8
Hindawi Publishing Corporation Applied Computational Intelligence and Soft Computing Volume 2012, Article ID 242401, 7 pages doi:10.1155/2012/242401 Research Article Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study I. G. Damousis and S. Argyropoulos Informatics and Telematics Institute, Centre for Research and Technology Hellas, 57001 Thessaloniki, Greece Correspondence should be addressed to I. G. Damousis, [email protected] Received 29 October 2011; Accepted 12 January 2012 Academic Editor: Cheng-Jian Lin Copyright © 2012 I. G. Damousis and S. Argyropoulos. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We examine the eciency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system. The algorithms examined are Gaussian Mixture Models (GMMs), Artificial Neural Networks (ANNs), Fuzzy Expert Systems (FESs), and Support Vector Machines (SVMs). The fusion of biometrics leads to security systems that exhibit higher recognition rates and lower false alarms compared to unimodal biometric security systems. Supervised learning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation/testing took place with patterns from the same database which were not included in the training dataset. The comparison of the algorithms reveals that the biometrics fusion system is superior to the original unimodal systems and also other fusion schemes found in the literature. 1. Introduction Identity verification has many real-life applications such as access control and economic or other transactions. Biomet- rics measure the unique physical or behavioural character- istics of an individual as a means to recognize or authen- ticate their identity. Common physical biometrics include fingerprints, hand or palm geometry, and retina, iris, or facial characteristics. On the other hand, behavioural char- acteristics include signature, voice (which also has a physical component), keystroke pattern, and gait. Although some technologies have gained more acceptance than others, it is beyond doubt that the field of access control and biometrics as a whole shows great potential for use in end user segments, such as airports, stadiums, defence installations, but also the industry and corporate workplaces where security and privacy are required. Biometrics may be used for identity establishment. A new measurement that purports to belong to a particular entity is compared against the data stored in relation to that entity. If the measurements match, the assertion that the person is whom they say they are is regarded as being authenticated. Some building access schemes work in this way, with the system comparing the new measure against the company’s employee database. Also authentication of the identity of a person is frequently used in order to grand access to premises or data. Since authentication takes place instantaneously and usually only once, identity fraud is possible. An attacker can bypass the biometrics authentication system and continue undisturbed. A cracked or stolen biometric system presents a dicult problem. Unlike passwords or smart cards, which can be changed or reissued, absent serious medical interven- tion, a fingerprint or iris is forever. Once an attacker has successfully forged those characteristics, the end user must be excluded from the system entirely, raising the possibility of enormous security risks and/or reimplementation costs. Static physical characteristics can be digitally duplicated, for example, the face could be copied using a photograph, a voice-print using a voice recording, and the fingerprint using various forging methods. In addition static biometrics could be intolerant of changes in physiology such as daily voice changes or appearance changes. Unimodal biometric systems have to contend with a variety of problems such as noisy data, intraclass varia- tions, restricted degrees of freedom, non-universality, spoof

FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

Hindawi Publishing CorporationApplied Computational Intelligence and Soft ComputingVolume 2012, Article ID 242401, 7 pagesdoi:10.1155/2012/242401

Research Article

Four Machine Learning Algorithms for Biometrics Fusion:A Comparative Study

I. G. Damousis and S. Argyropoulos

Informatics and Telematics Institute, Centre for Research and Technology Hellas, 57001 Thessaloniki, Greece

Correspondence should be addressed to I. G. Damousis, [email protected]

Received 29 October 2011; Accepted 12 January 2012

Academic Editor: Cheng-Jian Lin

Copyright © 2012 I. G. Damousis and S. Argyropoulos. This is an open access article distributed under the Creative CommonsAttribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work isproperly cited.

We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create amultimodal biometrics security system. The algorithms examined are Gaussian Mixture Models (GMMs), Artificial NeuralNetworks (ANNs), Fuzzy Expert Systems (FESs), and Support Vector Machines (SVMs). The fusion of biometrics leads to securitysystems that exhibit higher recognition rates and lower false alarms compared to unimodal biometric security systems. Supervisedlearning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation/testingtook place with patterns from the same database which were not included in the training dataset. The comparison of the algorithmsreveals that the biometrics fusion system is superior to the original unimodal systems and also other fusion schemes found in theliterature.

1. Introduction

Identity verification has many real-life applications such asaccess control and economic or other transactions. Biomet-rics measure the unique physical or behavioural character-istics of an individual as a means to recognize or authen-ticate their identity. Common physical biometrics includefingerprints, hand or palm geometry, and retina, iris, orfacial characteristics. On the other hand, behavioural char-acteristics include signature, voice (which also has a physicalcomponent), keystroke pattern, and gait. Although sometechnologies have gained more acceptance than others, it isbeyond doubt that the field of access control and biometricsas a whole shows great potential for use in end user segments,such as airports, stadiums, defence installations, but alsothe industry and corporate workplaces where security andprivacy are required.

Biometrics may be used for identity establishment. A newmeasurement that purports to belong to a particular entity iscompared against the data stored in relation to that entity.If the measurements match, the assertion that the person iswhom they say they are is regarded as being authenticated.Some building access schemes work in this way, with the

system comparing the new measure against the company’semployee database. Also authentication of the identity of aperson is frequently used in order to grand access to premisesor data.

Since authentication takes place instantaneously andusually only once, identity fraud is possible. An attacker canbypass the biometrics authentication system and continueundisturbed. A cracked or stolen biometric system presentsa difficult problem. Unlike passwords or smart cards, whichcan be changed or reissued, absent serious medical interven-tion, a fingerprint or iris is forever. Once an attacker hassuccessfully forged those characteristics, the end user mustbe excluded from the system entirely, raising the possibilityof enormous security risks and/or reimplementation costs.Static physical characteristics can be digitally duplicated, forexample, the face could be copied using a photograph, avoice-print using a voice recording, and the fingerprint usingvarious forging methods. In addition static biometrics couldbe intolerant of changes in physiology such as daily voicechanges or appearance changes.

Unimodal biometric systems have to contend with avariety of problems such as noisy data, intraclass varia-tions, restricted degrees of freedom, non-universality, spoof

Page 2: FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

2 Applied Computational Intelligence and Soft Computing

Sensor 1

Feature extraction

Feature extraction

Feature vector 1

Feature vector N

Matching

Matching

Enrolled template 1

Enrolled

Matching score 1

Matching

Fusion Totalscore

Finaldecision

...

Sensor N

template N

score N

Figure 1: Fusion at the matching score level.

attacks, and unacceptable error rates. Some of these limita-tions can be addressed by deploying multimodal biometricsystems [1, 2] that integrate the evidence presented bymultiple sources of information. Indeed, the development ofsystems that integrate two or more biometrics is emergingas a trend. Such systems, known as multimodal biometricsystems, are expected to be more reliable due to thepresence of multiple, (fairly) independent pieces of evidence.These systems are able to meet the stringent performancerequirements imposed by various applications. They addressthe problem of nonuniversality, since multiple traits ensuresufficient population coverage. They also deter spoofing sinceit would be difficult for an impostor to spoof multiple bio-metric traits of a genuine user simultaneously. Furthermore,they can facilitate a challenge response type of mechanism byrequesting the user to present a random subset of biometrictraits thereby ensuring that a “live” user is indeed present atthe point of data acquisition.

In the present paper we present the development andevaluation of four machine learning algorithms for the fusionof the similarity scores of several biometric experts to form amultimodal biometrics system, aiming to raise significantlythe recognition accuracy and reduce the false acceptance andfalse rejection rates. The supervised algorithms are trainedusing samples from a well known biometrics database andthen validated using samples from the same database that aredifferent from the training ones. The aim is to compare thedeveloped algorithms with existing techniques and also findthe most efficient one out of the four, in order to use it for thefusion of novel biometrics within project HUMABIO [3].

2. Supervised Fusion Algorithms

Fusion at matching score level is the most common approachof fusion in multimodal biometric systems [2]. This factis mainly due to the easy accessibility and availability of

the matching scores in many biometric modules. The inputfor a fusion algorithm at matching score level is the (dis-)similarity score provided by a biometric module (Figure 1).There are different approaches of merging scores at thematching score level. In this approach, output scores of theindividual matching algorithms constitute the componentsof a multidimensional vector for example, a 3D vector iscreated if scores from a face, gait, and voice matching moduleare available. The resulting multi-dimensional vector is thenclassified using a classification algorithm such as SupportVector Machines (SVM), Fuzzy Expert systems (FES), neuralnetworks, and so forth, to solve the two class classificationproblem of classifying the output vector into either “impos-tor” (unauthorized users) or “genuine” (authorized users, orclients) class. One advantage of the approach is the fact thatscores may be inhomogeneous such as a mix of similaritiesand distances possibly located in different intervals. Thus, nopre-processing is required for classification fusion.

In supervised learning, the learning algorithm is pro-vided a training set of patterns (or inputs) with associatedlabels (or outputs). Usually, the patterns are in the form ofattribute vectors and once the attribute vectors are available,machine-learning methods can be applied, ranging fromsimple Boolean operators, to Bayesian classification andmore sophisticated methods. The performance of a fusionalgorithm relies on the tuning of the system. This tuningusually consists in a group of hyper-parameters that can beset manually (such as type of kernel in SVMs, number ofchromosomes in Genetic Algorithms (GA), etc.) and anothergroup that is set during the training phase. The training isused so that the algorithm can estimate (learn) the client andimpostor spaces and is crucial for the performance of thefusion system.

In this study four state of the art fusion techniques wereutilized, namely Support Vector Machines, Fuzzy ExpertSystems, Gaussian Mixture Models and Artificial Neural

Page 3: FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

Applied Computational Intelligence and Soft Computing 3

Networks. Each of these techniques follows a different phi-losophy for the fusion of the unimodal biometric inputs inorder to produce an overall estimation of whether the personis a client or an impostor.

2.1. Support Vector Machine. A typical SVM implementationwas developed [4]. A radial basis kernel function was usedto map the input data to a higher dimensional space, inwhich they were linearly separable [5]. The radial basis kernel(RBF) was selected in order to handle probable nonlinearitiesbetween the input vectors and their corresponding class. Italso has less hyperparameters than the polynomial kernelthus making training easier.

After the selection of the kernel, the process followedconsists of identifying the best pair of C and γ, that is, thepair with the best cross-validation accuracy. Following theguidelines found in [6], the training set was divided intoequal sized subsets and one subset was the validation datasetusing the classifier that was trained on the remaining subsets.The process was repeated sequentially until all subsets acteda validation dataset. The selection of C and γ was done viagrid search, that is, trying exponentially growing sequencesof C and γ [7]. The penalty parameters for each of thetwo classes (“Genuine”, “Impostor”) was done via completeenumeration trials.

The final trained SVM model was then used with theoptimal C, γ pair in order to check the classifier performanceon the test dataset which is comprised of “unknown” patternsthat were not used for the SVM training.

2.2. Fuzzy Expert System. A TSK FES [8] was developedas described in [9]. The FES’s premise space consisted ofthree inputs (NPI = 3). Each premise input was segmentedby three trapezoid membership functions described by thefollowing equation:

μji

(xp,i

)= max

(min

(xp,i − ai, jbi, j − ai, j

, 1,di, j − xp,i

di, j − ci, j

), 0

), (1)

where the parameters ai, j and di, j locate the “feet” of the “ jth”trapezoid of the “ith” premise input and the parameters bi, jand ci, j locate the “shoulders”.

This segmentation leads to the creation of 27 three-dimensional fuzzy rules (Figure 2).

