Skip to main content

Machine Learning Methods for Extraction and Classification for Biometric Authentication

  • Conference paper
  • First Online:
ICDSMLA 2019

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 601))

Abstract

In this paper our main focus is to discover different machine learning techniques that are useful biometric System. As biometric authentication system is a combination of both image processing and pattern recognition, in this classification of pattern is a difficult task. Machine learning have number of algorithm that makes classification task easy. Machine learning is divided as supervised as well as unsupervised learning. In unsupervised learning the machine construct representation of input by getting inputs x1, x2, x3, …, and this is used for decision making, predicting future inputs or we say unsupervised learning finds patterns in the data and mainly solve clustering problem. In supervised learning set of output is already given, only we have to find this set of output from respective input value. In this paper we also discuss the area of machine learning where already work has done for biometric.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiao G, Milanova M, Xie M (2016) Secure behavioral biometric authentication with leap motion. In: 4th international symposium on digital forensics and security, ISDFS 2016, pp 112–118. In: 2016 proceeding 58 recent advances in cryptography and network security

    Google Scholar 

  2. Hamid NA, Safei S, Dhalila S, Satar M, Chuprat S, Ahmad R (2013) Randomized mouse movement for behavioral biometric identification. Int J Interact Digit Media 1(2):52–57

    Google Scholar 

  3. Pusara M, Brodley CE (2004) User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on visualization and data mining for Computer security VizSECDMSEC 04, pp 1–8

    Google Scholar 

  4. Ajufor N, Amalraj A, Diaz R, Islam M, Lampe M (2008) Refinement of a mouse movement biometric system. In: Proceedings of student-faculty research Day, CSIS, Pace University, pp 1–8, 2 May 2008

    Google Scholar 

  5. Antal M, Szabó LZ (2016) Biometric authentication based on touchscreen swipe patterns. Procedia Technol 22:862–869

    Article  Google Scholar 

  6. Shen C, Cai Z, Guan X (2012) Continuous authentication for mouse dynamics: a pattern growth approach. In: Proceedings of the international conference on dependable systems and networks

    Google Scholar 

  7. Buriro A, Crispo B, Delfrari F, Wrona K (2016) Hold & sign: a novel behavioral biometrics for smartphone user authentication. In: IEEE security and privacy workshops MoST 2016

    Google Scholar 

  8. Everitt RAJ, McOwan PW (2003) Java-based internet biometric authentication system. IEEE Trans Pattern Anal Mach Intell 25(9):1166–1172

    Article  Google Scholar 

  9. Fahad A, Alshatri N, Tari Z, Alamri A, Khalil I, Zomaya A, et al (2014) A survey of clustering algorithms for big data: taxonomy & empirical analysis. IEEE Trans Emerg Top Comput

    Google Scholar 

  10. Berkhin P (2006) A survey of clustering data mining. In: Grouping multidimensional data. Springer, Berlin Heidelberg, pp 25–71

    Google Scholar 

  11. Dempster AP, Laird NM, Rubin DB (1977) Maximum likelihood from incomplete data via the EM algorithm. J R Stat Soc Ser B 39(1):1–38. http://www.jstor.org/stable/2984875

  12. LeCun Y, Boser B, Denker JS, Henderson D, Howard RE, Hubbard W, Jackel LD (1989) Backpropagation applied to handwritten zip code recognition. Neural Comput 1(4):541–551. https://doi.org/10.1162/neco.1989.1.4.541

    Article  Google Scholar 

  13. Lloyd SP (1982) Least squares quantization in PCM. IEEE Trans Inf Theory 28(2):129–137. https://doi.org/10.1109/tit.1982.1056489

    Article  MathSciNet  MATH  Google Scholar 

  14. Gray RM (1984) Vector quantization. IEEE ASSP Mag 1(2):4–29. https://doi.org/10.1109/massp.1984.1162229

    Article  Google Scholar 

  15. Hebb DO (1949) The organization of behavior, vol 911. Wiley

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashmi Pathak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gunjan, V.K., Prasad, P.S., Pathak, R., Kumar, A. (2020). Machine Learning Methods for Extraction and Classification for Biometric Authentication. In: Kumar, A., Paprzycki, M., Gunjan, V. (eds) ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601. Springer, Singapore. https://doi.org/10.1007/978-981-15-1420-3_203

Download citation

Publish with us

Policies and ethics