Abstract
Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability.
This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jain AK, Pankanti S, Prabhakar et al (2004) Biometrics: a grand challenge. Proc 17th international conference on pattern recognition (ICPR), vol 2. pp 935–942
Anil K, Jain AK (2012) Biometric recognition: an overview. In: Mordini E, Tzovaras D (eds) Second generation biometrics: the ethical, legal and social context. The International Library of Ethics, Law and Technology, vol 11. Springer, pp 49–79
Baird SL (2002) Biometrics: security technology. The technology teacher 61(5):1, pp 8–22
Sujithra M, Padmavathi G (2012) Next generation biometric security system: an approach for mobile device security, Proc second international conference on computational science, engineering and information technology. ACM, New York, NY, USA, pp 377–381
Corcoran P, Cucos A (2005) Techniques for securing multimedia content in consumer electronic appliances using biometric signatures. IEEE Trans Consumer Elect 51:545–551
Jain AK, Ross A, Pankanti S (2006) Biometrics: a tool for information security. IEEE Trans Inf Forensics Security 1(2):125–143
Jain AK, Nandakumar K, Lu X et al. (2004) Integrating faces, fingerprint, and soft biometric traits for user recognition. Proc biometric authentication workshop, LNCS 3087, Prague, pp 259–269
Hong A, Jain S, Pankanti S (1999) Can multibiometrics improve performance? Proc AutoID`99, Summit, NJ, pp 59–64
Anil J, Lin H, Sharath P (2000) Biometric identification. Commun ACM 43(2):90–98
Cappelli R, Maio D, Maltoni D et.al (2006) Performance evaluation of fingerprint verification systems. IEEE Trans Pattern Anal Mach Intell 28:3–18
Bishop C (1995) Neural networks for pattern recognition. Oxford University Press, Oxford
Ciota Z (2001) Improvement of speech processing using fuzzy logic approach. Proc of IFSA World congress and 20th NAFIPS Int Conf, 2
Bosteels RTK, Kerre EE (2007) Fuzzy audio similarity measures based on spectrum histogram and fluctuation patterns. Proc Int Conf Multimedia and Ubiquitous Engineering 2007, Seoul, Korea, 27–28 April
Malcangi M (2002) Soft-computing approach to fit a speech recognition system on a single-chip. Proc 2002 international workshop system-on-chip for real-time applications, Banff, Canada, 6–7 July
Malcangi M (2004) Improving speech endpoint detection using fuzzy logic-based methodologies. Proc thirteenth Turkish symposium on artificial intelligence and neural networks, Izmir, Turkey, pp 10–11
Wahab A, Ng GS, Dickiyanto R (2005) Speaker authentication system using soft computing approaches. Neurocomputing 68:13–17
Kar B, Kartik B, Dutta PK (2006) Speech and face biometric for person authentication. Proc IEEE international conference on industrial technology, India, pp 391–396
Jang-Hee Y, Jong-Gook K et al (2007) Design of embedded multimodal biometric systems. Proc of the int conf on signal image technologies and internet based systems, SITIS 2007:1058–1062
Jain AK, Dass SC, Nandakumar K (2004) Soft biometric traits for personal recognition systems. Proc international conf on biometric authentication, LNCS, vol 3072. Hong Kong, pp 731–738
Pak-Sum Hui H, Meng HM, Mak M (2007) Adaptive weight estimation in multi-biometric verification using fuzzy logic decision fusion. Proc IEEE international conference on acoustic, speech, and signal processing ICASSP’07, vol 1. pp 501–504
Runkler TA (1997) Selection of appropriate defuzzification methods using application specific properties. IEEE Trans Fuzzy Sys 5:72–79
Abiyev RH, Altunkaya K (2007) “Neural network based biometric personal identification”, Frontiers in the Convergence of Bioscience and Information Technologies. pp 682–687
O’Shaugnessy D (1987) Speech communication—human and machine. Addison-Wesley, Reading, MA
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this protocol
Cite this protocol
Malcangi, M. (2015). Developing a Multimodal Biometric Authentication System Using Soft Computing Methods. In: Cartwright, H. (eds) Artificial Neural Networks. Methods in Molecular Biology, vol 1260. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2239-0_13
Download citation
DOI: https://doi.org/10.1007/978-1-4939-2239-0_13
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-2238-3
Online ISBN: 978-1-4939-2239-0
eBook Packages: Springer Protocols