American Journal of Intelligent Systems
p-ISSN: 2165-8978 e-ISSN: 2165-8994
2013; 3(3): 105-112
doi:10.5923/j.ajis.20130303.01
1Department of Master of Computer Applications Siddaganga Instistute of Technology, Tumkur, India
2Computer Engineering Department, School of Technology and Business Studies, Dalarna University, Sweden
Correspondence to: Hasan Fleyeh, Computer Engineering Department, School of Technology and Business Studies, Dalarna University, Sweden.
Email: | ![]() |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.
Keywords: Soft-computing, Biometrics, Soft-biometrics, Fuzzy Logic, Neural Networks, Evolutionary Algorithms, Hybrid Systems
Cite this paper: M. A. Jayaram, Hasan Fleyeh, Soft Computing in Biometrics: A Pragmatic Appraisal, American Journal of Intelligent Systems, Vol. 3 No. 3, 2013, pp. 105-112. doi: 10.5923/j.ajis.20130303.01.
[1] | D. Bhattacharyya, R. Ranjan, F. Alisherov, M. Choi, Biometric authentication: A Review, International Journal of u-and e-Service, Science and Technology, 2(3), pp 13-28. , 2009 |
[2] | M. Malcangi, Soft computing methods for robust authentication using soft-biometric data, Neural Computation & Application, Springer, 2011. |
[3] | J. Rudas, J. Fodor, Intelligent Systems, Int. Journal of Computers, Communications & Control, 3(1), pp 132-138, 2008. |
[4] | C. Altrock, Fuzzy logic and Neuro fuzzy applications explained, Upper Saddle River, NJ, Prentice Hall, 1995. |
[5] | N. Constantinescu, I. Iancu, Fuzzy Identity Authentication, Latest Trends on Computers, 1(1), pp 168-173, 2008. |
[6] | N. Bodorin, V. Balas, 8-Valent Fuzzy Logic for Iris Recognition and Biometry, Proc.5th IEEE Int. Symp. On Computational Intelligence and Intelligent Informatics, Floriana, Malta, 2011. |
[7] | N. Bodorin, V. Balas, Learning Iris Digital Biometric Identities for Secure Authentication, Recent advances in Intelligent Engineering Systems, Springer Verlag, 2011. |
[8] | N. Bodorin, V. Balas, Exploratory Simulation of an Intelligent Iris Verifier Distributed System, Proc. 6th IEEE International Symposium on Applied Computational Intelligence and Informatics, IEEE press, pp.259-262, 2011. |
[9] | C. Lau, B. Ma, H. Meng, Y. Moon and Y. Yam, Fuzzy Logic decision Fusion in a Multimodal Biometric System, Proc. 8th International Conference on Spoken Languages Processing, Korea, 2004. |
[10] | W. De Ru , J. Eloff, Enhanced Password Authentication Through Fuzzy Logic, IEEE Expert, 12(6), pp 38-45, 1997. |
[11] | A. Kumar, M. Hanmandlu, Das. A, H. Gupta, Biometric Based Personal Authentication using Fuzzy Binary Decision Tree, Proc. 5th IAPR Int. Conf. on Biometrics, Delhi, India, pp 396-401, 2012 |
[12] | I. Iancu, N. Constantinescu, M. Colhon, Finger Prints Identification using a Fuzzy Logic System, Int. J. of Computers, Communications & Control, 5(4), pp 525-553, 2010. |
[13] | S. Jennifer, R. Shermila, A five-ways fuzzy authentication for secured banking, International Journal of Engineering Research and Application, 2(4), pp 375-379, 2012. |
[14] | S. Kakarwal, R. Deshmukh, Information theory and Neural Network based approach for face recognition: A review, Int.Journal of Recent Trends in Engineering, 2(4), pp 176-178. 2009 |
[15] | J. Cortes, P. Gil, V. Aquino, D Lopez, R. Galdera, A Biometric System Based on Neural Networks and SVM Using Morphological Feature Extraction from Hand-Shape Images, Informatica, 22(2), pp 225-240. 2011 |
[16] | M. Alaraj, J. Hoe, T. Fukami, A Neural Network based Human Identification Framework Using Ear Images, IEEE-TENCON, pp 1595-1600, 2010. |
[17] | V. Radha, N. Nallammal, Neural Network Based Face Recognition Using RBNF Classifier, Proc. World Congress on Engineering and Computer Science, Vol. I, San Francisco, USA. 2011 |
