Neural networks for Multibiometrics – Review on Issues, Applications, Challenges and Research Areas

DOI : 10.17577/IJERTCONV1IS06045

Download Full-Text PDF Cite this Publication

Text Only Version

Neural networks for Multibiometrics – Review on Issues, Applications, Challenges and Research Areas

B.Revathi @ Ponmozhi*, Dr. G.F.Sudha**

*Research Scholar, Pondicherry Engineering College,Puducherry.

**Associate Professor, Pondicherry Engineering College, Puducherry.


RecentAdvances in the field of Information Technologymakes Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. Biometric authentication systems makes use neural networks for the training and verification phase. The fusion of multiple biometrics helps to minimize the system error rates. Fusion methods include processing biometric modalities sequentially until an acceptable match is obtained. This paper is an overview of Neural networks for multibiometrics, challenges in the progress of multibiometrics using neural networks, the main research areas and its applications to develop the security system for high security areas.

Keywords: Unimodal, Multibiometrics, ANN


    Information securitydeals with the assurance of confidentiality, integrity and availability of information in all forms. There are many tools and techniques that can support the management of information security. But system based on biometric has evolved to support some aspects of information security. Biometric authentication supports the facet of identification, authentication and non-repudiation in information security.Biometric authentication has grown in popularity as a way to provide personal identification. Persons identification is crucially significant in many applications and the hike in credit card fraud and identity theft in recent years indicates that this is an issue of major concern in wider society. Individual passwords, pin identification or even token based arrangement all have deficiencies that restrict their applicability in a widely-networked society. Biometric is used to identify the identity of an input sample when compared to a template, used in cases to identify specific people by certain characteristics. Possession based: using one specific "token" such as a security tag or a card and knowledge-based: the use of a code or password. Standard validation systems often use multiple inputs of samples for sufficient validation, such as particular characteristics of the

    sample. This intends to enhance security as multiple different samples are required such as security tags and codes and sample dimensions. So, the advantage claimed by biometric authentication is that they can establish an unbreakable one- to-one correspondence between an individual and a piece of data.

    Biometric systemsbased on single source of information are called unimodal systems. Although some unimodalsystems [2] have got considerable improvement in reliability and accuracy, they often sufferfrom enrollment problems due to non-universal biometrics traits, susceptibility to biometricspoofing or insufficient accuracy caused by noisy data [3].Hence, single biometric may not be able to achieve the desired performance requirement inreal world applications. One of the methods to overcome these problems is to make use ofmultimodal biometric authentication systems, which combine information from multiplemodalities to arrive at a decision. Studies have demonstrated that multimodal biometricsystems can achieve better performance compared with unimodal systems.

    This paper presents the review of neural networks for multibiometrics. This includes applications,challenges and areas of research in multimodal biometrics. The different fusion techniques ofmultimodal biometrics have been discussed. The paper is organized as follows. A detailed literature has been presented in Section 2 followed by Multialgorithm and multi sample approach in Section 3 whereas need of multibiometrics and details of Multibiometrics are illustrated in Section 4 and Section 5 respectively.Artificial Neural Networks along with its architecture is discussed in Section 6. Applications of Neural Networks in Multibiometrics are illustrated in Section 7, whereas Challenges and research areas are given in Section 8. Summary and Conclusions are presented in the last section of the paper.

    B.Revathi, Dr. G.F.Sudha



    Combining several systems has been investigated in patternrecognition [1] in general; in applications related to audiovisualspeech processing [3]; in speech recognition examples of methods are multi-band, multi-stream , front-end multi-feature approaches and the unionmodel [9]; in the form of ensemble [10]; in audio-visual personauthentication; and, in multi-biometrics [12], [13], [14],[15], [16] (and references herein), among others. In fact, oneof the earliest worksaddressing multimodal biometric fusionwas reported in 1978 [17]. Therefore, biometric fusion has ahistory of 30 years.Recent advances in multi-biometrics have been focusing onquality-based fusion, e.g., [18], [19], [20], [21], [22], wherethe quality associated with the template as well as the querybiometric sample are taken into account in decision levelfusion. For this purpose, a plethora of quality measures haverecently been proposed in the literature for various biometricmodalities, e.g., fingerprint [23], [24], iris [25], face

    [26],speech [27], signature [28], and classifier-dependent

    measure(confidence) [29], [30]. The proposed quality measures, ingeneral, aim to quantify the degree of excellence or conformanceof biometric samples to some predefined criteria knownto influence the system performance. For instance, for theface biometrics, these assess image focus, contrast and facedetection reliability.

