Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
I. INTRODUCTION
For security reasons the manhas used several types of
security such as the handwritten signature, password,
magnetic cards. But they have limits and involve the risks
such as loss, theft, oblivion. Biometrics is required
undeniably as the future technology in the field of security
[1]. Concrete cases of application of biometrics on the
Internet exist, they are still few, but the need for this
technology keeps increasing.
There are primarily two computer solutions that are possible
forthe application of biometrics on the Internet; one to identify
a user and the other to authenticate access of a user [2]. The
identification uses a remote database that aggregates users
biometric data stored on a server. This operation can be done
in two distinct ways. One would be to send biometric data
entered on the centralized server to proceed to the
verification.The other allows the verification locally by
retrieving the biometric template from the centralized server
which allows to identify the user through the recorded data.
Concerning the authentication of a user, the procedure is
simple in this case the user could provide his biometric data
and have a smart card [3]. This captured data is compared with
the biometric data of the person stored on the card. This one
to one verification is used to authenticate the user [4].
Biometric systems can automatically identify people using
physical or behavioral characteristics [5], but we cannot
currently guarantee a perfect recognition rate with biometric
systems of a single biometric signature. Moreover, these
systems are often affected by problems like poor one-time
quality of data, not universality of the chosen characteristics,
the similarities between classes, the poor results or the
sensitivity to attacks [6][7]. To overcome these drawbacks, a
solution is to use multiple biometric modalities within a single
system, we speak then of multimodal biometric system [8].
The objective of our work is to propose a client-server
architecture for a remotely multimodal biometric
identification, while offering an approach to combine the iris
and the fingerprint in order to optimize the recognition rate.
In the following sections, we will develop a literature
review related to this work and we will describe the complete
chain of treatment for both modalities the iris and the
fingerprint and the fusion of their scores, and we will describe
the remote identification technique, then we will present the
experimental results, and finally we will finish by a conclusion
and perspectives for the future extensions to this work.
II. PREVIOUS RELATED WORK
Several methods of fusion have been proposed at scores
level in regards to both approaches [9] [10] [11]. In [12], they
used a classifier based on a support vector machine to
combine scores of the face and the voice. In [13], the proposed
system simultaneously acquires the finger-vein and low
resolution fingerprint images and it combines these two
evidences using a novel score level combination strategy. In
[14], a minutiae and texture based fingerprint fusion study was
carried out using a Quality Weighted Sum (QWS) rule for the
score level fusion. In [15], they proposed a biometric health
care security system using the iris and face fusion which was
performed at the matching score level using weighted
scores.In [16], a score-level fusion method for fingerprint
matching has been proposed. The trend and discrimination of
scores were used as prior knowledge with a sigmoid function
to search the optimal fusion parameters.
2015 IEEE
) ( )+
) ( )+
( )
( )
(1)
) /
) /
(2)
Where and
are parameters of the dimensions of the
Gabor analysis window,
the Gabor Wavelet frequency.
Finally and
represent the coordinates of the points of the
Gabor Wavelet analysis.
We proceed by quantification of these coefficients in order to
obtain a binary image representing the corresponding iris code
with a resolution of 480 x 20 pixels.
The comparison or the calculation of the score is based on
the calculation of the Hamming distance (HD) between the
prototype iris code and the iris code under test according to
equation (3).
=
||(
||
||
||
(3)
Where codeA and codeB are two codes calculated from two
iris images and maskA and maskB represent their respective
masks which take into consideration the occlusion
problem[25].
B. FingerprintIdentification
The fingerprintidentification is made of three main steps,
namely the preprocessing, the feature extraction and the
comparison step [26] [27].
The preprocessing is divided into two main steps which are
the normalization of the fingerprint image, and the location
and the framingof the central point of the fingerprint
image.The normalization is used to eliminate the effects of
noise and distortion when capturing the image from the
fingerprint sensor. The original image is normalized by its
mean M and its variance VAR, the matrix G (I) given
byequation (4)indicates the normalized grayscale image and G
(i, j) is its value at pixel (i, j).Where
and
are the
desired mean and variancevalues,respectively.
(, )
=
( (, )
((, )
(, )
(4)
V.
N-Input scores
Classification by decision
tree
No
Identical
Class
Decision: unidentified
person (Different)
Yes
No
Decision: person is
identified (Identicali)
Yes
End
Fig. 2.Flowchart of the fusion method
Iris score
0.34
Zone2 :uncertainty zone
(Undefined class)
0.31
Zone1 :certainty
zone(Identical
class)
0
0.41
Fingerprint score
ISi
0.31
No
Yes
FSi
Yes
Identical
Class
FSi
0.30
No
Yes
FSi
0.41
Yes
No
Identical
Class
0.30
ISi
0.34
Yes
No
No
Different
Class
Different
Class
Identical
Class
Different
Class
Fig. 3. The obtained decision tree: ISi-iris score, FSi fingerprint score
Graphical Interface
Start
Start
Connecting to
the MySQL
database
Connecting to
the MySQL
database
No
No
Table1
receives the
data
Yes
Reading the data from
table1
Yes
Transmission of the iris
and the
fingerprintcodesto the
Ta
bl
e1
Parallel Processing
Comparison of the Comparison of the
fingerprint code
iris code
No
Table2
receives the
data
Centralized Biometric
Database
Yes
Reading the information
concerning the person
from table2
Emptying the table2
Display of the identity
of the person
Vector of scores
Ta
bl
e2
Scores fusion
Transmission of
information concerning
the person to the Table2
User
Server Computer
Request
Internet
Navigator
(Client)
WampServer
- Apache
- PHP
- MySQL
Response
Graphical Interface
Biometric
Database
1
EFAR
FRR
FAR
0.9
0.8
0.7
0.6
Error rate
0.5
0.4
0.3
0.2
0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
Decision threshold
0.7
0.8
0.9
Fig. 8.Curve of changes in error rates according to the decision threshold for
unimodal system of iris
1
EFAR
FRR
FAR
0.9
0.8
0.7
0.6
Error rate
0.5
0.4
0.3
0.2
0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
Decision threshold
0.7
0.8
0.9
Fig. 9.Curve of changes in error rates according to the decision threshold for
unimodal system of fingerprint
4.44 %
10.83 %
7.50 %
84.73 %
7.78 %
16.67 %
13.5 %
75.55 %
1.39 %
4.44 %
1.50 %
94. 17 %