Вы находитесь на странице: 1из 29

A Review on Recent Techniques in

Multimodal Biometrics

Presented by Guided by
Mrs.N.Sivasankari Dr.A.Muthukumar
Assistant Professor/ECE Associate Professor/ECE
Mepco Schlenk Engg College Kalasalingam University
Outline
• What is biometrics?
• Why it is important?
• Difference between single and multimodal
biometrics
• Multimodal biometrics
– Feature Extraction Techniques
– Fusion Techniques
– Normalization Techniques
• Evaluation Methods
What is Biometrics?
• The automated method of identifying or verifying
the Person. It may be based on …..

What he
knows

What he is
Who he/she is
Having
Why it is important
• To avoid the fraudulent action at various places
like ….
 Safety deposit boxes and Bank transaction
like ATM withdrawals, Credit Card purchase
 Access to computers and emails
 Openings of buildings, car
 Getting official documents like birth
 Certificates or passports
 Obtaining court papers
 Getting into confidential workplace
Biometric Automation system should
provide…

• Universality
• Uniqueness
• Permanence
• Collectability
• Performance
• User’s Accpetability
• Robustness against Circumvention
Biometrics module
• The module should contain five important
modules
 Sensor module
 Feature Extraction module
 Template matcher module
 System database module
 Decision making module
These modules can perform two actions
Enrollment & verification
Biometric System
A sample flow chart: template

Sensor Matcher
Feature System
Qualify Extractor Decision
Database
checker Maker

The templates in the system database


may be updated at period of time.
True / False

7
Dimensionality Reduction
• To analyze the image first it has to be partitioned
and each partitioned data information should be
collected. For that dimensionality reduction
method is needed.
• The process of reducing the high dimensional
random variable data into low dimensional
random variable data is called dimensionality
reduction. In the mean time essential
information's are extracted
• This process consists of feature selection &
Feature Extraction.
Dimensionality Reduction
• The dimensionality reduction techniques are
mainly classified into linear and Non linear
techniques.
• Linear dimensionality reduction :
– Linear relationship between transformed data and
original data
– Supervised dimensionality reduction techniques.
• Non Linear dimensionality reduction :
– Non Linear relationship between transformed data
and original data.(Splited into small regions called as
manifolds)
– Unsupervised dimensionality reduction techniques.
Dimensionality Reduction

Linear Dimensionality reduction Non linear dimensionality reduction


Linear Discriminant Analysis Sammon’s mapping
Principal Component Analysis Self Organizing map
Independent Component Analysis Principal curves and manifolds
Singular Value Decomposition Auto encoders
Gaussian process latent variable models
Curvilinear component analysis
Curvilinear Distance analysis
Diffieomorphic dimensionality reduction
Kernel principal component analysis
Iso map
Locally-linear embedding
Laplacian eigenmaps
Hessian LLE
Dimensionality Reduction
Linear Dimensionality reduction Non linear dimensionality reduction
Local tangent space alignment
T-Distributed stochastic neighbor embedding
Manifold sculpting
Feature Extraction
• The image has undergone some pre-
processing steps such as morphological
processing after which some features has to
be extracted. Mathematically area, center of
area, axis of second moment, perimeter,
projections, thinness ratio, Euclidean distance
from certain points, through which some of
the known features can be extracted.
Extracted features
• Edges
– Edge detection
• Regions
– region growing
• Corner features
– Corner feature detection and Tracking
– Stereo correspondence
• Curvature
Classifiers
Limitations of single biometric
• susceptible to noisy or bad data, such as
inability of a scanner to read dirty fingerprints
clearly
• Unimodal biometrics is also prone to inter-
class similarities within large population
groups. In case of identical twins, a facial
recognition camera may not be able to
distinguish between the two
Limitations of single biometric
• Some biometric technologies are incompatible
with a certain subset of the population.
Elderly people and young children may have
difficulty enrolling in a fingerprinting system,
due to their faded prints or underdeveloped
fingerprint ridges .
• Finally, unimodal biometrics are vulnerable to
spoofing, where the data can be imitated or
forged
Need for multi biometrics-Two better
than one
Fusion
Normalization
Evaluation of performance metrics
Literature Survey

1. R. Hettiarachchi , J.F.Peters, “Multi-manifold Lle Learning In Pattern Recognition”, Journal of Pattern


Recognition Elsevier Sciencedirect, April 2015.
2. Yu ho chanouang , chinng luen , Wesley shu “A Secure non-interactive deniable Authentication protocol
with certificates based on Ellitpic curve cryptography” New trends in Intelligence information and
database systems Volume 598 Springer pp 183-190 Springerlink 2015

3. Chiou-Yng Lee, Pramod Kumar Meher, “Efficient Sub quadratic Space Complexity Architectures for
Parallel MPB Single - and Double - Multiplications for All Trinomials Using Toeplitz Matrix-Vector
Product Decomposition”, IEEE Transactions On Circuits And Systems Vol. 62, NO. 3, March 2015.
4. Hamad Marzouqi, Mahmoud Al-Qutayri, Khaled Salah “Review of elliptic curve cryptography Processor
designs” Journal of Microprocessors and Microsystems Vol 39 pp 98-112, February 2015
5. Gaurav Bhatnagar, Q. M. Jonathan Wu, “Biometric Inspired Multimedia Encryption Based on Dual
Parameter Fractional Fourier Transform”, IEEE Transactions On Systems, Man, And Cybernetics:
Systems, Vol. 44, NO. 9, PP 1234-1247, September 2014.
6. Mahdi Soltanolkotabi, Ehsan Elhamifar and Emmanuel J. Cand`es, “Robust Subspace Clustering”, The
Annals of Statistics 2014, Vol. 42, No. 2, 669–699.
7. Seog Chung Seo, Taehong Kimb, Seokhie Hongc, “Accelerating Elliptic Curve Scalar Multiplication
Over Gf(2m) On Graphic Hardware's”, Journal of Parallel and Distributed Computing, April 2014.
Literature Survey

8. Jiwen Lu, Yap-Peng Tan, Gang Wang, “Discriminative Multimanifold Analysis for Face Recognition from
a Single Training Sample per Person”, IEEE Transactions On Pattern Analysis And Machine Intelligence,
Vol. 35, NO. 1, January 2013.

9. Luc Devroye, L´aszl´o, “A Probabilistic Theory Of Pattern Recognition”, March 2013 Springer

10. Ctirad Sousedik, Christoph Busch “Presentation Attack Detection Methods For Fingerprint Recognition
Systems: A Survey” IET Biometrics , pp. 1–15, November 2013.

11. Rima Belguechi, Estelle Cherrier,, Christophe Rosenberger, Samy Aitoudia. “Operational Bio-hash To
Preserve Privacy Of Fingerprint Minutiae Templates”, IET Biometrics, February 2013.
12. Junjun Jiang, Ruimin Hu, Zhen Han, Kebin Huang, Tao Lu, “Graph Discriminant Analysis On Multi-
manifold (Gdamm): A Novel Super-resolution Method For Face Recognition”, 19th IEEE International
Conference on Image processing, October 2012.
13. J.fan, I.verbauwhede, “ an updated survey on secure ECC implementations: attacks, countermeasures and
cost, Cryptography and Security: From Theory to Applications vol 6805, springer, Berlin Heidelberg
2012, pp 265-282.
Literature Survey

14. M. Esmaeildoust, D. Schinianakis, H. Javashi, T. Stouraitis, and K. Navi, “Efficient RNS


Implementation Of Elliptic Curve Point Multiplication Over Gf(p)”, IEEE Trans. Very
Large Scale Integr. (VLSI) Syst., vol. 21, no. 8, pp. 1545–1549, Aug. 2012.

15. Claus vielhauer, Jana Dittman “Bio Metrics and ID Management”, Published by Springer
,2011.

16. Rihards Fuksis, Arturs Kadikis, and Modris Greitans, “Biohashing and Fusion of
Palmprint and Palm Vein Biometric Data”, IEEE Conference on Hand Based Biometrics,
November 2011.

17. Y. Wang and R. Li, “A Unified Architecture For Supporting Operations Of AES and
ECC”, In Proc. 4th Int. Symp. Parallel Archit., Algorithms Programme (PAAP), Dec.
2011, pp. 185–189.

18. Abhishek Nagar , Karthik Nandakumar , Anil K. Jain, “A Hybrid Biometric Cryptosystem For
Securing Fingerprint Minutiae Templates”, Pattern Recognition Letters Elsevier Science direct 31
733–741, October 2010.
19. L.Ma, M.M.Crawford, J.Tian, Local manifold learning – based - nearest - neighbor for
hyperspectral imageclassification, IEEE Trans.Geosci.RemoteSens.48(11) (2010) 4099–4109.
20. Emanuele Maiorana, Patrizio Campisi, Julian Fierrez, Javier Ortega-Garcia, Alessandro Neri,
“Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature
Recognition”, IEEE Transactions On Systems, Man, And Cybernetics—part A: Systems And
Humans, Vol. 40, No. 3, PP525-538, May 2010.
Literature Survey

14. M. Esmaeildoust, D. Schinianakis, H. Javashi, T. Stouraitis, and K. Navi, “Efficient RNS


Implementation Of Elliptic Curve Point Multiplication Over Gf(p)”, IEEE Trans. Very
Large Scale Integr. (VLSI) Syst., vol. 21, no. 8, pp. 1545–1549, Aug. 2012.

15. Claus vielhauer, Jana Dittman “Bio Metrics and ID Management”, Published by Springer
,2011.

16. Rihards Fuksis, Arturs Kadikis, and Modris Greitans, “Biohashing and Fusion of
Palmprint and Palm Vein Biometric Data”, IEEE Conference on Hand Based Biometrics,
November 2011.

17. Y. Wang and R. Li, “A Unified Architecture For Supporting Operations Of AES and
ECC”, In Proc. 4th Int. Symp. Parallel Archit., Algorithms Programme (PAAP), Dec.
2011, pp. 185–189.

18. Abhishek Nagar , Karthik Nandakumar , Anil K. Jain, “A Hybrid Biometric Cryptosystem For
Securing Fingerprint Minutiae Templates”, Pattern Recognition Letters Elsevier Science direct 31
733–741, October 2010.
19. L.Ma, M.M.Crawford, J.Tian, Local manifold learning – based - nearest - neighbor for
hyperspectral imageclassification, IEEE Trans.Geosci.RemoteSens.48(11) (2010) 4099–4109.
20. Emanuele Maiorana, Patrizio Campisi, Julian Fierrez, Javier Ortega-Garcia, Alessandro Neri,
“Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature
Recognition”, IEEE Transactions On Systems, Man, And Cybernetics—part A: Systems And
Humans, Vol. 40, No. 3, PP525-538, May 2010.
Literature Survey

21. D.Karakoyunlu, F. K. Gurkaynak, B. Sunar, and Y. Leblebici, “Efficient And Side-channel-aware


Implementations Of Elliptic Curve Cryptosystems Over Prime Fields,” IET Inf. Secur., vol. 4, no. 1, pp.
30–43, Mar. 2010.

22. Emanuele Maiorana, Patrizio Campisi, “Fuzzy Commitment for Function Based Signature Template
Protection” IEEE Signal Processing Letters, Vol. 17, No. 3, PP 249-252, March 2010.

23. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th ed. USA: Prentice-Hall,
Jan. 2010.

24. Salil Prabhakar, Sharath Pankanti, anil K. Jain “Biometric Recognition: Security and Privacy Concerns”
Journal of Biometrics IEEE computer society, July 2009.

25. Xinbo Gao, Chunna Tian, “Multi-view Face Recognition Based On Tensor Subspace Analysis And View
Manifold Modeling”, Journal of Neuro computing Elsevier Science direct, June 2009.
26. David E.Boyle,Thomas Newe ,” On the implementation and evaluation of an elliptic curve based
cryptosystem for JAVA enabled wireless sensor networks” Journal of Sensors and Actuators A (156)
394–405, October 2009.
27. Antonio Plaza a, Jon Atli Benediktsson Joseph W. Boardman, “Recent Advances In Techniques For
Hyperspectral Image Processing”, Journal of Remote sensing and Environment Elsevier Science direct
113 S110–S122, March 2009.
Literature Survey

28. S.Cimato, M.Gammasi, “A Multi-biometric Verification System for the Privacy Protection
of Iris Templates” Springer - Verlag Berlin Heidelberg, 2009.
29. Anil K. Jain, Karthik Nandakumar, Abhishek Nagar, “Biometric Template Security”, Hindawi
Publishing Corporation EURASIP Journal on Advances in Signal Processing ,Volume (2008).
30. S.B.Kosantiants, “Supervised Machine Learning- A review of classification techniques”
Informatica 31, 249-268 (2007).
31. Karthik Nandakumar, Anil K. Jain, Sharath Pankanti “Fingerprint-Based Fuzzy Vault:
Implementation and Performance”, IEEE Transactions On Information Forensics And Security,
Vol. 2, No. 4, December 2007.
32. Mayank Vatsa, Richa Singh, Afzel Noore, “Feature based RDWT Watermarking For Multimodal
Biometric System”, Journal of image and vision computing Elsevier Science direct, May 2007.

33. Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, Ruud M. Bolle, “Generating Cancelable
Fingerprint Templates”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 29,
No. 4, PP 561-572 April 2007.
34. Robert Haralick, Rave Harpaz, “Linear Manifold Clustering In High Dimensional Spaces By
Stochastic Search”, Journal of Pattern Recognition (PP2672 – 2684) Elsevier Science direct, 2007.
Literature Survey

35. Alvinah goh, Rine vidal “Segmenting Motions Of Different Types Of Unsupervised Manifold Clustering”,
IEEE Conference on Vision and Pattern Recognition, 2007.
36. Robert Haralick, Rave Harpaz, “Linear Manifold Clustering In High Dimensional Spaces By Stochastic
Search”, Journal of pattern recognition Elsevier Science direct Vol 40 PP. 2672 – 2684, January 2007 .
37. Timo Ahonen, Abdenour Hadid, and Matti Pietika “Face Description with Local Binary Patterns: Application
to Face Recognition”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 28, No. 12,
December 2006.
38. Loris Nanni, Alessandra Lumini, “Empirical tests on BioHashing”, Journal of Neuro computing Elsevier
Sciencedirect, May 2006.
39. David D. Hwang, Member, IEEE, Kris Tiri, Member, IEEE, Alireza Hodjat, Student Member, IEEE, Bo-
Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede, “AES-Based Security Coprocessor IC in
0.18-m CMOS With Resistance to Differential Power Analysis Side-Channel Attacks” IEEE Journal Of Solid-
state Circuits, Vol. 41, NO. 4, PP 781-191 April 2006.

40. Miguel A. Ferrer, Jesu´s B. Alonso, and Carlos M. Travieso “Offline Geometric Parameters for Automatic
Signature Verification Using Fixed-Point Arithmetic” IEEE Transactions On Pattern Analysis And Machine
Intelligence, Vol. 27, no. 6, PP -993-995 June 2005.
41. D. Liang,J.Yang,Z.Zheng,Y.Chang, “A facial expression recognition system based on supervised locally linear
embedding”, Pattern Recognit.Lett.26(15) pp . 2374–2389 (2005).
42. E.Savas, M.Naseer, A.Gutab, C.K.Koc, “ Efficient unified Mongomery inversion with multibit shifting. IEEE
proc. Comput.Digit.Techn.152 (4) pp 489-498 (2005)
Literature Survey

43. Anil K. Jain,, Arun Ross, Salil Prabhakar, “An Introduction to Biometric Recognition” IEEE Transactions
On Circuits And Systems For Video Technology, Vol. 14, No. 1,PP 4-20 January 2004.
44. Umut uludag, Sharath pankanti, Salil Prabhakar, and Anil k. Jain, “Biometric Cryptosystems: Issues and
Challenges” Proceedings Of The IEEE, Vol. 92, No. 6, PP 948-960 June 2004.
45. W. Zhao, R. Chellappa, P. J. Phillips, And A. Rosenfeld, “Face Recognition: A Literature Survey” ACM
Computing Surveys, Vol. 35, No. 4, pp. 399–458 December 2003.
46. Mineichi Kudo, Jack Sklansky “Comparison Of Algorithms That Select Features For Pattern Classifiers”
Jounal of Pattern Recognition Elsevier Science direct Vol 33 PP.- 25-41- (2000).
47. Christopher M.Bishop “ Neural Networks for pattern Recognition” Clarendan Press .Oxford 1995.
48. Louisa Lam , Ching Y. Suen “Optimal Com Binations Of Pattern Classifiers” Jounal of Pattern
Recognition Elsevier Science direct Vol 16 pp.945-954 (1995).
49. D. Michie, D.J. Spiegel halter, C.C. Taylor “Machine Learning Neural And Statistical Classification”
February 17, 1994.
50. Roberto Brunelli, Tomasso pogio “Face Recognition: Features versus Templates” IEEE Transactions On
Pattern Analysis And Machine Intelligence Vol 15, No 10 pp 1042-1052 October 1993.
Literature Survey

43. Anil K. Jain,, Arun Ross, Salil Prabhakar, “An Introduction to Biometric Recognition” IEEE Transactions
On Circuits And Systems For Video Technology, Vol. 14, No. 1,PP 4-20 January 2004.
44. Umut uludag, Sharath pankanti, Salil Prabhakar, and Anil k. Jain, “Biometric Cryptosystems: Issues and
Challenges” Proceedings Of The IEEE, Vol. 92, No. 6, PP 948-960 June 2004.
45. W. Zhao, R. Chellappa, P. J. Phillips, And A. Rosenfeld, “Face Recognition: A Literature Survey” ACM
Computing Surveys, Vol. 35, No. 4, pp. 399–458 December 2003.
46. Mineichi Kudo, Jack Sklansky “Comparison Of Algorithms That Select Features For Pattern Classifiers”
Jounal of Pattern Recognition Elsevier Science direct Vol 33 PP.- 25-41- (2000).
47. Christopher M.Bishop “ Neural Networks for pattern Recognition” Clarendan Press .Oxford 1995.
48. Louisa Lam , Ching Y. Suen “Optimal Com Binations Of Pattern Classifiers” Jounal of Pattern
Recognition Elsevier Science direct Vol 16 pp.945-954 (1995).
49. D. Michie, D.J. Spiegel halter, C.C. Taylor “Machine Learning Neural And Statistical Classification”
February 17, 1994.
50. Roberto Brunelli, Tomasso pogio “Face Recognition: Features versus Templates” IEEE Transactions On
Pattern Analysis And Machine Intelligence Vol 15, No 10 pp 1042-1052 October 1993.

Вам также может понравиться