    In quality-based fusion, the match scores of biometric samplesof higher quality are given more important consideration,i.e., higher weights, in order to compute the final combinedscore. There are two ways quality measures can be incorporatedinto a fusion classifier, depending on their role, i.e.,either as a control parameter or as evidence. In their primaryrole, quality measures are used to modify the way a fusionclassifier is trained or tested, as suggested in the Bayesianbasedclassifier called expert conciliation [18], reducedpolynomial classifier [31], quality-controlled support vectormachines [19], and quality-based fixed rule fusion [32]. Intheir secondary role, quality measures are often concatenatedwith the expert outputs to be fed to a fusion classifier, asfound in logistic regression [20] and the mixture of GaussiansBayesian classifier [21].

    Other notable work includes the use of Bayesian networksto gauge the complex relationship between expert outputsand quality measures, e.g., Maurer and Bakers Bayesiannetwork [33] and Pohet al.s quality state-dependent fusion[34]. The work in [34] takes into account an array ofquality measures rather than representing quality as a scalar.By means of grouping the multi faceted quality measures, a

    fusion strategy can then be devised for each cluster of qualityvalues.Other suggestions include the use of quality

    measures toimprove biometric device interoperability [35], [36]. Such anapproach is commonly used in speaker verification [37] wheredifferent strategies are used for different microphone types.

    Last but not least, another promising direction in fusion isto consider the reliability estimate of each biometric modality.In [38], the estimated reliability for each biometric modalitywas used for combining symbolic-level decisins, whereasin [39], [40], [41], [30], score-level fusion was considered.However,

    in [39], [40], [41], the term failure prediction wasused instead. Such information, derived solely from the expertoutputs (instead of quality measures), has been demonstratedto be effective for single biometric modalities [39], fusionacross sensors for a single biometric modality [40], and acrossdifferent machine learning techniques [41]. In [30], the notionof reliability was captured by margin, a concept used in largemarginclassifiers [42]. Exactly how the reliability is definedand estimated for each modality, and how it can be effectivelyused in fusion, are still open research issues.


    Multi algorithm approach employs a single biometric sample acquired from single sensor. (Figure 1)Twoor more different algorithms process this acquired sample. The individual results arecombined to obtain an overall recognition result. This approach is attractive, both from an application and research point of view because of use of single sensor reducing dataacquisition cost. The 2002 Face Recognition Vendor Test has shown increased performancein 2D face recognition by combining the results of different commercial recognition systems[4]. Gokberk et al. [5] have combined multiple algorithms for 3D face recognition. Xu et al. [6]have also combined different algorithmic approaches for 3D face recognition.

    Multi sample or multi instance algorithms use multiple samples of the same biometric. Thesame algorithm processes each of the samples and the individual results are fused to obtainan overall recognition result. In comparison to the multi algorithm approach, multi sample hasadvantage that using multiple samples may overcome poor performance due to one samplethat has unfortunate properties. Acquiring multiple samples requires either multiple copies ofthe sensor or the user availability for a longer period of time. Compared to multi algorithm,multi sample seems to require either higher expense for sensors, greater cooperation fromthe user, or a combination of both. For example, Chang et al. [7] used a multi-sampleapproach with 2D face images as a baseline

    against which to compare the performance ofmulti-sample 2D

    + 3D face.


    Most of the biometric systems deployed in real world applications are unimodal which rely onthe evidence of single source of information for authentication (e.g. fingerprint, face, voiceetc.). These systems are vulnerable to variety of problems such as noisy data, intra-classvariations, inter-class similarities, non-universality and spoofing.

    Figure 1: Fusion in multibiometric system

    t leads to considerably highfalse acceptance rate (FAR) and false rejection rate (FRR), limited discrimination capability,upper bound in performance and lack of permanence [8]. Some of the limitations imposed byunimodal biometric systems can be overcome by including multiple sources of information forestablishing identity. These systems allow the integration of two or more types of biometricsystems known as multimodal biometric systems. These systems are more reliable due to thepresence of multiple, independent biometrics. These systems are able to meet thestringent performance requirements imposed by various applications. They address theproblem of non- universality, since multiple traits ensure sufficient population coverage. Theyalso deter spoofing since it would be difficult for an impostor to spoof multiple biometric traitsof a genuine user simultaneously. Furthermore, they can facilitate a challenge responsetype of mechanism by requesting the user to present a random subset of biometric traitsthereby ensuring that a live user is indeed present at the point of data acquisition.


