SlideShare a Scribd company logo
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
70
FEATURE SELECTION IN MULTIMODAL
AUTHENTICATION USING LU FACTORIZATION
WITH CSEAM MODEL
Y Suresh,K Pavan Kumar, PESN Krishna Prasad, BDCN Prasad
Prasad V. Potluri Siddhartha Institute of Technology,
Kanuru, Vijayawada-7, India
Abstract
Multimodal authentication is one of the prime concepts in current applications of real scenario. Various
approaches have been proposed in this aspect. In this paper, an intuitive strategy is proposed as a
framework for providing more secure key in biometric security aspect. Initially the features will be
extracted through PCA by SVD from the chosen biometric patterns, then using LU factorization technique
key components will be extracted, then selected with different key sizes and then combined the selected key
components using convolution kernel method (Exponential Kronecker Product - eKP) as Context-Sensitive
Exponent Associative Memory model (CSEAM). In the similar way, the verification process will be done
and then verified with the measure MSE. This model would give better outcome when compared with SVD
factorization[1] as feature selection. The process will be computed for different key sizes and the results
will be presented.
KEYWORDS
Feature selection, LU factorization, CSEAM Model, PCA by SVD, Exponential kronecker Product (eKP),
Multimodal Authentication.
1.INTRODUCTION
In recent scenario, agent biometric data verification is one of the critical tasks in the access
control that performs the major building block of security. User identification is traditionally
based on something that user knows (PIN/Password) and user has(Key/Token/Smart Card). But,
these traditional methods can be forgotten, disclosed, lost or stolen. Apart from these strategies,
failure rate is to differentiate between an accredited and unaccredited person [12].
Biometrics [4] is a scientific discipline that involves methods of identity verification or
identification based on the principle of measurable physiological or behavioural characteristics
such as a fingerprint, an iris pattern, palm, vein or a voice sample. In the analysis of security
aspect, human patterns are unique. The primary advantage of multimodal authentication strategies
over other approaches of authentication is to process/ combine two or more user patterns with the
use of psychological/behavioural patterns.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
71
Nowadays, the biometrics patterns has been adopted throughout worldwide on a large scale and
used in different sectors of public/private organizations. As specified in [12], biometric pattern
authentication is a layered model consists of identification mode and verification mode [2, 3, 4]
and the identification process starts with the enrolment process and consists of Acquisition:
Acquisition is the first step in biometric authentication system. Using input device User’s sample
is obtained; Creation of the characteristics: After first step, biometric measurements are
processed. The numbers of biometric samples depends upon the technology that we are using.
Sometimes, single metric is sufficient, but most of the cases multiple patterns are required. By
using these patters features are extracted; Storage of the characteristics: After feature extraction
the feature patterns are stored in a card/database server/on a workstation/directly on
authentication terminal.
After enrolment of the user, the user can use the system for successful authentications or
identifications. The verification/testing process takes the following steps:
1. Acquisition(s): Biometric measurements should be acquired in order to make comparison
with parent patterns.
2. Creation of new characteristics: New characteristics are created from the previous step.
3. Comparison: Currently computed characteristics are computed with the characteristics
obtained in the previous step.
4. Decision: The final step in the test phase is the yes/no decision based on a threshold.
2.MULTIMODAL AUTHENTICATION SYSTEM
In multimodal authentication system, user has to enrol two to three patterns for
identification/verification. Such patterns may be noise in capturing and may lead to more error
prone. In order, to resolve the noise/ inconsistency, vector logic based models have been
considered for minimizing the error rate.
From author’s perspective, different strategies, methodologies and models have been proposed
for multimodal systems, some of them may be, the user authentication based on speech and face
patterns [5] is one of the first multimodal biometric system. Brunelli and Falavigna[5] for
normalization and weighted geometric average for fusion of voice and face biometrics that uses
hyperbolic tangent (tanh) and also they proposed a hierarchical combination scheme for a
multimodal identification system. Kittler et al. [6] conducted with different fusion strategies for
human face and voice patterns, including statistical and algebraic metrics. Kittler et al. [6]
concluded that the algebraic sum metric is not significantly affected by the statistical estimation
errors and covers its superiority and importance. Hong and Jain [7] proposed a multimodal
system fingerprint pattern satisfaction is applied after pruning the datasets via face pattern
matching. Ben-Yacoub et al. [8] considered several fusion strategies, such as tree classifiers,
multilayer perceptions and support vector machines for face and voice biometrics. Ross and Jain
[9] fusion the traits of biometric patterns- fingerprint, face and hand geometry with sum, decision
tree and linear discriminant approaches. The authors concluded that sum rule performs
outstanding when compared with others.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
72
From these observations, vector logic approach is to be considered for multi-modal biometric
authentication system based on facial and iris pattern. In this paper, both face images and
