The Concept of Application of Fuzzy Logic in Biometric Authentication Systems Anatoly Sachenko, Arkadiusz Banasik, and Adrian Kapczyński Silesian University of Technology, Department of Computer Science and Econometrics, F. D. Roosevelt 26-28, 41-800 Zabrze, Poland sachenkoa@yahoo.com, arkadiusz.banasik@polsl.pl, adrian.kapczynski@polsl.pl Abstract. In the paper the key topics concerning architecture and rules of working of biometric authentication systems were described. Significant role is played by threshold which constitutes acceptance or rejection given authentication attempt. Application of elements of fuzzy logic was proposed in order to define threshold value of authentication system. The concept was illustrated by an example. Keywords: biometrics, fuzzy logic, authentication systems. 1 Introduction The aim of this paper is to present on the basis of theoretical foundations of fuzzy logic and how to use it as a hypothetical, single-layered biometric authentication system. In the first part it will be provided biometric authentication systems primer and the fundamentals of fuzzy logic. On that basis the idea of use of fuzzy logic in biometric authentication systems was formulated. 2 Biometric Authentication Systems Primer Biometric authentication system is basically a system which identifies patterns and carries out the objectives of authentication by identifying the authenticity of physical or behavioral characteristics possessed by the user [5]. The logical system includes the following modules [1]: enrollment module and identification or verification module. The first module is responsible for the registration of user ID and the association of this identifier with the biometric pattern (called biometric template), which is understood as a vector of vales presented in an appropriate form, as a result of processing the collected by the biometric device, raw human characteristics. The identification Module (verification) is responsible for carrying out the collection and processing of raw biometric characteristics in order to obtain a biometric template, which is compared with patterns saved by the registration module. Those modules cooperate with each other and carry out the tasks related to the collection of raw biometric data, features extraction and comparison of features and finally decision making. The session with biometric systems begins with taking anatomical or behavioral features by the biometric reader. Biometric reader generates in n-dimensional biometric E. Corchado et al. (Eds.): CISIS 2008, ASC 53, pp. 274–279, 2009. springerlink.com © Springer-Verlag Berlin Heidelberg 2009 The Concept of Application of Fuzzy Logic 275 data. Biometric data represented by the form of vector features are the output of signals processing algorithms. Then, vector features are identified, and the result is usually presented in the form of the match (called confidence degree). On the basis of their relevance and value of the threshold (called threshold value) the module responsible for decision making produce output considered as acceptance or rejection. The result of the work of biometric system is a confirmation of the identity of the user. In light of the existence of the positive population (genuine users) and negative population (impostors), there are four possible outcomes: • • • • Genuine user is accepted (correct response), Genuine user is rejected (wrong response), Impostor is accepted (wrong response), Impostor is rejected (correct response.). A key decision-making is based on the value of the threshold T, which determines the classification of the individual characteristics of vectors, leading to a positive class (the sheep population) and a negative class (the wolf population). When threshold is increased (decreased) the likelihood of false acceptance decreases (increases) and the probability of false rejection increases (decreases). It is not possible to minimize the likelihood of erroneous acceptance and rejection simultaneously. In empirical conditions it can be found that precise threshold value makes it clear that confidence scores which are very close to threshold level, but still lower than it, are rejected. It can be found that the use of fuzzy logic can be helpful mean of reducing identified problem. 3 Basics of Fuzzy Logic A fuzzy set is an object which is characterized by its membership function. That function is assigned to every object in the set and it is ranging between zero and one. The membership (characteristic) function is the grade of membership of that object in the mentioned set [4]. That definition allows to declare more adequate if the object is within a range of the set or not; to be more precise the degree of being in range. That is a useful feature for expressions in natural language, e.g. the price is around thirty dollars, etc. It is obvious that if we consider sets (not fuzzy sets) it is very hard to declare objects and their membership function. The visualization of the example membership function S is presented on fig. 1 and elaborated on eq. 1. 0 ⎧ 2 ⎪ ⎛ x−a⎞ ⎪1 − 2⎜ ⎟ ⎪ ⎝ c−a ⎠ s ( x; a, b, c) = ⎨ 2 ⎪1 − 2⎛⎜ x − c ⎞⎟ ⎪ ⎝c−a⎠ ⎪ 1 ⎩ for x≤a for a≤ x≤b (1) for b≤x≤c for x≥c 276 A. Sachenko, A. Banasik, and A. Kapczyński 1,2 1 μ(x) 0,8 0,6 0,4 0,2 0 0 a 2 4 6 b 8 c 10 Fig. 1. Membership function S applied to fuzzy set high level of security” It is necessary to indicate the meaning of membership function [4]. The first possibility is to indicate similarity between object and the standard. Another is to indicate level of preferences. In that case the membership function is concerned as level of acceptance of an object in order to declared preferences. And the last but not least possibility is to consider it as a level of uncertainty. In that case membership function is concerned as a level of validity that variable X will be equal to value x. Another important aspect of fuzzy sets and fuzzy logic is possibility of fuzzyfication – ability to change sharp values into fuzzy ones and defuzzyfication as a process of changing fuzzy values into crisp values. That approach is very useful in case of natural language problems and natural language variables. Fuzzyfication and defuzzyfication is also used in analysis of group membership. It is the best way of presenting average values in order to whole set of objects I ndimensional space. This space may be a multicriteria analysis of the problem. It is well known that there are a lot of practical applications of fuzzy techniques. In many applications, people start with fuzzy values and then propagate the original fuzziness all the way to the answer, by transforming fuzzy rules and fuzzy inputs into fuzzy recommendations. However, there is one well known exception to this general feature of fuzzy technique applications. One of the main applications of fuzzy techniques is intelligent control. In fuzzy control, the objective is not so much to provide an advise to the expert, but rather to generate a single (crisp) control value uc that will be automatically applied by the automated controller. To get this value it is necessary to use the fuzzy control rules to combine the membership functions of the inputs into a membership function μ(u) for the desired control u. This function would be a good output if the result will be an advise to a human expert. However, our point o concern is in generating a crisp value for the automatical controller, we must transform the fuzzy membership function μ(u) into a single value uc. This transformation from fuzzy to crisp is called defuzzification [3]. One of the most widely used defuzzification technique based on centroids is centroid defuzzification. It is based on minimizing the mean square difference between The Concept of Application of Fuzzy Logic 277 the actual (unknown) optimal control u and the generated control uc produced as a result. In this least square optimization it is possible to weigh each value u with the weight proportional to its degree of possibility μ(u). The resulting optimization problem [2]: ∫ μ (u ) ⋅ (u − u ) c 2 du → min uc (2) can be explicitly solved if there is a possibility of differentiation the corresponding objective function by uc and equate the resulting value to 0. The result of it is a formula [2]: uc = ∫ u ⋅ μ (u )du ∫ μ (u )du (3) This formula is called centroid defuzzification because it describes the ucoordinate of the center of mass of the region bounded by the graph of the membership function μ(u). As it was mentioned before fuzzy sets and fuzzy logic is a way to cope with qualitative and quantitative problems. That possibility is a great advantage of presented approach and it is very commonly used in different fields. That provides us a possibility of using its mechanisms in many different problems and it usually gives reasonable solutions. 4 The Use of Fuzzy Logic in Biometric Authentication Systems There are two main characteristics of biometric authentication system: false acceptance rate and false rejection rate. The false acceptance rate can be defined as relation of number of accepted authentication attempts to number of all attempts undertaken by impostors. Authentication attempt is successful only if confidence score resulted from comparison of template created during enrolment process with template created from current authentication attempts eqauls or is greater than specified threshold value. The threshold value can be specified apriori basing on theoretical estimations or can be defined based on requirements from given environment. For example for high security environments the importance of false acceptance errors is greater than of false rejection errors; for low security environments the situation is quite opposite. Threshold is the parameter which defines the levels of false acceptance and false rejection errors. One of the most popular approach assumes that threshold value is chosen at level were false acceptance rate equals false reject rate. In our paper we consider the theoretical biometric authentication system with five levels of security: very low, low, medium, high, very high and a main error considered is only a false acceptance error. The security level is associated with a given level of false acceptance error and the values of false acceptance rates are obtained emipirically from given set of biometric templates. Obtained false acceptance rates are function of threshold value which is expressed precisely as a value from range 0 to 100. 278 A. Sachenko, A. Banasik, and A. Kapczyński In biometric systems the threshold value can be set globally (for all users) or individually. From perspective of security officer responsible for effictient work of whole biometric system the choice of indivual thresholds requires setting as many thresholds as number of users enrolled in the system. We propose the use of fuzzy logic as a mean of more natural expression of accepted level of false acceptance errors. In our approach the first parameter considered is the value of false accept rate and basing on which we the level of security is determined which is finally transformed into threshold value. Step-by-step proposed procedure consists of three steps. In fist step for a given value of false acceptance rate we determine the value of the membership functions for given level of security. If we consider five levels of false acceptance rate, e.g. 5%, 2%, 1%, 0.5% and 0.1% than for each of those levels we can calculate the values of membership functions to one of five levels of security: very low, low, medium, high and very high (see fig. 2). μ Fig. 2. Membership functions for given security levels (S). Medium level was distinguished. In second step through appropriate application of fuzzy rules we receive a result of fuzzy request of the threshold value. Those rules are developed in order to obtain an answer to a question about the relationship between threshold (T) and the specified level of security (S): Rule Rule Rule Rule Rule 1: 2: 3: 4: 5: IF IF IF IF IF “S “S “S “S “S is very low” THEN “T is very low” level is low” THEN “T is low” is medium” THEN “T is medium” level is high” THEN “T is high” is very high” THEN “T is very high”. In third step we apply defuzzyfication during which the fuzzy values are transformed based on specified values of the membership functions and point a fuzzy centroid of given values. Our approach was depicted on fig. 3. For example if we assume that the false acceptance rate is 0.1 and is fuzzified and belongs to "S is high" with value of the membership function of 0.2 and belongs to "S is very high" with value of the membership function of 0.8. Then, based on rule 4 and rule 5 we can see that threshold value is high with the value of membership function equaled to 0.2 and threshold value is very high at the The Concept of Application of Fuzzy Logic 279 Fig. 3. Steps of fuzzy reasoning applied in biometric authentication system value of membership function equaled to 0.8. The modal established at the threshold value of membership functions shall be: 10 (very low level), 30 (low level), 50 (medium), 70 (high level), 90 (very high level). The calculation of fuzzy centroid is carried out by the following calculation: T = 90 ⋅ 0.8 + 70 ⋅ 0.2 = 86 (3) In this example, for the value of false acceptance rate of 0.1, the threshold value equals to 86. 5 Conclusions The development of this concept in the use of fuzzy logic to determine the threshold value associated with a given level of security provides an interesting alternative to the traditional concept to define threshold values in biometric authentication systems. References 1. Kapczyński, A.: Evaluation of the application of the method chosen in the process of biometric authentication of users, Informatica studies. Science series No. 1 (43), vol. 22. Gliwice (2001) 2. Kreinovich, V., Mouzouris, G.C., Nguyen, G.C., H.T.: Fuzzy rule based modeling as a universal approximation tool. In: Nguyen, H.T., Sugeno, M. (eds.) Fuzzy Systems: Modeling and Control, pp. 135–195. Kluwer, Boston (1998) 3. Mendel, J.M., Gang X.: Fast Computation of Centroids for Constant-Width Interval-Valued Fuzzy Sets. In: Fuzzy Information Processing Society. NAFIPS 2006, pp. 621–626. Annual meeting of the North American (2006) 4. Zadeh, L.A.: Fuzzy sets. Information and Control 8 (1965) 5. Zhang, D.: Automated biometrics. Kluwer Academic Publishers, Dordrecht (2000)
© Copyright 2025 Paperzz