Skip to main content
Top
Published in: Soft Computing 9/2012

01-09-2012 | Focus

Service-oriented architecture based on biometric using random features and incremental neural networks

Authors: Kwontaeg Choi, Kar-Ann Toh, Youngjung Uh, Hyeran Byun

Published in: Soft Computing | Issue 9/2012

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We propose a service-oriented architecture based on biometric system where training and classification tasks are used by millions of users via internet connection. Such a large-scale biometric system needs to consider template protection, accuracy and efficiency issues. This is a challenging problem since there are tradeoffs among these three issues. In order to simultaneously handle these issues, we extract both global and local features via controlling the sparsity of random bases without training. Subsequently, the extracted features are fused with a sequential classifier. In the proposed system, the random basis features are not stored for security reason. The non-training based on feature extraction followed by a sequential learning contributes to computational efficiency. The overall accuracy is consequently improved via an ensemble of classifiers. We evaluate the performance of the proposed system using equal error rate under a stolen-token scenario. Our experimental results show that the proposed method is robust over severe local deformation with efficient computation for simultaneous transactions. Although we focus on face biometrics in this paper, the proposed method is generic and can be applied to other biometric traits.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Achlioptas D (2003) Database-friendly random projections: Johnson-Lindenstrauss with binary coins. J Comput Syst Sci 66(4):671–687MathSciNetMATHCrossRef Achlioptas D (2003) Database-friendly random projections: Johnson-Lindenstrauss with binary coins. J Comput Syst Sci 66(4):671–687MathSciNetMATHCrossRef
go back to reference Agulla E, Muras E, Castro J, Mateo C (2007) An open source Java framework for biometric web authentication based on BioAPI. Lecture notes in computer science, vol 4693. Springer, Berlin, p 809 Agulla E, Muras E, Castro J, Mateo C (2007) An open source Java framework for biometric web authentication based on BioAPI. Lecture notes in computer science, vol 4693. Springer, Berlin, p 809
go back to reference Bevilacqua V, Cariello L, Carro G, Daleno D, Mastronardi G (2008) A face recognition system based on Pseudo 2D HMM applied to neural network coefficients. Soft Comput 12(7):615–621 Bevilacqua V, Cariello L, Carro G, Daleno D, Mastronardi G (2008) A face recognition system based on Pseudo 2D HMM applied to neural network coefficients. Soft Comput 12(7):615–621
go back to reference Bhattacharjee D, Nasipuri M, Basu DK, Kundu M (2010) Human face recognition using fuzzy multilayer perceptron. Soft Comput 14(6):559–570 Bhattacharjee D, Nasipuri M, Basu DK, Kundu M (2010) Human face recognition using fuzzy multilayer perceptron. Soft Comput 14(6):559–570
go back to reference Bouchachia A, Mittermeir R (2007) Towards incremental fuzzy classifiers. Soft Comput 11(2):193–207CrossRef Bouchachia A, Mittermeir R (2007) Towards incremental fuzzy classifiers. Soft Comput 11(2):193–207CrossRef
go back to reference Bruce Poon MAA, Yan H (2011) Performance evaluation and comparison of pca based human face recognition methods for distorted images. Int J Mach Learn Cybern 2(4):245–259CrossRef Bruce Poon MAA, Yan H (2011) Performance evaluation and comparison of pca based human face recognition methods for distorted images. Int J Mach Learn Cybern 2(4):245–259CrossRef
go back to reference Chacko BP, Raju G, Vimal Krishnan VR, Anto PB (2011) Handwritten character recognition using wavelet energy and extreme learning machine. Int J Mach Learn Cybern Chacko BP, Raju G, Vimal Krishnan VR, Anto PB (2011) Handwritten character recognition using wavelet energy and extreme learning machine. Int J Mach Learn Cybern
go back to reference Cheung K, Kong A, Zhang D, Kamel M, You J, Toby H (2005) An analysis on accuracy of cancelable biometrics based on biohashing. In: KES, pp 1168–1172 Cheung K, Kong A, Zhang D, Kamel M, You J, Toby H (2005) An analysis on accuracy of cancelable biometrics based on biohashing. In: KES, pp 1168–1172
go back to reference Cheung K, Kong A, Zhang D, Kamel M, You J (2006) Revealing the secret of facehashing. Lecture notes in computer science, vol 3832. Springer, Berlin, p 106 Cheung K, Kong A, Zhang D, Kamel M, You J (2006) Revealing the secret of facehashing. Lecture notes in computer science, vol 3832. Springer, Berlin, p 106
go back to reference Goh A, Ngo D (2003) Computation of cryptographic keys from face biometrics. Lecture notes in computer science. Springer, Berlin, pp 1–13 Goh A, Ngo D (2003) Computation of cryptographic keys from face biometrics. Lecture notes in computer science. Springer, Berlin, pp 1–13
go back to reference Huang G, Zhu Q, Siew C (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1–3):489–501CrossRef Huang G, Zhu Q, Siew C (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1–3):489–501CrossRef
go back to reference Huang GB, Wang DH, Lan Y (2011) Extreme learning machines: a survey. Int J Mach Learn Cybern 2(2):107–122CrossRef Huang GB, Wang DH, Lan Y (2011) Extreme learning machines: a survey. Int J Mach Learn Cybern 2(2):107–122CrossRef
go back to reference Huang J, Yuen PC, Lai JH, Li CH (2004) Face recognition using local and global features. EURASIP J Appl Signal Process 4 Huang J, Yuen PC, Lai JH, Li CH (2004) Face recognition using local and global features. EURASIP J Appl Signal Process 4
go back to reference Jain A, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 2008:1–17CrossRef Jain A, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 2008:1–17CrossRef
go back to reference Jin ATB, Connie T (2006) Remarks on BioHashing based cancelable biometrics in verification system. Neurocomputing 69(16–18):2461–2464CrossRef Jin ATB, Connie T (2006) Remarks on BioHashing based cancelable biometrics in verification system. Neurocomputing 69(16–18):2461–2464CrossRef
go back to reference Jones M, Viola P (2003) Face recognition using boosted local features. In: Proceedings of international conference on computer vision Jones M, Viola P (2003) Face recognition using boosted local features. In: Proceedings of international conference on computer vision
go back to reference Jun W, Shitong W, Chung F-l (2011) Positive and negative fuzzy rule system, extreme learning machine and image classification. Int J Mach Learn Cybern 2(4):261–271CrossRef Jun W, Shitong W, Chung F-l (2011) Positive and negative fuzzy rule system, extreme learning machine and image classification. Int J Mach Learn Cybern 2(4):261–271CrossRef
go back to reference Kikuchi H, Ogata W, Nagai K, Nishigaki M (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536 Kikuchi H, Ogata W, Nagai K, Nishigaki M (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536
go back to reference Kong A, Cheung K, Zhang D, Kamel M, You J (2006) An analysis of BioHashing and its variants. Pattern Recogn Lett 39(7):1359–1368MATH Kong A, Cheung K, Zhang D, Kamel M, You J (2006) An analysis of BioHashing and its variants. Pattern Recogn Lett 39(7):1359–1368MATH
go back to reference Lawrence S, Giles CL, Tsoi AhC, Back AD (1997) Face recognition: a convolutional neural-network approach. IEEE Trans Neural Netw 8(1):98–113 Lawrence S, Giles CL, Tsoi AhC, Back AD (1997) Face recognition: a convolutional neural-network approach. IEEE Trans Neural Netw 8(1):98–113
