SlideShare a Scribd company logo
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
70
FEATURE SELECTION IN MULTIMODAL
AUTHENTICATION USING LU FACTORIZATION
WITH CSEAM MODEL
Y Suresh,K Pavan Kumar, PESN Krishna Prasad, BDCN Prasad
Prasad V. Potluri Siddhartha Institute of Technology,
Kanuru, Vijayawada-7, India
Abstract
Multimodal authentication is one of the prime concepts in current applications of real scenario. Various
approaches have been proposed in this aspect. In this paper, an intuitive strategy is proposed as a
framework for providing more secure key in biometric security aspect. Initially the features will be
extracted through PCA by SVD from the chosen biometric patterns, then using LU factorization technique
key components will be extracted, then selected with different key sizes and then combined the selected key
components using convolution kernel method (Exponential Kronecker Product - eKP) as Context-Sensitive
Exponent Associative Memory model (CSEAM). In the similar way, the verification process will be done
and then verified with the measure MSE. This model would give better outcome when compared with SVD
factorization[1] as feature selection. The process will be computed for different key sizes and the results
will be presented.
KEYWORDS
Feature selection, LU factorization, CSEAM Model, PCA by SVD, Exponential kronecker Product (eKP),
Multimodal Authentication.
1.INTRODUCTION
In recent scenario, agent biometric data verification is one of the critical tasks in the access
control that performs the major building block of security. User identification is traditionally
based on something that user knows (PIN/Password) and user has(Key/Token/Smart Card). But,
these traditional methods can be forgotten, disclosed, lost or stolen. Apart from these strategies,
failure rate is to differentiate between an accredited and unaccredited person [12].
Biometrics [4] is a scientific discipline that involves methods of identity verification or
identification based on the principle of measurable physiological or behavioural characteristics
such as a fingerprint, an iris pattern, palm, vein or a voice sample. In the analysis of security
aspect, human patterns are unique. The primary advantage of multimodal authentication strategies
over other approaches of authentication is to process/ combine two or more user patterns with the
use of psychological/behavioural patterns.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
71
Nowadays, the biometrics patterns has been adopted throughout worldwide on a large scale and
used in different sectors of public/private organizations. As specified in [12], biometric pattern
authentication is a layered model consists of identification mode and verification mode [2, 3, 4]
and the identification process starts with the enrolment process and consists of Acquisition:
Acquisition is the first step in biometric authentication system. Using input device User’s sample
is obtained; Creation of the characteristics: After first step, biometric measurements are
processed. The numbers of biometric samples depends upon the technology that we are using.
Sometimes, single metric is sufficient, but most of the cases multiple patterns are required. By
using these patters features are extracted; Storage of the characteristics: After feature extraction
the feature patterns are stored in a card/database server/on a workstation/directly on
authentication terminal.
After enrolment of the user, the user can use the system for successful authentications or
identifications. The verification/testing process takes the following steps:
1. Acquisition(s): Biometric measurements should be acquired in order to make comparison
with parent patterns.
2. Creation of new characteristics: New characteristics are created from the previous step.
3. Comparison: Currently computed characteristics are computed with the characteristics
obtained in the previous step.
4. Decision: The final step in the test phase is the yes/no decision based on a threshold.
2.MULTIMODAL AUTHENTICATION SYSTEM
In multimodal authentication system, user has to enrol two to three patterns for
identification/verification. Such patterns may be noise in capturing and may lead to more error
prone. In order, to resolve the noise/ inconsistency, vector logic based models have been
considered for minimizing the error rate.
From author’s perspective, different strategies, methodologies and models have been proposed
for multimodal systems, some of them may be, the user authentication based on speech and face
patterns [5] is one of the first multimodal biometric system. Brunelli and Falavigna[5] for
normalization and weighted geometric average for fusion of voice and face biometrics that uses
hyperbolic tangent (tanh) and also they proposed a hierarchical combination scheme for a
multimodal identification system. Kittler et al. [6] conducted with different fusion strategies for
human face and voice patterns, including statistical and algebraic metrics. Kittler et al. [6]
concluded that the algebraic sum metric is not significantly affected by the statistical estimation
errors and covers its superiority and importance. Hong and Jain [7] proposed a multimodal
system fingerprint pattern satisfaction is applied after pruning the datasets via face pattern
matching. Ben-Yacoub et al. [8] considered several fusion strategies, such as tree classifiers,
multilayer perceptions and support vector machines for face and voice biometrics. Ross and Jain
[9] fusion the traits of biometric patterns- fingerprint, face and hand geometry with sum, decision
tree and linear discriminant approaches. The authors concluded that sum rule performs
outstanding when compared with others.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
72
From these observations, vector logic approach is to be considered for multi-modal biometric
authentication system based on facial and iris pattern. In this paper, both face images and
fingerprint patterns are chosen due to their complementary characteristics, physiology, and
behaviour.
