ISSN 0974-3618
(Print) www.rjptonline.org
0974-360X (Online)
RESEARCH ARTICLE
Multimodal
Biometric Authentication Process for High Secured Border Control
Vinothkumar.C1
and Paul Joseph Parakkal.B2
1Assistant Professor, Dept. of Electronics and Instrumentation Engineering, Sathyabama University, Chennai.
2UG Scholar, Dept. of Electronics and
Instrumentation Engineering, Sathyabama University, Chennai.
*Corresponding
Author E-mail: vinothkumar.eni@sathyabamauniversity.ac.in
ABSTRACT:
As peace and
harmony is the priority in life. This also lies in the hands of our border
security. In recent years due to poor border security, the terrorist gained
their access into our country and has cost many damages to life and property.
If these scenario continues then the peace in the country will become no more.
And therefore a well organized and stringent security has to be made sure. Here
this paper comprises of a multi level security system using biometrics,
Fingerprint scanning along with Iris reorganization. Therefore this
implementation promises (a) Faster immigration (b) Criminals or Terrorist can
be easily identified Iris and
Fingerprint inputs are given by the citizens who emigrate from one country to
other country. In control room identifications takes place by fusing inputs
then passes the decision signal automatically. The most common unimodal
biometric system, it can be seen in most of the places due to its popularity.
Its reliability has decreased because it requires larger memory footprint, higher
operational cost and it have slower processing speed. So by introducing
Multimodal Biometric Identification System 1-3 this uses Iris and Fingerprint
for security purpose4. The major advantage of this multimodal approach is that
since both modalities utilized the same matcher module the memory footprint of
the system is reduced 11. Integrating multiple modalities in user verification
and identification leads to high performance, high reliability and high
accuracy. So this technique enhances high security in border control and thus
saves lives and property.
KEY WORDS: Iris,
Fingerprint, Unimodal, Multimodal,
Wavelet, Border Control, Neural Network and Mat lab
1. INTRODUCTION:
In India an average yearly report shows
that there are 618176.2 migrants whose intension is not to settle but a
temporary movement of people for the purpose of travel, tourism, pilgrimages.
Such migration gains access for the terrorist to enter the land and cause
damages to life and property. Automation is one of the best approaches
(solution) to increase the border security and safety by using effective
multimodal biometric recognition 4.
Received on 20.06.2015
Modified on 24.06.2015
Accepted on 04.07.2015 ©
RJPT All right reserved
Research J. Pharm. and Tech. 8(9): Sept.,
2015; Page 1264-1268
DOI: 10.5958/0974-360X.2015.00229.2
The basic idea is that the Iris and Fingerprint
biometric inputs are given by the civilians from air port or bus depot or
harbor or railway stations to the control room. In the control room the
verification process of fusing both the inputs takes place and verifies the
detail about the passengers and then passes on the signal for the migration
verification. Misidentification rate of iris is very less. So here fingerprint
is combined with iris in order to increase the performance of border security
system by means of fusion process. In this system, Passport and unimodal based authentication replaced by
multimodal biometric authentication.
2. EXISTING UNIMODAL APPROACH:
The existing biometric identification
techniques are Unimodal biometric identification and Multimodal biometric
identification with two complete unimodal systems. Unimodal
biometric system consists of its own unique feature extractor and classifier.
Its reliability is decreased because it requires memory footprint, less
accuracy and it have slower processing speed. The block diagram for the
unimodal biometric system is shown in figure 1
Fig.1. Unimodal Biometric System
The block diagram for the existing multimodal
biometric identification system (two complete unimodal) is shown in figure 2.
Fig.2. Existing Multimodal Biometric System
Existing multimodal biometric systems 1 are
always considered to be the combination of two or more complete unimodal
biometric systems. Each unimodal system consists of its own
unique set of feature extractor and matcher thus fusing their scores, require
an additional score normalization setup and a complex fusion approach.The traditional multimodal approach
improves the accuracy and stability of the system over unimodal approach but
this improvement increase the cost of system and larger memory footprint. In
most cases it requires either multiple algorithms or multiple sensors or both
of them.
Drawbacks
in existing methodologies:
Ø It requires larger memory footprint.
Ø High operational cost.
Ø Multiple algorithms are required. Each
unimodal system contains separate matcher (classifier).
Ø Moderate fusion score level.
Ø Slower processing speed.
3. IMPLEMENTATION OF MULTIMODAL BIOMETRIC
IDENTIFICATION 1-8:
The main approach of the proposed system involves
the developing of a fully controlled and automated highly secured border
control using fusion based multimodal biometric identification system without
the availability of two complete unimodal systems. Here using iris and fingerprint as a part of
biometric. Fusing these two input images reduce the chances of hacking. The
basic block diagram for the proposed real time system is shown in figure 3.
Advantages of Proposed System:
Ø Automated
checkout and loss prevention.
Ø Safe journey for
passengers.
Ø High security and
maintenance free.
Proposed Methodology:
One of the major
objectives for the development of the proposed methodology was to demonstrate
that it is possible to design an effective multimodal biometric system without
the availability of two complete unimodal systems. This proposed approach is used to overcome the
problems occurred in existing methodologies and improve the pilot security in
existing system. The block diagram for the proposed methodology is shown in
figure.3. Development of a fingerprint
and iris based multimodal biometric identification system with high score level
fusion that utilizes a weighted Euclidean distance matcher or single hamming
distance matcher 11.
Fig.3. Proposed Multimodal Biometric
4. METHODOLOGY:
First fingerprint
biometric input is acquired and passed to fingerprint feature extractor. The
processed reference is compared with the templates in the data base using the
provided matcher. In the meantime, the second input is acquired and forwarded
to the iris feature extractor. In the time that the matcher completes the
processing of the first biometric and generate the matching output, the second
biometric input is processed and ready for matching. The same matcher is now
used to compare the iris biometric reference with the templates and generates
the output. The fusion takes place once both matching scores are
available. Proposed fusion based multimodal biometric approach
(figure 3) is for both modalities utilized same classifier is that both output
scores will be same format. The overall proposed system will improves the
security among country borders.
Advantages
of proposed methodology
Ø Eliminating additional normalization
functions.
Ø Improves the processing speed.
Ø Reduces the memory footprint
Ø Simple design process.
Ø Both modalities utilize a single classifier
5.
5. RECOGNITION
PROCESS 11
Proposed
multimodal biometric identification system using the single classifier for both
modalities is that both output scores will be in same format and it also
simplifies the design process. Implementation of multimodal biometric system
consists of the following processes
1. Iris
recognition process.
2. Fingerprint
recognition process.
3. Fusion
process.
The implementation
approach is involved in the
process of acquiring an image of the area containing the text, preprocessing
that image, extracting (segmenting) the individual characters, describing the
characters in a form suitable for computer processing, and recognizing.
Iris
Recognition Process 3:
The Iris
recognition is a very reliable method of personal identification. The iris
image is unique for each person and doesn’t change during the life. The iris
identification system is to automatically recognize the identity of a person
from a new image by comparing it to the human iris patterns denoted with
identity in stored database.
Iris
recognition process composed of four steps.1.First an image containing user’s
eye is captured by CCD or Infrared Camera. (Image Acquisition). 2. Then the
image is preprocessed to normalize the scale and illumination of iris and
localize the iris in the image. (Image Preprocessing).3. Third step, Feature
Extraction representing the iris patterns is extracted. It is done by Using
Daugman’s approach. This Approach including Iris Marking, Cropping, polar
format and Wavelet encoding (converts polar to analog format). This process is
shown in figure 5.
Fig. 5. Iris Feature Extraction process
4. Finally,
the decision is made by means of classification. (Classifier).Classifier refers
to the final decision for recognition or identification person. This isn’t only
matching and comparing iris 5, but also getting the information from iris. In
matching system, it can be tested by using the Weighted Euclidean distance
(WED) algorithm. WED can be used to compare two templates, especially if the
template is composed of integer values. WED gives a measure of how similar a
collection of values are between two templates.
Fingerprint Recognition Process 10:
A fingerprint is comprised of ridges and
valleys. The ridges are the dark area of
the fingerprint and the valleys are the white area that exists between the
ridges. Fingerprint identification
process 10 is having the following steps.
Binarization:
The Binarization
image of fingerprint is shown in figure 6. Binarization is used to convert gray scale image into
binary image by fixing threshold value. The pixel values above and below the
threshold are set to 1 and 0 respectively.
Block Filter:
Block filter
image of fingerprint is shown in figure 7. The Binarization of image is thinned using block
filter to reduce thickness of all ridge lines to a single pixels width to
extract minutiae points effectively. Thinning does not change the location and
orientation of minutiae points compared to original fingerprint which ensures
accurate estimation of minutiae points. Thinning preserves outermost pixels by
placing white pixels at the boundary of the image, as a result first five and
last five rows, first five and last five columns are assigned as value of 1.
Dilation and erosion are used to thin the ridges.
Minutiae Extraction:
Minutiae extraction of fingerprint is shown
in figure 8. The minutiae location and minutiae angles are derived after
minutiae extraction. The termination which lie at the outer boundaries are not
considered as minutiae points, and the crossing number is used to locate the
minutiae points in the fingerprint image. Crossing number is defined as the
half of the sum of difference between intensity values of the adjacent pixels.
If the crossing number is 1, 2, and 3 or greater than 3 then the minutiae
points are classified as termination, normal ridge and bifurcation
respectively.
(a) Original
fingerprint (b) Binarized image
Fig. 6.
Binarization process
Fig. 7. Block Filter process
Fig.8. Minutiae
Extraction process
Fusion Process 6-7:
The fusion of images is the process of combining
two or more (iris & fingerprint) images into single image retaining
important features from each. Recently
multiresolution analysis is one of the acceptable methods to analyze the
remotely sensed images.Several approaches to image
fusion can be distinguished, depending on whether the images are fused in the
spatial domain or they are transformed into another domain, and their
transforms are fused. A new
method based on discrete wavelet transform is proposed here. The DWT based
techniques became popular due to their multi resolution properties. This approach image fusion based on wavelet
decomposition. Here Wavelet transform- Heuristic additive rule based
method is used. That is given below, “I3= ((i1+i2)/2) + ((i1+i2)/100)” It can
show a good position of a function (here this function is the image) in spatial
and frequency space. It is used to display the efficient recognition rate of
combined image. The Iris-Fingerprint
Fusion Process 11 has the following advantages like High Security, Easy to
implement, No training is required, Universally accepted by all and Noise
reduction.
6. RESULT AND DISCUSSION:
Identification
of authorized person based on the classifier output and fusion score level
6-11. In this section we are going to discuss about simulation output for
classifier using MATLAB 9. The details regarding the identification database
and false accept error rates are provided in Matlab coding 9 for all the three
process. In this identification process, one Finger print/Iris image selected
as the verification image input from data base. Then input image is matched
against the entire database images. If the given input matched with the data
base, then the user is identified as an authorized person and the maximum
matching score value will be displayed. If the given input not matched with the
data base then the user is identified as unauthorized person and the minimum
matching score value is displayed with error percentage. The simulation results
of finger print and iris is shown in figure 9&10.
Fig 9.
Simulation matching result for fingerprint
Fig.10.
Simulation matching result for Iris
When
the fusion process score value compared with the individual score values of
both input images, it will improve the efficiency of the average score value.
The simulation result of fusion process is shown in figure 11.
Fig.11.
Simulation result for fusion process
The
simulation result of the proposed fusion based multimodal biometric
identification is clearly shows the improved recognition rate compared with
existing identification method.
7. CONCLUSION:
The proposed
work in this paper has the concept of combining the features of both iris and
fingerprint we can attain very high efficiency and the performance is also
improved. The major advantage of this multimodal biometric identification is
that both modalities utilized the same matcher, low cost with a small memory
footprint and easier for hardware implementation. This recognition can be
implemented in high security areas like airports, War fields, ATM centers etc.,
instead of using passwords. The simulation results clearly show that
the proposed multimodal biometric identification is more secure and efficient
for automation of border security control. So this technique enhances high border security and
thus saves lives and property.
8. REFERENCES:
1.
L. Hong, A. Jain and S. Pankanthi, “Can
Multibiometrics Improve performance?” Proceeding AutoID’99, Summi, NJ, Oct
1999, pp.59-64
2.
A.K. Jain, L. Hong, Y. Kulkarni, “A Multimodal
Biometric System using Fingerprints, Face and Speech”, 2nd
International Conference Audio and Video-based Biometric Person Authentication.
Washington, March 22-24, 1999, pp.182-187
3.
Yunhong Wang, Tieniu Tan, and Anil K. Jain,” Combing
Face and Iris Biometrics for Identity Verification”, 1999, pp.45-54.
4.
A.K. Jain, S. Prabhakar and S. Chen, “Combing
Multiple Matchers for a High Security Fingerprint Verification System”, Vol.
20, No.11-13, 1999, pp1371-1379.
5.
Fabio Roli, Josef Kittler, Giorgio Fumera, Daniele
Muntoni, “An Experimental Comparison of Classifier Fusion Rules for Multimodal
Personal Identity Verification System”, 2002, pp. 76-82.
6.
A. Lumini and L. Nanni, “When Fingerprints Are
Combined with Iris – A case study: FVC2004 and CASIA”, International Journal of
Network Security, vol.4, Jan 2007, pp.27-34.
7.
Karthik Nandakumar, “Multi Biometric Systems: Fusion
Strategies and Template Security”, Ph.D. Thesis, 2008, Michigan State
University,
8.
J.
G. Daugman. High confidence visual recognition of persons by a test of
statistical independence. IEEE Trans. on PAMI, Vol.15 (11), pp. 1148–1161, 1993.
9.
Libor
Masek, Peter Kovesi. MATLAB Source Code for a Biometric Identification System
Based on Iris Patterns. The School of Computer Science and Software
Engineering, the University of Western Australia. 2003.
10.
Z.
Shi and V. Govindaraju, "A chaincode based scheme for fingerprint feature
extraction," Pattern Recogn.Lett., vol. 27, pp. 462-468, 2006
11.
Asim
Baig, Ahmed Bouridane, Faith Kurugollu, and Gang Qu, “Fingerprint Iris Fusion
based Identification System using single Hamming Distance Matcher,” International
journal of Bio-science and Bio-Technology, vol.1, pp.47-57, Dec-2009.