Multimodal Biometric Authentication System
Keywords:
Binary classifiers, biometrics, classifier fusion, feature extraction, support vector machine, ROCAbstract
A wide variety of applications require reliable and secure verification schemes to confirm the identity of an individual requesting authorized accessing to a specified service. Examples of such applications include secure access to buildings, personal computer systems, laptops, cellular phones and ATMs. In the absence of robust verification schemes, these systems are subject to the tricks of an impostor. Biometric authentication (BA) is a problem of verifying an identity claim using a person’s behavioral and physiological characteristics.
References
J. Kittler, “Combining classifiers: A theoretical framework,” Pattern Anal. Applicat., vol. 1, pp. 18–27, 1998.
Ben-Yacoub, S.; Abdeljaoued, Y.; Mayoraz, “Fusion of Face and Speech Data for Person Identity Verification”, Neural Networks, IEEE Transactions on Volume 10, Issue 5, Sep 1999 Page(s):1065 – 1074.
C. Bishop. Neural Networks for Pattern Recognition. Oxford University Press, 1999.
R. Brunelli and D. Falavigna, “Person identification using multiple cues,” IEEE Trans. Pattern Anal. Machine Intell., vol. 17, pp. 955–966, Oct. 1995.
S. Ikbal, H. Misra, and H. Bourlard. Phase Auto Correlation (PAC) derived Robust Speech Features. In Proc. IEEE Int’l Conf. Acoustics, Speech, and Signal Processing (ICASSP-03), pages 133{136, Hong Kong, 2003.
S. Marcel and S. Bengio. Improving Face Veri_cation Using Skin Color Information. In Proc. 16th Int. Conf. on Pattern Recognition, page unknown, Quebec, 2002.
K. K. Paliwal. Spectral Subband Centroids Features for Speech Recognition. In Proc. Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), volume 2, pages 617{620, Seattle, 1998.
V. Vapnik, Statistical Learning Theory. New York: John Wiley &Sons, 1998.
N. Poh, C. Sanderson, and S. Bengio. An Investigation of Spectral Subband Centroids For Speaker
Authentication. In Springer LNCS-3072, Int’l Conf. on Biometric Authentication (ICBA), pages 631-639, Hong Kong, 2004.
P. K. Varshney, Distributed Detection and Data Fusion. Berlin, Germany: Springer-Verlag, 1996.
L. Rabiner and B-H Juang. Fundamentals of Speech Recognition. Oxford University Press, 1993.
J. R. Quinlan, C4.5: Programs for Machine Learning. San Mateo, CA: Morgan Kaufmann, 1993.
P. Werbos, “Beyond regression: New tools for prediction and analysis in the behavioral sciences,” Ph.D. dissertation, Harvard Univ., Cambridge, MA, 1974.
D. E. Rumelhart, G. E. Hinton, and R. J. Williams, “Learning representations by back-propagating errors,” Nature, vol. 323, pp. 533–536, 1986.
K. Messer, J. Matas, J. Kittler, J. L¨uttin, and G. Maˆýtre, “XM2VTSDB: The extended M2VTS database,” in Proc. 2nd Int. Conf. Audio-Video Based Biometric Person Authentication, Washington, D.C., Mar. 22–23, 1999, pp. 72–77.
Fawcett, T. (2001). Using rule sets to maximize ROC performance. In Proceedings of the IEEE International Conference on Data Mining (ICDM-2001), pp. 131-138.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Trinity Journal of Management, IT & Media (TJMITM)
This work is licensed under a Creative Commons Attribution 4.0 International License.