EMBEDDED MULTI-MODEL BIOMETRIC AUTHENTICATION FRAMEWORK

Authors

  • Sneha Kurhekar ENTC Department, SRCOE, Pune University Pune, Maharashtra, India
  • Prof. H. Upadhyay ENTC Department, SRCOE, Pune University Pune, Maharashtra, India
  • Prof. K. Sujatha ENTC Department, SRCOE, Pune University Pune, Maharashtra, India

Keywords:

Embedded System, Biometrics, FPGA, DTW and HMM model

Abstract

Today, biometric authentication plays vital role in the social and commercial area. This paper proposed a Securing system access using multi-model biometrics for authorization with the embedded platform. It consists of the embedded system to verify the signatures, fingerprint and key pattern for authentication of user. Proposed system works in two phases of authentication i.e enrollment phase and evaluation phase. IN enrollment phase all authentication factors are stored in data base and in evaluation phase stored one is compared with tested parameters. In proposed system HMM is implemented on android side for the signature, DTW is implemented on controller side for fingerprint and key pattern is with FPGA. Thus proposed work gives the two factor authentication biometric system with extra layer of security.

References

I. J. Li, A. Najmi, and R. Gray. “Image classification by a two dimensional hidden markov model”. IEEE Transactions on Signal Processing, 48(2):517–533, 2000.

II. N. K. Ratha, A. W. Senior, and R. M. Bolle, “Automated biometrics,” in Proc. 2nd Int. Conf. Adv. Pattern Recog., Rio de Janeiro, Brazil, pp. 445–474, , Mar. 2001.

III. Y. Komiya, T. Ohishi, and T. Matsumoto, “A pen input on line signature verifier integrating position, pressure and inclination trajectories,” IEICE Trans. Inf. Syst., vol. E84 D, no. 7, pp. 833–838, Jul. 2001.

IV. A. K. Jain, F. D. Griess, and S. D. Connell, “On-line signature verification,” Pattern Recognit., vol. 35, no. 12, pp. 2963–2972, 2002.

V. Espinosa Duro V, “Minutiae detection algorithm for fingerprint recognition”, IEEE Transactions on Aerospace and Electronic Systems, Vol. 17 , Issue.3, pp. 7 - 10 , March 2002.

VI. Y. Chen and X. Ding, “On-line signature verification using direction sequence string matching,” in Proc. SPIE 2nd Int. Conf. Image Graph., Hefei, China, , vol. 4875, pp. 744–749 Jul. 2002.

VII. M. Fuentes, S. Garcia-Salicetti, and B. Dorizzi, “On-line signature verification: Fusion of a hidden Markov model and a neural network via a support vector machine,” in Proc. 8th Int. Workshop Frontiers Handwriting Recog., Niagara-on-the-Lake, ON, Canada, pp. 253–258 Aug. 2002.

VIII. B. Bhanu, X. Tan, “Fingerprint indexing based on novel features of minutiae triplets”, IEEE Trans. Pattern Recog. Anal. Mach. Intell. 25(5), pp. 616–622, 2003.

IX. M. Diligenti, P. Frasconi, and M. Gori. Hidden tree markov models for document image classification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(4):519–523, 2003.

X. B. Fang, C. H. Leung, Y. Y. Tang,K.W. Tse, P.C.K.Kwok, andY.K. Wong, “Off-line signature verification by tracking of feature and stroke positions,” IEEE Trans. On Pattern Recognit, vol. 36, no. 1, pp. 91–101, Jan. 2003.

XI. Anil Jain, Arun Ross and Salil Prabhakar, “Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, pp. 4-20,January 2004.

XII. Chan, K.C. ; Moon, Y.S. ; Cheng, P.S. “Fast fingerprint verification using subregions of fingerprint images”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14 , Issue: 1 , pp. 95 – 101, Jan. 2004.

XIII. J. Y. Kim, D. Y. Ko, and S. Y. Na, “Implementation and enhancement of GMM face recognition systems using flatness measure,” in Proc. IEEE Int. Workshop Robot Human Interact. Commun, pp. 247–251Sep. 2004.

XIV. Dimauro, S. Impedovo, M. G. Lucchese, R. Modugno, and G. Pirlo, “Recent advancements in automatic signature verification,” in Proc. 9th Int. Workshop Frontier Handwriting Recognit, IEEE Computer. Society Press, pp. 179–184, Oct. 2004.

XV. H. Ketabdar, J. Richiardi, and A. Drygajlo, “Global feature selection for on-line signature verification,” in Proc. 12th IGS Conf., Salerno, Italy, pp. 59–63, Jun. 2005.

XVI. J. Fiérrez Aguilar, L. Nanni, J. López-Pe´nalba, J. Ortega García, and D. Maltoni, “An on-line signature verification system based on fusion of local and global information,” in Proc. IEEE Int. Conf. Audio Video-Based Person Authentication, Halmstad, Sweden, pp. 523–532, Jun. 2005.

XVII. J. Richiardi, H. Ketabdar, and A. Drygajlo, “Local and global feature selection for on-line signature verification,” in Proc. IAPR 8th ICDAR, Seoul, Korea, vol. 2, pp. 625–629, Aug. 2005.

XVIII. A. Kholmatov and B. Yanikoglu, “Identity authentication using improved online signature verification method,” Pattern Recognit. Lett., vol. 26, no. 15, pp. 2400–2408, Nov. 2005.

XIX. Putz-Leszczyska, “On-line signature verification using dynamic time warping with positional coordinates,” in Proc. SPIE Int. Soc. Opt. Eng., Wilga, Poland, vol. 6347, no. 2, pp. 634 724-1–634 724-08, Oct. 2006.

XX. Schaumont, P. ; Hwang, D. ; Shenglin Yang ; Verbauwhede, “Multilevel Design Validation in a Secure Embedded System”, IEEE Transactions on Computers, Vol. 55 , Issue. 11, pp. 1380 – 1390, Nov 2006.

XXI. T. Ahonen, A. Hadid, and M. Pietikainen, ―Face description with local binary patterns: Application to face recognition, IEEE Trans. Pattern Anal. Machine Intell., vol. 28, no. 12, pp. 2037–2041, Dec. 2006.

XXII. M. Faúndez-Zanuy, “On-line signature recognition based on VQ-DTW,” Pattern Recognit., vol. 40, no. 3, pp. 981–992, Mar. 2007.

XXIII. S. Impedovo and G. Pirlo, “Verification of handwritten signatures: An overview,” in Proc. 14th Int. Conf. Image Anal. Process. pp. 191–196, Sep. 2007.

XXIV. B. Ly Van, S. Garcia-Salicetti, and B. Dorizzi, “On using the Viterby path along with HMM likelihood information for online signature verification,” IEEE Trans. Syst., Man, Cybern. Part B: Cybern., vol. 37, no. 5, pp. 1237–1247, Oct. 2007.

XXV. J. Fierrez-Aguilar, J. Ortega-García, D. D. Ramos, and J. Gonzalez-Rodríguez, “HMM-based on-line signature verification: Feature extraction and signature modeling,” Pattern Recognit. Lett., vol. 28, no. 16, pp. 2325–2334, Dec. 2007.

XXVI. Impedovo and G. Pirlo, “Automatic signature verification: The state of the art,” IEEE Trans. Syst., Man, Cybern.—Part C: Appl. Rev., vol. 38, no. 5, pp. 609–635, Sep. 2008.

XXVII. O. Miguel-Hurtado, L. Mengibar-Pozo, and A. Pacut, “A new algorithm for signature verification system based on DTW and GMM,” in Proc. 42nd. Annu. IEEE Int. Carnahan Conf. Security Technol, pp. 206–213, Oct. 2008.

XXVIII. O. Miguel-Hurtado, L. Mengibar-Pozo, and A. Pacut, “A new algorithm for signature verification system based on DTW and GMM,” in Proc. 42nd. Annu. IEEE Int. Carnahan Conf. Security Technol., pp. 206–213, Oct. 2008.

XXIX. Gruber C, Gruber T, Krinninger S, Sick B, “Online Signature Verification With Support Vector Machines Based on LCSS Kernel Functions”, IEEE transaction on System, Man, and Cybematics, Part B: Cybemetics, Vol. 40, PP. 1088 – 1100, June 2010.

XXX. Y. Komiya, T. Ohishi, and T. Matsumoto, “A pen input on line signature verifier integrating position, pressure and inclination trajectories,” IEICE Trans. Inf. Syst., vol. E84 D, no. 7, pp. 833–838, Jul. 2010.

XXXI. D. Impedovo and G. Pirlo, “On-line signature verification by stroke-dependent representation domains,” in Proc. 12th ICFHR, Kolkata, India, pp. 623–627, Nov. 2010.

XXXII. M. Fons, F. Fons, and E. Cantó-Navarro, “Fingerprint image processing acceleration through run-time reconfiguration hardware,” IEEE Trans. Circuits Syst. II: Exp. Briefs, vol. 57, no. 12, pp. 991–995, Dec. 2010.

XXXIII. M. López-García, J. Daugman, and E. Cantó-Navarro, “Hardware-software co-design of an iris recognition algorithm,” IET Inf. Security, vol. 5, no. 1, pp. 60–68, Apr. 2011.

XXXIV. Monmasson, L. Idkhajine, M. N. Cirstea, I. Bahri, A. Tisan, and M. W. Naouar, “FPGAs in industrial control applications,” IEEE Trans. Ind. Inf., vol. 7, no. 2, pp. 224–243, May 2011.

XXXV. Nanni, L. ; Brahnam, S. ; Lumini, A.“Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system”, IEEE Electronics Letters, Vol. 47, Issue: 15 , pp. 851 – 853, July 2011.

XXXVI. M. Fons, F. Fons, E. Cantó-Navarro, and M. López-García, “FPGA based personal authentication using fingerprints,” J. Signal Process. Syst., vol. 66, no. 2, pp. 153–189, Feb. 2012.

XXXVII. S. Jin, D. Kim, T. T. Nguyen, D. Kim,M. Kim, and J. W. Jeon, “Design and implementation of a pipelined data path for high-speed face detection using FPGA,” IEEE Trans. Ind. Inf., vol. 8, no. 1, pp. 158–167, Feb. 2012.

XXXVIII. Miguel A. Ferrer, J. Francisco Vargas, Aythami Morales, and Aarón Ordóñez, ―Robustness of Offline Signature Verification Based on Gray Level Features‖. IEEE Transactions on Information Forensics and Security, Vol. 7, No. 3, June 2012.

XXXIX. M. Erbilek and M. Fairhurst, “Framework for managing ageing effects in signature biometrics,” IET Biometr., vol. 1, no. 2, pp. 136–147, Jun. 2012.

XL. Enrique Argones Rúa,, José Luis Alba Castro, M “Online Signature Verification Based on Generative Models”, IEEE Transactions on Systems, Man, and Cybernetics—Part B: Cybernetics, Vol. 42, No. 4, pp 1231 - 1242 August 2012.

XLI. J. Liu-Jiménez, R. Sánchez-Reillo, L. Mengibar-Pozo, and O. Miguel Hurtado, “Optimisation of biometric ID tokens by using hardware/software co-design,” IET Biometrics, vol. 1, no. 3, pp. 168–177, Sep. 2012.

XLII. Sheng Li ; Kot, A.C.,” Fingerprint Combination for Privacy Protection”, IEEE Transactions on Information Forensics and Security, Vol. 8, Issue: 2 , pp. 350 – 360, December 2012.

XLIII. R. Ramos-Lara, M. López-García, E. Cantó-Navarro, and L. Puente- Rodriguez, “Real-Time speaker verification system implemented on reconfigurable hardware,” J. Signal Process. Syst., vol. 71, no. 2, pp.89–103, May 2013.

XLIV. Eric Monmasson , Marcian Cirstea, “Guest Editorial Special Section on Industrial Control Applications of FPGAs” IEEE Transactions on Industrial Informatics, Vol. 9, No. 3, pp 1250-1252, August 2013.

XLV. Mariano lópez-garcía, Rafael ramos-lara, Oscar miguel-hurtado, and Enrique cantó-navarro, “Embedded system for biometric online signature verification”, IEEE Transactions on Industrial Informatics, Vol. 10, No. 1, PP 491 – 501 February 2014

Additional Files

Published

15-05-2016

How to Cite

Sneha Kurhekar, Prof. H. Upadhyay, & Prof. K. Sujatha. (2016). EMBEDDED MULTI-MODEL BIOMETRIC AUTHENTICATION FRAMEWORK. International Education and Research Journal (IERJ), 2(5). Retrieved from http://ierj.in/journal/index.php/ierj/article/view/277