Professional Documents
Culture Documents
AbstractMultimodal biometric systems which fuse systems and Hybrid systems. Depending on the level of
information from a number of biometrics, are gaining more information that is fused, the fusion scheme can be classified as
attentions lately because they are able to overcome limitations in sensor level, feature level, score level and decision level fusion.
unimodal biometric systems. These systems are suited for high The score level fusion is the most commonly used approach in
security applications. Most of the proposed multibiometric multibiometric systems.
systems offer one level of security. In this paper a new approach
for adaptive combination of multiple biometrics has been Most of the multimodal biometric systems proposed in
proposed to ensure multiple levels of security. The score level literature have used a fixed combination rule and a fixed
fusion rule is adapted using (PSO) Particle Swarm Optimization threshold to achieve the desired performance. These systems
to ensure the desired system performance corresponding to the offer a fixed level of security and often have to contend with
desired level of security. The experimental results prove that the high false rejection rate if the security level is the highest.
proposed multimodal biometric system is appropriate for Therefore, the performance of these systems is not adaptive to
applications that require different levels of security. the requirements of the varying level of security [3].
Keywordsmultibiometric; match score fusion; PSO; Irsi; There are wide ranging applications where a biometric
Palmprint; Finger_Knuckle system with multiple levels of security is desirable. In this
paper, an adaptive multimodal biometric system has been
I. INTRODUCTION proposed to ensure different levels of security. This system can
The biometric technologies cover a wide range of automatically select the best fusion rule and the optimum
applications that can be used to verify person identity by decision threshold to achieve the best performance
measuring human physiological or behavioral characteristics. corresponding to the desired security level.
Biometric characteristics including fingerprint, facial features, The remainder of this paper is organized as follows:
iris, voice, signature, and palmprint, finger-knuckle, gait etc. Section (II) describes the related works. Section (III)
are now widely used in security applications. Unimodal introduced the proposed multimodal biometric system. Section
biometric systems perform person recognition based on a (IV) introduces the experimental results and discussion. Finally
single source of biometric information. Such systems are often the paper is concluded in section (V).
affected by some problems such as noisy sensor data and non-
universality, inter-class similarities, and spoof attacks. Thus, II. RELATED WORKS
due to these practical problems, the error rates associated with
Beginning from 2000, multibiometric recognition systems
unimodal biometric systems are quite high and consequently it
in score level fusion have gained much attention and several
makes them unacceptable for deployment in security critical
fusion rules have been proposed. Authors in [4] [5] have
applications [1].
provided comparisons between fixed and trained rules in
Some of the problems that affect unimodal biometric combination strategies. It has been shown that the trainable
systems can be avoided by using multimodal biometric fusion strategies do not necessarily perform better than fixed
systems. They address the issue of non-universality. It becomes combination rules.
increasingly difficult (if not impossible) for an impostor to
Sim et al. [6] have proposed an interesting approach to
spoof multiple biometric traits of an individual. Morever
achieve high security using multimodal biometrics. Their
multibiometric systems may also be viewed as fault tolerant
systems. approach has involved performing continuous verification
using users passively collected fingerprint and face biometric
Multibiometric systems which fuse information from data. However, this approach requires continued physical
multiple biometric sources can be classified into one of six presence of the user and therefore is not suitable for certain
categories [2]: Multi-sensor systems, Multi-algorithm systems, kind of applications including the popular access control
Multi-instance systems, Multi-sample systems, Multimodal applications.
158 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No.7, 2013
Frischholz and Deickmann [7] have developed BioID This level of security according to Bayesian sense is
system which offers multiple security levels by employing quantified by two parameters[10]: (CFA) the global cost of
different decision strategies on the biometric modalities (face, falsely accepting an imposter and (CFR) the global cost of
lip motion and voice) being fused. When the required security falsely rejecting a genuine user. The Bayesian cost E to be
level is low, it may well be enough to make a decision based minimized by the multimodal biometric system is the weighted
on the agreement of two out of three modalities. On the other sum of FAR and FRR as shown in eq. 1:
hand, for high security applications, this system demands
agreement of all the three modalities. However, BioID system E = CFA FAR( ) + CFR FRR( ) (1)
did not provide a systematic way to vary the level of security. Where
Instead, a system administrator made a decision on the decision
strategies to be adopted to achieve the desired performance. CFA + CFR = 2
159 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No.7, 2013
performed for extracting the features from the Palmprint image applied which transforms scores into a common range [0, 1].
and Hamming distance is calculated during the matching stage The normalized scores are given by [22]:
[17] [18].
Si S min
3) Finger-Knuckle Print Identification System Si '
S max S min (2)
The usage of finger-knuckle biometric for personal
identification has shown promising results and generated a lot Where
of interest in biometrics [19]. finger-knuckles of the human
hand are characterized by special creases on them. These S i ' : the normalized matching scores
creases differ from person to another. S i : the matching scores,
In the proposed finger-knuckle identification system, a i= 1,2, .., n and n: number of matching scores
preprocessed image database is used then the features are
extracted from the finger-knuckle image. Linear Discriminant S min &
S max : the min and max match scores
Analysis (LDA) is performed to extract the only significant
features from the finger-knuckle image. In this proposed
system, the LDA is used to both reducing the dimensionality of
the feature vector and performing the classification algorithm.
[20] [21].
Finger
Iris Palmprint Knuckle
Levels of Security
High
CFA Medium
Preprocessing Preprocessing Preprocessing
Security Low
Requirements
CFR Feature Extraction Feature Extraction Feature Extraction
F1 F2 F3
S1 S2 S3
Particle
Different Swarm Rule Score Fusion
Fusion rules Selection
Optimization
Decision
Threshold Decision Genuine
Imposter
160 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No.7, 2013
The birds in the flock also identify the bird that has reached the
best position/environment. Upon knowing this information,
others in the flock update their velocity (that depends on a
birds local best position as well as the position of the best bird
in the flock) and fly towards the best bird. The process of
regular communication and updating the velocity repeats until
reaching a favorable position.
In a similar manner, the particle in the PSO moves to a
new position in the multidimensional solution space depending
upon the particles best position (also referred to as local best
position (Pak) and global best position (Pgk). The Pak and Pgk
are updated after each iteration whenever a suitable solution is
located by the particle (lower cost). The velocity vector of each
particle represents/determines the forthcoming motion details.
The velocity update equation of a particle of the PSO, for
instance (t+1), can be represented as follows[24]:
In order to combine the scores reported by the three
matchers, different score level combinations could be applied,
such as sum, product, weighted sum rule and min rules: (7)
n Where
Sum S i
i 1
is the inertia weight between 0-1 and provide a balance
(3) between global and local search abilities of the algorithm. The
n accelerator coefficients c1 and c2 are positive constants, and r1
Pr oduct S i and r2 are two random numbers in 0-1 range. The
i 1 (4) corresponding position vector is updated by:
n (8)
Weighted _ Sum wi S i
i 1 (5) Equation (7) indicates that the new velocity of a particle in
each of its dimensions depends on the previous velocity and
Where: the distances from the previously observed best solutions
N : number of match scores wanted to be fused (positions of the particle). In the implementation of this paper
S : the matching score each particle is characterized by three variables; the fusion rule
wi : The weight for each score which calculated as follow and the decision threshold and the corresponding FAR and
FRR for each threshold.
EER i
Wi m
IV. EXPERIMENTAL RESULTS AND DISCCUSION
EER
i
i
In this work three different databases for three biometric
modalities (iris, palmprint and finger-knuckle) are used. Firstly
(6)
the results for each unibiomtric system will be presented, and
Where EER i is the unimodal biometric error. then the results of fusion of two or three biometrics at match
score level using PSO will be introduced.
m: the number of biometrics.
Generally, the performance of the biometric identification
C. Particle Swarm Optimization (PSO) system is measured by False Acceptance Rate (FAR) and False
PSO is an evolutionary, stochastic, population-based Rejection Rate (FRR) or Genuine Acceptance Rate (GAR).
optimization algorithm whose goal is to find a solution to an The system should have a high GAR with a corrosponding low
optimization problem in a search space. The PSO algorithm FAR,FRR and Total Error Rate (TER) [25] [26].
was developed by Kennedy and Eberhart in 1995 [23]. The FRR, FAR, GAR and TER are determined as follow:
main idea of PSO is inspired from the social behavior of
organisms, such as birds in a flock. The PSO algorithm false accep tan ce numbers
FAR (%) X 100%
imitates the behavior of flying birds and their means of No of imposter test (9)
information exchange to solve optimization problems. Each
particle (representing a bird in the flock), characterized by its false rejection numbers
FRR (%) X 100%
position and velocity, represents the possible solution in search No of client test
space. Behavior of the particles in the PSO imitates the way in (10)
which birds communicate with each other, while flying. During GAR(%) 100 FRR (%) (11)
this communication, each bird reviews its new position in the
space with respect to the best position it has covered so far.
161 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No.7, 2013
1.4
B. Matching score fusion results 1.2
The goal of this experiment is to evaluate the system 1
performance when using a unimodal biometric system versus a 0.8
0.6
multibiometric system using match score fusion by the aid of 0.4
PSO as an optimizer. 0.2
0
In this experiment, three score level combinations are
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
considered including sum, product and weighted sum. The
Security Level
PSO is employed to dynamically select the appropriate
decision threshold and the best fusion rule to minimize the
Bayesian cost for the corrosponding required security level. Fig. 2. Average minimum error from the score level approach using the
Each particle in PSO is characterized by three variables; a adaptive combination of iris and finger-knuckle modalities
variable representing one of a different score level fusion rules,
decision threshold and the corresponding FAR and FRR for 2
Standard Devision (Error)
162 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No.7, 2013
Product 2
90
0.8
80 0.6
0.4
70
0.2
60 0
50 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
40 Security Level
30
20 Fig. 6. Standard deviation of the minimum error, from each run, using score
10 level approach for iris and palmprint modalities
0
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 Product
Security Level W_Sum
Sum
Fig. 4. Adaptive selection of fusion rules using score level combination for 100
iris and finger-knuckle modalities 90
1.4
1.2 2
1 1.8
0.8 1.6
Average Error
0.6 1.4
0.4 1.2
0.2 1
0 0.8
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 0.6
0.4
Security Level 0.2
0
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
Fig. 5. Average minimum error from the score level approach using the
Security Level
adaptive combination of iris and palmprint modalities
Fig. 8. Average minimum error from the score level approach using the
adaptive combination of Knuckle and palmprint modalities
163 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No.7, 2013
164 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No.7, 2013
165 | P a g e
www.ijacsa.thesai.org