[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Secure Personnel Authentication Based on Multi-modal Biometrics Under Ubiquitous Environments

  • Conference paper
Neural Information Processing (ICONIP 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4233))

Included in the following conference series:

  • 1384 Accesses

Abstract

In this paper, we propose a secure authentication method based on multimodal biometrics system under ubiquitous computing environments. For this, the face and signature images are acquired in PDA and then each image with user ID and name is transmitted via WLAN (Wireless LAN) to the server and finally the PDA receives authentication result from the server. In the proposed system, face recognition algorithm is designed by PCA and LDA. On the other hand, the signature verification is designed by a novel method based on grid partition, Kernel PCA and LDA. To calculate the similarity between test image and training image, we adopt the selective distance measure determined by various experiments. More specifically, Mahalanobis and Euclidian distance measures are used for face and signature, respectively. As the fusion step, decision rule by weighted sum fusion scheme effectively combines the two matching scores calculated in each biometric system. From the real-time experiments, we convinced that the proposed system makes it possible to improve the security as well as user’s convenience under ubiquitous computing environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Turk, M., Pentland, A.: Eigenfaces for Recognition. Journal of Cognitive Neuroscience 3, 72–86 (1991)

    Article  Google Scholar 

  2. Zhao, W., Krishnaswamy, A., Chellappa, R.: Discriminant Analysis of Principal Components for Face Recognition. Face Recognition from Theory to Application. Springer, Heidelberg (1998)

    Google Scholar 

  3. Kiran, G.V., Kunte, R.S.R., Saumel, S.: On-line signature verification system using probabilistic feature modeling, Signal Processing and its Applications. In: Sixth International Symposium, vol. 1, pp. 351–358 (2001)

    Google Scholar 

  4. Mingming, M.: Acoustic on-line signature verification based on multiple models, Computational Intelligence for Financial Engineering. In: Proceedings of the IEEE/IAFE/INFORMS Conference, pp. 30–33 (2000)

    Google Scholar 

  5. Kwak, K.-C., Pedrycz, W.: Face Recognition using Fuzzy Integral and Wavelet Decomposition Method. Systems, Man and Cybernetics, Part B, IEEE Trans. 34, 1666–1675 (2004)

    Article  Google Scholar 

  6. Yang, J., Chen, X., Junz, W.: A PDA-based Face Recognition System. In: Proceeding of the sixth IEEE Workshop on Application of Computer Vision, pp. 19–23 (2002)

    Google Scholar 

  7. Kim, J.B.: A Personal Identity Annotation Overlay System using a Wearable Computer for Augmented Reality. Consumer Electronics, IEEE Trans. 49, 1457–1467 (2003)

    Article  Google Scholar 

  8. Lee, D.J., Kwak, K.C., Min, J.O., Chun, M.G.: Multi-modal Biometrics System Using Face and signature. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 635–644. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Scholkopf, B., Smola, A.: Nonlinear Component Analysis as a Kernel Eigenvalue Problem. Neural Computation 10, 1299–1319 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, DJ., Kwon, MJ., Chun, MG. (2006). Secure Personnel Authentication Based on Multi-modal Biometrics Under Ubiquitous Environments. In: King, I., Wang, J., Chan, LW., Wang, D. (eds) Neural Information Processing. ICONIP 2006. Lecture Notes in Computer Science, vol 4233. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893257_12

Download citation

  • DOI: https://doi.org/10.1007/11893257_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46481-5

  • Online ISBN: 978-3-540-46482-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics