Analyzing a multimodal biometric system using real and virtual users
Bioreactor

Design and development of a highly efficient integrated computer system is very important for monitoring and control of laboratory bioreactors equipped with a variety of analyzers.
• An HPLC analyzer evaluates the chromatograms with its own software. • A mass spectrometer has sophisticated software for operation, evaluation and instrument checking within their units.
• The system can be demonstrated on different fermentations which illustrate sensor fusion control, multivariate statistical process monitoring, adaptive glucose control and adaptive multivariate control.
• The real-time expert system can be used for processing and carrying out a number of computational tasks
including partial least-square regression, principal component analysis, artificial neural network modelling, and adaptive control.
4指纹指纹Fingerprint...

摘要随着电子信息化浪潮的到来传统的身份鉴定方式密码于是生物识别技术应运而出如步态提出并实现了一套基于此两种生物特征的身份验证系统发展历史和应用针对本文利用到的指纹识别和掌型验证两种技术预处理增强并结合本文的设计目的提出了适合本系统的各种技术方案融合指纹和掌型的身份验证系统分成指纹验证和掌型验证两个子系统对算法模块进行介绍基于方向场在二值化以及最后利用细节点构造Delaunay三角形对指纹图像进行比对验证的算法并提取其特征点当然以提高系统的安全级别与目前文献上其他的类似算法进行了比较提出了将来工作的方向身份验证掌型验证AbstractAccurate personal identification is becoming more and more important to the operation of our ever increasingly electronically inter-connected information society. Traditional personal identification methods, such as: key, password, ID card, definitely can not satisfy the increasing security requirements. Due to its uniqueness and stability, biometric technique has become the most promising candidate. In this thesis, we focus on fingerprint and hand geometry verification, these two kinds of biometric techniques, and propose a bimodal biometric verification system based on these two biometrical characteristics.The origin and developing history of biometrics are introduced firstly, then we conclude and compare the advantages and deficiencies of all biometric characteristics, also the application area of each biometric technique is given. The popular topic of current biometrics research—multimodal biometric system is emphasized. Because the fingerprint and hand geometry are utilized in this thesis, a comprehensive literature investigation is done on these two topics. All the key techniques, like: fingerprint image segmentation, fingerprint enhancement, minutia extraction, fingerprint matching, hand salient points extraction and matching, are classified into several classes. According to the requirements of our verification system, the appropriate techniques are picked out. In chapter 3, a bimodal biometric verification system based on fingerprint and hand geometry is specified. After clearing the diagram of the verification system, we divide the whole system into two parts---fingerprint subsystem and hand geometry subsystem, to describe the model algorithm designation. In fingerprint verification subsystem, a segmentation algorithm based Canny edge detector is introduced first, then Gabor filter is applied to enhance the fingerprint image. Following the traditional way of extracting minutia, we use thresholds and morphological thinning operators to get the skeleton of fingerprint image. Here, with the help of tracking fingerprint ridges in thinned fingerprint images, those spurious minutiae connected with ridges are eliminated; later, ridge breaks are repaired according to both foreground and background characteristics. Finally, fingerprint matching is conducted on the Delaunay triangulation, which is constructed on the filtered minutia. For hand geometry verification subsystem, we explain that how toconvert an enrolled hand image into a black-and-white image, and how to extract salient points from the hand image. Finally, distance matrix matching is applied to compare two hand vector features. Of course, as a bimodal system, the strategy of fusing the two matching scores of fingerprint and hand geometry to make the final decision is described at the end of this thesis.We compare our experiment results with others’ in the existing literature to confirm the advantages of our algorithm, also try to analyze the deficiencies of the system. Finally, we conclude the whole thesis and give out the future plan.Keyword: Personal Verification, Biometrics Identification, Fingerprint Verification, Hand Geometry Verification, Feature Extraction, Feature Matching独创性声明本人声明所呈交的学位论文是我个人在导师指导下进行的研究工作及取得的研究成果本论文不包含任何其他个人或集体已经发表或撰写过的研究成果本人完全意识到本声明的法律结果由本人承担日期使用学位论文的规定允许论文被查阅和借阅可以采用影印在年解密后适用本授权书请在以上方框内打学位论文作者签名年月日日期1 绪论身份识别是人们日常生活现代社会对于人类自身身份识别的准确性身份标识物品有钥匙身份标识知识包括用户名往往将这两者结合起来首先是使用方便其次是经过较长时间的实际应用后ID卡等在人们心中具有较高的可信度一旦他人获得标识物品电子银行等的日益普及传统的身份鉴定方式无法满足当前信息化时代的要求于是1.1 生物识别技术的由来生物识别而是人类本身所固有的生理和或行为特征与传统的暗语不易伪造的特点典型的个体生理特征有掌纹脸部特征典型的个体行为特征指通过学习后天获得的特征步态等[1]ÒѾ-ÒýÆðÁ˹ú¼ÊѧÊõ½çȨÍþ»ú¹¹¹À¼ÆÎ´À´ÈËÃÇÔÚÍøÉϹºÎï»ò½»Ò×ʱ都需要先在生物识别仪上进行身份认证逐渐自成系统有望在10年内达到每年20亿美元的规模[1]²¢²¿ÊðÁËÏà¹ØÑо¿ÏîÄ¿µ«Ñо¿²½·¥´óÌåÉϸú¹ú¼Êͬ²½ÕÆÎÆ1.2生物识别特征的要求及分类任何人体的生理和行为特征都可以用作生物识别的依据1独特性3易采集性符合以上要求的还是不够的性能速度接受程度抗伪装和抗攻击性而且不会对使用该系统的用户造成生理伤害掌纹人脸视网膜等等敲击键盘的频率即指利用个体的某一生理特征或某一行为特征来进行身份验证图1-1 生物鉴定系统框图由图1-1可知登记单元验证单元Enrollment²¢¸ù¾ÝÐèÒª±£´æÔÚÓ²ÅÌÉÏ»òÕß´Å¿¨ÉϵÈVerification³éÈ¡ÌØÕ÷Êý¾Ý这两个单元对时间的要求不同对处理时间要求不高On-Line1识别VerificationÒ»¶ÔÒ»ÈçÍøÂç½ÓÈëÊ×ÏÈÊäÈëÕʺÅIC卡等而传统的系统中这样生物特征取代了传统的口令和密码某人是否为其宣称的那个人Identification×îºóϵͳ¼ø¶¨³öÊäÈëµÄÌØÕ÷¶ÔÓ¦µÄÉí·ÝÒ»¶Ô¶à´ËÈËÊÇË-Á½ÖÖģʽϵÄϵͳ½á¹¹²»¾¡Ïàͬµ«ÆäÀëÏß²¿·Ö¶Ôʱ¼äÒªÇó±Èʶ±ðϵͳ¸ß±£´æ×ÅÖÚ¶àµÄÌØÕ÷Êý¾Ý¾¯Îñ˾·¨¹¤×÷ÖÐʹÓõÄÉúÎï¼ø¶¨ÏµÍ³¼´Îª´ËÀàϵͳµÄÖ÷ÒªÓ¦ÓÃʵÀý¼´ÈÚºÏÕÆÐͺÍÖ¸ÎÆµÄÉí·ÝÑé֤ϵͳ答而不需要在较大的模板库中去搜索来回答这样系统的工作量相对较小也是众多厂商的主要研究对象是的答案是设定不同的门限或者对于每一个测试者真实用户被接收真实用户被拒绝假冒者被接收假冒者被拒绝2和3是错误输出错误拒绝率False Acceptance Rate而FRR 也被称作FNMR¼´FRR和FARFRR和FAR是相关的一对量反之较低的FAR对应较高的FRR则表明系统不会将假冒者鉴定为真实用户由于本文研究的是验证系统除了准确性之外对于验证系统特征提取和比对和比对时间对于识别系统输入特征同大量的保存在数据库中的模板相比对现在它开始在民众生活中广泛应用应用程序的登陆应用生物鉴定技术虹膜门禁系统等等更是生物鉴定技术的用武之地小区门禁系统都已经引入了生物鉴定技术美国的宾夕法尼亚州以防止冒领事件的发生1.6 各种生物识别技术的比较用来鉴定身份的生物特征可以是生理特征也可以是行为特征一般而言生理特征是先天的而且在人的一生中可能发生变化更具有独特性目前使用中的或者在研发之中的生物特征技术有九种指纹虹膜语音指纹视网膜签名和语音是行为特征图1-2 列出6种常见的生物特征(a) (b) (c)(d) (e) (f)图1-2常见的生物特征a指纹虹膜e语音1.6.1人脸人脸(Face)是人们在日常生活中辨别亲属识别技术基于这些唯一的特征时是非常复杂的在面部被捕捉之后眼睛一个算法和一个神经网络系统加上一个转化机制就可将一幅面部图像变成数字信号面部识别是非接触的易于为大众接受使用者面部的位置与周围的光环境都可能影响系统的精确性面部识别技术的改进依赖于提取特征与比对技术的提高对于因人体面部的如头发机器学习功能必须不断地将以前得到的图像和现在的得到的进行比对同时很难进一步降低人脸识别技术的成本Iris½á¹¹ÖåÎÆºÍÌõÎÆµÈÌØÕ÷µÄ½á¹¹¶øÇÒºçĤÖÕÉú²»±ä×ȫµÄδ¾-¹ý´óÁ¿µÄ²âÊÔûÓÐʵÑéÖ¤Ã÷ɨÃèºçĤ²»»áÓ°ÏìÈËÌ彡¿µµÈµÈÒ²ÊÇÈËÑÛ¾ßÓеÄÎ¨Ò»ÌØÕ÷Ò²±»³ÆÎªV oice-print或者Speech-print[4]ÕâÖÖ¼¼ÊõÒ²Ò×ÓÚΪ´óÖÚËù½ÓÊÕ½¡¿µµÄÓ°ÏìÏÖÓм¼ÊõÔÝʱ²»ÄÜ׼ȷµÄ¼ø±ðÉùÒô1.6.4指纹指纹指纹形成于胎儿期现在已经基本了解了指纹的各项特性由于指纹鉴定的长期使用以及指纹鉴定的效果显著大众还难以接收指纹鉴定的民用需要新的算法以降低复杂度而且包括手掌皮肤上的曲肌纹和腕纹等尽管掌纹曲线长度尺寸及掌纹曲线之间的间距会随年龄的增大而变化只有在有局部明显的外伤或各种引起深层皮下组织溃坏的后天性疾病时不同个体的花纹即使相似曲肌纹和腕纹等的形态有一定的规律因此也可以作为生物特征进行身份识别并有商业产品流通包括手指的长度长度以及形状等因此十分适合带宽或者记忆容量受限制的系统进行使用目前研究表明掌型的唯一性不够因此掌型通常用来验证身份在一些机场已经开始了应用另外由于掌型特点的简单将其匹配分数进行融合将在第二章详细介绍掌型识别技术各种生物识别技术都有其自身的优缺点不能一概而论比如说一般认为指纹鉴定和虹膜鉴定在准确度上和速度上优于声音鉴定表1-1 各种生物鉴定技术比较[1]生物鉴定技术通用性独特性性能易采集性接受度抗假冒能力签名低低低高高低语音中等低低中等高低面部高低中等高高低面部温度谱高高低高高高虹膜高高高中等低高视网膜高高中等低低高掌型中等中等中等高中等中等手掌静脉图中等中等中等中等中等中等指纹中等高高中等中等高1.7 生物识别技术的融合从1.6节中比较的结果我们无法摒弃任何一种生物特征无疑将提高系统的准确率将人脸和指纹进行融合的系统将适用于老年人无法满足现有的指纹验证技术同时事实上, 将多种生物特征进行融合是当前生物识别技术发展的一个热门的发展方向那么那些信息可以融合在一起用来提高系统的性能呢1半导体采集仪½«¶àÖÖÉúÎïÌØÕ÷ÈÚºÏÔÚÒ»Æð½øÐÐʶ±ðͨ³£À´ËµÉãÏñÍ·¶ÔÈËÁ³ÅÄÕÕÊÇΪÁËÌá¸ßϵͳµÄʶ±ð¾«¶È±¾ÎÄËù½éÉܵÄÈÚºÏÖ¸ÎÆºÍÕÆÐ͵Äϵͳ¾ÍÊôÓÚ´ËÀàµÄÈںϷ½Ê½3¶¼¿ÉÒÔ½áºÏÆðÀ´ÑéÖ¤¸ÃÓû§µÄÉí·ÝÕâÖÖÈںϷ½Ê½°üÀ¨µ½²»Í¬ÌØÕ÷ÌáÈ¡¼°Æ¥ÅäËã·¨µÄÈںϼ´ÔÚÑéÖ¤»òÕßʶ±ð¹ý³ÌÖÐÈç¶à½Ç¶ÈÈËÁ³Í¼ÏñµÄÆ´½ÓµÈ¸÷Óг¤´¦µ«ÊÇ×ÜÌåÉÏ˵À´ÒòΪÈں϶àÖÖÉúÎïÌØÕ÷µÄϵͳ²»½ö½öÄÜÌá¸ßϵͳµÄÑéÖ¤¾«¶È´Ó¸÷ÖÖÎÄÏ×Ò²¿ÉÒÔ¿´³öÌá³ö½«Ö¸ÎƺÍÕÆÐÍÈÚºÏÔÚͬһÑé֤ϵͳÖÐ图1-3 五种常见的融合多种生物识别技术的方式1.8 本文的结构本文提出了一种融合指纹和掌型的身份验证系统的设计方案将掌型与指纹结合起来对用户进行验证虽然目前已经有许多融合多种生物特征的系统存在多种生物识别技术的融合由于指纹验证的精确性和掌型匹配的快速简单互为补偿理的决策机制可以大大提高验证系统的准确性和验证速度在如下4个方面做了较为深入的研究: 指纹图像的分割及预处理本文也将结合这4个方面结构如下总体阐述了生物识别技术的由来第2章并分析指纹和掌型识别技术中的技术难点和发展方向系统设计详细描述基于指纹和掌型的身份验证系统的设计方法并给出各部分的实验结果实验结果及算法分析并且对国内外目前已有的类似系统进行比较第5章2 核心技术研究本文提出的身份验证系统利用到指纹和掌型这两种常见的生物特征尤其是在指纹识别方面的技术文献数不胜数使我们的工作能够一开始就基于前人的积累之上对这两种典型的模式识别技术进行分析和总结指纹识别技术是目前最成熟现在指的指纹识别技术是基于计算机的一种自动指纹识别系统AFISÈ´¶¼ÊDzÉÓõÄÈ˹¤Ö¸ÎÆ×¨¼Ò·ÖÀà¼ø¶¨µÄ·½·¨¶¼·¢ÏÖ¹ýÓйØÖ¸ÎƵÄÎï¼þµ«ÊÇȴûÓÐÈκÎÕýʽµÄ¿ÆÑ§ÎÄÏ×Äܹ»Ö¤Ã÷Õâ¸öÊÂʵGalton等人发起[5],[6]Edxard Henry 建立了著名的Henry System¸÷µØ½¨Á¢µÄÖ¸ÎÆ¿âѸËÙÅòÕÍÔÚ¼ÆËã»ú·¢Ã÷Ö®ºóFBI开始使用一种自动指纹识别的设备因此下面只针对自动指纹的识别技术做出介绍1) 指纹的采集指纹特征的提取指纹的匹配指纹的分类也是其中的一个模块而不将其作为系统的一个模块做详细介绍应用环境图2-1 自动指纹识别系统框图由图2-1可知依次是用户接口模块细节点数据库模块即IDÃŽûϵͳ¿ÉÌṩС¼üÅÌÈÃÓû§ÊäÈëÉí·Ý´úºÅ»òÕßÌṩ¶Á¿¨»úÌá¹©Ö¸ÎÆ²É¼¯ÒǸøÓû§Â¼ÈëÖ¸ÎÆ»ò±»ÊÚȨÓû§(2)用户的指纹模板系统根据用户输入的标识数据库可以保存在系统中或者在外部存储媒介上可以保存在指纹锁内部的存储器上细节点数据库可以保存在硬盘上动柜员机系统的指纹验证系统如果每次用户使用ATM卡时可以考虑把指纹模板保存在用户的ATM卡上指纹模板的大小由系统的要求和匹配采用的算法决定验证效果越好指纹登记模块的任务是将用户的标识数据和指纹登记到系统数据库中提取出特征从图2.1可以看出之后经过质量评测子模块对指纹质量评价指纹有效面积大对于这些图像并标志出有效块指纹验证模块用于验证用户是否为真实用户或授权用户系统获取该指纹的数字图像产生输入指纹模板判定用户是否通过验证将进行图像增强针对上述每一模块的关键技术指纹特征提取并总结这4种核心技术的研究现状在法庭刑事应用中疑犯的手指先染上黑色的墨水也可以将印记的指纹转化为数字图像离线采集过程而现在几乎所有的民事和刑事的自动指纹识别系统均支持按照采集过程是否在线1和inkedfingerprintÖлñµÃµÄÖ¸ÎÆµ«ÖÊÁ¿ÄÑÒÔ¿ØÖƸüÊÇ´óÖÚÎÞ·¨½ÓÊܵı£´æÖ¸ÎÆÖ±½ÓÇÖ·¸ÈËȨ˾·¨ÖÐÆðןܴó×÷ÓÃ活体采集指纹指直接从手指提取指纹而无需借助中间媒介这些方式的共同特点是将手指按压在传感器上当然这三种方式都有不同的特点大多数的光学录入设备是利用CCD将指纹图像转换成数字图像它经历了长时间实际应用的考验价格不高并能提供分辨率为500dpi的图像采集仪台板必须足够大才能获得质量较好的图像这种潜在指印降低了指纹图像的质量膜手指则代表另一个极而且体积小巧不过也由于体积较小超声波录入设备采取传送声波并通过手指它具有光学录入和硅芯片录入的优点其设备也比较昂贵表2-1将各种采集技术的性能做了比较表2-1 光学汗多的和稍脏干手指好的手指成像模糊属于硅芯片录入技术的采集仪3002.1.3 指纹特征提取技术指纹是由死亡的手指表皮的角质层细胞组成的在一幅指纹图中见图2-2¿ÉÒÔ¶¨ÒåÕâÖÖÎÆÀí·½ÏòÐÅÏ¢×÷ÎªÖ¸ÎÆµÄÈ«¾Ö 特征其中全局特征指的是指纹的奇异点而奇异点就是根据指纹的方向场计算出来的图2-2 脊线谷线示意图bb因为绝大多数的指纹细节点提取算法均属于此类方法有效的防止了噪声的干扰导致算法的计算量较大另一类方法是直接从指纹灰度图中提取细节点, 此方法于97年首次由Mario提出[8]È»ºó×ö³öÊÇ·ñ´ïµ½ÖÕÖ¹µã»òÕß·Ö²æµãµÄÅÐ¶ÏÆä·½·¨ÊÇÀûÓÃÑØ×ż¹Ï߸ú×Ù·½ÏòÉϼ¹Ï߻ҶȵÄÁ¬ÐøÐÔ¶ø¶¯Ì¬»ñµÃ¸ú×Ù²½³¤Æä·½·¨ÊÇÀûÓü¹Ï߸ú×Ù·¨ÏòÉÏÁ½±ß×î½üµÄÁ½¸ö¹ÈÏßλÖõĹØÏµÀ´Åж¨ÖÕ½áµãÖ±½Ó»Ò¶È¸ú×ÙÌáÈ¡Ëã·¨²»ÓöÔȫͼ×öÂ˲¨µ«ÊÇÒ²ÈÝÒ×Êܵ½ÔëÉùµÄÓ°ÏìÌØÕ÷ÌáÈ¡µÄÄ¿µÄÊÇΪÁ˺óÐø²½ÖèÆ¥Åä×öÆÌµæÂ˲¨µÈ·½Ê½Æ¥Åä因此人们也提出了其他的指纹特征将指纹对不同频段的Gabor滤波器的结果作为指纹的特征进行匹配在[12]½«Ï¸½Úµã×÷ÎªÖ¸ÎÆµÄ¾Ö²¿ÌØÕ÷´«Í³µÄÌáȡϸ½ÚµãµÄËã·¨µÄ׼ȷ¶ÈºÍÊÊÓùã¶È¶¼ÓÅÓÚÖ±½Ó»Ò¶ÈÌáÈ¡µÄËã·¨Òò´Ë¿ª·¢³öÒ»Ì×ÊôÓÚ×Ô¼ºµÄÖ¸ÎÆ·Ö¸î2.1.4 指纹分类技术指纹的分类是根据指纹中心区域的脊线总体特征来进行的根据不同的总体特征arch图2-4列出了这五种指纹的例子因为如何将指纹识别技术应用到大规模的指纹库上是当前尚未解决的一个问题这样在指纹库中指纹的分类算法有基于句法因此没有对指纹的分类技术进行研究从而提高验证指纹的速度图2.4 不同类型的指纹而且成功的匹配来自同一手指的指纹将指纹的匹配方法分为两类细节点模型使用细节点来描述指纹特征X.D. Jiang等人使用的基于局部与整体结构的细节点匹配算法[17]½«Í¼ÏñÆ¥Åäת»¯ÎªÄ£Ê½Ê¶±ðµÄÎÆÀíÆ¥ÅäÎÊÌâ[13]ͨ¹ýµãģʽƥÅäµÄ·½Ê½±È½ÏÆäÏàËÆÐÔ¾ÜʶÂÊÕâÁ½ÏîÖ¸±êµÄ¸ßµÍÈçÄÜÁ¿×îС»¯½Ç¶È½áºÏÄ£ÄâÍË»ðµÄµãÆ¥ÅäµÈ[18][19][20]¿É¿¿¶È²»¹»µÈÎÊÌâ针对指纹匹配中的点模式匹配问题基于串距离2Ŀǰ´ó¶àÊýµÄÆ¥Åä·½°¸ÊôÓÚ¼¸ºÎÆ¥Å伸ºÎÆ¥ÅäÒ»°ãÀûÓü¸ºÎ¹ØÏµÅжÏÁ½×éϸ½Úµã¼¯Î»ÖÃÌØÐÔµÄÏàËÆ³Ì¶È´ò·ÖÔ½¸ßÆ¥Åä·ÖÊý´óÓÚãÐÖµ·´Ö®Æ¥Åäʧ°ÜÊ×ÏÈͨ¹ýµü´ú¹ý³Ì¿ÉÒÔ´ïµ½½Ï´óµÄÆ¥ÅäÏàËÆ¶È¼ÆËãÆ¥Åä¶ÈÐýת¼ÆËãÔڹ̶¨±ß¿òÖÐÆ¥ÅäµÄϸ½Úµã¶ÔÊý [21]´ËËã·¨½«Ö±½Ç×ø±êϵÖеÄÌØÕ÷ϸ½Úµã¼¯Õâ¸öËã·¨Ê×ÏÈÓÃ×îС¶þ³ËÄâºÏ·¨¹À¼Æ³öÁ½×éÌØÕ÷µã¼¯µÄÐýת½Ç¶ÈºÐУ׼µãλÖ÷ֱðÒÔij¸öУ׼µãΪÖÐÐÄת»»µ½¼«×ø±êÖн«½á¹û¹æ·¶»¯ÎªÆ¥Åä·ÖÊý[18]¿ÉÒÔ½«¾Ö²¿µÄϸ½Úµã¼¯¹¹³ÉÈý½ÇÐλòÕßÐÇ×´½á¹¹À´½øÐÐÆ¥Åä¶øÇÒÐèÒª±£´æµÄϸ½ÚµãÐÅÏ¢¼òµ¥ÇÒ׼ȷ¿É¿¿¼¯ÖÐÔÚ¶ÔÖ¸ÎÆµÄÍØÆË½á¹ûµÄÑо¿ÉÏÈçÅׯúÁË´«Í³½¨Á¢µÄ¸ÕÐÔ×ø±êϵ½¨Á¢ÊÊÓÚÖ¸ÎÆµÄµ¯ÐÔÄ£ÐÍÔÚ°´ÕÕµ¯ÐÔ½çÏ޺еķ½·¨¼ÆËãÆ¥ÅäÉϵÄϸ½Úµã¶Ôµ«ÊÇÈçºÎÓÐЧµÄ½¨Á¢µ¯ÐÔÄ£ÐÍÈÔÊÇÒ»¸öδÄܽâ¾öµÄÎÊÌâ±¾ÎĵÄÖ¸ÎÆÆ¥Åä·½°¸¾ÍÊÇÊôÓÚ´ËÀàÐÍÈ»ºó¸ù¾Ý¶ÔÓ¦Èý½ÇÐεÄÏàËÆ¶È×÷³öÅжÏ2.2 掌型识别技术与指纹浩瀚的文献相比但是却已经有一套掌型识别的商业系统在美国发行国内许多公司也购买了Recognition[35]公司的代理权在国内销售掌型技术几乎被Recognition公司所垄断却是很早就被人们所意识到的掌型(Hand-Geometry)¾ÍÊÇÀûÓÃÊֵļ¸ºÎÐÎ×´¿í¶ÈÊÖÕÆµÄÐÎ×´ÐÎ×´µÈ¶¼ÊDz»ÏàͬµÄ因此可以通过掌型来验证人的身份所以掌型不能用来识别每种生物特征都有其优点和缺点对于掌型虹膜等生物特征低分辨率的光学镜头或者普通的扫描仪就可以采集录入人脸等的采集对光照条件极为敏感由于所需要提取的特征只是一些基本的几何特征对光照没有特殊要求用户的接受程度十分重要救济餐的发放等场合在这种情况下容易被用户接受但是可以肯定掌型作为一种简单易用的生物特征是有其广泛的应用空间的2.2.1 采集掌型图像相对于指纹图像的采集普通的数码相机仍需要建造相关的辅助机械设备也有实验室开发出了光学镜头的相关设备对手掌进行拍摄最终的目的都是为了得到一幅背景简单的清晰手掌的图片以便后续的提取操作采集得到的图像µÆ¹â´ÓÊÖÕÆÏ·½ÉäÀ´ÓÉÓÚ·ÅÖÃÁË4个规范手掌姿势的支撑柱这是这种拍摄方式的一个好处可以将手掌的侧面图像记录下来这种方式的缺点是同一手掌仍有可能有不同的摆放形式由于支撑柱的影响´ËÀàͼÏñÒ»°ãÊÇÓÉÊýÂëÏà»úÖ±½Ó¶ÔÊÖÕÆµÄÕÆÐÄÅÄÉã»òÕßͨ¹ýÎļþɨÃèÒǵõ½µÄ²ÊÉ«RGB图像但是也必须保证五个手指是分开的这种方式对用户更为友好避免了在拍摄手掌背面时会受到指甲影响的问题在处理这类图像时当然因此这类图像对每个手掌的特征只能从手掌正面进行发掘利用Canon A75在正常光照条件下对掌心一面的手掌进行拍摄得到掌型的原图象尤其是手指的长度不会受到指甲的影响图2-5 辅助数码相机拍摄的机械设备有支撑柱的手掌图像2.2.2 掌型特征提取技术掌型的特征通常由手指的长度见图2-7ͨ³£µÄ×ö·¨ÊÇÏȽ«ÊÖÕÆÍ¼Ïñ´Ó±³¾°·ÖÀë³öÀ´È»ºó²ÉÓñ߽ç¸ú×ÙËã·¨½ÓÏÂÀ´¾ÍÊǽ«5个手指的指尖和4个指缝就可以对上述的手指长度如2.2.1节中说明的提取特征前无需对手掌进行位置校正最好将所有手掌校正成垂直的方向图2-7 常见的掌型特征量S1, S2, S3 分别为食指宽度等基本几何量以外Alexandra在进行匹配25ÕâÖÖÀûÓÃÇúÏßÐÎ×´Æ¥ÅäµÄ·½·¨Ö»ÊÇÔÚ¿ÆÑÐÉϾßÓвο¼¼ÛÖµ¾ÍÍêÈ«±³ÀëÁËÀûÓÃÊÖÕÆÌØÕ÷¼òµ¥ÕâÒ»×î»ù±¾µÄÔ-Ôò¶øÊÇÌá³öÁ˸ü¶àµÄ¼¸ºÎ²ÎÁ¿×÷ÎªÕÆÐ͵ÄÌØÕ÷½øÐÐÆ¥ÅäÕÆÐÍµÄÆ¥Åä¼¼ÊõҲȡ¾öÔÚ2.2.2节中的特征提取技术与指纹众多的特征细节点比较起来如在图2-7中这样对于每个验证的手掌然后根据门限作出判断若匹配分数低于门限值成功如[26]中采用的汉明距离(Hamming Distance)等在文献[26][27] 中引入了更为复杂的分类机Radial BasisFunction Neutral Networksµ«ÊÇͬʱҲÌá¸ßÁ˼ÆËãµÄ¸´ÔÓ¶ÈÏàÓ¦µÄ±È¶Ô·½·¨Ò²¾Í²»Í¬ÁËÈ»ºóÒÔÖÐÐĵãÎª×ø±êÔ-µã½«Á½·ùÊÖÕÆÂÖÀªÍ¼Öصþ¼ÆËãËæÊ±Õë¾ßÌ寫²î(PairwiseDistance Computation) 作为重叠误差进行匹配打分Alexandra采用食指假如能够在模板轮廓中找到一个对应的像素点从而判断这两个手掌是否一致M.Y.Liang [26] 提取一种不同的轮廓匹配方法然后利用BSpline对这个4个边缘轮廓进行拟和与几何参量的匹配算法相比于是然后利用轮廓形状信息做验证各有优势但是由于占用了更多的特征空间去描述掌型特征而采用几何参量组成的向量匹配比对过程也特别快采用这种匹配算法的另一个原因是验证速度快适合于整个系统的操作选择模式。
