Skip to main content

Developing a Multimodal Biometric Authentication System Using Soft Computing Methods

  • Protocol
  • First Online:
Artificial Neural Networks

Part of the book series: Methods in Molecular Biology ((MIMB,volume 1260))

Abstract

Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability.

This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Protocol
USD 49.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain AK, Pankanti S, Prabhakar et al (2004) Biometrics: a grand challenge. Proc 17th international conference on pattern recognition (ICPR), vol 2. pp 935–942

    Google Scholar 

  2. Anil K, Jain AK (2012) Biometric recognition: an overview. In: Mordini E, Tzovaras D (eds) Second generation biometrics: the ethical, legal and social context. The International Library of Ethics, Law and Technology, vol 11. Springer, pp 49–79

    Google Scholar 

  3. Baird SL (2002) Biometrics: security technology. The technology teacher 61(5):1, pp 8–22

    Google Scholar 

  4. Sujithra M, Padmavathi G (2012) Next generation biometric security system: an approach for mobile device security, Proc second international conference on computational science, engineering and information technology. ACM, New York, NY, USA, pp 377–381

    Google Scholar 

  5. Corcoran P, Cucos A (2005) Techniques for securing multimedia content in consumer electronic appliances using biometric signatures. IEEE Trans Consumer Elect 51:545–551

    Google Scholar 

  6. Jain AK, Ross A, Pankanti S (2006) Biometrics: a tool for information security. IEEE Trans Inf Forensics Security 1(2):125–143

    Article  Google Scholar 

  7. Jain AK, Nandakumar K, Lu X et al. (2004) Integrating faces, fingerprint, and soft biometric traits for user recognition. Proc biometric authentication workshop, LNCS 3087, Prague, pp 259–269

    Google Scholar 

  8. Hong A, Jain S, Pankanti S (1999) Can multibiometrics improve performance? Proc AutoID`99, Summit, NJ, pp 59–64

    Google Scholar 

  9. Anil J, Lin H, Sharath P (2000) Biometric identification. Commun ACM 43(2):90–98

    Google Scholar 

  10. Cappelli R, Maio D, Maltoni D et.al (2006) Performance evaluation of fingerprint verification systems. IEEE Trans Pattern Anal Mach Intell 28:3–18

    Google Scholar 

  11. Bishop C (1995) Neural networks for pattern recognition. Oxford University Press, Oxford

    Google Scholar 

  12. Ciota Z (2001) Improvement of speech processing using fuzzy logic approach. Proc of IFSA World congress and 20th NAFIPS Int Conf, 2

    Google Scholar 

  13. Bosteels RTK, Kerre EE (2007) Fuzzy audio similarity measures based on spectrum histogram and fluctuation patterns. Proc Int Conf Multimedia and Ubiquitous Engineering 2007, Seoul, Korea, 27–28 April

    Google Scholar 

  14. Malcangi M (2002) Soft-computing approach to fit a speech recognition system on a single-chip. Proc 2002 international workshop system-on-chip for real-time applications, Banff, Canada, 6–7 July

    Google Scholar 

  15. Malcangi M (2004) Improving speech endpoint detection using fuzzy logic-based methodologies. Proc thirteenth Turkish symposium on artificial intelligence and neural networks, Izmir, Turkey, pp 10–11

    Google Scholar 

  16. Wahab A, Ng GS, Dickiyanto R (2005) Speaker authentication system using soft computing approaches. Neurocomputing 68:13–17

    Article  Google Scholar 

  17. Kar B, Kartik B, Dutta PK (2006) Speech and face biometric for person authentication. Proc IEEE international conference on industrial technology, India, pp 391–396

    Google Scholar 

  18. Jang-Hee Y, Jong-Gook K et al (2007) Design of embedded multimodal biometric systems. Proc of the int conf on signal image technologies and internet based systems, SITIS 2007:1058–1062

    Google Scholar 

  19. Jain AK, Dass SC, Nandakumar K (2004) Soft biometric traits for personal recognition systems. Proc international conf on biometric authentication, LNCS, vol 3072. Hong Kong, pp 731–738

    Google Scholar 

  20. Pak-Sum Hui H, Meng HM, Mak M (2007) Adaptive weight estimation in multi-biometric verification using fuzzy logic decision fusion. Proc IEEE international conference on acoustic, speech, and signal processing ICASSP’07, vol 1. pp 501–504

    Google Scholar 

  21. Runkler TA (1997) Selection of appropriate defuzzification methods using application specific properties. IEEE Trans Fuzzy Sys 5:72–79

    Article  Google Scholar 

  22. Abiyev RH, Altunkaya K (2007) “Neural network based biometric personal identification”, Frontiers in the Convergence of Bioscience and Information Technologies. pp 682–687

    Google Scholar 

  23. O’Shaugnessy D (1987) Speech communication—human and machine. Addison-Wesley, Reading, MA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mario Malcangi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this protocol

Cite this protocol

Malcangi, M. (2015). Developing a Multimodal Biometric Authentication System Using Soft Computing Methods. In: Cartwright, H. (eds) Artificial Neural Networks. Methods in Molecular Biology, vol 1260. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2239-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-2239-0_13

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-2238-3

  • Online ISBN: 978-1-4939-2239-0

  • eBook Packages: Springer Protocols

Publish with us

Policies and ethics