publication . Article . 2010

Evolutionary Algorithms Application Analysis in Biometric Systems

Antanas Čenys; Nikolaj Goranin;
Open Access
  • Published: 01 Jan 2010 Journal: Journal of Engineering Science and Technology Review, volume 3, pages 70-79 (issn: 1791-9320, eissn: 1791-2377, Copyright policy)
  • Publisher: Eastern Macedonia and Thrace Institute of Technology
Wide usage of biometric information for person identity verification purposes, terrorist acts prevention measures and authentication process simplification in computer systems has raised significant attention to reliability and efficiency of biometric systems. Modern biometric systems still face many reliability and efficiency related issues such as reference database search speed, errors while recognizing of biometric information or automating biometric feature extraction. Current scientific investigations show that application of evolutionary algorithms may significantly improve biometric systems. In this article we provide a comprehensive review of main scien...
ACM Computing Classification System: Data_MISCELLANEOUS
free text keywords: genetic, algorithm, evolutionary, biometry, Engineering (General). Civil engineering (General), TA1-2040, Technology (General), T1-995, Computer science, Biometrics, Information retrieval, Authentication, Scientific method, Evolutionary algorithm, Biometric system, Data mining, computer.software_genre, computer, Reference database, Still face, Feature extraction
42 references, page 1 of 3

1. J. Abbazio, S. Perez, D. Silva, R. Tesoriero, F. Penna and R. Zack, Proc. Student-Faculty Research Day, CSIS, New York, USA, pp. C1.1-C1.8 (2009).

2. A. Jain, R. Bole and S. Pankanti, BIOMETRICS: Personal Identification in Networked Society, Kluwer Academic Press, Boston (1999).

3. J. D. Woodward, Biometrics: A Look at Facial Recognition, RAND Corporation (2003).

4. U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain, Proc. of the IEEE, 92, 948 (2004).

5. S. Pankanti, S. Bolle and A. K. Jain, IEEE Computer (Special Issue on Biometrics), 33, 46 (2000).

6. D. Hurley, M. Nixon and J. Carter, Computer Vision and Image Understanding, 98, 491 (2005).

7. L. Biel, O. Pettersson, L. Philipson and P. Wide, IEEE Transactions on Instrument and Measurement, 50, 808 (2001).

8. K. V. R. Ravi and R. Palaniappan, Soft Computing, 10, 163 (2006).


10. D. E. Goldberg, Genetic Algorithms in Search, Optimization,and Machine Learning, Addison-Wesley (1989).

11. J. Huang and H.Wechsler, Proc. of 2nd International Conference on Audio and Video-Based Biometric Person Authentication (AVBPA), Washington, DC, USA, 8pp. (1999).

12. J. Holland, Adoption in natural and artificial systems, The MIT press (1975).

13. K. S. Tang, K. F. Man, S. Kwong and Q. Hem, IEEE Signal Processing Magazine, 13, 22 (1996).

14. N. Goranin, A. Cenys, Information Technology And Control, 37, 133 (2008).

15. I. A. Ismail, N. A. ElRamly, M. A. Abd-ElWahid, P. M. ElKafrawy and M. M. Nasef, International Journal of Computer Science and Information Security, 6, 316 (2009).

42 references, page 1 of 3
Any information missing or wrong?Report an Issue