IRIS-FACE FUSION AND SECURITY ANALYSIS BASED ON FISHER DISCRIMINANT

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

2
Reader(s)
4
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 8 , ISSUE 1 (March 2015) > List of articles

IRIS-FACE FUSION AND SECURITY ANALYSIS BASED ON FISHER DISCRIMINANT

Qihui Wang / Bo Zhu / Yo Liu / Lijun Xie / Yao Zheng

Keywords : iris feature, face feature, fisher discriminant analysis, fusion.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 8, Issue 1, Pages 387-407, DOI: https://doi.org/10.21307/ijssis-2017-764

License : (CC BY-NC-ND 4.0)

Received Date : 02-November-2014 / Accepted: 17-January-2015 / Published Online: 01-March-2015

ARTICLE

ABSTRACT

With the development of society and science technology, the information security becomes more and more important for people and nation. In this paper, we focus on the technology of iris-face fusion in multi-mode sense in order to find an algorithm to get a better recognition performance. Firstly, we introduce the feature extraction of iris and face, and fusion the features using different algorithms. By simulation, we find out the recognition performance with different fusion methods, which provide some new conclusions. In order to improve the performance of recognition system, we classify these features with fisher discriminant analysis again. Then we analyze the security of
recognition system from the aspect of influence of leak in biology features. Finally, experiments were designed to demonstrate the effectiveness of the proposed algorithms.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] M. Siponen, S. Pahnila, M. A. Mahmood. “Compliance with Information Security Policies:
An Empirical Investigation,” Computer, 2010, 64 – 71, doi: 10.1109/MC.2010.35.
[2] F. Farahmand, M. J. Atallah, and E. H. Spafford. “Incentive Alignment and Risk Perception:
An Information Security Application,” IEEE Transactions on Engineering Management, 2013,
60(2): 238 – 246, doi: 10.1109/TEM.2012.2185801.
[3] M. Dejun, H. Wei, M. Baolei, and M. Bo. “A bottom-up approach to verifiable embedded
system information flow security,” IET Information Security, 2014: 12 – 17, doi: 10.1049/ietifs.
2012.0342.
[4] Achieving a hands-free computer interface using voice recognition and speech synthesis,”
IEEE Aerospace and Electronic Systems Magazine, 2000, 15(1): 14 – 16, doi:
10.1109/62.821658.
[5] D. Zhang, L. Feng, Z. Qijun, L. Guangming, and L. Nan. “Selecting a Reference High
Resolution for Fingerprint Recognition Using Minutiae and Pores,” IEEE Transactions on
Instrumentation, 2010, 60(3): 863 – 871, doi: 10.1109/TIM.2010.2062610.
[6] Z. Wei Zhou, H. Jiankun Hu, I. Petersen, W. Song, and M. Bennamoun. “Performance
evaluation of 2D to 3D fingerprint recognition”, 2013 6th International Congress on Image
and Signal Processing, 2013: 1736 – 1741, doi: 10.1109/CISP.2013.6743956.
[7] A. Mori, H. Takano, and K. Nakamura. “Rotation immunity characteristics of non-contact
fingerprint recognition using local luminance variation”, 2012 Proceedings of SICE Annual
Conference (SICE), 2012, 1791 – 1794.
[8] A. K. Jain, B. Klare, and P. Unsang. “Face recognition: Some challenges in forensics,” 2011
IEEE International Conference on Automatic Face & Gesture Recognition and Workshops
(FG 2011), 2011, 726 – 733, doi: 10.1109/FG.2011.5771338.
[9] B. F. Klare, M. J. Burge, J.C. Klontz, R. W. Vorder, and A. K. Jain. “Face Recognition
Performance: Role of Demographic Information”, IEEE Transactions on Information
Forensics and Security, 2012, 7(6): 1789 – 1801, doi: 10.1109/TIFS.2012.2214212.
[10] H. S. Yavuz, H. Cevikalp, and R. Edizkan. “Automatic face recognition from frontal
images,” 2013 21st Signal Processing and Communications Applications Conference (SIU),
2013: 1 – 4: doi: 10.1109/SIU.2013.6531215.
[11] L. Zhonghua. “A novel iris recognition method based on the natural-open eyes,” 2010
IEEE 10th International Conference on Signal Processing (ICSP), 2010: 1090 – 1093, doi:
10.1109/ICOSP.2010.5655882.
[12] T. Chun-Wei and A. Kumar. “Accurate Iris Recognition at a Distance Using Stabilized
Iris Encoding and Zernike Moments Phase Features”, IEEE Transactions on Image
Processing, 2014, 23(9): 3962 – 3974, doi: 10.1109/TIP.2014.2337714.
[13] P. Thumwarin, N. Chitanont, and T. Matsuura. “Iris recognition based on dynamic radius
matching of iris image”, 2012 9th International Conference on Electrical
Engineering/Electronics, Computer, Telecommunications and Information Technology
(ECTI-CON), 2012: 1 – 4, doi: 10.1109/ECTICon.2012.6254351.
[14] A. Ross, and A. K. Jain. “Multimodal Biometric: an overview,” Proceedings of 12th
European Signal Processing Conference, 2004, 1221 – 1224.
[15] W. Zhifang, W. Erfu, W. Shuangshuang, and D. Qun. “Multimodal Biometric System
Using Face-Iris Fusion Feature,” Journal of Computational Physics, 2011, 6(5): 931 – 938.
[16] W. Zhifafng, Q. Han, and B. Christoph. “A Novel Iris Location Algorithm,” International
Journal of Pattern Recognition and Artificial Intelligence, 2009, 23(1): 59 – 70.
[17] M. Li, T. Tieniu, W. Yunhong, and Z. Dexin. “Personal Identification Based on Iris
Texture Analysis,” IEEE Transaction on Pattern Analysis and Machine Interlligence, 2003,
25(12): 1519 – 1533, doi: 10.1109/TPAMI.2003.1251145.
[18] J. Daugman. “High Confidence Recognition of Persons by Iris Patterns,” 2011 IEEE 35th
International Carnahan Conference on Security Technology, 2001, 10, 254 – 263.
[19] J. Daugman. “High Confidence Visual Recognition of Persons by a Test of Statistical
Independence,” IEEE Transaction on Pattern Analysis and Machine Intelligence, 1993,
15(11): 1148 – 1161, doi: 10.1109/34.244676.
[20] R. P. Wildes. “Iris Recognition: An Emerging Biometric Technology,” Proceeding of the
IEEE, 1997, 85(9): 1348 – 1363, doi: 10.1109/5.628669.
[21] ISO/IEC 19795-1: 2006 Information Technology Biometric Performance Testing and
Reporting – Pan 1: Principles and Framework,
http://www.iso.org/iso/catalogue_detail.htm?csnumber=41447
[22] Y. He, L. Zhao, and C. Zou. “Face Recognition Using Common Faces Method,” Pattern
Recognition Letters, 2006, 39(11): 2218 – 2222.
[23] SYRIS Technology Corp. Technical Document About FAR, FRR, and EER Version 1.0,
2004, 1 – 4.
[24] T. F. Karim, M. S. H. Rahman, and M. L. Sultana. “Face Recognition Using PCA-based
Method,” 2010 IEEE International Conference on Advanced Management Science (ICAMS),
2010: 158 – 162, doi: 10.1109/ICAMS.2010.5553266.
[25] Yongqing Wang and Xiling Liu, Face recognition based on improved support vector
clustering, International Journal on Smart Sensing and Intelligent Systems, vol. 7, no.4, pp.
1807 – 1829, 2014.
[26] Yang Yongjin, Zhou Xinmei and Xiang Zhongfan,research of image pre-processing
algorithm based on fpga, International Journal on Smart Sensing and Intelligent Systems, vol
6, no.4, pp.1499 – 1515, 2013.

EXTRA FILES

COMMENTS