Open Access   Article Go Back

Feature Selection using DWT+SVD for Fusion Based Multi model Authentication

Alapati Kavitha1 , M.V Rama Krishna2 , N. Venkata Ramana Gupta3 , PESN Krishna Prasad4

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 573-577, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.573577

Online published on Jul 31, 2018

Copyright © Alapati Kavitha, M.V Rama Krishna,N. Venkata Ramana Gupta, PESN Krishna Prasad . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Alapati Kavitha, M.V Rama Krishna,N. Venkata Ramana Gupta, PESN Krishna Prasad, “Feature Selection using DWT+SVD for Fusion Based Multi model Authentication,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.573-577, 2018.

MLA Style Citation: Alapati Kavitha, M.V Rama Krishna,N. Venkata Ramana Gupta, PESN Krishna Prasad "Feature Selection using DWT+SVD for Fusion Based Multi model Authentication." International Journal of Computer Sciences and Engineering 6.7 (2018): 573-577.

APA Style Citation: Alapati Kavitha, M.V Rama Krishna,N. Venkata Ramana Gupta, PESN Krishna Prasad, (2018). Feature Selection using DWT+SVD for Fusion Based Multi model Authentication. International Journal of Computer Sciences and Engineering, 6(7), 573-577.

BibTex Style Citation:
@article{Kavitha_2018,
author = {Alapati Kavitha, M.V Rama Krishna,N. Venkata Ramana Gupta, PESN Krishna Prasad},
title = {Feature Selection using DWT+SVD for Fusion Based Multi model Authentication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {573-577},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2476},
doi = {https://doi.org/10.26438/ijcse/v6i7.573577}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.573577}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2476
TI - Feature Selection using DWT+SVD for Fusion Based Multi model Authentication
T2 - International Journal of Computer Sciences and Engineering
AU - Alapati Kavitha, M.V Rama Krishna,N. Venkata Ramana Gupta, PESN Krishna Prasad
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 573-577
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
465 247 downloads 211 downloads
  
  
           

Abstract

Biometric is the process which is used to measure people’s distinctive physical and behavioural characteristics with the help of mathematical analysis. The technology is principally used for detection and right to use management, or for distinguishing people WHO area unit beneath police work. Now a days used biometric systems are of face, fingerprints, iris, retina, signature, palm print, identification and so on to see a person’s identity. In this paper, we have a tendency to contemplate face and fingerprint features for authentication and confirmation. Victimisation this knowledge we have a tendency to project a model for authentication in multimodal biometry that is typically referred to as Context-Sensitive Exponent Associative Memory Model (CSEAM). CSEAM applied on biometry patterns and afford security for the data. In the first step of this paper, Discrete Wavelet Transformation (DWT) face and finger can be applied at first and then Fusion can be applied . In the second stage Principle Component Analysis (PCA) can be applied at first and then Singular Value Decomposition (SVD) can be applied to extract features. In the third stage these features can be stored for authentication and verification in smart cards). In CSEAM model, exponential Kronecker product applied for verification and authentication on input samples. Verification and authentication can be done using different key sizes. This paper shows better results for the key size of 8x8 by using DWT while comparing to the Pavan Kumar K[1] et all.

Key-Words / Index Term

Biometric, Discrete Wavelet Transformation, exponential kronecker product

References

[1] Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B. D. C. N. Prasad “Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication” , International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013,PP. 83-94
[2] Mihee Lee, Haipeng Shen, Jianhua Z. Huang,2 and J. S. Marron, “Biclustering via Sparse Singular Value Decomposition , Biometrics” 66, 1087–1095, December 2010.
[3] P. E. S. N. Krishna Prasad and B. D. C. N. Prasad, “Password Authentication using Context-Sensitive Associative Memory Neural Networks: A Novel Approach”, Proceedings in LNICST-85, Part 2, CCSIT-2012, Bangalore, Springer Heidelberg, 454-468, 2012.
[4] Eduardo Mizraji, “Modality in Vector Logic”, Notre Dame journal of Formal Logic, Vol. 35, No. 2, 272-283, 1994.
[5] Turk, M. and Pent land, A. (1991), “Eigenfaces for recognition”, Journal of Cognitive Neuroscience, vol. 3, no. 1, p.71-86
[6] Roberto Bruunelli and Tomaso Poggio, “Face Recognition:Features versus Templates” IEEE Trannsactions on Patten analysis and Machine intelligence Vol.15.No.10, Octomber 1993
[7] Chou-Hao Hsu and Chaur-Chin Chen “SVD-Based Projection for Face Recognition”, IEEE EIT 2007 Proceedings
[8] Mary Lourde R and Dushyant Khosla, “Fingerprint Identification in Biometric Security Systems”, International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, 852-855, 2010.
[9] Samir Nanavati, Michael Thieme, and Raj Nanavati, “Biometrics Indentity verification in the network World”, Weily Tech Brief, 2002.
[10] H. Moon, P.J. Phillips, “Computational and Performance aspects of PCA-based Face Recognition Algorithms, Perception”, Vol. 30, 2001, pp. 303-321
[11] T. De Bie, N. Cristianini, R. Rosipal, “Eigenproblems in Pattern Recognition, Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics”, Springer-Verlag, Heidelberg, 2004
[12] Arun Ross and Anil K. Jain, “Multimodel Biometrics: an Overview, 12th European Signal Processing Conference”, 1221-1224,2004.
[13] Jain, A.K.; Ross, A., Prabhakar, S. “An Introduction to Biometric Recognition”, IEEE Trans. Circuits Syst. Video Technol., 14, 4-20, 2004.
[14] Tejas, J.; Sommath, D. “Multimodal Biometrics: State of the art in Fusion Techniques”, Int. J. Biometrics, 4, 393-417, 2009.
[15] Kyungnam Kim, “Face Recognition using PCA”,Vision and AI Research group, 2001.
[16] Wayne A. Wickelgren, “Context-sensitive coding, Associative Memory and serial order in Speech Behaviour, Psychological Review”, Vol. 76, No. 1, 1-15, 1969,
[17] Juan C. Valle-Lisboa, Florencia Reali, Hector Ansatasi Ab, Eduardo Mizaraji, “Elman topology with sigma-pi units: An Application to the modelling of verbal hallucinations in Schizophrenia, Neural Networks”, Elsevier, 18, 863-877, 2005.
[18] Cleve Moler and Charles Van Loan, “Nineteen Dubious ways to Compute the Exponential of a Matrix, Twenty-Five Years Later, SIAM Review”, Society for Industrial and Applied Mathematics, Vol. 45, No.1,1-46, 2003
[19] Artur S. d’Avila Garcez, Lu´is C. Lamb and Dov M. Gabbay, “Connectionist Model logic: Representing Modalities in Neural Networks”, Theoritical Computer Science, Vol. 371, Issue 1-2,34–53, 2007.
[20] H. V. Henderson, F. Pukelsheim and S. R. Searle “On the history of the Kronecker product. Linear and Multilinear Algebra”, 14:113-120, 1983.
[21] Lester Lipsky and Appie van deLiefvoort, “Transformations of the Kronecker Product of Identical Servers to Reduced Product Space”, 1995.
[22] John W. Brewer, “Kronecker Products and Matrix Calculus in System Analysis”, IEEE Transactions on Circuits and Systems, Vol. 25, No. 9, 1978
[23] Wolfgang Hackbusch, Boris N. Khoromskij, “Hierarchical Tensor-Product Approximations”.