[18] | M. Gopalakrishnan, T. Sanathanam, Improved Biometric Recognition and Identification of Human Iris Patterns using Neural Networks, Journal of Theoretical and Applied Information Technology, 31(2), pp134-139, 2011. |
[19] | K. Sundaraj, Investigation of Facial Artifacts on Face Biometrics using Eigenface based Single and Multiple Neural Networks, WSEAS Transactions on Systems, 8(1), pp 127-136, 2009. |
[20] | C. Coello, Evolutionary Algorithms: Basic Concepts and Applications in Biometrics, Synthesis and Analysis in Biometrics, World Scientific Publishing, pp 1-34, 2006, |
[21] | Ibrahiem, E. Emery, M El-Kareem, On the application of Genetic Algorithm in Finger Print Recognition, World Applied Sciences Journal, 5(3),pp 276-281, 2008. |
[22] | J. Galbally, J. Fierrez, M. Freire, J. Garcia, Feature Selection based on genetic Algorithms for on-line signature verification, Lecture Notes in Computer Science, Vol 5845, pp 246-257, 2009. |
[23] | D. Kumar, S. Kumar, S. Rai, Feature Selection for face recognition: A Memetic algorithm approach, Journal of Zhejanga University Science, 10(8), pp 1140-1152, 2009. |
[24] | R. Ramadan, F. Abdel-Kader, Face Recognition Using Particle Swarm Optimization-Based Selected Features, Int. Journal of Signal Processing, Image Processing and Pattern recognition, 2(2), pp 51-66, 2009. |
[25] | T. Abegaz, , G. Dozier, K. Bryant, J. Adams, V. Mclean, J. Shelton, A. Alford, K. Ricanek, D. Woodard, Applying GECs for Feature Selection and Weighting using X-Tools, Proc. of 8th Annual International Conference on Genetic and Evolutionary Methods, pp 1-6, 2011. |
[26] | A. Alford, C. Steed, M. Jeffrey, D. Weet, J. Shelton, L. Small, D. Leflore, Dozier, G. Bryant , T. Abegaz, J. Kelly, K. Ricanek, Biometrics: Hybrid Feature Selection and Weighting for a Multi-Modal Biometric System, Proc. of IEEE Southeast Con, pp 1-8,2012. |
[27] | J. Jang, ANFIS: Adaptive-network-based-fuzzy inference system, IEEE Trans. On Systems, Man, and Cybernetics, 23(3), 1993, pp 665-685. |
[28] | O. Cordon, H. Herrera, and M. Lozano, A Classified review on the combination fuzzy logic- genetic algorithms bibliography, Tech. Report 95129, Department of Computer Science and AI, Universidad de Granada, Granada, Spain, 1995, Available at : http://decsai.ugr.s/~herrera/flga.html. |
[29] | V. W. Port, Overview of Evolutionary Computation as a Mechanism for Solving Neural System Design Problems, Hand Book of Neural computation, Oxford University Press, 1997. |
[30] | E. Vonk, L. Jain, and R. Johnson, Automatic Generation Neural Network Architecture Using Evolutionary Computation, World Scientific Publication, 1997. |
[31] | X. Yao, Evolving Artificial Neural Networks, IEEE Trans. On Neural Networks, 87(9), 1999, pp 1423-1447. |
[32] | C. Karr, Design of an adaptive fuzzy logic controller using genetic algorithms, Proc. Int. Conf. on Genetic Algorithms, San Diego, 1991, pp 450-456. |
[33] | M. Lee , H. Tagaki, Dynamic control of genetic algorithm using fuzzy logic techniques, Proc. Fifth Int. Conf. on Genetic Algorithms, Morgan Kaufmann, CA, 1993, pp 76-83. |
[34] | H. Surmann, Kanstein, K. Goser, Self-organizing and genetic algorithms for an automatic design of fuzzy control and Decision Systems, Proc. EUFIT, Germany, 1993, pp 1097-1104. |
[35] | P. Arabshahi, J. Choi, R. Marks, and T. Caudell, Fuzzy control of Back Propagation, Proc. IEEE Int.Conf on Fuzzy Systems, San Diego, 1992, pp 967-972. |
[36] | A. Taherian, M. Aliyarish, Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network, Int. Journal of Security and Its Applications, 7(1), pp 105-118, 2013. |
[37] | V. Srivastava, B. Tripathi, V. Pathak, Evolutionary Fuzzy Clustering and Parallel Neural Networks based Human Identification using Face Biometrics, Int. Journal of Computer Applications, 31(7), pp 1-6,2011. |
[38] | T. Le, Applying Artificial Neural Networks for Face recognition, Advances in Artificial Neural Networks, Vol. 2011, 2011,pp 1-16 |