ارائه یک روش ترتیبی پویا بر اساس یادگیری عمیق به منظور بهبود کارایی سیستمهای تطبیق بیومتریکی مبتنی بر کارت هوشمند
الموضوعات :محمد صبری 1 , محمد شهرام معین 2 , فربد رزازی 3
1 - دانشگاه آزاد اسلامی واحد علوم و تحقیقات
2 - مرکز تحقیقات مخابرات ایران
3 - دانشگاه آزاد واحد علوم و تحقیقات
الکلمات المفتاحية: تصدیق هویتیادگیری عمیقتطبیق در بستر کارتچند بیومتریکی,
ملخص المقالة :
امروزه با افزایش تهدیداتی نظیر تروریسم و جرایم سایبری، فرایند تصدیق هویت افراد اهمیت چشمگیری یافته و متضمن امنیت ملی یک کشور تلقی میگردد. در این پژوهش، یک روش ترتیبی بر اساس یادگیری عمیق جهت مدیریت پویای جریان الگوریتم سیستمهای تصدیق هویت چند بیومتریکی ارائه شده است. روش پیشنهادی دارای این مزیت است که معیارهای ویژگی به صورت ضمنی و اتوماتیک توسط یک شبکه عمیق با معماری انتها به انتها استخراج میگردند. یک سیستم تصدیق هویت چند بیومتریکی شامل دو انگشت و چهره مبتنی بر روش پیشنهادی نیز پیادهسازی گردیده است. بر طبق نتایج، در مجموع تصدیق هویت برای 42/91% موارد بر اساس اثر انگشت انجام شده و فقط برای 58/8% موارد نیاز به استفاده از مشخصه چهره بوده است. این در حالی است که روش پیشنهادی نسبت به انگشت اول و دوم به ترتیب 35 و 30% دقت بالاتری نیز داشته است. دستاوردهای این پژوهش میتواند نقش مهمی در مقبولیت و موفقیت پروژههای عملیاتی و میزان اثربخشی آنها در فرایند تصدیق هویت داشته باشد زیرا از یک طرف دارای دقت بیشتری بوده و از طرف دیگر منجر به کاهش هزینه یعنی زمان مورد نیاز برای فرایند اخذ و تطبیق گردیده که باعث میشود همزمان رضایتمندی خدمتگیرنده و امنیت خدمتدهنده فراهم آید.
[1] K. D. Mitnick and W. L. Simon, The Art of Deception: Controlling the Human Element of Security, John Wiley & Sons, 2011.
[2] D. V. Klein, "Foiling the cracker: a survey of, and improvements to, password security," in Proc. of the 2nd USENIX Security Workshop, pp. 5-14, Berkeley, CA, USA, Aug. 1990.
[3] R. Brunelli and D. Falavigna, "Person identification using multiple cues," Pattern Analysis and Machine Intelligence, IEEE Trans. on, vol. 17, no. 10, pp. 955-966, Apr. 1995.
[4] A. K. Jain, et al., "Integrating faces, fingerprints, and soft biometric traits for user recognition," in Proc. ECCV Workshop BioAW, pp. 259-269 Prague, Czech Republic, 15-15 May 2004.
[5] R. Bolle, S. Pankanti, and A. K. Jain, Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society, Kluwer Academic Publishers, 2006.
[6] K. Nandakumar, Multibiometric Systems: Fusion Strategies and Template Security, Michigan State, p. 250, 2008.
[7] D. A. Cooper, et al., Interfaces for Personal Identity Verification, (including updates as of 02-08-2016) 2016.
[8] C. L. Wilson, P. J. Grother, and R. Chandramouli, Biometric data specification for personal identity verification, 2006.
[9] D. Isenor and S. G. Zaky, "Fingerprint identification using graph matching," Pattern Recognition, vol. 19, no. 2, pp. 113-122, Jan. 1986.
[10] ISO/IEC 19794-2:2011, Information Technology-Biometric Data Interchange Formats-Part 2: Finger Minutiae Data, 2011.
[11] P. J. Grother and W. J. Salamon, MINEX II Performance of Fingerprint Match-on-Card Algorithms-Phase II/III Report, 2009.
