1. Introduction
With the rapid development of science and technology, people pay more attention to security identification than ever before, and new theories and technologies continually emerge for identity authentication. Traditional identification methods include key, password, code, identification card, and so on. One of the weaknesses of these methods is that unauthorized persons can fabricate or steal protected data and make use of the rights of authorized users to engage in illegal activities. Though these traditional identification technologies, which usually face various threats in real world, are still playing an indispensable role on various occasions with a low request of security for their convenience and low cost, increasingly more consumers and enterprises choose to use biometric identification in numerous fields. Biometric identification technologies such as face recognition [
1,
2,
3,
4], fingerprint recognition [
5,
6,
7], and gait recognition [
8,
9,
10] are more secure and convenient than traditional technologies.
Biometric identification refers to the automated recognition of individuals based on their biological or behavioral characteristics [
11]. It is closely combined with high-tech means such as optics, acoustics, biosensors, and biostatistics. Biometrics finds its applications in the following areas: access control to facilities and computers, criminal identification, border security, access to nuclear power plants, identity authentication in network environment, airport security, issue of passports or driver licenses, and forensic and medical databases [
12]. Biometric identification can facilitate a well-rounded solution for system identification and maintain a reliable and secure system. Biometric technology has started to become a booming field and an important application direction of a cross subject between computer science and biology. Unimodal biometric systems, such as fingerprint identification system and face identification, have been studied in many previous articles [
6,
13,
14,
15,
16,
17,
18,
19,
20].
Through the studies of recent years, it is evident that multimodal biometric identification technologies that use many kinds of biometric characteristics to identify individuals are more secure and accurate than unimodal ones. They take advantage of multiple biometric traits to improve the performance in many aspects including accuracy, noise resistance, universality, and spoof attacks, and reduce performance degradation in huge database applications [
21]. Multi-biometric feature fusion is a crucial step in multimodal biometric systems. The strength of the feature fusion technique lies in its ability to derive highly discriminative information from original multiple feature sets and to eliminate redundant information that results from the correlation between distinct feature sets, thus gaining the most effective feature set with low dimensionality for the final decision [
22]. On the process of multimodal identification research, several new algorithms and applications have been studied in recent years. For example, the authors of [
11] presented a multimodal biometric approach based on the fusion of the finger vein and electrocardiogram (ECG) signals. The application of canonical correlation analysis (CCA) in multimodal biometric field attracted many researchers [
23,
24], who employed CCA to fuse gait and face cues for human gender recognition. Multimodal biometric identification system based on finger geometry, knuckle print, and palm print was proposed in [
21]. Face–iris multimodal biometric system using a multi-resolution Log–Gabor filter with spectral regression kernel discriminant analysis was studied in [
25]. The authors of [
26] proposed an efficient multimodal face and fingerprint biometrics authentication system on space-limited tokens, e.g., smart cards, driver license, and RFID cards. The authors of [
27] proposed a novel multimodal biometric identification system for face–iris recognition, based on binary particle swarm optimization and solving the problem of mutually exclusive redundant features in combined features. Dialog Communication Systems (DCS AG) developed BioID in [
28], a multimodal identification system that uses three different features—face, voice, and lip movement—to identify people. In [
29], a frequency-based approach results in a homogeneous biometric vector, integrating iris and fingerprint data. The authors of [
30] proposed a deep multimodal fusion network to fuse multiple modalities (face, iris, and fingerprint) for person identification. They demonstrate an increase in multimodal person identification performance by utilizing the proposed multi-level feature abstract representations in our multimodal fusion, rather than using only the features from the last layer of each modality-specific CNN. However, the system in [
30] based on CNNs cannot be used for small samples.
Associative memory networks are single layer nets that can store and recall patterns based on data content rather than data address [
31]. Associative memory (AM) systems can be divided into hetero-associative memory (HAM) systems and auto-associative memory (AAM) systems. When the input pattern and the output pattern are the same pattern, the system can be called an AAM system. The HAM model, which stores coupling information based on input–output patterns, can recall a stored output pattern by receiving a different input pattern. In [
32], to protect the face features database fundamentally, a new face recognition method by AAM based on RNNs is proposed without establishing a face feature database, in which the face features are transformed into the parameters of the AAM model. We notice that the HAM models can construct the association between the input and output patterns in a robust way, and this association can be regarded as feature fusion of two different kinds of patterns. Thus, HAM models should be able to fuse multiple biometric features in a robust way. Furthermore, the multimodal identification system can be built by HAM models.
Considering the advantages of multimodal identification and the fusion capability of HAM models, in this paper, the HAM model, which can store fusion features of face–fingerprint patterns and recall a predictable fingerprint pattern by receiving a face pattern, is constructed. The model is based on a cellular neural network, which belongs to a class of recurrent neural networks (RNNs). The stability of the HAM model is a prerequisite for its successful application in a multimodal identification system. Thus, the asymptotic stability of the HAM model is also analyzed and discussed. In this paper, we also propose a multimodal identification system based on fingerprint and face images by the HAM method. Our three contributions in this paper are highlighted as follows.
A multimodal identification system based on face and fingerprint images is designed, and this system effectively utilizes the advantages of two representative biometric features and ensures the system more security in the process of identification.
The variable gradient method is used to construct the Lyapunov function, which proves the asymptotic stability of the HAM model. The HAM model based on RNNs must converge to the asymptotic equilibrium point. Otherwise, multimodal identification cannot be carried out in practical scenarios. Analyses and discussions of the stability are given.
This is the first attempt to integrate face and fingerprint biometric features using the HAM method. In the HAM model, fingerprint and face biometric features are fused in a robust way. All the biometric features are fused to form a set of model coupling parameters.
The remainder of this paper is organized as follows. In
Section 2 and
Section 3, we give the details of our proposed multimodal identification system and research background, respectively. In
Section 4, the stability of the HAM model is analyzed in detail and the main results for feature fusion are given. Some numerical simulations are presented to illustrate the effectiveness and security of the proposed system in
Section 5. Finally, some conclusions are drawn in
Section 6.
2. Framework of the Identification System
We design a multimodal identification system based on face and fingerprint images that makes full use of the advantages of two different biometric modalities. We put forward two stages, which are named the fusion stage and identification stage in this identification system. The framework of the proposed system is shown in
Figure 1.
At the fusion stage, the main work is to establish the HAM model, which stores information of feature fusion using the HAM method. The HAM model, which is used for feature fusion, is based on an improved HAM method, and the established model can store the coupling information of the face and fingerprint patterns of the authorized users. The first step is to acquire face images and fingerprint images of the authorized users using some feature extractor device. The raw images are preprocessed, including the processes of gray level transformation, image binarization, and segmentation. The regions of interest (ROIs) of face images and fingerprint images after preprocessing are used to fuse both face and fingerprint biometric features using the HAM method. The parameters that come from the feature fusion institute crucial model coefficients of the HAM model. Then, the established HAM model can recall the fingerprint pattern of one authorized user by receiving the face pattern of the user when the model converges to the asymptotically stable equilibrium point. If the established model could not converge to the asymptotically stable equilibrium point, the fusion parameters, namely model coefficients, would not be given. The HAM model stores two kinds of biometric features of all authorized users as one group of model coefficients, and those biometrical features cannot be decrypted easily in the reversible method.
In the identification stage, the HAM model established in the fusion stage is used to test the legitimacy of the visitors. Firstly, the face image and fingerprint image of one visitor are acquired using proper feature extractor devices in the identification stage. The visitor’s face pattern after preprocessing is sent to the HAM model established in the fusion stage. Then, there will be an output pattern when the established HAM model converges to the asymptotically stable equilibrium point. By comparing the model’s output pattern with the visitor’s real fingerprint pattern after preprocessing, the recognition pass rate of the visitor can be obtained. If the numerical value of the recognition rate of the visitor exceeds a given threshold, the identification is successful and the visitor has the rights of authorized users. Instead, the visitor is an illegal user.
4. Main Results
In this section, under the research background, the asymptotic stability of the HAM model with multiple time-varying delays using variable gradient method and the algorithm of feature fusion by the HAM method are presented successively.
4.1. Stability of the HAM Model
Theorem 1. There is a stable equilibrium point in system (2), which makes the HAM model asymptotically stable.
Proof of Theorem 1. As is bounded, it can be proved that system (2) has at least one equilibrium point using Schauder fixed point theorem. Assuming that is an equilibrium point in the neural network.
Let
and
, then (1) can be rewritten as
For the HAM model (9), if there exist the Lyapunov function
, and the model’s equilibrium point is
, the single value gradient of (9) can be defined as Equation (5). From Equation (6),
It is convenient to select coefficients
and
from (9), and one can easily obtain
When
, from Equation (1),
. If
, i.e.,
, then
. By replacing
with
, the inequality
can be obtained. Analogously, if
, it can be proved that
. Therefore, both cases can lead to
, namely
is negative definite. Furthermore, it is clear that
. Therefore, from Equation (8), the Lyapunov function can be obtained as
which is always positive definite. Then, we proved the HAM model is asymptotically stable at the equilibrium point using the variable gradient method. □
Remark 1. The HAM method is used to fuse each authorized user’s face and fingerprint biometric features. The face and fingerprint patterns of each authorized user are the input vector and output vector of the neural network model, respectively. When the established HAM model converges to the asymptotically stable equilibrium point, the output vector can be obtained by receiving an input vector, i.e., the fingerprint pattern can be recalled by the face pattern of the authorized user.
4.2. HAM Model
The HAM method is used to fuse each authorized user’s face and fingerprint biometric features. The authorized user’s face and fingerprint patterns are the network model’s input vector and output vector , respectively.
Letting
, Equation (1) can be rewritten as
Lemma 1 ([
34]
). In Equation (13),, If, then (13) can converge to an asymptotically stable equilibrium point whose value is greater than +1.
If, then (13) can converge to an asymptotically stable equilibrium point whose value is less than −1.
Theorem 2. HAM model (2) converges to a stable equilibrium pointand, if there exists a constantsuch thatand.
Proof of Theorem 2. In (2), . Define the equilibrium of the HAM model . is an equilibrium point in the neural network.
For the first case, consider , then . When , according to Lemma 1 (i), . For the second case, consider , then . When , according to Lemma 1 (ii), . Therefore, the HAM model (2) converges to a stable equilibrium point , where . □
Given and , in which and are the feature vectors extracted from the fingerprint and face images of one authorized user after preprocessing, respectively.
It is obvious that, when and meet the condition in Theorem 2, the coupling relationship of the face and fingerprint patterns of one authorized user is established, and the fusion features are transformed into HAM model parameters. The HAM model, which stores fusion features of face and fingerprint patterns of the user, can recall a predictable fingerprint pattern by receiving a stored face pattern . The HAM model network is of size . Let the neighborhood radius be 1, then there are eighteen unknown connection weights and one unknown bias value for one neuron. Denote the nineteen unknown parameters of the th neuron as .
Remark 2. In the fusion stage, the established HAM model can store fusion features of all authorized users. Therefore, all model parametersto be obtained should be determined by the face and fingerprint patterns of all authorized users.
Forauthorized users,can be transformed asin whichandis the fingerprint pattern’s feature vector ofauthorized users on the-th neuron of the network model.
Then, all unknown model parameters by Equation (14) can be solved. Namely, two kinds of biometric features of all authorized users turn into parameters of the established HAM. After obtaining all the parameters based on face and fingerprint patterns of all authorized users, the HAM model, which can recall fingerprint pattern by receiving the face pattern of the authorized user, is established.
Some notations are defined in
Appendix A. The feature fusion algorithm of the HAM model based on face and fingerprint images using the HAM method in the fusion stage is given in Algorithm 1.
Remark 3. When the established HAM model, which stores biometric fusion features of all authorized users, receives a face pattern vector of an unauthorized user, there will exist a forecasting fingerprint pattern output of the visitor. In [32], the input pattern and forecasting output pattern are the same biometric pattern. It uses the AAM network structure, which fuses the face input and the same face output, but it cannot achieve the fusion of different biological models. In this paper, two different biometric patterns are studied. This is the first attempt to integrate two different biometric features using the HAM method.
Furthermore, the convolutional neural network needs a lot of data for training, which is difficult to train for small samples, so we do not use the convolutional neural network for small sample data in this paper.
Algorithm 1 Feature fusion algorithm |
Require: fingerprint feature vector , face feature vector , . Ensure: Model parameters . for do for do end for end for for do end for for do for do end for end for for do end for |
5. Experiments and Discussion
In this section, we will show the experimental results of the multimodal identification system we proposed in
Section 2. Firstly, we prove the effectiveness of the multimodal identification system using Experiment 1. The accuracy of the experiment meets the requirement of identification recognition that we defined. Secondly, we test unauthorized users and prove the security of the multimodal identification system using Experiment 2.
To protect private information, the experiments are based on two different public databases. The face images come from ORL Faces Database and the fingerprint images come from CASIA-FingerprintV5 Database. The fingerprint images of CASIA-FingerprintV5 were captured by a URU4000 fingerprint sensor in one session.
In order to compare the result of the fingerprint pattern
of the visitor and the predictable fingerprint pattern
, a matcher is designed. The pass rate (PR) of the matcher is defined as
in which NF stands for the number of feature points that satisfy the value of the fingerprint pattern of the visitor and the predicted fingerprint output is equal in corresponding pixel coordinate. When the value of PR is bigger than the given threshold of 90%, the face pattern and the fingerprint patterns of the visitor are regarded as legal. Namely, the real fingerprint pattern of the visitor can match the predicted fingerprint output in the multimodal identification system.
5.1. Experiment 1
We assume that the face image and fingerprint image in each group come from the same person. Seven groups of images of authorized users from two databases mentioned above are shown in
Figure 2. The first step in the biometric identification system is to extract region of interests (ROIs). In our experiments, all face image ROIs and fingerprint image ROIs used in our experiments after preprocessing are 35 × 25 pixels in size.
The seven groups of face patterns and fingerprint patterns are used to solve the model parameters . Let and . The fingerprint feature vectors and the face feature vectors can be obtained from the seven groups of face patterns and fingerprint patterns of all authorized users. and were obtained by face feature vectors and fingerprint feature vectors, respectively. According to the feature fusion algorithm, the matrix was obtained. Furthermore, was obtained through the matrix transform method. Finally, was calculated using the matrix operation.
According to the proposed HAM method in
Section 4, when the unestablished HAM model comes to the asymptotic stable equilibrium point, the internal coupling relationship between face and fingerprint patterns will be built by solving the model parameters.
The established multimodal identification system fused face and fingerprint biometrics in the fusion stage. The matcher pass rate can be obtained by comparing
and
when the system input is one of the face patterns of the authorized users. We testified the matcher pass rate as shown in
Table 1, whose results prove the effectiveness of the multimodal identification system.
5.2. Experiment 2
The results of the experiment above test the feasibility and efficiency of the algorithm. Provided that an unauthorized user has access to the identification system, the matcher pass rate must be low enough for the system to reject illegal users. In this experiment, we choose seven groups of unauthorized users whose fingerprints and faces are different from the groups in Experiment 1. The flow diagram of identification is shown in
Figure 3.
In this experiment, we found that the pass rate of unauthorized users is much lower than the identification matcher threshold. Hence, those users who attempted to spoof this identification system were identified as illegal users. We obtained seven groups of unauthorized users’ identification results, shown in
Table 2.
Consider the case wherein attacker who has the forged fingerprint or the forged face of one authorized user through illegal means beforehand wants to cheat the system. As the illegal attacker completely hacked one kind of biometrical information, it is easy to cheat single-mode identification system if there is no extra validation. However, in the multimodal identification system, the attacker cannot spoof this identification system easily. Group 15 to Group 21 are the attackers who have face information of the authorized users (Group 1 to Group 7), respectively. Further, Group 22 to Group 28 are the attackers who have fingerprint information of the authorized users (Group 1 to Group 7), respectively. The identification results are shown in
Table 3. The results of the experiment proved the security of our proposed system.
The experiment results prove the feasibility of the proposed multimodal identification system based on the HAM method. It can guarantee that the authorized users have access, while the unauthorized users and attackers have no access. The proposed identification method by fusing two different biometric modalities based on the HAM method applies not only to the situation of fusing the face and fingerprint feature, but also to other different biometric modalities.