Optimization of biometric recognition using cuckoo search algorithm: a preliminary version for minutia based fingerprint identification

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Currently Behavioural Biometrics is the most widely used means of security.  Though Behavioural Biometrics is highly reliable and secure, the data handling process is quite complex. This Problem can be solved by optimizing the process using cuckoo search algorithm.

    This Paper seeks to optimize the process of fingerprint matching by using an optimal algorithm. The Minutiae in the form of a matrix is extracted from a fingerprint. The Matrix is then split into smaller matrices with increasing dimension and then compared. The matrix with least dimension it is matched. If the Match is true then the verification of next generation bigger matrix is done. If the Match tends to be false then the matrix is skipped and the process is continued for the next matrix in the database. The Process is repeated until accurate match is obtained.

    Though the time reduced by the optimization of the finger print matching algorithm is insignificant for a smaller data set such as finger print data, it can be a key factor when a larger set of Behavioural biometrics data is considered.

  • Keywords

    Minutiae, Cuckoo Search, Optimization, Fingerprint.

  • References

      [1] Yang XS & Deb S, “Cuckoo search via Lévy flights”, World Congress on Nature & Biologically Inspired Computing, (2009), pp.210-214.

      [2] Dorothy R, Joany RM, Joseph Rathish R, Santhana Prabha S & Rajendran S, “Image enhancement by Histogram equalization”, Advances in Recent Trends in Communication and Networks, (2010).

      [3] Erbilek M & Fairhurst M, “A methodological framework for investigating age factors on the performance of biometric systems”, Proceedings of the on Multimedia and security, (2012), pp.115-122.

      [4] Mondal S, Bours P & Idrus SZ, “Complexity measurement of a password for keystroke dynamics: Preliminary study”, Proceedings of the 6th International Conference on Security of Information and Networks, (2013), pp.301-305.

      [5] Mishra A, Bharadi V & Kekre H, “Multimodal biometrics”, Proceedings of the International Conference and Workshop on Emerging Trends in Technology, (2010), pp.1002-1003.

      [6] Hong F, Wei M, You S, Feng Y & Guo Z, “Waving authentication: your smartphone authenticate you on motion gesture”, Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, (2015), pp. 263-266.

      [7] Morales A & Fierrez J, “Keystroke Biometrics for Student Authentication:A Case Study”, Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education, (2015), pp. 337-337.

      [8] Eberz S, Rasmussen KB, Lenders V & Martinovic I, “Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics”, Proceedings of the ACM on Asia Conference on Computer and Communications Security, (2017), pp.386-399.




Article ID: 8920
DOI: 10.14419/ijet.v7i1.1.8920

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.