Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification

Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification

Bharath M. R., Radhakrishna Rao K. A.
Copyright: © 2022 |Pages: 44
DOI: 10.4018/IJISP.307068
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this research work is divided into five sections: pre-processing, feature extraction, featurelevel fusion, imposter/ genuine classification, and male/female identification. The gathered raw data for palm print, dorsal vein, wrist vein, and palm vein are pre-processed with enhanced median filtering algorithms. The required features are then being extracted from the pre-processed images. Following that, an improved feature-level fusion technique is carried out based on the required security level. In the low security level, the certain image features are considered. Furthermore, if the medium security level is chosen, any two sets of attributes has been combined. If the high security level is chosen, all of the retrieved characteristics has been combined. Further, multiple classifications are carried out. It will determine whether the individual is genuine or an imposter. If it is an imposter, simply get rid of it. If the categorized result is genuine, it is reclassified as male or female.
Article Preview
Top

1. Introduction

Nonrepudiation, consistency, verification, as well as assurance, are just a few of the benefits of biometrics beyond traditional safety measures. Biometric authentication is now becoming a popular and convenient technique for authenticating a person's identification by collecting bodily measures of unique human traits or behavioral patterns. A physiological feature is indeed a completely unique attribute like a fingerprint, palm print, hand vein, iris pattern as well (Srivastava, et al., 2016; Al-johani & Elrefaei, 2020; Walia, et al., 2019; Li, et al., 2020; Vidya & Chandra, 2018). Few of the behavioral characteristics include signatures, posture, and keystrokes. The biometric method guarantees a trouble-free, reliable solution of verifying a person's identity with incredible precision (Alice Nithya et al., 2020; Sarangi et al., 2022) (Chen et al., 2021; Purohit and Ajmera, 2021). Username and password and identification cards are the illustrations of alternate solution markers representing individuality that have been readily misplaced, exchanged, or leaked. Passwords are however susceptible to social engineering and dictionary assaults, that provides no safety (Vijay & Indumathi, 2021; Tiong, et al., 2020; Chakladar, et al., 2021; Papavasileiou, et al., 2020). As the biometric techniques require the consumer to always be actually present throughout confirmation, they serve as a deterrent to clients making fraudulent rebuttal claims latter upon (Zhang, et al., 2019; Toygar, et al., 2020).

Developing biometric sensors that recognize the work atmosphere (outdoor/indoor/lighting, etc.) and interface among several system components to dynamically alter parameters to give appropriate information is being a challenging task (Adil et al., 2016) (Wu, et al., 2020; Sultana, et al., 2018; Talreja, et al., 2021; Lamba, 2021). The sensors able to acquire high-quality pictures from a range promptly at an affordable price, and without any enrollment difficulties. Strengthening matching algorithms, integrating numerous sensors, and analyzing the sustainability of biometric technology, help and support decision making throughout the matching process in the multimodal biometric authentication (Omara, et al., 2021; Zhang, et al., 2020; Ryu, et al., 2021; Pinto, et al., 2018; Xin, et al., 2018). Possible research topics in the ground include standard protocols for biometric information swap formats, file types, application-specific, application agreements, testing methodology, implementation of benchmarks remedies, recommendations for assessing biometric systems as well as documents, and a framework to integrate the data protection principles (Liang, et al., 2021; Kaur & Khanna, 2019; Gonzalez-Sosa, et al., 2019; Ivanov, et al., 2020; Walia, et al., 2020). When compared to unimodal systems, multimodal systems are more resilient and secure (Eva et al., 2020) (Vetri, 2020). As a consequence, venous images collected from different portions of the hands, such as in the palm as well as rear of the palm (dorsal), as well as the wrists, had already been considered deal as the biometric features in recent decades, this is due to the fact that all these vascular veins underneath the epidermis are difficult to reproduce (Zhang, et al., 2020; Ryu, et al., 2021; Pinto, et al., 2018). To create stronger multimodal biometric systems, it is important to understand the specific qualities that are most appropriate for a certain purpose, as well as to comprehend methods for extracting attributes that really are noise-free and combining characteristics, among other things (Lamba, 2021; Omara, et al., 2021). These concerns to create the strongest model (Varricchi et al., 2021) (Varricchi et al., 2021a). In fact, throughout the last several years, specialists have thoroughly investigated the issue of palmprint as well as wrist vein recognizing integration in biometric authentication (Khoa and Nguyen, 2020; Nguyen et al., 2021; D’Addazio et al., 2018). Texture-based coding, feature extraction, and subspace feature acquisition are among the approaches that were used to assess palmprint and wrist vein in biometrics for decades, but their findings are nevertheless unsatisfactory, suggesting that further work is needed (Ryu, et al., 2021; Pinto, et al., 2018; Griswold-Steiner, et al., 2019). Deep convolutional neural networks (DCNN) are a type of deep architecture that can learn relatively high characteristics through large-scale training samples (Xin, et al., 2018; Liang, et al., 2021; Kaur & Khanna, 2019; Meherkandukuri, 2021). As a result, in biometrics, a deep learning-based approach is introduced for multi-model identification.

The major contribution of this research work:

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing