International Engineering Journal For Research & Development E-ISSN No: 2349-0721 Volume 1: Isuue 1
MULTIMODAL BIOMETRICS SYSTEM- A REVIEW Ms. Priya N. Ghotkar1 ,Prof. Vikas G. Bhowate2 1
(PG Scholar) Department of Computer Engineering, 2St. Vincent Pallotti College of Engg. & Tech Nagpur,1vipbhowate@gmail.com,2priyaghotkar@gmail.com
---------------------------------------------------------------------------------------------------------------Abstract: In our day to day life, the automatic verification of person is a very important task. The traditional method of establishing a person’s identity include knowledge based like password or token based like identification cards, but demonstration of these characteristics can simply be lost, stolen or shared. So for authentication of a person some biometric characters of that person is used. For that purpose one or more biometric characters can be used. But using one character may sometime prove less secure so more than one characters are used. Therefore this is the survey on multimodal biometrics system. Keywords: Biometrics, Person authentication, Unimodal, Multimodal, Fusion.
1. Introduction In today’s world where the technology is emerging rapidly, there are several person authentication related issues that need to be handled in daily life. Biometric is the Greek word in which bios (life) and metron (measure), and hence biological measurement is termed as biometric. It indicates to the ones physical or biological characteristics in which physiological characters are face, speech, fingerprint, iris, etc or behavioural characters are signature, gait or speech too. Physiological biometrics are related to the shape of the body and are generally more stable. Behavioural biometrics are related to the behaviour of the person and are not as much of steady. thus, a appropriate variety of biometrics is more important than building a person authentication system. The block diagram of biometric based person recognition system is given in Figure 1.
Figure 1: Biometric-based person recognition system.[1]
www.iejrd.in
Page 1
International Engineering Journal For Research & Development E-ISSN No: 2349-0721 Volume 1: Isuue 1 For training any person validation arrangement, the biometric data are processed for attribute extraction. The most important aspect of any biometric-based authentication system is the selection of an proper feature set which should be reasonably invariant with different degradations. Modelling is done to make the template in such a way that it should hold all the variations captured by that particular biometric for every person. In the testing phase, same features are computed from the unknown test biometric template and then compared with the models of every individual. This is proficient in the blueprint matching stage. Finally, after blueprint matching, we get the approval or refusal of the person as the output result.
2. Comparision between UniModal Biometric System and Multimodal biometric system 2.1 Unimodal biometric system Most real-world applications in biometric systems are unimodal, i.e., they rely on the single source of information for authentication (e.g., single fingerprint or iris). The basic requirements of any biometric system are input device which captures the image, biometric software for feature extraction and database for storage and comparision.
A. Input Device An input device such as scanner, writing pad, etc. are used to capture the images. These are then used to control the inputs used by the software part.
B. Biometric Software Software is used to process the input and convert it into digital form, also extracts the features and compares the result. In terms of accuracy, the performance of a biometric system depends on the quality of the software.
C. Database A database is used to store the information which is further used for the judgment. characteristics extracted from the put in samples are stored since the input data will take more space and storing features saves the time for processing samples again to extract the features. The main processes involved are enrolment or registration, verification and identification. Fig. 2 shows the architecture of a general biometric system.
1.Enrollment Process/Registration Process In this process, the user need to register himself by using the input devices like scanner and writing pads. It is necessary for identification of an individual to store his characteristics features in a record, which been extracted as of the trustworthy samples.
www.iejrd.in
Page 2
International Engineering Journal For Research & Development E-ISSN No: 2349-0721 Volume 1: Isuue 1 Fig. 2: Basic Biometric System Architecture[2] These features are then compared with the features extracted from the traits of the individual need to be recognized. In command to remove characteristics, the input sample is pre-processed and feature extraction algorithm is applied on these pre-processed samples to form feature vectors. Feature vectors are stored in the database instead of input samples as input samples take more space on secondary memory than mathematical data and also features are computed just once which saves a lot of processing time...
2. Verification In the verification mode, the person is validated by comparing his captured data with the stored data or templates in the database. In such a system, an individual who desires to be recognized claims an identity, usually via PIN (Personal Identification number), a user name or a smart card and the system conducts a one to one comparison to determine whether the claim is true or not [1].
3. Identification In identification mode, the system recognizes an individual by searching the templates of all the users in the record for a equivalent. so, the structure conducts a one to many comparisons to establish an individual identity or fails, if the subject is enrolled in the system record. The topic does not claim any identity. These formations have a variety of issues such as: (a) Noise in sensed data: examples of noisy data are a fingerprint with a scar, or a voice altered by cold. It affects the performance of the system by getting incorrectly matched with the templates in the database. (b) Intra-class variations: These variations are typically caused by a user who is incorrectly interacting with the sensor (e.g., incorrect facial pose), or when the characteristics of a sensor are modified during authentication (e.g., optical versus solid-state fingerprint sensors). (c) Inter-class similarities: In a biometric system comprising of a large number of users, there may be inter-class similarities (overlap) in the feature space of many participants. Golfarelli et al. [2] declare that the number of distinguishable patterns in two of the most commonly used representations of hand geometry and face are only of the order, respectively. (d) Non-universality: no biometric is truly universal. In fingerprint verification system, for example it says fingerprints are universal but there are some people that does not possess fingerprint because of hand related disabilities. (e) Spoof attacks: An imposter may attempt to spoof the biometric trait of a legitimate enrolled user. For example, this type of attack is especially relevant when behavioural traits such as signature or voice are used. However, fingerprints can be constructed using lifted fingerprint impression.