3.PROPOSED MODEL
The effectiveness of biometric system using two level multimodal authentication problems are
discussed in [1]for encoding and decoding of biometric patterns. At level one, input patterns are
normalized with PCA by SVD and then keys will be selected using LU factorization from the
extracted patterns after processing sensed data with PCA by SVD, at level two using
computational model (CSEAM model [1]),the generated keys will fusion through LU
factorization, and at level three the decision process can be analyzed using error estimation
strategies. An overview of the computational framework for the proposed model is described in
the Fig. 1.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
73
Figure 1. Framework of the Proposed Model
Figure 2. Black diagram of the Proposed Model.
3.1.Feature Extraction Using PCA by SVD
3.1.1 Principal Component Analysis (PCA)
In PCA[10], the directions of the data patterns is the most variation, that is the eigen vectors
corresponding to the largest eigen values of the covariance matrix, and project the data patterns
onto these directions that might get rid of important non-second order information by PCA. If the
matrix of eigen vectors sorted according to eigen value by , then PCA transformation of the data
as . The eigen vectors are called principle components [11]. By selecting the first d rows
of Y, then the projected data is from n down to d dimensions.
3.1.2 Spectral decomposition of a square matrix:
Any real symmetric matrix A of size mxm may be decomposed uniquely as [10]
Where U is an orthonormal matrix and it satisfies
or
and is a diagonal matrix . The eigen vectors of matrix A are columns of the matrix U and
the eigen values are the diagonal elements of matrix .
3.1.3 Singular Value Decomposition:
A matrix A of size mxn can be decomposed as [10]
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
74
U is a column orthogonal matrix of size mxn and its columns are eigen vectors of
i
V is a orthogonal matrix of size nxn and its columns are eigen vectors of A
ie
D is a diagonal matrix of size nxn called singular values.
If then
3.1.4 PCA by SVD:
The main advantage of the PCA by SVD is to apply the projection of the data on the principal
components. So the best features will be extracted with less computational complexity. i.e. Let X
be a matrix, decompose it by using SVD [10] is
and the covariance matrix as
In this case U is a nxn matrix. The SVD[10] orders the singular values in descending order. If
n<m , the first n columns in U corresponding to the sorted eigen values of C and if m , the first
m corresponds to the sorted non-zero eigen values of C. The transformed data patterns can thus
be written as
Where is a matrix of size nxm which is one on the diagonal and zero everywhere else.
4.FEATURE SELECTION USING LU FACTORIZATION
An intuitive models described, where the stimulate association of a matrix are dependent on the
context of multiplicative vectorial logic. In this context a remarkable operation that transforms the
real matrix over the truly computing data into a triangular matrix. This transformation promoted
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
75
by the context leads to the LU Decomposition of a matrix representation, which is a mathematical
method in the field of Image Processing and signal processing.
The meaningful event in the representation is the activity of the large group of data patterns,
naturally represented by high dimensional vectors or diodic matrices. These representations are
processed by associative memories (association of input-output pattern pairs) which store the
information distributed and superposed over coefficients.
In this paper, the associative memory is computed using the keys which are generated from the
fusion patterns by using LU factorization,
Where A and B are fusion patterns of two pair biometric samples ( face and finger print). The
fusion is done by using PCA. The importance of this factorization is here to extract the best
features by eliminating noise and lighting effect using Gaussian-distribution models. In the
process of computation the exponential kronecker product as associative memory combines the
two keys from LU factorization and generates a memory representation M over K, where K is the
Kth
order kernel that uses Kronecker product as convolution product.
Where, g= . In this associative model, the memories models are based on a matrix over a
multiplicity of vector associations are super imposed.
In general, A B represents the Kronecker product.
Where A is the one key pattern of one fusion set and B is another key patterns of the second
fusion set, with ith
order convolution.
5.EXPONENTIAL KRONECKER PRODUCT
5.1. Exponential Kronecker Product (eKP):
The exponential function [13] possesses some specific properties in connection with tensor
operations. Assuming that A and B are the two matrices, then the eKP[1] is described as:
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
76
The eKP [13,14,15] is having excellent properties that imply the concept of vector logic. The
properties are as:
, is a special property of kronecker calculus.
In this paper, the eKP is represented as Context-Sensitive Exponent associative memory model
(CSEAM).
6.DECISION STRATEGY - MSE
6.1. Decision Strategy
In this strategy, the Mean Square Error (MSE) is as for verification of proposed framework with
the support of CSEAM model at the training and testing levels.
Mean Square Error
The Mean Square Error (MSE) of an estimator of a parameter is the function of X defined by
and it is denoted as .
The MSE is the sum of the variance and the squared bias of the predications. The estimator is,
7.EXPERIMENT ANALYSIS
Several experiments have been conducted on this framework on the standard datasets from [16,
17] for recognition/verification. In the decision process, the Mean Square Error (MSE) [22] is
considered for testing/training patterns based on the error rate, the difference between training
and testing memories M and MT
computed using CSEAM model respectively.
The experimental results have been considered on the chosen data patterns is listed in the Table1
with various key patterns from selected features using proposed framework such as
8x8,16x16,....,64x64 on similar and dissimilar face and fingerprint patterns.
Matching and non-matching patterns using FMR and FNMR decision method
From the consideration of posters of the multimodal authentication system, FNMR and FMR
metrics have been computed for the selected features using LU factorization with CSEAM model.
In the process of pattern acquisition, error free data will be considered from the standard
benchmark datasets and its FAR/FMR and FRR/FNMR pairs are equivalent.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
77
FMR[1] is the probabilistic estimator of the pattern matching that incorrect the input data to a
non-matching data in the chosen dataset. The FMR metric is the ratio of matching whose error
value is equal or less than the threshold d: MSE ≤ d, where the threshold d is the set of possible
values of the global error.
Similarly FNMR[1] is another probabilistic estimator non-pattern matching of the input data to
matching patterns from the datasets that measures % of valid inputs which are incorrectly
rejected. The FNMR is computed as the percentage of matching whose error is greater than the
threshold d: MSE>d.
No Key Size
MSE
Similar with
different poses
(SVD with
LU)
Similar with
different poses
(SVD)
Dissimilar with
different poses
(SVD with LU)
Dissimilar
with different
poses (SVD)
1 8x8 0.001044 0.0162 0.011948 0.0488
2 16x16 0.000106 0.0011 0.004774 0.0074
3 24x24 0.000273 0.000450 0.002030 0.0067
4 32x32 0.000130 0.000444 0.001630 0.0033
5 40x40 0.000066 0.000392 0.000893 0.0027
6 48x48 0.000049 0.000271 0.000777 0.0018
7 56x56 0.000061 0.000208 0.000372 0.0015
8 64x64 0.000043 0.000182 0.000459 0.0013
Table 1: Mean Square Error (MSE) of various key sizes
Figure 3: Mean Square Error
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
78
From the analysis of experimental results, it is observed that the key size 8x8 has been
encountered in rejecting rate when provided similar multimodal data patterns (FMR).
8.CONCLUSIONS
In this paper, an intuitive framework is proposed using cognitive logic for authentication/
verification of the biometrics patterns in multimodal authentication. In this framework the keys
have been selected from the extracted features of the fusion patterns using LU factorization
technique and then combined using Context-sensitive Exponent associative memory model with
the concept of exponential kronecker product (CSEAM).This model is one of the nice strategies
in the domain of cognitive logic. This framework returns better and better outcome from the
selected datasets [16, 17] and provides more complex security in terms of time and space, since it
uses eKP in the cognitive logic. From the observations of experimental results, the key sizes
should be more than 8x8, since while extracting the feature and applying the PCA by SVD, some
of the features might be lost. In such cases, the fusion data will be regretted by the proposed
framework. For the rest of the cases the proposed framework returns better outcome. This
framework is also compared with the selection of key patterns using normal SVD factorization
which gives more accurate and efficient recognition.
REFERENCES
[1] PESN Krishna Prasad, K. Pavan Kumar, MV Ramakrishna and BDCN Prasad, “Fusion Based
Multimodal authentication in Biometrics using Context-Sensitive Exponent Associative Memory
Model: A Novel Approach”, CS&IT Conference proceedings pp. 81-90, 2013,
DOI:10.5121/csit/2013.3608
[2] Mary Lourde R and DushyantKhosla, Fingerprint Identification in Biometric Security Systems,
International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, 852-855, 2010.
[3] T. De Bie, N. Cristianini, R. Rosipal, Eigenproblems in Pattern Recognition, Handbook of
Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics,
Springer-Verlag, Heidelberg, 2004
[4] Jain, A.K.; Ross, A., Prabhakar, S. An Introduction to Biometric Recognition. IEEE Trans. Circuits
Syst. Video Technol., 14, 4-20, 2004.
[5] R. Bruneelli and D.Falavigna, “Person identification using multiple cues,” IEEE Trans. PAMI, vol.
17, no.10, pp.955-966, oct.1995.
[6] J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers”, IEEE Trans. PAMI, vol.
20, no. 3, pp. 226-239, 1998
[7] L. Hong and A.K. Jain, “Integrating Faces and Fingerprints for Personal Identification”, IEEE Trans.
PAMI, vol. 20, no. 12, pp. 1295-1307, 1998.
[8] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz, “Fusion of Face and Speech Data for Person
Identity Verification”, IEEE Trans. Neural Networks, vol. 10, no. 5, pp. 1065-1075, 1999
[9] A. Ross and A.K. Jain, “Information Fusion in Biometrics”, Pattern Recognition Letters, vol. 24, no.
13, pp. 2115-2125, 2003
[10] RasmusElsborg Madsen, Lars Kai Hansen and Ole Winther, “Singular Value Decomposition and
Principle Component Analaysis”, February 2004
[11] Matthew A. Turk, Alex P. Pentland, “Face Recognition using Eigen Faces”, IEEE 1991
[12] Vaclav Matyas, ZdenekRiha, “Biometric Authentication —Security and Usability”,
http://www.fi.muni.cz/usr/matyas/
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
79
[13] John W. Brewer, Kronecker Products and Matrix Calculus in System Analysis, IEEE Transactions on
Circuits and Systems, Vol. 25, No. 9, 1978
[14] Wolfgang Hackbusch, Boris N. Khoromskij, Hierarchical Tensor-Product Approximations, 1-26.
[15] LubomírBrančík, Matlab Programs for Matrix Exponential Function Derivative Evaluation
[16] http://www.face-rec.org/databases/
[17] http://www.advancedsourcecode.com/fingerprintdatabase.asp
[18] Izquierdo-Fuento, A.; del Val, L.; Jimenez M.I.; Villakorta, J.J. “Performance Evaluation of a
Biometric System Based on Acoustic Images. Sensors, 119499-9519, 2011.

More Related Content

PDF
Pattern recognition using context dependent memory model (cdmm) in multimodal...
PDF
Ijatcse71852019
PDF
KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCER
PDF
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
PDF
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
PDF
Brain Tumor Classification using Support Vector Machine
PDF
B0343011014
PDF
A survey of modified support vector machine using particle of swarm optimizat...
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Ijatcse71852019
KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCER
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
Brain Tumor Classification using Support Vector Machine
B0343011014
A survey of modified support vector machine using particle of swarm optimizat...

What's hot (19)

PDF
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
PDF
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
PDF
Integrated bio-search approaches with multi-objective algorithms for optimiza...
PDF
Mammogram image segmentation using rough
PDF
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
PDF
Mammogram image segmentation using rough clustering
PDF
Accounting for variance in machine learning benchmarks
PDF
When deep learners change their mind learning dynamics for active learning
PDF
IRJET- A Detailed Study on Classification Techniques for Data Mining
PDF
Multi-Cluster Based Approach for skewed Data in Data Mining
PDF
IRJET - Clustering Algorithm for Brain Image Segmentation
PDF
Survey on semi supervised classification methods and feature selection
PDF
A comparative study of clustering and biclustering of microarray data
PDF
hb2s5_BSc scriptie Steyn Heskes
PDF
Survey on semi supervised classification methods and
PDF
A comparative study of three validities computation methods for multimodel ap...
PDF
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
PDF
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
PDF
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Integrated bio-search approaches with multi-objective algorithms for optimiza...
Mammogram image segmentation using rough
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
Mammogram image segmentation using rough clustering
Accounting for variance in machine learning benchmarks
When deep learners change their mind learning dynamics for active learning
IRJET- A Detailed Study on Classification Techniques for Data Mining
Multi-Cluster Based Approach for skewed Data in Data Mining
IRJET - Clustering Algorithm for Brain Image Segmentation
Survey on semi supervised classification methods and feature selection
A comparative study of clustering and biclustering of microarray data
hb2s5_BSc scriptie Steyn Heskes
Survey on semi supervised classification methods and
A comparative study of three validities computation methods for multimodel ap...
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
Ad

Viewers also liked (20)

PDF
Expert system of single magnetic lens using JESS in Focused Ion Beam
PDF
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
PDF
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
PDF
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
PDF
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
PDF
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
PDF
A novel defence scheme against selfish Node attack in manet
PDF
Proficiency comparison ofladtree
PDF
Parsing of xml file to make secure transaction in mobile commerce
PDF
Integrating fuzzy and ant colony system for
PDF
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
PDF
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
PDF
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
PDF
Transaction processing, techniques
PDF
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
PDF
Modeling Call Holding Times Of Public Safety Network
PDF
Distributed mixed reality for diving and
PPTX
Inside Story Opens the Vaults on Corporate Reputation - May 2013
PDF
Personal identification using multibiometrics score level fusion
PDF
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Expert system of single magnetic lens using JESS in Focused Ion Beam
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
A novel defence scheme against selfish Node attack in manet
Proficiency comparison ofladtree
Parsing of xml file to make secure transaction in mobile commerce
Integrating fuzzy and ant colony system for
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
Transaction processing, techniques
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
Modeling Call Holding Times Of Public Safety Network
Distributed mixed reality for diving and
Inside Story Opens the Vaults on Corporate Reputation - May 2013
Personal identification using multibiometrics score level fusion
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Ad

Similar to Feature selection in multimodal (20)

PDF
PATTERN RECOGNITION USING CONTEXTDEPENDENT MEMORY MODEL (CDMM) IN MULTIMODAL ...
DOC
K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
PDF
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
PDF
TBerger_FinalReport
PDF
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
PDF
The International Journal of Engineering and Science (IJES)
PDF
Multimodal Biometrics at Feature Level Fusion using Texture Features
PDF
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
PDF
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
DOCX
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
PDF
Analysis of machine learning algorithms for character recognition: a case stu...
PDF
Controlling informative features for improved accuracy and faster predictions...
PDF
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
PDF
Prediction of dementia using machine learning model and performance improvem...
PDF
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
PDF
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
PDF
Paper id 25201441
PDF
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
PDF
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
PDF
Possibility fuzzy c means clustering for expression invariant face recognition
PATTERN RECOGNITION USING CONTEXTDEPENDENT MEMORY MODEL (CDMM) IN MULTIMODAL ...
K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
TBerger_FinalReport
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
The International Journal of Engineering and Science (IJES)
Multimodal Biometrics at Feature Level Fusion using Texture Features
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
Analysis of machine learning algorithms for character recognition: a case stu...
Controlling informative features for improved accuracy and faster predictions...
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
Prediction of dementia using machine learning model and performance improvem...
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
Paper id 25201441
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
Possibility fuzzy c means clustering for expression invariant face recognition

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PPTX
Sustainable Sites - Green Building Construction
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
PPT on Performance Review to get promotions
PPTX
Construction Project Organization Group 2.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
web development for engineering and engineering
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPT
Project quality management in manufacturing
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Mechanical Engineering MATERIALS Selection
Sustainable Sites - Green Building Construction
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT on Performance Review to get promotions
Construction Project Organization Group 2.pptx
Lecture Notes Electrical Wiring System Components
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
web development for engineering and engineering
OOP with Java - Java Introduction (Basics)
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Project quality management in manufacturing
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Feature selection in multimodal

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 70 FEATURE SELECTION IN MULTIMODAL AUTHENTICATION USING LU FACTORIZATION WITH CSEAM MODEL Y Suresh,K Pavan Kumar, PESN Krishna Prasad, BDCN Prasad Prasad V. Potluri Siddhartha Institute of Technology, Kanuru, Vijayawada-7, India Abstract Multimodal authentication is one of the prime concepts in current applications of real scenario. Various approaches have been proposed in this aspect. In this paper, an intuitive strategy is proposed as a framework for providing more secure key in biometric security aspect. Initially the features will be extracted through PCA by SVD from the chosen biometric patterns, then using LU factorization technique key components will be extracted, then selected with different key sizes and then combined the selected key components using convolution kernel method (Exponential Kronecker Product - eKP) as Context-Sensitive Exponent Associative Memory model (CSEAM). In the similar way, the verification process will be done and then verified with the measure MSE. This model would give better outcome when compared with SVD factorization[1] as feature selection. The process will be computed for different key sizes and the results will be presented. KEYWORDS Feature selection, LU factorization, CSEAM Model, PCA by SVD, Exponential kronecker Product (eKP), Multimodal Authentication. 1.INTRODUCTION In recent scenario, agent biometric data verification is one of the critical tasks in the access control that performs the major building block of security. User identification is traditionally based on something that user knows (PIN/Password) and user has(Key/Token/Smart Card). But, these traditional methods can be forgotten, disclosed, lost or stolen. Apart from these strategies, failure rate is to differentiate between an accredited and unaccredited person [12]. Biometrics [4] is a scientific discipline that involves methods of identity verification or identification based on the principle of measurable physiological or behavioural characteristics such as a fingerprint, an iris pattern, palm, vein or a voice sample. In the analysis of security aspect, human patterns are unique. The primary advantage of multimodal authentication strategies over other approaches of authentication is to process/ combine two or more user patterns with the use of psychological/behavioural patterns.
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 71 Nowadays, the biometrics patterns has been adopted throughout worldwide on a large scale and used in different sectors of public/private organizations. As specified in [12], biometric pattern authentication is a layered model consists of identification mode and verification mode [2, 3, 4] and the identification process starts with the enrolment process and consists of Acquisition: Acquisition is the first step in biometric authentication system. Using input device User’s sample is obtained; Creation of the characteristics: After first step, biometric measurements are processed. The numbers of biometric samples depends upon the technology that we are using. Sometimes, single metric is sufficient, but most of the cases multiple patterns are required. By using these patters features are extracted; Storage of the characteristics: After feature extraction the feature patterns are stored in a card/database server/on a workstation/directly on authentication terminal. After enrolment of the user, the user can use the system for successful authentications or identifications. The verification/testing process takes the following steps: 1. Acquisition(s): Biometric measurements should be acquired in order to make comparison with parent patterns. 2. Creation of new characteristics: New characteristics are created from the previous step. 3. Comparison: Currently computed characteristics are computed with the characteristics obtained in the previous step. 4. Decision: The final step in the test phase is the yes/no decision based on a threshold. 2.MULTIMODAL AUTHENTICATION SYSTEM In multimodal authentication system, user has to enrol two to three patterns for identification/verification. Such patterns may be noise in capturing and may lead to more error prone. In order, to resolve the noise/ inconsistency, vector logic based models have been considered for minimizing the error rate. From author’s perspective, different strategies, methodologies and models have been proposed for multimodal systems, some of them may be, the user authentication based on speech and face patterns [5] is one of the first multimodal biometric system. Brunelli and Falavigna[5] for normalization and weighted geometric average for fusion of voice and face biometrics that uses hyperbolic tangent (tanh) and also they proposed a hierarchical combination scheme for a multimodal identification system. Kittler et al. [6] conducted with different fusion strategies for human face and voice patterns, including statistical and algebraic metrics. Kittler et al. [6] concluded that the algebraic sum metric is not significantly affected by the statistical estimation errors and covers its superiority and importance. Hong and Jain [7] proposed a multimodal system fingerprint pattern satisfaction is applied after pruning the datasets via face pattern matching. Ben-Yacoub et al. [8] considered several fusion strategies, such as tree classifiers, multilayer perceptions and support vector machines for face and voice biometrics. Ross and Jain [9] fusion the traits of biometric patterns- fingerprint, face and hand geometry with sum, decision tree and linear discriminant approaches. The authors concluded that sum rule performs outstanding when compared with others.
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 72 From these observations, vector logic approach is to be considered for multi-modal biometric authentication system based on facial and iris pattern. In this paper, both face images and fingerprint patterns are chosen due to their complementary characteristics, physiology, and behaviour. 3.PROPOSED MODEL The effectiveness of biometric system using two level multimodal authentication problems are discussed in [1]for encoding and decoding of biometric patterns. At level one, input patterns are normalized with PCA by SVD and then keys will be selected using LU factorization from the extracted patterns after processing sensed data with PCA by SVD, at level two using computational model (CSEAM model [1]),the generated keys will fusion through LU factorization, and at level three the decision process can be analyzed using error estimation strategies. An overview of the computational framework for the proposed model is described in the Fig. 1.
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 73 Figure 1. Framework of the Proposed Model Figure 2. Black diagram of the Proposed Model. 3.1.Feature Extraction Using PCA by SVD 3.1.1 Principal Component Analysis (PCA) In PCA[10], the directions of the data patterns is the most variation, that is the eigen vectors corresponding to the largest eigen values of the covariance matrix, and project the data patterns onto these directions that might get rid of important non-second order information by PCA. If the matrix of eigen vectors sorted according to eigen value by , then PCA transformation of the data as . The eigen vectors are called principle components [11]. By selecting the first d rows of Y, then the projected data is from n down to d dimensions. 3.1.2 Spectral decomposition of a square matrix: Any real symmetric matrix A of size mxm may be decomposed uniquely as [10] Where U is an orthonormal matrix and it satisfies or and is a diagonal matrix . The eigen vectors of matrix A are columns of the matrix U and the eigen values are the diagonal elements of matrix . 3.1.3 Singular Value Decomposition: A matrix A of size mxn can be decomposed as [10]
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 74 U is a column orthogonal matrix of size mxn and its columns are eigen vectors of i V is a orthogonal matrix of size nxn and its columns are eigen vectors of A ie D is a diagonal matrix of size nxn called singular values. If then 3.1.4 PCA by SVD: The main advantage of the PCA by SVD is to apply the projection of the data on the principal components. So the best features will be extracted with less computational complexity. i.e. Let X be a matrix, decompose it by using SVD [10] is and the covariance matrix as In this case U is a nxn matrix. The SVD[10] orders the singular values in descending order. If n<m , the first n columns in U corresponding to the sorted eigen values of C and if m , the first m corresponds to the sorted non-zero eigen values of C. The transformed data patterns can thus be written as Where is a matrix of size nxm which is one on the diagonal and zero everywhere else. 4.FEATURE SELECTION USING LU FACTORIZATION An intuitive models described, where the stimulate association of a matrix are dependent on the context of multiplicative vectorial logic. In this context a remarkable operation that transforms the real matrix over the truly computing data into a triangular matrix. This transformation promoted
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 75 by the context leads to the LU Decomposition of a matrix representation, which is a mathematical method in the field of Image Processing and signal processing. The meaningful event in the representation is the activity of the large group of data patterns, naturally represented by high dimensional vectors or diodic matrices. These representations are processed by associative memories (association of input-output pattern pairs) which store the information distributed and superposed over coefficients. In this paper, the associative memory is computed using the keys which are generated from the fusion patterns by using LU factorization, Where A and B are fusion patterns of two pair biometric samples ( face and finger print). The fusion is done by using PCA. The importance of this factorization is here to extract the best features by eliminating noise and lighting effect using Gaussian-distribution models. In the process of computation the exponential kronecker product as associative memory combines the two keys from LU factorization and generates a memory representation M over K, where K is the Kth order kernel that uses Kronecker product as convolution product. Where, g= . In this associative model, the memories models are based on a matrix over a multiplicity of vector associations are super imposed. In general, A B represents the Kronecker product. Where A is the one key pattern of one fusion set and B is another key patterns of the second fusion set, with ith order convolution. 5.EXPONENTIAL KRONECKER PRODUCT 5.1. Exponential Kronecker Product (eKP): The exponential function [13] possesses some specific properties in connection with tensor operations. Assuming that A and B are the two matrices, then the eKP[1] is described as:
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 76 The eKP [13,14,15] is having excellent properties that imply the concept of vector logic. The properties are as: , is a special property of kronecker calculus. In this paper, the eKP is represented as Context-Sensitive Exponent associative memory model (CSEAM). 6.DECISION STRATEGY - MSE 6.1. Decision Strategy In this strategy, the Mean Square Error (MSE) is as for verification of proposed framework with the support of CSEAM model at the training and testing levels. Mean Square Error The Mean Square Error (MSE) of an estimator of a parameter is the function of X defined by and it is denoted as . The MSE is the sum of the variance and the squared bias of the predications. The estimator is, 7.EXPERIMENT ANALYSIS Several experiments have been conducted on this framework on the standard datasets from [16, 17] for recognition/verification. In the decision process, the Mean Square Error (MSE) [22] is considered for testing/training patterns based on the error rate, the difference between training and testing memories M and MT computed using CSEAM model respectively. The experimental results have been considered on the chosen data patterns is listed in the Table1 with various key patterns from selected features using proposed framework such as 8x8,16x16,....,64x64 on similar and dissimilar face and fingerprint patterns. Matching and non-matching patterns using FMR and FNMR decision method From the consideration of posters of the multimodal authentication system, FNMR and FMR metrics have been computed for the selected features using LU factorization with CSEAM model. In the process of pattern acquisition, error free data will be considered from the standard benchmark datasets and its FAR/FMR and FRR/FNMR pairs are equivalent.
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 77 FMR[1] is the probabilistic estimator of the pattern matching that incorrect the input data to a non-matching data in the chosen dataset. The FMR metric is the ratio of matching whose error value is equal or less than the threshold d: MSE ≤ d, where the threshold d is the set of possible values of the global error. Similarly FNMR[1] is another probabilistic estimator non-pattern matching of the input data to matching patterns from the datasets that measures % of valid inputs which are incorrectly rejected. The FNMR is computed as the percentage of matching whose error is greater than the threshold d: MSE>d. No Key Size MSE Similar with different poses (SVD with LU) Similar with different poses (SVD) Dissimilar with different poses (SVD with LU) Dissimilar with different poses (SVD) 1 8x8 0.001044 0.0162 0.011948 0.0488 2 16x16 0.000106 0.0011 0.004774 0.0074 3 24x24 0.000273 0.000450 0.002030 0.0067 4 32x32 0.000130 0.000444 0.001630 0.0033 5 40x40 0.000066 0.000392 0.000893 0.0027 6 48x48 0.000049 0.000271 0.000777 0.0018 7 56x56 0.000061 0.000208 0.000372 0.0015 8 64x64 0.000043 0.000182 0.000459 0.0013 Table 1: Mean Square Error (MSE) of various key sizes Figure 3: Mean Square Error
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 78 From the analysis of experimental results, it is observed that the key size 8x8 has been encountered in rejecting rate when provided similar multimodal data patterns (FMR). 8.CONCLUSIONS In this paper, an intuitive framework is proposed using cognitive logic for authentication/ verification of the biometrics patterns in multimodal authentication. In this framework the keys have been selected from the extracted features of the fusion patterns using LU factorization technique and then combined using Context-sensitive Exponent associative memory model with the concept of exponential kronecker product (CSEAM).This model is one of the nice strategies in the domain of cognitive logic. This framework returns better and better outcome from the selected datasets [16, 17] and provides more complex security in terms of time and space, since it uses eKP in the cognitive logic. From the observations of experimental results, the key sizes should be more than 8x8, since while extracting the feature and applying the PCA by SVD, some of the features might be lost. In such cases, the fusion data will be regretted by the proposed framework. For the rest of the cases the proposed framework returns better outcome. This framework is also compared with the selection of key patterns using normal SVD factorization which gives more accurate and efficient recognition. REFERENCES [1] PESN Krishna Prasad, K. Pavan Kumar, MV Ramakrishna and BDCN Prasad, “Fusion Based Multimodal authentication in Biometrics using Context-Sensitive Exponent Associative Memory Model: A Novel Approach”, CS&IT Conference proceedings pp. 81-90, 2013, DOI:10.5121/csit/2013.3608 [2] Mary Lourde R and DushyantKhosla, Fingerprint Identification in Biometric Security Systems, International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, 852-855, 2010. [3] T. De Bie, N. Cristianini, R. Rosipal, Eigenproblems in Pattern Recognition, Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics, Springer-Verlag, Heidelberg, 2004 [4] Jain, A.K.; Ross, A., Prabhakar, S. An Introduction to Biometric Recognition. IEEE Trans. Circuits Syst. Video Technol., 14, 4-20, 2004. [5] R. Bruneelli and D.Falavigna, “Person identification using multiple cues,” IEEE Trans. PAMI, vol. 17, no.10, pp.955-966, oct.1995. [6] J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers”, IEEE Trans. PAMI, vol. 20, no. 3, pp. 226-239, 1998 [7] L. Hong and A.K. Jain, “Integrating Faces and Fingerprints for Personal Identification”, IEEE Trans. PAMI, vol. 20, no. 12, pp. 1295-1307, 1998. [8] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz, “Fusion of Face and Speech Data for Person Identity Verification”, IEEE Trans. Neural Networks, vol. 10, no. 5, pp. 1065-1075, 1999 [9] A. Ross and A.K. Jain, “Information Fusion in Biometrics”, Pattern Recognition Letters, vol. 24, no. 13, pp. 2115-2125, 2003 [10] RasmusElsborg Madsen, Lars Kai Hansen and Ole Winther, “Singular Value Decomposition and Principle Component Analaysis”, February 2004 [11] Matthew A. Turk, Alex P. Pentland, “Face Recognition using Eigen Faces”, IEEE 1991 [12] Vaclav Matyas, ZdenekRiha, “Biometric Authentication —Security and Usability”, http://www.fi.muni.cz/usr/matyas/
  • 10. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 79 [13] John W. Brewer, Kronecker Products and Matrix Calculus in System Analysis, IEEE Transactions on Circuits and Systems, Vol. 25, No. 9, 1978 [14] Wolfgang Hackbusch, Boris N. Khoromskij, Hierarchical Tensor-Product Approximations, 1-26. [15] LubomírBrančík, Matlab Programs for Matrix Exponential Function Derivative Evaluation [16] http://www.face-rec.org/databases/ [17] http://www.advancedsourcecode.com/fingerprintdatabase.asp [18] Izquierdo-Fuento, A.; del Val, L.; Jimenez M.I.; Villakorta, J.J. “Performance Evaluation of a Biometric System Based on Acoustic Images. Sensors, 119499-9519, 2011.