Forthcoming and Online First Articles

International Journal of Biometrics

International Journal of Biometrics (IJBM)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Biometrics (35 papers in press)

Regular Issues

  • Recognition method of basketball players' throwing action based on image segmentation   Order a copy of this article
    by Cong Zhang, Miao Wang, Limin Zhou 
    Abstract: In order to solve the problems of low recognition accuracy and long recognition time in traditional basketball players' throwing action recognition methods, this paper proposes a new basketball players' throwing action recognition method based on image segmentation. The covariance matrix of noise data of basketball players' throwing action is constructed. The throwing action of basketball players is expressed by acceleration and angular velocity, and the acceleration vector of throwing action is obtained. The feature extraction of throwing action is completed by discrete Fourier transform algorithm. The image of basketball players' throwing action is segmented by threshold and edge, and the change features of throwing action are obtained by kernel function to complete the recognition of basketball players' throwing action. The experimental results show that the accuracy of the proposed method is about 98%, and the time cost is about 2.1s.
    Keywords: Image Segmentation; Throw Action Recognition; Kalman Filter; Covariance Matrix; Multidimensional Vector.

  • Deep Architecture Based Face Spoofing Identification in Real-Time Application   Order a copy of this article
    by Mayank Kumar Rusia, Dushyant Kumar Singh 
    Abstract: Face biometric-based recognition is always a demanding and universally accepted method, especially for access control purposes. However, face recognition systems are usually affected by identity threats, such as face spoofing. Face spoofing is an attempt to acquire the face identity privilege of another person illegally. Developing an efficient and real-time spoofing detection system that quickly detects any illegal access attempts to prevent vulnerability violations is indispensable. This manuscript proposes an automated and efficient technique for face spoofing detection based on a customized convolutional neural network named SpoofNET. The proposed model can easily distinguish genuine and spoof faces with less complex convolutional blocks. This novel method can be deployed in any application that desires low computation and low-resolution input samples. This manuscript also introduces the dataset synthesized in our lab, validated with the existing NUAA dataset. The proposed model achieved 99.3% validation accuracy with better generalization potentiality for the synthesized dataset.
    Keywords: Face Liveness Detection; Face Spoofing Attack; Convolutional Neural Network; Computer Vision; Biometrics; Image Processing.
    DOI: 10.1504/IJBM.2023.10046006
     
  • Cumulative Foot Pressure Image Recognition via Gabor Filters and Sparse Representation Classifier   Order a copy of this article
    by Pedram Ahmad Khan Beigi, Aboozar Ghaffari 
    Abstract: Analysis of cumulative foot pressure images (CFPIs) can be utilized like other biometrics for personal recognition. This biometrics, along with other biometrics such as gait, can be helpful in identification. Also, this overcomes some drawbacks of common biometrics (such as face and gait) in data recording and taking peoples foot data without knowing them. In the process of capturing cumulative foot pressure image, the spatial and temporal changes of ground reaction force during one gait cycle are recorded. In this biometric, there are some challenges such as walking in different speed. In this paper, we present a new approach based on Gabor filters as a feature vector and sparse representation classification (SRC). To reduce the feature dimension, Eigenfoot and linear discriminative analysis (LDA) are also used. To obtain translation and rotation invariant representation, a normalization preprocess is applied. We evaluate the proposed approach via dataset D of the Chinese Academy of Science (CASIA) Gait-Footprint dataset containing the cumulative foot pressure images of 88 persons. The experimental results indicate that the proposed method has higher accuracy than other tested methods, and also is robust to changes in walking speed.
    Keywords: Cumulative foot pressure; Gabor filters; sparse representation classifier; eigenfoot; LDA.

  • Human Footprint Biometrics for Personal Identification using Artificial Neural Networks   Order a copy of this article
    by Kapil Nagwanshi, Amit Kumar Gupta, Tilottama Goswami, Sunil Pathak, Maleika Heenaye Mamode Khan 
    Abstract: The philosophy of this study focuses on human footprint identification applicable for high-security applications such as the safety of public places, crime scene investigation, impostor identification, biotech labs and blue-chip labs, identification of infants in hospitals. The paper proposes one of the low-cost hardware to scan the biometric human footprints that utilise image pre-processing and enhancement capabilities for obtaining the features. The algorithm enhances the footprint matching performance by selecting the three sets of local invariant feature detectors histogram of gradients, maximally stable external regions, speed up robust features; local binary pattern as texture descriptor, corner point detector, and PCA. Copyright 20XX Inderscience Enterprises Ltd. 2 K.K. Nagwanshi et al. Furthermore, descriptive statistics are generated from all the above mentioned footprint features and concatenated to create the final feature vector. The proposed footprint biometric identification will correctly identify or classify the person by training the system with patterns of the interested subjects using an artificial neural network model specially designed for this task. The proposed method gives the classification accuracy at a very encouraging level of 99.55%.
    Keywords: artificial neural networks; ANNs; biometric; classification; footprint; segmentation.
    DOI: 10.1504/IJBM.2023.10043092
     
  • MR Image Enhancement and Brain Tumor Detection using Soft Computing and BWT with Auto-Enhance Technique   Order a copy of this article
    by Nilesh Bahadure, Nagrajan Raju, Prasenjeet Patil 
    Abstract: In this research work new algorithm using soft-computing is presented for medical image enhancement with auto-enhance technique. Image enhancement is one of the most important classes of image analysis in image processing. This paper presents the complete review of the different performance parameters of popular image enhancement techniques and proposes a new methodology for improvising visualisation with preserving high-intensity value. The images with the colour intensity value cannot be processed directly by most of the enhancement techniques, hence a suitable colour model is chosen for processing and the proposed algorithm for the same are implemented. Accurate analysis of information from the region of interest area from the images is always a central issue in the image analysis, so with the help of this improved algorithm based on the soft computing technique, it is possible to enhance the images with best in the class, clarity and visualisation. Simulation and experimental result on the different test images proves that the proposed algorithm gives better result as compared to other state of the art image enhancement techniques.
    Keywords: Berkeley wavelet transformation; BWT; fuzzy clustering means; FCMs; magnetic resonance imaging; MRI.
    DOI: 10.1504/IJBM.2023.10043342
     
  • Investigation of COVID-19 Symptoms Using Deep Learning Based Image Enhancement Scheme for X-Ray Medical Images   Order a copy of this article
    by V. Pandimurugan, A.V. Prabu, S. Rajasoundaran, SIDHESWAR ROUTRAY, Nilesh Bahadure, D. Ratna Kishore 
    Abstract: Image enhancement is the inevitable technique for investigating various biological features. The biological image data can be obtained from computer tomography (CT), magnetic resonance imaging (MRI), and X-ray imaging. X-ray imaging is useful for getting the information from lungs and respiratory system. COVID-19 is a life-threatening contiguous disease for the past two years in the world. Patient’s chest images playing an important role in the diagnosis of early detection of disease intensity. We propose a generative adversarial network (GAN) method that identifies COVID-19 from medical images and improves diagnostic sensitivity. Here we used virtual colouring methods and a platform for training the images by using a deep parental training method. Similarly, it gives optimal classification results with the help of well-defined image enhancement techniques and image extraction approaches. In our method, the accuracy level lies between 87.8% and 89.6% correspondingly for the dataset and synthetic dataset.
    Keywords: COVID-19; image classification; medical image enhancement generative adversarial network; deep learning.
    DOI: 10.1504/IJBM.2023.10044238
     
  • Pulmonary Lung Nodule Detection and classification through Image Enhancement and Deep Learning   Order a copy of this article
    by Nuthanakanti Bhaskar, Ganashree T. S, Raj Kumar Patra 
    Abstract: In the medical image capturing process, the noise will be added in images and to analyse these images proper enhancement and pre-process is required. Most of the researchers considered the same on CT lung images by using ROI selection, morphological operations, histogram equalisation, and binary thresholding methods and they achieved around 95% of accuracy. To get better accuracy in pre-processing stage of this present work resampling, morphological closure, image denoising techniques have been applied. In the image segmentation stage: For labelled nodule regions, the LIDC dataset is used, and for cancer/non-cancer labels, the KDSB17 dataset is used. In the segmentation stage: the U-net model has been applied. To minimise false positives of detected nodules CNN is applied which converges to an 84.4% validation accuracy. The AUC of the CNN model was 0.6231, with a validation loss of 0.5646 and accuracy of 96%.
    Keywords: image enhancement; deep learning; lung cancer; U-net; CNN.
    DOI: 10.1504/IJBM.2023.10044525
     
  • Vehicle Recognition Using Convolution Neural Network (CNN)   Order a copy of this article
    by Maleika Heenaye Mamode Khan, Abubakar Chonnoo, Oumeir Rengonny 
    Abstract: A significant challenge in the development of automatic vehicle make and model recognition (VMMR) is the distinguishing features between the different shapes based on the appearance of objects. The automatic recognition of vehicles based on their geometric shapes is in high demand. The diversity of make and models of vehicles further complicates this process. There are few applications that can recognise vehicles based on their geometric shape. To bridge this gap, convolution neural network (CNN) was adopted to predict the make and model of a car from either the rear view or front view of the vehicle using the pre-trained MobileNet. First, YOLOV3 has been used to detect the vehicle. The colour and the license plate of the vehicles are also extracted. An accuracy of 94.1% in the recognition of make of cars, 98.7% for the model, 99.1% for car plate registration number, and 90.3% for the colour was achieved.
    Keywords: convolution neural network; CNN; deep learning; segmentation; vehicle make and model recognition; VMMR.
    DOI: 10.1504/IJBM.2023.10044757
     
  • A Hybrid Approach for Face Recognition using LBP and Multi Level Classifier   Order a copy of this article
    by Mukesh Gupta, Pankaj Dadheech, ANKIT KUMAR, Ashok Kumar Saini, Neha Janu, Sanwta Ram Dogiwal 
    Abstract: General face recognition, a task performed by humans in daily activities, is derived from a virtually uncontrolled environment. This paper presents a facial recognition system based on random forest and support vector machine. When compared to previous methods, this approach achieves high accuracy. In this paper, we proposed a hybrid method using SVM and random forest classification. The RF+SVM method predicts rapid growth in popularity. This combined method aids in high recognition speed with a wide range of faces and emotions. We also compared the algorithm to previous techniques. Each experiment made use of a free internet database. In the experiment, 400 photographs of 40 people are used. The reason for the improved results in this paper’s hybrid vehicle classification methodology is that it combines the advantages of both traditional SVM and RF class methods. The proposed system has an accuracy of 98.6%.
    Keywords: biometrics; database; face recognition; SVM classifier; random forest.
    DOI: 10.1504/IJBM.2023.10045053
     
  • Collaborative Representation With Hole Filling Techniques For Kinect RGBD Face Recognition   Order a copy of this article
    by Aniketh Gaonkar, Narayan Vetrekar, Rajendra Gad 
    Abstract: We present in this paper, three different filtering techniques based on kernel function to fill missing information in depth map images obtained from low resolution sensor such as Kinect to improve performance accuracy of RGB-D face recognition system. We propose in this study, RGB-D face recognition scheme that combines depth map and colour image using wavelet average fusion followed by collaborative representation classifier (CRC) for comparison of reference and probe images. We present the evaluation results based on our GU-RGBD face database and IIIT-D face database to present the significance of our three different filters employed in hole filling. Further, our investigation presents an extensive experimental analysis using eight different feature extraction techniques independently across three different filters to demonstrate the potential of our proposed approach. The proposed approach of hole filling, improves the performance accuracy of RGB-D face recognition as compared to without employing filtering operations.
    Keywords: face biometric; depth map; wavelet average fusion; feature extraction; collaborative representation classifier; CRC.
    DOI: 10.1504/IJBM.2023.10045487
     
  • Local Triangular Patterns: Novel Handcrafted Feature Descriptors for Facial Expression Recognition   Order a copy of this article
    by Mukku Nisanth Kartheek, Munaga V. N. K. Prasad, Raju Bhukya 
    Abstract: Facial expressions are common across cultures and are used universally by humans to express their internal emotions, intentions and thoughts. The main task in facial expression recognition (FER) systems is to develop efficient feature descriptors that could effectively classify the facial expressions into various categories. In this work, towards extracting significant features, local triangular patterns (LTrP) named mini triangular pattern (mTP) and mega triangular pattern (MTP) have been proposed in order to minimise the feature vector length and to maximise the recognition accuracy. The proposed mTP method extracts two features in a 3 x 3 circular neighbourhood, whereas, MTP method extracts two features in a 5 x 5 circular neighbourhood. The proposed methods (mTP and MTP) are implemented on three benchmark FER datasets namely TFEID, MUG and KDEF. The experiments have been performed with respect to both six and seven expressions in person independent setup to simulate a real-world scenario. The experimental results demonstrated the efficiency of the proposed methods when compared to the standard existing methods.
    Keywords: binary pattern; facial expressions; feature descriptor; handcrafted features; triangular patterns.
    DOI: 10.1504/IJBM.2023.10045488
     
  • Performance Optimization of Face Recognition based on LBP with SVM and Random Forest classifier   Order a copy of this article
    by Ashutosh Kumar, Gajanand Sharma, Rajneesh Pareek, Satyajeet Sharma, Pankaj Dadheech, Mukesh Kumar Gupta 
    Abstract: Face recognition requirements are well described, as many industrial applications rely on them to achieve one or more goals. The local binary pattern is used for feature extraction, and the support vector machine (SVM) classifier is used for classification. To recognise faces or objects, we first offer the system with a testing database for training purposes. After that, we send an object image to the system, and the system extracts only relevant information or a portion of the face and processes it using LBP and SVM. When the illumination of the object image varies, the accuracy of facial recognition drops, and when just one training sample is provided, it does not provide the best matching results. In this paper, we describe a model that works by extracting local binary patterns from distinct sample photos, training the SVM classifier for the same, and then categorising input probe images using binary and multiclass SVM. In this case, the accuracy for an 80% training and 20% testing ratio is 97.5%.
    Keywords: face recognition; PCA; LBP; support vector machine; SVM; random forest.
    DOI: 10.1504/IJBM.2023.10046520
     
  • Face Recognition under Large Age Gap using Age Face Generation   Order a copy of this article
    by Rajesh Tripathi, Anand S. Jalal 
    Abstract: Age invariant face recognition (AIFR) is a challenging problem in the area of the face recognition. To handle large age gap for face recognition, we proposed a robust approach based on deep learning for face recognition under a large age gap. The presented approach consists of four important steps. The pre-processing is done for face detection. Age face generation is processed with the help of modified age conditional generative adversarial network (acGAN). Generated age face images are mixed with train dataset and augmentation is applied to increase the size of training data for handling biasness of the deep learning models towards dataset size. A modified residual convolutional neural network is applied for training and testing of face images. The performance has been evaluated using two-fold cross-validation on standard and challenging LAG dataset. The proposed approach achieved the 92.5% recognition accuracy which better than existing face recognition approaches for a large age gap.
    Keywords: age invariant; deep learning; generative adversarial network; large age gap; convolutional neural network.
    DOI: 10.1504/IJBM.2023.10046521
     
  • Sensor-enabled Biometric Signature based authentication method for smartphone users   Order a copy of this article
    by Sumaiya Ahmad, Sarthak Mishra, Farhana Javed Zareen, Suraiya Jabin 
    Abstract: With the ubiquity of smartphones, the need for foolproof authentication mechanisms that support authentication on the go and remote authentication is on the rise. Signature being the most sophisticated authentication method, this paper explores idea of designing signature based robust authentication method combined with smartphone sensor based features. We used our already created sensor enabled biometric signature database iSignDB which has recorded images of signatures along with associated smartphone sensor readings while signing on the touchscreen of the smartphone. Additionally, we considered six statistical features with the objective of designing a highly accurate authentication model. We successfully trained our authentication model over iSignDB using bidirectional LSTM method and obtained FAR 2%, FRR 12%, and EER 2% against skilled; and FAR 5%, FRR 12%, EER 6% against random forgery attacks respectively, which is comparable to the existing state-of-the-art models for smartphone signature biometrics. The main contribution of this work is extensive feature vector, and robust signature-based authentication method.
    Keywords: authentication; biometrics; smartphone sensors; online biometric signatures; recurrent neural network; RNN; bidirectional LSTM; BiLSTM; iSignDB.
    DOI: 10.1504/IJBM.2023.10046710
     
  • AUTOGENIC, PROGNOSTIC, AND COLLECTIVE SIGNATURE AFFIRMATION FRAMEWORK BASED ON DIVERSE SET OF FEATURES   Order a copy of this article
    by Sameera Khan, Megha Mishra, Vishnu Kumar Mishra 
    Abstract: Use of forged signatures for fraudulent practices has become extremely common in recent days. Therefore, a significant role is performed by the automatic signature verification (SV) process. Such verifiers need large number of specimens of a person’s signature to establish the intrapersonal variability adequately. It is important to deal with the problem of data unavailability for training. A method to train with a single reference signature is proposed here to minimise the aforementioned limitation. This methodology is analysed by utilising a novel Gaussian gated recurrent unit neural network (2GRUNN) classifier. The single signature image is retrieved from database. Then, by using sinusoidal transformation, the signature duplication is performed. Next, pre-processing, feature extraction (FE), and feature selection (FS) are conducted. By employing linear chaotic shell game optimisation (LCSGO), the FS is executed. Extracted feature is fed to the proposed 2GRUNN for classification. Lastly, the results are compared with the existing methodologies.
    Keywords: offline signature verification; signature duplication; sinusoidal transformation; shell game optimisation; SGO; synthetic signature; synthetic signature database.
    DOI: 10.1504/IJBM.2023.10047175
     
  • Identification based on feature fusion of multimodal biometrics and deep learning   Order a copy of this article
    by Chahreddine Medjahed, Freha Mezzoudj, Abdelatif Rahmoun, Christophe Charrier 
    Abstract: This paper proposes a novel methodology for individuals identification based on convolutional neural network (CNN) and machine learning (ML) algorithms. The technique is based on fusioning biometric modalities at the feature level. For this purpose, several hybrid multimodal-biometric systems are used as a benchmark to measure accuracy of identification. In these systems, a CNN is used for each modality to extract modality-specific features for pattern of datasets. Machine learning algorithms are used to identify (classify) individuals. In this paper, we emphasise on performing fusion of biometric modalities at the feature level. We propose to apply the proposed algorithms on two challenging databases: FEI face database and IITD Palm Print V1 dataset. The results are showing good accuracies with many proposed multimodal biometric person identification systems. Through experimental runs on several multi-modal systems, it is clearly shown that best identification performance is obtained when using ResNet18 as deep learning tools for feature extraction along with linear discrimination machine learning algorithm.
    Keywords: biometrics; multi-biometric system; feature level fusion; score level fusion; deep learning; machine learning.
    DOI: 10.1504/IJBM.2022.10047593
     
  • Deep Learning Based Lightweight Approach to Thermal Super Resolution   Order a copy of this article
    by Shashwat Pandey, Darshika Sharma, Basant Kumar, Himanshu Singh 
    Abstract: In this paper, we propose a thermal image super-resolution (SR) technique using a lightweight deep learning model which we refer to as thermal lightweight network (TherLiNet). We refine interpolated images using convolutional layers interleaved with different activation functions along with residual learning in the network. The effectiveness of the proposed architecture is evaluated against widely used deep learning-based super resolution models namely, super-resolution convolutional neural network (SRCNN), thermal enhancement network (TEN) and very deep super resolution (VDSR). Training and testing is done with different thermal datasets using different scale factors. To further explore the possibilities, red green blue (RGB) guided training is also performed and evaluated on thermal image datasets. Peak signal to noise ratio (PSNR) and structural similarity index (SSIM), the most widely accepted parameters have been used for evaluation of the proposed model. The model is also compared to other models based on computation time to generate results. We also demonstrate the results in terms of qualitative values of the model compared to other super-resolution (SR) techniques.
    Keywords: thermal images; super resolution; deep learning; RGB guidance; thermal lightweight network; TherLiNet; thermal super resolution.
    DOI: 10.1504/IJBM.2023.10048267
     
  • Optimized Denoising Sparse Autoencoder for the Detection of Outliers for Face Recognition   Order a copy of this article
    by X. Ascar Davix, D. Judson, R. Jeba 
    Abstract: Face recognition is a challenging research in the area of biometric applications due to the variations of input data such as not well centred faces, different pose, occlusions and poor resolution images. Detection and removal of outliers from the input data is essential to improve the performance of the face recognition algorithm. In this deep learning era, deep networks performed well in image classification. Deep networks extract features automatically from the data and updates the weights to reduce loss function. In this paper, we have presented optimised denoising sparse autoencoder (ODSAE) system to detect and remove the outliers in the input dataset. The autoencoder technique performs well in nonlinear transformations. It deals with convolutional layers for learning and provides meaningful information from the input. Softmax classifier is used for the classification of images. The experiment is carried out on Yale and AR face datasets and the results revealed better accuracy in removing outliers.
    Keywords: outlier; face recognition; denoising sparse autoencoder; biometric; deep learning.
    DOI: 10.1504/IJBM.2023.10048650
     
  • A Comprehensive Study of Machine Learning Approaches for Keystroke Dynamics Authentication   Order a copy of this article
    by Tanya Teotia, Mridula Sharma, Haytham Elmiligi 
    Abstract: The most popular behavioural biometrics that is currently being considered as a second factor of authentication is keystroke dynamics. However, the adoption of this authentication technology faces several challenges, such as lack of a standard benchmark and evaluation methodology that could be used to compare the accuracy and performance of different frameworks. In this paper, we provide a comprehensive design space exploration of various machine learning frameworks to authenticate users based on keystroke dynamics. The paper also studies the machine learning design flow, discusses details of every single step in the process, and provides comparative analysis of possible options available for developers. The paper presents a comparative analysis of various machine learning frameworks supported by experimental analysis. Our experimental work analyses the efficiency of various machine algorithms, compares the impact of filter-based and wrapper-based feature selection techniques, and compares the accuracy of machine learning classifiers by using different feature sets.
    Keywords: machine learning; keystroke dynamics; classification; feature extraction; feature selection.
    DOI: 10.1504/IJBM.2023.10048651
     
  • An empirical analysis of deep ensemble approach on COVID-19 and tuberculosis X-ray images   Order a copy of this article
    by Aakanksha Sharaff, Madhur Singhal, Arham Chouradiya, Pavan Gupta 
    Abstract: COVID-19, a pandemic and a highly contagious disease can severely damage the respiratory organs. Tuberculosis is also one of the leading respiratory diseases that affect public health. While COVID-19 has pushed the world into chaos and tuberculosis is still a persistent problem in many countries. A chest X-ray can provide plethora of information regarding the type of disease and the extent of damage to the lungs. Since X-rays are widely accessible and can be used in the diagnosis of COVID-19 or tuberculosis, this study aims to leverage those property to classify them in the category of COVID-19 infected lungs, tuberculosis infected lungs or normal lungs. In this paper, an ensemble deep learning model consisting of pre-trained models for feature extraction is used along with machine learning classifiers to classify the X-ray images. Various ensemble models were implemented and highest achieved accuracy among them was observed as 93%.
    Keywords: ensemble learning; COVID-19; tuberculosis; machine learning; MobileNet; Xception; ResNet50.
    DOI: 10.1504/IJBM.2023.10048929
     
  • Surface curvature based Completed Local Ternary Pattern for Texture Image Classification   Order a copy of this article
    by Xi Chen, Yunfei Zhang, Zaihong Zhou 
    Abstract: The curvature of two-dimensional function can describe the degree of surface curvature. When an image is treated as a discrete two-dimensional function, image curvature describes the structural relationship between local pixels of the image. Local ternary pattern is an effective image texture descriptor to encode shape index based on image curvature. In this paper, the completed local ternary pattern, which contains the symbol characteristics, amplitude characteristics and central pixel characteristics of the local ternary pattern of shape index (completed local ternary pattern based on shape index, SI-CLTP) are all considered at the same time. Experiments on two texture databases and one palmprint database fully show that shape index based completed local ternary pattern is an effective image texture descriptor.
    Keywords: image curvature; shape index; completed local ternary pattern; texture feature extraction.
    DOI: 10.1504/IJBM.2023.10049728
     
  • M-ary Modulation based Medical Image Watermarking for accessing Quality of Service of Communication Channel   Order a copy of this article
    by Ritu Aggarwal, Manisha Sharma 
    Abstract: In an e-health environment, medical image protection is of prime importance as patient data is interleaved with medical images and broadcasted over the public internet. This paper presents a new electronic patient record (EPR) watermarking scheme for medical images in the mid-band discrete cosine transform using M-ary modulation. Robustness of EPR is enhanced by using a convolution encoder before embedding into the medical cover image. The imperceptibility and robust performance of the proposed watermarking scheme is tested on standard brain imaging modality using measures such as peak signal to noise ratio (PSNR), structural similarity index measure (SSIM), normalised cross-correlation (NCC) and bit error rate (BER) parameters. The proposed method achieves high PSNR and SSIM values, respectively at different watermark embedding factors for different modalities, which indicates better visual quality. The NCC and BER values of the scheme are high, indicating that the watermarking technique is appropriate for the protection of patient information and secure medical record dispersal over the public network. Furthermore, quality of service (QoS) of the communication channel is evaluated in terms of the embedded EPR, thus any separate mechanism is not required to evaluate the QoS of the communication channel.
    Keywords: medical image watermarking; MIW; EPR data hiding; region of non-interest; RONI; error control coding; ECC; M-ary modulation.
    DOI: 10.1504/IJBM.2023.10049800
     
  • A Robust watermarking technique for biometric image authentication   Order a copy of this article
    by Mohamed Radouane, Nadia Idrissi Zouggari 
    Abstract: Biometric authentication data is becoming a crucial challenge to ensure copyright protection of digital images. A person’s biometric data is very sensitive; if exposed, it can pose a threat to a person’s identity and system security. Due to advances in watermarking, the most research is aimed at improving robustness to prevent attacks of biometric image. In this paper, we have proposed an invisible watermarking scheme for biometric image authentication using Gabor filter, contourlet transform, discrete wavelet transform (DWT) and singular value decomposition (SVD). Features are extracted from biometric image and an iris watermark is embedded. The proposed method was tested on CASIA-v5 and CASIA-Palmprint-v1 datasets. The evaluation performance is done by different measuring metrics. The proposed approach is compared with different methods in the literature. It is found that the watermarked images are robust over different attacks. Results show that the proposed method provides protection to biometric images and gives better results in terms of PSNR and NC.
    Keywords: copyright protection; authentication; Gabor filter; Contourlet transform; watermarking; discrete wavelet transform; DWT; singular value decomposition; SVD.
    DOI: 10.1504/IJBM.2023.10049905
     
  • A liveness detection system for sclera biometric applications   Order a copy of this article
    by Sumanta Das, Ishita De Ghosh, Abir Chattopadhyay 
    Abstract: Liveness detection is an essential security measure in biometric systems to determine whether the source of a biometric sample is a live person or a fake representation Sclera recognition has evolved as a promising biometric modality in recent years But liveness detection for sclera biometric applications has limited exploration till date We propose a two-phase liveness detection system to identify presentation attacks on mobile handset based sclera biometric applications A gaze detection model LivGaze is proposed in the first phase to verify whether the actual gaze direction matches with the requested gaze direction A mismatch indicates an incorrect user response, and hence a probable spoofing attack A deep model LivDense is proposed in the next phase to classify real and fake images The combined system LivSclera is efficient and cost-effective We have achieved an average-case AUC of 0 987, Accuracy of 0 99, and in the best-case 100% correct classifications.
    Keywords: Liveness detection; Presentation attack; Sclera biometric; LivGaze; LivDense; LivSclera; MASDUM; SBVPI.
    DOI: 10.1504/IJBM.2023.10050762
     
  • Use of Synthetic Signature Images for Biometric Authentication and Forensic Investigation   Order a copy of this article
    by Sameera Khan, Megha Mishra, Vishnu Kumar Mishra 
    Abstract: Handwritten signatures are one of the widely used biometric traits for authentication, and are constantly questioned as a forgery for this behavioural biometric is very common. Also due to privacy concerns, biometric databases are not easily available for training purposes. Due to this efficiency of automatic authentication systems is highly compromised. The use of biometric data in forensic investigation also suffers from the problem of inadequate data. One of the solutions to this problem is the use of synthetic datasets in place of real datasets. Such datasets suffer from a high risk of generating unrealistic specimens. Generating high-quality synthetic biometric images is still a challenge. This paper discusses some of the basic requirements for synthetic signature generation and also proposes an algorithm to generate synthetic images for handwritten signatures using sinusoidal transformation.
    Keywords: synthetic signature; synthetic biometric; synthetic databases; forensic investigation.
    DOI: 10.1504/IJBM.2023.10050915
     
  • PPG and Fingerprint : Robust Bimodal Biometric System   Order a copy of this article
    by Akhil Walia, Amit Kaul 
    Abstract: Technological advancements in the field of biometrics have resulted in development of completely automatic methods for human recognition leading to better and secure lifestyle. However, even though the biometric traits like fingerprint exhibit high degree of permanence, still certain security issues exist The main objective of this work is to tackle spoofing attacks by introducing some liveness property in the biometric system PPG signal possesses various properties such as inherent liveness, ease of acquisition and low development cost. A robust biometric system, immune to direct attacks, using a combination of PPG and fingerprint has been suggested in this work Score level fusion has been employed for integration of two modalities in parallel mode by optimizing the scores of individual traits using interior point algorithm. This bimodal biometric with PPG and fingerprint as two modalities seems quite practical. A CRR of 100% has been achieved in experiments conducted on 38 subjects.
    Keywords: Fingerprint; Photoplethysmogram (PPG); Score level fusion; Optimization.
    DOI: 10.1504/IJBM.2023.10051187
     