    The term multimodal is used to combine two or more different biometric sources of a person(like face and fingerprint) sensed by different sensors. Two different properties (like infraredand reflected light of the same biometric source, 3D shape and reflected light of the samesource sensed by the same sensor) of the same biometric can also be combined. Inorthogonal multimodal biometrics, different biometrics (like face and fingerprint) are involvedwith little or no interaction between the individual biometric whereas independent multimodalbiometrics processes individual biometric independently. Orthogonal biometrics areprocessed independently by necessity but when the biometric source is the same and different properties are sensed, then the processing may be independent, but there is at leastthe potential for gains in performance through collaborative processing. In collaborativemultimodal biometrics the processing of one biometric is influenced by the result of anotherbiometric.

    A generic biometric system has sensor module to capture the trait, feature extraction moduleto process the data to extract a feature set that yields compact representation of the trait,classifier module to compare the extracted feature set with reference database to generatematching scores and decision module to determine an identity or validate a claimed identity.In multimodal biometric system information reconciliation can occur at the data or featurelevel, at the match score level generated by multiple classifiers pertaining to differentmodalities and at the decision level. Biometric systems that integrate information at an early stage of processing are believed tobe more effective than those which perform integration at a later stage. Since the feature setcontains more information about the input biometric data than the matching score or theoutput decision of a matcher, fusion at the feature level is expected to provide betterrecognition results. However, fusion at this level is difficult to achieve in practice because thefeature sets of the various modalities may not be compatible and most of the commercialbiometric systems do not provide access to the feature sets which they use. Fusion at thedecision level is considered to be rigid due to the availability of limited information. Thus,fusion at the match score level is usually preferred, as it is relatively easy to access andcombine the scores presented by the different modalities [2].

    Rukhin and Malioutov [10] proposed fusion based on a minimum distance method forcombining rankings from several biometric algorithms. Fusion methods were compared byKittler et al. [11], Verlinde et al. [12] and Fierrez-Aguilar et al. [13]. Kittler found that the sumrule outperformed many

    B.Revathi, Dr. G.F.Sudha


    other methods, while Fierrez-Aguilar et al. [13, 14] and Gutschovenand Verlinde [15] designed learning based strategies using support vector machines.Researchers have also investigated the use of quality metrics to further improve theperformance [16, 14, 1721].Many of these techniques require the scores for different modalities (or classifiers) to benormalized before being fused and develop weights for combining normalized scores.Normalization and quality weighting schemes involve assumptions that limit the applicability ofthe technique. In [22], Bayesian belief network (BBN) based architecture for biometric fusionapplications is proposed. Bayesian networks provide united probabilistic framework foroptimal information fusion. Although Bayesian methods have been used in biometrics [16,2325], the power and flexibility of the BBN has not been fully exploited.

    Brunelli et al. [26] used the face and voice traits of an individual for identification. A Hyper BFnetwork is used to combine the normalized scores of five different classifiers operating on thevoice and face feature sets. Bigun et al. [16] developed a statistical framework based onBayesian statistics to integrate the speech (text dependent) and face data of a user [27]. Theestimated biases of each classifier are taken into account during the fusion process. Hongand Jain associate different confidence measures with the individual matchers whenintegrating the fae and fingerprint traits of a user [28]. They also suggest an indexingmechanism wherein face information is used to retrieve a set of possible identities and thefingerprint information is then used to select a single identity. A commercial product calledBioID [29] uses the voice, lip motion and face features of a user to verify the identity. AloysiusGeorge used Linear Discriminant analysis (LDA) for face recognition and Directional filterbank (DFB) for fingerprint matching. Based on experimental results, the proposed systemreduces FAR down to 0.0000121%, which overcomes the limitation of single biometric systemand proves stable personal verification in real-time [30].


    Artificial Neural Network (ANNs) has a large appeal to many AI researchers. A neural network can be defined as model of reasoning based on the human brain. The brain consists of a closely interconnected set of nerve cells or basic information-preprocessing units, called neurons. The human brain incorporates nearly 10 billion neurons and 60 trillion connections, synapses between them [Shepherd, 1990]. By using multiple neurons simultaneously, the brain can perform its functions much faster than the fastestcomputers in existence today [Negnevitsky,2002].