go back to reference Li SZ, Zhang Z (2004) Floatboost learning and statistical face detection. IEEE Trans Pattern Anal Mach Intell 26:1112–1123 Li SZ, Zhang Z (2004) Floatboost learning and statistical face detection. IEEE Trans Pattern Anal Mach Intell 26:1112–1123
go back to reference Li P, Hastie T, Church K (2006) Very sparse random projections. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, p 296 Li P, Hastie T, Church K (2006) Very sparse random projections. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, p 296
go back to reference Liang N, Huang G, Saratchandran P, Sundararajan N (2006) A fast and accurate online sequential learning algorithm for feedforward networks. IEEE Trans Neural Netw 17(6):1411–1423CrossRef Liang N, Huang G, Saratchandran P, Sundararajan N (2006) A fast and accurate online sequential learning algorithm for feedforward networks. IEEE Trans Neural Netw 17(6):1411–1423CrossRef
go back to reference Liao S, Zhu X, Lei Z, Zhang L, Li S (2007) Learning multi-scale block local binary patterns for face recognition. Lecture notes in computer science, vol 4642. Springer, Berlin, p 828 Liao S, Zhu X, Lei Z, Zhang L, Li S (2007) Learning multi-scale block local binary patterns for face recognition. Lecture notes in computer science, vol 4642. Springer, Berlin, p 828
go back to reference Lu Y, Sundararajan N, Saratchandran P (1998) Performance evaluation of a sequential minimal radial basis function (RBF) neural network learning algorithm. IEEE Trans Neural Netw 9(2):308–318CrossRef Lu Y, Sundararajan N, Saratchandran P (1998) Performance evaluation of a sequential minimal radial basis function (RBF) neural network learning algorithm. IEEE Trans Neural Netw 9(2):308–318CrossRef
go back to reference Maltoni D, Jain A, Prabhakar S (2009) Handbook of fingerprint recognition. Springer, Berlin Maltoni D, Jain A, Prabhakar S (2009) Handbook of fingerprint recognition. Springer, Berlin
go back to reference Mehrotra H, Kisku D, Radhika V, Majhi B, Gupta P (2010) Feature level clustering of large biometric database. Arxiv preprint arXiv:10020383 Mehrotra H, Kisku D, Radhika V, Majhi B, Gupta P (2010) Feature level clustering of large biometric database. Arxiv preprint arXiv:10020383
go back to reference Orriols-Puig A, Casillas J (2010) Fuzzy knowledge representation study for incremental learning in data streams and classification problems. Soft Comput (online first) Orriols-Puig A, Casillas J (2010) Fuzzy knowledge representation study for incremental learning in data streams and classification problems. Soft Comput (online first)
go back to reference Palla S, Chikkerur S, Govindaraju V, Rudravaram P (2004) Classification and indexing in large biometric databases. In: Biometrics consortium conference, Crystal City Palla S, Chikkerur S, Govindaraju V, Rudravaram P (2004) Classification and indexing in large biometric databases. In: Biometrics consortium conference, Crystal City
go back to reference Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634CrossRef Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634CrossRef
go back to reference Shan C, McOwan PW, Gong S (2009) Facial expression recognition based on local binary patterns: a comprehensive study. Image Vis Comput 27(6):803–816CrossRef Shan C, McOwan PW, Gong S (2009) Facial expression recognition based on local binary patterns: a comprehensive study. Image Vis Comput 27(6):803–816CrossRef
go back to reference Snelick R, Uludag U, Mink A, Indovina M, Jain A (2005) Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Trans Pattern Anal Mach Intell 27:450–455CrossRef Snelick R, Uludag U, Mink A, Indovina M, Jain A (2005) Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Trans Pattern Anal Mach Intell 27:450–455CrossRef
go back to reference Teoh A, Ngo D (2005) Cancellable biometerics featuring with tokenised random number. Pattern Recogn Lett 26(10):1454–1460CrossRef Teoh A, Ngo D (2005) Cancellable biometerics featuring with tokenised random number. Pattern Recogn Lett 26(10):1454–1460CrossRef
