Skip to main content

Biometric-Based Authentication System Using Rough Set Theory

  • Conference paper
Rough Sets and Current Trends in Computing (RSCTC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6086))

Included in the following conference series:

Abstract

In this paper we have proposed a biometric-based authentication system based on rough set theory. The system employed signature for authentication purpose. The major functional blocks of the proposed system are presented. Information is extracted as time functions of various dynamic properties of the signatures. We apply our methodology to global features extracted from a 108-users database. Thirty-one features were identified and extracted from each signature. Rough set approach has resulted in a reduced set of nine features that were found to capture the essential characteristics required for signature identification. Low error rates obtained in experiments illustrate the feasibility of using Rough Set as a promising technique for online signature identification systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baansal, A., Gupta, B., Khandelwal, G., Chakraverty, S.: Offline Signature Verification Using Critical Region Matching. International Journal of Signal, Image Processing and Pattern 2(1) (2009)

    Google Scholar 

  2. Dessimoz, R.D., Champod, J.C., Drygajlo, A.: Multimodal Biometrics for Identity Documents (MBioID): State-of-the-Art (Version 2.0). Research Report PFS 341-08.05 (2006)

    Google Scholar 

  3. Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: Target dependent score normalization techniques and their application to signature verification. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 498–504. Springer, Heidelberg (2004)

    Google Scholar 

  4. Fiérrez-Aguilar, J., Nanni, L., Lopez-Peñalba, J., Ortega-Garcia, J., Maltoni, D.: An On-Line Signature Verification System Based on Fusion of Local and Global Information. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 523–532. Springer, Heidelberg (2005)

    Google Scholar 

  5. Ghandali, S., Ebrahimi, M.: Off-Line Persian Identification and Verification Based On Image Registration And Fusion. Journal of Multimedia 3(3) (2009)

    Google Scholar 

  6. Hassanien, A.E., Own, H.: Rough Sets for Prostate Patient Analysis. In: Proceedings of International Conference on Modeling and Simulation (MS 2006), Malaysia (2006)

    Google Scholar 

  7. Jain, A.K., Friederike, D.G., Scott, D.C.: Online signature verification. Pattern Recognition 35(12), 2963–2972 (2002)

    Article  MATH  Google Scholar 

  8. Khan, M.A.U., Niazi, M.K.K., Khan, M.A.: Velocity-Image Model for Online Signature Verification. IEEE Transactions on Image Processing 15(11), 3540–3549 (2006)

    Article  Google Scholar 

  9. Kiran, G.V., Kunte, R.S.R., Samuel, S.: On Line Signature Verification System Using Probabilistic Feature Modelling. In: International Symposium on Signal Processing and its Application (ISSPA), Kuala Lumpur, Malaysia, pp. 355–358 (2001)

    Google Scholar 

  10. Krawczyk, S.: User authentication using on-line signature and speech. Master’s thesis, Michigan State University, Dep. of Computer Science and Engineering (2005)

    Google Scholar 

  11. Lei, H., Govindaraju, V.: A Study on the Consistency of Features for On-Line Signature Verification. In: SSPR/SPR, vol. 444 (2004)

    Google Scholar 

  12. Nanni, L., Lumini, A.: A Novel Local On-Line Signature Verification System. Pattern Recognition Letters 29(5), 559–568 (2008)

    Article  Google Scholar 

  13. Pawlak, Z.: Rough sets. International Journal of Computer and Information Sciences 11, 341–356 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  14. Pawlak, Z.: Rough Sets- Theoretical aspect of Reasoning about Data. Kluwer Academic Publishers, Dordrecht (1991)

    Google Scholar 

  15. Pawlak, Z., Grzymala-Busse, Z., Slowinski, J.R., Ziarko, W.: Rough sets. Communications of the ACM 38(11), 89–95 (1995)

    Article  Google Scholar 

  16. Yanikoglu, B., Kholmatov, A.: An improved decision criterion for genuine forgery classification in on-line signature verification. In: Kaynak, O., Alpaydın, E., Oja, E., Xu, L. (eds.) ICANN 2003 and ICONIP 2003. LNCS, vol. 2714. Springer, Heidelberg (2003)

    Google Scholar 

  17. Zhong, N., Skowron, A.: Rough sets based Knowledge Discovery Process. Int. J. Appl. Math. Comput. Sci. 11(3), 603–619 (2001)

    MATH  MathSciNet  Google Scholar 

  18. Xiang, W., Desai, B., Wen, P., Wang, Y., Peng, T.: A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition. In: Wen, P., Li, Y., Polkowski, L., Yao, Y., Tsumoto, S., Wang, G. (eds.) RSKT 2009. LNCS, vol. 5589, pp. 264–272. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  19. http://www.medicalnewstoday/articles/51455.php

    Google Scholar 

  20. http://www.lcb.uu.se/tools/rosetta/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Own, H.S., Al-Mayyan, W., Zedan, H. (2010). Biometric-Based Authentication System Using Rough Set Theory. In: Szczuka, M., Kryszkiewicz, M., Ramanna, S., Jensen, R., Hu, Q. (eds) Rough Sets and Current Trends in Computing. RSCTC 2010. Lecture Notes in Computer Science(), vol 6086. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13529-3_60

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13529-3_60

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13528-6

  • Online ISBN: 978-3-642-13529-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics