Академический Документы
Профессиональный Документы
Культура Документы
Multimodal Biometrics
Presented by Guided by
Mrs.N.Sivasankari Dr.A.Muthukumar
Assistant Professor/ECE Associate Professor/ECE
Mepco Schlenk Engg College Kalasalingam University
Outline
• What is biometrics?
• Why it is important?
• Difference between single and multimodal
biometrics
• Multimodal biometrics
– Feature Extraction Techniques
– Fusion Techniques
– Normalization Techniques
• Evaluation Methods
What is Biometrics?
• The automated method of identifying or verifying
the Person. It may be based on …..
What he
knows
What he is
Who he/she is
Having
Why it is important
• To avoid the fraudulent action at various places
like ….
Safety deposit boxes and Bank transaction
like ATM withdrawals, Credit Card purchase
Access to computers and emails
Openings of buildings, car
Getting official documents like birth
Certificates or passports
Obtaining court papers
Getting into confidential workplace
Biometric Automation system should
provide…
• Universality
• Uniqueness
• Permanence
• Collectability
• Performance
• User’s Accpetability
• Robustness against Circumvention
Biometrics module
• The module should contain five important
modules
Sensor module
Feature Extraction module
Template matcher module
System database module
Decision making module
These modules can perform two actions
Enrollment & verification
Biometric System
A sample flow chart: template
Sensor Matcher
Feature System
Qualify Extractor Decision
Database
checker Maker
7
Dimensionality Reduction
• To analyze the image first it has to be partitioned
and each partitioned data information should be
collected. For that dimensionality reduction
method is needed.
• The process of reducing the high dimensional
random variable data into low dimensional
random variable data is called dimensionality
reduction. In the mean time essential
information's are extracted
• This process consists of feature selection &
Feature Extraction.
Dimensionality Reduction
• The dimensionality reduction techniques are
mainly classified into linear and Non linear
techniques.
• Linear dimensionality reduction :
– Linear relationship between transformed data and
original data
– Supervised dimensionality reduction techniques.
• Non Linear dimensionality reduction :
– Non Linear relationship between transformed data
and original data.(Splited into small regions called as
manifolds)
– Unsupervised dimensionality reduction techniques.
Dimensionality Reduction
3. Chiou-Yng Lee, Pramod Kumar Meher, “Efficient Sub quadratic Space Complexity Architectures for
Parallel MPB Single - and Double - Multiplications for All Trinomials Using Toeplitz Matrix-Vector
Product Decomposition”, IEEE Transactions On Circuits And Systems Vol. 62, NO. 3, March 2015.
4. Hamad Marzouqi, Mahmoud Al-Qutayri, Khaled Salah “Review of elliptic curve cryptography Processor
designs” Journal of Microprocessors and Microsystems Vol 39 pp 98-112, February 2015
5. Gaurav Bhatnagar, Q. M. Jonathan Wu, “Biometric Inspired Multimedia Encryption Based on Dual
Parameter Fractional Fourier Transform”, IEEE Transactions On Systems, Man, And Cybernetics:
Systems, Vol. 44, NO. 9, PP 1234-1247, September 2014.
6. Mahdi Soltanolkotabi, Ehsan Elhamifar and Emmanuel J. Cand`es, “Robust Subspace Clustering”, The
Annals of Statistics 2014, Vol. 42, No. 2, 669–699.
7. Seog Chung Seo, Taehong Kimb, Seokhie Hongc, “Accelerating Elliptic Curve Scalar Multiplication
Over Gf(2m) On Graphic Hardware's”, Journal of Parallel and Distributed Computing, April 2014.
Literature Survey
8. Jiwen Lu, Yap-Peng Tan, Gang Wang, “Discriminative Multimanifold Analysis for Face Recognition from
a Single Training Sample per Person”, IEEE Transactions On Pattern Analysis And Machine Intelligence,
Vol. 35, NO. 1, January 2013.
9. Luc Devroye, L´aszl´o, “A Probabilistic Theory Of Pattern Recognition”, March 2013 Springer
10. Ctirad Sousedik, Christoph Busch “Presentation Attack Detection Methods For Fingerprint Recognition
Systems: A Survey” IET Biometrics , pp. 1–15, November 2013.
11. Rima Belguechi, Estelle Cherrier,, Christophe Rosenberger, Samy Aitoudia. “Operational Bio-hash To
Preserve Privacy Of Fingerprint Minutiae Templates”, IET Biometrics, February 2013.
12. Junjun Jiang, Ruimin Hu, Zhen Han, Kebin Huang, Tao Lu, “Graph Discriminant Analysis On Multi-
manifold (Gdamm): A Novel Super-resolution Method For Face Recognition”, 19th IEEE International
Conference on Image processing, October 2012.
13. J.fan, I.verbauwhede, “ an updated survey on secure ECC implementations: attacks, countermeasures and
cost, Cryptography and Security: From Theory to Applications vol 6805, springer, Berlin Heidelberg
2012, pp 265-282.
Literature Survey
15. Claus vielhauer, Jana Dittman “Bio Metrics and ID Management”, Published by Springer
,2011.
16. Rihards Fuksis, Arturs Kadikis, and Modris Greitans, “Biohashing and Fusion of
Palmprint and Palm Vein Biometric Data”, IEEE Conference on Hand Based Biometrics,
November 2011.
17. Y. Wang and R. Li, “A Unified Architecture For Supporting Operations Of AES and
ECC”, In Proc. 4th Int. Symp. Parallel Archit., Algorithms Programme (PAAP), Dec.
2011, pp. 185–189.
18. Abhishek Nagar , Karthik Nandakumar , Anil K. Jain, “A Hybrid Biometric Cryptosystem For
Securing Fingerprint Minutiae Templates”, Pattern Recognition Letters Elsevier Science direct 31
733–741, October 2010.
19. L.Ma, M.M.Crawford, J.Tian, Local manifold learning – based - nearest - neighbor for
hyperspectral imageclassification, IEEE Trans.Geosci.RemoteSens.48(11) (2010) 4099–4109.
20. Emanuele Maiorana, Patrizio Campisi, Julian Fierrez, Javier Ortega-Garcia, Alessandro Neri,
“Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature
Recognition”, IEEE Transactions On Systems, Man, And Cybernetics—part A: Systems And
Humans, Vol. 40, No. 3, PP525-538, May 2010.
Literature Survey
15. Claus vielhauer, Jana Dittman “Bio Metrics and ID Management”, Published by Springer
,2011.
16. Rihards Fuksis, Arturs Kadikis, and Modris Greitans, “Biohashing and Fusion of
Palmprint and Palm Vein Biometric Data”, IEEE Conference on Hand Based Biometrics,
November 2011.
17. Y. Wang and R. Li, “A Unified Architecture For Supporting Operations Of AES and
ECC”, In Proc. 4th Int. Symp. Parallel Archit., Algorithms Programme (PAAP), Dec.
2011, pp. 185–189.
18. Abhishek Nagar , Karthik Nandakumar , Anil K. Jain, “A Hybrid Biometric Cryptosystem For
Securing Fingerprint Minutiae Templates”, Pattern Recognition Letters Elsevier Science direct 31
733–741, October 2010.
19. L.Ma, M.M.Crawford, J.Tian, Local manifold learning – based - nearest - neighbor for
hyperspectral imageclassification, IEEE Trans.Geosci.RemoteSens.48(11) (2010) 4099–4109.
20. Emanuele Maiorana, Patrizio Campisi, Julian Fierrez, Javier Ortega-Garcia, Alessandro Neri,
“Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature
Recognition”, IEEE Transactions On Systems, Man, And Cybernetics—part A: Systems And
Humans, Vol. 40, No. 3, PP525-538, May 2010.
Literature Survey
22. Emanuele Maiorana, Patrizio Campisi, “Fuzzy Commitment for Function Based Signature Template
Protection” IEEE Signal Processing Letters, Vol. 17, No. 3, PP 249-252, March 2010.
23. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th ed. USA: Prentice-Hall,
Jan. 2010.
24. Salil Prabhakar, Sharath Pankanti, anil K. Jain “Biometric Recognition: Security and Privacy Concerns”
Journal of Biometrics IEEE computer society, July 2009.
25. Xinbo Gao, Chunna Tian, “Multi-view Face Recognition Based On Tensor Subspace Analysis And View
Manifold Modeling”, Journal of Neuro computing Elsevier Science direct, June 2009.
26. David E.Boyle,Thomas Newe ,” On the implementation and evaluation of an elliptic curve based
cryptosystem for JAVA enabled wireless sensor networks” Journal of Sensors and Actuators A (156)
394–405, October 2009.
27. Antonio Plaza a, Jon Atli Benediktsson Joseph W. Boardman, “Recent Advances In Techniques For
Hyperspectral Image Processing”, Journal of Remote sensing and Environment Elsevier Science direct
113 S110–S122, March 2009.
Literature Survey
28. S.Cimato, M.Gammasi, “A Multi-biometric Verification System for the Privacy Protection
of Iris Templates” Springer - Verlag Berlin Heidelberg, 2009.
29. Anil K. Jain, Karthik Nandakumar, Abhishek Nagar, “Biometric Template Security”, Hindawi
Publishing Corporation EURASIP Journal on Advances in Signal Processing ,Volume (2008).
30. S.B.Kosantiants, “Supervised Machine Learning- A review of classification techniques”
Informatica 31, 249-268 (2007).
31. Karthik Nandakumar, Anil K. Jain, Sharath Pankanti “Fingerprint-Based Fuzzy Vault:
Implementation and Performance”, IEEE Transactions On Information Forensics And Security,
Vol. 2, No. 4, December 2007.
32. Mayank Vatsa, Richa Singh, Afzel Noore, “Feature based RDWT Watermarking For Multimodal
Biometric System”, Journal of image and vision computing Elsevier Science direct, May 2007.
33. Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, Ruud M. Bolle, “Generating Cancelable
Fingerprint Templates”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 29,
No. 4, PP 561-572 April 2007.
34. Robert Haralick, Rave Harpaz, “Linear Manifold Clustering In High Dimensional Spaces By
Stochastic Search”, Journal of Pattern Recognition (PP2672 – 2684) Elsevier Science direct, 2007.
Literature Survey
35. Alvinah goh, Rine vidal “Segmenting Motions Of Different Types Of Unsupervised Manifold Clustering”,
IEEE Conference on Vision and Pattern Recognition, 2007.
36. Robert Haralick, Rave Harpaz, “Linear Manifold Clustering In High Dimensional Spaces By Stochastic
Search”, Journal of pattern recognition Elsevier Science direct Vol 40 PP. 2672 – 2684, January 2007 .
37. Timo Ahonen, Abdenour Hadid, and Matti Pietika “Face Description with Local Binary Patterns: Application
to Face Recognition”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 28, No. 12,
December 2006.
38. Loris Nanni, Alessandra Lumini, “Empirical tests on BioHashing”, Journal of Neuro computing Elsevier
Sciencedirect, May 2006.
39. David D. Hwang, Member, IEEE, Kris Tiri, Member, IEEE, Alireza Hodjat, Student Member, IEEE, Bo-
Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede, “AES-Based Security Coprocessor IC in
0.18-m CMOS With Resistance to Differential Power Analysis Side-Channel Attacks” IEEE Journal Of Solid-
state Circuits, Vol. 41, NO. 4, PP 781-191 April 2006.