《词典语篇与多模态》PPT课件

❖ 国外的一些新理论也受到我国学者的关注。例如 评价系统是在系统功能语言学基础上提出的一种 新理论。一些论文对评价系统展开了研究,运用 评价理论对新闻、演说、报刊等语篇进行分析。 还有的文章论述了评价理论在写作、阅读教学中 的作用。
❖ 我国许多学者还运用系统功能语言学理论分析元 话语。元话语显示了作者或说话人构建立场、引 导读者的方式,主要具有语篇功能和人际功能。 一些论文分析了元话语的语境构建功能,分析元 话语在科技论文、学术讲座、公文等语篇的使用 和分布情况。有些论文讨论了元话语在大学英语
词典语篇与多模态
实用文档
功能语言学研究
❖ 功能语言学的研究通常包括了Dik的功能语法、 Halliday的系统功能语法、Van Valin的角色 参照语法、Givón等人的美国功能学派。
❖ 功能语言学的基本出发点:把语言看作人类交 际的工具,语言交际传递的不只是命题信息, 还传递与言语事件有关的其他信息。
实用文档
❖ 在批评语篇分析中,系统功能语言学理论得到 了广泛的应用。这一方面的论文从系统功能语 言学的角度讨论了批评性话语分析的方法,对 新闻、广告、演说、会话、小说展开批评性分 析,揭示隐含在语篇中的权势、控制和思想意 识。
❖ 一些论文还说明批评性语篇分析在语言教学中 的作用以及它与批评性阅读的关系。
实用文档
❖ 近年来,由于技术的发展和社会的变化,多模 态语篇的研究随之出现。我国学者也开始从功 能语言学的角度对PPT演示、电视新闻、教科 书、报刊、广告等的多模态语篇展开分析,分 析语篇的意义构建。
❖ 有的论文还讨论了多模态语篇与语言教学的关 系。
实用文档
实用文档
实用文档
实用文档
❖ 多模态(multimodality)也称多符号 (multi-semiotic),指包括口语、书面语、 图像、图表、空间以及其他可以用来构建意义 的各种符号资源。
模拟ai英文面试题目及答案

模拟ai英文面试题目及答案模拟AI英文面试题目及答案1. 题目: What is the difference between a neural network anda deep learning model?答案: A neural network is a set of algorithms modeled loosely after the human brain that are designed to recognize patterns. A deep learning model is a neural network with multiple layers, allowing it to learn more complex patterns and features from data.2. 题目: Explain the concept of 'overfitting' in machine learning.答案: Overfitting occurs when a machine learning model learns the training data too well, including its noise and outliers, resulting in poor generalization to new, unseen data.3. 题目: What is the role of a 'bias' in an AI model?答案: Bias in an AI model refers to the systematic errors introduced by the model during the learning process. It can be due to the choice of model, the training data, or the algorithm's assumptions, and it can lead to unfair or inaccurate predictions.4. 题目: Describe the importance of data preprocessing in AI.答案: Data preprocessing is crucial in AI as it involves cleaning, transforming, and reducing the data to a suitableformat for the model to learn effectively. Proper preprocessing can significantly improve the performance of AI models by ensuring that the input data is relevant, accurate, and free from noise.5. 题目: How does reinforcement learning differ from supervised learning?答案: Reinforcement learning is a type of machine learning where an agent learns to make decisions by performing actions in an environment to maximize a reward signal. It differs from supervised learning, where the model learns from labeled data to predict outcomes based on input features.6. 题目: What is the purpose of a 'convolutional neural network' (CNN)?答案: A convolutional neural network (CNN) is a type of deep learning model that is particularly effective for processing data with a grid-like topology, such as images. CNNs use convolutional layers to automatically and adaptively learn spatial hierarchies of features from input images.7. 题目: Explain the concept of 'feature extraction' in AI.答案: Feature extraction in AI is the process of identifying and extracting relevant pieces of information from the raw data. It is a crucial step in many machine learning algorithms, as it helps to reduce the dimensionality of the data and to focus on the most informative aspects that can be used to make predictions or classifications.8. 题目: What is the significance of 'gradient descent' in training AI models?答案: Gradient descent is an optimization algorithm used to minimize a function by iteratively moving in the direction of steepest descent as defined by the negative of the gradient. In the context of AI, it is used to minimize the loss function of a model, thus refining the model's parameters to improve its accuracy.9. 题目: How does 'transfer learning' work in AI?答案: Transfer learning is a technique where a pre-trained model is used as the starting point for learning a new task. It leverages the knowledge gained from one problem to improve performance on a different but related problem, reducing the need for large amounts of labeled data and computational resources.10. 题目: What is the role of 'regularization' in preventing overfitting?答案: Regularization is a technique used to prevent overfitting by adding a penalty term to the loss function, which discourages overly complex models. It helps to control the model's capacity, forcing it to generalize better to new data by not fitting too closely to the training data.。
多生物特征识别系统的关键技术

多生物特征识别系统的关键技术①刘映杰 冯晓兰 马义德 杜鸿飞(兰州大学信息科学与工程学院 兰州 730000)摘 要:单生物识别技术一直存在着很多问题,它们在准确率,用户接受程度,成本等方面都有不同的缺点,并且适应于各自的应用场合。
这些问题一般可以由多生物识别技术来克服。
首先对各种不同生物特征识别技术作简要的介绍,然后分析多生物特征提出的背景,并着重阐述多生物特征识别技术系统的模型和各种数据融合技术及其相应的研究发展情况,提出了它的应用前景。
关键词:身份识别;多生物特征识别;数据融合中图分类号:TP391A Survey on Multi-biometrics Identification T echniquesLiu Yingjie Feng Xiaolan Ma Yide Du H ongfei(C ollege of In formation Science and Engineering,Lanzhou University,Lanzhou 730000)Abstract:Unim odal biometric systems have to contend with a variety of problems such as nicety acceptance and cost.S ome of these limitations can be addressed by deploying multim odal biometric systems.Firstly,This paper summarizes briefly s ome biometric identification techniques.Then I t introduces the background of multi-biometrics.its principle,and approaches are introduced.The prospect and develop2 ment of biometrics are als o analyzed.K ey w ords:pers onal identification,multi-biometrics,data fusionClass number:TP3911 引言身份认证是保护系统的必要前提,传统的认证方式往往采用密码,证件或者一些已有的特定的知识作为使用者进入系统内部进行操作的权限,但是这种认证方式存在很多缺陷。
asymptotic analysis缩写

asymptotic analysis缩写
Asymptotic Analysis 的意思是 "极限分析",指的是在算法或
数学模型中,当样本数量趋近于无穷大时,所计算的结果或估计值趋
向于某个确定的极限值,通常称为无穷大极限或无穷级数。
这种分析方法常用于对连续函数、概率分布等进行分析和估计。
例如,在数学中,当函数 $f(x)$ 在 $x=a$ 处取得极小值时,可
以通过引入 $a$ 的无穷大来估计 $f(x)$ 的值。
这个估计值可以表示为 $f(a) approx lim_{x to a^-} f(x)$。
其中,$lim_{x to a^-} f(x)$ 表示当 $x$ 趋近于 $a$ 时,$f(x)$ 的值趋近于某个值,这个值称为极限值。
Asymptotic Analysis 是一种重要的数学分析方法,可以帮助研究者更好地理解并预测复杂系统的性能和行为,尤其是在当样本数量趋近于无穷大时,系统的行为可能会表现出非常惊人的规律和特性。
高中英语科技论文翻译单选题40题

高中英语科技论文翻译单选题40题1. In the field of artificial intelligence, the term "machine learning" is often used to describe a process of ____ data to make predictions.A. analyzingB. analysedC. analysesD. analysis答案:A。
本题考查动词形式。
“analyzing”是动词“analyze”的现在分词形式,在句中作介词“of”的宾语,用动名词形式。
“analysed”是过去分词形式,不符合此处语法。
“analyses”是第三人称单数形式,也不符合。
“analysis”是名词形式,不能作宾语。
