A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
Abstract
:1. Introduction
Major Contributions and Novelty of the Proposed Work
- Development of a Robust Predictive Model: A hybrid CNN-LSTM model is developed for fingerprint authentication, combining spatial and sequential feature extraction to enhance recognition accuracy.
- Analysis of Process Parameter Impact: The influence of various process parameters on recognition accuracy is analyzed to enhance precision and efficiency in biometric authentication models.
- Exploration of Fingerprint Patterns and Deep Learning Features: The relationship between fingerprint patterns and deep learning-based feature extraction techniques is explored, enhancing the model’s ability to distinguish between genuine and spoofed fingerprints.
- Evaluation on Large Datasets: The proposed fingerprint authentication model is validated on a large dataset, ensuring its scalability and effectiveness across different data conditions.
- Development of Novel Deep Learning Architecture: A novel deep learning architecture is proposed, integrating advanced features such as CNNs, RNNs, and attention mechanisms for improved fingerprint analysis and enhanced feature extraction.
- Comprehensive Evaluation Approach: This study introduces robust evaluation metrics, such as accuracy, precision, recall, F1-score, and loss value, to thoroughly assess the model’s performance and robustness.
- Addressing Research Gaps: This work addresses the limitations of existing systems, such as susceptibility to spoofing and biases in fingerprint datasets, by implementing advanced techniques for improved reliability.
- Generalization of Results: The model is shown to perform effectively across diverse datasets and environmental conditions, ensuring its applicability in multiple domains such as law enforcement, financial security, and access control.
- Stable Performance under Varied Conditions: The model maintains stable performance despite variations in lighting, noise levels, and other environmental factors, ensuring reliability in real-world scenarios.
- Reduction of False Acceptance Rates: By integrating multi-finger systems, the model significantly reduces FARs, addressing a common issue in single-finger authentication systems. This results in improved reliability and precision in authentication.
- Effective Feature Extraction from Fingerprints: The hybrid CNN-LSTM model excels in extracting both spatial and temporal features from fingerprint images, contributing to a more accurate and secure authentication process.
2. Related Work
3. Methodology and Materials
3.1. Workflow
3.2. Preprocessing
3.3. Network Architecture
- First convolutional layer: It detects basic features like edges and textures in the raw pixel data, which serve as the building blocks for more complex features.
- Second convolutional layer: It captures slightly more complex patterns, such as corners and simple shapes, building on the features learned in the first layer.
- Third convolutional layer: It focuses on detecting more abstract and complex structures, like specific patterns and key regions of the fingerprint.
- Fourth convolutional layer: It refines the learned features, focusing on deeper, higher-level patterns and interactions between earlier feature maps.
- Fifth convolutional layer: It consolidates and strengthens the complex features, allowing the model to learn highly abstract representations crucial for accurate classification.
3.4. Optimization and Training Details
3.5. Proposed Hybrid Learning Approach
3.6. Components of the Proposed Architecture
4. Experimental Analysis and Performance Evaluation of the Proposed Model
4.1. Dataset
- Obliteration: Partial or complete erasure of ridge patterns.
- Central Rotation: Rotation of the fingerprint core by 15°–180°.
- Z-cut: Linear cuts simulating surgical alterations.
- FVC2000 dataset: This dataset contains 800 fingerprint images, comprising both real and altered samples. It enables the evaluation of the model’s ability to distinguish between genuine and manipulated fingerprints in an independent dataset [29].
- L3-SF-V2 dataset: This dataset consists of 1480 fingerprint images, including both real and altered samples. It offers a more extensive and diverse dataset to further challenge the model’s performance [30].
4.2. Experimental Setup and Parameter Configuration
4.3. Computational Resource Requirements
4.4. Experimental Findings
Dataset Bias and Generalization
4.5. Performance Analysis
4.6. Illustrative Results of the Proposed Technique
4.7. Execution Time Efficiency of the Proposed Model for Real-Time Prediction
- is the time when the input data (image) is fed into the model.
- is the time when the model returns the prediction result (whether real or fake).
5. Conclusions and Future Scope
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Johnson, A.; Smith, B.; Lee, C. Advances in Biometric Authentication Systems: A Survey. J. Biom. Secur. 2024, 8, 45–58. [Google Scholar]
- Chen, Y.; Zhang, X.; Wong, T. Hybrid Models in Biometric Systems: A Comparative Study. Int. J. Mach. Learn. Appl. 2024, 36, 85–100. [Google Scholar]
- Lee, D.; Ahmed, S. Enhancing Biometric Security with CNN-LSTM Architectures. In Proceedings of the 2024 International Conference on Deep Learning and Applications, Dijon, France, 10–11 July 2024; pp. 78–90. [Google Scholar]
- Hernez, L.; Davis, P.; Kumar, V. Scalability in Fingerprint Recognition Systems: Challenges and Opportunities. Biom. Technol. Today 2024, 32, 45–58. [Google Scholar]
- Miller, P.; Singh, R. Biometric Security in Critical Applications: A Review. J. Adv. Secur. Stud. 2024, 18, 110–125. [Google Scholar]
- Zhao, L.; Gomez, F. Future Directions in Fingerprint Recognition Technology. IEEE Access 2024, 52, 33000–33015. [Google Scholar]
- Chen, Y.; Zhang, T. Emerging Trends in Biometric Authentication. J. Biom. Adv. 2024, 42, 12–25. [Google Scholar]
- Kumar, P.; Singh, R. Advances in Biometric Systems Using Deep Learning. Int. J. Mach. Learn. Appl. 2023, 35, 54–68. [Google Scholar]
- Lee, H.; Wong, T. Applications of Deep Learning in Biometrics. IEEE Access 2024, 62, 8900–8912. [Google Scholar]
- Radzi, A.; Fairuz, M. LeNet-5-Based Fingerprint Recognition. J. Biom. Res. 2024, 15, 110–120. [Google Scholar]
- Das, P.; Lee, K. CNN Architectures for Biometric Systems. Pattern Recognit. Lett. 2023, 103, 45–60. [Google Scholar]
- Fairuz, M.; Lim, A. Transfer Learning in Fingerprint Authentication. Mach. Vis. J. 2023, 10, 80–95. [Google Scholar]
- Su, C.; Lin, K. CenterRanked Loss for Fingerprint Recognition. Pattern Recognit. Adv. 2024, 63, 95–110. [Google Scholar]
- Mohammed, S.; Lee, Y. Temporal Feature Analysis in Biometrics. Deep. Learn. Appl. J. 2024, 41, 25–38. [Google Scholar]
- Yang, L. LSTM in Fingerprint Recognition: A Review. J. Biom. Syst. 2023, 30, 305–320. [Google Scholar]
- Jang, Y.; Kim, S. Hybrid CNN-LSTM Architectures for Biometric Systems. IEEE Access 2024, 55, 11150–11170. [Google Scholar]
- Minaee, S.; Gomez, F. Using ResNet50 and LSTM for Fingerprint Recognition. J. Mach. Learn. Appl. Biom. 2023, 37, 80–100. [Google Scholar]
- Lee, K.; Park, J.; Choi, H. Tackling Spoofing and Variability in Fingerprint Recognition: New Approaches and Challenges. Biom. Technol. J. 2024, 12, 99–110. [Google Scholar]
- Khetri, P.; Jain, A. Enhancing Fingerprint Recognition Using Feedforward Neural Networks. Biom. Appl. J. 2023, 12, 125–140. [Google Scholar]
- Yang, F.; Zhang, T. ANN and RNN Variants for Low-Quality Fingerprint Recognition. J. Pattern Recognit. 2024, 45, 90–115. [Google Scholar]
- Gomez, R.; Chang, M. Optimization Techniques for Biometric Recognition. Mach. Learn. Adv. Biom. 2024, 40, 67–89. [Google Scholar]
- Liu, X.; Zhang, W.; Chen, Y. Hybrid CNN-LSTM Networks for Fingerprint Recognition. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2345–2358. [Google Scholar]
- Zhang, Y.; Wang, L.; Li, H. Deep Learning Approaches for Fingerprint Liveness Detection. IEEE Access 2024, 12, 11234–11245. [Google Scholar]
- Wang, T.; Yan, H. CNN-LSTM Ensembles in Fingerprint Recognition. ACM Trans. Biom. 2024, 19, 100–115. [Google Scholar]
- Johnson, A.; Patel, M. Deep Learning Techniques for Secure Fingerprint Recognition. IEEE Trans. Biom. Identity Sci. 2024, 12, 200–215. [Google Scholar]
- Chen, Y.; Zhang, W.; Liu, T. Fingerprint Recognition Using Convolutional Neural Networks: A Review. Int. J. Comput. Vis. 2024, 15, 101–115. [Google Scholar]
- Khan, S.; Ahmed, M.; Abdallah, T. Multimodal Deep Learning for Fingerprint Spoof Detection. Pattern Recognit. 2023, 135, 109123. [Google Scholar]
- Shehu, Y.I.; Ruiz-Garcia, A.; Palade, V.; James, A. Sokoto Coventry Fingerprint Dataset (SOCOFing). Kaggle. 2018. Available online: https://www.kaggle.com/datasets/ruizgara/socofing (accessed on 1 July 2024).
