(2) Omar Younis Abdulhameed (Department of Computer Science, College of Science, University of Garmian, Kalar, Garmian, Kurdistan Region, Iraq, Iraq)
*corresponding author
AbstractFingerprint recognition is a dominant form of biometric due to its distinctiveness. The study aims to extract and select the best features of fingerprint images, and evaluate the strength of the Shark Smell Optimization (SSO) and Genetic Algorithm (GA) in the search space with a chosen set of metrics. The proposed model consists of seven phases namely, enrollment, image preprocessing by using weighted median filter, feature extraction by using SSO, weight generation by using Chebyshev polynomial first kind (CPFK), feature selection by using GA, creation of a user’s database, and matching features by using Euclidean distance (ED). The effectiveness of the proposed model’s algorithms and performance is evaluated on 150 real fingerprint images that were collected from university students by the ZKTeco scanner at Sulaimani city, Iraq. The system’s performance was measured by three renowned error rate metrics, namely, False Acceptance Rate (FAR), False Rejection Rate (FRR), and Correct Verification Rate (CVR). The experimental outcome showed that the proposed fingerprint recognition model was exceedingly accurate recognition because of a low rate of both FAR and FRR, with a high CVR percentage gained which was 0.00, 0.00666, and 99.334%, respectively. This finding would be useful for improving biometric secure authentication based fingerprint. It is also possibly applied to other research topics such as fraud detection, e-payment, and other real-life applications authentication.
KeywordsFingerprint recognition; Swarm intelligence; Shark smell optimization; Genetic algorithm; Chebyshev polynomial first kind
|
DOIhttps://doi.org/10.26555/ijain.v6i2.502 |
Article metricsAbstract views : 1924 | PDF views : 571 |
Cite |
Full TextDownload |
References
[1] W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, “Security and accuracy of fingerprint-based biometrics: A review,” 2019, doi: 10.3390/sym11020141.
[2] C. Wang, Y. Wang, Y. Chen, H. Liu, and J. Liu, “User authentication on mobile devices: Approaches, threats and trends,” Comput. Networks, vol. 170, pp. 107-118, 2020, doi: 10.1016/j.comnet.2020.107118.
[3] F. Belhadj, “Biometric system for identification and authentication,” National High School of Computer Science (ESI), 2017, available at: Google Scholar.
[4] S. S. Harakannanavar, P. C. Renukamurthy, and K. B. Raja, “Comprehensive Study of Biometric Authentication Systems, Challenges and Future Trends,” Int. J. Adv. Netw. Appl., vol. 10, no. 4, pp. 3958–3968, 2019, doi: 10.35444/IJANA.2019.10048.
[5] C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics,” EURASIP J. Inf. Secur., vol. 2011, no. 1, p. 3, Dec. 2011, doi: 10.1186/1687-417X-2011-3.
[6] M. M. H. Ali, V. H. Mahale, P. Yannawar, and A. T. Gaikwad, “Overview of fingerprint recognition system,” in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016, pp. 1334–1338, doi: 10.1109/ICEEOT.2016.7754900.
[7] E. Chandra and K. Kanagalakshmi, “Noise Elimination in Fingerprint Image Using Median Filter,” Int. J. Adv. Netw. Appl., 2011, available at: Google Scholar.
[8] M. Hammad, Y. Liu, and K. Wang, “Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint,” IEEE Access, 2019, doi: 10.1109/ACCESS.2018.2886573.
[9] S. Sahoo, T. Choubisa, and S. Mahadeva Prasanna, “Multimodal Biometric Person Authentication : A Review,” IETE Tech. Rev., vol. 29, no. 1, pp. 54-75, 2012, doi: 10.4103/0256-4602.93139.
[10] I. Fister, X. S. Yang, J. Brest, and D. Fister, “A brief review of nature-inspired algorithms for optimization,” Elektrotehniski Vestnik/Electrotechnical Review, vol. 80, no. 3, pp. 1-7, 2013, available at: Google Scholar.
[11] S. Kumar, D. Datta, and S. K. Singh, “Swarm Intelligence for Biometric Feature Optimization,” pp. 830–863, doi: 10.4018/978-1-5225-0788-8.ch032.
[12] M. Mavrovouniotis, C. Li, and S. Yang, “A survey of swarm intelligence for dynamic optimization: Algorithms and applications,” Swarm Evol. Comput., vol. 33, pp. 1–17, Apr. 2017, doi: 10.1016/j.swevo.2016.12.005.
[13] I. G. Dakhil and A. A. Ibrahim, “Design and Implementation of Fingerprint Identification System Based on KNN Neural Network,” J. Comput. Commun., vol. 06, no. 03, pp. 1–18, 2018, doi: 10.4236/jcc.2018.63001.
[14] A. K. Oo and Z. L. Aung, “A Robust Fingerprint Recognition Technique Applying Minutiae Extractors and Neural Network,” Int. J. Eng. Res. Adv. Technol., vol. 5, no. 3, pp. 78–87, 2019, doi: 10.31695/IJERAT.2019.3402.
[15] H. Kaur, G. Kaur, and H. S. Pannu, “Novel similarity measure-based random forest for fingerprint recognition using dual-tree complex wavelet transform and ring projection,” Mod. Phys. Lett. B, vol. 34, no. 02, p. 2050022, Jan. 2020, doi: 10.1142/S0217984920500220.
[16] T. Logeswari and M. Duraisamy, “An exploration of sturdiness of ant colony optimization technique on brain tumor image segmentation,” Int. J. Appl. Eng. Res., vol. 10, no. 2, pp. 4329-4342, 2015, available at: Google Scholar.
[17] A. Sindhu and V. Radha, “A Novel Histogram Equalization Based Adaptive Center Weighted Median Filter for De-noising Positron Emission Tomography (PET) Scan Images,” in 2018 3rd International Conference on Communication and Electronics Systems (ICCES), 2018, pp. 909–914, doi: 10.1109/CESYS.2018.8724108.
[18] S. Mohammad-Azari, O. Bozorg-Haddad, and X. Chu, “Shark Smell Optimization (SSO) Algorithm,” in Advanced Optimization by Nature-Inspired Algorithms: Springer, 2018, pp. 93–103, doi: 10.1007/978-981-10-5221-7_10.
[19] M. Ehteram, H. Karami, S.-F. Mousavi, A. El-Shafie, and Z. Amini, “Optimizing dam and reservoirs operation based model utilizing shark algorithm approach,” Knowledge-Based Syst., vol. 122, pp. 26–38, Apr. 2017, doi: 10.1016/j.knosys.2017.01.026.
[20] O. W. Salami, I. J. Umoh, E. A. Adedokun, M. B. Mu’azu, and L. A. Ajao, “Efficient Method for Discriminating Flash Event from DoS Attack during Internet Protocol Traceback using Shark Smell Optimization Algorithm,” in 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf), 2019, pp. 1–10, doi: 10.1109/NigeriaComputConf45974.2019.8949671.
[21] H. Hosseinzadeh and M. Sedaghat, “Brain image clustering by wavelet energy and CBSSO optimization algorithm,” J. Mind Med. Sci., vol. 6, no. 1, pp. 110–120, Apr. 2019, doi: 10.22543/7674.61.P110120.
[22] N. Gnanasekaran, S. Chandramohan, P. S. Kumar, and A. Mohamed Imran, “Optimal placement of capacitors in radial distribution system using shark smell optimization algorithm,” Ain Shams Eng. J., vol. 7, no. 2, pp. 907–916, Jun. 2016, doi: 10.1016/j.asej.2016.01.006.
[23] O. Abedinia, N. Amjady, and A. Ghasemi, “A new metaheuristic algorithm based on shark smell optimization,” Complexity, vol. 21, no. 5, pp. 97-116, 2016, doi: 10.1002/cplx.21634.
[24] H. Hosseinzadeh, “Automated skin lesion division utilizing Gabor filters based on shark smell optimizing method,” Evol. Syst., pp. 1-10, Nov. 2018, doi: 10.1007/s12530-018-9258-4.
[25] S. A. L. I. Juma, “Optimal Radial Distribution Network Reconfiguration Using Modified Shark Smell Optimization,” MSc. Thesis, Pan African University Institute for Basic Sciences, Technology and Innovation, 2018, available at: Google Scholar.
[26] A. Goswami, G. Choudhury, and H. K. Sarmah, “Contributions of Russian Mathematicians in the Development of Probability: A Historical Search,” Int. J. Stat. Syst., vol. 14, no. 1, pp. 1–27, 2019, available at: Google Scholar.
[27] M. Filippi, A. Pagani, M. Petrolo, G. Colonna, and E. Carrera, “Static and free vibration analysis of laminated beams by refined theory based on Chebyshev polynomials,” Compos. Struct., vol. 132, pp. 1248–1259, Nov. 2015, doi: 10.1016/j.compstruct.2015.07.014.
[28] N. Karjanto, “Properties of Chebyshev polynomials,” arXiv Prepr. arXiv2002.01342, pp. 127-132, 2020, available at: Google Scholar.
[29] R. A. Welikala et al., “Genetic algorithm based feature selection combined with dual classification for the automated detection of proliferative diabetic retinopathy,” Comput. Med. Imaging Graph., vol. 43, pp. 64–77, Jul. 2015, doi: 10.1016/j.compmedimag.2015.03.003.
[30] S. Mirjalili, “Genetic Algorithm,” in Evolutionary algorithms and neural networks: Springer, 2019, pp. 43–55, doi: 10.1007/978-3-319-93025-1_4.
[31] H. Heidari and A. Chalechale, “A new biometric identity recognition system based on a combination of superior features in finger knuckle print images,” TURKISH J. Electr. Eng. Comput. Sci., vol. 28, no. 1, pp. 238–252, Jan. 2020, doi: 10.3906/elk-1906-12.
[32] P. Kaur and J. Kaur, “Finger print Recognition Using Genetic Algorithm and Neural Network,” Int. J. Comput. Eng. Res., vol. 3, no. 11, pp. 41–46, 2013, available at: Google Scholar.
[33] M. Demri, “Multimodal biometric fusion using evolutionary techniques,” 2012, available at: Google Scholar.
[34] K. Martin Sagayam, D. Narain Ponraj, J. Winston, J. C. Yaspy, D. Esther Jeba, and A. Clara, “Authentication of biometric system using fingerprint recognition with euclidean distance and neural network classifier,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 4, pp. 766-771, 2019, available at: Google Scholar.
[35] T. Wala Aldeen Khairi, “Secure Mobile Learning System using Voice Authentication,” J. Eng. Appl. Sci., vol. 14, no. 22, pp. 8180–8186, Oct. 2019, doi: 10.36478/jeasci.2019.8180.8186.
[36] M. M. H. Ali, V. H. Mahale, P. Yannawar, and A. T. Gaikwad, “Fingerprint Recognition for Person Identification and Verification Based on Minutiae Matching,” in 2016 IEEE 6th International Conference on Advanced Computing (IACC), 2016, pp. 332–339, doi: 10.1109/IACC.2016.69.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
___________________________________________________________
International Journal of Advances in Intelligent Informatics
ISSN 2442-6571 (print) | 2548-3161 (online)
Organized by UAD and ASCEE Computer Society
Published by Universitas Ahmad Dahlan
W: http://ijain.org
E: info@ijain.org (paper handling issues)
andri.pranolo.id@ieee.org (publication issues)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0