Abstract
The current decade has been experiencing a lot of research opportunities and challenges in the domain of biometric security. Simultaneously, Internet-of-Things (IoT) is also gaining seed functionality in early aspects of human lives. Cloud computing is the central thematic node in these two areas. In this work, we have proposed a novel biometric authentication scheme which is not based on conventional minutiae features, rather it is based on the frequency domain information of the fingerprint image. Input fingerprint is subjected to suitable quick pre-processing and then the discrete orthonormal Fourier transformation (DOST) features are extracted. Through suitable feature selection, chosen feature points are given to the classification stage where the recognition is accomplished using the standard AdaBoost-RF (AdaBoost Random Forest) algorithm. An overall accuracy of 98.5% has been obtained on a
Introduction
Biometric authentication along with cloud support is the most demanding task as of now [1, 2, 3]. It is because of the tremendous need of their application in various sectors. Biometric authentication has its importance and role in several sectors like information technology, national security concerns, AADHAAR applications, secure cashless banking transactions, shopping applications and many more. The ease of implementations and uses also making the digital biometric authentication system more popular. Biometric authentication refers to the task of digitized recognition of a persons identity through any of his biological traits. These traits may be fingerprint, face, palm print, periocular region, iris etc. This task comes under pattern recognition domain. Among all the biometric processes, the fingerprint recognition task is the most popular and widely used method. Computerized input of the fingerprint of a person is taken and it is used for further use to identify and re-identify the same person time to time. It helps in many secure and smooth authenticated processes, especially which involves important transactions.
General overview of a fingerprint recognition system.
Fingerprints are the unique ridges present on one’s finger, for which these have been used since many a centuries as a genuine authentication trait. Mutation of these traits is not possible. They are unchangeable throughout one’s lifetime. According to a study, the chances of identical fingerprints among two different individuals is just only 1 in 2
Among the existing techniques, three of the handpicked methods which are necessary for the proposed work point of view have been discussed below. The first two methods are considered for a neck-to-neck comparison with the proposed scheme in terms of the rate of accuracy. The third concept discussed here forms the basis of the proposed work.
Support vector machine (SVM)
It is a tool specifically used for pattern classification. It uses a hyperplane of
Kernel: Concept of linear algebra is followed to transform a classification problem into the hyperplane theme. The dot product of input (
where,
And, the exponential kernel is defined as:
Regularization (
Gamma (
Overall, the SVM has been well utilized as an efficient supervised classifier for numerous tasks [8, 9]. Choosing this for the proposed work is thus justified.
General overview of the proposed system.
This is an unsupervised classifier first introduced in the year 1967 [10]). Pre-specified number of clusters or groups of data points are generated out of the given set of data points based on their similarity measures corresponding to individual centroids of each clusters. Similar data points are kept in same clusters subject to their similarity measure less than aprior threshold value. In case, the similarity measure of a data point exceeds the threshold, then it becomes the centroid of a newly formed cluster. The objective here is to minimize the distance measure which is given as:
Adaptive boosting (AdaBoost)
This was first introduced by the Godel prize winners Freund and Schapire. Generally the adaBoost is used in combination with a number of weak classifiers to improve the final integrated efficiency. Conceptually, the weighted sum of output of a classifier is projected as the final output through this method. This is adaptive in nature because it boosts the weak classifiers gradually so that they tilt towards the correct classification of wrongly classified patterns. For the assignment of weight to the learners, a simple approach has been adopted. The classifier with less than 50% rate of preliminary classification accuracy are assigned weight as ‘0’ and those with less than 50% are assigned with a negative weight value. The adaBoost-RF (Random forest) has been chosen as a tool in the proposed work. This is because of the fact that, it provides an overall good rate of recognition accuracy with faster learning mechanism.
Proposed scheme
The propose scheme comprises of two distinct phases, namely, phase-1 that is for feature extraction feature selection, and phase-2 that is for recognition by classification. Generic methods are adopted for cropping the images for extracting the region of interests (ROI’s) from the input fingerprint images. These ROI’s are nothing but the input to the first phase of our proposed scheme. A complete sketch of the proposed scheme is illustrated in Fig. 2.
Phase-I
This phase utilizes the two-dimensional discrete orthonormal Stockwell transformation (2-D DOST). Stockwell transform (S-transformation) is a multiple scaling method that extracts the features right from pixel levels from an input fingerprint image. It takes into account the time and frequency description of the 2-D image signal. However, one of its major limitation is that, it consumes high computation time due to feature-redundancy. To mitigate this issue, DOST technique was introduced. For a given image
Apply two-dimensional Fourier transformation (2D-FT) to the input image Divide the
Compute the inverse of
where, The resultant is a voice-image with the same dimension as the input.
The DOST has been computer as per the steps mentioned below:
Randomly a pixel with coordinates The voice-image (
A regional space is built with dimension
There exist both
indent=2em Computation of features[1] Initialize
indent=2em Random forest with ada-boost[1] Initialize all the weight values (
Comparing the proposed scheme with other benchmark schemes
Comparing the proposed scheme with other benchmark schemes
This phase deals with the recognition by classification strategy. For this, the most popular classifier namely AdaBoost algorithm has been used. The AdaBoost is used for a weak learning for the purpose. Random forest works as ensemble classifier which was proposed by Breiman. This results in sufficiently good classification so far as the rate of accuracy is concerned. Random forest applies bagging whereby the constituent classifier is built via the input patterns. A number of features are selected which are used to make decision at certain nodes of decision tree structure. The rate of error is directly dependent on the count of the input feature sets. So, this is basically a collection of several tree prediction tools where the structures rely on the feature points with independent sampling and distribution among the trees on the forest being un-changed. The training set is used for creating the trees randomly, and a hypothesis for classification is made which is based on majority voting strategy. (Algorithm 3.1) AdaBoost algorithm is the well known boosting scheme. It considers a number of weak-classifiers with more error rate and makes an integrated hypothesis where the error rate reduces to minimal [11, 12]. For the case of binary-classification, it input the training sample set (
Samples from the dataset.
ROC plot comparison of the proposed scheme with others.
For validating the proposed scheme, a sample set of 5000 fingerprints have been considered (Samples shown in Fig. 3). This samples belongs to the CASIA database which specifically contains the index fingerprints of 500 distinct persons.All these images are 8-bit gray-level BMP files and their resolution is 328
The ROC-curves (Receiver operating characteristics curve) so obtained is compared with that of two other classifiers, namely, SVM (support vector machine) and k-NN (k nearest neighbor). This is shown in Fig. 4. The maximum value for AUC (area under curve) is 98.5. A snapshot of the real-time use of the simulated software as a product of the proposed scheme is shown in Fig. 5.
Snapshot of the implementation of the proposed scheme through our interface.
Comparing the proposed scheme with other benchmark schemes
In the Table 1, a comparison has also been presented. It is well observed that, the proposed scheme is satisfactorily outperforming the others in terms of the overall rate of accuracy.
As the desired final phase, the data have been uploaded onto the cloud service. This is done carefully by adopting the genuine guidelines which are standardized by the industry. These are mentioned in the list given below:
Ensuring NULL risk with error-free exit of the process, Data identity management, Data protection provision, Privacy policy preserver, Cloud security provision, Cloud service agreement provision.
The detail description of the deployment strategy have been presented in Table 2 with justified remark whenever applicable.
However, this phase is now at its incubation stage and it is still under analysis and synthesis process. The table here presents preliminary information about it subject to future scopes of full deployment.
In this paper, an efficient method has been suitably proposed along with it’s constituent algorithm for recognition of fingerprints followed by secure deployment onto the cloud. This work makes a successful attempt in real time capturing and recognition of fingerprints. For this, the DOST features have been considered without considering the conventional minutiae features that leads to costly computational complexity. Finally, hardware interfacing has been carried out successfully. Satisfactory recognition rate of 98.5% has been obtained using the proposed scheme.