[12] M. Sabri, M. S. Moin, and F. Razzazi, "A new framework for match on card and match on host quality based multimodal biometric authentication," J. of Signal Processing Systems, vol. 91, no. 2, pp. 163-177, Feb. 2018 2018.
[13] N. Poh, T. Bourlai, and J. Kittler, "A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms," Pattern Recognition, vol. 43, no. 3, pp. 1094-1105, Mar. 2010.
[14] M. Vatsa, et al., "On the dynamic selection of biometric fusion algorithms," IEEE Trans. on Information Forensics and Security, vol. 5, no. 3, pp. 470-479, Sept. 2010.
[15] M. A. Olsen, V. Smida, and C. Busch, "Finger image quality assessment features-definitions and evaluation," IET Biometrics, vol. 5, no. 2, pp. 47-64, May 2016.
[16] S. Bharadwaj, M. Vatsa, and R. Singh, "Biometric quality: a review of fingerprint, iris, and face," EURASIP J. on Image and Video Processing, vol. 2014, no. 1, pp. 34-62, Jul. 2014.
[17] L. Best-Rowden and A. K. Jain, Automatic Face Image Quality Prediction, arXiv preprint arXiv:1706.09887, 2017.
[18] J. Chen, et al., "Face image quality assessment based on learning to rank," IEEE Signal Processing Letters, vol. 22, no. 1, pp. 90-94, Aug. 2015.
[19] C. S. Mlambo and M. B. Shabalala, "Distortion analysis on binary representation of minutiae based fingerprint matching for match-on-card," in Proc. IEEE Symp. Series on Computational Intelligence, pp. 349-353, Cape Town, South Africa, 7-10 Dec. 2015.
[20] M. Govan and T. Buggy, "A computationally efficient fingerprint matching algorithm for implementation on smartcards," in Proc. First IEEE Int. Conf. on Biometrics: Theory, Applications, and Systems, BTAS, 6 pp., Crystal City, VA, USA, 27-29 Sept. 2007.
[21] B. Vibert, C. Rosenberger, and A. Ninassi, "Security and performance evaluation platform of biometric match on card," in Proc. IEEE World Congress on Computer and Information Technology, WCCIT'13, 6 pp., Sousse, Tunisia, 22-24 Jun. 2013.
[22] K. K. Nair, A. Helberg, and J. Van der Merwe, "An approach to improve the match-on-card fingerprint authentication system security," in Proc. IEEE 6th Int. Conf. on Digital Information and Communication Technology and Its Applications, DICTAP'16, pp. 119-125, Konya, Turkey, 21-23 Jul. 2016.
[23] A. Nagar, K. Nandakumar, and A. K. Jain, "Biometric template transformation: a security analysis," Media Forensics and Security II. 2010. International Society for Optics and Photonics.
[24] A. Lumini and L. Nanni, "Overview of the combination of biometric matchers," Information Fusion, , vol. 33, no. 4, pp. 71-85, Jan. 2017.
[25] R. Raghavendra, et al., "Designing efficient fusion schemes for multimodal biometric systems using face and palmprint," Pattern Recognition, vol. 44, no. 5, pp. 1076-1088, May 2011.
[26] M. Vatsa, et al., "On the dynamic selection of biometric fusion algorithms," IEEE Trans. on Information Forensics and Security, vol. 5, no. 3, pp. 470-479, Jul. 2010.
[27] A. Baig, et al., "Cascaded multimodal biometric recognition framework," IET Biometrics, vol. 3, no. 1, pp. 16-28, Aug. 2013.
[28] S. Bharadwaj, et al., "QFuse: online learning framework for adaptive biometric system," Pattern Recognition, vol. 48, no. 11, pp. 3428-3439, Aug. 2015.
[29] D. Peralta, et al., "On the use of convolutional neural networks for robust classification of multiple fingerprint captures," International J. of Intelligent Systems, vol. 33, no. 1, pp. 213-230, Jan. 2018.
[30] H. U. Jang, et al., "DeepPore: fingerprint pore extraction using deep convolutional neural networks," IEEE Signal Processing Letters, vol. 24, no. 12, pp. 1808-1812, Oct. 2017.
