A Fingerprint and Voiceprint Fusion Identity Authentication Method | SpringerLink
Skip to main content

A Fingerprint and Voiceprint Fusion Identity Authentication Method

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11983))

Included in the following conference series:

  • 1181 Accesses

Abstract

In the traditional biometric identification scheme, the single fingerprint feature points are used for identification, or the single voiceprint is used as the authentication standard, and it is difficult to obtain a good accuracy in a complicated environment. Different biometrics have different advantages, disadvantages and applicable scenarios. A single mode cannot have a wider coverage scene. For this reason, we propose a fusion algorithm for fingerprint recognition and voiceprint recognition, combining the recognition characteristics of fingerprint and voiceprint, an identification scheme based on fingerprint and voiceprint fusion is proposed. The eigenvalues of fingerprint and voiceprint are divided into a group. The depth neural network is used to extract the fingerprint and voiceprint features respectively, and the probability combination is used to verify the fusion. The experimental results show that the combination of the two certifications reduces the error acceptance rate (FAR) by 4.04% and the error rejection rate (FRR) by 1.54% compared to a single fingerprint or voiceprint recognition scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lu, S.: A review of the development and application of biometrics. Comput. Secur. (1), 63–67 (2013)

    Google Scholar 

  2. Huang, Z., Liu, S., Mao, X., Chen, K., Li, J.: Insight of the protection for data security under selective opening attacks. Inf. Sci. 412, 223–241 (2017)

    Article  Google Scholar 

  3. Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2), 425–437 (2015)

    Article  MathSciNet  Google Scholar 

  4. Wu, Z., Tian, L., Li, P., Wu, T., Jiang, M., Wu, C.: Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf. Sci. 433–434, 431–447 (2018)

    Article  Google Scholar 

  5. Yanagawa, T., Aoki, S., Ohyama, T.: Human finger vein images are diverse and its patterns are useful for personal identification. MHF Preprint Series 12, 1–7 (2007)

    MATH  Google Scholar 

  6. Zhang, Z., Ma, S.: Multiscale feature extraction of finger-vein patterns based on curvelets and local interconnection structure neural network. In: 18th International Conference on Pattern Recognition (ICPR 2006), 20–24 August 2006, Hong Kong, China. IEEE Computer Society, pp. 145–148 (2006)

    Google Scholar 

  7. Liu, Y., Ma, Y., Feng, X., et al.: Fingerprint identification preprocessing algorithms based on Gabor filter. Comput. Meas. Control (2007)

    Google Scholar 

  8. Jiang, X., Yau, W.Y., Ser, W.: Detecting the fingerprint minutiae by adaptive tracing the gray-level ridge. Pattern Recogn. 34(5), 999–1013 (2001)

    Article  Google Scholar 

  9. Ratha, N.K., Bolle, R.: Automatic Fingerprint Recognition Systems. Springer, New York (2003). https://doi.org/10.1007/b97425

    Book  Google Scholar 

  10. Hinton, G.E., Osindero, S., The, Y.-W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527–1554 (2006)

    Article  MathSciNet  Google Scholar 

  11. Richardson, F., Reynolds, D., Dehak, N.: Deep neural network approaches to speaker and language recognition. IEEE Signal Process. Lett. 22(10), 1671–1675 (2015)

    Article  Google Scholar 

  12. Liu, Z., Wu, Z., Li, T., et al.: GMM and CNN hybrid method for short utterance speaker recognition. IEEE Trans. Ind. Inform. 14(7), 3244–3252 (2018)

    Article  Google Scholar 

  13. Girgis, M.R., Sewisy, A.A., Mansour, R.F.: A robust method for partial deformed fingerprints verification using genetic algorithm. Expert Syst. Appl. 36(2), 2008–2016 (2009)

    Article  Google Scholar 

  14. Zhao, Q., Zhang, D., Zhang, L., et al.: High resolution partial fingerprint alignment using pore-valley descriptors. Pattern Recogn. 43(3), 1050–1061 (2010)

    Article  Google Scholar 

  15. Wang, Y.A., Hu, J.: Global ridge orientation modeling for partial fingerprint identification. IEEE Trans. Pattern Anal. Mach. Intell. 33(1), 72–87 (2010)

    Article  Google Scholar 

  16. Selvarani, S., Jebapriya, S., Mary, R.S.: Automatic identification and detection of altered fingerprints. In: International Conference on Intelligent Computing Applications, pp. 239–243. IEEE Computer Society (2014)

    Google Scholar 

  17. He, K., Zhang, X., Ren, S., et al.: Deep Residual Learning for Image Recognition (2015)

    Google Scholar 

Download references

Acknowledgement

This research is supported by National Natural Science Foundation of China (No. 61772162), National Key R&D Program of China (No. 2018YFB0804102).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhendong Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, Y., Wu, Z., Yang, H. (2019). A Fingerprint and Voiceprint Fusion Identity Authentication Method. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics