achieved. The current work proposes a multimodal biometric authentication framework using important characteristics of the face, fingerprint, finger-knuckle-print and iris, fused together to enhance biometric system’s time efficiency. The framework extracts features through Gabor filter, Zernike moments and count key-points using surf key descriptor unlike existing techniques, such as 3 biometric fusion center. Further, for feature classification, variational Bayesian extreme learning machine technique consumes 19.65 ms, whereas, our work is implemented on MATLAB 2014Ra and is validated to consume 11.49 ms.
Chapter
Authentication based on biometric technology is largely preferred in providing access control to the systems. This technology has gained wider attention due to the rise in data generation and the need of data security. The authentication depends upon the physiological traits of human such as face, fingerprint, hand geometry, iris scan, retinal scan, and voice. Depending upon the level of security required, a single trait or multiple traits could be utilized. The key features or patterns extracted from the biometric data play a significant role during authentication process that involves pattern recognition. That is, the patterns that exist in the database are matched with the patterns provided during log on. The access is provided based on complete match. Though biometry-based authentication systems provide an effective way of accessing the system, still it is affected by attacks that try to get unauthorized entry into the system. Thus, this chapter focuses on working with the methodologies that provide additional security to the biometric authentication system by utilizing encryption algorithm.
Article
In the modern world, trustworthy and secure identity is essential for a number of uses, such as unlocking personal gadgets and gaining access to secure areas. Conventional techniques, such as PINs and passwords, have shown to be vulnerable to fraud and illegal access. These vulnerabilities have been addressed by the development of biometric authentication, which makes use of an individual's distinct physiological and behavioral characteristics. Unimodal biometric systems concentrate on a single feature, although they frequently face difficulties like noise and spoofing assaults. By merging characteristics from several modalities, multimodal biometric systems provide an answer and improve identification robustness and accuracy. In order to increase identification security and accuracy, this article investigates the combination of hand geometry, palm print, fingerprint, and facial biometrics. Different integration situations and modes of operation for multimodal biometric systems are examined, as well as various fusion methodologies. In summary, the paper ends with implications for biometric systems practitioners, academics, and policymakers as well as a discussion of relevant research topics.
Article
Full-text available
Secret Image Sharing (SIS) scheme is to encrypt a secret image into ‘n’ specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is not achieved. In this paper, wavelet-based secret image sharing scheme is proposed with encrypted shadow images using optimal Homomorphic Encryption (HE) technique. Initially, Discrete Wavelet Transform (DWT) is applied on the secret image to produce sub bands. From this process, multiple shadows are created, encrypted and decrypted for each shadow. The encrypted shadow can be recovered just by choosing some subset of these ‘n’ shadows that makes transparent and stack over each other. To improve the shadow security, each shadow is encrypted and decrypted using HE technique. For the concern on image quality, the new Oppositional based Harmony Search (OHS) algorithm was utilized to generate the optimal key. From the analysis, it shows that the proposed scheme provide greater security compared to other existing schemes.
Article
Full-text available
With the rapid development in the field of medical image encryption, researchers analyzed a number of encryption algorithms based on chaotic systems. But there is a difficulty lies i.e., small key space and weak security in one-dimensional chaotic cryptosystems. To overcome this difficulty, an alternative security model was proposed in this paper. The current study investigated highly secure medical images with a couple of subkeys, initially where a couple of subkeys is given by utilizing chaotic logistic and tent maps. As per the Chaotic (C - function) process, the security was investigated like diffusion as well as confusion. Based on the initial conditions, different random numbers were generated for each map from chaotic maps. Adaptive Grasshopper Optimization (AGO) algorithm with PSNR and CC fitness function was proposed to choose the optimal secret and public key of the system among the random numbers. The reason behind choosing adaptive process is to enhance high-security investigation of the current proposed model compared to existing methods. At last, the proposed strategy results were compared with existing security methods and literary works, but found to be high performing.
Article
Full-text available
Biometric verification refers to an automatic verification of a person based on some specific biometric features derived from his/her physiological and/or behavioral characteristics. A biometric verification system has more capability to reliably distinguish between an authorized person and an imposter than the traditional systems that use a card or a password. In biometrics, a person could be recognized based on who he/she is rather than what he/she has (ID card) or what he/she knows (password). Currently, biometrics finds use in ATMs, computers, security installations, mobile phones, credit cards, health and social services. The future in biometrics seems to belong to the multimodal biometrics (a biometric system using more than one biometric feature) as a unimodal biometric system (biometric system using single biometric feature) has to contend with a number of problems. In this paper, a survey of some of the unimodal biometrics will be presented that are either currently in use across a range of environments or those still in limited use or under development, or still in the research realm.
Article
Full-text available
Moving object detection is a basic and important task on automated video surveillance systems, because it gives the focus of attention for further examination. Frame differencing and W4 algorithm can be individually employed to detect the moving objects. However, the detected results of the individual approach are not accurate due to foreground aperture and ghosting problems. We propose an approach to segment the moving objects using both the frame differencing and W4 algorithm to overcome the above problems. Here first we compute the difference between consecutive frames using histogram-based frame differencing technique, next W4 algorithm is applied on frame sequences, and subsequently, the outcomes of the frame differencing and W4 algorithm are combined using logical ‘OR’ operation. Finally, morphological operation with connected component labeling is employed to detect the moving objects. The experimental results and performance evaluation on real video datasets demonstrate the effectiveness of our approach in comparison with existing techniques.
Article
Different-sized anomalies and its occurrence in a shorter period have always been an open research issue. To resolve the issue of detecting anomalies of different sizes, especially in pedestrian pathways, within a shorter time period, the current research article introduced a Region based Scalable Convolution Neural Network (RS-CNN). The proposed method used region based proposals for faster identification and performed well with the scalability issues. The RS-CNN model was validated using different video sequences from the UCSD anomaly detection dataset. When compared with state-of-the-art detection techniques such as Fast R-CNN, Minimization of Drive Testing (MDT), Mixtures of Probabilistic Principal Component Analyzers (MPPCA) and Social Force (SF), the RS-CNN model was found to be faster and efficient even in the presence of anomalies of various sizes.
Article
Detecting moving objects from video frame sequences has a lot of useful applications in computer vision. This proposed method of moving object detection first estimates the bi-directional optical flow fields between (i) the current frame and the previous frame and between (ii) the current frame and the next frame. The bi-directional optical flow field is then subjected to normalization and enhancement. Each normalized and enhanced optical flow field is then divided into non-overlapping blocks. The moving objects are finally detected in the form of binary blobs by examining the histogram based thresholded values of such optical flow field of each block as well as the optical flow field of the candidate flow value. Our technique has been conceptualized, implemented and tested on real video data sets with complex background environment. The experimental results and quantitative evaluation establish that our technique achieves effective and efficient results than other existing methods.
Article
Motion detection is one of the key issues in intelligent video surveillance, traffic monitoring and video-based human computer interaction. In this paper, we have efficiently detected the moving objects by computing the optical flow between three consecutive frames. The proposed method first filters out noise in individual frames using Gaussian filter. Next, it computes the optical flow between (a) the current frame and the previous frame and (b) the current frame and the next frame separately. Subsequently, it combines both the optical flow components to compute the gross optical flow. An adaptive thresholding post-processing step is executed so as to remove the spurious foreground objects. Moving objects are then detected using morphological operation on the equalized output. The method has been conceived, implemented and tested on a set of real video data sets. The experimental results exhibit satisfactory performance when compared with other existing methods.
Article
Moving object detection is a widely used and important research topic in computer vision and video processing. Foreground aperture, ghosting and sudden illumination changes are the main problems in moving object detection. To consider the above problems, this work proposes two approaches: (i) improved three-frame difference method and (ii) combining background subtraction and improved three-frame difference method for the detection of multiple moving objects from indoor and outdoor real video dataset. This work accurately detects the moving objects with varying object size and number in different complex environments. We compute the detection error and processing time of two proposed as well as previously existing approaches. Experimental results and error rate analysis show that our methods detect the moving targets efficiently and effectively as compared to the traditional approaches.
Article
Optical flow estimation is one of the oldest and still most active research domains in computer vision. This paper proposes a novel and efficient method of moving object area detection in the video sequence employing the normalized self-adaptive optical flow. This new approach first performs smoothing on the individual frame of the video data using Gaussian filter, then determines the optical flow field with an existing optical flow algorithm, next filters out the noise using adaptive threshold approach, after that normalize, morphology operation, and the self adaptive window approach is applied to identify the moving object areas. The proposed work is accurate for detecting the moving object areas with varying object size. The proposed scheme has been formulated, implemented and tested on real video data sets that provides an effective and efficient way in a complex background environment.