Skip to main content
Log in

On enhancing serial fusion based multi-biometric verification system

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Design of a serial fusion based multi-biometric verification system requires fixing several parameters, such as reject thresholds at each stage of the architecture and the order in which each individual verifier is placed within the multi-stage system. Selecting the order of verifier is a crucial parameter to fix because of its high impact on verification errors. A wrong choice of verifier order might lead to tremendous user inconvenience by denying a large number of genuine users and might cause severe security breach by accepting impostors frequently. Unfortunately, this design issue has been poorly investigated in multi-biometric literature. In this paper, we address this design issue by performing experiments using three different serial fusion based multi-biometric verification schemes. We did our experiments on publicly available NIST multi-modal dataset. We tested 24 orders—all possible orders originated from four individual verifiers—on a four-stage biometric verification system. Our experimental results show that the verifier order “best-to-worst”, where the best performing individual verifier is placed in the first stage, the next best performing individual verifier is placed in the second stage, and so on, is the top performing order. In addition, we have proposed a modification to the traditional architecture of serial fusion based multi-biometric verification systems. With rigorous experiments on the NIST multi-modal dataset and using three serial fusion based multi-biometric verification schemes, we demonstrated that our proposed architecture significantly improves the performance of serial fusion based multi-biometric verification systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Akhtar Z, Fumera G, Marcialis G, Roli F (2012) Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp 283–288. https://doi.org/10.1109/BTAS.2012.6374590

  2. Allano L, Dorizzi B, Garcia-Salicetti S (2010) Tuning cost and performance in multi-biometric systems: a novel and consistent view of fusion strategies based on the sequential probability ratio test (sprt). Pattern Recogn Lett 31(9):884–890

    Article  Google Scholar 

  3. Bartlett PL, Wegkamp MH (2008) Classification with a reject option using a hinge loss. J Mach Learn Res 9:1823–1840

    MathSciNet  MATH  Google Scholar 

  4. Brown D, Bradshaw K (2016) A multi-biometric feature-fusion framework for improved uni-modal and multi-modal human identification. In: 2016 IEEE Symposium on technologies for homeland security (HST), pp 1–6. https://doi.org/10.1109/THS.2016.7568927

  5. Chow CK (1970) On optimum recognition error and reject tradeoff. IEEE Trans Inform Theory 16(1):41–46. https://doi.org/10.1109/TIT.1970.1054406

    Article  Google Scholar 

  6. Fumera G, Roli F, Giacinto G (2000) Reject option with multiple thresholds. Pattern Recogn 33:2099–2101

    Article  Google Scholar 

  7. Hong L, Jain A (1998) Integrating faces and fingerprints for personal identification. IEEE Trans Pattern Anal Mach Intell 20(12):1295–1307. https://doi.org/10.1109/34.735803

    Article  Google Scholar 

  8. Hossain M, Balagani K, Phoha V (2012) New impostor score based rejection methods for continuous keystroke verification with weak templates. In: 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp 251–258. https://doi.org/10.1109/BTAS.2012.6374585

  9. Hossain M, Balagani K, Phoha V (2013) On controlling genuine reject rate in multi-stage biometric verification. In: IEEE Computer vision and pattern recognition workshops (CVPRW), pp 194–199

  10. Hossain MS (2016) On finding appropriate reject region in serial fusion based biometric verification. In: IEEE International multi-disciplinary conference on cognitive methods in situation awareness and decision support, pp 102–108. https://doi.org/10.1109/COGSIMA.2016.7497795

  11. Huang J, Ling C (2005) Using auc and accuracy in evaluating learning algorithms. IEEE Trans Knowledge Data Eng 17(3):299–310. https://doi.org/10.1109/TKDE.2005.50

    Article  Google Scholar 

  12. Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Pattern Recogn 38(12):2270–2285. https://doi.org/10.1016/j.patcog.2005.01.012

    Article  Google Scholar 

  13. Jain AK, Flynn P, Ross AA (2007) Handbook of biometrics. Springer-Verlag New York, inc., Secaucus

    Google Scholar 

  14. Landgrebe TCW, Tax DMJ, Paclík P, Duin RPW (2006) The interaction between classification and reject performance for distance-based reject-option classifiers. Pattern Recogn Lett 27:908–917. https://doi.org/10.1016/j.patrec.2005.10.015

    Article  Google Scholar 

  15. Li JQ, Barron AR (1999) Mixture density estimation. Advan Neural Inform Process Syst 12:279–285

    Google Scholar 

  16. Lumini A, Nanni L (2017) Overview of the combination of biometric matchers. Inf Fusion 33(C):71–85

    Article  Google Scholar 

  17. Marcialis G, Mastinu P, Roli F (2010) Serial fusion of multi-modal biometric systems. In: 2010 IEEE workshop on Biometric measurements and systems for security and medical applications (BIOMS), pp 1–7. https://doi.org/10.1109/BIOMS.2010.5610438

  18. Marcialis GL, Roli F, Didaci L (2009) Personal identity verification by serial fusion of fingerprint and face matchers. Pattern Recogn 42 (11):2807–2817. https://doi.org/10.1016/j.patcog.2008.12.010

    Article  Google Scholar 

  19. Murakami T, Takahashi K, Matsuura K (2012) Towards optimal countermeasures against wolves and lambs in biometrics. In: 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp 69–76. https://doi.org/10.1109/BTAS.2012.6374559

  20. Nandakumar K, Chen Y, Dass SC, Jain A (2008) Likelihood ratio-based biometric score fusion. IEEE Trans Pattern Anal Mach Intell 30:342–347

    Article  Google Scholar 

  21. Rakhlin A, Panchenko D, Mukherjee S (2005) Risk bounds for mixture density estimation. ESAIM: Probab Stat 9:220–229. https://doi.org/10.1051/ps:2005011

    Article  MathSciNet  Google Scholar 

  22. Ross A, Jain AK (2004) Multimodal biometrics: an overview. In: Proceedings of the 12th european signal processing conference, pp 1221–1224

  23. Sansone C, Vento M (2000) Signature verification: increasing performance by a multi-stage system. Pattern Anal Applic 3:169–181. https://doi.org/10.1007/s100440070021

    Article  Google Scholar 

  24. Santos-Pereira CM, Pires AM (2005) On optimal reject rules and roc curves. Pattern Recogn Lett 26:943–952. https://doi.org/10.1016/j.patrec.2004.09.042

    Article  Google Scholar 

  25. Takahashi K, Mimura M, Isobe Y, Seto Y (2004) A secure and user-friendly multimodal biometric system. Proc SPIE 5404:12–19. https://doi.org/10.1117/12.538894

    Article  Google Scholar 

  26. Tortorella F (2000) An optimal reject rule for binary classifiers. In: Proceedings of the Joint IAPR International Workshops on Advances in Pattern Recognition. Springer, London, pp 611–620

    Chapter  Google Scholar 

  27. Wald A (1945) Sequential tests of statistical hypotheses. Annal Math Stat 16(2):117–186

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md Hossain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hossain, M., Chen, J. & Rahman, K. On enhancing serial fusion based multi-biometric verification system. Appl Intell 48, 4824–4833 (2018). https://doi.org/10.1007/s10489-018-1257-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-018-1257-4

Keywords

Navigation