The firing strength of the rule R( j), representing thedegree to which R( j) is excited by a particular premise inputvector Xp, is determined by

μj

(Xp

)=

NPI∏

i=1

μji

(xp,i

). (2)

The premise inputs were selected via extensive experi-mentation from the available biometric experts (shown inTable 1). Each fuzzy rule produces an output which is a linearfunction of the unimodal classifiers’ scores xc,i shown in

Premise input 2

Premise input 3

Premise input 1

FES decision:impostor

Unimodal experts' score vector

Small Big

Impostor

Medium

Genuine Genuine

Figure 2: Three membership functions with linguistic expressions“low”, “medium”, “high” (score) are used for the partitioning ofthree premise inputs, leading to the formation of 27 fuzzy rules.

Table 1: EER of the unimodal experts in the XM2VTS database.

Expert EER (%)

1 (Face) 1.83

2 (Face) 4.13

3 (Face) 1.78

4 (Face) 3.50

5 (Face) 6.50

6 (Voice) 1.09

7 (Voice) 6.50

8 (Voice) 4.50

Table 1 so as to include all of the available information fromthe unimodal biometric experts:

yj = F(Xc

)= λ

j0 +

NI∑

i=1

λji xc,i +

NI∑

k=1

λjk

1xc,i

, (3)

where NI is the number of unimodal classifiers.The FES estimation of the client’s authenticity is a syn-

thesis (weighted average) of the 27 fuzzy rule outputs:

y =∑NR

j=1 μj

(Xp

)· Fj

(Xc

)

∑NRj=1 μj

(Xp

) . (4)

This estimation is compared to a threshold T and if it ishigher than the FES classifies the pattern as genuine transac-tion while if it is lower it classifies it as impostor.

The parameters λ of the fuzzy rules’ linear outputfunctions (3), the parameters of the trapezoid membershipfunctions (1) that define the position of the fuzzy rules inthe premise space (or in other words the segmentation ofthe premise inputs via the shape and positioning of themembership functions), and also the decision threshold Tare optimized by a real coded [9] genetic algorithm [10].

Page 4: FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

4 Applied Computational Intelligence and Soft Computing

The GA fitness function was selected so as to minimizethe false acceptance of impostors and maximize correct au-thentication rate through the evolution of the GA:

Fitness function = correct outerror out + false normal + 1

, (5)

where correct out is the accumulated distance of the fuzzyoutput from the decision threshold in case of correct authen-tication (genuine or impostor), error out is accumulateddistance of the fuzzy output from the threshold in caseof incorrect authentication for all training patterns, andfalse normal is the number of falsely accepted impostor indi-viduals.

In that way the solutions that have minimum false accep-tance occurrences have higher fitness value. The same standsfor solutions (chromosomes) that produce outputs that havelarger distance from the threshold T in correct authentica-tions (more robust solutions) and smaller distance from thethreshold in case of erroneous authentications (thus drivingwrong solutions towards the threshold and rectifying them).

2.3. Gaussian Mixture Model. Bayesian classification anddecision making is based on probability theory and theprinciple of choosing the most probable or the lowest risk(expected cost) option. The Gaussian distribution is usuallyquite good approximation for a class model shape in asuitably selected feature space. In a Gaussian distributionlies an assumption that the class model is truly a model ofone basic class. However, if the actual model is multimodal,this model cannot capture coherently the underlying dis-tribution. Gaussian Mixture Model (GMM) is a mixture ofseveral Gaussian distributions and can therefore representdifferent subclasses within a class [11]. The probabilitydensity function is defined as a weighted sum of Gaussians:

P(x; θ) =C∑

c=1

αcN(x;μc,Σc

), (6)

where αc is the weight of component c, 0 ≤ αc ≤ 1 and

C∑

c=1

αc = 1. (7)

The parameter list θ = {α1,μ1,Σ1, . . . ,αc,μc,Σc} definesa particular Gaussian mixture probability density function.Estimation of the Gaussian mixture parameters for one classcan be considered as unsupervised learning of the case wherethe samples are generated by individual components of themixture distribution and without the knowledge of whichsample was generated by which component.

A GMM was developed, which comprised of four mix-ture components. The weights of the components were esti-mated after extensive experimentation.

2.4. Artificial Neural Network. The fourth algorithm was athree-layer feed-forward neural network (NN) [12]. Thelayers consist ofN input neurons,Y hidden neurons, and oneoutput neuron where N is equal to the number of unimodal

biometric experts (from Table 1, N = 8) and Y is setthrough experimentation equal to ten. The neurons are fullyinterconnected and a bias is applied on each neuron. Thetransfer function is selected to be sigmoid so as to addressnonlinearities of the input data set. For the training of theweights, the typical back propagation method was used.The optimum number of training iterations and trainingparameters was set heuristically. Convergence was achievedafter 500 iterations.

3. Benchmark Database

The developed fusion schemes were tested on the publiclyavailable XM2VTS face and speech database [13, 14]. TheXM2VTS database contains facial and speech data from295 subjects, recorded during four sessions taken at one-month intervals. It includes similarity scores from five faceexperts and three speech experts. The protocol consists oftwo sets: the development (training) set and the evaluation(validation) set. The development set, which is used fortraining, contains scores from three multimodal recordingsfor each of 200 client users and eight transactions from eachof the 25 impostors. The evaluation set, which is used fortesting the system, contains scores from two multimodalrecordings of the (same) 200 client users and eight trans-actions for each of the 70 (new) impostors. The impostorsin the evaluation set are different from the impostors in thedevelopment. Thus, the development set contains 600 (200×3) client transactions and 40000 (25 × 200 × 8) impostortransactions whereas the evaluation set contains 400 (200 ×2) client transactions and 112000 (70 × 200 × 8) impostortransactions.

Two metrics are computed: the False Acceptance Rate(FAR) and the False Rejection Rate (FRR) defined as

FAR = number of accepted impostorsnumber of impostor transactions

,

FRR = number of rejected clientsnumber of client transactions

.

(8)

The Half Total Error Rate (HTER) is also reported whichis defined as

HTER = FAR + FRR2

. (9)

The Equal Error Rate (EER) is computed as the pointwhere FRR = FAR; in practice, FRR and FAR are not contin-uous functions and a crossover point might not exist. In thiscase, the interval [EERlo, EERhi] should be reported. Also,another useful tool for the evaluation of the performance of abiometric system is the Rate Operating Characteristic (ROC)curve, which is produced by plotting FAR versus FRR.

The EERs of the unimodal experts for the XM2VTSdatabase are shown in Table 1.

Figure 3 shows indicative FAR-FRR diagrams for twoface and voice unimodal biometrics experts of the XM2VTSdatabase. It can be seen from the threshold T range thatthe expert scores that characterize someone as impostor orgenuine differ significantly. However, this does not pose aproblem for the fusion algorithms.

Page 5: FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

Applied Computational Intelligence and Soft Computing 5

50

20

40

60

80

100

FAR

, FR

R

FAR-FRR for classifier 2

FAR

0 0.50

20

40

60

80

100

FAR

, FR

R

FAR-FRR for classifier 1

FARFRR

−5 0−1 −0.5 1

FRR

Threshold T Threshold T

(a)

0 50

20

40

60

80

100

FAR

, FR

R

FAR-FRR for classifier 8

FARFRR

0 50

20

40

60

80

100

FAR

, FR

R

FAR-FRR for classifier 7

FARFRR

−5 −5Threshold T

Threshold T

(b)

Figure 3: FAR-FRR diagrams and EER for (a) two face and (b) two voice biometrics experts of the XM2VTS database.

Table 2: Summary table of verification results of different fusion methods for the XM2VTS database.

Fusionmethod

Training set Test set

FAR (%) FRR (%) HTER (%) FAR (%) FRR (%) HTER (%)

SVM 0 0 0 0.0 0.5 0.25

FES 0 0.005 0.0025 0.15 0.75 0.45

NN 0.0025 0.33 0.17 0.0 1 0.5

GMM 0.0225 0.33 0.18 0.028 1 0.51

OR 12.63 0 6.31 19.46 0.0 9.73

AND 0.22 12.83 6.52 0.0 19.75 9.87

Page 6: FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

6 Applied Computational Intelligence and Soft Computing

Table 3: Performance comparison of fusion schemes for theXM2VTS database.

Fusion scheme HTER (%)

Product 3.50

Max 2.35

Min 1.13

Dempster-Shafer 0.76

Sum 0.75

Weighted sum 0.63

SVM 0.52

SumPro 0.31

Presented SVM 0.25

4. Test Results

4.1. Comparative Results. Table 2 summarizes the results ofthe investigated machine learning algorithms for multimodalfusion. More specifically, the classification of the XM2VTSpatterns was performed using the SVM, GMM, FES, andNN fusion schemes. Furthermore, some simple combinationrules (AND, OR) were also tested. The first conclusion wecan reach from the results illustrated in the table is thatall of the fusion schemes perform better than the bestperforming unimodal expert (i.e., expert 6 with EER 1.09%)and the classification absolute improvement using the SVMfusion method is 0.84% (SVM HTER = 0.25%, ∼77%relative improvement over unimodal expert 6 classificationerror). This corroborates the statement that the effectivecombination of information coming from different expertscan improve significantly the performance of a biometricsystem. Moreover, this table also confirms the superiorityof the SVM fusion scheme over the other machine learningtechniques. More specifically, the FAR and FRR using theSVM fusion classifier on the XM2VTS database are 0.0% and0.5%, respectively. The superior performance of the SVMfusion classifier over the second best FES, which is 0.2%,is mainly attributed to the more efficient modelling of thefeature space. Moreover, the SVM fusion expert performsvery satisfactory when the number of the feature vectors(comprised of the matching scores in this case) is relativelylarge, as in the case of the XM2VTS database, where there are8 unimodal experts.

4.2. Comparison with State-of-the-Art Methods. An exper-imental study was also conducted to compare the devel-oped schemes with state-of-the-art fusion methods on theXM2VTS database. The same unimodal experts and the sameprotocol were employed so that any performance gain ordecrease can be attributed only to the fusion algorithm. Thefollowing table illustrates the HTER values of various fusionschemes, as reported in [15].

The first conclusion from Table 3 is that the reportedresults are inferior compared to the results presented in theprevious section. Specifically, the best result, in terms ofHTER, is 0.31%, whereas the best result of the algorithmspresented in this paper is 0.25%. Moreover, it can be seenthat the accuracy achieved in [15] for SVM classification

is lower than the authentication accuracy produced by ourimplementation of the SVM fusion scheme. This could beattributed partly to the different implementation of thealgorithm. The comparison results validate the superiority ofthe developed SVM scheme and indicate its appropriatenessfor the application scenarios examined within HUMABIO[16, 17].

5. Conclusions

Four machine learning algorithms were developed for thefusion of several biometric modalities in order to detect themost efficient one for use within the project HUMABIO.The algorithms were Gaussian Mixture Models, an ArtificialNeural Network, a Fuzzy Expert System, and Support VectorMachines. The algorithms were trained and tested using awell-known biometric database which contains samples offace and speech and similarity scores of five face and threespeech biometric experts. The fusion results were comparedagainst existing fusion techniques and also against eachother, showing that the fusion schemes presented in thispaper produce better biometric accuracy from conventionalmethods. From the four algorithms, the most efficient oneproved to be the support vector machines-based one offer-ing significant performance enhancement over unimodalbiometrics, over more traditionally combined multimodalbiometrics, but also over the SoA.

Acknowledgments

This work was supported in part by the EC under ContractFP6-026990 HUMABIO [3, 16]. I. G. Damousis, whenthe research reported in this paper took place, was withthe Informatics and Telematics Institute of the Centre forResearch and Technology Hellas in Thessaloniki, Greece(e-mail: [email protected]). S. Argyropoulos, when theresearch reported in this paper took place, was with theInformatics and Telematics Institute of the Centre forResearch and Technology Hellas in Thessaloniki, Greece (e-mail: [email protected]).

References

[1] A. Ross and A. Jain, “Information fusion in biometrics,” Pat-tern Recognition Letters, vol. 24, no. 13, pp. 2115–2125, 2003.

[2] A. K. Jain and A. Ross, “Multibiometric systems,” Communi-cations of the ACM, vol. 47, no. 1, pp. 34–40, 2004.

[3] I. G. Damousis, D. Tzovaras, and E. Bekiaris, “Unobtrusivemultimodal biometric authentication: the HUMABIO projectconcept,” Eurasip Journal on Advances in Signal Processing, vol.2008, Article ID 265767, 11 pages, 2008.

[4] C. J. C. Burges, “A tutorial on support vector machines forpattern recognition,” Data Mining and Knowledge Discovery,vol. 2, no. 2, pp. 121–167, 1998.

[5] N. Christianini and J. Shawe-Taylor, An Introduction to Sup-port Vector Machines and Other Kernel-based Learning Meth-ods, Cambridge University Press, 2000.

[6] C. W. Hsu, C. C. Chang, and C. J. Lin, “A practical guide tosupport vector classification,” Test, vol. 1, no. 1, pp. 1–16, 2010.

Page 7: FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

Applied Computational Intelligence and Soft Computing 7

[7] R. E. Fan, P. H. Chen, and C. J. Lin, “Working set selectionusing second order information for training support vectormachines,” Journal of Machine Learning Research, vol. 6, pp.1889–1918, 2005.

[8] T. Takagi and M. Sugeno, “Fuzzy identification of systems andits applications to modeling and control,” IEEE Transactionson Systems, Man and Cybernetics, vol. 15, no. 1, pp. 116–132,1985.

[9] I. G. Damousis and D. Tzovaras, “Fuzzy fusion of eyelid activ-ity indicators for hypovigilance-related accident prediction,”IEEE Transactions on Intelligent Transportation Systems, vol. 9,no. 3, pp. 491–500, 2008.

[10] D. E. Goldberg, Genetic Algorithms in Search, Optimization,and Machine Learning, Addison-Wesley, New York, NY, USA,1989.

[11] M. A. T. Figueiredo and A. K. Jain, “Unsupervised learning offinite mixture models,” IEEE Transactions on Pattern Analysisand Machine Intelligence, vol. 24, no. 3, pp. 381–396, 2002.

[12] T. Masters, Signal and Image Processing with Neural Networks,John Wiley & Sons, 1994.

[13] N. Poh and S. Bengio, “A score-level fusion benchmarkdatabase for biometric authentication,” in Proceedings of the5th International Conference on Audio, and Video-Based Bio-metric Person Authentication (AVBPA ’05), vol. 3546 of LectureNotes in Computer Science, pp. 1059–1070, July 2005.

[14] XM2VTS database, http://www.ee.surrey.ac.uk/CVSSP/xm2vtsdb/.

[15] L. Shoushan and Z. Chengqing, “Classifier combining rulesunder independence assumptions,” in Proceedings of the 7thinternational Conference on Multiple Classifier Systems (MCS’07), vol. 4472 of lecture Notes in Computer Science, pp. 322–332, 2007.

[16] HUMABIO project, http://www.humabio-eu.org/.

[17] A. Vatakis et al., “Deliverable 7.1 HUMABIO Pilot plans,”2008.

Page 8: FourMachineLearningAlgorithmsforBiometricsFusion ...downloads.hindawi.com › journals › acisc › 2012 › 242401.pdf · of fusion in multimodal biometric systems [2]. This fact

Submit your manuscripts athttp://www.hindawi.com

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttp://www.hindawi.com

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Applied Computational Intelligence and Soft Computing

 Advances in 

Artificial Intelligence

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014