A New Approach to Predicting Physical Biometrics from Behavioural Biometrics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
A New Approach to Predicting Physical Biometrics from Behavioural Biometrics

Authors: Raid R. O. Al-Nima, S. S. Dlay, W. L. Woo

Abstract:

A relationship between face and signature biometrics is established in this paper. A new approach is developed to predict faces from signatures by using artificial intelligence. A multilayer perceptron (MLP) neural network is used to generate face details from features extracted from signatures, here face is the physical biometric and signatures is the behavioural biometric. The new method establishes a relationship between the two biometrics and regenerates a visible face image from the signature features. Furthermore, the performance efficiencies of our new technique are demonstrated in terms of minimum error rates compared to published work.

Keywords: Behavioural biometric, Face biometric, Neural network, Physical biometric, Signature biometric.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1096924

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1640

References:


[1] S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: security and privacy concerns," Security & Privacy, IEEE, vol. 1, pp. 33- 42, 2003.
[2] Z. e. ˇR´ıha and V. a. M. a. s. Jr., "Biometric Authentication Systems," November 2000.
[3] F. Al-Harby, R. Qahwaji, and M. Kamala, "The Effects of Gender Differences in the Acceptance of Biometrics Authentication Systems within Online Transaction," in CyberWorlds, 2009. CW '09. International Conference on, 2009, pp. 203-210.
[4] V. Conti, S. Vitabile, and F. Sorbello, "Fingerprint Traits and RSA Algorithm Fusion Technique," in Complex, Intelligent and Software Intensive Systems (CISIS), 2012 Sixth International Conference on, 2012, pp. 351-356.
[5] J. Daugman, "How iris recognition works," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 14, pp. 21-30, 2004.
[6] K. Ito, A. Morita, T. Aoki, T. Higuchi, H. Nakajima, and K. Kobayashi, "A fingerprint recognition algorithm using phase-based image matching for low-quality fingerprints," in Image Processing, 2005. ICIP 2005. IEEE International Conference on, 2005, pp. II-33-6.
[7] M. G. Ullah, B. S. Chowdhary, S. Latif, A. Q. Rajput, and J. Ahmed, "Pattern Matching Algorithm using Polar Spectrum in Retina Recognition for Human Identification System," Australian Journal of Basic and Applied Sciences, vol. 5(10): 1385-1392, 2011.
[8] A. Hamadene, Y. Chibani, and H. Nemmour, "Off-Line Handwritten Signature Verification Using Contourlet Transform and Co-occurrence Matrix," in Frontiers in Handwriting Recognition (ICFHR), 2012 International Conference on, 2012, pp. 343-347.
[9] C. F. Huang, P. W. Peng, C. M. Cheng, J. S. Tsai, W. T. Wang, C. T. Hsu, et al., "Direct Visualization of DNA Recognition by Restriction Endonuclease EcoRI," Journal of Experimental & Clinical Medicine, 2013.
[10] J. Pylkkönen, "Towards Efficient and Robust Automatic Speech Recognition: Decoding Techniques and Discriminative Training," A doctoral dissertation of Science in Technology, School of Science Department of Information and Computer Science, Aalto University, 2013.
[11] R. M. Mutelo, and W. L. Woo, “Two Dimensional Fisher Discriminant for Small Sample Size Face Biometric Recognition”, Mediterranean Journal of Computers and Networks, vol. 2, no. 4, pp. 174-184, 2006.
[12] M. A. Dabbah, W. L. Woo, and S. S. Dlay, "Appearance-Based Biometric Recognition: Secure Authentication and Cancellability,” in Proc. of 15th Int. Conf. on Digital Signal Processing, Cardiff, United Kingdom, 1-4 July 2007, pp. 479-482.
[13] R. M. Mutelo, W. L. Woo, and S. S. Dlay, "Two Dimensional Orthogonal Wavelet Features for Image Representation and Recognition,” in Proc. of 15th Int. Conf. on Digital Signal Processing, Cardiff, United Kingdom, 1-4 July 2007, pp. 256-259.
[14] M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Image-Based Facial Recognition in the Domain of High-Order Polynomial One-Way Mapping”, IET Image Processing, vol. 2, no. 3, pp. 139-149, June 2008.
[15] R. M. Mutelo, W. L. Woo, and S. S. Dlay, “A New Discriminant Analysis of the Two Dimensional Gabor Features for Face Recognition”, IET Computer Vision, vol. 2, no. 2, pp. 37-49, June 2008.
[16] M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Secure Face Biometric Verification in the Randomized Radon Space”, in Proc. of IEEE Int. Conf. on Multimedia and Expo (ICME), Hannover, Germany, 23-26 June 2008.
[17] A. A. M. AL-Shiha, W. L. Woo, and S. S. Dlay, "Multi-linear neighborhood preserving projection for face recognition," Pattern Recognition, vol. 47, pp. 544–555, 2014.
[18] S. Sağiroğlu and N. Özkaya, "An Intelligent and Automatic Eye Generation System from Only Fingerprints," in In Proceedings of Information Security and Cryptology Conference with International Participation, Ankara, Turkey: METU Culture and Convention Center, 2008.
[19] S. Sağiroğlu and N. Özkaya, "An intelligent face features generation system from fingerprints," Turk J Elec Eng & Comp Sci, vol. Vol.17, No.2, 2009.
[20] S. Sagiroglu and N. Ozkaya, "Artificial neural network based automatic face parts prediction system from only fingerprints," in Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, 2009. CIB 2009. IEEE Workshop on, 2009, pp. 77-83.
[21] N. Özkaya and S. Sağiroğlu, "Generating One Biometric Feature from Another: Faces from Fingerprints," Sensors, 10(5), 4206-4237, 2010.
[22] I. Barbantan and R. Potolea, "Enhancements on a signature recognition problem," in Intelligent Computer Communication and Processing (ICCP), 2010 IEEE International Conference on, 2010, pp. 141-147.
[23] J. Galbally, J. Fierrez, M. Martinez-Diaz, and J. Ortega-Garcia, "Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples," in Document Analysis and Recognition, 2009. ICDAR '09. 10th International Conference on, 2009, pp. 131-135.
[24] Online Available: http://biometrics.idealtest.org/
[25] J. Galbally, R. Plamondon, J. Fierrez, and J. Ortega-Garcia, "Synthetic on-line signature generation. Part I: Methodology and algorithms," Pattern Recognition, 2012.
[26] J. Galbally, J. Fierrez, J. Ortega-Garcia, and R. Plamondon, "Synthetic on-line signature generation. Part II: Experimental validation," Pattern Recognition, 2012.
[27] R. Singh and H. Om, "An overview of face recognition in an unconstrained environment," in Image Information Processing (ICIIP), 2013 IEEE Second International Conference on, 2013, pp. 672-677.
[28] L. Fausett, Fundamental of Neural Networks, Architectures, Algorithms and Applications: Printice Hall Int. Snc. , 1994.
[29] J. Li, G. Yin, and G. Zhang, "Evaluation of tobacco mixing uniformity based on chemical composition," in Control Conference (CCC), 2012 31st Chinese, 2012, pp. 7552-7555.
[30] M. H. Beale, M. T. Hagan, and H. B. Demuth, MATLAB, Neural Network Toolbox™ Getting Started Guide, R2014a.
[31] M. F. Moller, "A scaled conjugate gradient algorithm for fast supervised learning," Neural Networks, vol. 6, pp. 525-533, 1993.