Multimodal Biometric Authentication System

Authors

  • Rajesh Kumar Jain HoD, Comp. Sc. Deptt., Sirifort College of Computer Technology & Mgt, Rohini

Keywords:

Binary classifiers, biometrics, classifier fusion, feature extraction, support vector machine, ROC

Abstract

A wide variety of applications require reliable and secure  verification schemes to confirm the identity of an individual  requesting authorized accessing to a specified service.  Examples of such applications include secure access to  buildings, personal computer systems, laptops, cellular  phones and ATMs. In the absence of robust verification  schemes, these systems are subject to the tricks of an  impostor. Biometric authentication (BA) is a problem of  verifying an identity claim using a person’s behavioral and  physiological characteristics.  

References

J. Kittler, “Combining classifiers: A theoretical framework,” Pattern Anal. Applicat., vol. 1, pp. 18–27, 1998.

Ben-Yacoub, S.; Abdeljaoued, Y.; Mayoraz, “Fusion of Face and Speech Data for Person Identity Verification”, Neural Networks, IEEE Transactions on Volume 10, Issue 5, Sep 1999 Page(s):1065 – 1074.

C. Bishop. Neural Networks for Pattern Recognition. Oxford University Press, 1999.

R. Brunelli and D. Falavigna, “Person identification using multiple cues,” IEEE Trans. Pattern Anal. Machine Intell., vol. 17, pp. 955–966, Oct. 1995.

S. Ikbal, H. Misra, and H. Bourlard. Phase Auto Correlation (PAC) derived Robust Speech Features. In Proc. IEEE Int’l Conf. Acoustics, Speech, and Signal Processing (ICASSP-03), pages 133{136, Hong Kong, 2003.

S. Marcel and S. Bengio. Improving Face Veri_cation Using Skin Color Information. In Proc. 16th Int. Conf. on Pattern Recognition, page unknown, Quebec, 2002.

K. K. Paliwal. Spectral Subband Centroids Features for Speech Recognition. In Proc. Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), volume 2, pages 617{620, Seattle, 1998.

V. Vapnik, Statistical Learning Theory. New York: John Wiley &Sons, 1998.

N. Poh, C. Sanderson, and S. Bengio. An Investigation of Spectral Subband Centroids For Speaker

Authentication. In Springer LNCS-3072, Int’l Conf. on Biometric Authentication (ICBA), pages 631-639, Hong Kong, 2004.

P. K. Varshney, Distributed Detection and Data Fusion. Berlin, Germany: Springer-Verlag, 1996.

L. Rabiner and B-H Juang. Fundamentals of Speech Recognition. Oxford University Press, 1993.

J. R. Quinlan, C4.5: Programs for Machine Learning. San Mateo, CA: Morgan Kaufmann, 1993.

P. Werbos, “Beyond regression: New tools for prediction and analysis in the behavioral sciences,” Ph.D. dissertation, Harvard Univ., Cambridge, MA, 1974.

D. E. Rumelhart, G. E. Hinton, and R. J. Williams, “Learning representations by back-propagating errors,” Nature, vol. 323, pp. 533–536, 1986.

K. Messer, J. Matas, J. Kittler, J. L¨uttin, and G. Maˆýtre, “XM2VTSDB: The extended M2VTS database,” in Proc. 2nd Int. Conf. Audio-Video Based Biometric Person Authentication, Washington, D.C., Mar. 22–23, 1999, pp. 72–77.

Fawcett, T. (2001). Using rule sets to maximize ROC performance. In Proceedings of the IEEE International Conference on Data Mining (ICDM-2001), pp. 131-138.

Published

2012-12-23

How to Cite

Multimodal Biometric Authentication System . (2012). Trinity Journal of Management, IT & Media (TJMITM), 3(1), 19–22. Retrieved from https://acspublisher.com/journals/index.php/tjmitm/article/view/1332