Continual Neural Learning Computational Method for In-Ear based User Authentication Systems
Abstract
Biometric authentication plays an important role in many emerging security solutions and as such presents an active area of research. In particular, biometric applications that employ some sort of neural artificial intelligence solution are becoming more prominent in the security and access control field. However, how best to learn the important (salient) biometric features particularly with respect to a streaming set of data makes it more challenging for existing neural techniques. This research paper presents bio-inspired neural computational technique that is of a progressive nature (learns continually) for the task of in-person prediction. The technique specifically employs an emerging Continual Neural Learning (CNL) technique to predict the authenticity of a person. For this prediction task, simulations are performed by feeding continual streams of in-ear biometric data obtained from a real world subject to the CNL technique which predicts the likelihood of a valid or invalid feature pattern. The results of simulations are reported in terms of the Mean Absolute Percentage Error (MAPE) and validated using two progressive (continual) learning approaches - an existing approach called the progressive Long Short-Term Memory (pLSTM) and an emerging approach called the Neuronal Auditory Machine Intelligence (NeuroAMI). From the results, it was found that the NeuroAMI gave best MAPE error estimates considering 3 different random data corruption trials. Hence, the NeuroAMI is recommended as a candidate CNL approach for in-ear authentication systems.
References
Arakawa, T., Koshinaka, T., Yano, S., Irisawa, H., Miyahara, R., & Imaoka, H. (2016, December). Fast and accurate personal authentication using ear acoustics. In 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA) (pp. 1-4). IEEE.
Alsawwaf, M., & Chaczko, Z. (2020). Multimodal access control: A review of emerging mechanisms. Smart Innovations in Engineering and Technology 5, 183-200.
Alwosheel, A., van Cranenburgh, S., & Chorus, C. G. (2018). Is your dataset big enough? Sample size requirements when using artificial neural networks for discrete choice analysis. Journal of choice modelling, 28, 167-182.
Casanova, A., Cascone, L., Castiglione, A., Meng, W., & Pero, C. (2021). User recognition based on periocular biometrics and touch dynamics. Pattern Recognition Letters, 148, 114-120.
El-Sayed, M. A., & Abdel-Latif, M. A. (2022). Iris recognition approach for identity verification with DWT and multiclass SVM. PeerJ Computer Science, 8, e919.
Fayek, H. M. (2017). MatDL: A lightweight deep learning library in MATLAB. Journal of Open Source Software, 2(19), 413.
Gona, A., Subramoniam, M., & Swarnalatha, R. (2023). Transfer learning convolutional neural network with modified Lion optimization for multimodal biometric system. Computers and Electrical Engineering, 108, 108664.
Kavitha, K. J., & Reshma, M. (2013). Survey on digital watermarking on medical images. International Journal of Advanced Computer Research, 3(4), 330.
Laskar, B., & Bouzid, M. (2017). Vector Quantization based Steganography for Secure Speech Communication System. In SECRYPT (pp. 407-412).
T. Li, Q. Liu, X. Zhou, Practical human sensing in the light, in: Proceedings of Annual International Conference on Mobile Systems, Applications, and Services, 2016, pp. 71–84.
Refbacks
- There are currently no refbacks.