Advertisement

Secure Personnel Authentication Based on Multi-modal Biometrics Under Ubiquitous Environments

  • Dae-Jong Lee
  • Man-Jun Kwon
  • Myung-Geun Chun
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4233)

Abstract

In this paper, we propose a secure authentication method based on multimodal biometrics system under ubiquitous computing environments. For this, the face and signature images are acquired in PDA and then each image with user ID and name is transmitted via WLAN (Wireless LAN) to the server and finally the PDA receives authentication result from the server. In the proposed system, face recognition algorithm is designed by PCA and LDA. On the other hand, the signature verification is designed by a novel method based on grid partition, Kernel PCA and LDA. To calculate the similarity between test image and training image, we adopt the selective distance measure determined by various experiments. More specifically, Mahalanobis and Euclidian distance measures are used for face and signature, respectively. As the fusion step, decision rule by weighted sum fusion scheme effectively combines the two matching scores calculated in each biometric system. From the real-time experiments, we convinced that the proposed system makes it possible to improve the security as well as user’s convenience under ubiquitous computing environments.

Keywords

Face Recognition Face Image Fusion Scheme Biometric System Signature Verification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Turk, M., Pentland, A.: Eigenfaces for Recognition. Journal of Cognitive Neuroscience 3, 72–86 (1991)CrossRefGoogle Scholar
  2. 2.
    Zhao, W., Krishnaswamy, A., Chellappa, R.: Discriminant Analysis of Principal Components for Face Recognition. Face Recognition from Theory to Application. Springer, Heidelberg (1998)Google Scholar
  3. 3.
    Kiran, G.V., Kunte, R.S.R., Saumel, S.: On-line signature verification system using probabilistic feature modeling, Signal Processing and its Applications. In: Sixth International Symposium, vol. 1, pp. 351–358 (2001)Google Scholar
  4. 4.
    Mingming, M.: Acoustic on-line signature verification based on multiple models, Computational Intelligence for Financial Engineering. In: Proceedings of the IEEE/IAFE/INFORMS Conference, pp. 30–33 (2000)Google Scholar
  5. 5.
    Kwak, K.-C., Pedrycz, W.: Face Recognition using Fuzzy Integral and Wavelet Decomposition Method. Systems, Man and Cybernetics, Part B, IEEE Trans. 34, 1666–1675 (2004)CrossRefGoogle Scholar
  6. 6.
    Yang, J., Chen, X., Junz, W.: A PDA-based Face Recognition System. In: Proceeding of the sixth IEEE Workshop on Application of Computer Vision, pp. 19–23 (2002)Google Scholar
  7. 7.
    Kim, J.B.: A Personal Identity Annotation Overlay System using a Wearable Computer for Augmented Reality. Consumer Electronics, IEEE Trans. 49, 1457–1467 (2003)CrossRefGoogle Scholar
  8. 8.
    Lee, D.J., Kwak, K.C., Min, J.O., Chun, M.G.: Multi-modal Biometrics System Using Face and signature. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 635–644. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Scholkopf, B., Smola, A.: Nonlinear Component Analysis as a Kernel Eigenvalue Problem. Neural Computation 10, 1299–1319 (1998)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Dae-Jong Lee
    • 1
  • Man-Jun Kwon
    • 1
  • Myung-Geun Chun
    • 1
  1. 1.Dept. of Electrical and Computer EngineeringChungbuk National UniversityCheongjuKorea

Personalised recommendations