fingerprint patterns are chosen due to their complementary characteristics, physiology, and
behaviour.
3.PROPOSED MODEL
The effectiveness of biometric system using two level multimodal authentication problems are
discussed in [1]for encoding and decoding of biometric patterns. At level one, input patterns are
normalized with PCA by SVD and then keys will be selected using LU factorization from the
extracted patterns after processing sensed data with PCA by SVD, at level two using
computational model (CSEAM model [1]),the generated keys will fusion through LU
factorization, and at level three the decision process can be analyzed using error estimation
strategies. An overview of the computational framework for the proposed model is described in
the Fig. 1.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
73
Figure 1. Framework of the Proposed Model
Figure 2. Black diagram of the Proposed Model.
3.1.Feature Extraction Using PCA by SVD
3.1.1 Principal Component Analysis (PCA)
In PCA[10], the directions of the data patterns is the most variation, that is the eigen vectors
corresponding to the largest eigen values of the covariance matrix, and project the data patterns
onto these directions that might get rid of important non-second order information by PCA. If the
matrix of eigen vectors sorted according to eigen value by , then PCA transformation of the data
as . The eigen vectors are called principle components [11]. By selecting the first d rows
of Y, then the projected data is from n down to d dimensions.
3.1.2 Spectral decomposition of a square matrix:
Any real symmetric matrix A of size mxm may be decomposed uniquely as [10]
Where U is an orthonormal matrix and it satisfies
or
and is a diagonal matrix . The eigen vectors of matrix A are columns of the matrix U and
the eigen values are the diagonal elements of matrix .
3.1.3 Singular Value Decomposition:
A matrix A of size mxn can be decomposed as [10]
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
74
U is a column orthogonal matrix of size mxn and its columns are eigen vectors of
i
V is a orthogonal matrix of size nxn and its columns are eigen vectors of A
ie
D is a diagonal matrix of size nxn called singular values.
If then
3.1.4 PCA by SVD:
The main advantage of the PCA by SVD is to apply the projection of the data on the principal
components. So the best features will be extracted with less computational complexity. i.e. Let X
be a matrix, decompose it by using SVD [10] is
and the covariance matrix as
In this case U is a nxn matrix. The SVD[10] orders the singular values in descending order. If
n<m , the first n columns in U corresponding to the sorted eigen values of C and if m , the first
m corresponds to the sorted non-zero eigen values of C. The transformed data patterns can thus
be written as
Where is a matrix of size nxm which is one on the diagonal and zero everywhere else.
4.FEATURE SELECTION USING LU FACTORIZATION
An intuitive models described, where the stimulate association of a matrix are dependent on the
context of multiplicative vectorial logic. In this context a remarkable operation that transforms the
real matrix over the truly computing data into a triangular matrix. This transformation promoted
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
75
by the context leads to the LU Decomposition of a matrix representation, which is a mathematical
method in the field of Image Processing and signal processing.
The meaningful event in the representation is the activity of the large group of data patterns,
naturally represented by high dimensional vectors or diodic matrices. These representations are
processed by associative memories (association of input-output pattern pairs) which store the
information distributed and superposed over coefficients.
In this paper, the associative memory is computed using the keys which are generated from the
fusion patterns by using LU factorization,
Where A and B are fusion patterns of two pair biometric samples ( face and finger print). The
fusion is done by using PCA. The importance of this factorization is here to extract the best
features by eliminating noise and lighting effect using Gaussian-distribution models. In the
process of computation the exponential kronecker product as associative memory combines the
two keys from LU factorization and generates a memory representation M over K, where K is the
Kth
order kernel that uses Kronecker product as convolution product.
Where, g= . In this associative model, the memories models are based on a matrix over a
multiplicity of vector associations are super imposed.
In general, A B represents the Kronecker product.
Where A is the one key pattern of one fusion set and B is another key patterns of the second
fusion set, with ith
order convolution.
5.EXPONENTIAL KRONECKER PRODUCT
5.1. Exponential Kronecker Product (eKP):
The exponential function [13] possesses some specific properties in connection with tensor
operations. Assuming that A and B are the two matrices, then the eKP[1] is described as:
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
76
The eKP [13,14,15] is having excellent properties that imply the concept of vector logic. The
properties are as:
, is a special property of kronecker calculus.
In this paper, the eKP is represented as Context-Sensitive Exponent associative memory model
(CSEAM).
6.DECISION STRATEGY - MSE
6.1. Decision Strategy
In this strategy, the Mean Square Error (MSE) is as for verification of proposed framework with
the support of CSEAM model at the training and testing levels.
Mean Square Error
The Mean Square Error (MSE) of an estimator of a parameter is the function of X defined by
and it is denoted as .
The MSE is the sum of the variance and the squared bias of the predications. The estimator is,
7.EXPERIMENT ANALYSIS
Several experiments have been conducted on this framework on the standard datasets from [16,
17] for recognition/verification. In the decision process, the Mean Square Error (MSE) [22] is
considered for testing/training patterns based on the error rate, the difference between training
and testing memories M and MT
computed using CSEAM model respectively.
The experimental results have been considered on the chosen data patterns is listed in the Table1
with various key patterns from selected features using proposed framework such as
8x8,16x16,....,64x64 on similar and dissimilar face and fingerprint patterns.
Matching and non-matching patterns using FMR and FNMR decision method
From the consideration of posters of the multimodal authentication system, FNMR and FMR
metrics have been computed for the selected features using LU factorization with CSEAM model.
In the process of pattern acquisition, error free data will be considered from the standard
benchmark datasets and its FAR/FMR and FRR/FNMR pairs are equivalent.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
77
FMR[1] is the probabilistic estimator of the pattern matching that incorrect the input data to a
non-matching data in the chosen dataset. The FMR metric is the ratio of matching whose error
value is equal or less than the threshold d: MSE ≤ d, where the threshold d is the set of possible
values of the global error.
Similarly FNMR[1] is another probabilistic estimator non-pattern matching of the input data to
matching patterns from the datasets that measures % of valid inputs which are incorrectly
rejected. The FNMR is computed as the percentage of matching whose error is greater than the
threshold d: MSE>d.
No Key Size
MSE
Similar with
different poses
(SVD with
LU)
Similar with
different poses
(SVD)
Dissimilar with
different poses
(SVD with LU)
Dissimilar
with different
poses (SVD)
1 8x8 0.001044 0.0162 0.011948 0.0488
2 16x16 0.000106 0.0011 0.004774 0.0074
3 24x24 0.000273 0.000450 0.002030 0.0067
4 32x32 0.000130 0.000444 0.001630 0.0033
5 40x40 0.000066 0.000392 0.000893 0.0027
6 48x48 0.000049 0.000271 0.000777 0.0018
7 56x56 0.000061 0.000208 0.000372 0.0015
8 64x64 0.000043 0.000182 0.000459 0.0013
Table 1: Mean Square Error (MSE) of various key sizes
Figure 3: Mean Square Error
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
78
From the analysis of experimental results, it is observed that the key size 8x8 has been
encountered in rejecting rate when provided similar multimodal data patterns (FMR).
8.CONCLUSIONS
In this paper, an intuitive framework is proposed using cognitive logic for authentication/
verification of the biometrics patterns in multimodal authentication. In this framework the keys
have been selected from the extracted features of the fusion patterns using LU factorization
technique and then combined using Context-sensitive Exponent associative memory model with
the concept of exponential kronecker product (CSEAM).This model is one of the nice strategies
in the domain of cognitive logic. This framework returns better and better outcome from the
selected datasets [16, 17] and provides more complex security in terms of time and space, since it
uses eKP in the cognitive logic. From the observations of experimental results, the key sizes
should be more than 8x8, since while extracting the feature and applying the PCA by SVD, some
of the features might be lost. In such cases, the fusion data will be regretted by the proposed
framework. For the rest of the cases the proposed framework returns better outcome. This
framework is also compared with the selection of key patterns using normal SVD factorization
which gives more accurate and efficient recognition.
REFERENCES
[1] PESN Krishna Prasad, K. Pavan Kumar, MV Ramakrishna and BDCN Prasad, “Fusion Based
Multimodal authentication in Biometrics using Context-Sensitive Exponent Associative Memory
Model: A Novel Approach”, CS&IT Conference proceedings pp. 81-90, 2013,
DOI:10.5121/csit/2013.3608
[2] Mary Lourde R and DushyantKhosla, Fingerprint Identification in Biometric Security Systems,
International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, 852-855, 2010.
[3] T. De Bie, N. Cristianini, R. Rosipal, Eigenproblems in Pattern Recognition, Handbook of
Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics,
Springer-Verlag, Heidelberg, 2004
[4] Jain, A.K.; Ross, A., Prabhakar, S. An Introduction to Biometric Recognition. IEEE Trans. Circuits
Syst. Video Technol., 14, 4-20, 2004.
[5] R. Bruneelli and D.Falavigna, “Person identification using multiple cues,” IEEE Trans. PAMI, vol.
17, no.10, pp.955-966, oct.1995.
[6] J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers”, IEEE Trans. PAMI, vol.
20, no. 3, pp. 226-239, 1998
[7] L. Hong and A.K. Jain, “Integrating Faces and Fingerprints for Personal Identification”, IEEE Trans.
PAMI, vol. 20, no. 12, pp. 1295-1307, 1998.
[8] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz, “Fusion of Face and Speech Data for Person
Identity Verification”, IEEE Trans. Neural Networks, vol. 10, no. 5, pp. 1065-1075, 1999
[9] A. Ross and A.K. Jain, “Information Fusion in Biometrics”, Pattern Recognition Letters, vol. 24, no.
13, pp. 2115-2125, 2003
[10] RasmusElsborg Madsen, Lars Kai Hansen and Ole Winther, “Singular Value Decomposition and
Principle Component Analaysis”, February 2004
[11] Matthew A. Turk, Alex P. Pentland, “Face Recognition using Eigen Faces”, IEEE 1991
[12] Vaclav Matyas, ZdenekRiha, “Biometric Authentication —Security and Usability”,
http://www.fi.muni.cz/usr/matyas/
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
79
[13] John W. Brewer, Kronecker Products and Matrix Calculus in System Analysis, IEEE Transactions on
Circuits and Systems, Vol. 25, No. 9, 1978
[14] Wolfgang Hackbusch, Boris N. Khoromskij, Hierarchical Tensor-Product Approximations, 1-26.
[15] LubomírBrančík, Matlab Programs for Matrix Exponential Function Derivative Evaluation
[16] http://www.face-rec.org/databases/
[17] http://www.advancedsourcecode.com/fingerprintdatabase.asp
[18] Izquierdo-Fuento, A.; del Val, L.; Jimenez M.I.; Villakorta, J.J. “Performance Evaluation of a
Biometric System Based on Acoustic Images. Sensors, 119499-9519, 2011.

