- Open Access
- Total Downloads : 424
- Authors : Aswathy S, Ajay Kumar
- Paper ID : IJERTV3IS110688
- Volume & Issue : Volume 03, Issue 11 (November 2014)
- Published (First Online): 21-11-2014
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Secure User Authentication Based on Finger Vein Patterns
Aswathy S
PG Scholar,ECE Dept
Adi Shankara Institute of Engineering & Technology India
Ajay Kumar
Asst Professor,ECE Dept
Adi Shankara Institute of Engineering & Technology India
Abstract Biometrics is one of the highly accurate technologies in the field of user identification. Finger vein recognition is amethod of biometric authentication that uses pattern recognition techniques based on images of human finger vein patternsbeneath the skins surface. It is more secure than various other biometric traits like palm prints, voice, iris, face fingerprint etc because, finger vein patterns cannot be forged like the others. Various steps for user identification using finger vein patterns includes acquisition of finger vein image, preprocessing of image, extraction of relevant features and finally pattern matching. A methods efficiency can be measured with the help of measuring its Accuracy and Precision.
Keywords Biometrics, authentication, Finger Vein recognition, Accuracy, Precision.
-
INTRODUCTION
Biometrics is a set of technologies based on measurement of some unique characteristics of an individual for the purpose of identification. Biometric is considered to be the most convenient and secure authentication technology. It cannot be borrowed, stolen or forgotten and upto a limit forging is practically impossible. This technology measures individuals unique physical or behavioural characteristics to recognize their identity. Physical biometric characteristics include fingerprints, hand geometry, retina, iris and facial identity.
Behavioural characters include signature, voice, keystroke analysis and gait. [1] briefly explains about different biometric traits and their scope in the field of authentication. Many biometric traits are nowadays not commonly used like signature recognition, voice identification etc because both of the above said traits can be forged. [2] explains about usage of fingerprint as a tool for person identification. In that paper usage global and local features of fingerprints are used. [3] briefly compares various iris recognition algorithms. Those algorithms are based on iris codes, zero crossings etc. [4] explains palmprint authentication system using wavelet transforms. Here color parameters of palm print are changed to HSI parameters because gray scale images retain all useful information required for personal identification. [5] explains iris recognition using artificial neural networks. Here for pre- processing feed forward artificial neural networks trained by back propagation algorithm is used.
The above mentioned biometric traits are having some disadvantages like facial recognition is affected by changes occurring in lighting, the hair of a person, the age, and if the
person wear glasses etc, fingerprints and palmprints can be frayed usually, voice, signatures etc are less accurate and can be easily forged, iris images based identification are highly intrusive etc.Fingervein is a promising biometric pattern for personal identification in terms of its security and user convenience. The vein is hidden inside our body. It is almost invisible to human eyes.
Forging in this case is very difficult. User authentication based on finger vein pattern is more acceptable because of its hygiene nature. These patterns can be taken only from a person whose is alive. So it is a convincing proof that the person whose finger vein image is captured is alive. Various steps for user authentication based finger vein pattern includes image capturing, preprocessing of captured image, vein feature extraction and feature matching. As vein is present beneath the skins surface, for capturing its image, near infrared light is passed through the fingers. Human tissues blocks most of the rays. But hemoglobin in blood absorbs them. So in the captured image vein portions appears much darker than surrounding areas. For user authentication vein features are extracted and stored in template for future use.
-
EXISTNG METHODS
The paper [5] explains that protection of personal information in todays world is of very importance.Finger Vein is a promising biometric pattern gaining popularity as vein is hidden inside and is invisible to human eyes and is difficult to forge or steal and also it is hygiene and also it can be taken only from a live body, so it is a natural and convincing proof that the person whose vein is being taken is alive. Here finger vein images are captured and then segmentation and alignment and enhancement is done for extracting features and then a template is made of features and when a matching is to be done the entered feature after the above mentioned steps is compared with feature from the template. If matched, user is accepted to be the original one, else rejected.
In [8], it is mentioned that to identify a person with high accuracy, the pattern of the thin/thick and clear/unclear veins in an image must be extracted equally. The pattern should be extracted with little or no dependence on vein width and brightness fluctuations. Here a new method is proposed by checking only the centerlines of veins.
The paper [2] mentions about the two problems commonly found in finger vein authentication. One is that the quality of the vein image will be reduced under bad environment
conditions; the other is the irregular distortion of the image caused by the variance of the finger poses. Here a wide line detector for feature extraction and a new pattern normalization model based on a hypothesis that the fingers cross sections are approximately ellipses and the vein that can be imaged is close to the finger surface are explained. It can effectively reduce the distortion caused by the pose.
In the paper [14], explains that with the development of technology, powerful consumer devices such as laptop, cell phone,PDA etc have raised the level of flexibility and user convenience .Protection of personal information in these in these devices from theft or misuse is becoming a major issue. As a solution to this, in this paper a finger vein recognition algorithm based user identification framework is described. The algorithm uses Radon Transform and SVD(singular value decomposition) for feature extraction and classification is done using a normalized distance measure.
In [9], propose a method of user identification based on finger vein patterns. A finger vein image captured by passing infra red light through fingers contains not only vein patterns but also irregular shading due to varying thicknesses of finger bones and muscles. So for accurate and precise user identification vein features are to be extracted out of the captured image.For that a repeated line tracking which starts from various positions in an image is used.
Fig 1. Raw finger vein image captured by camera
-
OBSERVATIONS & INFERENCES
TABLE 1. COMPARISION OF VARIOUS FINGER VEIN RECOGNITION METHODS
Method
No : of Images used
EER (%)
Repeated Line Tracking[9]
678
0.145
Max Curvature without Normalization[8]
678
3.86
Max Curvature with Normalization[8]
678
2.80
Wide Line Detector without Normalization[2]
50,700
2.86
Wide Line Detector with Normalization[2]
50,700
0.87
td> Extraction based on Lacunarity[5]
600
0.07
-
DATABASE USED
The database used in this paper is from the Group of Machine Learning and Applications, Shandong University [7] .This is the first open database made available for research purposes. The database is named SDUMLA-HMT.It is a Homologous Multi-modal Traits Database which includes real multimodal data from 106 individuals. The device designed by Joint Lab for Intelligent Computing and Intelligent Systems of Wuhan University was used to capture finger vein image.
Fig 2. Sample images in the Database
-
SYSTEM OVERVIEW
The system architecture segregate the entire system into four steps: data collection, pre processing, feature extraction and feature matching [5]. Generally, finger vein images are captured based on principles of light transmission or light reflection. Images are captured by passing near infra red light through fingers. Haemoglobin absorbs NIR light and hence the vein portions appear much darker than surrounding areas. Here images used are from an already available database.
Fig 3. Algorithm flow chart
Various steps in detail are:
-
Image Segmentation and Alignment
The entire region might not be needed for processing. So area of interest is to be selected and should be resized for future use. Also in case of different finger vein images position of fingers varies. So normalization of the images is done before feature extraction and matching. So a portion of finger vein image is segmented and is cropped out of the original image.
The volume and surface area of these blanket surfaces are calculated.
Ve =
i, j
(ue(i,j)-be(i,j)) (2)
Fig 4. Segmented ROI (Region of Interest)
-
Image Resizing & Enhancement
The segmented image is initially resized to 1/4th of its original size .Then it is resized back to its original size.
Ae= (Ve-Ve-1)/2 (3)
If e is very small, then,
A(e) =Fe2-D (4)
where F is a constant and D indicates fractal dimension (FD) of the image. By assuming two values for e we can obtain D by,
Next, the image is resized to 1/3rd of its original
size.Bicubic Interpolation is used for this resizing
D=2- {log2 ae1
-log2 ae2
/ log2 e1-log2 e2}
(5)
procedure. Histogram Equalization is used for image enhancement. The histogram is a graphical representation of the information contained in the image. It shows how the intensity values of an image are distributed and the range of brightness from dark to bright. In this method contrast of the image is enhanced by increasing the dynamic range of intensity given to pixels with the most probable intensity value. One transformation function that accomplishes this is a cumulative distribution function.
Lacunarity is a measure of gaps in a n image. Higher will be lacunarity if the patterns are having more gaps. Images which are visually different may have similar fractal dimension .So it is difficult to distinguish among those images using D values. So lacunarity measurement is used. The image is obtained by,
de(i,j)=ue(i,j)-be(i,j) (6) Let p(gy) be the probability of the intensity points whose gray values are gy on the surface of de.
M1=
i, j
M2=
i, j
de(i, j) p (de(i,j))
( p(de(i,j)) de(i,j))2)
(7)
Fig 5. Resizing and Enhancement procedure
-
Feature Extraction
The fractal model which was developed by Mandelbrot, emphasized the use of fractals as models for describing many rough phenomena in the world [6].Fractals are self- similar patterns .Here blanket method is used together with fractal model.A blanket surface is established on the images after pre processing [5].Various factors affecting the shrinking rate are also considered. Using the surface area value, the fractal dimension (D) of the image is measured.
The above equations give the first and second moments of this distribution.Finally, lacunarity can be calculated by,
e = (M2-(M1)2)/ (M1)2 (8)
-
Feature Matching
Here pattern matching is done by Support Vector Machines (SVM) [10].Support vector machines are supervised learning models .It is generally a binary (two- class) classification technique. They have associated learning algorithms to analyze data and recognize patterns. They are used for classification and regression analysis. It is based on the concept of structural risk minimization. It is so because it measures the maximum distance to the closest points of the training set. These vectors are termed as Support vectors. From the total images available, we use half of them for training and the remaining half for testing.
The output value of SVM is used to check whether a genuine user or an imposter. A value close to 1 indicates a
ue(i,j)=max{ue-1(i,j)+1,
max
|( m,n)(i, j )|1
{ue-1(m.n),ue-1(i-2,j)}}
(1)
genuine user and a value closer to -1 indicates an imposter. Here 100 images were used for training and another 100 images were used for testing.
be(i,j)=min{be-1(i,j)-1,
min
|( m,n)(i, j )|1
{be-1(m.n),ue-1(i-2,j)}}
-
-
RESULTS
The efficiency of SVM classifier is estimated by accuracy and precision measurement. This is done with the help of confusion matrix. A confusion matrix is also known as a contingency table or an error matrix. It is a table which allows visualization of the performance of an algorithm, mainly in case of a supervised learning one. In the matrix, each column represents instances of the predicted class and each row represents that of actual class. It has two rows and two columns that show the number of false positives, false negatives, true positives, and true negatives. False positive (FP) indicates the number of those instances that were actually negative were incorrectly recognized as true whereas true negative (TN) indicates correctly recognized negative instances .False negative (FN) indicates the number of instances that were recognized as negative although originally positive and true positive (TP) indicates those were correctly recognized as positive.
Fig 6. Confusion Matrix
The accuracy indicates the proportion of the total number of predictions that were correct.
TP + TN
Accuracy=
TP + TN + FN + FP
The measured accuracy of this method is 85%.
TP
Precision=
TP FP
Precision of this method is obtained as 83.01%.
-
CONCLUSION
Finger Vein ID is a biometric authentication system that matches the vascular pattern in an individual's finger to previously obtained data There are some problems
associated with existing system, namely, complexity in feature extraction, aligment problems etc.Alignment problems lead to rejection of authorized users. Here, in this system, after image acquisition, ROI (region of interest) is selected. Later that particular portion is cropped out and the remaining steps like image resizing, image enhancement and feature extraction are performed on that portion. Then pattern matching is done with the help of SVM (support vector machine).With the help of confusion matrix accuracy and precision values are calculated. The experimental results showed that accuracy of our method is 85% and precision is 83.01%.
REFERENCES
-
Bhattacharyya D,Ranjan R,Alisherov F and Choi M, Biometric Authentication: A Review, International Journal of u- and e- Service,
Science and Technology, vol.2, no.3, September 2009
-
Huang B, Dai Y, Li R and Tang D, Finger-vein Authentication Based on Wide Line Detector and Pattern Detector, Pattern Recognition (ICPR), 2010 20th International Conference.
-
Jaam J,Rebaiaia M and Hasnah A, A Fingerprint Minutiae Recognition System Based on Genetic Algorithms,The International Arab Journal of Information Technology,vol.3,no.3,July 2006
-
Lee H,LeeS H,Kim T, and Bahn H,Secure user identification for consumer electronics devices IEEE Transactions on Consumer Electronics ,vol.54, no.4,November 2008.
-
Liu Z and Song S,An embedded real-time finger vein recognition system for mobile devices,IEEE Transactions on Consumer Electronics.,vol.6, November 2007.
-
Mandelbrot B B, Fractal geometry: what is it and what does it do?
Proc. R. Soc. Lond. A 423, pp. 3-16, 1989.
-
Masmoudi A D,Trabelsi R B and Masmoudi D SA novel Finger vein Recognition System based on Monogenic Local Binary Pattern Features.,International Journal of Engineering and Technology (IJET), vol. 5 ,no. 6, pp. 4528-4535,Dec 2013-Jan 2014.
-
Miura N, Nagasaka A and Miyatake T,Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles,MVA2005 IAPR Conference on Machine Vision Applications,
May 16-18, 2005 Tsukuba Science City
-
Miura N, Nagasaka A and Miyatake T, Feature Extraction Of Finger- Vein Patterns Based On Repeated Line Tracking And Its Application To Personal Identification, Machine Vision and Applications (2004), 21 July 2004.
-
Park K R , Finger Vein Recognition By Combining Global And Local Features Based On Svm, Computing and Informatics, vol. 30, pp. 295- 309, 2011.
-
Sibai F N,Hosani H I,Naqbi R M,Dhanhan S and Shehh S, Iris Recognition using artificial neural networks, Expert Systems with Applications,May 2011.
-
Swathi N,Satish C, Satyanarayana V S,Ramesh P , Kumar H and Bhuma N, New Palm Print Authentication System By Using Wavelet Based Method ,Signal and Image Processing ,An International Journal (SIPIJ), vol.2, no.4,March 2011.
-
Vatsa M,Singh R and Gupta P, Comparision Of Iris Recognition Algorithms, IClSlP, IEEE 2004, pp.354-358.
-
Wang D,Member IEEE, Li J and Memik G, User identification based on finger-vein patterns for consumer electronics devices ,,IEEE Transactions on Consumer Electronics.,vol.54,no. 4,May 2010.