go back to reference Teoh A, Yuang C (2007) Cancelable biometrics realization with multispace random projections. IEEE Trans Syst Man Cybern Part B 37(5):1096CrossRef Teoh A, Yuang C (2007) Cancelable biometrics realization with multispace random projections. IEEE Trans Syst Man Cybern Part B 37(5):1096CrossRef
go back to reference Teoh A, Ngo D, Goh A (2004) Personalised cryptographic key generation based on FaceHashing. Comput Security 23(7):606–614CrossRef Teoh A, Ngo D, Goh A (2004) Personalised cryptographic key generation based on FaceHashing. Comput Security 23(7):606–614CrossRef
go back to reference Teoh A, Goh A, Ngo D (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892CrossRef Teoh A, Goh A, Ngo D (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892CrossRef
go back to reference Teoh A, Kuan Y, Lee S (2008) Cancellable biometrics and annotations on BioHash. Pattern Recogn Lett 41(6):2034–2044MATH Teoh A, Kuan Y, Lee S (2008) Cancellable biometrics and annotations on BioHash. Pattern Recogn Lett 41(6):2034–2044MATH
go back to reference Viola P, Jones M (2002) Robust real-time object detection. Int J Comput Vis 57(2):137–154CrossRef Viola P, Jones M (2002) Robust real-time object detection. Int J Comput Vis 57(2):137–154CrossRef
go back to reference Wang X, Dong C (2009) Improving generalization of fuzzy if–then rules by maximizing fuzzy entropy. IEEE Trans Fuzzy Syst 17(3):556–567CrossRef Wang X, Dong C (2009) Improving generalization of fuzzy if–then rules by maximizing fuzzy entropy. IEEE Trans Fuzzy Syst 17(3):556–567CrossRef
go back to reference Wang X, Chen A, Feng H (2011a) Upper integral network with extreme learning mechanism. Neurocomputing 74(16):2520–2525CrossRef Wang X, Chen A, Feng H (2011a) Upper integral network with extreme learning mechanism. Neurocomputing 74(16):2520–2525CrossRef
go back to reference Wang X, Dong L, Yan J (2011b) Maximum ambiguity based sample selection in fuzzy decision tree induction. IEEE Trans Knowl Data Eng 99:1 Wang X, Dong L, Yan J (2011b) Maximum ambiguity based sample selection in fuzzy decision tree induction. IEEE Trans Knowl Data Eng 99:1
go back to reference Xu X, Liu W, Venkatesh S (2011) An innovative face image enhancement based on principle component analysis. Int J Mach Learn Cybernetics Xu X, Liu W, Venkatesh S (2011) An innovative face image enhancement based on principle component analysis. Int J Mach Learn Cybernetics
go back to reference Yang X, Lu J, Zhang G (2010) Adaptive pruning algorithm for least squares support vector machine classifier. Soft computing 14(7):667–680 (online first)MATHCrossRef Yang X, Lu J, Zhang G (2010) Adaptive pruning algorithm for least squares support vector machine classifier. Soft computing 14(7):667–680 (online first)MATHCrossRef
go back to reference Yu W, Teng X, Liu C (2006) Face recognition fusing global and local features. J Electron Imaging 15:013–014 Yu W, Teng X, Liu C (2006) Face recognition fusing global and local features. J Electron Imaging 15:013–014
go back to reference Zhang L, Chu R, Xiang S, Liao S, Li S (2007) Face detection based on multi-block lbp representation. Lecture notes in computer science, vol 4642. Springer, Berlin, p 11 Zhang L, Chu R, Xiang S, Liao S, Li S (2007) Face detection based on multi-block lbp representation. Lecture notes in computer science, vol 4642. Springer, Berlin, p 11
Metadata
Title
Service-oriented architecture based on biometric using random features and incremental neural networks
Authors
Kwontaeg Choi
Kar-Ann Toh
Youngjung Uh
Hyeran Byun
Publication date
01-09-2012
Publisher
Springer-Verlag
Published in
Soft Computing / Issue 9/2012
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-012-0827-3

Other articles of this Issue 9/2012

Soft Computing 9/2012 Go to the issue

Premium Partner