全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Reduction of False Rejection in an Authentication System by Fingerprint with Deep Neural Networks

DOI: 10.4236/jsea.2020.131001, PP. 1-13

Keywords: Authentication, Fingerprint, False Rejection, Neural Networks, Pattern Recognition, Deep Learning

Full-Text   Cite this paper   Add to My Lib

Abstract:

Faultless authentication of individuals by fingerprints results in high false rejections rate for rigorously built systems. Indeed, the authors prefer that the system erroneously reject a pattern when it does not meet a number of predetermined correspondence criteria. In this work, after discussing existing techniques, we propose a new algorithm to reduce the false rejection rate during the authentication-using fingerprint. This algorithm extracts the minutiae of the fingerprint with their relative orientations and classifies them according to the different classes already established; then, make the correspondence between two templates by simple probabilities calculations from a deep neural network. The merging of these operations provides very promising results both on the NIST4 international data reference and on the SOCFing database.

References

[1]  Jiang, J. (1998) Image Compression with Neural Networks: A Survey. Signal Processing: Image Communication, 14, 737-760.
https://doi.org/10.1016/S0923-5965(98)00041-1
[2]  Kouamo, S. and Tangha, C. (2012) Handwritten Character Recognition with Artificial Neural Network. In: Distributed Computing and Artificial Intelligence, Advances in Intelligent and Soft Computing, Vol. 151, Springer Verlag, Berlin, 535-543.
https://doi.org/10.1007/978-3-642-28765-7_64
[3]  Kouamo, S. and Tangha, C. (2016) Fingerprint Recognition with Artificial Neural Networks: Application to E-Learning. Journal of Intelligent Learning Systems and Applications, 8, 39-49.
[4]  Viger, F.P., Nandar, K.W., Li, K. and Chen, J. (2019) Fingerprint Classification and Identification Algorithms for Criminal Investigation: A Survey. Future Generation Computer Systems.
[5]  Rupali, S.P., Sonali, D.P. and Sudeep, D.T. (2018) Performance Evaluation of Fingerprint Trait Authentication System. Advances in Intelligent Systems and Computing, Vol. 632, Springer-Verlag, Berlin, 143-151.
https://doi.org/10.1007/978-981-10-5520-1_14
[6]  Watson, C.I. and Wilson, C.L. (1992) NIST Special Database 4 Fingerprint Database. National Institute of Standards, Technology, Advanced Systems Division, Image Recognition Group.
[7]  LeCun, Y., Chopra, S., Hadsell, R., Marc’Aurelio, R. and Huang, F. (2006) A Tutorial on Energy-Based Learning. In: Bakir, G., Hofman, T., Schlkopf, B., Smola, A. and Taskar, B., Eds., Predicting Structured Data, MIT Press, Cambridge, 10-21.
[8]  Maio, D. and Maltoni, D. (1998) Neural Network Based Minutiae Filtering in Fingerprints.
[9]  LeCun, Y., Bengio, Y. and Hinton, G. (2015) Deep Learning. Nature, 521, 436-444.
https://doi.org/10.1038/nature14539
[10]  Bengio, Y. and Delalleau, O. (2011) Shallow vs. Deep Sum-Product Networks. Neural Information Processing Systems, Sierra Nevada, 16-17 December 2011, 1.
https://doi.org/10.1007/978-3-642-24477-3_1
[11]  Capelli, R., Lumini, A., Maio, D. and Maltoni, D. (2002) Synthetic Fingerprint-Database Generation. Proceeding of the 16th International Conference on Pattern Recognition, Quebec City, August 2002, Vol. 3, 744-747.
[12]  International Biometric Group (2011) The Henry Classification.
http://www.biometricgroup.com
[13]  Kouamo, S. and Tangha, C. (2013) Images Compression with Artificial Neural Network. Advances in Intelligent and Systems and Computing, Vol. 189, Springer Verlag, Berlin, 515-524.
https://doi.org/10.1007/978-3-642-33018-6_53
[14]  Kouamo, O. and Gouy-Pailler, C. (2013) Multi-Scale Test Procedure for Non-Stationarity in Short and Long Memory Time Series. IEEE, ICASSP, Vancouver, 26-30 May 2013, 5368-5372.
https://doi.org/10.1109/ICASSP.2013.6638688
[15]  Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S. (2003) Handbook of Fingerprint Recognition. Springer, New York.
[16]  Baldi, P. and Chauvin, Y. (1993) Neural Networks for Fingerprint Recognition. Neural Computation, 5, 402-418.
https://doi.org/10.1162/neco.1993.5.3.402
[17]  Specht, D.F. (1990) Probabilistic Neural Networks. Neural Networks, 3, 109-118.
https://doi.org/10.1016/0893-6080(90)90049-Q
[18]  Thomas, T.J. (2000) Locally-Connected Neural Network for Fingerprint Recognition. Proceedings of the IASTED International Conference, Intelligent Systems and Control, Honolulu, 2000, 431-441.
[19]  Qian, Y., Dong, J., Wang, W. and Tan, T. (2015) Deep Learning for Steganalysis via Convolutional Neural Networks. Media Watermarking, Security, and Forensics, Vol. 9409, 1-10.
https://doi.org/10.1117/12.2083479
[20]  Jagtap, V.N. and Mishra, S.K. (2014) Fast Efficient Artificial Neural Network for Handwritten Digit Recognition. International Journal of Computer Science and Information Technologies, 5, 2302-2306.
[21]  Yunsick, S. (2016) Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators. Entropy, 18, 366.
https://doi.org/10.3390/e18100366
[22]  Galton, F. (1892) Fingerprint. McMillan, London.
[23]  Simo, J.C. and Tarnow, N. (1994) A New Energy and Momentum Conserving Algorithm for the Non-Linear Dynamics of Shells. International Journal for Numerical Methods in Engineering, 37, 2527-2549.
https://doi.org/10.1002/nme.1620371503
[24]  Skeel, R.D. (1998) Integration Schemes for Molecular Dynamics and Related Applications. Department of Computer Science (and Beckman Institute), University of Illinois, Urbana.
[25]  Yoshida, H. (2001) Non-Existence of the Modified First Integral by Symplectic Integration Methods. Physics Letters A, 282, 276-283.
https://doi.org/10.1016/S0375-9601(01)00186-4
[26]  Hamayun, A.K. (2017) Feature Fusion and Classifier Ensemble Technique for Robust Face Recognition. Signal Processing: An International Journal, 11, 1-15.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133