- Maio, D.; Maltoni, D.; Cappelli, R.; Wayman, J.L.; Jain, A.K. FVC2000: Fingerprint Verification Competition. IEEE Trans. Pattern Anal. Mach. Intell. 2002, 24, 402–412. [Google Scholar] [CrossRef]
- Wyzykowski, A.B.V.; Segundo, M.P.; Lemes, R.P. Level Three Synthetic Fingerprint Generation. arXiv 2020, arXiv:2002.03809. [Google Scholar] [CrossRef]
Dataset | Phase | Accuracy (%) | Precision (%) | Recall (%) | F1-Score (%) | Loss Value |
---|---|---|---|---|---|---|
Config | Training | 99.42 | 99 | 100 | 100 | 0.0124 |
Validation | 99.23 | 99 | 99.1 | 99.1 | 0.0276 1 | |
FVC2000 | Training | 99.0 | 98 | 100 | 99 | 0.035 |
Validation | 98.85 | 100 | 98 | 99 | 0.040 | |
L3-SF-V2 | Training | 98.22 | 97 | 99 | 98 | 0.050 |
Validation | 98.05 | 99 | 97 | 98 | 0.055 |
No | Title | Method Approach | Recognition Accuracy |
---|---|---|---|
1 | Radzi et al. (2024) [10] | LeNet-5 model | 95.8% |
2 | Das et al. (2023) [11] | CNN (5 convolutional layers) | 96% |
3 | Fairuz et al. (2023) [12] | Transfer learning (AlexNet) | 95.2% |
4 | Su et al. (2024) [13] | LSTM + center ranked loss | 97% |
5 | Mohammed et al. (2024) [14] | LSTM | 94.5% |
6 | Yang et al. (2023) [15] | CNN + LSTM | 93.5% |
7 | Jang et al. (2024) [16] | CNN-LSTM | 93.8% |
8 | Minaee et al. (2023) [17] | ResNet50 + LSTM | 95.7% |
9 | Wang and Yan (2024) [24] | CNN-LSTM ensemble (bagging) | 88.2% |
10 | Proposed method | Hybrid model (CRNN) | 99.17% |
Class | Precision | Recall | F1-Score | Support |
---|---|---|---|---|
Real | 0.99% | 100% | 0.99% | 2814 |
Fake | 100% | 0.99% | 0.99% | 2895 |
Accuracy | 99.42% | 5709 | ||
Macro avg | 0.99% | 0.99% | 0.99% | 5709 |
Weighted avg | 0.99% | 0.99% | 0.99% | 5709 |
No | Title | Method | Recognition Accuracy | Execution Time (s) |
---|---|---|---|---|
1 | Radzi et al. (2024) [10] | LeNet-5 model | 95.8% | 1.2 |
2 | Das et al. (2023) [11] | CNN (5 convolutional layers) | 96% | 1.8 |
3 | Fairuz et al. (2023) [12] | Transfer learning (AlexNet) | 95.2% | 2.1 |
4 | Su et al. (2024) [13] | LSTM + center ranked loss | 97% | 5.3 |
5 | Mohammed et al. (2024) [14] | LSTM | 94.5% | 4.8 |
6 | Yang et al. (2023) [15] | CNN + LSTM | 93.5% | 3.9 |
7 | Jang et al. (2024) [16] | CNN-LSTM | 93.8% | 3.6 |
8 | Minaee et al. (2023) [17] | ResNet50 + LSTM | 95.7% | 4.5 |
9 | Wang and Yan (2024) [24] | CNN-LSTM ensemble (bagging) | 88.2% | 6.2 |
10 | Proposed method | Hybrid model (CRNN) | 99.17% | 1.85 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hussian, A.; Murshed, F.; Alandoli, M.N.; Aljafari, G. A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data. Computers 2025, 14, 178. https://doi.org/10.3390/computers14050178
Hussian A, Murshed F, Alandoli MN, Aljafari G. A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data. Computers. 2025; 14(5):178. https://doi.org/10.3390/computers14050178
Chicago/Turabian StyleHussian, Abdulrahman, Foud Murshed, Mohammed Nasser Alandoli, and Ghalib Aljafari. 2025. "A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data" Computers 14, no. 5: 178. https://doi.org/10.3390/computers14050178
APA StyleHussian, A., Murshed, F., Alandoli, M. N., & Aljafari, G. (2025). A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data. Computers, 14(5), 178. https://doi.org/10.3390/computers14050178