2.2 Multimodal biometric systems Some of the limitations imposed by unimodal biometric systems can be overcome by including multiple sources of information for establishing identity [3]. Such systems, known as multimodal biometric systems, are ordinary to be more trustworthy due to the existence of many, (moderately) autonomous pieces of proof [4]. These systems are able to meet the performance requirements imposed by various applications. They
www.iejrd.in
Page 3
International Engineering Journal For Research & Development E-ISSN No: 2349-0721 Volume 1: Isuue 1 concentrate on the difficulty of non-universality, since several persona ensure sufficient populace reporting. They also prevent spoofing since it would be difficult for an impostor to spoof multiple biometric traits of a genuine user concurrently. moreover, they can make possible a challenge response type of mechanism by requesting the user to present a random subset of biometric traits thereby ensuring that a ‘live’ user is indeed present at the point of data acquisition.
Fig 3. Multimodal Biometric System[3] The reason to combine different modalities is to improve recognition rate. The aim of multimodal biometrics is to reduce one or more of the following: •
False accept rate (FAR)
•
False reject rate (FRR)
•
Failure to enroll rate (FTE)
•
Susceptibility to artefacts or mimics Multi modal biometric systems take input from single or multiple sensors measuring two or more
different modalities of biometric description. For pattern a system with fingerprint and face recognition would be considered “multimodal” even if the “OR” rule was mortal functional, allowing users to be confirmed by means of either of the modalities [5].
3. Fusion In Multimodal Biometric Systems A Mechanism that can combine the classification results from each biometric channel is called as biometric union. We require to create this union. Multimodal biometric union together dimensions from different biometric traits to enhance the power. union at similar score, status and conclusion level has been extensively studied in the fiction. a variety of levels of union are: antenna level, attribute level, identical score level and decision level.
1. Antenna level Fusion: We merge the biometric personality taken from different sensors to form a composite biometric trait and process.
2. Feature level Fusion:
www.iejrd.in
Page 4
International Engineering Journal For Research & Development E-ISSN No: 2349-0721 Volume 1: Isuue 1 Signal coming from different biometric channels are first previously did, and attribute vectors are separated, using precise algorithm and we join these vectors to form a composite attribute vector. This is constructive in arrangement.
3. Matching score level fusion: somewhat than collecting the attribute vector, we practice them separately and individual matching score is found, then depending on the accuracy of each biometric matching score which will be used for classification.
4. Decision level fusion: Each modality is first pre-classified independently.This system can implement any of these fusion strategies or combination of them to improve the performance of the system.
4. Literature Survey Ratha et al. [6] Proposed a unimodal distortion-tolerant Fingerprint authentication technique based on graph demonstration. with the Fingerprint details features, a subjective graph of minutiae was made for both the query Fingerprint and the orientation Fingerprint. The planned algorithm had been experienced with excellent results on a large private database with the use of an optical biometric sensor. relating to Iris acknowledgment systems in the Gabor filter and 2-D wavelet filter were used for assets withdrawal. This procedure was invariant to translation and rotation and was tolerant to enlightenment. The categorization rate on using the Gabor was 98.3% and the accuracy with wavelet was 82.51% on the Institute of Automation of the Chinese Academy of Sciences (CASIA) record. In the proposed approach in multichannel and Gabor filters had been used to capture local texture information of the Iris which were used to construct a fixed-length feature vector. The results obtained were FAR = 0.01% and FRR = 2.17% on CASIA record. normally, unimodal biometric recognition systems present different drawbacks due its dependency on the unique biometric attribute. i.e attribute uniqueness, feature achievement, dispensation errors, and attribute that are temporally occupied can all affect system accurateness. A multimodal biometric structure should overcome the aforementioned limits by integrating two or more biometric features. Conti et al. [7] proposed a multimodal biometric system using two different Fingerprint acquisitions. The matching module integrates fuzzy-logic methods for matching-score union. investigational trials using both decision-level fusion and matching-score-level fusion were performed. investigational result have shown an improvement of 6.7% using the matching score- level fusion rather than a monomodal authentication system. Yang and Ma [8] worn Fingerprint, palm publish, and hand geometry to implement personal identity verification. These three biometric features can be taken from the same image. They perform a first fusion of the Fingerprint and palm features, and consecutively, a matching-score fusion between the multimodal system and the palm-geometry unimodal system for comparision. The system was tested on a database containing the features self-constructed by 98 subjects. Besbes et al. [9] proposed a multimodal biometric system using Fingerprint and Iris type. They utilize a cross approach based on: 1) Fingerprint minutiae extraction and 2) Iris template encoding through a mathematical representation of the extracted Iris area. This move towards was based on two recognition modalities and every part provided its own decision. The final decision was taken by considering the unimodal decision through an ―AND‖ operative. No investigational result have been reported for recognition performance. Aguilar et al. [10] proposed a multibiometric method using a combination of fast Fourier transform (FFT) and Gabor filters to enhance
www.iejrd.in
Page 5
International Engineering Journal For Research & Development E-ISSN No: 2349-0721 Volume 1: Isuue 1 Fingerprint imaging. The proposed system uses the Fingerprints of mutually thumbs. every Fingerprint was individually processed; consecutively, the unimodal results were compared in order to give the final complex result. The tests have been performed on a Fingerprint database composed of 50 subjects obtaining FAR = 0.2% and FRR = 1.4%. Subbarayudu and Prasad presented experimental results of the unimodal Iris system, unimodal palm print system, and multibiometric system (Iris and palm print). The structure union utilizes a matching score feature in which each system provides a matching score indicating the similarity of the feature vector with the template vector. Yeong Gon Kim et al.[11] proposed that the face recognition process is carried out according to the following process. First, the face and eye regions are detected by AdaBoost and rapid eye detection. Second, size normalization is conducted to eliminate variations in the detected facial region, while the illumination is normalized using the Retinex algorithm. Third, facial features are acquired from the normalized facial image based on principal component analysis (PCA). Finally, the matching score is calculated as the Euclidean distance to provide an input for the SVM. During iris recognition, an iris region is segmented using
integer‐based CED and with an eyelid/eyelash detection method. Iris codes are generated from the segmented
iris region. The matching score of the Hamming distance is calculated and used as the SVM input. These procedures are performed for both the left and right iris images captured using the proposed device. The matching scores for the face and both irises are used as SVM inputs and a final authentication is carried out based on the outputs of the SVM.
Conclusion This paper presents the overview about multimodal biometrics sytem, difference between single modal and multimodal biometric. Also types of fusion that can be used in multimodal. For using the multimodal the security of template in future should be considered before storing it in the database.
References [1] R. Frischholz, U. Dieckmann,“BiolD: A multimodal biometric identification system”, Computer, Vol. 33, No. 2, pp. 64-68,2000. [2] M. Golfarelli, D. Maio, and D. Maltoni, “On the error-reject tradeoff in biometric verification systems,” IEEE Trans. on Patt. Anal. and Mach. Intell., vol. 19, pp. 786–796, July 1997. [3] A. Ross and A. K. Jain, “Information fusion in biometrics,” Pattern Recognition Letters, vol. 24, pp. 2115– 2125, Sep 2003.
www.iejrd.in
Page 6
International Engineering Journal For Research & Development E-ISSN No: 2349-0721 Volume 1: Isuue 1 [4] L. I. Kuncheva, C. J. Whitaker, C. A. Shipp, and R. P. W. Duin, “Is independence good for combining classifiers?,” in Proc. of Int’l Conf. on Pattern Recognition (ICPR), vol. 2, (Barcelona, Spain), pp. 168–171, 2000. [5] M. Indovina, U. Uludag, R. Snelick, A. Mink, and A. Jain, “Multimodal Biometric Authentication Methods: A COTS Approach,” [6] Rabiner L. R., Levinson S. E. and Sondhi M. M., "On the application of Vector Quantization and Hidden Markov Models to Speaker-Independent, Isolated Word Recognition, " The Bell System Technical Journal, AT&T, 1983. [7] N. K. Ratha, R. M. Bolle, V. D. Pandit, and V. Vaish, ―Robust Fingerprint authentication using local structural similarity,‖ in Proc. 5th IEEE Workshop Appl. Comput. Vis., Dec. 4–6, 2000, pp. 29–34.DOI 10.1109/WACV.2000.895399. [8] V. Conti, G. Milici, P. Ribino, S. Vitabile, and F. Sorbello, ―Fuzzy fusion in multimodal biometric systems,‖ in Proc. 11th LNAI Int. Conf. Knowl.- Based Intell. Inf. Eng. Syst. (KES 2007/WIRN 2007), Part I LNAI 4692. B. Apolloni et al., Eds. Berlin, Germany: Springer-Verlag, 2010, pp. 108–115. [9] F. Besbes, H. Trichili, and B.Solaiman, ―Multimodal biometric system based on Fingerprint identification and Iris recognition, in Proc. 3rd Int. IEEE Conf. Inf. Commun. Technol.: From Theory to Applications (ICTTA 2008), pp. 1–5. DOI: 10.1109/ ICTTA.2008.4530129. [10] G. Aguilar, G. Sanchez, K. Toscano, M. Nakano, and H. Perez, ―Multimodal biometric system using Fingerprint, in Proc. Int. Conf. Intell. Adv. Syst. 2007, pp. 145–150.DOI: 10.1109/ ICIAS.2007.4658364 [11]Yeong Gon Kim1, Kwang Yong Shin1, Eui Chul Lee2 and Kang Ryoung Park1. “Multimodal Biometric System Based on the Recognition of Face and Both Irises”. Int J Adv Robotic Sy, 2012, Vol. 9, 65:2012
www.iejrd.in
Page 7