scispace - formally typeset
Search or ask a question

Showing papers on "Biometrics published in 2016"


Journal ArticleDOI
TL;DR: Unlocking the full potential of biometrics through inter-disciplinary research in the above areas will not only lead to widespread adoption of this promising technology, but will also result in wider user acceptance and societal impact.

541 citations


Journal ArticleDOI
TL;DR: An overview of soft biometrics is provided and some of the techniques that have been proposed to extract them from the image and the video data are discussed, a taxonomy for organizing and classifying soft biometric attributes is introduced, and the strengths and limitations are enumerated.
Abstract: Recent research has explored the possibility of extracting ancillary information from primary biometric traits viz., face, fingerprints, hand geometry, and iris. This ancillary information includes personal attributes, such as gender, age, ethnicity, hair color, height, weight, and so on. Such attributes are known as soft biometrics and have applications in surveillance and indexing biometric databases. These attributes can be used in a fusion framework to improve the matching accuracy of a primary biometric system (e.g., fusing face with gender information), or can be used to generate qualitative descriptions of an individual (e.g., young Asian female with dark eyes and brown hair). The latter is particularly useful in bridging the semantic gap between human and machine descriptions of the biometric data. In this paper, we provide an overview of soft biometrics and discuss some of the techniques that have been proposed to extract them from the image and the video data. We also introduce a taxonomy for organizing and classifying soft biometric attributes, and enumerate the strengths and limitations of these attributes in the context of an operational biometric system. Finally, we discuss open research problems in this field. This survey is intended for researchers and practitioners in the field of biometrics.

355 citations


Journal ArticleDOI
TL;DR: In this paper, a discriminant correlation analysis (DCA) is proposed for feature fusion by maximizing the pairwise correlations across the two feature sets and eliminating the between-class correlations and restricting the correlations to be within the classes.
Abstract: Information fusion is a key step in multimodal biometric systems. The fusion of information can occur at different levels of a recognition system, i.e., at the feature level, matching-score level, or decision level. However, feature level fusion is believed to be more effective owing to the fact that a feature set contains richer information about the input biometric data than the matching score or the output decision of a classifier. The goal of feature fusion for recognition is to combine relevant information from two or more feature vectors into a single one with more discriminative power than any of the input feature vectors. In pattern recognition problems, we are also interested in separating the classes. In this paper, we present discriminant correlation analysis (DCA), a feature level fusion technique that incorporates the class associations into the correlation analysis of the feature sets. DCA performs an effective feature fusion by maximizing the pairwise correlations across the two feature sets and, at the same time, eliminating the between-class correlations and restricting the correlations to be within the classes. Our proposed method can be used in pattern recognition applications for fusing the features extracted from multiple modalities or combining different feature vectors extracted from a single modality. It is noteworthy that DCA is the first technique that considers class structure in feature fusion. Moreover, it has a very low computational complexity and it can be employed in real-time applications. Multiple sets of experiments performed on various biometric databases and using different feature extraction techniques, show the effectiveness of our proposed method, which outperforms other state-of-the-art approaches.

310 citations


01 Jan 2016
TL;DR: The handbook of biometrics is universally compatible with any devices to read, and will help you to get the most less latency time to download any of the authors' books like this one.
Abstract: Thank you very much for reading handbook of biometrics. Maybe you have knowledge that, people have look numerous times for their favorite books like this handbook of biometrics, but end up in malicious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they are facing with some harmful virus inside their desktop computer. handbook of biometrics is available in our digital library an online access to it is set as public so you can download it instantly. Our books collection saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the handbook of biometrics is universally compatible with any devices to read.

275 citations


Journal ArticleDOI
TL;DR: To the best of the knowledge, this is the first approach on mobile authentication that uses ECG biometric signals and it shows a promising future for this technology, although further improvements are still needed to optimize accuracy while maintaining a short acquisition time for authentication.
Abstract: Traditional mobile login methods, like numerical or graphical passwords, are vulnerable to passive attacks. It is common for intruders to gain access to personal information of their victims by watching them enter their passwords into their mobile screens from a close proximity. With this in mind, a mobile biometric authentication algorithm based on electrocardiogram (ECG) is proposed. With this algorithm, the user will only need to touch two ECG electrodes (lead I) of the mobile device to gain access. The algorithm was tested with a cell phone case heart monitor in a controlled laboratory experiment at different times and conditions with ten subjects and also with 73 records obtained from the Physionet database. The obtained results reveal that our algorithm has 1.41% false acceptance rate and 81.82% true acceptance rate with 4 s of signal acquisition. To the best of our knowledge, this is the first approach on mobile authentication that uses ECG biometric signals and it shows a promising future for this technology. Nonetheless, further improvements are still needed to optimize accuracy while maintaining a short acquisition time for authentication.

182 citations


Proceedings ArticleDOI
20 Mar 2016
TL;DR: A Siamese neural network based gait recognition framework to automatically extract robust and discriminative gait features for human identification that impressively outperforms state-of-the-arts models.
Abstract: As the remarkable characteristics of remote accessed, robust and security, gait recognition has gained significant attention in the biometrics based human identification task. However, the existed methods mainly employ the handcrafted gait features, which cannot well handle the indistinctive inter-class differences and large intra-class variations of human gait in real-world situation. In this paper, we have developed a Siamese neural network based gait recognition framework to automatically extract robust and discriminative gait features for human identification. Different from conventional deep neural network, the Siamese network can employ distance metric learning to drive the similarity metric to be small for pairs of gait from the same person, and large for pairs from different persons. In particular, to further learn effective model with limited training data, we composite the gait energy images instead of raw sequence of gaits. Consequently, the experiments on the world's largest gait database show our framework impressively outperforms state-of-the-arts.

156 citations


Journal ArticleDOI
Nianfeng Liu1, Man Zhang1, Haiqing Li1, Zhenan Sun1, Tieniu Tan1 
TL;DR: DeepIris is a novel solution to iris recognition which learns relational features to measure the similarity between pairs of iris images based on convolutional neural networks, and EER of heterogeneous iris verification is reduced by 90% using DeepIris compared to traditional methods.

151 citations


Proceedings ArticleDOI
01 Sep 2016
TL;DR: This work proposes a novel scheme to detect morphed face images based on facial micro-textures extracted using statistically independent filters that are trained on natural images.
Abstract: Widespread deployment of Automatic Border Control (ABC) along with the electronic Machine Readable Travel Documents (eMRTD) for person verification has enabled a prominent use case of face biometrics in border control applications. Many countries issue eMRTD passports on the basis of a printed biometric face photo submitted by the applicant. Some countries offer web-portals for passport renewal, where citizens can upload their face photo. These applications allow the possibility of the photo being altered to beautify the appearance of the data subject or being morphed to conceal the applicant identity. Specifically, if an eMRTD passport is issued with a morphed facial image, two or more data subjects, likely the known applicant and one or more unknown companion(s), can use such passport to pass a border control. In this work we propose a novel scheme to detect morphed face images based on facial micro-textures extracted using statistically independent filters that are trained on natural images. Given a face image, the proposed method will obtain a micro-texture variation using Binarized Statistical Image Features (BSIF), and the decision is made using a linear Support Vector Machine (SVM). This is first work carried out towards detecting the morphed face images. Extensive experiments are carried out on a large-scale database of 450 morphed face images created using 110 unique subjects with different ethnicity, age, and gender that indicates the superior performance.

139 citations


Journal ArticleDOI
TL;DR: This article reviews and provides a categorization of wearable sensors useful for capturing biometric signals, and analyses the computational cost of the different signal processing techniques, an important practical factor in constrained devices such as wearables.
Abstract: The growing popularity of wearable devices is leading to new ways to interact with the environment, with other smart devices, and with other people. Wearables equipped with an array of sensors are able to capture the owner’s physiological and behavioural traits, thus are well suited for biometric authentication to control other devices or access digital services. However, wearable biometrics have substantial differences from traditional biometrics for computer systems, such as fingerprints, eye features, or voice. In this article, we discuss these differences and analyse how researchers are approaching the wearable biometrics field. We review and provide a categorization of wearable sensors useful for capturing biometric signals. We analyse the computational cost of the different signal processing techniques, an important practical factor in constrained devices such as wearables. Finally, we review and classify the most recent proposals in the field of wearable biometrics in terms of the structure of the biometric system proposed, their experimental setup, and their results. We also present a critique of experimental issues such as evaluation and feasibility aspects, and offer some final thoughts on research directions that need attention in future work.

129 citations


Journal ArticleDOI
TL;DR: It is argued that the averaged event-related potential (ERP) may provide the potential for more accurate biometric identification, as its elicitation allows for some control over the cognitive state of the user to be obtained through the design of the challenge protocol.
Abstract: The vast majority of existing work on brain biometrics has been conducted on the ongoing electroencephalogram. Here, we argue that the averaged event-related potential (ERP) may provide the potential for more accurate biometric identification, as its elicitation allows for some control over the cognitive state of the user to be obtained through the design of the challenge protocol. We describe the Cognitive Event-RElated Biometric REcognition (CEREBRE) protocol, an ERP biometric protocol designed to elicit individually unique responses from multiple functional brain systems (e.g., the primary visual, facial recognition, and gustatory/appetitive systems). Results indicate that there are multiple configurations of data collected with the CEREBRE protocol that all allow 100% identification accuracy in a pool of 50 users. We take this result as the evidence that ERP biometrics are a feasible method of user identification and worthy of further research.

124 citations


Proceedings ArticleDOI
01 Oct 2016
TL;DR: A method for student attendance system in classroom using face recognition technique by combining Discrete Wavelet Transforms and Discrete Cosine Transform to extract the features of student's face which is followed by applying Radial Basis Function (RBF) for classifying the facial objects.
Abstract: Authentication is one of the significant issues in the era of information system. Among other things, human face recognition (HFR) is one of known techniques which can be used for user authentication. As an important branch of biometric verification, HFR has been widely used in many applications, such as video monitoring/surveillance system, human-computer interaction, door access control system and network security. This paper proposes a method for student attendance system in classroom using face recognition technique by combining Discrete Wavelet Transforms (DWT) and Discrete Cosine Transform (DCT) to extract the features of student's face which is followed by applying Radial Basis Function (RBF) for classifying the facial objects. From the experiments which is conducted by involving 16 students situated in classroom setting, it results in 121 out of 148 successful faces recognition.

Journal ArticleDOI
TL;DR: This work is expected to provide an insight of the most relevant issues in periocular biometrics, giving a comprehensive coverage of the existing literature and current state of the art.

Proceedings ArticleDOI
01 Dec 2016
TL;DR: Wang et al. as discussed by the authors investigated the application of deep features extracted from VGG-Net for iris recognition and showed promising results with the best accuracy rate of 99.4%, which outperforms the previous best result.
Abstract: Iris is one of the popular biometrics that is widely used for identity authentication. Different features have been used to perform iris recognition in the past. Most of them are based on hand-crafted features designed by biometrics experts. Due to tremendous success of deep learning in computer vision problems, there has been a lot of interest in applying features learned by convolutional neural networks on general image recognition to other tasks such as segmentation, face recognition, and object detection. In this paper, we have investigated the application of deep features extracted from VGG-Net for iris recognition. The proposed scheme has been tested on two well-known iris databases, and has shown promising results with the best accuracy rate of 99.4%, which outperforms the previous best result.

Journal ArticleDOI
TL;DR: The experimental results show the proposed approach can make use of less than a half of the number of sensors while maintaining recognition rates up to 87%, which is crucial towards the effective use of EEG in biometric applications.
Abstract: A binary-constrained version of the Flower Pollination Algorithm has been proposed.Sensor selection in EEG signals by means of optimization techniques.To evaluate the proposed approach in the context of biometrics. Electroencephalogram (EEG) signal presents a great potential for highly secure biometric systems due to its characteristics of universality, uniqueness, and natural robustness to spoofing attacks. EEG signals are measured by sensors placed in various positions of a person's head (channels). In this work, we address the problem of reducing the number of required sensors while maintaining a comparable performance. We evaluated a binary version of the Flower Pollination Algorithm under different transfer functions to select the best subset of channels that maximizes the accuracy, which is measured by means of the Optimum-Path Forest classifier. The experimental results show the proposed approach can make use of less than a half of the number of sensors while maintaining recognition rates up to 87%, which is crucial towards the effective use of EEG in biometric applications.

Journal ArticleDOI
TL;DR: A general framework for the evaluation of unlinkability in biometric template protection schemes, as well as an improved, unlinkable and irreversible, system based on Bloom filters, which is thoroughly evaluated on the publicly available face corpus of the BioSecure Multimodal Database.

Journal ArticleDOI
TL;DR: A blind system identification approach to the design of alignment-free cancelable fingerprint templates to protect the binary string's frequency samples by countering or dissatisfying the identifiability condition so that they cannot be recovered from the output complex vector (transformed template).

Journal ArticleDOI
TL;DR: Recent research findings in animal biometrics are presented, with a strong focus on cattle biometric identifiers such as muzzle prints, iris patterns, and retinal vascular patterns, which may drive future research directions.

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A novel multi-feature evidence aggregation method for face spoofing detection that fuses evidence from features encoding of both texture and motion properties in the face and also the surrounding scene regions and provides robustness to different attacks.
Abstract: Biometric systems can be attacked in several ways and the most common being spoofing the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against attacks on biometric systems. For face recognition it is even more vulnerable as the image capture is non-contact based. Several anti-spoofing methods have been proposed in the literature for both contact and non-contact based biometric modalities often using video to study the temporal characteristics of a real vs. spoofed biometric signal. This paper presents a novel multi-feature evidence aggregation method for face spoofing detection. The proposed method fuses evidence from features encoding of both texture and motion (liveness) properties in the face and also the surrounding scene regions. The feature extraction algorithms are based on a configuration of local binary pattern and motion estimation using histogram of oriented optical flow. Furthermore, the multi-feature windowed videolet aggregation of these orthogonal features coupled with support vector machine-based classification provides robustness to different attacks. We demonstrate the efficacy of the proposed approach by evaluating on three standard public databases: CASIA-FASD, 3DMAD and MSU-MFSD with equal error rate of 3.14%, 0%, and 0%, respectively.

Journal ArticleDOI
TL;DR: This survey focuses on recognition, and leaves the detection and feature extraction problems in the background, because the kind of features used to code the iris pattern may significantly influence the complexity of the methods and their performance.

Proceedings ArticleDOI
01 May 2016
TL;DR: A new, bi-modal behavioral biometric solution for user authentication that takes into account micro-movements of a phone and movements of the user's finger during writing or signing on the touchscreen.
Abstract: The search for new authentication methods to replace passwords for modern mobile devices such as smartphones and tablets has attracted a substantial amount of research in recent years. As a result, several new behavioral biometric schemes have been proposed. Most of these schemes, however, are uni-modal. This paper presents a new, bi-modal behavioral biometric solution for user authentication. The proposed mechanism takes into account micro-movements of a phone and movements of the user's finger during writing or signing on the touchscreen. More specifically, it profiles a user based on how he holds the phone and based on the characteristics of the points being pressed on the touchscreen, and not the produced signature image. We have implemented and evaluated our scheme on commercially available smartphones. Using Multilayer Perceptron (MLP) 1-class verifier, we achieved approx. 95% True Acceptance Rate (TAR) with 3.1% False Acceptance Rate (FAR) on a dataset of 30 volunteers. Preliminary results on usability show a positive opinion about our system.

Journal ArticleDOI
TL;DR: This paper discusses the stages involved in the biometric system recognition process and further discusses multimodal systems in terms of their architecture, mode of operation, and algorithms used to develop the systems.
Abstract: Biometric systems are used for the verification and identification of individuals using their physiological or behavioral features. These features can be categorized into unimodal and multimodal systems, in which the former have several deficiencies that reduce the accuracy of the system, such as noisy data, inter-class similarity, intra-class variation, spoofing, and non-universality. However, multimodal biometric sensing and processing systems, which make use of the detection and processing of two or more behavioral or physiological traits, have proved to improve the success rate of identification and verification significantly. This paper provides a detailed survey of the various unimodal and multimodal biometric sensing types providing their strengths and weaknesses. It discusses the stages involved in the biometric system recognition process and further discusses multimodal systems in terms of their architecture, mode of operation, and algorithms used to develop the systems. It also touches on levels and methods of fusion involved in biometric systems and gives researchers in this area a better understanding of multimodal biometric sensing and processing systems and research trends in this area. It furthermore gives room for research on how to find solutions to issues on various unimodal biometric systems.

Journal ArticleDOI
TL;DR: In this article, a CNN with fused convolutional sub-sampling architecture was proposed for finger-vein recognition, which achieved an accuracy of 99.38% with an error ratio of 80/20 percent for separation of training and test samples.
Abstract: A novel approach using a convolutional neural network (CNN) for finger-vein biometric identification is presented in this paper. Unlike existing biometric techniques such as fingerprint and face, vein patterns are inside the body, making them virtually impossible to replicate. This also makes finger-vein biometrics a more secure alternative without being susceptible to forgery, damage, or change with time. In conventional finger-vein recognition methods, complex image processing is required to remove noise and extract and enhance the features before the image classification can be performed in order to achieve high performance accuracy. In this regard, a significant advantage of the CNN over conventional approaches is its ability to simultaneously extract features, reduce data dimensionality, and classify in one network structure. In addition, the method requires only minimal image preprocessing since the CNN is robust to noise and small misalignments of the acquired images. In this paper, a reduced-complexity four-layer CNN with fused convolutional-subsampling architecture is proposed for finger-vein recognition. For network training, we have modified and applied the stochastic diagonal Levenberg{Marquardt algorithm, which results in a faster convergence time. The proposed CNN is tested on a finger-vein database developed in-house that contains 50 subjects with 10 samples from each finger. An identification rate of 100.00% is achieved, with an 80/20 percent ratio for separation of training and test samples, respectively. An additional number of subjects have also been tested, in which for 81 subjects an accuracy of 99.38% is achieved.

01 Jan 2016
TL;DR: A reduced-complexity four-layer CNN with fused convolutional-subsampling architecture is proposed for finger-vein recognition and modified and applied the stochastic diagonal Levenberg{Marquardt algorithm, which results in a faster convergence time.
Abstract: A novel approach using a convolutional neural network (CNN) fornger-vein biometric identication is presented in this paper. Unlike existing biometric techniques such asngerprint and face, vein patterns are inside the body, making them virtually impossible to replicate. This also makesnger-vein biometrics a more secure alternative without being susceptible to forgery, damage, or change with time. In conventionalnger-vein recognition methods, complex image processing is required to remove noise and extract and enhance the features before the image classication can be performed in order to achieve high performance accuracy. In this regard, a signicant advantage of the CNN over conventional approaches is its ability to simultaneously extract features, reduce data dimensionality, and classify in one network structure. In addition, the method requires only minimal image preprocessing since the CNN is robust to noise and small misalignments of the acquired images. In this paper, a reduced-complexi four-layer CNN with fused convolutional-su bsampling architecture is proposed fornger-vein recognition. For network training, we have modied and applied the stochastic diagonal Levenberg{Marqua algorithm, which results in a faster convergence time. The proposed CNN is tested on anger-vein database developed in-house that contains 50 subjects with 10 samples from eachnger. An identication rate of 100.00% is achieved, with an 80/20 percent ratio for separation of training and test samples, respectively. An additional number of subjects have also been tested, in which for 81 subjects an accuracy of 99.38% is achieved.

Patent
Abhinav Tiwari1, Sanjoy Paul1
09 Feb 2016
TL;DR: In this article, a parallel pre-processing of the multiple images of a potential suspect is used to determine whether the potential suspect matches a person in the watch list and a result is outputted based on the determination.
Abstract: Biometric matching technology, in which a watch list is managed, multiple images of a potential suspect are accessed, and parallel pre-processing of the multiple images is controlled. Based on the pre-processing, an image of the potential suspect to use in matching against the watch list is determined and the determined image is used to search sorted biometric data included in the watch list. A subset of persons from the watch list is identified based on the search and parallel analysis of the determined image of the potential suspect against detailed biometric data associated with the subset of persons in the watch list is controlled. Based on the parallel analysis, it is determined whether the potential suspect matches a person in the watch list and a result is outputted based on the determination.

Patent
29 Jan 2016
TL;DR: In this article, a system and method for capturing a user's biometric features and generating an identifier characterizing the user's features using a mobile device such as a smartphone is presented.
Abstract: Technologies are presented herein in support of a system and method for performing fingerprint recognition. Embodiments of the present invention concern a system and method for capturing a user's biometric features and generating an identifier characterizing the user's biometric features using a mobile device such as a smartphone. The biometric identifier is generated using imagery captured of a plurality of fingers of a user for the purposes of authenticating/identifying the user according to the captured biometrics and determining the user's liveness. The present disclosure also describes additional techniques for preventing erroneous authentication caused by spoofing. In some examples, the anti-spoofing techniques may include capturing one or more images of a user's fingers and analyzing the captured images for indications of liveness.

Journal ArticleDOI
TL;DR: An ECC-free key binding scheme along with cancellable transforms for minutiae-based fingerprint biometrics along with a strong non-invertible cancellable transform is proposed, which is crucial to prevent a number of security and privacy attacks.

Proceedings ArticleDOI
19 Aug 2016
TL;DR: The aim of this competition is to evaluate and compare the performance of mobile ocular biometric recognition schemes in visible light on a large scale database (VISOB Dataset ICIP2016 Challenge Version) using standard evaluation methods.
Abstract: With the unprecedented mobile technology revolution, a number of ocular biometric based personal recognition schemes have been proposed for mobile use cases. The aim of this competition is to evaluate and compare the performance of mobile ocular biometric recognition schemes in visible light on a large scale database (VISOB Dataset ICIP2016 Challenge Version) using standard evaluation methods. Four different teams from universities across the world participated in this competition, submitting five algorithms altogether. The submitted algorithms applied different texture analysis in a learning or a non-learning based framework for ocular recognition. The best results were obtained by a team from Norwegian Biometrics Laboratory (NTNU, Norway), achieving an Equal Error Rate of 0.06% over a quarantined test set.

Journal ArticleDOI
TL;DR: The experimental results affirmed the robustness of the approach to successfully detect walking people as well as its potency to extract gait features for different camera viewpoints and confirmed the potential of the proposed method for identity tracking in real surveillance systems to recognize walking individuals across different views.
Abstract: Despite the fact that personal privacy has become a major concern, surveillance technology is now becoming ubiquitous in modern society. This is mainly due to the increasing number of crimes as well as the essential necessity to provide secure and safer environment. Recent research studies have confirmed now the possibility of recognizing people by the way they walk i.e. gait. The aim of this research study is to investigate the use of gait for people detection as well as identification across different cameras. We present a new approach for people tracking and identification between different non-intersecting un-calibrated stationary cameras based on gait analysis. A vision-based markerless extraction method is being deployed for the derivation of gait kinematics as well as anthropometric measurements in order to produce a gait signature. The novelty of our approach is motivated by the recent research in biometrics and forensic analysis using gait. The experimental results affirmed the robustness of our approach to successfully detect walking people as well as its potency to extract gait features for different camera viewpoints achieving an identity recognition rate of 73.6 % processed for 2270 video sequences. Furthermore, experimental results confirmed the potential of the proposed method for identity tracking in real surveillance systems to recognize walking individuals across different views with an average recognition rate of 92.5 % for cross-camera matching for two different non-overlapping views.

Journal ArticleDOI
TL;DR: The benefits of, as well as the challenges to the use of face recognition as a biometric tool are exposed, and a detailed survey of some well-known methods by expressing each method’s principle is provided.
Abstract: Despite the existence of various biometric techniques, like fingerprints, iris scan, as well as hand geometry, the most efficient and more widely-used one is face recognition. This is because it is inexpensive, non-intrusive and natural. Therefore, researchers have developed dozens of face recognition techniques over the last few years. These techniques can generally be divided into three categories, based on the face data processing methodology. There are methods that use the entire face as input data for the proposed recognition system, methods that do not consider the whole face, but only some features or areas of the face and methods that use global and local face characteristics simultaneously. In this paper, we present an overview of some well-known methods in each of these categories. First, we expose the benefits of, as well as the challenges to the use of face recognition as a biometric tool. Then, we present a detailed survey of the well-known methods by expressing each method’s principle. After that, a comparison between the three categories of face recognition techniques is provided. Furthermore, the databases used in face recognition are mentioned, and some results of the applications of these methods on face recognition databases are presented. Finally, we highlight some new promising research directions that have recently appeared.

Journal ArticleDOI
TL;DR: Experiments showed that using 1DMRLBP improved EER by 15% when compared with a biometric system based on raw time-samples, and a continuous authentication system, which uses sequential sampling and 1 DMRLBP feature extraction.
Abstract: The objective of a continuous authentication system is to continuously monitor the identity of subjects using biometric systems. In this paper, we proposed a novel feature extraction and a unique continuous authentication strategy and technique. We proposed One-Dimensional Multi-Resolution Local Binary Patterns (1DMRLBP), an online feature extraction for one-dimensional signals. We also proposed a continuous authentication system, which uses sequential sampling and 1DMRLBP feature extraction. This system adaptively updates decision thresholds and sample size during run-time. Unlike most other local binary patterns variants, 1DMRLBP accounts for observations’ temporal changes and has a mechanism to extract one feature vector that represents multiple observations. 1DMRLBP also accounts for quantization error, tolerates noise, and extracts local and global signal morphology. This paper examined electrocardiogram signals. When 1DMRLBP was applied on the University of Toronto database (UofTDB) 1,012 single session subjects database, an equal error rate (EER) of 7.89% was achieved in comparison to 12.30% from a state-of-the-art work. Also, an EER of 10.10% was resulted when 1DMRLBP was applied to UofTDB 82 multiple sessions database. Experiments showed that using 1DMRLBP improved EER by 15% when compared with a biometric system based on raw time-samples. Finally, when 1DMRLBP was implemented with sequential sampling to achieve a continuous authentication system, 0.39% false rejection rate and 1.57% false acceptance rate were achieved.