MATCH SCORE FUSION OF FINGERPRINT AND FACE BIOMETRICS FOR VERIFICATION
DOI:
https://doi.org/10.11113/jt.v77.6495Keywords:
Multimodal biometric fusion, match score fusion, verification, face, fingerprint, BSSR1Abstract
In recent years, attacks on password databases have been carried out at an increasing rate, with significant success. Thus, a new approach is needed to prove one's claim to identity instead of relying on a password. In this paper, we investigate the use of biometric match scores for the purpose of verification. Our work was performed using the BSSR1 multimodal match score biometric dataset, which contains match scores from face and fingerprint biometric systems. We investigated the use of match scores as a feature vector, and performed Simple Sum and Product Rule fusion of match scores. The results we obtained demonstrated that the use of match scores for verification purposes can be achieved to give a result that is highly accurate.
References
S. Murphy Kelly. 2015. Uber Passwords from Hacked Accounts Reportedly Selling Online for $1. Mashable, 30-Mar-2015. [Online]. Available: http://mashable.com/2015/03/29/hacked-uber-passwords-selling/. [Accessed: 27-Apr-2015].
K. Ellison. 2015. Toys ‘R’ Us Resets User Passwords Following Stolen Rewards. Welivesecurity, 03-Mar-2015. [Online]. Available: http://www.welivesecurity.com/2015/03/03/toys-r-us-resets-account-passwords-counter-stolen-reward-points/. [Accessed: 27-Apr-2015].
T. For-Brewster. 2015. Amazon’s Twitch Hacked, Caves to Angry User Demands for Less Secure Passwords - Forbes. Forbes, 24-Mar-2015. [Online]. Available: http://www.forbes.com/sites/thomasbrewster/2015/03/24/amazon-twitch-hacked-passwords-nabbed/. [Accessed: 27-Apr-2015].
J. Condliffe. 2015. The 25 Most Popular Passwords of 2014: We’re All Doomed. Gizmodo, 20-Jan-2015. [Online]. Available: http://gizmodo.com/the-25-most-popular-passwords-of-2014-were-all-doomed-1680596951. [Accessed: 27-Apr-2015].
L. Rehmann. 2015. Search Mark Burnett’s 10 Million Usernames/Passwords. rehmann.co, 2015. [Online]. Available: https://rehmann.co/projects/10mil/. [Accessed: 27-Apr-2015].
Z. Epstein. 2015. 10 Million Passwords Leaked: How to check if yours is one of them | BGR. BGR, 12-Feb-2015. [Online]. Available: http://bgr.com/2015/02/12/10-million-passwords-leaked-hack-check/. [Accessed: 27-Apr-2015].
S. Alliance. 2011. Smart Cards and Biometrics. Available www Smartcardalliance Org.
C. Kang. 2014. Consumer Electronics Show Will Highlight New Ways to Collect Biometric Data-The Washington Post. The Washington Post, 05-Jan-2014. [Online]. Available: http://www.washingtonpost.com/business/technology/consumer-electronics-show-will-highlight-new-ways-to-collect-biometric-data/2014/01/05/e8eac584-74c4-11e3-8def-a33011492df2_story.html. [Accessed: 27-Apr-2015].
U. Uludag and A. K. Jain. 2004. Attacks on Biometric Systems: A Case Study in Fingerprints. In Electronic Imaging 2004. 622-633.
A. Obied. 2009. How to Attack Biometric Systems in Your Spare Time. Non Refereed Pap.
C. Rathgeb and A. Uhl. 2011. Statistical Attack Against Iris-Biometric Fuzzy Commitment Schemes. In 2011 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 23-30.
R. Lemos. 2015. Fake Fingerprint Fools iPhone 6 Touch ID | Ars Technica. arstechnica, 25-Sep-2014. [Online]. Available: http://arstechnica.com/security/2014/09/25/fake-fingerprint-fools-iphone-6-touch-id-why-its-not-so-serious/. [Accessed: 27-Apr-2015].
C. Chapman. 1993. Alphonse M. Bertillon: His Life and the Science of Fingerprints. J. Forensic Identif. 43(6): 585-602.
A. K. Jain, P. Flynn, and A. Ross. 2008. Handbook of Biometrics. Boston, MA: Springer Science Business Media, LLC.
J. D. Woodward. 1997. Biometrics: Privacy’s Foe or Privacy’s Friend? Proc. IEEE. 85(9): 1480-1492.
A. K. Jain. 1999. Biometrics: Personal Identification in Networked Society. Boston: Kluwer.
S. Prabhakar, S. Pankanti, and A. K. Jain. 2003. Biometric Recognition: Security and Privacy Concerns. IEEE Secur. Priv. 2: 33-42.
A. Ross and A. Jain. 2003. Information Fusion in Biometrics. Pattern Recognit. Lett. 24(13): 2115-2125.
P. J. Phillips, A. Martin, C. L. Wilson, and M. Przybocki. 2000. An Introduction Evaluating Biometric Systems. Computer. 33(2): 56-63.
