Your search

In authors or contributors
  • Design of a serial fusion based multi-biometric verification system requires fixing several parameters, such as reject thresholds at each stage of the architecture and the order in which each individual verifier is placed within the multi-stage system. Selecting the order of verifier is a crucial parameter to fix because of its high impact on verification errors. A wrong choice of verifier order might lead to tremendous user inconvenience by denying a large number of genuine users and might cause severe security breach by accepting impostors frequently. Unfortunately, this design issue has been poorly investigated in multi-biometric literature. In this paper, we address this design issue by performing experiments using three different serial fusion based multi-biometric verification schemes. We did our experiments on publicly available NIST multi-modal dataset. We tested 24 orders—all possible orders originated from four individual verifiers—on a four-stage biometric verification system. Our experimental results show that the verifier order “best-to-worst”, where the best performing individual verifier is placed in the first stage, the next best performing individual verifier is placed in the second stage, and so on, is the top performing order. In addition, we have proposed a modification to the traditional architecture of serial fusion based multi-biometric verification systems. With rigorous experiments on the NIST multi-modal dataset and using three serial fusion based multi-biometric verification schemes, we demonstrated that our proposed architecture significantly improves the performance of serial fusion based multi-biometric verification systems.

  • The traditional architecture of serial fusion based multi-biometric verification systems places an average performing or the worst performing individual verifier in the final stage. Because the final stage gives the verification decision using a single threshold and takes on the most confusing samples which are rejected by all previous stages, an average or the worst performing individual verifier may incur high verification errors in the final stage, which may negatively impact the performance of the whole system. Unfortunately, it is not possible to place a strong individual verifier in the final stage of a traditional architecture because if we place a strong individual verifier in the final stage, we will have to place a weak individual verifier in an earlier stage. Studies show that placing a weak individual verifier in an earlier stage worsens the performance of the whole system by giving more wrong decision earlier. Hence, the challenge is-how can we place the best performing individual verifier in the first stage and at the same time not place an average or the worst performing individual verifier in the final stage? In this paper, we address this challenge. We have come up with a very simple but effective solution. We have proposed a modification to the traditional architecture of serial fusion based multi-biometric verification systems. With rigorous experiments on the NIST multi-modal dataset and using three serial fusion based multi-biometric verification schemes, we demonstrated that our proposed architecture significantly improves the performance of serial fusion based multi-biometric verification systems. © 2018 IEEE.

  • We outline a novel method of user authentication for smart mobile devices, such as smartphones or tablets and propose movement pattern based authentication as an alternate to current methods that relies on a pin or drawn-pattern. While the current methods are vulnerable against common attacks (e.g., smudge attacks, shoulder surfing), our method, in contrast, is more resilient against the attacks of these kinds because it utilizes sensory data given off by the device during a preset movement for authentication. In our experiment, we recorded the values given off by four physical observational sensors: (1) accelerometer, (2) linear accelerometer, (3) gyroscope and (4) tilt sensor, which each had three axes, over a set of movements. We experimented with 10 arbitrary movement-patterns and gathered 12 samples of each (net 120 samples) to test with. We developed our own method of authentication, through which we performed 35,650 authentication attempts and found a 20.36% Equal Error Rate.

Last update from database: 3/13/26, 4:15 PM (UTC)

Explore

Resource type

Resource language