Open Access   Article Go Back

Improved Sequential Fusion of Heart-signal and Fingerprint for Anti-spoofing

Radha N1 , Kavya N2 , Harsha A C3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 226-231, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.226231

Online published on May 16, 2019

Copyright © Radha N, Kavya N, Harsha A C . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Radha N, Kavya N, Harsha A C, “Improved Sequential Fusion of Heart-signal and Fingerprint for Anti-spoofing,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.226-231, 2019.

MLA Style Citation: Radha N, Kavya N, Harsha A C "Improved Sequential Fusion of Heart-signal and Fingerprint for Anti-spoofing." International Journal of Computer Sciences and Engineering 07.15 (2019): 226-231.

APA Style Citation: Radha N, Kavya N, Harsha A C, (2019). Improved Sequential Fusion of Heart-signal and Fingerprint for Anti-spoofing. International Journal of Computer Sciences and Engineering, 07(15), 226-231.

BibTex Style Citation:
@article{N_2019,
author = { Radha N, Kavya N, Harsha A C},
title = {Improved Sequential Fusion of Heart-signal and Fingerprint for Anti-spoofing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {226-231},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1232},
doi = {https://doi.org/10.26438/ijcse/v7i15.226231}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.226231}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1232
TI - Improved Sequential Fusion of Heart-signal and Fingerprint for Anti-spoofing
T2 - International Journal of Computer Sciences and Engineering
AU - Radha N, Kavya N, Harsha A C
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 226-231
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

Biometrics is one of the most encouraging authentication systems in the recent years. However, spoof attack is one of the main problems with a biometric system. Spoof attack falls within a subset of what is called presentation attack. The heart is an emerging biometric modality which is getting attention for its robustness against presentation attacks. Introducing heart-signal into a fingerprint biometric system can yield promising results showing its robustness against spoof attacks with increasing the authentication accuracy. In this work, a sequential fusion method is improved for anti-spoofing capability. The idea behind the proposed system is the utilization of the natural liveness property of heart-biometrics in addition to boosting the heart-signal scores to increase the anti-spoofing of a multimodal biometric system. We have evaluated our proposed method with public databases of fingerprint biometric and heart-signal (ECG signal). The obtained results are very encouraging for the development of a robust anti-spoofing multimodal authentication system.

Key-Words / Index Term

Component, Formatting, Style, Styling, Insert (key words)

References

[1] A. K. Jain and A. Kumar, "Biometric Recognition: An Overview," in Second Generation Biometrics: The Ethical, Legal and Social Context, E. Mordini and D. Tzovaras, Eds., ed: Springer Netherlands, 2012, pp. 49-79.
[2] F. Alonso-Fernandez, J. Bigun, J. Fierrez, H.Fronthaler, K. Kollreider, and J. Ortega-Garcia, "Fingerprint recognition," in Guide to biometric reference systems and performance evaluation, ed: Springer, 2009, pp. 51-88.
[3] E. Marasco and A. Ross, "A survey on antispoofing schemes for fingerprint recognition systems," ACM Computing Surveys (CSUR), vol. 47, p. 28, 2015.
[4] M. S. Islam, "Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices," International Journal of Distributed Sensor Networks, vol. 2015, p. e549134, 2015/01/29/ 2015.
[5] L. Biel, O. Pettersson, L. Philipson, and P. Wide, "ECG
analysis: a new approach in human identification," Instrumentation and Measurement, IEEE Transactions on, vol. 50, pp. 808-812, 2001 2001.
[6] S. A. Israel, J. M. Irvine, B. K. Wiederhold, and M. D.
Wiederhold, The heartbeat: the living biometric: Wiley-IEEE Press, New York, NY, USA, 2009.
[7] F. Agrafioti, D. Hatzinakos, and J. Gao, Heart biometrics: Theory, methods and applications: INTECH Open Access Publisher, 2011.
[8] M. S. Islam and N. Alajlan, "Biometric template extraction from a heartbeat signal captured from fingers," Multimedia Tools and Applications, vol. doi: 10.1007/s11042-016-3694-6, 2016.
[9] A. Lourenço, H. Silva, and A. Fred, "Unveiling the biometric potential of Finger-Based ECG signals,"Computational intelligence and neuroscience, vol. 2011, p. 5, 2011 2011.
[10] R. M. Jomaa, M. S. Islam, and H. Mathkour, "Enhancing the information content of fingerprint biometrics with heartbeat signal," in Computer Networks and Information Security (WSCNIS), 2015 World Symposium on, 2015, pp. 1-5.
[11] S. Pouryayevali, "ECG Biometrics: New Algorithm and Multimodal Biometric System," Master Thesis, Graduate Department of Electrical and Computer Engineering, University of Toronto, 2015.
[12] N. Alajlan, M. S. Islam, and N. Ammour, "Fusion of fingerprint and heartbeat biometrics using fuzzy adaptive genetic algorithm," 2013, pp. 76-81.
[13] S. A. Israel, W. T. Scruggs, W. J. Worek, and J. M. Irvine, "Fusing face and ECG for personal identifica ion," 2003, pp. 226-231.
[14] Y. N. Singh, S. K. Singh, and P. Gupta, "Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system," Pattern Recognition Letters, vol. 33, pp. 1932-1941, 2012 2012.
[15] M. D. Bugdol and A. W. Mitas, "Multimodal biometric system combining ECG and sound signals," Pattern Recognition Letters, vol. 38, pp. 107-112, 2014 2014.
[16] C. Zhao, T. Wysocki, F. Agrafioti, and D. Hatzinakos, "Securing handheld devices and fingerprint readers with ECG biometrics," 2012, pp. 150-155.
[17] I. I. Standard, "Information technology – Biometric presentation attack detection -- Part 1: Framework," ed, 2016.
[18] A. K. Jain, K. Nandakumar, and A. Ross, "50 years of biometric research: Accomplishments, challenges, and opportunities," Pattern Recognition Letters, vol. 79, pp. 80-105, 2016.
[19] G. Fumera, G. L. Marcialis, B. Biggio, F. Roli, and S. C. Schuckers, "Multimodal Anti-spoofing in Biometric Recognition Systems," in Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks, S. Marcel, M. S. Nixon, and S. Z. Li, Eds., ed London: Springer London, 2014, pp. 165-184.
[20] C. A. Shoniregun and S. Crosier, Securing biometrics applications: Springer, 2008.
[21] M. Tistarelli, S. Z. Li, and R. Chellappa, Handbook of remote biometrics vol. 1: Springer, 2009.
[22] A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of multibiometrics vol. 6: Springer, 2006.
[23] R. N. Rodrigues, N. Kamat, and V. Govindaraju, "Evaluation of biometric spoofing in a multimodal system," 2010, pp. 1-5.
[24] R. N. Rodrigues, L. L. Ling, and V. Govindaraju, "Robustness of multimodal biometric fusion methods against spoof attacks," Journal of Visual Languages & Computing, vol. 20, pp. 169-179, 2009 2009.
[25] P. A. Johnson, B. Tan, and S. Schuckers, "Multimodal fusion vulnerability to non-zero effort (spoof) imposters," in 2010 IEEE International Workshop on Information Forensics and Security, 2010, pp. 1-5.