[31] K. Simonyan and A. Zisserman, Very Deep Convolutional Networks for Large-Scale Image Recognition, arXiv preprint arXiv:1409.1556, 2014.
[32] Y. Tang, F. Gao, and J. Feng, Latent Fingerprint Minutia Extraction Using Fully Convolutional Network, arXiv preprint arXiv:1609.09850, 2016.
[33] Y. Tang, et al., FingerNet: An Unified Deep Network for Fingerprint Minutiae Extraction, arXiv preprint arXiv:1709.02228, 2017.
[34] H. Qin and M. A. El Yacoubi, "Deep representation for finger-vein image quality assessment," IEEE Trans. on Circuits and Systems for Video Technology, vol. 28, no. 8, pp. 1677-1693, Mar. 2017.
[35] F. Marra, et al., "A deep learning approach for iris sensor model identification," Pattern Recognition Letters, vol. 113, no. 1, pp. 46-53, Oct. 2017.
[36] D. Menotti, et al., "Deep representations for iris, face, and fingerprint spoofing detection," IEEE Trans. on Information Forensics and Security, vol. 10, no. 4, pp. 864-879, Feb. 2015.
[37] R. F. Nogueira, R. de Alencar Lotufo, and R. C. Machado, "Fingerprint liveness detection using convolutional neural networks," IEEE Trans. on Information Forensics and Security, vol. 11, no. 6, pp. 1206-1213, Jan. 2016.
[38] T. Chugh, K. Cao, and A. K. Jain, "Fingerprint spoof buster: use of minutiae-centered patches," IEEE Trans. on Information Forensics and Security, vol. 13, no. 9, pp. 2190-2202, Mar. 2018.
[39] L. Best-Rowden and A. K. Jain, "Learning face image quality from human assessments," IEEE Trans. on Information Forensics and Security, vol. 13, no. 12, pp. 3064-3077, Jan. 2018.
[40] ICAO, D., 9303-Machine Readable Travel Documents-Part 9: Deployment of Biometric Identification and Electronic Storage of Data in eMRTDs, International Civil Aviation Organization (ICAO), 2015,
[41] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," Advances in Neural Information Processing Systems, vol. 1, no. 1, pp. 1097-1105, Dec. 2012.
[42] X. Glorot and Y. Bengio, "Understanding the difficulty of training deep feedforward neural networks," in Proc. of the 13th International Conf. on Artificial Intelligence and Statistics, vol. 9, pp. 249-256, Sardinia, Italy, 13-15 May 2010.
[43] L. Bottou, "Large-scale machine learning with stochastic gradient descent," in Proc. of 19th Int. Symp. on Computational Statistics, COMPSTAT'10, pp. 177-186, Paris, France, 22-27 Aug. 2010.
[44] I. Sutskever, et al., "On the importance of initialization and momentum in deep learning," in Proc. Int Conf. on Machine Learning, ICML'13, vol. 28, pp. 1139-1147, Jun. 2013.
[45] A. Karpathy, Class Notes for Cs231n: Convolutional Neural Networks for Visual Recognition, Dept. of Comp. Sci., Stanford University, Palo Alto, CA, USA, spring 2017. [Online]. Available: http://cs231n.github.io/python-numpy-tutorial/
[46] C. I. Watson, et al., Fingerprint Vendor Technology Evaluation, 2012, NIST, NIST Interagency/Internal Report (NISTIR), Jan. 2015.
[47] M. S. Hossain and K. A. Rahman, "An empirical study on verifier order selection in serial fusion based multi-biometric verification system," in Proc. Int. Conf. on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 249-258, Arras, France, 27-30 Jun. 2017.
[48] A. Jain, K. Nandakumar, and A. Ross, "Score normalization in multimodal biometric systems," Pattern Recognition, vol. 38, no. 12, pp. 2270-2285, Dec. 2005.
[49] C. W. Hsu, C. C. Chang, and C. J. Lin, A Practical Guide to Support Vector Classification, Technical Report, Department of Computer Science, National Taiwan University,Taipei, 2003.
[50] A. G. Howard, et al., Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications, arXiv preprint arXiv:1704.04861, 2017.