      1. Architecture

        A multilayer perceptron is a feed-forward neural network with one or more hidden layers. Typically, the network consists of an input layer of source neurons that at least one hidden layer of neurons and an output layer of neurons (Figure 2). The input signals are propagated in a forward direction on a layer-by-layer basis. The backpropagation algorithm perhaps is the most popular and widely used neural paradigm.

        Figure 2: Feed-forward Neural Network

        It based on the generalized delta rule proposed by research group in 1985 headed by Dave Rumelhart based at Stanford University, California, USA.

        Before the network can be used, it requires target patterns or signals as it a supervised learning algorithm. Training patterns are obtained from the samples of the types of inputs to be given to the backpropagation neural network and their targets are identified by the researchers. The objective of the algorithm is to find the next value of adaptation weight which is also known the Generalized Delta Rule (G.D.R).

        The hidden layer weights are adjusted using the errors from the subsequent layer. Thus, the errors computed at the output layer are used to adjust the weight between the last hidden and the output layer. Likewise, an error value computed from the last hidden layer outputs are used to adjust the weight in the next to the last hidden layer and so on until the weight connections to the first hidden layer are adjusted. In this way, errors are propagated backwards layer by layer with corrections being made to the corresponding layer weights in an iterative manner. The process is repeated a number of times for each pattern in the training set until the total error converges to a minimum or until some limit is reached in the number of training iterations completed [Patterson, 1999].

      2. The Activation Function

    Proceedings of International Conference ICSEM13

    The activation function has the characteristics of continuity, differentiability and non-decreasing uniformity. There is several activation functions used in neural network. There is several activation functions used in the neural network. Binary sigmoid and bipolar sigmoid are generally used in the neural network training. The binary sigmoid which has a normalized range within 0 and 1 and bipolar sigmoid is normalized within

    -1 to +1 are used in backpropagation training.


    The neural network has the ability of storing theinformation of the continuous quantity. The detailinformation of the continuous quantity can be calculatedfrom the whole network, and also determine the wholenetwork.The paper by Garriset al. provides an overview of theNN-based approaches to optical character recognition (OCR).They also provide an end-toendOCR recognition system based on an enhanced multilayerperceptron (MLP) classifier.The paper by Phillips presents a face identification algorithmthat automatically processes an unknown image by locatingand identifying the face. His algorithm is based on designing anet ofmatching pursuit filters optimized for face detection andidentification. For identification, the filters find features thatdifferentiate among faces, whereas, for detection, the filtersencode the similarities among faces. This algorithm has beenevaluated on three sets of images. The first set was imagesfrom the FERET data base (a well-known benchmarking dataset for face recognition). The second set was infrared andvisible images of the same people. This demonstration wasdone to compare performance on infrared and visible imagesindividually, and on fusing the results from both modalities.The third set was mugshot data from a law enforcementapplication.

    The defense and intelligence communities require automated methods capable of rapidlydetermining an individuals true identity as well as any previously used identities and pastactivities, over a geospatial continuum from set of acquired data. A homeland security andlaw enforcement community require technologies to secure the borders and to identifycriminals in the civilian law enforcement environment. Key applications include bordermanagement, interface for criminal and civil applications, and first responder verification.

    Enterprise solutions require the oversight of people, processes and technologies. Networkinfrastructure has become essential to functions of business, government, and web basedbusiness models. Consequently securing access to

    these systems and ensuring onesidentity is essential. Personal information and Business transactions require fraud preventsolutions that increase security and are cost effective and user friendly. Key application areasinclude customer verification at physical point of sale, online customer verification etc.

    Designing biometric sensors, which automatically recognize the operating environment(outdoor / indoor / lighting etc) and communicate with other system components toautomatically adjust settings to deliver optimal data, is also the challenging area. The sensorshould be fast in collecting quality images from a distance and should have low cost with nofailures to enroll [IJBB5].

    The multimodal biometric systems can be improved by enhancing matching algorithms,integration of multiple sensors, analysis of the scalability of biometric systems, followed byresearch on scalability improvements and quality measures to assist decision making inmatching process. Open standards for biometric data interchange formats, file formats,applications interfaces, implementation agreements, testing methodology, adoption ofstandards based solutions, guidelines for auditing biometric systems and records andframework for integration of privacy principles are the possible research areas in the field.

  8. CHALLENGES AND RESEARCH AREAS Architectures There is a huge space of different

fusionarchitectures that has not been explored. The range of possibleconfigurations encompassing serial, parallel and hybridstructures is immense. While the parallel fusion strategy ismost commonly used in multimodal biometric fusion, thereare additional advantages in exploring serial fusion, where theexperts are considered one at a time. It offers the possibilityof making reliable decisions with only a few experts, leavingonly difficult problems to be handled by the remaining experts.

Fusion strategies An important consideration when adoptinga fusion strategy is to consider the statistical dependencyamong the expert outputs. For instance, in intramodal fusion,several experts may rely on the same biometric sample and sohigher dependency is expected among the expert outputs. Onthe other hand, in a multimodal setting, the pool of expertis likely to be statistically independent. In [20], three typesof frameworks are proposed in order to solve a multimodalfusion problem involving intramodal experts.

The first frameworksimply assumes independence, in which case the fusionclassifier reduces to a Naive Bayes one.

B.Revathi, Dr. G.F.Sudha


The second frameworkconsiders dependency of experts in an intramodal setting (allobserving the same biometric modality) whereas ignores thedependency at the multimodal setting, hence realizing a twostagefusion process. Finally, the third framework makes noassumption about the expert outputs.

Expert selection Expert selection can be cast as a featureselection problem, as illustrated in [48]. However, directly applyingsuch technique to biometric authentication is difficult.In Section III, for instance, we have seen that the optimal setof experts found using a development population of users maynot be the best for the target users. The phenomenon, knownas Doddingtons menagerie, relates to the fact that eachexpert is affected by the differences in the ability of the usersbiometric models to represent their respective identities.

Thesediverse abilities have been characterized in Doddingtonetal. [49] by associating different animal names with the users,such as sheep and goats. Thus, a much more robust criterion,taking into account of Doddingtons menagerie, must beconsidered in expert selection. Another issue is raised by thecost considerations. Conciliating both the operational cost andperformance into a single criterion proves to be a difficult task.A special problem of expert selection, called dynamic expertselection arises naturally in the serial fusion architecture. Indynamic expert selection, a fusion classifier may decide whichexpert is most informative to query even before the datais acquired. In the recent Multimodal Biometric benchmarkevaluation, organized by the Biosecure (EU-funded) project 2,dynamic fusion strategy proved to be very promising inachieving good performance while minimizing costs.


This paper presented the various issues related to multimodal biometric systems. Bycombining multiple sources of information, the improvement in the performance of biometricsystem is attained. Various fusion levels and scenarios of multimodal systems are discussed.Neural network solutions like Support vector machine(SVM) helps to get Fusion at the match score level that is the most popular due to the ease in accessing andconsolidating matching scores. Template security is critical to the integrity of a biometricsystem. Fuzzy vault and Fuzzy extractor are provided as solution to template security. Performance gain is pronounced when uncorrelated traits areused in a multimodal system. The challenges faced by multimodal biometric system andpossible research areas are also discussed in the paper.


  1. S.N. Srihari T.K. Ho, J.J. Hull, Decision Combination in Multiple Classifier Systems, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 16, no. 1, pp. 6675, January 1994.

  2. A. K. Jain, A. Ross and S. Prabhakar, An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, pp. 420, Jan 2004.

  3. J. Luettin, Visual Speech and Speaker Recognition, Ph.D. thesis, Department of Computer Science, University of Sheffield, 1997.

  4. Phillips, P.J., P. Grother R.J. Michaels, D.M. Blackburn and E. Tabassi and J.M.Bone, FRVT 2002: overview and summary", March 2003.

  5. Gokberk, B., A.A. Salah. and L. Akarun, Rank-Based Decision Fusion for 3D Shape-Based Face Recognition, LNCS 3546: AVBPA, pp. 1019-1028, July 2005.

  6. Xu, C., Y. Wang, T. Tan and L. Quan, Automatic 3D face recognition combining global geometric features with local shape variation information, Aut. Face and Gesture Recog., pp. 308 -313, 2004.

  7. Chang, K. I., K. W. Bowyer, and P. J. Flynn, An evaluation of multi-modal 2D+3D face biometrics, IEEE Trans. on PAMI 27 (4), pp. 619-624, April 2005.

  8. A. Ross, A.K. Jain, Multimodal Biometrics: An Overview, 12th European Signal Processing Conference (EUSIPCO), Vienna, Austria, pp. 1221- 1224, 9/2004.

