Abstract
The area of security of biometric access control systems is a rapidly growing field of scientific studies, diversely applicable in banking, electronic payment, etc. The paper presents the implementation of an intelligent algorithm hybrid biometric identification with the use of VistaFA2, IriTech and Futronic scanners. The system uses the biometric reading of human iris, face and fingerprints. An intelligent module determines a similarity measure of a processed hybrid feature vector to the consecutive records in the access database. This approach helps to increase the reliability of identification systems and reduces the risk of counterfeits and intrusion into restricted access resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Advancing Biometric Federal Bureau of Investigation FBI Biometric Specifications. https://www.fbibiospecs.cjis.gov. Accessed 20 Apr 2017
Jain, A.K., Klare, B.: Unsang park: face recognition: some challenges in forensics. To appear in the 9th IEEE International Conference on Automatic Face and Gesture Recognition, Santa Barbara, CA (2011). https://doi.org/10.1109/fg.2011.5771338
Burge, M.J., Bowyer, K.: Handbook of Iris Recognition. Springer, New York (2013)
Dudek-Dyduch, E.: Algebraic logical meta-model of decision processes - new metaheuristics. In: Artificial Intelligence and Soft Computing. Lecture Notes in Computer Science, ICAISC 2015, Zakopane, Poland, vol. 9119, pp. 541–554 (2015)
Hentati, R., Hentati, M., Abid, M.: Development a new algorithm for iris biometric recognition. Int. J. Comput. Commun. Eng. 1(3), 283–286 (2012)
Mahesh Naidu, K., Govindarajulu, P.: Biometrics hybrid system based verification. (IJCSIT) Int. J. Comput. Sci. Inf. Technol. 7(5), 2341–2346 (2016)
Kosiuczenko, P.: Specification of invariability in OCL. Softw. Syst. Model. 12(2), 415–434 (2013). https://doi.org/10.1007/s10270-011-0215-y
Kosiuczenko, P.: On the validation of invariants at runtime. Fundam. Inform. 125(2), 183–222 (2013)
Kulkarni, K., Shet, R., Iyer, N.: Hybrid primary and secondary biometric fusion. International Journal of Computer Applications (0975 – 8887), National Conference on Electronics and Computer Engineering (2016)
Madeyski, L., Kawalerowicz, M.: Software engineering needs agile experimentation: a new practice and supporting tool. In: Software Engineering: Challenges and Solutions, pp. 149–162 (2016). https://doi.org/10.1007/978-3-319-43606-7_4
Ochocki, M., Kołodziej, M., Sawicki, D.: Identity verification algorithm based on image of the iris, Institute of Theory of Electrical Engineering, Measurement and Information Systems, Warsaw University of Technology (2015). (in Polish)
Sadowska, M., Huzar, Z.: Semantic validation of UML class diagrams with the use of domain ontologies expressed in OWL 2. In: Software Engineering: Challenges and Solutions, pp. 47–59 (2016). https://doi.org/10.1007/978-3-319-43606-7_4
Neurotechnology. http://www.neurotechnology.com/. Accessed 20 Apr 2017
NIST national Institute of Standards and Technology. NIST Biometric Image Software (NBIS) (2017). https://www.nist.gov/services-resources/software/nist-biometric-image-software-nbis. Accessed 20 Apr 2017
Suganya, S., Menaka, D.: Performance evaluation of face recognition algorithms. Int. J. Recent Innov. Trends Comput. Commun. 2(1), 135–140 (2014). ISSN: 2321-8169
Orandi, S., Libert, J., Garris, M., Byers, F.: JPEG 2000 CODEC Certification Guidance for 1000 ppi Fingerprint Friction Ridge Imagery (2016). http://dx.doi.org/10.6028/NIST.SP.500–300. Accessed 20 Apr 2017
Verma, P., Dubey, M., Verma, P., Basu, S.: Daugman’s algorithm method for iris recognition – a biometric approach. IJETAE 2(6), 177–185 (2012)
Vishi, K., Yayilgan, S.Y.: Multimodal biometric authentication using fingerprint and iris recognition in identity management. In: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2013), pp. 334–341 (2013)
Li, X., Yin, Y., Ning, Y., Yang, G., Pan, L.: A hybrid biometric identification framework for high security applications. Front. Comput. Sci. 9(3), 392–401 (2015). https://doi.org/10.1007/s11704-014-4070-1
Zarzycki, H., Czerniak, J.M., Lakomski, D., Kardasz, P.: Performance comparison of CRM Systems dedicated to reporting failures to IT department. Software Engineering: Challenges and Solutions, pp. 133–146 (2016). https://doi.org/10.1007/978-3-319-43606-7_4
Acknowledgment
The research and experiments were conducted in the Laboratory of Cognitive Science Research, Computer Graphics and Digital Image Processing Laboratory and Real Time Diagnostic Systems Laboratory at the Centre for Innovation and Transfer of Natural Sciences and Engineering Knowledge, University of Rzeszow as a result of EU project “Academic Centre of Innovation and Technical-Natural Knowledge Transfer” based on “Regional Operational Program for Subcarpathian Voivodship for years 2007–2013” Project No. UDA-RPPK.01.03.00-18-001/10-00.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Gomolka, Z., Twarog, B., Zeslawska, E. (2019). The Implementation of an Intelligent Algorithm Hybrid Biometric Identification for the Exemplary Hardware Platforms. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Contemporary Complex Systems and Their Dependability. DepCoS-RELCOMEX 2018. Advances in Intelligent Systems and Computing, vol 761. Springer, Cham. https://doi.org/10.1007/978-3-319-91446-6_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-91446-6_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91445-9
Online ISBN: 978-3-319-91446-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)