40. Miguel A. Ferrer, Jesu´s B. Alonso, and Carlos M. Travieso “Offline Geometric Parameters for Automatic
Signature Verification Using Fixed-Point Arithmetic” IEEE Transactions On Pattern Analysis And Machine
Intelligence, Vol. 27, no. 6, PP -993-995 June 2005.
41. D. Liang,J.Yang,Z.Zheng,Y.Chang, “A facial expression recognition system based on supervised locally linear
embedding”, Pattern Recognit.Lett.26(15) pp . 2374–2389 (2005).
42. E.Savas, M.Naseer, A.Gutab, C.K.Koc, “ Efficient unified Mongomery inversion with multibit shifting. IEEE
proc. Comput.Digit.Techn.152 (4) pp 489-498 (2005)
Literature Survey
43. Anil K. Jain,, Arun Ross, Salil Prabhakar, “An Introduction to Biometric Recognition” IEEE Transactions
On Circuits And Systems For Video Technology, Vol. 14, No. 1,PP 4-20 January 2004.
44. Umut uludag, Sharath pankanti, Salil Prabhakar, and Anil k. Jain, “Biometric Cryptosystems: Issues and
Challenges” Proceedings Of The IEEE, Vol. 92, No. 6, PP 948-960 June 2004.
45. W. Zhao, R. Chellappa, P. J. Phillips, And A. Rosenfeld, “Face Recognition: A Literature Survey” ACM
Computing Surveys, Vol. 35, No. 4, pp. 399–458 December 2003.
46. Mineichi Kudo, Jack Sklansky “Comparison Of Algorithms That Select Features For Pattern Classifiers”
Jounal of Pattern Recognition Elsevier Science direct Vol 33 PP.- 25-41- (2000).
47. Christopher M.Bishop “ Neural Networks for pattern Recognition” Clarendan Press .Oxford 1995.
48. Louisa Lam , Ching Y. Suen “Optimal Com Binations Of Pattern Classifiers” Jounal of Pattern
Recognition Elsevier Science direct Vol 16 pp.945-954 (1995).
49. D. Michie, D.J. Spiegel halter, C.C. Taylor “Machine Learning Neural And Statistical Classification”
February 17, 1994.
50. Roberto Brunelli, Tomasso pogio “Face Recognition: Features versus Templates” IEEE Transactions On
Pattern Analysis And Machine Intelligence Vol 15, No 10 pp 1042-1052 October 1993.
Literature Survey
43. Anil K. Jain,, Arun Ross, Salil Prabhakar, “An Introduction to Biometric Recognition” IEEE Transactions
On Circuits And Systems For Video Technology, Vol. 14, No. 1,PP 4-20 January 2004.
44. Umut uludag, Sharath pankanti, Salil Prabhakar, and Anil k. Jain, “Biometric Cryptosystems: Issues and
Challenges” Proceedings Of The IEEE, Vol. 92, No. 6, PP 948-960 June 2004.
45. W. Zhao, R. Chellappa, P. J. Phillips, And A. Rosenfeld, “Face Recognition: A Literature Survey” ACM
Computing Surveys, Vol. 35, No. 4, pp. 399–458 December 2003.
46. Mineichi Kudo, Jack Sklansky “Comparison Of Algorithms That Select Features For Pattern Classifiers”
Jounal of Pattern Recognition Elsevier Science direct Vol 33 PP.- 25-41- (2000).
47. Christopher M.Bishop “ Neural Networks for pattern Recognition” Clarendan Press .Oxford 1995.
48. Louisa Lam , Ching Y. Suen “Optimal Com Binations Of Pattern Classifiers” Jounal of Pattern
Recognition Elsevier Science direct Vol 16 pp.945-954 (1995).
49. D. Michie, D.J. Spiegel halter, C.C. Taylor “Machine Learning Neural And Statistical Classification”
February 17, 1994.
50. Roberto Brunelli, Tomasso pogio “Face Recognition: Features versus Templates” IEEE Transactions On
Pattern Analysis And Machine Intelligence Vol 15, No 10 pp 1042-1052 October 1993.