More Related Content

What's hot

MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
VLSICS Design
 
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
IJECEIAES
 
Integrated bio-search approaches with multi-objective algorithms for optimiza...
Integrated bio-search approaches with multi-objective algorithms for optimiza...Integrated bio-search approaches with multi-objective algorithms for optimiza...
Integrated bio-search approaches with multi-objective algorithms for optimiza...
TELKOMNIKA JOURNAL
 
Mammogram image segmentation using rough
Mammogram image segmentation using roughMammogram image segmentation using rough
Mammogram image segmentation using rough
eSAT Publishing House
 
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
ijscmcj
 
Mammogram image segmentation using rough clustering
Mammogram image segmentation using rough clusteringMammogram image segmentation using rough clustering
Mammogram image segmentation using rough clustering
eSAT Journals
 
Accounting for variance in machine learning benchmarks
Accounting for variance in machine learning benchmarksAccounting for variance in machine learning benchmarks
Accounting for variance in machine learning benchmarks
Devansh16
 
When deep learners change their mind learning dynamics for active learning
When deep learners change their mind  learning dynamics for active learningWhen deep learners change their mind  learning dynamics for active learning
When deep learners change their mind learning dynamics for active learning
Devansh16
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET Journal
 
Multi-Cluster Based Approach for skewed Data in Data Mining
Multi-Cluster Based Approach for skewed Data in Data MiningMulti-Cluster Based Approach for skewed Data in Data Mining
Multi-Cluster Based Approach for skewed Data in Data Mining
IOSR Journals
 
IRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image SegmentationIRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image Segmentation
IRJET Journal
 
Survey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectionSurvey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selection
eSAT Journals
 
A comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray dataA comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray data
ijcsit
 
hb2s5_BSc scriptie Steyn Heskes
hb2s5_BSc scriptie Steyn Heskeshb2s5_BSc scriptie Steyn Heskes
hb2s5_BSc scriptie Steyn HeskesSteyn Heskes
 
Survey on semi supervised classification methods and
Survey on semi supervised classification methods andSurvey on semi supervised classification methods and
Survey on semi supervised classification methods and
eSAT Publishing House
 
A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...
IJECEIAES
 
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance ExpensesIntegrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
inventionjournals
 
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmUnsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
IOSR Journals
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
Editor IJMTER
 

What's hot (19)

MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
 
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...
 
Integrated bio-search approaches with multi-objective algorithms for optimiza...
Integrated bio-search approaches with multi-objective algorithms for optimiza...Integrated bio-search approaches with multi-objective algorithms for optimiza...
Integrated bio-search approaches with multi-objective algorithms for optimiza...
 
Mammogram image segmentation using rough
Mammogram image segmentation using roughMammogram image segmentation using rough
Mammogram image segmentation using rough
 
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...
 
Mammogram image segmentation using rough clustering
Mammogram image segmentation using rough clusteringMammogram image segmentation using rough clustering
Mammogram image segmentation using rough clustering
 
Accounting for variance in machine learning benchmarks
Accounting for variance in machine learning benchmarksAccounting for variance in machine learning benchmarks
Accounting for variance in machine learning benchmarks
 
When deep learners change their mind learning dynamics for active learning
When deep learners change their mind  learning dynamics for active learningWhen deep learners change their mind  learning dynamics for active learning
When deep learners change their mind learning dynamics for active learning
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data Mining
 
Multi-Cluster Based Approach for skewed Data in Data Mining
Multi-Cluster Based Approach for skewed Data in Data MiningMulti-Cluster Based Approach for skewed Data in Data Mining
Multi-Cluster Based Approach for skewed Data in Data Mining
 
IRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image SegmentationIRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image Segmentation
 
Survey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectionSurvey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selection
 
A comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray dataA comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray data
 
hb2s5_BSc scriptie Steyn Heskes
hb2s5_BSc scriptie Steyn Heskeshb2s5_BSc scriptie Steyn Heskes
hb2s5_BSc scriptie Steyn Heskes
 
Survey on semi supervised classification methods and
Survey on semi supervised classification methods andSurvey on semi supervised classification methods and
Survey on semi supervised classification methods and
 
A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...
 
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance ExpensesIntegrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
 
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmUnsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
 

Viewers also liked

Expert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion BeamExpert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion Beam
ijcsa
 
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
ijcsa
 
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
ijcsa
 
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
ijcsa
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
ijcsa
 
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
ijcsa
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
ijcsa
 
Proficiency comparison ofladtree
Proficiency comparison ofladtreeProficiency comparison ofladtree
Proficiency comparison ofladtree
ijcsa
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerce
ijcsa
 
Integrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system forIntegrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system for
ijcsa
 
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
ijcsa
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
ijcsa
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniques
ijcsa
 
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDYUSING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
ijcsa
 
Modeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety NetworkModeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety Network
ijcsa
 
Distributed mixed reality for diving and
Distributed mixed reality for diving andDistributed mixed reality for diving and
Distributed mixed reality for diving and
ijcsa
 
Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013
Catherine Anderson
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusion
eSAT Publishing House
 
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceIdiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceCatherine Anderson
 

Viewers also liked (20)

Expert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion BeamExpert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion Beam
 
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
 
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
 
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
Proficiency comparison ofladtree
Proficiency comparison ofladtreeProficiency comparison ofladtree
Proficiency comparison ofladtree
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerce
 
Integrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system forIntegrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system for
 
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniques
 
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDYUSING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
 
Modeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety NetworkModeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety Network
 
Distributed mixed reality for diving and
Distributed mixed reality for diving andDistributed mixed reality for diving and
Distributed mixed reality for diving and
 
Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusion
 
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceIdiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
 

Similar to Feature selection in multimodal

K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
K-MEDOIDS CLUSTERING  USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...K-MEDOIDS CLUSTERING  USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
ijscmc
 
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
ijcsit
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
INFOGAIN PUBLICATION
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
CSCJournals
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
IJNSA Journal
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
IJNSA Journal
 
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
Simplified Knowledge Prediction: Application of Machine Learning in Real LifeSimplified Knowledge Prediction: Application of Machine Learning in Real Life
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
Peea Bal Chakraborty
 
Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...
nooriasukmaningtyas
 
Controlling informative features for improved accuracy and faster predictions...
Controlling informative features for improved accuracy and faster predictions...Controlling informative features for improved accuracy and faster predictions...
Controlling informative features for improved accuracy and faster predictions...
Damian R. Mingle, MBA
 
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
A Threshold Fuzzy Entropy Based Feature Selection:  Comparative StudyA Threshold Fuzzy Entropy Based Feature Selection:  Comparative Study
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
IJMER
 
Prediction of dementia using machine learning model and performance improvem...
Prediction of dementia using machine learning model and  performance improvem...Prediction of dementia using machine learning model and  performance improvem...
Prediction of dementia using machine learning model and performance improvem...
IJECEIAES
 
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research AreasReview of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
CSCJournals
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
IRJET Journal
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441IJRAT
 
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
TEJVEER SINGH
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET Journal
 
Possibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognitionPossibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognition
IJCI JOURNAL
 
K044065257
K044065257K044065257
K044065257
IJERA Editor
 

Similar to Feature selection in multimodal (20)

K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
K-MEDOIDS CLUSTERING  USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...K-MEDOIDS CLUSTERING  USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
K-MEDOIDS CLUSTERING USING PARTITIONING AROUND MEDOIDS FOR PERFORMING FACE R...
 
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
 
TBerger_FinalReport
TBerger_FinalReportTBerger_FinalReport
TBerger_FinalReport
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
Simplified Knowledge Prediction: Application of Machine Learning in Real LifeSimplified Knowledge Prediction: Application of Machine Learning in Real Life
Simplified Knowledge Prediction: Application of Machine Learning in Real Life
 
Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...
 
Controlling informative features for improved accuracy and faster predictions...
Controlling informative features for improved accuracy and faster predictions...Controlling informative features for improved accuracy and faster predictions...
Controlling informative features for improved accuracy and faster predictions...
 
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
A Threshold Fuzzy Entropy Based Feature Selection:  Comparative StudyA Threshold Fuzzy Entropy Based Feature Selection:  Comparative Study
A Threshold Fuzzy Entropy Based Feature Selection: Comparative Study
 
Prediction of dementia using machine learning model and performance improvem...
Prediction of dementia using machine learning model and  performance improvem...Prediction of dementia using machine learning model and  performance improvem...
Prediction of dementia using machine learning model and performance improvem...
 
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research AreasReview of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441
 
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
 
Possibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognitionPossibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognition
 
K044065257
K044065257K044065257
K044065257
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 

Feature selection in multimodal

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 70 FEATURE SELECTION IN MULTIMODAL AUTHENTICATION USING LU FACTORIZATION WITH CSEAM MODEL Y Suresh,K Pavan Kumar, PESN Krishna Prasad, BDCN Prasad Prasad V. Potluri Siddhartha Institute of Technology, Kanuru, Vijayawada-7, India Abstract Multimodal authentication is one of the prime concepts in current applications of real scenario. Various approaches have been proposed in this aspect. In this paper, an intuitive strategy is proposed as a framework for providing more secure key in biometric security aspect. Initially the features will be extracted through PCA by SVD from the chosen biometric patterns, then using LU factorization technique key components will be extracted, then selected with different key sizes and then combined the selected key components using convolution kernel method (Exponential Kronecker Product - eKP) as Context-Sensitive Exponent Associative Memory model (CSEAM). In the similar way, the verification process will be done and then verified with the measure MSE. This model would give better outcome when compared with SVD factorization[1] as feature selection. The process will be computed for different key sizes and the results will be presented. KEYWORDS Feature selection, LU factorization, CSEAM Model, PCA by SVD, Exponential kronecker Product (eKP), Multimodal Authentication. 1.INTRODUCTION In recent scenario, agent biometric data verification is one of the critical tasks in the access control that performs the major building block of security. User identification is traditionally based on something that user knows (PIN/Password) and user has(Key/Token/Smart Card). But, these traditional methods can be forgotten, disclosed, lost or stolen. Apart from these strategies, failure rate is to differentiate between an accredited and unaccredited person [12]. Biometrics [4] is a scientific discipline that involves methods of identity verification or identification based on the principle of measurable physiological or behavioural characteristics such as a fingerprint, an iris pattern, palm, vein or a voice sample. In the analysis of security aspect, human patterns are unique. The primary advantage of multimodal authentication strategies over other approaches of authentication is to process/ combine two or more user patterns with the use of psychological/behavioural patterns.
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 71 Nowadays, the biometrics patterns has been adopted throughout worldwide on a large scale and used in different sectors of public/private organizations. As specified in [12], biometric pattern authentication is a layered model consists of identification mode and verification mode [2, 3, 4] and the identification process starts with the enrolment process and consists of Acquisition: Acquisition is the first step in biometric authentication system. Using input device User’s sample is obtained; Creation of the characteristics: After first step, biometric measurements are processed. The numbers of biometric samples depends upon the technology that we are using. Sometimes, single metric is sufficient, but most of the cases multiple patterns are required. By using these patters features are extracted; Storage of the characteristics: After feature extraction the feature patterns are stored in a card/database server/on a workstation/directly on authentication terminal. After enrolment of the user, the user can use the system for successful authentications or identifications. The verification/testing process takes the following steps: 1. Acquisition(s): Biometric measurements should be acquired in order to make comparison with parent patterns. 2. Creation of new characteristics: New characteristics are created from the previous step. 3. Comparison: Currently computed characteristics are computed with the characteristics obtained in the previous step. 4. Decision: The final step in the test phase is the yes/no decision based on a threshold. 2.MULTIMODAL AUTHENTICATION SYSTEM In multimodal authentication system, user has to enrol two to three patterns for identification/verification. Such patterns may be noise in capturing and may lead to more error prone. In order, to resolve the noise/ inconsistency, vector logic based models have been considered for minimizing the error rate. From author’s perspective, different strategies, methodologies and models have been proposed for multimodal systems, some of them may be, the user authentication based on speech and face patterns [5] is one of the first multimodal biometric system. Brunelli and Falavigna[5] for normalization and weighted geometric average for fusion of voice and face biometrics that uses hyperbolic tangent (tanh) and also they proposed a hierarchical combination scheme for a multimodal identification system. Kittler et al. [6] conducted with different fusion strategies for human face and voice patterns, including statistical and algebraic metrics. Kittler et al. [6] concluded that the algebraic sum metric is not significantly affected by the statistical estimation errors and covers its superiority and importance. Hong and Jain [7] proposed a multimodal system fingerprint pattern satisfaction is applied after pruning the datasets via face pattern matching. Ben-Yacoub et al. [8] considered several fusion strategies, such as tree classifiers, multilayer perceptions and support vector machines for face and voice biometrics. Ross and Jain [9] fusion the traits of biometric patterns- fingerprint, face and hand geometry with sum, decision tree and linear discriminant approaches. The authors concluded that sum rule performs outstanding when compared with others.
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 72 From these observations, vector logic approach is to be considered for multi-modal biometric authentication system based on facial and iris pattern. In this paper, both face images and fingerprint patterns are chosen due to their complementary characteristics, physiology, and behaviour. 3.PROPOSED MODEL The effectiveness of biometric system using two level multimodal authentication problems are discussed in [1]for encoding and decoding of biometric patterns. At level one, input patterns are normalized with PCA by SVD and then keys will be selected using LU factorization from the extracted patterns after processing sensed data with PCA by SVD, at level two using computational model (CSEAM model [1]),the generated keys will fusion through LU factorization, and at level three the decision process can be analyzed using error estimation strategies. An overview of the computational framework for the proposed model is described in the Fig. 1.
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 73 Figure 1. Framework of the Proposed Model Figure 2. Black diagram of the Proposed Model. 3.1.Feature Extraction Using PCA by SVD 3.1.1 Principal Component Analysis (PCA) In PCA[10], the directions of the data patterns is the most variation, that is the eigen vectors corresponding to the largest eigen values of the covariance matrix, and project the data patterns onto these directions that might get rid of important non-second order information by PCA. If the matrix of eigen vectors sorted according to eigen value by , then PCA transformation of the data as . The eigen vectors are called principle components [11]. By selecting the first d rows of Y, then the projected data is from n down to d dimensions. 3.1.2 Spectral decomposition of a square matrix: Any real symmetric matrix A of size mxm may be decomposed uniquely as [10] Where U is an orthonormal matrix and it satisfies or and is a diagonal matrix . The eigen vectors of matrix A are columns of the matrix U and the eigen values are the diagonal elements of matrix . 3.1.3 Singular Value Decomposition: A matrix A of size mxn can be decomposed as [10]
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 74 U is a column orthogonal matrix of size mxn and its columns are eigen vectors of i V is a orthogonal matrix of size nxn and its columns are eigen vectors of A ie D is a diagonal matrix of size nxn called singular values. If then 3.1.4 PCA by SVD: The main advantage of the PCA by SVD is to apply the projection of the data on the principal components. So the best features will be extracted with less computational complexity. i.e. Let X be a matrix, decompose it by using SVD [10] is and the covariance matrix as In this case U is a nxn matrix. The SVD[10] orders the singular values in descending order. If n<m , the first n columns in U corresponding to the sorted eigen values of C and if m , the first m corresponds to the sorted non-zero eigen values of C. The transformed data patterns can thus be written as Where is a matrix of size nxm which is one on the diagonal and zero everywhere else. 4.FEATURE SELECTION USING LU FACTORIZATION An intuitive models described, where the stimulate association of a matrix are dependent on the context of multiplicative vectorial logic. In this context a remarkable operation that transforms the real matrix over the truly computing data into a triangular matrix. This transformation promoted
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 75 by the context leads to the LU Decomposition of a matrix representation, which is a mathematical method in the field of Image Processing and signal processing. The meaningful event in the representation is the activity of the large group of data patterns, naturally represented by high dimensional vectors or diodic matrices. These representations are processed by associative memories (association of input-output pattern pairs) which store the information distributed and superposed over coefficients. In this paper, the associative memory is computed using the keys which are generated from the fusion patterns by using LU factorization, Where A and B are fusion patterns of two pair biometric samples ( face and finger print). The fusion is done by using PCA. The importance of this factorization is here to extract the best features by eliminating noise and lighting effect using Gaussian-distribution models. In the process of computation the exponential kronecker product as associative memory combines the two keys from LU factorization and generates a memory representation M over K, where K is the Kth order kernel that uses Kronecker product as convolution product. Where, g= . In this associative model, the memories models are based on a matrix over a multiplicity of vector associations are super imposed. In general, A B represents the Kronecker product. Where A is the one key pattern of one fusion set and B is another key patterns of the second fusion set, with ith order convolution. 5.EXPONENTIAL KRONECKER PRODUCT 5.1. Exponential Kronecker Product (eKP): The exponential function [13] possesses some specific properties in connection with tensor operations. Assuming that A and B are the two matrices, then the eKP[1] is described as:
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 76 The eKP [13,14,15] is having excellent properties that imply the concept of vector logic. The properties are as: , is a special property of kronecker calculus. In this paper, the eKP is represented as Context-Sensitive Exponent associative memory model (CSEAM). 6.DECISION STRATEGY - MSE 6.1. Decision Strategy In this strategy, the Mean Square Error (MSE) is as for verification of proposed framework with the support of CSEAM model at the training and testing levels. Mean Square Error The Mean Square Error (MSE) of an estimator of a parameter is the function of X defined by and it is denoted as . The MSE is the sum of the variance and the squared bias of the predications. The estimator is, 7.EXPERIMENT ANALYSIS Several experiments have been conducted on this framework on the standard datasets from [16, 17] for recognition/verification. In the decision process, the Mean Square Error (MSE) [22] is considered for testing/training patterns based on the error rate, the difference between training and testing memories M and MT computed using CSEAM model respectively. The experimental results have been considered on the chosen data patterns is listed in the Table1 with various key patterns from selected features using proposed framework such as 8x8,16x16,....,64x64 on similar and dissimilar face and fingerprint patterns. Matching and non-matching patterns using FMR and FNMR decision method From the consideration of posters of the multimodal authentication system, FNMR and FMR metrics have been computed for the selected features using LU factorization with CSEAM model. In the process of pattern acquisition, error free data will be considered from the standard benchmark datasets and its FAR/FMR and FRR/FNMR pairs are equivalent.
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 77 FMR[1] is the probabilistic estimator of the pattern matching that incorrect the input data to a non-matching data in the chosen dataset. The FMR metric is the ratio of matching whose error value is equal or less than the threshold d: MSE ≤ d, where the threshold d is the set of possible values of the global error. Similarly FNMR[1] is another probabilistic estimator non-pattern matching of the input data to matching patterns from the datasets that measures % of valid inputs which are incorrectly rejected. The FNMR is computed as the percentage of matching whose error is greater than the threshold d: MSE>d. No Key Size MSE Similar with different poses (SVD with LU) Similar with different poses (SVD) Dissimilar with different poses (SVD with LU) Dissimilar with different poses (SVD) 1 8x8 0.001044 0.0162 0.011948 0.0488 2 16x16 0.000106 0.0011 0.004774 0.0074 3 24x24 0.000273 0.000450 0.002030 0.0067 4 32x32 0.000130 0.000444 0.001630 0.0033 5 40x40 0.000066 0.000392 0.000893 0.0027 6 48x48 0.000049 0.000271 0.000777 0.0018 7 56x56 0.000061 0.000208 0.000372 0.0015 8 64x64 0.000043 0.000182 0.000459 0.0013 Table 1: Mean Square Error (MSE) of various key sizes Figure 3: Mean Square Error
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 78 From the analysis of experimental results, it is observed that the key size 8x8 has been encountered in rejecting rate when provided similar multimodal data patterns (FMR). 8.CONCLUSIONS In this paper, an intuitive framework is proposed using cognitive logic for authentication/ verification of the biometrics patterns in multimodal authentication. In this framework the keys have been selected from the extracted features of the fusion patterns using LU factorization technique and then combined using Context-sensitive Exponent associative memory model with the concept of exponential kronecker product (CSEAM).This model is one of the nice strategies in the domain of cognitive logic. This framework returns better and better outcome from the selected datasets [16, 17] and provides more complex security in terms of time and space, since it uses eKP in the cognitive logic. From the observations of experimental results, the key sizes should be more than 8x8, since while extracting the feature and applying the PCA by SVD, some of the features might be lost. In such cases, the fusion data will be regretted by the proposed framework. For the rest of the cases the proposed framework returns better outcome. This framework is also compared with the selection of key patterns using normal SVD factorization which gives more accurate and efficient recognition. REFERENCES [1] PESN Krishna Prasad, K. Pavan Kumar, MV Ramakrishna and BDCN Prasad, “Fusion Based Multimodal authentication in Biometrics using Context-Sensitive Exponent Associative Memory Model: A Novel Approach”, CS&IT Conference proceedings pp. 81-90, 2013, DOI:10.5121/csit/2013.3608 [2] Mary Lourde R and DushyantKhosla, Fingerprint Identification in Biometric Security Systems, International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, 852-855, 2010. [3] T. De Bie, N. Cristianini, R. Rosipal, Eigenproblems in Pattern Recognition, Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics, Springer-Verlag, Heidelberg, 2004 [4] Jain, A.K.; Ross, A., Prabhakar, S. An Introduction to Biometric Recognition. IEEE Trans. Circuits Syst. Video Technol., 14, 4-20, 2004. [5] R. Bruneelli and D.Falavigna, “Person identification using multiple cues,” IEEE Trans. PAMI, vol. 17, no.10, pp.955-966, oct.1995. [6] J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers”, IEEE Trans. PAMI, vol. 20, no. 3, pp. 226-239, 1998 [7] L. Hong and A.K. Jain, “Integrating Faces and Fingerprints for Personal Identification”, IEEE Trans. PAMI, vol. 20, no. 12, pp. 1295-1307, 1998. [8] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz, “Fusion of Face and Speech Data for Person Identity Verification”, IEEE Trans. Neural Networks, vol. 10, no. 5, pp. 1065-1075, 1999 [9] A. Ross and A.K. Jain, “Information Fusion in Biometrics”, Pattern Recognition Letters, vol. 24, no. 13, pp. 2115-2125, 2003 [10] RasmusElsborg Madsen, Lars Kai Hansen and Ole Winther, “Singular Value Decomposition and Principle Component Analaysis”, February 2004 [11] Matthew A. Turk, Alex P. Pentland, “Face Recognition using Eigen Faces”, IEEE 1991 [12] Vaclav Matyas, ZdenekRiha, “Biometric Authentication —Security and Usability”, http://www.fi.muni.cz/usr/matyas/
  • 10. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 79 [13] John W. Brewer, Kronecker Products and Matrix Calculus in System Analysis, IEEE Transactions on Circuits and Systems, Vol. 25, No. 9, 1978 [14] Wolfgang Hackbusch, Boris N. Khoromskij, Hierarchical Tensor-Product Approximations, 1-26. [15] LubomírBrančík, Matlab Programs for Matrix Exponential Function Derivative Evaluation [16] http://www.face-rec.org/databases/ [17] http://www.advancedsourcecode.com/fingerprintdatabase.asp [18] Izquierdo-Fuento, A.; del Val, L.; Jimenez M.I.; Villakorta, J.J. “Performance Evaluation of a Biometric System Based on Acoustic Images. Sensors, 119499-9519, 2011.