An Adaptive Multimodal Biometric Management Algorithm

Size: px
Start display at page:

Download "An Adaptive Multimodal Biometric Management Algorithm"

Transcription

1 344 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 35, NO. 3, AUGUST 2005 An Adaptive Multimodal Biometric Management Algorithm Kalyan Veeramachaneni, Lisa Ann Osadciw, Senior Member, IEEE, and Pramod K. Varshney, Fellow, IEEE Abstract This paper presents an evolutionary approach to the sensor management of a biometric security system that improves robustness. Multiple biometrics are fused at the decision level to support a system that can meet more challenging and varying accuracy requirements as well as address user needs such as ease of use and universality better than a single biometric system or static multimodal biometric system. The decision fusion rules are adapted to meet the varying system needs by particle swarm optimization, which is an evolutionary algorithm. This paper focuses on the details of this new sensor management algorithm and demonstrates its effectiveness. The evolutionary nature of adaptive, multimodal biometric management (AMBM) allows it to react in pseudoreal time to changing security needs as well as user needs. Error weights are modified to reflect the security and user needs of the system. The AMBM algorithm selects the fusion rule and sensor operating points to optimize system performance in terms of accuracy. Index Terms Multisensor fusion, multimodal biometrics, particle swarm optimization. I. INTRODUCTION IOMETRICS is an attempt to imitate the elegant B sensor fusion network of humans in identifying and verifying other humans by their behavioral and physiological characteristics (a self quote from Lisa Kalyan). The first modern commercial biometric device was introduced over 25 years ago when a machine that measured finger length was installed for maintaining employee time records at Shearson Hamil on Wall Street. In the ensuing years, hundreds of these hand geometry devices have been installed for security purposes at facilities operated by Western Electric and Naval Intelligence. In the US today, biometric security systems may be found in the Oakland International Airport (face recognition), Chicago O Hare International (fingerprint), and the Navy Consolidated Building (iris recognition) [1]. With an increasing demand for better security technology in public and private buildings since September 11, 2001, a variety of pilot projects have been completed in the area of access control [2]. These projects highlight the need to improve biometric verification accuracy, universality, and ease of use. Identification methods can be grouped into three classes: something you possess as in an ID card, something you know, and something unique about you. Possessions (e.g., keys) can be easily lost, forged, or duplicated. Knowledge can be forgotten as well as shared, stolen, or guessed. The cost of forgotten passwords is high and accounts for 40% 80% of all the IT help Manuscript received March 15, 2003; revised December 20, This paper was recommended by Guest Editor D. Zhang. The authors are with the Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY USA. Digital Object Identifier /TSMCC desk calls [3]. Resetting the forgotten or compromised passwords costs as much as $340/user/year [4]. Biometrics, which is something unique about you, are inherently secure since they are unique features the person has. The science of biometrics is a solution to identifying an individual and avoids the problems faced by possession-based and knowledge-based security approaches. The aggregate security level of a system increases as these three identification approaches are combined in various ways. The least secure approach is one based solely on Personal Identification Numbers (PINs). This is because a very small PIN consisting of four characters can be easily guessed by an imposter, while a 200-character PIN is difficult for users to remember. This often leads to PINs getting compromised in many ways, such as a second possession. The biometrics system s security level can be improved by adding some possession such as an identification card. Finally, additional possessions with multiple biometrics support a very high security level, as illustrated in Fig. 1. This paper proposes an approach supporting highly secure systems that utilize multisensor fusion to improve the security level of a system by combining biometric modalities. An algorithm is presented that adaptively derives the optimum Bayesian fusion rule as well as individual sensor operating points in a system. The algorithm bases its design on system requirements, which may be time-varying. Other researchers have published numerous experimental results demonstrating the effectiveness of fusion in biometrics [5] [10]. Ad hoc techniques have been demonstrated to be effective but not always optimum in terms of accuracy [9], [10]. For example, the BioID system [9] chooses from different fusion strategies to vary the system security levels. The fusion options, however, contain only a few fusion rules, typically the and and or rules, severely restricting the rule search. The decision thresholds or operating points for individual sensors are fixed in these systems, which fixes the false acceptance rate (F AR ) and false rejection rate (F RR ). This approach successfully reduces F AR or F RR [10] but not both. In contrast, the adaptive, multimodal biometric management algorithm (AMBM), which is presented in this paper, comprehensively considers all fusion rules and all possible operating points of the individual sensors. The optimum Bayesian fusion rule is designed based on the current situation as it is defined by the Bayesian error costs. As the situation changes with time, AMBM revises the fusion rule and the sensor operating points. This paper describes this novel sensor management algorithm and how it is applied to the biometric security application. The block diagram shown in Fig. 2 presents the AMBM algorithm in detail. The system has N biometric sensors, a Particle Swarm Optimizer (PSO), a Bayesian Decision Fusion processor, and a Mission manager. The mission manager provides the PSO the /$ IEEE

2 VEERAMACHANENI et al.: AN ADAPTIVE MULTIMODAL BIOMETRIC MANAGEMENT ALGORITHM 345 Fig. 1. Approaches to increasing security needs. Fig. 2. Illustration of adaptive multimodal biometric fusion algorithm. costs, which reflect system requirements. The PSO searches for an optimal configuration of the sensors with a corresponding fusion rule matching those requirements. The threshold values for each biometric sensor are also selected since they are function of the sensor F AR determined by the PSO. These sensors now operate at these thresholds determined by the PSO. The Bayesian Decision Fusion processor fuses the decisions from multiple sensors using the optimum fusion rule from the PSO into a final decision. New rules and thresholds are found when the PSO receives new costs from the mission manager. The next section provides a quick review of the existing biometric technologies discussed in this paper. The third section describes how the Bayesian decision fusion framework supports automated adaptivity. The fourth section presents the new AMBM algorithm with its evolutionary algorithm PSO. The final section summarizes the results and presents conclusions. II. REVIEW OF EXISTING BIOMETRIC TECHNOLOGIES The paper focuses on three modalities: face recognition, voice recognition, and hand geometry comparisons. The three biometric sensors referenced in this paper are a face recognition system by Visionics, a hand biometric system by Recognition Systems, and a voice recognition system by OTG using the SecurPBX demonstration system [11]. The experimental data referred to in the third section of the paper focussed on the three biometric sensors and was collected and analyzed by

3 346 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 35, NO. 3, AUGUST 2005 TABLE I USER TRANSACTION TIMES IN SECONDS face images (training faces) in the database. Face recognition accuracy suffers from the inherent variations in the image acquisition process in terms of image quality, geometry, illumination effects, as well as occlusions (glasses, facial hair, etc.). These major problems currently limit the accuracy of face recognition. C. Voice Verification Mansfield et al. A volunteer crew of 200 employees was used to test the biometric devices. A detailed approach about the methodology of determining the receiver operating curves (ROCs) for the above three sensors is given in [11]. These particular sensors differ in their universality, ability to extract unique features from the entire user population, and ease of use. The sensors are comparable in accuracy; this prevents a single modality from severely dominating the fusion process. The fusion management algorithm, however, can be applied to any set of biometric sensors with very simple modifications. Transaction time or the time required to collect biometric data is another performance parameter that led to the selection of the three modalities currently considered. The transaction times in Table I (in seconds) were experimentally determined for various biometric modalities in [11]. The transaction times include multiple attempts allowed for each user [11] and, hence, are longer than usual. The study by Mansfield et al. [11] stated that users are sensitive to transaction times exceeding 30 s. In order to maintain user-acceptable transaction times, the modalities in this paper have been chosen so that the system can collect multiple features within 30 s. This requires the features to be collected simultaneously. For example, face and voice features have the longest transaction times but the mean transaction time can be reduced from 37 to 22 s if the data are simultaneously collected. Each biometric technology must perform four basic tasks: biometric acquisition, feature extraction, matching, and decision making, as shown in Fig. 2. AMBM fuses the single sensor decisions. The next three subsections briefly describe the various biometric technologies referenced in this paper. A. Hand Geometry Comparisons Hand geometry is extremely user-friendly but has lower accuracy when compared to fingerprinting and iris scanning [12]. The lengths of the fingers as well as other hand-shape attributes are extracted from images and used in a feature representation of the hand. A relatively inexpensive camera can be used to acquire the features resulting in a low-cost system. Hand geometry systems, however, have relatively high F AR and F RR values. In a hand recognition system, jewelry such as rings can cause errors. Hand injuries also adversely affect the system accuracy. B. Face Recognition Human beings have always used face recognition for personal identification purposes. In automatic face recognition, computer systems use feature sets to match the test face image (newly acquired and unknown) against a single or collection of known Voice verification, like face recognition, is attractive because of its prevalence in human communication. Speaker identification suffers considerably from variations in the microphone and/or the transmission channel. The performance deteriorates badly as enrollment and acquisition conditions become increasingly mismatched. Background noise is a considerable problem. Variations in voice due to illness, emotion, or aging are other problems requiring further research. III. MULTIMODAL FUSION WITH AN ADAPTIVE BAYESIAN DECISION FRAMEWORK Recently, there has been a lot of interest in multimodal biometric identification systems [7], [8]. As discussed in the previous section, each modality has its own limitations, issues, and problems. One approach to improving biometric identification accuracy is solving the problems facing each biometric technology. This does not, however, address the issue of universality. The only approach to identifying someone who cannot provide a unique feature for a particular biometric modality is to use multiple modalities. For example, fingerprinting will never work for someone without hands. The approach described in this paper can address all the issues facing a biometric security system through adaptable integration of multiple sensors. Multimodal biometric fusion systems can be broadly categorized based on the type of information extracted from the sensor. In Fig. 3, these fusion categories are feature-level fusion, scorelevel fusion, and decision-level fusion [7]. Decision-level fusion is the most abstract level and consolidates multiple accept/reject decisions from multiple sensors into one decision. This approach takes advantage of the tailored processing performed by each biometric sensor. It also requires the least communication bandwidth and, thus, supports scalability in terms of the number and types of biometric sensors. Feature and score level fusion, however, have been shown to enhance accuracy to a greater degree than decision-level fusion. As the sensors become more dissimilar, however, feature- and score-level fusion become more complex, if not impossible, to accomplish. The next subsection describes the Bayesian decision fusion framework used in AMBM. A. Accuracy in the Bayesian Framework A Bayesian framework can be used as the basis of a fusion system that automatically adapts the security level as well as reacts to changes in the user s physical characteristics [12]. As a brief review, the problem of personal identification can be formulated as a hypothesis testing problem where the two hypotheses are as follows. H 0 Thepersonisanimposter.

4 VEERAMACHANENI et al.: AN ADAPTIVE MULTIMODAL BIOMETRIC MANAGEMENT ALGORITHM 347 Fig. 3. Levels of fusion. H 1 The person is genuine. The conditional probability density functions are p(u i H 1 ) and p(u i H 0 ), where u i is the decision of the ith biometric sensor given the genuine person and the imposter, respectively. The decision made by sensor i is { 0, person is an imposter u i = (1) 1, person is genuine The Bayesian cost, which is the error measure focused on in this paper, is based on the inaccuracy of the fusion system. It is composed of two types of error rates: the false rejection error rate and the false acceptance error rate. The false acceptance rate is the conditional probability of declaring someone as genuine if he is actually an imposter or F ARi = P (u i =1 H 0 ). (2) The false rejection rate is the conditional probability of declaring someone an imposter if he is actually genuine or F RRi = P (u i =0 H 1 ). (3) Since the algorithm is in a Bayesian framework, a Bayesian cost for the system is obtained from a weighted sum of the two global errors F AR and F RR. The global errors are computed based on the fusion rule and the individual sensor errors: (2) and (3). The computation of the global errors is discussed in more detail in Section IV. The Bayesian cost, minimized by the appropriate fusion rule, is E = C FA F AR + C FR F RR (4) where C FA is the cost of falsely accepting an imposter, C FR is the cost of falsely rejecting the genuine individual, F AR is the global false acceptance rate, and F RR is the global false rejection rate. This can be rewritten in terms of a single cost using giving C FR =2 C FA (5) E = C FA F AR +(2 C FA )F RR. (6) Equation (5) results from the fact that the global error is historically simply the sum of the two error rates if cost is ignored. Thus, the costs are assumed to be 1. The optimum Bayesian fusion rule minimizes the Bayesian cost (6) by selecting the rule and all single sensor operating points. The single sensor Fig. 4. Experimentally determined operating curves for 3 biometrics. observations and the corresponding decisions are assumed to be independent. The performance of a biometric sensor is often represented in terms of ROCs or a plot of genuine acceptance rate (G ARi ) versus F ARi. The genuine acceptance rate for sensor i is G ARi =1 F RRi. (7) Fig. 4 contains the ROC curves experimentally determined for the three sensors previously discussed [11]. An ROC for the fused systems can also be found for each Bayesian fusion rule using the F AR and the fused system s G AR where G AR =1 F RR. (8) Fig. 5 plots ROCs for the AND and OR rules applied to face and voice recognition systems. The AMBM algorithm finds the optimum decision rule that minimizes the system s Bayesian cost (6). The AMBM algorithm uses the given error costs and searches through the space of all possible rules and the sensor operating points. The sensor operating point is defined by a decision threshold that determines a sensor s F ARi and F RRi. Gaussian noise is assumed for the probability density functions (pdf) conditioned on the decision hypotheses. This assumption is supported by

5 348 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 35, NO. 3, AUGUST 2005 Fig. 7. Thresholding in terms of pdfs versus scores for sensor 2 (first example). Fig. 5. ROC for two sensors. Fig. 8. Thresholding in terms of pdfs versus scores for sensor 1 (second example). Fig. 6. Thresholding in terms of pdfs versus scores for sensor 1 (first example). the experimental data collected by Mansfield et al. Simulated pdfs based on experimental pdfs are used to model sensor performance and plotted in Figs These models are a close approximation of the experimental data in [11]. These models are key to AMBM using an evolutionary search technique to find the optimum decision fusion rules. The models can be modified in pseudoreal time to reflect changes in a sensor s performance, degradation, or improvement. If the security must be heightened or reduced, the system can react in real time, modifying the cost of false acceptance. A new optimum rule will be selected in response to a change in the error costs or sensor performance. B. Optimum Bayesian Decision Framework A Bayesian framework can be automatically adapted by selecting the F AR cost and F RR costs to reflect the security level and uniqueness of the user s biometrics. The decision concern- Fig. 9. Thresholding in terms of pdfs versus scores for sensor 2 (second example).

6 VEERAMACHANENI et al.: AN ADAPTIVE MULTIMODAL BIOMETRIC MANAGEMENT ALGORITHM 349 ing a person s genuineness is made through the following likelihood ratio test TABLE II FUSION RULES FOR TWO SENSORS p(u i H 1 ) u i =1 > p(u i H 0 ) < λ i (9) u i =0 where λ i is an appropriate threshold [13] [15]. Four possible decisions are as follows. 1) The genuine person is accepted. 2) The genuine person is rejected. 3) The imposter is accepted. 4) The imposter is rejected. The optimum Bayesian fusion rule allowing access to a building for N sensors is [14], [15] N [ ( ) ( )] 1 FRRi FRRi u i log +(1 u i ) log F ARi (1 F ARi ) u g ( ) =1 > CFA < log (10) u g =0 2 C FA i=1 where u g is the global decision, and u i is the decision of the ith sensor. The rule in (10) assumes an equal aprioriprobability of an imposter and genuine user. This assumption is based on the system s lack of knowledge concerning this factor. This parameter may be added to (10) if the probabilities are known and not equal. There is a total of 2 2N possible fusion rules for N sensors. C. Effects of Cost on Rule Selection By changing the Bayesian costs and directly modifying the optimum fusion rule in (10), the system can automatically vary its performance, which is defined by (4). The system performance is tightly tied to system accuracy in this paper. This is entirely a result of the system s purpose: security. It is a straightforward modification to AMBM to incorporate additional performance factors. These factors, however, do not affect the optimum Bayesian fusion rule in (10). If security is heightened, this system increases the cost of false acceptance. AMBM then finds the rule and sensor operating points to meet a cost that is driven by the Bayesian cost. For example, if everyone temporarily requires access to the building, the cost of admitting an imposter (C FA =0)may be set at 0. Conversely, the cost for falsely rejecting a genuine user becomes 2. For this situation, the optimum rule is simply 1 for every access attempt, allowing everyone access. For the fusion of the face and voice biometric sensor decisions, there are 16 potential rules possible, as depicted in Table II. The rules are represented by binary strings since the decisions are binary (i.e., imposter or genuine user). The optimum fusion rule of 1 is f 16, for example. It has been proven that an optimum fusion rule for any set of Bayesian costs is monotonic in [15], so all other rules can be ignored by AMBM. The most commonly used rules are f 2 (AND rule) and f 8 (OR rule). The NAND rule or f 9 is rarely of interest since it typically performs poorly. The f 1 rule simply allows no one in the building and can be used to lock up a building. Similarly, the f 16 rule allows everyone in. The system can completely ignore one sensor by using the f 4 (sensor 1) or f 6 (sensor 2) rules. In order to gain insight into the performance enhancements resulting from the fusion of two sensors, we present the global F AR and F RR as functions of the individual sensor F ARi and F RRi for two rules: AND and OR rules. The two-sensor F AR and F RR for the AND rule are and F AR = F AR1 F AR2 (11) F RR = F RR1 + F RR2 F RR1 F RR2. (12) It is apparent that this improves F AR while degrading the F RR. The G AR decreases as well. The degradation can be significant if the two sensors are not comparable in terms of accuracy. The OR rule reverses this effect giving and F AR = F AR1 + F AR2 F AR1 F AR2 (13) F RR = F RR1 F RR2. (14) The ROCs for these two rules (see Fig. 5), support a comparison of the rules performance. The OR rule ROC quickly falls off as the F AR decreases. Thus, the OR rule does not achieve as high a G AR for low F AR values. There is a point between F AR values 0.001% and 1%, where the two curves cross. This crossover point is related to single sensor accuracy. For larger F AR values, the OR rule works to improve performance in terms of G AR.ForlowerF AR values, the AND rule improves G AR.This example demonstrates that for two sensors, the performance gain is constrained by the less-accurate sensor. One must select to improve either the F AR or F RR but not both. Both error types may be reduced with the addition of a third biometric sensor with better accuracy characteristics than the first two sensors. The problem of analyzing all possible rules, however, begins to become more complex as there are now potentially 2 23 or 256 fusion rules. Once again, most of these rules can be ignored due to the monotonic constraint, leaving only 20 rules [15]. For added insight, a comparison in Fig. 10 is

7 350 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 35, NO. 3, AUGUST 2005 TABLE III OPTIMAL FUSION RULES FOR SAME OPERATING POINT (FAR1 = FAR2 = FRR1 = FRR2 = 10%) TABLE IV OPTIMAL SENSOR RULES IF ONE SENSOR DOMINATES FRR (FAR 1 =9%, FRR 1 =0.6%, FAR 2 =1%, FRR 2 =4%) Fig. 10. ROC comparison for AND rule. made between hand, face, and voice verification sensor systems in terms of the ROC s assumption that the AND rule is used. The ROC shifts from the lower right for one sensor to the upper left for three sensors, demonstrating global accuracy improvement for most F AR values as more sensors are added. The three sensor system provides a higher G AR for the same F AR value. However, the single voice biometric performs better than the two and three sensor systems for very high F AR values. Another fusion rule is optimal and performs better for this range of F AR values. The AMBM algorithm can vary F AR cost in (4) to increase the impact of either error type. The local decisions are first weighted by the accuracy of the sensors current operating points and then compared with a threshold in (10). If the costs are equal, the threshold on right side of (9) is 0. The threshold increases as the cost of FAR increases. The rule accounts for the inherent accuracy of the sensor through the single sensor accuracy values on the left side of (9). The sensor decisions are incorporated through u i on the left side of (9) as well. For example, a table of optimal fusion rules as a function of F AR costs can be constructed as shown in Table III. Identical sensors with the same operating point were used to generate the table. This would also correspond to the use of multiple attempts to attain access using the same biometric sensor if independence is assumed. If the F AR is more costly (C FA =1 to 1.976), the AND rule is optimal. If the F RR is more costly (C FA = to 1), the OR rule is optimal. There is a very small range of costs (C FA =0to ) that allows everyone access. Another small cost range (C FA =1.976 to 2) corresponds to rejecting everyone s access. The OR and AND rules transition at a cost equal to 1 (i.e., when both errors are equally costly). In contrast, another set of sensor operating points, where one sensor dominates in either F AR or F RR, is summarized in Table IV. In this example, sensor 1 dominates F RR but has a poor F AR. Sensor 2 has better F AR values. The AMBM algorithm must use Sensor 2 s F AR to improve the global F AR by using the AND rule. The table indicates that the AND rule remains optimal for F AR costs ranging from through Conversely, the OR rule becomes optimal for F AR costs of to It is important to note that the optimum fusion rule for F AR costs between and relies on only one sensor, sensor 2. Fig. 11 plots the Bayesian cost as a function of F AR cost for the three primary rules selected in Table IV. The lines cross at the points where the optimum rule switches. The costs and rules change for every set of sensor operating points selected. The next section describes the AMBM algorithm that uses cost, operating points, and fusion rules to adapt the system s global accuracy. IV. ADAPTIVE MULTIMODAL BIOMETRIC MANAGEMENT ALGORITHM The AMBM algorithm, as introduced previously, is composed of three major components: a particle swarm optimizer (PSO), a mission manager, and the Bayesian fusion processor (Fig. 2). The PSO, which is key to the success of AMBM, has been designed to search the global fusion rule space, which is binary, and the sensor operating point space, which is continuous. The optimum rule is selected and passed to the fusion processor. Finally, the Bayesian fusion processor applies the optimum rule to make global decisions from the local decisions as users access

8 VEERAMACHANENI et al.: AN ADAPTIVE MULTIMODAL BIOMETRIC MANAGEMENT ALGORITHM 351 TABLE V FUSION RULE FORMATION FOR TWO SENSORS global best position P g. The velocity is updated by [18] [20] ( ) V (t+1) md = ω V (t) md + rand(1) Ψ 1 p md X (t) md ( ) + rand(1) Ψ 2 p gd X (t) md (15) and the position is updated by Fig. 11. Cost versus PSO total cost for the operating point in Table IV. X (t+1) md = X (t) md + V (t+1) md. (16) the system. The costs of the system errors, which are computed in the mission manager, are dependent on many factors. This section focuses on the unique PSO used in AMBM. A. PSO Approach PSO was originally introduced in terms of social and cognitive behavior by Kennedy and Eberhart in 1995 [16]. PSO has come to be widely used as a problem-solving approach in engineering and computer science and has since proven to be a powerful competitor to genetic algorithms [17]. This approach is simple and comprehensible as it is derived from the social behavior of individuals such as birds, fish, and other subjects of swarming theory. The individuals, called particles, are flown through the multidimensional search space. Each particle tests a possible solution to the multidimensional problem as it moves through the problem space. The movement of the particles is influenced by two factors: the particle s best solution (pbest) and the global best solution found by all the particles (gbest). These factors influence the particle s velocity through the search space by creating an attractive force. As a result, the particle interacts with all the neighbors and stores in its memory optimal location information. After each iteration, the pbest and gbest are updated if a more optimal solution is found by the particle or population, respectively. This process is continued iteratively until either the desired result is achieved or the computational power is exhausted. The PSO formulas define each particle in the D-dimensional space as X m =(x m1,x m2,x m3,...x md ), where the subscript m represents the particle number, and the second subscript is the dimension. The memory of the previous best position is represented as P m =(p m1,p m2,p m3...p md ) and a velocity along each dimension as V m =(v m1,v m2,v m3...v md ) [18]. After each iteration, the velocity term is updated. The particle s motion is influenced by its own best position P m,aswellasthe Constants Ψ 1 and Ψ 2 determine the relative influence of the pbest and gbest. Often these are set to same value giving equal weight to both. The memory of the PSO is controlled by ω. Each particle in this problem has N +1 dimensions, where N is the number of sensors in the sensor suite. The first N dimensions are the sensor thresholds for all sensors in the sensor suite. The (N +1)th dimension is the fusion rule, which determines how all the decisions from the sensors are fused. Hence, the representation of each particle is X m = {λ m1,λ m2,λ m3,...,λ mn,f m }. (17) The sensor thresholds are continuous. In contrast, the fusion rule (f) is a binary string having a length of s = log 2 p (18) where p =2 2N.Therulef may be represented by an integer value varying from 0 f p 1. This proved to be inefficient due to all the bounding that was required in AMBM. For this binary search space, the binary decision model and search strategy as described in [19] are being used. This binary decision model results in a much faster convergence than the integer number model. In the algorithm instead of evolving the thresholds explicitly, the false acceptance rates (F AR ) are evolved in the PSO for each of the sensors. Thresholds are calculated based on the F AR and sensor models determined a priori and updated. The PSO minimizes the cost, (6). The global F AR and the F RR for the optimum fusion rule f are calculated directly from the fusion rule and individual sensor F ARi and F RRi. For example, with two sensors, the fusion rule consists of 4 bits, as represented in Table V. In Table V, u 1 is the first sensor decision, and u 2 is the second sensor decision. The global decision replaces {d 0,d 1,d 2,d 3 } with 0s and 1s in their respective locations within f. The global

9 352 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 35, NO. 3, AUGUST 2005 TABLE VI MEANS AND STANDARD DEVIATIONS OF THE GAUSSIAN DISTRIBUTIONS FOR TWO SENSORS TABLE VII PSO PARAMETERS TABLE VIII TABLE CONTAINING THE RESULTING OPERATING POINTS AND ERROR RATES AFTER ITERATIONS error rates can then be computed directly from s 1 N F AR = d i (19) where and Ψ ARj = i=0 Ψ ARj j=1 { 1 FARj, (u j =0) F ARj, (u j =1) s 1 N F RR = (1 d i ) i=0 Ψ RRj j=1 (20) (21) where { FRRj, (u j =0) Ψ RRj = (22) 1 F RRj, (u j =1) The PSO cost function, which is the objective function optimized by the PSO, is E a = C FA (F ARa F ARd ) +(2 C FA ) (F RRa F RRd ). (23) F ARa and F RRa are the achieved global false acceptance and rejection rates estimated using the apriorisensor models. F ARd and F RRd are the desired global false acceptance and rejection rates from the mission manager. AMBM adapts to the required error rates preventing overdesign of the rule by using (20) as the PSO objective function. B. PSO Performance This section demonstrates the effectiveness of the swarm in selecting the optimal rule and operating points dynamically to meet the general security requirements of the system. The results of AMBM for the two false acceptance costs of 1.8 and 1.9 demonstrate the volatility of the algorithm. The same a priori sensor models are used in both runs. Table VI contains the means and standard deviations used in selecting the sensor operating points if Gaussian distributions are assumed. These distributions are important to the PSO because they provide a model that is continuous over the region of operation. This infinite search space requires an evolutionary search approach. The distribution parameters are used by the swarm to compute the threshold and the false rejection rate for any particular false acceptance rate. The sensor operating points are passed to the sensors modifying their individual operation as shown in Fig. 2. The sensor s new threshold is applied in the decision processing illustrated in Fig. 3. Thus, the AMBM modifies the single sensor operation through its threshold feedback. Figs. 6 9 show the thresholds in terms of score on the x-axis. The swarm parameters used for the run are shown in Table VI. Table VIII shows the results obtained by running the swarm with C FA =1.9 and C FA =1.8, respectively. Although the cost has been decreased by only 0.1, the swarm switches from an AND rule to an OR rule with very different operating point sets. For the higher cost of 1.9, the swarm converged to a final solution after 550 iterations. The slightly lower cost of 1.8 took much longer with a solution emerging after 3500 iterations. A balance must be maintained in the choice of the swarm parameters such as ω, which controls memory, to assure convergence as well as prevent premature convergence. A suboptimal solution may be reached if premature convergence occurs, which is the primary risk in using any evolutionary algorithm approach. In this example, the dominance of sensor 2 in terms of accuracy slows convergence of the PSO. The false acceptance costs are set very high, 1.8 and 1.9, so that the optimal solution seems counterintuitive initially and requires careful analysis. For the C FA of 1.8 case, Figs. 6 and 7 illustrate the sensor distributions and thresholds to be used with the OR fusion rule after iterations. The threshold for sensor 1 is extremely high, giving a more acceptable false acceptance rate but high genuine user rejection rate (64%); thus, sensor 2 is relied on most of the time. This aligns with the final selection of the OR rule. The PSO cost is , indicating that the desired performance criteria is nearly met. The PSO cost plotted as a function of swarm iteration is given in Fig. 12. It is interesting to note that if the AND rule is applied instead of the OR rule as selected by AMBM for these sensor thresholds, the PSO cost increases dramatically to For the second case with C FA =1.9,theAND rule is selected by the swarm. The details are given in Table VIII after 1000 iterations. The operating point for sensor 2 is nearly identical to the previous case as illustrated in Fig. 9. Sensor 1 s threshold, however, is reduced significantly in Fig. 8. Sensor 1 now has

10 VEERAMACHANENI et al.: AN ADAPTIVE MULTIMODAL BIOMETRIC MANAGEMENT ALGORITHM 353 TABLE IX TABLE SHOWING THE RANGES OF C FA AND CORRESPONDING RULE Fig. 12. Fig. 13. PSO cost versus PSO iteration (first example). PSO cost versus PSO iteration (second example). a higher rate of false acceptance but a more tolerable false rejection rate. The accuracy of sensor 2 is used to offset the high false acceptance rate of sensor 1. The PSO cost is nearly the same as in the previous case (0.0102). If the wrong rule such as the OR rule is applied, the PSO cost increases to Fig. 13 represents the minimum of PSO cost achieved by the swarm after each iteration. This PSO cost plot illustrates the step characteristic, which results from the current minimum PSO cost being maintained until a better PSO cost is found. The swarm particles are moving through the search space testing different parameter sets and sharing their best solutions. When a new global best solution is found, the minimum PSO cost and the particles memory are replaced with the newly found better solution. Convergence occurs when all particles produce the same minimum Bayesian cost. It is possible for the particles to present more than one optimal solution in this search space. If multiple solutions yield the same PSO cost, the solutions are viewed as being on the Pareto surface. Any one of the resulting solutions can be selected as a final solution. In such a case, other constraints such as transaction time and ease of use may be introduced to select the most desirable solution. V. AMBM PERFORMANCE RESULTS This section presents the solutions lying on the Pareto surface for the complete range of costs (0 through 2). A Monte Carlo simulation ran the AMBM algorithm 100 times for the same cost with 1000 iterations per run. The biometric sensor suite consists of two sensors, which are modeled by the Gaussian distributions described in Table VI. In this case, sensor 2 is more accurate and dominant in the sensor suite. Each Monte Carlo run successfully converged to an appropriate solution with comparable minimum PSO costs for every false acceptance cost. Although the runs did not consistently select the same solution, the selected solution met the AMBM performance criteria. The solutions consist of the rule and the sensor operating point defined by its false acceptance rate and false rejection rate in Table VI. The sensor threshold can be computed from the sensor s error rates and distributions. Fig. 14 shows the percentage of trials for which a particular rule has been selected as a function of the false acceptance cost. Table IX summarizes the results showing the ranges of costs and the most probable rule selected. The OR rule, f 8, is more probable when the cost of false acceptance is low (0 0.5). Due to sensor 2 s dominance, there is a range of costs ( ) for which the system simply ignores sensor 1 s decisions. For higher costs of false acceptance ( ), the AND rulef 2 is most frequently selected. The swarm optimization algorithm, however, is able to find multiple solutions involving different fusion rules for one particular global false acceptance cost with equivalent PSO costs. For example, the swarm selected rule f 2 76% of the time, f 6 19% of the time, and f 8 5% for a C FA of 1.9. A comparison of these three rules (for a C FA of 1.9) in terms of minimum PSO cost indicates two things: The operating points were different and standard deviation of the minimum PSO cost was as low as 6.9 e-04 with a mean of The operating points of sensors differed according to the selected rule as demonstrated in Table X. The low standard deviation of the resulting minimum PSO cost (6.9 e-04 for a C FA of 1.9) over the 100 trials indicates that optimality has been achieved independently of the rule chosen. Thus, the AMBM algorithm selected optimal rules and sensor operating points for two sensors with approximately equal PSO costs. A second example is provided in Table X for a cost of 0.1. The operating points and rules are very different for nearly equal PSO costs. This can be extended to any number of sensors in the sensor suite. Table XI shows the values for two more costs, i.e., C FA =1.4 and C FA =1.6. AMBM selects f 6 40% of the time for a cost of 1.4 and f 2 56% of the time for a cost of 1.6. The swarm also selects the operating points to achieve optimal solutions.

11 354 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 35, NO. 3, AUGUST 2005 Fig. 14. Probability of selecting fusion rule versus cost of false acceptance. TABLE X DETAILED ANALYSIS OF PSO SOLUTION DEMONSTRATING CONVERGENCE TABLE XI COMPARISON ANALYSIS OF MOST PROBABLE PSO SOLUTION OVER SMALL COST DIFFERENCE With a cost of 1.4, the swarm uses only a single sensor sensor 2 which has higher accuracy, and ignores the other sensor. Sensor 1 s operating parameters actually do not matter for this case and have no impact on performance. As the cost of false acceptance increases to 1.6, AMBM selects the AND rule so that even sensor 1 is needed to achieve the desired accuracy. In conclusion, the analysis of the rules and sensor configurations in Tables IX XI support the following: the use of false acceptance cost as a mechanism to effectively control system performance and PSO s ability in finding an optimal solution for different

12 VEERAMACHANENI et al.: AN ADAPTIVE MULTIMODAL BIOMETRIC MANAGEMENT ALGORITHM 355 costs (C FA ) by changing operating points of each sensor as well as the fusion rule. VI. SUMMARY AND CONCLUSIONS The paper presents a novel sensor management algorithm that controls decision fusion and meets the global performance needs of a biometric personal identification system. Cost of false acceptance is a weighting parameter that is used to adaptively control the system s performance in real time. For example, if the security level is normally operating with a C FA of 1.4, the users are required to provide only a single biometric via sensor 2. This is assuming the same biometric sensor suite that is dominated by sensor 2 in Table VI. If the general security level is now increased so that the C FA is 1.6, all users would be required to supply two biometrics to gain access. This improves system accuracy so that the probability of granting an imposter access declines. The users will find the system more complex to use and require more transaction time. Thus, the AMBM algorithm presented in Fig. 2 adapts to changing security needs in real time. The performance characteristics of the individual biometric sensors comprising the sensor suite profoundly impact the accuracy, universality, and ease of use. Although the algorithm naturally compensates for sensor weakness, sensors should be selected with comparable accuracy characteristics. The AMBM algorithm, as presented, focuses on system accuracy. Universality and ease of use can easily be incorporated into the PSO cost so that AMBM automatically takes these factors into account in the selection of the solution. The previously discussed cost change of 0.2 resulted in the system requiring a second biometric. This impacts ease of use. The solution requiring only one sensor has a higher ease of use than a solution requiring two or more sensors. Also, if someone were incapable of supplying unique biometric features for one modality, another modality must be available. The AMBM algorithm presented can be easily modified to address these important issues and any others that may emerge in a biometric security system. The real-time adaptability of the AMBM algorithm is the key attribute, making it a strong sensor management solution. [11] T. Mansfield, G. Kelly, D. Chandler, and J. Kane, Biometric product testing final report, computing, Nat. Phys. Lab., U.K., Mar [12] L. Osadciw, P. K. Varshney, and K. Veeramachaneni, Improving personal identification accuracy using multisensor fusion for building access control applications, in Proc. Fifth Int. Conf. Inf. Fusion,vol.2,Annapolis, MD, July [13] S. M. Kay, Fundamentals of Statistical Signal Processing: Detection Theory. Englewood Cliffs, NJ: Prentice-Hall, 1998, vol. II, pp [14] R. Viswanathan and P. K. Varshney, Distributed detection with multiple sensors: Part I Fundamentals, Proc. IEEE, vol. 85, no. 1, pp , Jan [15] P. K. Varshney, Distributed Detection and Data Fusion. NewYork: Springer, [16] A. K. Jain, R. M. Bolle, and S. Pankanti, Eds., Biometrics: Personal Identification in a Network Society. Norwell, MA: Kluwer, [17] R. Eberhart and Y. Shi, Comparison between genetic algorithms and particle swarm optimization, presented at the 7th Annual Conf. Evolutionary Programming, San Diego, CA, Mar [18] A. Carlisle and G. Dozier, Adapting particle swarm optimization to dynamic environments, in Proc. Int. Conf. Artifi. Intell., Las Vegas, NV, Jun. 2000, pp [19] J. Kennedy, R. C. Eberhart, and Y. H. Shi, Swarm Intelligence V. San Mateo, CA: Morgan Kaufmann, Jun [20] R. Eberhart and J. Kennedy, A new optimizer using particles swarm theory, in Proc. Sixth Int. Symp. Micro Machine Human Science, Nayoga, Japan, Oct. 1995, pp [21] K. Veeramachaneni, T. Peram, C. Mohan, and L. A. Osadciw, Optimization using particle swarm with near neighbor interactions, presented at the GECCO, Chicago, IL, Jul [22] Biometrics: Complete Identification verification Resource [Online] www. findbiometrics.com/pages/lead3.html. [23] T. Peram, K. Veeramachaneni, and C. Mohan, Fitness distance ratio based particle swarm optimization, in Proc. Swarm Intelligence Symp., Indianapolis, IN, Apr , Kalyan Veeramachaneni received the B.S. degree from Jawahar Lal Nehru Technological University, Hyderabad, India. He received the M.S. degree from Syracuse University, Syracuse, NY. Currently he is pursuing the Ph.D. degree in electrical engineering from Syracuse University. His research interests include distributed sensor networks, evolutionary algorithms, and biologically inspired algorithms. REFERENCES [1] J. D. Woodward Jr., Biometrics: Facing up to terrorism, presented at the Biometrics Consortium Conf., Arlington, VA, Feb [2] S. King, Personal identification pilot study, presented at the Biometrics Consortium Conf., Arlington, VA, Feb [3] Forrester Research (2001). [Online]. Available: [4] Gartner Group (2001). [Online]. Available: [5] L. Hong and A. Jain, Integrating faces and fingerprints for personal identification, IEEE Trans. Pattern Anal. Machine Intell.,vol.20,no.12, pp , Dec [6] S. Prabhakar and A. Jain, Decision-level fusion in fingerprint verification, Pattern Recognit., vol. 35, pp , Feb [7] S. Panikanti, R. M. Bolle, and A. Jain, Biometrics: The future of identification, IEEE Comput., vol. 33, no. 2, pp , Feb [8] A. K. Jain, S. Prabhakar, and S. Chen, Combining multiple matchers for a high security fingerprint verification system, Pattern Recognit. Lett., vol. 20, no , pp , Nov [9] R. W. Frischholz and U. Deickmann, BioID: A multimodal biometric identification system, IEEE Comput., vol. 33, no. 2, Feb [10] L. Hong, A. K. Jain, and S. Panikanti, Can multibiometrics improve perfomance? in Proc. AutoID, Summit, NJ, Oct. 1999, pp Lisa Ann Osadciw (SM 00) received the B.S. degree in electrical engineering from Iowa State University, Ames, in She received the M.S.E.E. degree from Syracuse University, Syracuse, NY, in 1990 and the Ph.D. degree in electrical engineering from University of Rochester, Rochester, NY, in She is currently an Assistant Professor with the Department of Electrical Engineering Syracuse University, and an IEEE Program Evaluator for the Engineering Accredition Commission (EAC) of the Accredition Board for Engineering and Technology (ABET). She previously held a position as staff research engineer with Lockheed Martin in radar and sonar systems. Her research at Lockheed Martin focused on designing optimum signals, developing signal and data processors, and analyzing the performance of various sensor systems. Her research interests lie primarily in designing spread spectrum signals and signal processing techniques for multisensor and communication systems.

13 356 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 35, NO. 3, AUGUST 2005 Pramod K. Varshney (F 97) received the B.S. degree in electrical engineering and computer science (with highest honors) and the M.S. and Ph.D. degrees in electrical engineering from the University of Illinois at Urbana-Champaign in 1972, 1974, and 1976, respectively. Since 1976 he has been with Syracuse University, Syracuse, NY, where he is currently a Professor of electrical engineering and computer science. His current research interests are in distributed sensor networks and data fusion, detection and estimation theory, wireless communications, image processing, remote sensing, and radar signal processing. He is the author of Distributed Detection and Data Fusion (New York: Springer-Verlag, 1997). Dr. Varshney was a James Scholar, a Bronze Tablet Senior, and a Fellow while at the University of Illinois. He is the recipient of the 1981 ASEE Dow Outstanding Young Faculty Award. He was the guest editor of the special issue on data fusion of the Proceedings of the IEEE, January In 2000, he received the Third Millennium Medal from the IEEE and the Chancellor s Citation for exceptional academic achievement at Syracuse University. He serves as a distinguished lecturer for the AES society of the IEEE.

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu

More information

Adaptive Multimodal Biometric Fusion Algorithm Using Particle Swarm

Adaptive Multimodal Biometric Fusion Algorithm Using Particle Swarm Adaptive Multimodal Biometric Fusion Algorithm Using Particle Swarm Kalyan Veeramachaneni, Lisa Ann Osadciw and Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University

More information

Adaptive Multimodal Biometric Fusion Algorithm Using Particle Swarm

Adaptive Multimodal Biometric Fusion Algorithm Using Particle Swarm Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 2003 Adaptive Multimodal Biometric Fusion Algorithm Using Particle Swarm Kalyan Veeramachaneni

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

ELK ASIA PACIFIC JOURNAL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS. ISSN: ; ISSN: (Online) Volume 2 Issue 1 (2016)

ELK ASIA PACIFIC JOURNAL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS. ISSN: ; ISSN: (Online) Volume 2 Issue 1 (2016) www.elkjournals.com SURVEY ON FUSION OF MULTIMODAL BIOMETRICS USING SCORE LEVEL FUSION S.MOHANA PRAKASH P.BETTY K.SIVANARULSELVAN P.G student Assistant Professor Associate Professor Department of computer

More information

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization 2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic

More information

Peg-Free Hand Geometry Verification System

Peg-Free Hand Geometry Verification System Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu

More information

Tracking Changing Extrema with Particle Swarm Optimizer

Tracking Changing Extrema with Particle Swarm Optimizer Tracking Changing Extrema with Particle Swarm Optimizer Anthony Carlisle Department of Mathematical and Computer Sciences, Huntingdon College antho@huntingdon.edu Abstract The modification of the Particle

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

Argha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India.

Argha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India. Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Training Artificial

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

Optimization Using Particle Swarms with Near Neighbor Interactions

Optimization Using Particle Swarms with Near Neighbor Interactions Optimization Using Particle Swarms with Near Neighbor Interactions Kalyan Veeramachaneni, Thanmaya Peram, Chilukuri Mohan, and Lisa Ann Osadciw Department of Electrical Engineering and Computer Science

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

Fusion of Hand Geometry and Palmprint Biometrics

Fusion of Hand Geometry and Palmprint Biometrics (Working Paper, Dec. 2003) Fusion of Hand Geometry and Palmprint Biometrics D.C.M. Wong, C. Poon and H.C. Shen * Department of Computer Science, Hong Kong University of Science and Technology, Clear Water

More information

ARMA MODEL SELECTION USING PARTICLE SWARM OPTIMIZATION AND AIC CRITERIA. Mark S. Voss a b. and Xin Feng.

ARMA MODEL SELECTION USING PARTICLE SWARM OPTIMIZATION AND AIC CRITERIA. Mark S. Voss a b. and Xin Feng. Copyright 2002 IFAC 5th Triennial World Congress, Barcelona, Spain ARMA MODEL SELECTION USING PARTICLE SWARM OPTIMIZATION AND AIC CRITERIA Mark S. Voss a b and Xin Feng a Department of Civil and Environmental

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization

Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization M. Shahab Alam, M. Usman Rafique, and M. Umer Khan Abstract Motion planning is a key element of robotics since it empowers

More information

Modified Particle Swarm Optimization

Modified Particle Swarm Optimization Modified Particle Swarm Optimization Swati Agrawal 1, R.P. Shimpi 2 1 Aerospace Engineering Department, IIT Bombay, Mumbai, India, swati.agrawal@iitb.ac.in 2 Aerospace Engineering Department, IIT Bombay,

More information

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-"&"3 -"(' ( +-" " " % '.+ % ' -0(+$,

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-&3 -(' ( +-   % '.+ % ' -0(+$, The structure is a very important aspect in neural network design, it is not only impossible to determine an optimal structure for a given problem, it is even impossible to prove that a given structure

More information

Biometric Security System Using Palm print

Biometric Security System Using Palm print ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

A NEW FRAMEWORK FOR ADAPTIVE MULTIMODAL BIOMETRICS MANAGEMENT. Ajay Kumar, Vivek Kanhangad, David Zhang ABSTRACT

A NEW FRAMEWORK FOR ADAPTIVE MULTIMODAL BIOMETRICS MANAGEMENT. Ajay Kumar, Vivek Kanhangad, David Zhang ABSTRACT IEEE Transactions on Information Forensics and Security vol. 5, pp. 92-102, Mar. 2010 A NEW FRAMEWORK FOR ADAPTIVE MULTIMODAL BIOMETRICS MANAGEMENT Ajay Kumar, Vivek Kanhangad, David Zhang ABSTRACT This

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques

Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques Nasser Sadati Abstract Particle Swarm Optimization (PSO) algorithms recently invented as intelligent optimizers with several highly

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of GA and PSO over Economic Load Dispatch Problem Sakshi Rajpoot sakshirajpoot1988@gmail.com Dr. Sandeep Bhongade sandeepbhongade@rediffmail.com Abstract Economic Load dispatch problem

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

A Novel Approach to Improve the Biometric Security using Liveness Detection

A Novel Approach to Improve the Biometric Security using Liveness Detection Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric

More information

Feature weighting using particle swarm optimization for learning vector quantization classifier

Feature weighting using particle swarm optimization for learning vector quantization classifier Journal of Physics: Conference Series PAPER OPEN ACCESS Feature weighting using particle swarm optimization for learning vector quantization classifier To cite this article: A Dongoran et al 2018 J. Phys.:

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

Optimized Algorithm for Particle Swarm Optimization

Optimized Algorithm for Particle Swarm Optimization Optimized Algorithm for Particle Swarm Optimization Fuzhang Zhao Abstract Particle swarm optimization (PSO) is becoming one of the most important swarm intelligent paradigms for solving global optimization

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

An Algorithm for Feature Level Fusion in Multimodal Biometric System

An Algorithm for Feature Level Fusion in Multimodal Biometric System An Algorithm for Feature Level Fusion in Multimodal Biometric System 1 S.K.Bhardwaj 1 Research Scholar, Singhania University, Jhunjhunu, Rajasthan (India) Abstract The increasing demand for high secure

More information

FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION

FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION Suranaree J. Sci. Technol. Vol. 19 No. 4; October - December 2012 259 FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION Pavee Siriruk * Received: February 28, 2013; Revised: March 12,

More information

BIOMETRIC TECHNOLOGY: A REVIEW

BIOMETRIC TECHNOLOGY: A REVIEW International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 287-291 BIOMETRIC TECHNOLOGY: A REVIEW Mohmad Kashif Qureshi Research Scholar, Department of Computer

More information

The Design of Pole Placement With Integral Controllers for Gryphon Robot Using Three Evolutionary Algorithms

The Design of Pole Placement With Integral Controllers for Gryphon Robot Using Three Evolutionary Algorithms The Design of Pole Placement With Integral Controllers for Gryphon Robot Using Three Evolutionary Algorithms Somayyeh Nalan-Ahmadabad and Sehraneh Ghaemi Abstract In this paper, pole placement with integral

More information

THREE PHASE FAULT DIAGNOSIS BASED ON RBF NEURAL NETWORK OPTIMIZED BY PSO ALGORITHM

THREE PHASE FAULT DIAGNOSIS BASED ON RBF NEURAL NETWORK OPTIMIZED BY PSO ALGORITHM THREE PHASE FAULT DIAGNOSIS BASED ON RBF NEURAL NETWORK OPTIMIZED BY PSO ALGORITHM M. Sivakumar 1 and R. M. S. Parvathi 2 1 Anna University, Tamilnadu, India 2 Sengunthar College of Engineering, Tamilnadu,

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization Cell-to-switch assignment in cellular networks using barebones particle swarm optimization Sotirios K. Goudos a), Konstantinos B. Baltzis, Christos Bachtsevanidis, and John N. Sahalos RadioCommunications

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College

More information

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi

More information

Local Image Registration: An Adaptive Filtering Framework

Local Image Registration: An Adaptive Filtering Framework Local Image Registration: An Adaptive Filtering Framework Gulcin Caner a,a.murattekalp a,b, Gaurav Sharma a and Wendi Heinzelman a a Electrical and Computer Engineering Dept.,University of Rochester, Rochester,

More information

Multimodal Biometric System in Secure e- Transaction in Smart Phone

Multimodal Biometric System in Secure e- Transaction in Smart Phone Multimodal Biometric System in Secure e- Transaction in Smart Phone Amit Kumar PG Student Department of computer science.,sssist, Sehore Kailash Patidar Professor Department of computer science,sssist,

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

PARTICLE SWARM OPTIMIZATION (PSO)

PARTICLE SWARM OPTIMIZATION (PSO) PARTICLE SWARM OPTIMIZATION (PSO) J. Kennedy and R. Eberhart, Particle Swarm Optimization. Proceedings of the Fourth IEEE Int. Conference on Neural Networks, 1995. A population based optimization technique

More information

SIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION

SIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION SIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION Kamil Zakwan Mohd Azmi, Zuwairie Ibrahim and Dwi Pebrianti Faculty of Electrical

More information

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals

More information

Reconfiguration Optimization for Loss Reduction in Distribution Networks using Hybrid PSO algorithm and Fuzzy logic

Reconfiguration Optimization for Loss Reduction in Distribution Networks using Hybrid PSO algorithm and Fuzzy logic Bulletin of Environment, Pharmacology and Life Sciences Bull. Env. Pharmacol. Life Sci., Vol 4 [9] August 2015: 115-120 2015 Academy for Environment and Life Sciences, India Online ISSN 2277-1808 Journal

More information

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,

More information

MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS

MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS I. Introduction James L. Wayman, Director U.S. National Biometric Test Center College of Engineering San

More information

A HYBRID ALGORITHM BASED ON PARTICLE SWARM OPTIMIZATION

A HYBRID ALGORITHM BASED ON PARTICLE SWARM OPTIMIZATION INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 1, Number 3-4, Pages 275-282 2005 Institute for Scientific Computing and Information A HYBRID ALGORITHM BASED ON PARTICLE SWARM OPTIMIZATION

More information

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM Journal of Al-Nahrain University Vol.10(2), December, 2007, pp.172-177 Science GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM * Azhar W. Hammad, ** Dr. Ban N. Thannoon Al-Nahrain

More information

Optimized Node Deployment using Enhanced Particle Swarm Optimization for WSN

Optimized Node Deployment using Enhanced Particle Swarm Optimization for WSN Optimized Node Deployment using Enhanced Particle Swarm Optimization for WSN Arvind M Jagtap 1, Prof. M.A.Shukla 2 1,2 Smt. Kashibai Navale COE, University of Pune, India Abstract Sensor nodes deployment

More information

Particle Swarm Optimization

Particle Swarm Optimization Particle Swarm Optimization Gonçalo Pereira INESC-ID and Instituto Superior Técnico Porto Salvo, Portugal gpereira@gaips.inesc-id.pt April 15, 2011 1 What is it? Particle Swarm Optimization is an algorithm

More information

Secure and Private Identification through Biometric Systems

Secure and Private Identification through Biometric Systems Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant

More information

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu

More information

K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion

K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India

More information

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization J.Venkatesh 1, B.Chiranjeevulu 2 1 PG Student, Dept. of ECE, Viswanadha Institute of Technology And Management,

More information

Better than best: matching score based face registration

Better than best: matching score based face registration Better than best: based face registration Luuk Spreeuwers University of Twente Fac. EEMCS, Signals and Systems Group Hogekamp Building, 7522 NB Enschede The Netherlands l.j.spreeuwers@ewi.utwente.nl Bas

More information

A Native Approach to Cell to Switch Assignment Using Firefly Algorithm

A Native Approach to Cell to Switch Assignment Using Firefly Algorithm International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 2(September 2012) PP: 17-22 A Native Approach to Cell to Switch Assignment Using Firefly Algorithm Apoorva

More information

1 Lab + Hwk 5: Particle Swarm Optimization

1 Lab + Hwk 5: Particle Swarm Optimization 1 Lab + Hwk 5: Particle Swarm Optimization This laboratory requires the following equipment: C programming tools (gcc, make), already installed in GR B001 Webots simulation software Webots User Guide Webots

More information

Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation

Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation Ripandeep Kaur 1, Manpreet Kaur 2 1, 2 Punjab Technical University, Chandigarh Engineering College, Landran, Punjab, India Abstract:

More information

Designing of Optimized Combinational Circuits Using Particle Swarm Optimization Algorithm

Designing of Optimized Combinational Circuits Using Particle Swarm Optimization Algorithm Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2395-2410 Research India Publications http://www.ripublication.com Designing of Optimized Combinational Circuits

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Level of Fusion

More information

IMPROVING THE PARTICLE SWARM OPTIMIZATION ALGORITHM USING THE SIMPLEX METHOD AT LATE STAGE

IMPROVING THE PARTICLE SWARM OPTIMIZATION ALGORITHM USING THE SIMPLEX METHOD AT LATE STAGE IMPROVING THE PARTICLE SWARM OPTIMIZATION ALGORITHM USING THE SIMPLEX METHOD AT LATE STAGE Fang Wang, and Yuhui Qiu Intelligent Software and Software Engineering Laboratory, Southwest-China Normal University,

More information

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Fingerprint Image Enhancement Algorithm and Performance Evaluation Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,

More information

Classification of Face Images for Gender, Age, Facial Expression, and Identity 1

Classification of Face Images for Gender, Age, Facial Expression, and Identity 1 Proc. Int. Conf. on Artificial Neural Networks (ICANN 05), Warsaw, LNCS 3696, vol. I, pp. 569-574, Springer Verlag 2005 Classification of Face Images for Gender, Age, Facial Expression, and Identity 1

More information

Feeder Reconfiguration Using Binary Coding Particle Swarm Optimization

Feeder Reconfiguration Using Binary Coding Particle Swarm Optimization 488 International Journal Wu-Chang of Control, Wu Automation, and Men-Shen and Systems, Tsai vol. 6, no. 4, pp. 488-494, August 2008 Feeder Reconfiguration Using Binary Coding Particle Swarm Optimization

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm

An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm A. Lari, A. Khosravi and A. Alfi Faculty of Electrical and Computer Engineering, Noushirvani

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

Small World Particle Swarm Optimizer for Global Optimization Problems

Small World Particle Swarm Optimizer for Global Optimization Problems Small World Particle Swarm Optimizer for Global Optimization Problems Megha Vora and T.T. Mirnalinee Department of Computer Science and Engineering S.S.N College of Engineering, Anna University, Chennai,

More information

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information

Autonomous Sensor Manager Agents (ASMA)

Autonomous Sensor Manager Agents (ASMA) Autonomous Sensor Manager Agents (ASMA) Lisa Ann Osadciw Department of Electrical Engineering and Computer Science Syracuse University Syracuse, NY 13244-1240 (315) 443-1319 (office)/(315) 443-2583 (fax)

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Enhanced Iris Recognition System an Integrated Approach to Person Identification Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

A Multiobjective Memetic Algorithm Based on Particle Swarm Optimization

A Multiobjective Memetic Algorithm Based on Particle Swarm Optimization A Multiobjective Memetic Algorithm Based on Particle Swarm Optimization Dr. Liu Dasheng James Cook University, Singapore / 48 Outline of Talk. Particle Swam Optimization 2. Multiobjective Particle Swarm

More information

Redundancy Resolution by Minimization of Joint Disturbance Torque for Independent Joint Controlled Kinematically Redundant Manipulators

Redundancy Resolution by Minimization of Joint Disturbance Torque for Independent Joint Controlled Kinematically Redundant Manipulators 56 ICASE :The Institute ofcontrol,automation and Systems Engineering,KOREA Vol.,No.1,March,000 Redundancy Resolution by Minimization of Joint Disturbance Torque for Independent Joint Controlled Kinematically

More information

A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION

A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION Manjeet Singh 1, Divesh Thareja 2 1 Department of Electrical and Electronics Engineering, Assistant Professor, HCTM Technical

More information

Adaptive Management of Multimodal Biometrics Fusion Using Ant Colony Optimization

Adaptive Management of Multimodal Biometrics Fusion Using Ant Colony Optimization Adaptive Management of Multimodal Biometrics Fusion Using Ant Colony Optimization Amioy Kumar, Ajay Kumar Corresponding author email: csajaykr@comp.polyu.edu.hk; Ph: 852-27667254 Abstract: This paper presents

More information

Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization

Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization Lana Dalawr Jalal Abstract This paper addresses the problem of offline path planning for

More information

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant

More information

A Novel Identification System Using Fusion of Score of Iris as a Biometrics

A Novel Identification System Using Fusion of Score of Iris as a Biometrics A Novel Identification System Using Fusion of Score of Iris as a Biometrics Raj Kumar Singh 1, Braj Bihari Soni 2 1 M. Tech Scholar, NIIST, RGTU, raj_orai@rediffmail.com, Bhopal (M.P.) India; 2 Assistant

More information

LECTURE 16: SWARM INTELLIGENCE 2 / PARTICLE SWARM OPTIMIZATION 2

LECTURE 16: SWARM INTELLIGENCE 2 / PARTICLE SWARM OPTIMIZATION 2 15-382 COLLECTIVE INTELLIGENCE - S18 LECTURE 16: SWARM INTELLIGENCE 2 / PARTICLE SWARM OPTIMIZATION 2 INSTRUCTOR: GIANNI A. DI CARO BACKGROUND: REYNOLDS BOIDS Reynolds created a model of coordinated animal

More information

Iris Recognition for Eyelash Detection Using Gabor Filter

Iris Recognition for Eyelash Detection Using Gabor Filter Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition

More information

An Improved Iris Segmentation Technique Using Circular Hough Transform

An Improved Iris Segmentation Technique Using Circular Hough Transform An Improved Iris Segmentation Technique Using Circular Hough Transform Kennedy Okokpujie (&), Etinosa Noma-Osaghae, Samuel John, and Akachukwu Ajulibe Department of Electrical and Information Engineering,

More information

Development of Biometrics technology in multimode fusion data in various levels

Development of Biometrics technology in multimode fusion data in various levels IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 5, Ver. III (Sep.- Oct. 2017), PP 01-05 www.iosrjournals.org Development of Biometrics technology in

More information

Fusion in Multibiometric Identification Systems: What about the Missing Data?

Fusion in Multibiometric Identification Systems: What about the Missing Data? Fusion in Multibiometric Identification Systems: What about the Missing Data? Karthik Nandakumar 1, Anil K. Jain 2 and Arun Ross 3 1 Institute for Infocomm Research, A*STAR, Fusionopolis, Singapore, knandakumar@i2r.a-star.edu.sg

More information

A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE

A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE N S Priya 1, A Lenin Fred 2 1 Assistant Professor, Department of Computer Science and Engineering,

More information

Convolutional Code Optimization for Various Constraint Lengths using PSO

Convolutional Code Optimization for Various Constraint Lengths using PSO International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 2 (2012), pp. 151-157 International Research Publication House http://www.irphouse.com Convolutional

More information

Reconstruction Improvements on Compressive Sensing

Reconstruction Improvements on Compressive Sensing SCITECH Volume 6, Issue 2 RESEARCH ORGANISATION November 21, 2017 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Reconstruction Improvements on Compressive Sensing

More information