Optimization of biometric recognition using cuckoo search algorithm: a preliminary version for minutia based fingerprint identification


  • Dhileepan Thangamanimaran
  • M. Sharat Chandar
  • S. Chandia






Minutiae, Cuckoo Search, Optimization, Fingerprint.


Currently Behavioural Biometrics is the most widely used means of security.  Though Behavioural Biometrics is highly reliable and secure, the data handling process is quite complex. This Problem can be solved by optimizing the process using cuckoo search algorithm.

This Paper seeks to optimize the process of fingerprint matching by using an optimal algorithm. The Minutiae in the form of a matrix is extracted from a fingerprint. The Matrix is then split into smaller matrices with increasing dimension and then compared. The matrix with least dimension it is matched. If the Match is true then the verification of next generation bigger matrix is done. If the Match tends to be false then the matrix is skipped and the process is continued for the next matrix in the database. The Process is repeated until accurate match is obtained.

Though the time reduced by the optimization of the finger print matching algorithm is insignificant for a smaller data set such as finger print data, it can be a key factor when a larger set of Behavioural biometrics data is considered.


[1] Yang XS & Deb S, “Cuckoo search via Lévy flightsâ€, World Congress on Nature & Biologically Inspired Computing, (2009), pp.210-214.

[2] Dorothy R, Joany RM, Joseph Rathish R, Santhana Prabha S & Rajendran S, “Image enhancement by Histogram equalizationâ€, Advances in Recent Trends in Communication and Networks, (2010).

[3] Erbilek M & Fairhurst M, “A methodological framework for investigating age factors on the performance of biometric systemsâ€, Proceedings of the on Multimedia and security, (2012), pp.115-122.

[4] Mondal S, Bours P & Idrus SZ, “Complexity measurement of a password for keystroke dynamics: Preliminary studyâ€, Proceedings of the 6th International Conference on Security of Information and Networks, (2013), pp.301-305.

[5] Mishra A, Bharadi V & Kekre H, “Multimodal biometricsâ€, Proceedings of the International Conference and Workshop on Emerging Trends in Technology, (2010), pp.1002-1003.

[6] Hong F, Wei M, You S, Feng Y & Guo Z, “Waving authentication: your smartphone authenticate you on motion gestureâ€, Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, (2015), pp. 263-266.

[7] Morales A & Fierrez J, “Keystroke Biometrics for Student Authentication:A Case Studyâ€, Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education, (2015), pp. 337-337.

[8] Eberz S, Rasmussen KB, Lenders V & Martinovic I, “Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metricsâ€, Proceedings of the ACM on Asia Conference on Computer and Communications Security, (2017), pp.386-399.

View Full Article: