Open Access Open Access  Restricted Access Subscription or Fee Access

Heuristic vs Metaheuristic Method: Improvement of Spoofed Fingerprint Identification in IoT Devices


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/iremos.v12i3.17330

Abstract


The Internet of Thing (IoT) has become important due to the development of information technology that connects several aspects such as devices, services, and humans. Many IoT devices have been implemented the security system that uses biometrics sensor. The security system needs to secure the personal activity data recorded in IoT devices. Fingerprint is the one of common biometrics used in authentication but it has several security issues. Spoofed fingerprint is one of the risk security problems in biometrics authentication. This paper focuses on improving  the security aspect in biometrics that is fundamental in IoT devices. Some optimization methods such as Nelder Mead, heuristic and Simulated Annealing and metaheuristic have been used to optimize the spoofed fingerprints identification with Back Propagation Neural Network classifier. Gray Level Co-occurrence Matrix is also considered as feature extraction of fingerprints in this research. The result of this study has shown that Nelder Mead method has a better improvement accuracy with a significant of two-tail p-value equal to 0.013. Moreover, Simulated Annealing method has been able to improve the accuracy in identification of spoofed fingerprint faster than Nelder Mead, but unsignificantly.
Copyright © 2019 Praise Worthy Prize - All rights reserved.

Keywords


Backpropagation; GLCM; Heuristic; IoT; Metaheuristic; Nelder Mead; Optimization; Spoofed Fingerprint; Simulated Annealing

Full Text:

PDF


References


N. Hassan, S. Gillani, E. Ahmed, I. Yaqoob, and M. Imran, The Role of Edge Computing in Internet of Things, IEEE Communications Magazine, vol. 56, no. 11, pp. 110–115, Nov. 2018.
https://doi.org/10.1109/mcom.2018.1700906

R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, Internet of things (IoT) security: Current status, challenges and prospective measures, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015, pp. 336–341.
https://doi.org/10.1109/icitst.2015.7412116

M. W. Congress, Biometric technology takes centre stage at Mobile World Congress, Biometric Technology Today, vol. 2016, no. 3, pp. 1–2, Mar. 2016.
https://doi.org/10.1016/s0969-4765(16)30040-6

A. Ali, X. Jing, and N. Saleem, GLCM-based fingerprint recognition algorithm, in 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, 2011, pp. 207–211.
https://doi.org/10.1109/icbnmt.2011.6155926

T. Cevik, A. M. A. Alshaykha, and N. Cevik, Performance analysis of GLCM-based classification on Wavelet Transform-compressed fingerprint images, in 2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2016, pp. 131–135.
https://doi.org/10.1109/dictap.2016.7544014

M. Patel, S. M. Parikh, and A. R. Patel, An Improved Approach in Core Point Detection Algorithm for Fingerprint Recognition, SSRN Electronic Journal, pp. 83–89, 2018.
https://doi.org/10.2139/ssrn.3166188

F. Zeng, S. Hu, and K. Xiao, Research on partial fingerprint recognition algorithm based on deep learning, Neural Computing and Applications, vol. 8, pp. 1–10, 2018.
https://doi.org/10.1007/s00521-018-3609-8

J. Galbally, R. Haraksim, and L. Beslay, A Study of Age and Ageing in Fingerprint Biometrics, IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1351–1365, May 2019.
https://doi.org/10.1109/tifs.2018.2878160

D.-L. Nguyen, K. Cao, and A. K. Jain, Automatic Latent Fingerprint Segmentation, Apr. 2018.

A. Rattani, W. J. Scheirer, and A. Ross, Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials, IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2447–2460, Nov. 2015.
https://doi.org/10.1109/tifs.2015.2464772

B. Tan, A. Lewicke, D. Yambay, and S. Schuckers, The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms, in 2010 IEEE International Workshop on Information Forensics and Security, 2010, pp. 1–6.
https://doi.org/10.1109/wifs.2010.5711436

A. Rattani and A. Ross, Minimizing the impact of spoof fabrication material on fingerprint liveness detector, in 2014 IEEE International Conference on Image Processing (ICIP), 2014, pp. 4992–4996.
https://doi.org/10.1109/icip.2014.7026011

Y. S. Moon, J. S. Chen, K. C. Chan, K. So, and K. C. Woo, Wavelet based fingerprint liveness detection, Electronics Letters, vol. 41, no. 20, p. 1112, 2005.
https://doi.org/10.1049/el:20052577

Bozhao Tan and S. Schuckers, Liveness Detection for Fingerprint Scanners Based on the Statistics of Wavelet Signal Processing, in 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW’06), 2006, pp. 26–26.
https://doi.org/10.1109/cvprw.2006.120

P. Coli, G. L. Marcialis, and F. Roli, Power spectrum-based fingerprint vitality detection, in 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007, pp. 169–173.
https://doi.org/10.1109/autoid.2007.380614

A. Abhyankar and S. Schuckers, Integrating a wavelet based perspiration liveness check with fingerprint recognition, Pattern Recognition, vol. 42, no. 3, pp. 452–464, Mar. 2009.
https://doi.org/10.1016/j.patcog.2008.06.012

E. Marasco and C. Sansone, Combining perspiration- and morphology-based static features for fingerprint liveness detection, Pattern Recognition Letters, vol. 33, no. 9, pp. 1148–1156, Jul. 2012.
https://doi.org/10.1016/j.patrec.2012.01.009

G. L. Marcialis, F. Roli, and A. Tidu, Analysis of Fingerprint Pores for Vitality Detection, in 2010 20th International Conference on Pattern Recognition, 2010, pp. 1289–1292.
https://doi.org/10.1109/icpr.2010.321

M. Espinoza and C. Champod, Using the Number of Pores on Fingerprint Images to Detect Spoofing Attacks, in 2011 International Conference on Hand-Based Biometrics, 2011, pp. 1–5.
https://doi.org/10.1109/ichb.2011.6094347

B. Tan and S. Schuckers, Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise, Pattern Recognition, vol. 43, no. 8, pp. 2845–2857, Aug. 2010.
https://doi.org/10.1016/j.patcog.2010.01.023

V. Sasikala and V. LakshmiPrabha, A comparative study on the swarm intelligence based feature selection approaches for fake and real fingerprint classification, in 2015 International Conference on Soft-Computing and Networks Security (ICSNS), 2015, pp. 1–8.
https://doi.org/10.1109/icsns.2015.7292421

Y.-H. Baek, The fake fingerprint detection system using a novel color distribution, in 2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016, pp. 1111–1113.
https://doi.org/10.1109/ictc.2016.7763381

C. Yuan, X. Li, Q. M. J. Wu, J. Li, and X. Sun, Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis, Computers, Materials and Continua, vol. 53, no. 4, pp. 357–371, 2017.

D. Gragnaniello, G. Poggi, C. Sansone, and L. Verdoliva, Fingerprint liveness detection based on Weber Local image Descriptor, in 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, 2013, pp. 46–50.
https://doi.org/10.1109/bioms.2013.6656148

X. Jia et al., Multi-scale block local ternary patterns for fingerprints vitality detection, in 2013 International Conference on Biometrics (ICB), 2013, pp. 1–6.
https://doi.org/10.1109/icb.2013.6612964

L. Ghiani, A. Hadid, G. L. Marcialis, and F. Roli, Fingerprint Liveness Detection using Binarized Statistical Image Features, in 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013, pp. 1–6.
https://doi.org/10.1109/btas.2013.6712708

S. B. Nikam and S. Agarwal, Local binary pattern and wavelet-based spoof fingerprint detection, International Journal of Biometrics, vol. 1, no. 2, p. 141, 2008.
https://doi.org/10.1504/ijbm.2008.020141

Z. Xia, R. Lv, Y. Zhu, P. Ji, H. Sun, and Y.-Q. Shi, Fingerprint liveness detection using gradient-based texture features, Signal, Image and Video Processing, vol. 11, no. 2, pp. 381–388, Feb. 2017.
https://doi.org/10.1007/s11760-016-0936-z

S. Nuraisha and G. Fajar Shidik, Evaluation of Normalization in Fake Fingerprint Detection with Heterogeneous Sensor, in Proceedings - 2018 International Seminar on Application for Technology of Information and Communication: Creative Technology for Human Life, iSemantic, 2018, pp. 83–86.
https://doi.org/10.1109/isemantic.2018.8549742

C. T. Hsieh and C. S. Hu, Fingerprint recognition by multi-objective optimization PSO hybrid with SVM, Journal of Applied Research and Technology, vol. 12, no. 6, pp. 1014–1024, 2014.
https://doi.org/10.1016/s1665-6423(14)71662-1

M. B. Abdullahi, F. Idris, and A. A. Mohammed, Performance analysis of particle swarm optimization algorithm-based parameter tuning for fingerprint image enhancement, in 2016 Future Technologies Conference (FTC), 2016, no. December, pp. 528–536.
https://doi.org/10.1109/ftc.2016.7821658

D. Sánchez, P. Melin, and O. Castillo, Optimization of modular granular neural networks using a firefly algorithm for human recognition, Engineering Applications of Artificial Intelligence, vol. 64, no. July, pp. 172–186, Sep. 2017.
https://doi.org/10.1016/j.engappai.2017.06.007

Tiwari, K., Manoli, H., Improved Partial Fingerprint Recognition by Integration of Minutiae Based and Parallel Division Methods, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (6), pp. 487-494.
https://doi.org/10.15866/irecap.v7i6.13607

M. Woźniak and D. Połap, Voice recognition through the use of Gabor transform and heuristic algorithm, International Journal of Electronics and Telecommunications, vol. 63, no. 2, pp. 159–164, Jun. 2017.
https://doi.org/10.1515/eletel-2017-0021

J. Galbally, S. Marcel, and J. Fierrez, Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition, IEEE Transactions on Image Processing, vol. 23, no. 2, pp. 710–724, Feb. 2014.
https://doi.org/10.1109/tip.2013.2292332

A. Eleyan and H. Demirel, Co-occurrence based statistical approach for face recognition, in 2009 24th International Symposium on Computer and Information Sciences, 2009, vol. 0, pp. 611–615.
https://doi.org/10.1109/iscis.2009.5291895

G. F. Shidik, S. W. Dausat, R. D. Ramadhani, and F. N. Adnan, Performance evaluation of distance measurement in biometric finger knuckle print recognition, Advanced Science Letters, vol. 21, no. 10, 2015.
https://doi.org/10.1166/asl.2015.6449

J. T. C. Ming, N. M. Noor, O. M. Rijal, R. M. Kassim, and A. Yunus, Lung Disease Classification Using Different Deep Learning Architectures and Principal Component Analysis, in 2018 2nd International Conference on BioSignal Analysis, Processing and Systems (ICBAPS), 2018, vol. 7, pp. 187–190.
https://doi.org/10.1109/icbaps.2018.8527385

S. B. Nikam and S. Agarwal, Wavelet energy signature and GLCM features-based fingerprint anti-spoofing, in 2008 International Conference on Wavelet Analysis and Pattern Recognition, 2008, pp. 717–723.
https://doi.org/10.1109/icwapr.2008.4635872

R. A. Pramunendar, C. Supriyanto, D. H. Novianto, I. N. Yuwono, G. F. Shidik, and P. N. Andono, A classification method of coconut wood quality based on Gray Level Co-occurrence matrices, in Robotics, Biomimetics, and Intelligent Computational Systems (ROBIONETICS), 2013 IEEE International Conference on, 2013, pp. 254–257.
https://doi.org/10.1109/robionetics.2013.6743614

A. Baraldi and F. Panniggiani, An investigation of the textural characteristics associated with gray level cooccurrence matrix statistical parameters, IEEE Transactions on Geoscience and Remote Sensing, vol. 33, no. 2, pp. 293–304, Mar. 1995.
https://doi.org/10.1109/tgrs.1995.8746010

D. E. Rumelhart, G. E. Hinton, R. J. Williams, and others, Learning representations by back-propagating errors, Cognitive modeling, vol. 5, no. 3, p. 1, 1988.

T. S and M. N, Detection, Segmentation and Recognition of Face and its Features Using Neural Network, Journal of Biosensors & Bioelectronics, vol. 7, no. 2, 2016.

S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, Optimization by simulated annealing, Science, vol. 220, no. 4598, pp. 671–680, 1983.
https://doi.org/10.1126/science.220.4598.671

R. Wang et al., Hazardous source estimation using an artificial neural network, particle swarm optimization and a simulated annealing algorithm, Atmosphere, vol. 9, no. 4, 2018.
https://doi.org/10.3390/atmos9040119

Riza, M., Sentia, P., Andriansyah, A., Muslim, A., Simulated Annealing-Based Optimization of Biodegradable Plastic Synthesis, (2019) International Review on Modelling and Simulations (IREMOS), 12 (1), pp. 24-29.
https://doi.org/10.15866/iremos.v12i1.15852

V. Mundada and S. Kumar Reddy Narala, Optimization of Milling Operations Using Artificial Neural Networks (ANN) and Simulated Annealing Algorithm (SAA), in Materials Today: Proceedings, 2018, vol. 5, no. 2, pp. 4971–4985.
https://doi.org/10.1016/j.matpr.2017.12.075

S.-H. Liao, J.-G. Hsieh, J.-Y. Chang, and C.-T. Lin, Training neural networks via simplified hybrid algorithm mixing Nelder–Mead and particle swarm optimization methods, Soft Computing, vol. 19, no. 3, pp. 679–689, Mar. 2015.
https://doi.org/10.1007/s00500-014-1292-y

T. A. Faizati, G. F. Shidik, and V. Suhartono, Oriented bounding box optimization on the rotation group SO(3,ℝ) based on particle swarm optimization-nelder mead, Advanced Science Letters, vol. 21, no. 10, 2015.
https://doi.org/10.1166/asl.2015.6445

P. Reiner and B. M. Wilamowski, Nelder-mead enhanced extreme learning machine, INES 2013 - IEEE 17th International Conference on Intelligent Engineering Systems, Proceedings, pp. 225–230, 2013.
https://doi.org/10.1109/ines.2013.6632816


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize