SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
70
FEATURE SELECTION IN MULTIMODAL
AUTHENTICATION USING LU FACTORIZATION
WITH CSEAM MODEL
Y Suresh,K Pavan Kumar, PESN Krishna Prasad, BDCN Prasad
Prasad V. Potluri Siddhartha Institute of Technology,
Kanuru, Vijayawada-7, India
Abstract
Multimodal authentication is one of the prime concepts in current applications of real scenario. Various
approaches have been proposed in this aspect. In this paper, an intuitive strategy is proposed as a
framework for providing more secure key in biometric security aspect. Initially the features will be
extracted through PCA by SVD from the chosen biometric patterns, then using LU factorization technique
key components will be extracted, then selected with different key sizes and then combined the selected key
components using convolution kernel method (Exponential Kronecker Product - eKP) as Context-Sensitive
Exponent Associative Memory model (CSEAM). In the similar way, the verification process will be done
and then verified with the measure MSE. This model would give better outcome when compared with SVD
factorization[1] as feature selection. The process will be computed for different key sizes and the results
will be presented.
KEYWORDS
Feature selection, LU factorization, CSEAM Model, PCA by SVD, Exponential kronecker Product (eKP),
Multimodal Authentication.
1.INTRODUCTION
In recent scenario, agent biometric data verification is one of the critical tasks in the access
control that performs the major building block of security. User identification is traditionally
based on something that user knows (PIN/Password) and user has(Key/Token/Smart Card). But,
these traditional methods can be forgotten, disclosed, lost or stolen. Apart from these strategies,
failure rate is to differentiate between an accredited and unaccredited person [12].
Biometrics [4] is a scientific discipline that involves methods of identity verification or
identification based on the principle of measurable physiological or behavioural characteristics
such as a fingerprint, an iris pattern, palm, vein or a voice sample. In the analysis of security
aspect, human patterns are unique. The primary advantage of multimodal authentication strategies
over other approaches of authentication is to process/ combine two or more user patterns with the
use of psychological/behavioural patterns.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
71
Nowadays, the biometrics patterns has been adopted throughout worldwide on a large scale and
used in different sectors of public/private organizations. As specified in [12], biometric pattern
authentication is a layered model consists of identification mode and verification mode [2, 3, 4]
and the identification process starts with the enrolment process and consists of Acquisition:
Acquisition is the first step in biometric authentication system. Using input device User’s sample
is obtained; Creation of the characteristics: After first step, biometric measurements are
processed. The numbers of biometric samples depends upon the technology that we are using.
Sometimes, single metric is sufficient, but most of the cases multiple patterns are required. By
using these patters features are extracted; Storage of the characteristics: After feature extraction
the feature patterns are stored in a card/database server/on a workstation/directly on
authentication terminal.
After enrolment of the user, the user can use the system for successful authentications or
identifications. The verification/testing process takes the following steps:
1. Acquisition(s): Biometric measurements should be acquired in order to make comparison
with parent patterns.
2. Creation of new characteristics: New characteristics are created from the previous step.
3. Comparison: Currently computed characteristics are computed with the characteristics
obtained in the previous step.
4. Decision: The final step in the test phase is the yes/no decision based on a threshold.
2.MULTIMODAL AUTHENTICATION SYSTEM
In multimodal authentication system, user has to enrol two to three patterns for
identification/verification. Such patterns may be noise in capturing and may lead to more error
prone. In order, to resolve the noise/ inconsistency, vector logic based models have been
considered for minimizing the error rate.
From author’s perspective, different strategies, methodologies and models have been proposed
for multimodal systems, some of them may be, the user authentication based on speech and face
patterns [5] is one of the first multimodal biometric system. Brunelli and Falavigna[5] for
normalization and weighted geometric average for fusion of voice and face biometrics that uses
hyperbolic tangent (tanh) and also they proposed a hierarchical combination scheme for a
multimodal identification system. Kittler et al. [6] conducted with different fusion strategies for
human face and voice patterns, including statistical and algebraic metrics. Kittler et al. [6]
concluded that the algebraic sum metric is not significantly affected by the statistical estimation
errors and covers its superiority and importance. Hong and Jain [7] proposed a multimodal
system fingerprint pattern satisfaction is applied after pruning the datasets via face pattern
matching. Ben-Yacoub et al. [8] considered several fusion strategies, such as tree classifiers,
multilayer perceptions and support vector machines for face and voice biometrics. Ross and Jain
[9] fusion the traits of biometric patterns- fingerprint, face and hand geometry with sum, decision
tree and linear discriminant approaches. The authors concluded that sum rule performs
outstanding when compared with others.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
72
From these observations, vector logic approach is to be considered for multi-modal biometric
authentication system based on facial and iris pattern. In this paper, both face images and
fingerprint patterns are chosen due to their complementary characteristics, physiology, and
behaviour.
3.PROPOSED MODEL
The effectiveness of biometric system using two level multimodal authentication problems are
discussed in [1]for encoding and decoding of biometric patterns. At level one, input patterns are
normalized with PCA by SVD and then keys will be selected using LU factorization from the
extracted patterns after processing sensed data with PCA by SVD, at level two using
computational model (CSEAM model [1]),the generated keys will fusion through LU
factorization, and at level three the decision process can be analyzed using error estimation
strategies. An overview of the computational framework for the proposed model is described in
the Fig. 1.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
73
Figure 1. Framework of the Proposed Model
Figure 2. Black diagram of the Proposed Model.
3.1.Feature Extraction Using PCA by SVD
3.1.1 Principal Component Analysis (PCA)
In PCA[10], the directions of the data patterns is the most variation, that is the eigen vectors
corresponding to the largest eigen values of the covariance matrix, and project the data patterns
onto these directions that might get rid of important non-second order information by PCA. If the
matrix of eigen vectors sorted according to eigen value by , then PCA transformation of the data
as . The eigen vectors are called principle components [11]. By selecting the first d rows
of Y, then the projected data is from n down to d dimensions.
3.1.2 Spectral decomposition of a square matrix:
Any real symmetric matrix A of size mxm may be decomposed uniquely as [10]
Where U is an orthonormal matrix and it satisfies
or
and is a diagonal matrix . The eigen vectors of matrix A are columns of the matrix U and
the eigen values are the diagonal elements of matrix .
3.1.3 Singular Value Decomposition:
A matrix A of size mxn can be decomposed as [10]
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
74
U is a column orthogonal matrix of size mxn and its columns are eigen vectors of
i
V is a orthogonal matrix of size nxn and its columns are eigen vectors of A
ie
D is a diagonal matrix of size nxn called singular values.
If then
3.1.4 PCA by SVD:
The main advantage of the PCA by SVD is to apply the projection of the data on the principal
components. So the best features will be extracted with less computational complexity. i.e. Let X
be a matrix, decompose it by using SVD [10] is
and the covariance matrix as
In this case U is a nxn matrix. The SVD[10] orders the singular values in descending order. If
n<m , the first n columns in U corresponding to the sorted eigen values of C and if m , the first
m corresponds to the sorted non-zero eigen values of C. The transformed data patterns can thus
be written as
Where is a matrix of size nxm which is one on the diagonal and zero everywhere else.
4.FEATURE SELECTION USING LU FACTORIZATION
An intuitive models described, where the stimulate association of a matrix are dependent on the
context of multiplicative vectorial logic. In this context a remarkable operation that transforms the
real matrix over the truly computing data into a triangular matrix. This transformation promoted
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
75
by the context leads to the LU Decomposition of a matrix representation, which is a mathematical
method in the field of Image Processing and signal processing.
The meaningful event in the representation is the activity of the large group of data patterns,
naturally represented by high dimensional vectors or diodic matrices. These representations are
processed by associative memories (association of input-output pattern pairs) which store the
information distributed and superposed over coefficients.
In this paper, the associative memory is computed using the keys which are generated from the
fusion patterns by using LU factorization,
Where A and B are fusion patterns of two pair biometric samples ( face and finger print). The
fusion is done by using PCA. The importance of this factorization is here to extract the best
features by eliminating noise and lighting effect using Gaussian-distribution models. In the
process of computation the exponential kronecker product as associative memory combines the
two keys from LU factorization and generates a memory representation M over K, where K is the
Kth
order kernel that uses Kronecker product as convolution product.
Where, g= . In this associative model, the memories models are based on a matrix over a
multiplicity of vector associations are super imposed.
In general, A B represents the Kronecker product.
Where A is the one key pattern of one fusion set and B is another key patterns of the second
fusion set, with ith
order convolution.
5.EXPONENTIAL KRONECKER PRODUCT
5.1. Exponential Kronecker Product (eKP):
The exponential function [13] possesses some specific properties in connection with tensor
operations. Assuming that A and B are the two matrices, then the eKP[1] is described as:
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
76
The eKP [13,14,15] is having excellent properties that imply the concept of vector logic. The
properties are as:
, is a special property of kronecker calculus.
In this paper, the eKP is represented as Context-Sensitive Exponent associative memory model
(CSEAM).
6.DECISION STRATEGY - MSE
6.1. Decision Strategy
In this strategy, the Mean Square Error (MSE) is as for verification of proposed framework with
the support of CSEAM model at the training and testing levels.
Mean Square Error
The Mean Square Error (MSE) of an estimator of a parameter is the function of X defined by
and it is denoted as .
The MSE is the sum of the variance and the squared bias of the predications. The estimator is,
7.EXPERIMENT ANALYSIS
Several experiments have been conducted on this framework on the standard datasets from [16,
17] for recognition/verification. In the decision process, the Mean Square Error (MSE) [22] is
considered for testing/training patterns based on the error rate, the difference between training
and testing memories M and MT
computed using CSEAM model respectively.
The experimental results have been considered on the chosen data patterns is listed in the Table1
with various key patterns from selected features using proposed framework such as
8x8,16x16,....,64x64 on similar and dissimilar face and fingerprint patterns.
Matching and non-matching patterns using FMR and FNMR decision method
From the consideration of posters of the multimodal authentication system, FNMR and FMR
metrics have been computed for the selected features using LU factorization with CSEAM model.
In the process of pattern acquisition, error free data will be considered from the standard
benchmark datasets and its FAR/FMR and FRR/FNMR pairs are equivalent.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
77
FMR[1] is the probabilistic estimator of the pattern matching that incorrect the input data to a
non-matching data in the chosen dataset. The FMR metric is the ratio of matching whose error
value is equal or less than the threshold d: MSE ≤ d, where the threshold d is the set of possible
values of the global error.
Similarly FNMR[1] is another probabilistic estimator non-pattern matching of the input data to
matching patterns from the datasets that measures % of valid inputs which are incorrectly
rejected. The FNMR is computed as the percentage of matching whose error is greater than the
threshold d: MSE>d.
No Key Size
MSE
Similar with
different poses
(SVD with
LU)
Similar with
different poses
(SVD)
Dissimilar with
different poses
(SVD with LU)
Dissimilar
with different
poses (SVD)
1 8x8 0.001044 0.0162 0.011948 0.0488
2 16x16 0.000106 0.0011 0.004774 0.0074
3 24x24 0.000273 0.000450 0.002030 0.0067
4 32x32 0.000130 0.000444 0.001630 0.0033
5 40x40 0.000066 0.000392 0.000893 0.0027
6 48x48 0.000049 0.000271 0.000777 0.0018
7 56x56 0.000061 0.000208 0.000372 0.0015
8 64x64 0.000043 0.000182 0.000459 0.0013
Table 1: Mean Square Error (MSE) of various key sizes
Figure 3: Mean Square Error
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
78
From the analysis of experimental results, it is observed that the key size 8x8 has been
encountered in rejecting rate when provided similar multimodal data patterns (FMR).
8.CONCLUSIONS
In this paper, an intuitive framework is proposed using cognitive logic for authentication/
verification of the biometrics patterns in multimodal authentication. In this framework the keys
have been selected from the extracted features of the fusion patterns using LU factorization
technique and then combined using Context-sensitive Exponent associative memory model with
the concept of exponential kronecker product (CSEAM).This model is one of the nice strategies
in the domain of cognitive logic. This framework returns better and better outcome from the
selected datasets [16, 17] and provides more complex security in terms of time and space, since it
uses eKP in the cognitive logic. From the observations of experimental results, the key sizes
should be more than 8x8, since while extracting the feature and applying the PCA by SVD, some
of the features might be lost. In such cases, the fusion data will be regretted by the proposed
framework. For the rest of the cases the proposed framework returns better outcome. This
framework is also compared with the selection of key patterns using normal SVD factorization
which gives more accurate and efficient recognition.
REFERENCES
[1] PESN Krishna Prasad, K. Pavan Kumar, MV Ramakrishna and BDCN Prasad, “Fusion Based
Multimodal authentication in Biometrics using Context-Sensitive Exponent Associative Memory
Model: A Novel Approach”, CS&IT Conference proceedings pp. 81-90, 2013,
DOI:10.5121/csit/2013.3608
[2] Mary Lourde R and DushyantKhosla, Fingerprint Identification in Biometric Security Systems,
International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, 852-855, 2010.
[3] T. De Bie, N. Cristianini, R. Rosipal, Eigenproblems in Pattern Recognition, Handbook of
Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics,
Springer-Verlag, Heidelberg, 2004
[4] Jain, A.K.; Ross, A., Prabhakar, S. An Introduction to Biometric Recognition. IEEE Trans. Circuits
Syst. Video Technol., 14, 4-20, 2004.
[5] R. Bruneelli and D.Falavigna, “Person identification using multiple cues,” IEEE Trans. PAMI, vol.
17, no.10, pp.955-966, oct.1995.
[6] J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers”, IEEE Trans. PAMI, vol.
20, no. 3, pp. 226-239, 1998
[7] L. Hong and A.K. Jain, “Integrating Faces and Fingerprints for Personal Identification”, IEEE Trans.
PAMI, vol. 20, no. 12, pp. 1295-1307, 1998.
[8] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz, “Fusion of Face and Speech Data for Person
Identity Verification”, IEEE Trans. Neural Networks, vol. 10, no. 5, pp. 1065-1075, 1999
[9] A. Ross and A.K. Jain, “Information Fusion in Biometrics”, Pattern Recognition Letters, vol. 24, no.
13, pp. 2115-2125, 2003
[10] RasmusElsborg Madsen, Lars Kai Hansen and Ole Winther, “Singular Value Decomposition and
Principle Component Analaysis”, February 2004
[11] Matthew A. Turk, Alex P. Pentland, “Face Recognition using Eigen Faces”, IEEE 1991
[12] Vaclav Matyas, ZdenekRiha, “Biometric Authentication —Security and Usability”,
http://www.fi.muni.cz/usr/matyas/
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
79
[13] John W. Brewer, Kronecker Products and Matrix Calculus in System Analysis, IEEE Transactions on
Circuits and Systems, Vol. 25, No. 9, 1978
[14] Wolfgang Hackbusch, Boris N. Khoromskij, Hierarchical Tensor-Product Approximations, 1-26.
[15] LubomírBrančík, Matlab Programs for Matrix Exponential Function Derivative Evaluation
[16] http://www.face-rec.org/databases/
[17] http://www.advancedsourcecode.com/fingerprintdatabase.asp
[18] Izquierdo-Fuento, A.; del Val, L.; Jimenez M.I.; Villakorta, J.J. “Performance Evaluation of a
Biometric System Based on Acoustic Images. Sensors, 119499-9519, 2011.

More Related Content

What's hot

MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONVLSICS Design
 
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...IJECEIAES
 
Integrated bio-search approaches with multi-objective algorithms for optimiza...
Integrated bio-search approaches with multi-objective algorithms for optimiza...Integrated bio-search approaches with multi-objective algorithms for optimiza...
Integrated bio-search approaches with multi-objective algorithms for optimiza...TELKOMNIKA JOURNAL
 
Mammogram image segmentation using rough
Mammogram image segmentation using roughMammogram image segmentation using rough
Mammogram image segmentation using rougheSAT Publishing House
 
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...ijscmcj
 
Mammogram image segmentation using rough clustering
Mammogram image segmentation using rough clusteringMammogram image segmentation using rough clustering
Mammogram image segmentation using rough clusteringeSAT Journals
 
Accounting for variance in machine learning benchmarks
Accounting for variance in machine learning benchmarksAccounting for variance in machine learning benchmarks
Accounting for variance in machine learning benchmarksDevansh16
 
When deep learners change their mind learning dynamics for active learning
When deep learners change their mind  learning dynamics for active learningWhen deep learners change their mind  learning dynamics for active learning
When deep learners change their mind learning dynamics for active learningDevansh16
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET Journal
 
Multi-Cluster Based Approach for skewed Data in Data Mining
Multi-Cluster Based Approach for skewed Data in Data MiningMulti-Cluster Based Approach for skewed Data in Data Mining
Multi-Cluster Based Approach for skewed Data in Data MiningIOSR Journals
 
IRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image SegmentationIRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image SegmentationIRJET Journal
 
Survey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectionSurvey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectioneSAT Journals
 
A comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray dataA comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray dataijcsit
 
hb2s5_BSc scriptie Steyn Heskes
hb2s5_BSc scriptie Steyn Heskeshb2s5_BSc scriptie Steyn Heskes
hb2s5_BSc scriptie Steyn HeskesSteyn Heskes
 
Survey on semi supervised classification methods and
Survey on semi supervised classification methods andSurvey on semi supervised classification methods and
Survey on semi supervised classification methods andeSAT Publishing House
 
A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...IJECEIAES
 
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance ExpensesIntegrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expensesinventionjournals
 
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmUnsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmIOSR Journals
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETEditor IJMTER
 

What's hot (19)

MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
 
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
 
Integrated bio-search approaches with multi-objective algorithms for optimiza...
Integrated bio-search approaches with multi-objective algorithms for optimiza...Integrated bio-search approaches with multi-objective algorithms for optimiza...
Integrated bio-search approaches with multi-objective algorithms for optimiza...
 
Mammogram image segmentation using rough
Mammogram image segmentation using roughMammogram image segmentation using rough
Mammogram image segmentation using rough
 
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
 
Mammogram image segmentation using rough clustering
Mammogram image segmentation using rough clusteringMammogram image segmentation using rough clustering
Mammogram image segmentation using rough clustering
 
Accounting for variance in machine learning benchmarks
Accounting for variance in machine learning benchmarksAccounting for variance in machine learning benchmarks
Accounting for variance in machine learning benchmarks
 
When deep learners change their mind learning dynamics for active learning
When deep learners change their mind  learning dynamics for active learningWhen deep learners change their mind  learning dynamics for active learning
When deep learners change their mind learning dynamics for active learning
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data Mining
 
Multi-Cluster Based Approach for skewed Data in Data Mining
Multi-Cluster Based Approach for skewed Data in Data MiningMulti-Cluster Based Approach for skewed Data in Data Mining
Multi-Cluster Based Approach for skewed Data in Data Mining
 
IRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image SegmentationIRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image Segmentation
 
Survey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectionSurvey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selection
 
A comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray dataA comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray data
 
hb2s5_BSc scriptie Steyn Heskes
hb2s5_BSc scriptie Steyn Heskeshb2s5_BSc scriptie Steyn Heskes
hb2s5_BSc scriptie Steyn Heskes
 
Survey on semi supervised classification methods and
Survey on semi supervised classification methods andSurvey on semi supervised classification methods and
Survey on semi supervised classification methods and
 
A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...
 
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance ExpensesIntegrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
 
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmUnsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
 

Viewers also liked

Expert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion BeamExpert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion Beamijcsa
 
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...ijcsa
 
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...ijcsa
 
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...ijcsa
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
 
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...ijcsa
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
Proficiency comparison ofladtree
Proficiency comparison ofladtreeProficiency comparison ofladtree
Proficiency comparison ofladtreeijcsa
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceijcsa
 
Integrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system forIntegrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system forijcsa
 
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
 
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...ijcsa
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniquesijcsa
 
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDYUSING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDYijcsa
 
Modeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety NetworkModeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety Networkijcsa
 
Distributed mixed reality for diving and
Distributed mixed reality for diving andDistributed mixed reality for diving and
Distributed mixed reality for diving andijcsa
 
Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013Catherine Anderson
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusioneSAT Publishing House
 
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceIdiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceCatherine Anderson
 

Viewers also liked (20)

Expert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion BeamExpert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion Beam
 
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
 
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
 
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
Proficiency comparison ofladtree
Proficiency comparison ofladtreeProficiency comparison ofladtree
Proficiency comparison ofladtree
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerce
 
Integrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system forIntegrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system for
 
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniques
 
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDYUSING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
 
Modeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety NetworkModeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety Network
 
Distributed mixed reality for diving and
Distributed mixed reality for diving andDistributed mixed reality for diving and
Distributed mixed reality for diving and
 
Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusion
 
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceIdiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
 

Similar to Feature selection in multimodal authentication using LU factorization

K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
K-MEDOIDS CLUSTERING  USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...K-MEDOIDS CLUSTERING  USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...ijscmc
 
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...ijcsit
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
Simplified Knowledge Prediction: Application of Machine Learning in Real LifeSimplified Knowledge Prediction: Application of Machine Learning in Real Life
Simplified Knowledge Prediction: Application of Machine Learning in Real LifePeea Bal Chakraborty
 
Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...nooriasukmaningtyas
 
Controlling informative features for improved accuracy and faster predictions...
Controlling informative features for improved accuracy and faster predictions...Controlling informative features for improved accuracy and faster predictions...
Controlling informative features for improved accuracy and faster predictions...Damian R. Mingle, MBA
 
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
A Threshold Fuzzy Entropy Based Feature Selection:  Comparative StudyA Threshold Fuzzy Entropy Based Feature Selection:  Comparative Study
A Threshold Fuzzy Entropy Based Feature Selection: Comparative StudyIJMER
 
Prediction of dementia using machine learning model and performance improvem...
Prediction of dementia using machine learning model and  performance improvem...Prediction of dementia using machine learning model and  performance improvem...
Prediction of dementia using machine learning model and performance improvem...IJECEIAES
 
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research AreasReview of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research AreasCSCJournals
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPIRJET Journal
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441IJRAT
 
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...TEJVEER SINGH
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET Journal
 
Possibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognitionPossibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognitionIJCI JOURNAL
 

Similar to Feature selection in multimodal authentication using LU factorization (20)

K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
K-MEDOIDS CLUSTERING  USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...K-MEDOIDS CLUSTERING  USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
 
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
 
TBerger_FinalReport
TBerger_FinalReportTBerger_FinalReport
TBerger_FinalReport
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
Simplified Knowledge Prediction: Application of Machine Learning in Real LifeSimplified Knowledge Prediction: Application of Machine Learning in Real Life
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
 
Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...
 
Controlling informative features for improved accuracy and faster predictions...
Controlling informative features for improved accuracy and faster predictions...Controlling informative features for improved accuracy and faster predictions...
Controlling informative features for improved accuracy and faster predictions...
 
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
A Threshold Fuzzy Entropy Based Feature Selection:  Comparative StudyA Threshold Fuzzy Entropy Based Feature Selection:  Comparative Study
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
 
Prediction of dementia using machine learning model and performance improvem...
Prediction of dementia using machine learning model and  performance improvem...Prediction of dementia using machine learning model and  performance improvem...
Prediction of dementia using machine learning model and performance improvem...
 
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research AreasReview of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441
 
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
 
Possibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognitionPossibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognition
 
K044065257
K044065257K044065257
K044065257
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Feature selection in multimodal authentication using LU factorization

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 70 FEATURE SELECTION IN MULTIMODAL AUTHENTICATION USING LU FACTORIZATION WITH CSEAM MODEL Y Suresh,K Pavan Kumar, PESN Krishna Prasad, BDCN Prasad Prasad V. Potluri Siddhartha Institute of Technology, Kanuru, Vijayawada-7, India Abstract Multimodal authentication is one of the prime concepts in current applications of real scenario. Various approaches have been proposed in this aspect. In this paper, an intuitive strategy is proposed as a framework for providing more secure key in biometric security aspect. Initially the features will be extracted through PCA by SVD from the chosen biometric patterns, then using LU factorization technique key components will be extracted, then selected with different key sizes and then combined the selected key components using convolution kernel method (Exponential Kronecker Product - eKP) as Context-Sensitive Exponent Associative Memory model (CSEAM). In the similar way, the verification process will be done and then verified with the measure MSE. This model would give better outcome when compared with SVD factorization[1] as feature selection. The process will be computed for different key sizes and the results will be presented. KEYWORDS Feature selection, LU factorization, CSEAM Model, PCA by SVD, Exponential kronecker Product (eKP), Multimodal Authentication. 1.INTRODUCTION In recent scenario, agent biometric data verification is one of the critical tasks in the access control that performs the major building block of security. User identification is traditionally based on something that user knows (PIN/Password) and user has(Key/Token/Smart Card). But, these traditional methods can be forgotten, disclosed, lost or stolen. Apart from these strategies, failure rate is to differentiate between an accredited and unaccredited person [12]. Biometrics [4] is a scientific discipline that involves methods of identity verification or identification based on the principle of measurable physiological or behavioural characteristics such as a fingerprint, an iris pattern, palm, vein or a voice sample. In the analysis of security aspect, human patterns are unique. The primary advantage of multimodal authentication strategies over other approaches of authentication is to process/ combine two or more user patterns with the use of psychological/behavioural patterns.
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 71 Nowadays, the biometrics patterns has been adopted throughout worldwide on a large scale and used in different sectors of public/private organizations. As specified in [12], biometric pattern authentication is a layered model consists of identification mode and verification mode [2, 3, 4] and the identification process starts with the enrolment process and consists of Acquisition: Acquisition is the first step in biometric authentication system. Using input device User’s sample is obtained; Creation of the characteristics: After first step, biometric measurements are processed. The numbers of biometric samples depends upon the technology that we are using. Sometimes, single metric is sufficient, but most of the cases multiple patterns are required. By using these patters features are extracted; Storage of the characteristics: After feature extraction the feature patterns are stored in a card/database server/on a workstation/directly on authentication terminal. After enrolment of the user, the user can use the system for successful authentications or identifications. The verification/testing process takes the following steps: 1. Acquisition(s): Biometric measurements should be acquired in order to make comparison with parent patterns. 2. Creation of new characteristics: New characteristics are created from the previous step. 3. Comparison: Currently computed characteristics are computed with the characteristics obtained in the previous step. 4. Decision: The final step in the test phase is the yes/no decision based on a threshold. 2.MULTIMODAL AUTHENTICATION SYSTEM In multimodal authentication system, user has to enrol two to three patterns for identification/verification. Such patterns may be noise in capturing and may lead to more error prone. In order, to resolve the noise/ inconsistency, vector logic based models have been considered for minimizing the error rate. From author’s perspective, different strategies, methodologies and models have been proposed for multimodal systems, some of them may be, the user authentication based on speech and face patterns [5] is one of the first multimodal biometric system. Brunelli and Falavigna[5] for normalization and weighted geometric average for fusion of voice and face biometrics that uses hyperbolic tangent (tanh) and also they proposed a hierarchical combination scheme for a multimodal identification system. Kittler et al. [6] conducted with different fusion strategies for human face and voice patterns, including statistical and algebraic metrics. Kittler et al. [6] concluded that the algebraic sum metric is not significantly affected by the statistical estimation errors and covers its superiority and importance. Hong and Jain [7] proposed a multimodal system fingerprint pattern satisfaction is applied after pruning the datasets via face pattern matching. Ben-Yacoub et al. [8] considered several fusion strategies, such as tree classifiers, multilayer perceptions and support vector machines for face and voice biometrics. Ross and Jain [9] fusion the traits of biometric patterns- fingerprint, face and hand geometry with sum, decision tree and linear discriminant approaches. The authors concluded that sum rule performs outstanding when compared with others.
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 72 From these observations, vector logic approach is to be considered for multi-modal biometric authentication system based on facial and iris pattern. In this paper, both face images and fingerprint patterns are chosen due to their complementary characteristics, physiology, and behaviour. 3.PROPOSED MODEL The effectiveness of biometric system using two level multimodal authentication problems are discussed in [1]for encoding and decoding of biometric patterns. At level one, input patterns are normalized with PCA by SVD and then keys will be selected using LU factorization from the extracted patterns after processing sensed data with PCA by SVD, at level two using computational model (CSEAM model [1]),the generated keys will fusion through LU factorization, and at level three the decision process can be analyzed using error estimation strategies. An overview of the computational framework for the proposed model is described in the Fig. 1.
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 73 Figure 1. Framework of the Proposed Model Figure 2. Black diagram of the Proposed Model. 3.1.Feature Extraction Using PCA by SVD 3.1.1 Principal Component Analysis (PCA) In PCA[10], the directions of the data patterns is the most variation, that is the eigen vectors corresponding to the largest eigen values of the covariance matrix, and project the data patterns onto these directions that might get rid of important non-second order information by PCA. If the matrix of eigen vectors sorted according to eigen value by , then PCA transformation of the data as . The eigen vectors are called principle components [11]. By selecting the first d rows of Y, then the projected data is from n down to d dimensions. 3.1.2 Spectral decomposition of a square matrix: Any real symmetric matrix A of size mxm may be decomposed uniquely as [10] Where U is an orthonormal matrix and it satisfies or and is a diagonal matrix . The eigen vectors of matrix A are columns of the matrix U and the eigen values are the diagonal elements of matrix . 3.1.3 Singular Value Decomposition: A matrix A of size mxn can be decomposed as [10]
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 74 U is a column orthogonal matrix of size mxn and its columns are eigen vectors of i V is a orthogonal matrix of size nxn and its columns are eigen vectors of A ie D is a diagonal matrix of size nxn called singular values. If then 3.1.4 PCA by SVD: The main advantage of the PCA by SVD is to apply the projection of the data on the principal components. So the best features will be extracted with less computational complexity. i.e. Let X be a matrix, decompose it by using SVD [10] is and the covariance matrix as In this case U is a nxn matrix. The SVD[10] orders the singular values in descending order. If n<m , the first n columns in U corresponding to the sorted eigen values of C and if m , the first m corresponds to the sorted non-zero eigen values of C. The transformed data patterns can thus be written as Where is a matrix of size nxm which is one on the diagonal and zero everywhere else. 4.FEATURE SELECTION USING LU FACTORIZATION An intuitive models described, where the stimulate association of a matrix are dependent on the context of multiplicative vectorial logic. In this context a remarkable operation that transforms the real matrix over the truly computing data into a triangular matrix. This transformation promoted
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 75 by the context leads to the LU Decomposition of a matrix representation, which is a mathematical method in the field of Image Processing and signal processing. The meaningful event in the representation is the activity of the large group of data patterns, naturally represented by high dimensional vectors or diodic matrices. These representations are processed by associative memories (association of input-output pattern pairs) which store the information distributed and superposed over coefficients. In this paper, the associative memory is computed using the keys which are generated from the fusion patterns by using LU factorization, Where A and B are fusion patterns of two pair biometric samples ( face and finger print). The fusion is done by using PCA. The importance of this factorization is here to extract the best features by eliminating noise and lighting effect using Gaussian-distribution models. In the process of computation the exponential kronecker product as associative memory combines the two keys from LU factorization and generates a memory representation M over K, where K is the Kth order kernel that uses Kronecker product as convolution product. Where, g= . In this associative model, the memories models are based on a matrix over a multiplicity of vector associations are super imposed. In general, A B represents the Kronecker product. Where A is the one key pattern of one fusion set and B is another key patterns of the second fusion set, with ith order convolution. 5.EXPONENTIAL KRONECKER PRODUCT 5.1. Exponential Kronecker Product (eKP): The exponential function [13] possesses some specific properties in connection with tensor operations. Assuming that A and B are the two matrices, then the eKP[1] is described as:
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 76 The eKP [13,14,15] is having excellent properties that imply the concept of vector logic. The properties are as: , is a special property of kronecker calculus. In this paper, the eKP is represented as Context-Sensitive Exponent associative memory model (CSEAM). 6.DECISION STRATEGY - MSE 6.1. Decision Strategy In this strategy, the Mean Square Error (MSE) is as for verification of proposed framework with the support of CSEAM model at the training and testing levels. Mean Square Error The Mean Square Error (MSE) of an estimator of a parameter is the function of X defined by and it is denoted as . The MSE is the sum of the variance and the squared bias of the predications. The estimator is, 7.EXPERIMENT ANALYSIS Several experiments have been conducted on this framework on the standard datasets from [16, 17] for recognition/verification. In the decision process, the Mean Square Error (MSE) [22] is considered for testing/training patterns based on the error rate, the difference between training and testing memories M and MT computed using CSEAM model respectively. The experimental results have been considered on the chosen data patterns is listed in the Table1 with various key patterns from selected features using proposed framework such as 8x8,16x16,....,64x64 on similar and dissimilar face and fingerprint patterns. Matching and non-matching patterns using FMR and FNMR decision method From the consideration of posters of the multimodal authentication system, FNMR and FMR metrics have been computed for the selected features using LU factorization with CSEAM model. In the process of pattern acquisition, error free data will be considered from the standard benchmark datasets and its FAR/FMR and FRR/FNMR pairs are equivalent.
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 77 FMR[1] is the probabilistic estimator of the pattern matching that incorrect the input data to a non-matching data in the chosen dataset. The FMR metric is the ratio of matching whose error value is equal or less than the threshold d: MSE ≤ d, where the threshold d is the set of possible values of the global error. Similarly FNMR[1] is another probabilistic estimator non-pattern matching of the input data to matching patterns from the datasets that measures % of valid inputs which are incorrectly rejected. The FNMR is computed as the percentage of matching whose error is greater than the threshold d: MSE>d. No Key Size MSE Similar with different poses (SVD with LU) Similar with different poses (SVD) Dissimilar with different poses (SVD with LU) Dissimilar with different poses (SVD) 1 8x8 0.001044 0.0162 0.011948 0.0488 2 16x16 0.000106 0.0011 0.004774 0.0074 3 24x24 0.000273 0.000450 0.002030 0.0067 4 32x32 0.000130 0.000444 0.001630 0.0033 5 40x40 0.000066 0.000392 0.000893 0.0027 6 48x48 0.000049 0.000271 0.000777 0.0018 7 56x56 0.000061 0.000208 0.000372 0.0015 8 64x64 0.000043 0.000182 0.000459 0.0013 Table 1: Mean Square Error (MSE) of various key sizes Figure 3: Mean Square Error
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 78 From the analysis of experimental results, it is observed that the key size 8x8 has been encountered in rejecting rate when provided similar multimodal data patterns (FMR). 8.CONCLUSIONS In this paper, an intuitive framework is proposed using cognitive logic for authentication/ verification of the biometrics patterns in multimodal authentication. In this framework the keys have been selected from the extracted features of the fusion patterns using LU factorization technique and then combined using Context-sensitive Exponent associative memory model with the concept of exponential kronecker product (CSEAM).This model is one of the nice strategies in the domain of cognitive logic. This framework returns better and better outcome from the selected datasets [16, 17] and provides more complex security in terms of time and space, since it uses eKP in the cognitive logic. From the observations of experimental results, the key sizes should be more than 8x8, since while extracting the feature and applying the PCA by SVD, some of the features might be lost. In such cases, the fusion data will be regretted by the proposed framework. For the rest of the cases the proposed framework returns better outcome. This framework is also compared with the selection of key patterns using normal SVD factorization which gives more accurate and efficient recognition. REFERENCES [1] PESN Krishna Prasad, K. Pavan Kumar, MV Ramakrishna and BDCN Prasad, “Fusion Based Multimodal authentication in Biometrics using Context-Sensitive Exponent Associative Memory Model: A Novel Approach”, CS&IT Conference proceedings pp. 81-90, 2013, DOI:10.5121/csit/2013.3608 [2] Mary Lourde R and DushyantKhosla, Fingerprint Identification in Biometric Security Systems, International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, 852-855, 2010. [3] T. De Bie, N. Cristianini, R. Rosipal, Eigenproblems in Pattern Recognition, Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics, Springer-Verlag, Heidelberg, 2004 [4] Jain, A.K.; Ross, A., Prabhakar, S. An Introduction to Biometric Recognition. IEEE Trans. Circuits Syst. Video Technol., 14, 4-20, 2004. [5] R. Bruneelli and D.Falavigna, “Person identification using multiple cues,” IEEE Trans. PAMI, vol. 17, no.10, pp.955-966, oct.1995. [6] J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers”, IEEE Trans. PAMI, vol. 20, no. 3, pp. 226-239, 1998 [7] L. Hong and A.K. Jain, “Integrating Faces and Fingerprints for Personal Identification”, IEEE Trans. PAMI, vol. 20, no. 12, pp. 1295-1307, 1998. [8] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz, “Fusion of Face and Speech Data for Person Identity Verification”, IEEE Trans. Neural Networks, vol. 10, no. 5, pp. 1065-1075, 1999 [9] A. Ross and A.K. Jain, “Information Fusion in Biometrics”, Pattern Recognition Letters, vol. 24, no. 13, pp. 2115-2125, 2003 [10] RasmusElsborg Madsen, Lars Kai Hansen and Ole Winther, “Singular Value Decomposition and Principle Component Analaysis”, February 2004 [11] Matthew A. Turk, Alex P. Pentland, “Face Recognition using Eigen Faces”, IEEE 1991 [12] Vaclav Matyas, ZdenekRiha, “Biometric Authentication —Security and Usability”, http://www.fi.muni.cz/usr/matyas/
  • 10. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 79 [13] John W. Brewer, Kronecker Products and Matrix Calculus in System Analysis, IEEE Transactions on Circuits and Systems, Vol. 25, No. 9, 1978 [14] Wolfgang Hackbusch, Boris N. Khoromskij, Hierarchical Tensor-Product Approximations, 1-26. [15] LubomírBrančík, Matlab Programs for Matrix Exponential Function Derivative Evaluation [16] http://www.face-rec.org/databases/ [17] http://www.advancedsourcecode.com/fingerprintdatabase.asp [18] Izquierdo-Fuento, A.; del Val, L.; Jimenez M.I.; Villakorta, J.J. “Performance Evaluation of a Biometric System Based on Acoustic Images. Sensors, 119499-9519, 2011.