2. The development of new energy sources requires advanced technologies and ____ research.A. extensiveB. intensiveC. expensiveD. expansive答案:B。
“extensive”意为“广泛的”;“intensive”意为“深入的,集中的”;“expensive”意为“昂贵的”;“expansive”意为“广阔的,辽阔的”。
在科技论文中,新能源的发展需要深入集中的研究,所以选B。
3. The concept of "quantum mechanics" is one of the most ____ theories in modern physics.A. complexB. simpleC. easyD. common答案:A。
“complex”表示“复杂的”;“simple”表示“简单的”;“easy”表示“容易的”;“common”表示“常见的”。
量子力学的概念在现代物理学中是非常复杂的,故选A。
蛋白组学操作步骤

MAN0000518
User Manual
Table of Contents
Kit Contents and Storage.................................................................................................................................. iv
SILAC Protein Identification (ID) and Quantitation Kits
For identifying and quantifying phosphoproteins and membrane proteins
Catalog no. SP10001, SM10002, SP10005, SM10006 MS10030, MS10031, MS10032, MS10033
SILAC™ Phosphontents
The kit contents, shipping, and storage for SILAC™ Phosphoprotein and Membrane Protein ID and Quantitation Kits are listed below. For a detailed description of kit contents, see page 4. These kits include appropriate media components, amino acids, and Lysis Buffer. Store all media protected from light. SP10001 SP10005 SM10002 SM10006 Shipping Blue ice Blue ice Dry ice Dry ice Blue ice Blue ice Blue ice Blue ice Blue ice Blue ice Storage 4 C 4 C –20C –20C 4 C 4 C 4 C –20C 4 C 4 C
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Analyzing a multimodal biometric system using real and virtual usersTobias Scheidat, Claus VielhauerDept. of Computer Science, Univ. of Magdeburg, Universitätsplatz 2, 39106 Magdeburg, GermanyABSTRACTThree main topics of recent research on multimodal biometric systems are addressed in this article: The lack of sufficiently large multimodal test data sets, the influence of cultural aspects and data protection issues of multimodal biometric data. In this contribution, different possibilities are presented to extend multimodal databases by generating so-called virtual users, which are created by combining single biometric modality data of different users. Comparative tests on databases containing real and virtual users based on a multimodal system using handwriting and speech are presented, to study to which degree the use of virtual multimodal databases allows conclusions with respect to recognition accuracy in comparison to real multimodal data. All tests have been carried out on databases created from donations from three different nationality groups. This allows to review the experimental results both in general and in context of cultural origin. The results show that in most cases the usage of virtual persons leads to lower accuracy than the usage of real users in terms of the measurement applied: the Equal Error Rate. Finally, this article will address the general question how the concept of virtual users may influence the data protection requirements for multimodal evaluation databases in the future.Keywords: biometrics, data protection, multimodal, handwriting, speech, real user, virtual user, verification1.INTRODUCTIONBiometric authentication systems provide an alternative to the conventional authentication methods, secret knowledge or personal possession. The fact that the authentication object is directly linked with the person itself (passive biometrics: e.g. fingerprint, face) or with the behavior of the person (active biometrics: e.g. signature, voice) is one main advantage of biometrics. Theft or handoff (intended or accidental) of biometric authentication objects are not possible in an easy way, on the other side these are central problems of using secret knowledge or personal possession. An idea to solve these problems is to combine at least two of the three authentication factors mentioned above, such combination of a personal identification number (secret knowledge) and a smart card (personal possession) for example.In general a biometric system works in two operation modes: enrollment or authentication. The enrollment means the registration of a user within the system where the reference data are stored for the user and associated with the user’s identity. Figure 1 shows the data acquisition module captures the physiological or behavioral trait of the user and after an optional preprocessing the feature extraction module determines a feature set from the captured data describing the current biometric data within the biometric system. Then this feature set is stored as reference data in the database of the biometric system. For authentication the same process steps are carried out up to the feature extraction. The matching module compares the feature vectors of authentication data and reference data, and calculates a similarity value, the so-called matching score. This score is the basis for the decision whether the user is the person which he or she claims to be (verification mode), or who the user is (identification mode).Figure 1. Scheme of a general biometric authentication processSecurity, Steganography, and Watermarking of Multimedia Contents IX,edited by Edward J. Delp III, Ping Wah Wong, Proc. of SPIE-IS&T Electronic Imaging,SPIE Vol. 6505, 650512, © 2007 SPIE-IS&T · 0277-786X/07/$18In recent research the interest on multimodal biometric systems for automatic user authentication rose strongly. The aim of combination of different biometric systems is the possible improvement of the authentication performance in comparison to the best single system involved. Other goals addressed by multimodal biometric systems are to make spoof attacks difficult for an imposter or to provide one (or more) alternative modality if a trait is missing or a trait can be recognized poorly. For multimodal biometrics there are three levels where fusion can be carried out based on the point of fusion within the biometric authentication process: fusion on feature extraction level, fusion on matching score level and fusion on decision level. The fusion on feature extraction level is based on a combination of the single feature vectors of the different systems, by concatenation of the vectors for example. However, this is an unpopular method because of the high dimension of the joint feature vector and the consequently high effort in calculation of the matching score. For the fusion on matching score level the scores of the systems involved are combined to one single joint matching score. Most multimodal fusions use this point within the authentication process for fusion because of its advantages such as one individual match score of each subsystem, simple possible weighting strategies based on this scores or one single value as basis for the decision step. The entire authentication process of each system is carried out at the fusion on decision level, and is based on the single decisions one common result is determined, e.g. by Boolean operations. Jain and Ross describe in [1] an improvement by a multimodal fusion using face, fingerprint and hand geometry. In [2] Vielhauer et al. present a multimodal system where a speech recognition system and a signature recognition system are fused in order to obtain a better authentication result in comparison to the single biometric systems involved. An enhancement of this multimodal system was suggested in [3] by exchange of the single signature component by a multi-algorithmic handwriting subsystem. By this multimodal/multi-algorithmic fusion an improvement of 15% could achieved in comparison to original multimodal system described in [2]. The multi-algorithmic method is proposed in [4] by Scheidat et al. and uses a combination of four signature verification algorithms in order to improve the verification result. The best fusion strategy results in a decrease of the performance measure, the equal error rate, of 12.1% in comparison to the best individual algorithm.At the evaluation of multimodal systems recurrently arise the problem of obtaining suitable test data of a single person for the used modalities. Existing multimodal biometric databases which contain the required modalities in the required quality and quantity are rare. Therefore Wolf et al. propose in [5] a possibility for a multimodal database’s enhancement by building virtual users and using these to enlarge the database. Virtual users are considered as the combination of two or more traits captured from different users. The article shows that such an enlargement by approximately 50% leads to degradations of up to approximately 25% with respect to equal error rate based on a multimodal fusion of handwriting and speech. In this paper we propose the creation of an entire database of virtual users by shuffling the collected data of handwriting and speech. The underlying system mixes the existing data of the individual persons without the data of a single person being combined with each other.Recently, another area of research is the cross-cultural evaluation of active biometrics. The general idea in this domain is to include additional non-biometric information about users of biometric systems, such as cultural background (e.g. spoken and written language, nationality), biological and physiological data (e.g. gender, handedness), as well as technical characteristics of the system itself (e.g. sensor type) in the biometric processes. A methodology for this purpose has been suggested based on a structured set of metadata ([6]) and based on experimental evaluations. The authors show that the recognition accuracy of a biometric handwriting recognition system may vary significantly, depending on metadata such as gender or written language. In [7] Jain et al. describe the utilization of “soft” biometric traits like gender or height to add the identity information to the primary biometric like fingerprint, face or hand-geometry. But here no inter-cultural context is proposed, however the improvement of significantly in general. Wolf et al. show in [8] that more discrimination parameters can be found analyzing the cross-cultural impact on behavioral biometric data. Also parameters like changing experiences and learnt attributes of writing show distinct influences. The field of inter-cultural and multi-modal user interfaces was extended by the aspect of metadata. In [9] Scheidat et al. show furthermore, that it is possible to give distinct design recommendations for active handwriting biometrics according to user groups of specific cultural background with respect to different security levels including forgery scenarios.Besides the construction of multimodal databases with the desired modalities based on virtual users and/or expansion of an existing database, the aspect of the protection of data privacy arose recently. In detail building virtual users may enhance data protection of personal data and therefore could enable research without legal restriction. In Europe the basic of current data protection laws was set by the Directive 95/46 on the Protection of Individuals with regard to the Processing of Personal Data of the European Union ([10]). There are different points of view in the classification of data protection requirements concerning biometric data of individuals. One possible interpretation of German law is that data can be differentiated in related and relatable data of an individual. For example, from a picture of a person’s face onecan typically directly recognize and identify the person if he or she is known. Consequently this picture contains related data of an individual. On the other hand the solely information of a fingerprint image can not be used easily for identification without help and/or information from a third person and/or a technical authentication system. These data are described as relatable data of a person. From the point of view of German law needs related data a higher degree of protection than relatable data. The differentiation between relatable data and related data is blurry: If in a multimodal database the picture of the face of a person is stored in addition to the fingerprint image of the same person with a direct relation between them, the entire data set of this individual is related data and the need of its protection rises strongly. In this article we study the possibility of creation of virtual users in order to avoid the cross relation between the biometric data with the class of the test subjects in a biometric multimodal database. By avoiding these cross relations the necessary effort of data protection may decrease. In addition, a database of virtual users can be formed by mixing unimodal data from different unimodal and/or multimodal databases. We analyze the authentication performance of such virtual users’ database using biometric handwriting and speech data. Real and virtual multimodal databases are compared in order to find out if it is an alternative to a multimodal database holding data only of real users.This paper is structured as follows: In the second section the handwriting and the speech based systems are described shortly, and fundamentals and strategies of biometric fusion are given. Section three describes the evaluation methodology, the underlying multimodal database and biometric error rates as performance measure for the evaluation. The test results and a discussion of their meaning are shown in section four. A short summary of this paper and an outlook of future work are given in section five.2. MULTIMODAL BIOMETRIC FUSIONIn this section the fundamentals of fusion of the handwriting and speech subsystems are described. Firstly, a general operation breakdown is given of the underlying algorithms, Biometric Hash for handwriting recognition and Mel-Frequency Cepstrum Coefficients for speech recognition. Secondly, the weighted fusion strategy for combing both subsystems is presented.2.1 Verification algorithmsThe verification algorithm for the online handwriting modality is based on the Biometric Hash algorithm, as introduced in detail in [11] and [12]. In general, this method determines a statistical feature vector of k=69 statistical parameters (online and offline features), which are transformed into the hash value space by an interval mapping function. This mapping, denoted as Key Generation, results in a feature vector representation )...,,(1k b b b =r supported by a user specific statistical model, consisting of an Interval Matrix (IM ) and a Masking Vector (mv ), which is obtained during enrollment.Data Acquisition Hash Vector b 1...b k {True | False}Figure 2. User Authentication based on Biometric HashAs shown in the left part of figure 2, during verification five discrete signals based on measurements of horizontal and vertical pen position x(t) and y(t), pen tip pressure p(t) and pen azimuth and altitude Θ(t) and Φ(t) respectively are taken from the digitizer tablet. Based on these five signals, the Key Generation module will calculate an actual feature vector b r , which is compared to a stored reference vector Ref b r against some decision threshold value T in the HashAuthentication Module. In our system, this authentication is performed by calculation of the Hamming Distance between the two vectors. Finally this verification method results in a binary True/False decision with respect to the actual biometric data and the given threshold.The speaker verification uses Mel-Frequency Cepstrum Coefficients (MFCC), aspiring to model sounds. As it is known the higher the frequency of two sounds the more difficult it becomes to distinguish them, a logarithmic scale – the mel scale [13] – for the perceived pitch is used. Also rather than just using the spectrum of the signal the spectrum of the log spectrum – the cepstrum [14] – of the signal is used.The method first separates the signal at every 10ms in frames of 30ms length with a hamming windowing function:N n Nn n h <≤−=0,2cos 46.054.0)(π (1)Afterwards on the spectrum of frames with an energy exceeding a defined threshold a filter bank was applied. This filter bank consisted of 20 uniformly distributed triangular band pass filters in steps of approximately 135.2 mels. Of this mel-frequency wrapped spectrum Ψ the MFCC was calculated as follows:()200,20)5,0(cos log 201<≤⎥⎦⎤⎢⎣⎡+Ψ=∑=k k l l MFCC l π (2)An enrollment sample will represented as a set of 32 centroids retrieved from the MFCC vector set with the LBG algorithm presented by Linde et al. in [15]. The score between a verification/attack sample and an enrollment sample will be minimum squared euclidean distance between each of the verification sample’s MFCCs and each of 32 enrollment centroids.2.2 Fusion strategiesThe fusion of handwriting and speech is carried out after the matching score computation within the verification process (fusion on matching score level). An important advantage lies here in the possibility of weighting the individual matching scores derived from each subsystem. For the fusion one of five weighting strategies presented in previous work ([4]) is used for multi-algorithmic fusion: the linear weighted fusion. With this strategy the subsystems are weighted by the relations of their empirical determined equal error rates (EERs). The EER is an evaluation parameter which is generally used for comparison of the authentication performance of biometric systems and is described in more detail in section 3.3 Evaluation Methodology . At the linear weighted fusion strategy the system, which received the highest EER, gets the smallest weight and contrary. The individual weights are determined according to the following formula:nn n n fus n m mi i nns w s w s w s w s Fusion w w w Conditions eereer w involvedsystems of number n w w w Weights s s s Scores Match ++++==+++==−−=∑1122112112121...:1...:...,,,:...,,,:(3)In this article we will focus on a limit of n = 2 modalities, handwriting and speech. The joint matching score of the weighted fusion is used by the decision module to determine the final authentication result of the whole system by a threshold based comparison.3.METHODOLOGYThis section describes the basics of the evaluation of the multimodal system: In the first subsection an overview of the used multimodal database is given. The next subsection describes the terms of real and virtual users in more detail and proposes three methods to create virtual multimodal users based on single and/or multimodal biometric modality data. The biometric error rates used as authentication performance measure in this article are described in the third subsection.3.1 Multimodal databaseIn this study an existing database storing multimodal biometric data (handwriting and speech) was used for researching the impacts of virtual users on verification algorithms and their fusion. The data used in this work was captured in three different countries (Germany, India and Italy) in English language within the research project CultureTech ([16]). Along with the biometric data, metadata describing the personal background of the data subjects and the technical environment was also captured, linked with the user’s identity and finally stored in the database. As shown before in [8] the database stores samples of different semantics donated as speech and handwriting. The metadata semantics here are alternative written or spoken contents like predefined PINs, given sentences or signature for handwriting and good name for speech. The semantics are based on different tasks, such as to give individual answers to questions, to write or speak a given sentence, word or number, or to draw an individual symbol. In CultureTech multimodal database the number of written semantics amounts 49, and for the speech modality there are 46 semantics. Figure 3 shows the scheme of acquiring and processing handwriting and speech data for enrollment and verification. During the enrollment’s data acquisition the metadata concerning personal and technical background are also determined and stored in the database. Later the metadata can be used to generate test sets according special evaluation scenarios, using a combination of one semantic of one nationality group for example.Figure 3. Scheme of enrollment and authentication process of multimodal system used for evaluationIn order to examine the influence of virtual users on the authentication result, three groups are formed consisting of the participants of the individual nationalities: German, Indian and Italian. A fourth group is the union set of all test persons without consideration of their nationality. Further three semantics were selected from the biometric data of these three groups in order to study the impact of different semantics and nationalities. The semantic signature describes the signature recorded in handwriting modality and the good name recorded in speech modality and represent individual semantics that differ from test subject to test subject. A predefined PIN is given as “7-79-93” in both handwriting and speech, as well as the given sentence “Hello, how are you?”.3.2 Real users and virtual usersAs shown in figure 4 the modalities of handwriting and speech one can differentiate between three types of users: A user of type A donated both, handwriting and speech, for each semantic. Such a type A user is a so called real user. The users of the second type have donated only one of the two modalities (type B), handwriting (H) or speech (S). Type C users are virtual users which are built using data from users of type A and/or B.AB BCA B BCAC(i.) (ii.) (iii.)Figure 4. Three methodologies of combining biometric data to create virtual usersFigure 4 shows three possibilities to form virtual users from users of the types A and/or B:(i.)The data of the users of type B are combined by linking handwriting and speech data from the different users tovirtual users C. In order to enlarge an existing real multimodal database the virtual users can be added to thereal users (see figure 4 (i.)). The possible total number of virtual users C (#C) is the minimum number of thetype B users which have donated only handwriting (#B H) or only speech (#B S), respectively:# C = Min (# B H, # B S) (4) (ii.)In order to create virtual users (type C) the data of the two modalities are combined using the biometric data of the users of the types A and B under the condition that the originators of both are different persons (figure 4(ii.)). This method breaks the cross relation between the data of the real users (A) and also expand the size ofthe database. Here the total number of virtual users C (#C) is determined by the minimum of all users whichhave given handwriting (#A H + #B H) and/or speech (#A S + #B S) biometrics:# C = Min((# A H + # B H), (# A S + # B S)) (5) (iii.)T he third method uses only the multimodal data of the real users (A) to create virtual users (C) by recombining the handwriting and speech data (see figure 4 (iii.)). Here only the cross relations of the individuals aredestroyed and the number of virtual users C (#C) is equal to the number of real users A (#A) as described inequitation (6):# C = # A = # A H = # A S(6)An evaluation of the scenario described in (i) is presented in [5] by Wolf et al. In this article the evaluation is carried out on virtual users created by method (ii). Possibly (iii) could be the basis for further experiments after finishing this work to study the impact of simple shuffling multimodal data in to generate virtual user database.As shown in table 1 24 test sets were created based on real users and virtual users, metadata semantic and metadata nationality. In section 4 the results are presented regarding these test sets using biometric error rates as described in subsection 3.3. The data set size of the real users of semantic signature for all test subjects amounts 27, and after creation of virtual users the number of individuals reaches 40. For the semantic PIN the real users’ database holds 19 persons and the virtual users’ database holds 31. There are 22 real users and 38 virtual users for semantic sentence. As one can see in table 1, the enhancement of the multimodal database by creating virtual users is 32.5% for signature, 38.71% for PIN, and 42.11% for sentence. In general the enlargement of the multimodal database lies between 13% and 73% accordingly to metadata semantic and nationality.Table 1. Number of users divided by modality, real users and virtual users, and relative database enhancement Semantic Handwriting Speech Real User Virtual User EnhancementGerman Donors%55.56Signature 27 18 8 18% PIN 30 14 5 1464.29%72.73Sentence 11 16 3 11Indian Donors13.33% Signature 19 15 13 15%20.00PIN 19 10 8 10% Sentence 19 15 13 1513.33Italian Donors14.29% Signature 16 7 6 7%14.29PIN 16 7 6 7% Sentence 16 7 6 714.29Joint Set of Donors% Signature 62 40 27 4032.5038.71% PIN 65 31 19 31%42.11Sentence 46 38 22 383.3 Evaluation methodologyFor our tests we use biometric error rates, where the False Rejection Rate (FRR) indicates how frequently authentic persons are rejected from the system whereas the acceptance rate of non-authentic subjects is represented by the False Acceptance Rate (FAR). The previous mentioned Equal Error Rate (EER) denotes the point of intersection of FRR and FAR characteristics where both error rates yields identical values. The EER is used to compare the results of different test scenarios. Additionally for the evaluation we determine the weights for handwriting and speech based on the EERs of the individual verification results of the single modalities regarding the formula (3) in section 2.2. Using these weights and the matching scores we fuse both systems and can calculate an EER of the multimodal system.For each user 5 enrollments of each modality are used, holding 4 handwriting or speech samples each. For verification issues 5 additional samples were captured. In the verification mode of the underlying evaluation system the enrollments of one user are compared with each verification sample of the same user. Based on these operations the FRR is captured for each test set. The considering FAR is determined by random attacks. Here each enrollment of one user is compared to each verification sample of all users except the current user. The method described simulates a closed scenario where only persons registered within the biometric system are considered.4.EVALUATION RESULTSIn this section the evaluation results are presented and discussed based on comparison of real users and virtual users, and metadata semantic and nationality. Because of the limited number of real users as well as virtual users (see table 1) this study is not statistical representative but it shows the functional concept of creating virtual multimodal users based on single and/or multimodal data and evaluating such a virtual database based on additional data, here metadata semantic and nationality.The tables 2 to 5 show the verification results in respect to the authentication performance measure used, the equal error rate (EER), for real and virtual users. The columns EER H and EER S for both, real users and virtual users show the EERs for the single biometric systems using handwriting (H) and speech (S), respectively. The columns titled fusion contain the individual weights (weight H, weight S) of the modalities involved and the EER of the fused modalities. The rows hold the results of the semantics signature, PIN and sentence. The handwriting based system always determines the best results in comparison to the speech based system in respect to the EER in all test setups.In table 2 the results of the German participants are presented. Here the real users’ results of the fusion are better than the results of the single modalities for each semantic. The relative improvement by the fusion in comparison to the best single subsystem amounts 0% for signature, 12.1% for PIN and 15.7% for sentence. If one compares the single results of the individual systems for real users and virtual users, one can observe that there are aggravations for handwriting in one out of three cases and for speech in two out of three cases. For example, for the written sentence the EER based on the virtual users’ database improves by 154.4% in comparison to the real users’ database. On the other side the EER of spoken sentence degrades by 21.3% for virtual users compared with real users, however the virtual users based fusion leads to a relative improvement of 138.7% with an ERR of 0.0222.Table 2. Weights and EERs of German real and virtual users (H=handwriting subsystem, S=speech subsystem)Real users Virtual usersSingle system Fusion Single system FusionSemantic EER H EER S weight H weigth S EER EER H EER S weight H weigth S EERSignature 0.0350 0.3000 0.896 0.104 0.0350 0.0234 0.2737 0.921 0.079 0.0222PIN 0.0648 0.3000 0.882 0.118 0.0578 0.0722 0.3479 0.828 0.172 0.0680Sentence 0.0613 0.1466 0.705 0.295 0.0530 0.0241 0.1863 0.885 0.115 0.0222The results of the Indian donors are shown in table 3. A general observation, the individual results of the subsystems as well as of the fusion for virtual users and all three semantics are worse than for real users. Another fact is that the fusion using real users’ data leads to an improvement in two out of three cases: for signature it degrades by 8.8%, for PIN and sentence it improves by 7.2% and 73.3%, respectively. Based on the virtual users the fusion improves the best result of the systems involved for all three semantics by 10.8% for signature, 23.3% for PIN and 20.3% for sentence.Table 3. Weights and EERs of Indian real and virtual users (H=handwriting subsystem, S=speech subsystem)Real users Virtual usersSingle system Fusion Single system FusionSemantic EER H EER S weight H weigth S EER EER H EER S weight H weigth S EERSignature 0.0031 0.2123 0.986 0.014 0.0034 0.0113 0.2278 0.953 0.047 0.0102PIN 0.0269 0.2564 0.905 0.095 0.0251 0.0339 0.3265 0.906 0.094 0.0275Sentence 0.0350 0.1531 0.814 0.186 0.0202 0.0533 0.1867 0.778 0.222 0.0443Table 4 presents the outcomes of the evaluation of Italian real and virtual users. For the real users the fusion only on signature leads to a small improvement of 1.2%, while PIN and sentence lead to a decrease of approximately 4.5% each. Regarding the virtual users’ test data the fusion results are better than the single results of the modalities for all semantics. Here a relative improvement was reached for signature by 14.3%, for PIN by 9.9% and for sentence by 18.4%. Another point of interest is the fact that the Indian users reach an EER of 0.0031 for the written signature. This is a value which is more than ten times better than the values of German users (EER signature=0.0350) or Italian users (EER signature=0.0328).Table 4. Weights and EERs of Italian real and virtual users (H=handwriting subsystem, S=speech subsystem)Real users Virtual usersSingle system Fusion Single system FusionSemantic EER H EER S weight H weigth S EER EER H EER S weight H weigth S EERSignature 0.0328 0.2933 0.900 0.100 0.0324 0.0529 0.2743 0.838 0.162 0.0463PIN 0.03800.4429 0.921 0.079 0.0398 0.0333 0.3818 0.920 0.080 0.0303Sentence 0.0219 0.3453 0.940 0.060 0.0229 0.0174 0.2971 0.945 0.055 0.0147。