  9. Ji Ming and F. Jack Smith, Speech Recognition with Unknown Partial Feature Corruption – a Review of the Union Model, Computer Speech and Language, vol. 17, pp. 287 305, 2003.

  10. G. Brown, Diversity in Neural Network Ensembles, Ph.D. thesis, School of Computer Science, Uni. of Birmingham, 2003.

  11. Kittler, On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20 (3), pp. 226239, 1998.

  12. P. Verlinde, G. Chollet, M. Acheroy, Multimodal identity verification using expert fusion. Information Fusion, vol. 1 (1), pp. 17-33, 2000.

  13. J. Fierrez-Aguilar, J. Ortega-Garcia, J. Gonzalez- Rodriguez, Fusion strategies in multimodal biometric verification. In Proceedings of International Conference on Multimedia and Expo (ICME 03), vol.3(69), pp. 58, 2003.

  14. J. Fierrez-Aguilar, Kernel-based multimodal biometric verification using quality signals. Biometric Technology for Human Identification, Proceedings of the SPIE, vol. 5404, pp. 544554, 2004.

  15. B. Gutschoven, P. Verlinde, Multimodal identity verification using support vector machines (SVM).Proceedings of the Third International Conference on Information Fusion, vol. 2, pp. 38, 2000.

    Proceedings of International Conference ICSEM13

  16. J. Bigun, et al., Multimodal biometric authentication using quality signals in mobile communications. Proceedings of IAPR International Conference on Image Analysis and Processing (ICIAP), IEEE CS Press, pp. 213, 2003.

  17. E. Tabassi, C. Wilson, C. Watson, Fingerprint image quality. Technical Report 7151, 2004.

  18. Y. Chen, S. Dass, A.J. Jain, Fingerprint quality indices for predicting authentication performance,. Fifth International Conference AVBPA Proceedings, Springer Lecture Notes in Computer Science, vol. 3546, pp. 160170, 2005.

  19. L. M. Wein, M. Baveja, Using Fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indicator Technology Program. Proc. National Academy Science, vol. 102 (21), pp. 77727775, 2005.

  20. K. Nandakumar, Y. Chen, A.K. Jain, S.C. Dass, Quality-based score level fusion in multibiometric systems.Proceedings of the 18th International Conference on Pattern Recognition (ICPR06), pp. 473476, 2006.

  21. J. Fierrez-Aguilar, J. Ortega-Garcia, J. Gonzales- Rodriguez,Discriminative multimodal biometric authentication based on quality measures.Pattern Recognition, vol. 38, pp. 777779, 2005.

  22. J.P. Baker, D.E. Maurer, Fusion of biometric data with quality estimates via a Bayesian belief network. Proceedings of the Biometric Symposium, Arlington, VA, pp. 2122, 2005.

  23. H. Fronthaler, K. Kollreider, J. Bigun, J. Fierrez, F. Alonso-Fernandez,J. Ortega-Garcia, and J. Gonzalez- Rodriguez, Fingerprint image-qualityestimation and its application to multialgorithm verification, IEEETrans. on Information Forensics and Security, vol. 3, pp. 331338, 2008.

  24. Y. Chen, S.C. Dass, and A.K. Jain, Fingerprint Quality Indices forPredicting Authentication Performance, in LNCS 3546, 5th Intl.Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA2005), New York, 2005, pp. 160170.

  25. Y. Chen, S. Dass, and A. Jain, Localized iris image quality using 2-dwavelets, in Proc. Intl Conf. on Biometrics (ICB), Hong Kong, 2006,pp. 373381.

  26. X. Gao, R. Liu, S. Z. Li, and P. Zhang, Standardization of face imagesample quality, in LNCS 4642, Proc. Intl Conf. Biometrics (ICB07),Seoul, 2007, pp. 242251.

  27. National Institute of Standards and Technology, Nist speech qualityassurance package 2.3 documentation .

  28. S. Muller and O. Henniger, Evaluating the biometric sample qualityof handwritten signatures, in LNCS 3832, Proc. Intl Conf. Biometrics(ICB07), 2007, pp. 407414.

  29. S. Bengio, C. Marcel, S. Marcel, and J. Marithoz, Confidence Measuresfor Multimodal Identity Verification, Information Fusion, vol. 3, no.4, pp. 267276, 2002.