  • Iris Recognition System Using Deep Learning Techniques   Order a copy of this article
    by Amer Sallam, Hadeel Al Amery, Ahmed Y. A. Saeed 
    Abstract: Deep learning has been used and demonstrated intensively as a vital technique in data mining that can accurately and effectively evaluate enormous amounts of data for various applications. Iris recognition is one of those applications that necessitate complex algorithms for analysing and perfectly detecting the hidden patterns among its data in order to effectively distinguish one person from another. In this paper, an iris recognition system based on various deep learning techniques has been proposed. Through many experiments that were conducted on CASIA-V1 and ATVS datasets. The proposed system based on the Xception model was able to achieve significant results with 99.9% accuracy on CASIA-V1 dataset.
    Keywords: biometrics; deep learning; transfer learning; segmentation.
    DOI: 10.1504/IJBM.2023.10051537
     
  • Application of Revised Firefly algorithm and Gray wolf optimisation on Keystroke Dynamics   Order a copy of this article
    by Purvashi Baynath, Maleika Heenaye Mamode Khan 
    Abstract: In this digitalised world, to countermeasure computational threats, keystroke dynamics (KD) is one potential biometric feature that is used to enforce security over a network. Feature subset selection (FSS) process further aid for the increase of security by selecting the appropriate features which make the replication of pattern difficult. For this purpose, two commonly known algorithms namely: firefly algorithm (FA) and grey wolf algorithm (GWA) are being enhanced by incorporating chaos and pheromone in the network architecture. The experimental results have shown the robustness of the revised algorithms of firefly and grey wolf where optimum values for false acceptance rate (FAR) are being achieved. Besides, this study has shown that the revised FA fits better as a FSS technique by outperforming previous proposed solutions in terms of recognition rate (RR), where above 95% has been achieved, which shall aid in the reduction of attacks.
    Keywords: biometric; feature subset selection; FSS; firefly algorithm; FA; grey wolf optimisation; GWO; keystroke dynamics; KD.
    DOI: 10.1504/IJBM.2023.10051967
     
  • Deep Learning with Spectrogram Image of Eye Movement for Biometrics   Order a copy of this article
    by Antônio Ricardo A. Brasil, Patrick M. Ciarelli, Izabella Rodrigues, Jefferson O. Andrade, Karin S. Komati 
    Abstract: Biometric studies are being used worldwide for a large variety of purposes, here we used eye movements (EM) from observers of natural images. Since some EM are involuntary, these prevent spoofing attacks. While prior research requires feature extraction manually from EM data to identify a person, we use a deep convolutional architecture that processes it as an image. The eye movements were treated as a signal, then transformed as a spectrogram of frequencies, and its image is the input for a convolutional architecture. We investigated two types of signals: Cartesian coordinates, and gaze angle over time. The proposal consists of a convolutional network architecture applied to the DOVES dataset, where stimuli are natural images. We obtained the accuracy for the eye angle spectrogram, on DOVES, about 73%, and for the eye coordinates spectrogram, 65%. These results indicated that EM can be treated as spectrogram images for biometric identification.
    Keywords: DOVES dataset; eye angle; natural image stimuli.
    DOI: 10.1504/IJBM.2023.10052380
     
  • Machine learning-based iris liveness identification using fragmental energy of cosine transformed iris images   Order a copy of this article
    by Smita Khade, Sudeep D. Thepade, Swati Ahirrao 
    Abstract: Iris biometric identification provides a contactless authentication preventing the spread of COVID-19 like diseases. These systems are made vulnerable and unsafe because of the spoofing attacks attempted with the help of contact lenses, video replays and print attacks. The paper proposes the iris liveness detection method to mitigate spoofing attacks, taking fragmental coefficients of cosine transformed iris image to be used as features. Seven variants of feature formation are considered in experimental validations of the proposed method, and the features are used to train eight assorted machine learning classifiers and ensembles for iris liveness identification. Recall, F-measure, precision and accuracy are used to evaluate performances of the projected iris liveness identification variants. The experimentation carried out on four standard datasets have shown better iris liveness identification by the fragmental coefficients of cosine transformed iris image with size 4 * 4 using random forest algorithm having 99.18% accuracy immediately followed by an ensemble of classifiers.
    Keywords: iris images; liveness identification; discrete cosine transform; machine learning; classification; biometric; feature formation.
    DOI: 10.1504/IJBM.2022.10042155
     
  • Revocable iris templates using partial sort and randomised look-up table mapping   Order a copy of this article
    by Mulagala Sandhya, Dilip Kumar Vallabhadas, Shubham Rathod 
    Abstract: In the ongoing years, biometric systems end up helpless against the spillage of template information. If a biometric template is stolen, it is lost permanently and cannot be restored or reissued. Here, we use iris biometric because of its high accuracy. In this paper, we develop a new cancellable biometric scheme using the indexing-first-one (IFO) hashing coupled with a technique called partial sort. The IFO hashing uses new mechanisms called the P-order Hadamard product and modulo threshold function paired with the partial sort technique which has considerably strengthened it further. We used the very sophisticated CASIA-v3 database which provides us with a wide range of iris templates for our experiments. As compared to the previous cancellable schemes, the analysis of the results of these experiments provides us with good accuracy and strong resistance to various privacy and security attacks.
    Keywords: iris; cancellable template; min-hashing; Jaccard similarity; security; privacy; partial sort; look-up table.
    DOI: 10.1504/IJBM.2023.10051691
     
  • Improving face recognition using deep autoencoders and feature fusion   Order a copy of this article
    by Ali Khider, Rafik Djemili, Ahmed Bouridane, Richard Jiang 
    Abstract: Uncontrolled environments are the main challenges of real face recognition systems, recent success of deep learning and features fusion has led to various performance improvements. This paper proposes a novel scheme called feature autoencoder (FAE), where an autoencoder model is not trained directly from the raw facial images, rather it uses a fusion of features constructed by Gabor filter, local binary pattern and local phase quantisation. For each feature, a linear discriminant analysis is applied to reduce its high dimensionality and a limited adaptive histogram equalisation process is employed for contrast enhancement. The proposed scheme has been evaluated using known datasets such as AR, ORL and YALE, and the experimental results carried out on these databases have been compared using three classifiers: k-nearest neighbour, multiclass support vector machine and softmax classifier, demonstrating the effectiveness of proposed approach and parameters. The experimental results obtained and compared with recent and similar approaches on six databases: ORL, YALE, AR, extended YALE B, CMU PIE, and LFWcrop, suggest that the proposed technique outperforms similar techniques. The recognition rates got from them are 100%, 100%, 99.66%, 99.40%, 97.31%, and 90.68% respectively.
    Keywords: uncontrolled environments; face recognition; deep learning; sparse; autoencoder; feature extraction; fusion.
    DOI: 10.1504/IJBM.2022.10043147
     
  • Robust perceptual fingerprint image hashing: a comparative study   Order a copy of this article
    by Wafa Birouk, Atidel Lahoulou, Ali Melit, Ahmed Bouridane 
    Abstract: This paper presents a robust perceptual hashing scheme for biometric template protection where the input fingerprint image is mapped into a sequence of Boolean values. Our aim is to develop a method that relies on the use of four functions namely SIFT, Harris, DWT and SVD. After extracting the minutiae, the scale-invariant feature transform (SIFT) is applied in order to extract the robust features against geometric attacks. The resulting vector is then filtered using Harris criterion to maintain only the stable key-points. Next, the fingerprint template is produced by image binarisation and decomposed into blocks. The hash code is finally obtained by concatenating the singular values computed on the approximation coefficients of each image block. Similarity between hash codes is evaluated by the normalised Hamming distance (HD). Comparative analysis to three similar methods indicates that the proposed hashing scheme shows better performances in terms of discriminative capability as well as robustness against acceptable image manipulations, such as JPEG compression, gamma correction, speckle noise, Gaussian blur, shearing and slight rotation.
    Keywords: fingerprint image; perceptual hashing; minutiae extraction; scale-invariant feature transform; SIFT; Harris; singular value decomposition; SVD; discrete wavelet transform; DWT; acceptable attacks.
    DOI: 10.1504/IJBM.2023.10051692
     
  • Performance enhancement of symmetric hashed fingerprint template using dynamic threshold matching algorithm   Order a copy of this article
    by S. Ajish, K.S. AnilKumar 
    Abstract: The fingerprint template protection is strenuous among other biometric template protections because the fingerprint template stores the minutiae points as security enhancement of the fingerprint template and results in the degradation of the matching performance. The modified symmetric hash method uses a secret key as a multiplication parameter for the hashing of the fingerprint biometric template. The irreversibility and unlikability analysis of the modified symmetric hashed fingerprint template exhibits better security. The multiplication of the fingerprint minutiae template by a secret key mitigates the accuracy of matching performance. This paper proposes a dynamic threshold matching algorithm in which the threshold values are derived from the secret key. Experimental results on FVC 2004 database show that the combination of modified symmetric hash function and the dynamic threshold matching algorithm prompt better security and excellent matching performance.
    Keywords: fingerprint template; modified symmetric hashing; accuracy; irreversibility; unlinkability; minutiae matching; false match rate; false nonmatch rate; Euclidean distance; angular threshold.
    DOI: 10.1504/IJBM.2022.10043185
     
  • Effect of facial expression in face biometry for a multimodal approach   Order a copy of this article
    by Samik Chakraborty, Dipayan Chatterjee, Subrata Golui, Madhuchhanda Mitra, Saurabh Pal 
    Abstract: With the advancement of technology, security has become an inseparable part of it. But many factors often influence the accuracy of the authentication system. In this current scenario, the multimodal biometric system is used where information from different modalities are fused to address the weakness of the system. In the present work, a robust biometric authentication system proposed using face and facial expression as biometric modalities. Facial recognition is the most commonly used biometric system over the years. Facial expressions of an individual are unique and it is integrated as an additional layer along with face recognition system to enhance the security of the system as the current scenario tends towards intelligent security systems for real-time surveillance. After pre-processing, eigenvalue-based and local binary pattern (LBP)-based features are extracted from the face and facial expression and the information are fused. Finally, the authentication is done using image Euclidian distance (IMED) based classifier. This proposed work evaluated using the JAFFE and Yale database and 95.71% and 88.89% authentication accuracy is achieved, respectively.
    Keywords: face biometry; facial expression; local binary pattern; LBP; eigenfaces; IMED classifier.
    DOI: 10.1504/IJBM.2023.10051693