V. C. Subbarayudu and M. V. N. K. Prasad. 2008. Multimodal Biometric System. In First International Conference on Emerging Trends in Engineering and Technology, 2008. ICETET ’08. 635-640.
L. Hong, A. K. Jain, and S. Pankanti. 1999. Can Multi-biometrics Improve Performance. In Proc. 1999 IEEE Workshop on Automatic Identification Advanced Technologies (WAIAT-99), Morristown NJ. 59-64.
C. C. Ho and C. Eswaran. 2011. Consodilation of Fingerprint Databases: A Malaysian Case Study. In In the Proceedings of the 2011 11th International Conference on Hybrid Intelligent Systems (HIS). 455-462.
K. Pearson. 2011. The Life, Letters and Labours of Francis Galton. Cambridge University Press.
Y. Chen and A. K. Jain. 2009. Beyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features. In Advances in Biometrics, vol. 5558, M. Tistarelli and M. S. Nixon, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg. 523-533.
R. Chellappa, C. L. Wilson, and S. Sirohey. 1995. Human and Machine Recognition of Faces: A Survey. Proc. IEEE. 83(5): 705-741.
A. K. Jain and A. Ross. 2004. Multibiometric Systems. Commun. ACM. 47: 34.
Y. M. Lui, D. Bolme, P. J. Phillips, J. R. Beveridge, and B. A. Draper. 2012. Preliminary Studies on the Good, the Bad, and the Ugly Face Recognition Challenge Problem. In 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 9-16.
A. K. Jain, L. Hong, and Y. Kulkarni. 1999. A Multimodal Biometric System Using Fingerprint, Face and Speech. In Proceedings of 2nd Int’l Conference on Audio-and Video-based Biometric Person Authentication, Washington DC, 182-187.
A. K. Jain, A. Ross, and S. Prabhakar. 2004. An Introduction to Biometric Recognition. IEEE Trans. Circuits Syst. Video Technol. 14: 4-20.
L. C. Jain, U. Halici, I. Hayashi, S. Lee, and S. Tsutsui. 1999. Intelligent Biometric Techniques in Fingerprint and Face Recognition. Vol. 10. CRC Press.
L. Hong and A. Jain. 1998. Integrating Faces and Fingerprints for Personal Identification. Pattern Anal. Mach. Intell. IEEE Trans. On. 20(12): 1295-1307.
C. C. Ho and C. Eswaran. 2013. Consolidation of Fingerprint Databases: Challenges and Solutions in the Malaysian context. Int. J. Comput. Inf. Syst. Ind. Manag. Appl. 5: 373-382.
M. Gomez-Barrero and J. Fierrez. 2015. “ATVS-Biometric Recognition Group » Databases. [Online]. Available: http://atvs.ii.uam.es/databases.jsp. [Accessed: 27-Jun-2015].
J. Galbally, S. Marcel, and J. Fierrez. 2014. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition. IEEE Trans. Image Process. 23(2): 710-724.
N. Mohamad, M. I. Ahmad, R. Ngadiran, M. Z. Ilyas, M. N. M. Isa, and P. Saad. 2014. Investigation of Information Fusion in Face and Palmprint Multimodal Biometrics. In 2014 2nd International Conference on Electronic Design (ICED). 347-350.
K. Gunasekaran, S. A. Priya, D. Saravanan, and P. Akilan. 2014. Privacy Preserving Multimodal Biometrics in Online Passport Recognition. Biom. Bioinforma. 6(3): 94-98.
S. Wang, C. Chen, W. Yang, and J. Hu. 2015. Mutual Dependency of Features in Multimodal Biometric Systems. Electron. Lett. 51(3): 234–235.
A. Jain, K. Nandakumar, and A. Ross. 2005. Score Normalization in Multimodal Biometric Systems. Pattern Recognit. 38(12): 2270-2285.
A. Ross. 2005. Multimodal Biometrics: Human Recognition Systems. New York, London: Springe.
A. Gyaourova, G. Bebis, and I. Pavlidis. 2004. Fusion of Infrared and Visible Images for Face Recognition. In Computer Vision-ECCV 2004, vol. 3024, T. Pajdla and J. Matas, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg. 456-468.
K. Nandakumar, Yi Chen, S. C. Dass, and A. K. Jain. 2008. Likelihood Ratio-Based Biometric Score Fusion. IEEE Trans. Pattern Anal. Mach. Intell. 30: 342-347.
NIST. 2015. NIST Biometric Scores Set. 2006. [Online]. Available: http://www.nist.gov/itl/iad/ig/biometricscores.cfm. [Accessed: 10-May-2015].
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. 2009. The WEKA data mining software. ACM SIGKDD Explor. Newsl. 11(1): 10.
Downloads
Published
Issue
Section
License
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.