A Novel Fingerprint Recognition Framework with Attention Mechanism Based on Domain Adaptation for Improving Applicability in Overpressured Situations

Authors

  • Jiahuai Ma

    Department of Computer & Information Science, University of Florida, Gainesville, FL 32608, USA

  • Alan Wilson

    Data & Analytics (D&A), IT Lab, Intact Financial Corporation, Toronto, ON M5G 0A1, Canada

DOI:

https://doi.org/10.30564/aia.v6i1.8128
Received: 8 September 2024 | Revised: 20 September 2024 | Accepted: 8 October 2024 | Published Online: 25 October 2024

Abstract

Fingerprint recognition is a widely adopted biometric technology, valued for its reliability and precision in identifying individuals. However, traditional recognition methods relying on handcrafted features struggle under challenging scenarios such as overpressured fingerprints, where excessive pressure distorts ridge patterns, significantly affecting performance. To address these challenges, this study proposes a novel framework combining domain adaptation techniques and an attention mechanism. The framework aligns feature distributions between source and target domains, enhancing the model's generalizability to diverse datasets and acquisition conditions. Additionally, the attention mechanism emphasizes critical regions of the fingerprint, improving robustness to distortions. Experimental results demonstrate that the proposed model significantly outperforms the original ResNet, achieving a reduced Equal Error Rate (EER) of 0.0837 compared to 0.1840 for the baseline. Grad-CAM visualizations further validate the model's ability to focus on essential fingerprint features, even under distorted conditions. This study highlights the effectiveness of integrating domain adaptation and attention mechanisms in overcoming real-world challenges in fingerprint recognition.

Keywords:

Fingerprint Recognition; Deep Learning; Domain Adaptation

References

[1] Maltoni, D., Maio, D., Jain, A.K., et al., 2009. Handbook of fingerprint recognition. Springer: London, UK.

[2] Marasco, E., Ross, A., 2014. A survey on antispoofing schemes for fingerprint recognition systems. ACM Computing Surveys (CSUR). 47(2), 1–36.

[3] Wenjun, D., Fatahizadeh, M., Touchaei, H.G., et al., 2023. Application of six neural network-based solutions on bearing capacity of shallow footing on double-layer soils. Steel and Composite Structures. 49(2), 231–244.

[4] Dai, W., 2023. Design of traffic improvement plan for line 1 Baijiahu station of Nanjing metro. Innovations in Applied Engineering and Technology. 2(1), 1–11.

[5] Hao, Y., Chen, Z., Jin, J., et al., 2023. Joint operation planning of drivers and trucks for semi-autonomous truck platooning. Transportmetrica A: Transport Science. 1–37.

[6] Gan, Y., Zhu, D., 2024. The Research on Intelligent News Advertisement Recommendation Algorithm Based on Prompt Learning in End-to-End Large Language Model Architecture. Innovations in Applied Engineering and Technology. 1–9.

[7] Zhang, H., Zhu, D., Gan, Y., et al., 2024. End-to-End Learning-Based Study on the Mamba-ECANet Model for Data Security Intrusion Detection. Journal of Information, Technology and Policy. 7, 1–7.

[8] Gan, Y., Ma, J., Xu, K., 2023. Enhanced E-Commerce Sales Forecasting Using EEMD-Integrated LSTM Deep Learning Model. Journal of Computational Methods in Engineering Applications. 3(1).

[9] Gan, Y., Chen, X., 2024. The Research on End-to-end Stock Recommendation Algorithm Based on Time-frequency Consistency. Advances in Computer and Communication. 5(4), 243–259.

[10] Zhang, G., Zhou, T., Cai, Y., 2023. CORAL-based Domain Adaptation Algorithm for Improving the Applicability of Machine Learning Models in Detecting Motor Bearing Failures. Journal of Computational Methods in Engineering Applications. 3(1), 1–17.

[11] Chen, X., Wang, M., Zhang, H., 2024. Machine Learning–based Fault Prediction and Diagnosis of Brushless Motors. Engineering Advances. 4(3), 130–142.

[12] Chen, X., Zhang, H., 2023. Performance Enhancement of AlGaN-based Deep Ultraviolet Light-emitting Diodes with AlxGa1-xN Linear Descending Layers. Innovations in Applied Engineering and Technology. 2(1), 1–10.

[13] Chen, X., Gan, Y., Xiong, S., 2024. Optimization of Mobile Robot Delivery System Based on Deep Learning. Journal of Computer Science Research. 6(4), 51–65.

[14] Zhang, G., Zhou, T., 2024. Finite Element Model Calibration with Surrogate Model-Based Bayesian Updating: A Case Study of Motor FEM Model. Innovations in Applied Engineering and Technology. 30, 1–3.

[15] Zhou, Z., Wu, J., Cao, Z., et al., 2021. On-Demand Trajectory Prediction Based on Adaptive Interaction Car Following Model with Decreasing Tolerance. In Proceedings of the 2021 International Conference on Computers and Automation (CompAuto); Paris, France, 7–9 September 2021. pp. 67–72.

[16] Ye, X., Luo, K., Wang, H., et al., 2024. An advanced AI-based lightweight two-stage underwater structural damage detection model. Advanced Engineering Informatics. 62, 102553.

[17] Xiong, S., Chen, X., Zhang, H., et al., 2024. Domain Adaptation-Based Deep Learning Framework for Android Malware Detection Across Diverse Distributions. Artificial Intelligence Advances. 6(1), 13–24.

[18] Ben-David, S., Blitzer, J., Crammer, K., et al., 2016. Analysis of representations for domain adaptation. Advances in neural information processing systems. MIT Press: Cambridge, MA, USA. p. 19.

[19] Xiong, S., Zhang, H., Wang, M., et al., 2022. Distributed Data Parallel Acceleration-Based Generative Adversarial Network for Fingerprint Generation. Innovations in Applied Engineering and Technology. 1(1), 1–12.

[20] Xiong, S., Chen, X., Zhang, H., 2023. Deep Learning-Based Multifunctional End-to-End Model for Optical Character Classification and Denoising. Journal of Computational Methods in Engineering Applications. 15, 1–3.

[21] Xiong, S., Zhang, H., Wang, M., 2022. Ensemble Model of Attention Mechanism-Based DCGAN and Autoencoder for Noised OCR Classification. Journal of Electronic & Information Systems. 4(1), 33–41.

[22] Yu, L., Li, J., Cheng, S., et al., 2013. Secure continuous aggregation in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems. 25(3), 762–774.

[23] Xiong, S., Yu, L., Shen, H., et al., 2012. Efficient algorithms for sensor deployment and routing in sensor networks for network-structured environment monitoring. In Proceedings of the 2012 IEEE INFOCOM; Orlando, FL, USA, 25–30 March 2012. pp. 1008–1016.

[24] Feng, Z., Xiong, S., Cao, D., et al., 2015. Hrs: A hybrid framework for malware detection. In Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics; San Antonio, TX, USA, 4 March 2015. pp. 19–26.

[25] Ding, X., Meng, Y., Xiang, L., et al., 2024. Stroke recurrence prediction using machine learning and segmented neural network risk factor aggregation. Discover Public Health. 21(1), 119.

[26] Hao, Y., Chen, Z., Sun, X., et al., 2024. Planning of Truck Platooning for Road-Network Capacitated Vehicle Routing Problem. arXiv preprint. arXiv:2404.13512.

[27] Dai, W., 2021. Safety evaluation of traffic system with historical data based on Markov process and deep-reinforcement learning. Journal of Computational Methods in Engineering Applications. 21, 1–4.

[28] Wang, Z., Zhao, Y., Song, C., et al., 2024. A new interpretation on structural reliability updating with adaptive batch sampling-based subset simulation. Structural and Multidisciplinary Optimization. 67(1), 7.

[29] Zhu, Y., Zhao, Y., Song, C., et al., 2024. Evolving reliability assessment of systems using active learning-based surrogate modelling. Physica D: Nonlinear Phenomena. 457, 133957.

[30] Yu, L., Li, J., Cheng, S., et al., 2011. Secure continuous aggregation via sampling-based verification in wireless sensor networks. In Proceedings of the 2011 Proceedings IEEE INFOCOM; Shanghai, China, 10–15 April 2011. pp. 1763–1771.

[31] Li, J, Xiong, S., 2010. Efficient Pr-skyline query processing and optimization in wireless sensor networks. Wireless Sensor Network. 2(11), 838.

[32] Xiong, S., Li, J., 2010. An efficient algorithm for cut vertex detection in wireless sensor networks. In Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems; Genoa, Italy, 21–25 June 2010. pp. 368–377.

[33] Zhao, Z., Ren, P., Yang, Q., 2024. Student self-management, academic achievement: Exploring the mediating role of self-efficacy and the moderating influence of gender insights from a survey conducted in 3 universities in America. arXiv preprint. arXiv:2404.11029.

[34] Zhao, Z., Ren, P., Tang, M., 2022. Analyzing the Impact of Anti-Globalization on the Evolution of Higher Education Internationalization in China. Journal of Linguistics and Education Research. 5(2), 15–31.

[35] Dai, W., 2022. Evaluation and improvement of carrying capacity of a traffic system. Innovations in Applied Engineering and Technology. 1–9.

[36] Zeng, F., Hu, S., Xiao, K., 2019. Research on partial fingerprint recognition algorithm based on deep learning. Neural Computing & Applications. 31(9), 4789–4798.

[37] Althabhawee, A.F., Alwawi, B.K.O.C., 2022. Fingerprint recognition based on collected images using deep learning technology. IAES International Journal of Artificial Intelligence (IJ-AI). 11(1), 81.

[38] Pan, S., 2010. A survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering. 22(10), 1345–1359.

[39] Gopalan, R., Li, R., Chellappa, R., 2011. Domain adaptation for object recognition: An unsupervised approach. In Proceedings of the 2011 International Conference on Computer Vision; Barcelona, Spain, 6–13 November 2011. pp. 999–1006.

[40] Jhuo, I.H., Liu, D., Lee, D.T., et al., 2012. Robust visual domain adaptation with low-rank reconstruction. In Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition; Providence, RI, USA, 16–21 June 2012. pp. 2168–2175.

[41] Pan, S.J., Tsang, I.W., Kwok, J.T., 2010. Domain adaptation via transfer component analysis. IEEE Transactions on Neural Networks. 22(2), 199–210.

[42] Gretton, A., Borgwardt, K., Rasch, M., et al., 2006. A kernel method for the two-sample-problem. In Advances in Neural Information Processing Systems 19: Proceedings of the 2006 Conference. MIT Press: Cambridge, MA, USA. p. 19.

[43] Kullback, S., Leibler, R.A., 1951. On information and sufficiency. Ann Math Stat. 22(1), 79–86.

[44] Kang, G., Jiang, L., Yang, Y., et al., 2019. Contrastive adaptation network for unsupervised domain adaptation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 15–20 June 2019. pp. 4893–4902.

[45] Ajakan, H., Germain, P., Larochelle, H., et al., 2019. Domain-adversarial neural networks. arXiv preprint. arXiv:1412.4446. 2014.

[46] Ganin, Y., Lempitsky, V., 2015. Unsupervised domain adaptation by backpropagation. In Proceedings of the International Conference on Machine Learning, PMLR; Lile, France, 6–11 July 2015. pp. 1180–1189.

[47] Glorot, X., Bordes, A., Bengio, Y., 2011. Domain adaptation for large-scale sentiment classification: A deep learning approach. In Proceedings of the 28th International Conference on Machine Learning (ICML-11); Bellevue, WA, USA, 28 June–2 July 2011. pp. 513–520.

[48] He, K., Zhang, X., Ren, S., et al., 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition; Las Vegas, NV, USA, 27–30 June 2016. pp. 770–778.

[49] Hu J, Shen, L., Sun, G., 2018. Squeeze-and-excitation networks. In Proceedings of the IEEE conference on computer vision and pattern recognition; Salt Lake City, UT, USA, 18–23 June 2018. pp. 7132–7141.

[50] Cheng, J.M., Wang, H.C., 2004. A method of estimating the equal error rate for automatic speaker verification. In Proceedings of the 2004 International Symposium on Chinese Spoken Language Processing; Hong Kong, China, 15–18 December 2004. pp. 285–288.

Downloads

How to Cite

Ma, J., & Wilson, A. (2024). A Novel Fingerprint Recognition Framework with Attention Mechanism Based on Domain Adaptation for Improving Applicability in Overpressured Situations. Artificial Intelligence Advances, 6(1), 56–65. https://doi.org/10.30564/aia.v6i1.8128

Issue

Article Type

Article