Application of Machine Learning in Biometric Authentication

Main Article Content

สุวิมล วงศ์สิงห์ทอง
จุฑามาส ไพบูลย์ศักดิ์
ทรงพล นคเรศเรืองศักดิ์

Abstract

Biometric authentication is a popular approach for information and device security in the new normal era, in particular for transactions such as accessing devices and buildings, online purchasing of goods and services. The clear user benefits are the lessening of touch with high accuracy. However, machine learning technology is essential for biometric authentication in big data environments as it can reduce the hassle of modifying the program and increase the intelligent of the system. This paper was composed to allow users to understand the operation of biometric authentication system as well as to present advances in integrating machine learning into biometric authentication systems. The analysis of strengths and weaknesses of 3 are widely used biometrics: fingerprints, iris and faces was presented. The obvious merit is users have sufficient understanding of the authentication technology so that they can choose security technology appropriately and effectively.

Article Details

Section
Academic Articles

References

สุวิมล วงศ์สิงห์ทอง. (2565). การบริหารความมั่นคงสารสนเทศ. มหาวิทยาลัยเกริก. ศูนย์วิจัยและผลิตตำรา. มหาวิทยาลัยเกริก. 364 หน้า.

Ali, R. (2021). AI-enabled Decision Support System: Methodologies, Applications, and Advancements 2021. Scientific Programming 2021(Article ID 3225687). doi:https://doi.org/10.1155/2021/3225687

Arsalan, M., Hong, H. G., Naqvi, R. A., Lee, M. B., Kim, M. C., Kim, D. S., . . . Park, K. R. (2017). Deep Learning-Based Iris Segmentation for Iris Recognition in Visible Light Environment. Symmetry, 9(263), 1-25. https://mdpi-res.com/d_attachment/symmetry/symmetry-09-00263/article_deploy/symmetry-09-00263.pdf?version=1509792574

Bazrafkan, S., Thavalengal, S., & Corcoran, P. (2018). An End to End Deep Neural Network for Iris Segmentation in Unconstraint Scenarios. Neural Networks, 106, 79-95. https://doi.org/10.1016/j.neunet.2018.06.011

Bock, F.E., Aydin, R.C., Cyron, C.J., Huber, N., Kalidindi, S.R., Klusemann, B. (2019). A Review of the Application of Machine Learning and Data Mining Approaches in Continuum Materials Mechanics. Sec. Computational Materials Science Front. Mater. 6:110. https://doi.

org/10.3389/fmats.2019.00110

Bonazza, P., Mitéran, J., Ginhac, D., & Dubois, J. (2018). PhD Forum : Machine Learning VS Transfer Learning Smart Camera Implementation for Face Authentication. Paper presented at the ICDSC ’18, September 3–4, 2018, Eindhoven, Netherlands. https://doi.org /10.1145/3243394.3243710

Charniak, E. (2018). Introduction to Deep Learning, The MIT Press Cambridge, Massachusetts London, England

Daugman J., 2004. How Iris Recognition Works.IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, January 2004

Fazala, M. I., Patela, M. E., Tyea, J., & Guptab, Y. (2018). The past, present and future role of artificial intelligence in imaging. European Journal of Radiology, 105, 246-250. https://doi.org/10.1016/j.ejrad.2018.06.020

Goodfellow, I., Bengio, Y., Courville, A. (2022). Deep Learning (Adaptive Computation and Machine Learning series). ‎ The MIT Press

Jayashree, R. (2020). Analysis of Aadhaar Card Dataset Using Big Data Analytics. In: Hemanth, D., Kumar, V., Malathi, S., Castillo, O., Patrut, B. (eds) Emerging Trends in Computing and Expert Technology. COMET 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 35. Springer, Cham. https://doi.org/10.1007/978-3-030-32150-5_123

Kantardzic, M. (2020). DATA MINING Concepts, Models, Methods, and Algorithms Third Edition, IEEE Press, Wiley

Kim, H., Cui, X., Kim, M.-G., & Nguyen, T. H. B. (2019). "Fingerprint Generation and Presentation Attack Detection using Deep Neural Networks," 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), 2019, pp. 375-378, doi: 10.1109/MIPR.2019.00074.

Lardinois, F. (2021, October 27, 2021). Delta Air Lines partners with TSA PreCheck to launch biometrics-based bag drops. https://techcrunch.com/2021/10/27/delta-air-lines-partners-with-tsa-precheck-to-launch-biometrics-based-bag-drops/

Macdonald, A. (2022). Interpol program for fighting terrorism through biometrics deployed in Cameroon. Biometric.Update.com. https://www.biometricupdate.com/202201/interpol-program-for-fighting-terrorism-through-biometrics-deployed-in-cameroon

Mahdavinejad, M.S., Rezvan, M., Barekatain, M., Adibi, P., Barnaghi, P., Sheth, A.P.(2018). Machine learning for internet of things data analysis: a survey. Digital Communications and Networks, p 161-175. https://doi.org/10.1016/j.dcan.2017.10.002

Marsico, M. D., Petrosino, A., & Ricciardi, S. (2016). Iris Recognition through Machine Learning Techniques: a Survey. Pattern Recognition Letters. doi:10.1016/j.patrec.2016.02.001

Manjunatha, V., Ramalingam, S., Marks, T., Davis, L. (2018). Class Subset Selection for Transfer Learning using Submodularity. https://arXiv:1804.00060v1 [cs.CV] 30 Mar 2018

Matsumi, S., Nozaki, Y., Yoshikawa, M. (2018). Feature Extraction Driven Modeling Attack Against Double Arbiter PUF and Its Evaluation, AICCC ‘18, December 21–23, 2018, Tokyo, Japan. DOI: https://doi.org/10.1145/3299819.3299835

Nguyen, H. T., & Nguyen, L. T. (2019). Fingerprints Classification through Image Analysis and Machine Learning Method .doi:10.3390/a12110241.

Noh, N. S. M., Jaafar, H., Mustafa, W. A., Idrus, S. Z. S., & Mazelan, A. H. (2020). Smart Home with Biometric System Recognition. Journal of Physics: Conference Series, 1529 042020. doi:10.1088/1742-6596/1529/4/042020

Phillips, T., Zou, X., Li, F., & Li, N. (2019). Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning. Paper presented at the the 24th ACM Symposium,SACMAT ’19, June 3–6, 2019, 141-146, Toronto, ON, Canada. https://doi.org/10.1145/3322431.3325417

Seffers, G. I. (2020). FBI Upgrades Biometric Technologies. Signal. doi:https://www.afcea.org/content/fbi-upgrades-biometric-technologies

Seven Bank, L. (2019). Introducing a Next-generation ATM with face recognition and QR code reader. https://www.sevenbank.co.jp/english/ir/pdf/2019/20190912_E1.pdf

Shepard, S. (2016). Dallas Area Rapid Transit to Increase Security with Cameras. Security Today. doi:https://securitytoday.com/articles/2016/02/19/dallas-area-rapid-transit-to-increase-security-with-cameras.aspx?admgarea=ht.networkcentric&m=1

Smith-Creasey, M., Albalooshib, F. A., & Rajarajana, M. (2018). Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocessors and Microsystems, 63, 147-157. https://doi.org/10.1016/j.micpro.2018.07.008

Tarare, S., Anjikar, A., & Turkar, H. (2015). Fingerprint Based Gender Classification Using DWT Transform. 2015 International Conference on Computing and Communication Control and Automation. February 26 - 27, 2015. Pune, India. doi: 10.1109/ICCUBEA.2015.141

Tobji, R., Di, W., & Ayoub, N. (2019). FMnet: Iris Segmentation and Recognition by Using Fully and Multi-Scale CNN for Biometric Security. Applied Sciences, 9(2042), 1-17. https://mdpi-res.com/d_attachment/applsci/applsci-09-02042/article_deploy/applsci-09-02042.pdf?version=1558088546

Yang, X-S .(2019). Introduction to Algorithms for Data Mining and Machine Learning. Academic Press. United Kingdom

Zulfiqar, M., Syed, F., Khan, M. J., & Khurshid, K. (2019). Deep Face Recognition for Biometric Authentication. Proceeding of the 1st International Conference on Electrical, Communication and Computer Engineering (ICECCE), 24-25 July 2019, Swat, Pakistan. doi: 10.1109/ICECCE47252.2019.8940725