Machine Learning Algorithms For Biometrics Fusion
Machine Learning Algorithms For Biometrics Fusion
Using the internet search engine, search for at least five (5) journals for different fingerprints
or any biometric algorithm and identify the following:
- How was this algorithm used as a biometric?
- How this algorithm enrolled and retrieve data?
- What programming language/s was used for this biometric?
- To where the algorithm was integrated or can be integrated?
1.1 Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study
How was this algorithm used as a biometric?
- For creating a multimodal biometrics security system.
How this algorithm enrolled and retrieve data?
- The algorithms were Gaussian Mixture Models, an Artificial Neural Network, a Fuzzy
Expert System, and Support Vector Machines. The algorithms were trained and tested
using a well-known biometric database which contains samples of face and speech and
similarity scores of five face and three speech biometric experts. The fusion results were
compared against existing fusion techniques and also against each other, showing that the
fusion schemes presented in this paper produce better biometric accuracy than
conventional methods. Of the four algorithms, the most efficient one proved to be the
support vector machines-based one offering significant performance enhancement over
unimodal biometrics, over more traditionally combined multimodal biometrics, but also
over the SoA.
What programming language/s was used for this biometric?
- They used a database for this algorithm.
To where the algorithm was integrated or can be integrated?
- There were four types of algorithms that were used in this study. It is a comparison of
each model to know what’s the ideal biometric to use for better accuracy and
conventional methods.
1.2 Design and Implementation of a Multi-Modal Biometric System for Company Access
Control
How was this algorithm used as a biometric?
- The biometric features considered are the face and iris. This formula served as a
the installation of a multi-modal biometric system to control access to a corporate organization.
How this algorithm enrolled and retrieve data?
- Face is feasible for non-intrusive checking with a minimum cooperation from the subject,
while iris supports very accurate recognition procedure at a higher grade of invasively.
The recognition of the face trait is based on the Local Binary Patterns histograms, and the
Doughman’s method is implemented for the analysis of the iris data. The recognition
process may require either the acquisition of the user’s face only or the serial acquisition
of both the user’s face and iris, depending on the confidence level of the decision with
respect to the set of security levels and requirements, stated in a formal way in the
Service Level Agreement at a negotiation phase. The quality of the decision depends on
the setting of proper different thresholds in the decision modules for the two biometric
traits. Any time the quality of the decision is not good enough, the system activates
proper rules, which ask for new acquisitions (and decisions), possibly with different
threshold values, resulting in a system not with a fixed and predefined behavior, but one
which complies with the actual acquisition context. Rules are formalized as deduction
rules and grouped together to represent “response behaviors” according to the previous
analysis. Therefore, there are different possible working flows, since the actual response
of the recognition process depends on the output of the decision-making modules that
compose the system.
What programming language/s was used for this biometric?
- They used a database for this algorithm.
To where the algorithm was integrated or can be integrated?
- This algorithm was integrated for better accuracy of the said biometric.
1.3 Accuracy enhancement of biometric recognition using iterative weights optimization
algorithm
How was this algorithm used as a biometric?
- This biometric algorithm used face recognition.
How this algorithm enrolled and retrieve data?
- The importance of correlation between the overall detection performance and the area
under the genuine acceptance rate (GAR) versus false acceptance rate (FAR) graph,
commonly known as receiver operating characteristics (ROC) is recognized. Using the
ROC curve, relation between GARmin and minimum recognition accuracy is derived,
particularly for high security applications (HSA). Finally, effectiveness of any binary
recognition system is predicted using three important parameters, namely GARmin, the
time required for recognition and computational complexity of the computer processing
system. The palm print (PP) modality is used to validate the theoretical basis. It is
observed that by combining different useful feature-extraction techniques, it is possible to
improve the system accuracy. An optimum algorithm to appropriately choose weights has
been suggested, which iteratively enhances the system accuracy. This also improves the
effectiveness of the system.
What programming language/s was used for this biometric?
- They used a database for this algorithm.
To where the algorithm was integrated or can be integrated?
- For accuracy enhancement of biometric recognition.