Impostor Users Discovery Using a Multimodal Biometric Continuous Authentication Fuzzy System

In the last few years the security of the user's identity has become of paramount importance. In this paper we investigate the behavior of a fuzzy controller with a multimodal biometric system as input designed with the aim of preventing user substitution after the initial authentication process. In particular this paper presents the results of the system behavior tested with impostor users.

[1]  Patrick J. Flynn,et al.  An evaluation of multimodal 2D+3D face biometrics , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  E. Damiani,et al.  Ensuring the identity of a user in time: a multi-modal fuzzy approach , 2007, 2007 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications.

[3]  Stan Z. Li,et al.  Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings , 2007, ICB.

[4]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[5]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[6]  Robert Steele,et al.  Towards Usage Policies for Fuzzy Inference Methodologies for Trust and QoS Assessment , 2006 .

[7]  Anil K. Jain,et al.  Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  George J. Klir,et al.  Fuzzy sets and fuzzy logic - theory and applications , 1995 .

[9]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[10]  Lakhmi C. Jain,et al.  Knowledge-Based Intelligent Information and Engineering Systems , 2004, Lecture Notes in Computer Science.

[11]  Roberto Sassi,et al.  A Fuzzy Approach to Multimodal Biometric Authentication , 2007, KES.

[12]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[13]  Ebrahim H. Mamdani,et al.  An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Hum. Comput. Stud..

[14]  Stefania Marrara,et al.  A Fuzzy Trust Model Proposal to Ensure the Identity of a User in Time , 2006 .

[15]  Anil K. Jain,et al.  Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[16]  Matteo Golfarelli,et al.  On the Error-Reject Trade-Off in Biometric Verification Systems , 1997, IEEE Trans. Pattern Anal. Mach. Intell..