Biometric identification using local iterated function

Abstract Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

[1]  Arnaud E. Jacquin,et al.  Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..

[2]  Krzysztof Gdawiec Shape Recognition Using Partitioned Iterated Function Systems , 2009, ICMMI.

[3]  J. K. Lee,et al.  Fingerprint-based remote user authentication scheme using smart cards , 2002 .

[4]  Hong Yan,et al.  Face recognition using the weighted fractal neighbor distance , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[5]  Nadia M. G. Al-Saidi,et al.  Password Authentication Based on Fractal Coding Scheme , 2012, J. Appl. Math..

[6]  B. Mandelbrot Fractal Geometry of Nature , 1984 .

[7]  Ying Chen,et al.  Study on Fractal Images Construction with Topology Invariance IFS Attractor , 2009, 2009 International Forum on Computer Science-Technology and Applications.

[8]  Abbas Z. Kouzani,et al.  Classification of face images using local iterated function systems , 2008, Machine Vision and Applications.

[9]  M. Barnsley,et al.  Iterated function systems and the global construction of fractals , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[10]  Natalya Polikarpova On the fractal features in fingerprint analysis , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[11]  Ning He,et al.  A fingerprint key binding algorithm based on vector quantization and error correction , 2012, Digital Image Processing.

[12]  Y. Fisher Fractal image compression: theory and application , 1995 .

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Mohamad Rushdan Md. Said,et al.  Efficiency Analysis for Public Key Systems Based on Fractal Functions , 2011 .

[15]  Anil K. Jain,et al.  Fingerprint Analysis and Representation , 2009 .

[16]  Jiankun Hu,et al.  A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment , 2011, Secur. Commun. Networks.

[17]  Chia-Hung Lin,et al.  Optical sensor measurement and biometric-based fractal pattern classifier for fingerprint recognition , 2011, Expert Syst. Appl..

[18]  Lyman P. Hurd,et al.  Fractal image compression , 1993 .

[19]  Mahdi Jampour,et al.  Towards a Fast Method for Iris Identification with Fractal and Chaos Game Theory , 2012, Int. J. Pattern Recognit. Artif. Intell..

[20]  Paolo Milazzo,et al.  A P Systems Flat Form Preserving Step-by-step Behaviour , 2008, Fundam. Informaticae.