Improved Sequential Fusion of Heart-signal and Fingerprint for Anti-spoofing
Keywords:
Component, Formatting, Style, Styling, InsertAbstract
Biometrics is one of the most encouraging authentication systems in the recent years. However, spoof attack is one of the main problems with a biometric system. Spoof attack falls within a subset of what is called presentation attack. The heart is an emerging biometric modality which is getting attention for its robustness against presentation attacks. Introducing heartsignal into a fingerprint biometric system can yield promising results showing its robustness against spoof attacks with increasing the authentication accuracy. In this work, a sequential fusion method is improved for anti-spoofing capability. The idea behind the proposed system is the utilization of the natural liveness property of heart-biometrics in addition to boosting the heart-signal scores to increase the anti-spoofing of a multimodal biometric system. We have evaluated our proposed method with public databases of fingerprint biometric and heart-signal (ECG signal). The obtained results are very encouraging for the development of a robust anti-spoofing multimodal authentication system.
References
[1] A. K. Jain and A. Kumar, "Biometric Recognition: An Overview," in Second Generation Biometrics: The Ethical, Legal and Social Context, E. Mordini and D. Tzovaras, Eds., ed: Springer Netherlands, 2012, pp. 49-79.
[2] F. Alonso-Fernandez, J. Bigun, J. Fierrez, H.Fronthaler, K. Kollreider, and J. Ortega-Garcia, "Fingerprint recognition," in Guide to biometric reference systems and performance evaluation, ed: Springer, 2009, pp. 51-88.
[3] E. Marasco and A. Ross, "A survey on antispoofing schemes for fingerprint recognition systems," ACM Computing Surveys (CSUR), vol. 47, p. 28, 2015.
[4] M. S. Islam, "Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices," International Journal of Distributed Sensor Networks, vol. 2015, p. e549134, 2015/01/29/ 2015.
[5] L. Biel, O. Pettersson, L. Philipson, and P. Wide, "ECG
analysis: a new approach in human identification," Instrumentation and Measurement, IEEE Transactions on, vol. 50, pp. 808-812, 2001 2001.
[6] S. A. Israel, J. M. Irvine, B. K. Wiederhold, and M. D.
Wiederhold, The heartbeat: the living biometric: Wiley-IEEE Press, New York, NY, USA, 2009.
[7] F. Agrafioti, D. Hatzinakos, and J. Gao, Heart biometrics: Theory, methods and applications: INTECH Open Access Publisher, 2011.
[8] M. S. Islam and N. Alajlan, "Biometric template extraction from a heartbeat signal captured from fingers," Multimedia Tools and Applications, vol. doi: 10.1007/s11042-016-3694-6, 2016.
[9] A. Lourenço, H. Silva, and A. Fred, "Unveiling the biometric potential of Finger-Based ECG signals,"Computational intelligence and neuroscience, vol. 2011, p. 5, 2011 2011.
[10] R. M. Jomaa, M. S. Islam, and H. Mathkour, "Enhancing the information content of fingerprint biometrics with heartbeat signal," in Computer Networks and Information Security (WSCNIS), 2015 World Symposium on, 2015, pp. 1-5.
[11] S. Pouryayevali, "ECG Biometrics: New Algorithm and Multimodal Biometric System," Master Thesis, Graduate Department of Electrical and Computer Engineering, University of Toronto, 2015.
[12] N. Alajlan, M. S. Islam, and N. Ammour, "Fusion of fingerprint and heartbeat biometrics using fuzzy adaptive genetic algorithm," 2013, pp. 76-81.
[13] S. A. Israel, W. T. Scruggs, W. J. Worek, and J. M. Irvine, "Fusing face and ECG for personal identifica ion," 2003, pp. 226-231.
[14] Y. N. Singh, S. K. Singh, and P. Gupta, "Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system," Pattern Recognition Letters, vol. 33, pp. 1932-1941, 2012 2012.
[15] M. D. Bugdol and A. W. Mitas, "Multimodal biometric system combining ECG and sound signals," Pattern Recognition Letters, vol. 38, pp. 107-112, 2014 2014.
[16] C. Zhao, T. Wysocki, F. Agrafioti, and D. Hatzinakos, "Securing handheld devices and fingerprint readers with ECG biometrics," 2012, pp. 150-155.
[17] I. I. Standard, "Information technology – Biometric presentation attack detection -- Part 1: Framework," ed, 2016.
[18] A. K. Jain, K. Nandakumar, and A. Ross, "50 years of biometric research: Accomplishments, challenges, and opportunities," Pattern Recognition Letters, vol. 79, pp. 80-105, 2016.
[19] G. Fumera, G. L. Marcialis, B. Biggio, F. Roli, and S. C. Schuckers, "Multimodal Anti-spoofing in Biometric Recognition Systems," in Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks, S. Marcel, M. S. Nixon, and S. Z. Li, Eds., ed London: Springer London, 2014, pp. 165-184.
[20] C. A. Shoniregun and S. Crosier, Securing biometrics applications: Springer, 2008.
[21] M. Tistarelli, S. Z. Li, and R. Chellappa, Handbook of remote biometrics vol. 1: Springer, 2009.
[22] A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of multibiometrics vol. 6: Springer, 2006.
[23] R. N. Rodrigues, N. Kamat, and V. Govindaraju, "Evaluation of biometric spoofing in a multimodal system," 2010, pp. 1-5.
[24] R. N. Rodrigues, L. L. Ling, and V. Govindaraju, "Robustness of multimodal biometric fusion methods against spoof attacks," Journal of Visual Languages & Computing, vol. 20, pp. 169-179, 2009 2009.
[25] P. A. Johnson, B. Tan, and S. Schuckers, "Multimodal fusion vulnerability to non-zero effort (spoof) imposters," in 2010 IEEE International Workshop on Information Forensics and Security, 2010, pp. 1-5.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