  30. N. Poh and S. Bengio, Improving Fusion with Margin- DerivedConfidence in Biometric Authentication Tasks, in LNCS 3546, 5thIntl. Conf. Audio- and Video-Based Biometric Person Authentication(AVBPA 2005), New York, 2005, pp. 474483.

  31. K-A. Toh, W-Y.Yau, E. Lim, L. Chen, and C-H. Ng., Fusion ofAuxiliary Information for Multimodal Biometric Authentication, inLNCS 3072, Intl Conf. on Biometric Authentication (ICBA), HongKong, 2004, pp. 678685.

  32. O. Fatukasi, J. Kittler, and N. Poh, Quality Controlled MultimodalFusion of Biometric Experts, in 12th Iberoamerican Congress onPattern Recognition CIARP, Via del Mar-Valparaiso, Chile, 2007, pp.881890.

  33. D. E. Maurer and J. P. Baker, Fusing multimodal biometrics withquality estimates via a bayesian belief network, Pattern Recognition,vol. 41, no. 3, pp. 821832, 2007.

  34. N. Poh, G. Heusch, and J. Kittler, On Combination of Face AuthenticationExperts by a Mixture of Quality Dependent Fusion Classifiers,in LNCS 4472, Multiple Classifiers System (MCS), Prague, 2007, pp.344356.

  35. F. Alonso-Fernandez, J. Fierrez, D. Ramos, and J. Ortega-Garcia, Dealingwith sensor interoperability in multi- biometrics: The upm experienceat the biosecure multimodal evaluation 2007, in Proc. of SPIE Defenseand Security Symposium, Workshop on Biometric Technology for HumanIdentification, 2008.

  36. N. Poh, T. Bourlai, and J. Kittler, Improving Biometric DeviceInteroperability by Likelihood Ratio-based Quality Dependent ScoreNormalization, in accepted for publication in IEEE Conference onBiometrics: Theory, Applications and Systems, Washington, D.C., 2007,pp. 15.

  37. R. Auckenthaler, M. Carey, and H. Lloyd-Thomas, Score Normalizationfor Text-Independent Speaker Verification Systems, Digital SignalProcessing (DSP) Journal, vol. 10, pp. 4254, 2000.

  38. Krzysztof Kryszczuk, Jonas Richiardi, PlamenProdanov, and AndrzejDrygajlo, Reliability-based decision fusion in multimodal biometricverification systems, EURASIP Journal of Advances in Signal Processing,vol. 2007.

  39. W. Li, X. Gao, and T.E. Boult, Predicting biometric system failure,Computational Intelligence for Homeland Security and Personal Safety, CIHSPS 2005. Proceedings of the 2005 IEEE InternationalConference pp. 5764, 31 2005- April 1 2005.

  40. B. Xie, T. Boult, V. Ramesh, and Y. Zhu, Multi-camera face recognitionby reliability-based selection, Computational Intelligence forHomeland Security and Personal Safety,

    B.Revathi, Dr. G.F.Sudha


    Proceedings of the 2006 IEEEInternational Conference, pp. 1823, Oct. 2006.

  41. T. P. Riopka and T. E. Boult, Classification enhancement via biometricpattern perturbation, in AVBPA, 2005, pp. 850859.

  42. A. J. Smola and P. J. Bartlett, Eds., Advances in Large MarginClassifiesr, MIT Press, Cambridge, MA, 2000.

  43. U.R. Sanchez and J. Kittler, Fusion of talking face biometric modalitiesfor personal identity verification, in IEEE Intl Conf. Acoustics, Speech,and Signal Processing, 2006, vol. 5

  44. K Messer, J Matas, J Kittler, J Luettin, and G Maitre, Xm2vtsdb: Theextended m2vts database, in Second International Conference on Audioand Video-based Biometric Person Authentication, 1999.

  45. N. Poh and J. Kittler, On Using Error Bounds to Optimize CostsensitiveMultimodal Biometric Authentication, in Proc. 19th IntlConf. Pattern Recognition (ICPR), 2008.

  46. G. E. Box and D. R. Cox, An Analysis of Transformations, AutomaticIdentification Advanced Technologies, 2007 IEEE Workshop on, vol. B,no. 26, pp. 211246, 1964.

  47. N. Poh and S. Bengio, How Do Correlation and Variance of BaseClassifiers Affect Fusion in Biometric Authentication Tasks?, IEEETrans. Signal Processing, vol. 53, no. 11, pp. 43844396, 2005.

Leave a Reply

Your email address will not be published.