Classify system identification by using Fuzzy TOPSIS

Mortaza Zolfpour-Arokhlo, Mohsen Moradi, Mohammad Nabi Omidvar


Today, due to the importance of personal information security, old tools, such as using passwords is not responsive and reliable. So experts are seeking for safer ways. Biometric science is one of the most successful methods of system identification for diagnosing, Verification and determine. In this paper, first we define the kinds, characteristics and methods of implementation of this technology. The following criteria are discussed and finally some of the weaknesses of this technology and its improvement has been discussed. By using models based on different criteria Fuzzy Topsis types of biometric comparison we determine which type is best.


Security ; Security, biometric, identification, TOPSIS, Fuzzy


R. Reillo, R. Moreno. Standardised System For Automatic Remote Evaluation Of Biometric Algorithms. In: Elsevier Computer Standards & Interfaces, Vol. 34, pp. 413-425, 2012.

H. Al-Assam, S. Jassim. Security Evaluation Of Biometric Keys. In: Elsevier Computers & Security, Vol. 31, pp. 151-163, 2012.

Ch. Rathgeb, A. Uhl, P. Wild. State-of-the-Art in Iris Biometrics. In: Springer Advances in Information Security,Vol. 59, pp. 21-36, 2013.

A. Jain, A. Ross, S. Prabhakar. An Introduction To Biometric Recognition. In: IEEE Trans, On Circuits And Systems For Video Technology, Vol. 14, pp 4-19, 2004.

P. Phillips, A. Martin, C. Wilson. An introduction evaluating biometric systems. In: IEEE Computer Society, Vol. 33, pp. 56-63, 2000.

S. Prabhakar, S. Pankanti, A. Jain. Biometric Recognition Security And Privacy Concerns. In: IEEE Computer Society, Vol. 1, pp. 33-42, 2003.

S. Liu, M. Silverman. A Practical Guide to Biometric Security Technology. In: IT Professional archive, Vol. 3, pp. 27-32, 2001.

R. Bhatia. Biometrics and Face Recognition Techniques. In: International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, pp. 93-99, 2013.

N. Sharma, V. Rathore. Role of Biometric Technology over Advanced Security and Protection in Auto Teller Machine Transaction. In: International Journal of Engineering and Advanced Technology, Vol. 1, pp. 249-251, 2012.

Y. ELMIR. Score Level Fusion Based Multimodal Biometric Identification (Fingerprint & Voice). In: IEEE Sciences of Electronics, Technologies of Information and Telecommunications, Vol. 2, pp. 146-150, 2012.

E. Tabassi, C. Wilson. A Novel Approach To Fingerprint Image Quality. In: IEEE International Conference On Image Processing, Vol. 2, pp. 37-40, 2005.

W. Han, Ch. Chan. An Efficient Mfcc Extraction Method In Speech Recognition. In: IEEE Circuits and Systems, Vol.1 , pp. 145-148, 2006.

M. Ahmed, H. Ebied, El. Horbaty, M. Salem. Analysis of Palm Vein Pattern Recognition Algorithms and Systems. In: International Journal of Bio-Medical Informatics and e-Health, Vol. 1, pp. 10-14, 2013.

A. Kumar, D. Zhang. Hand geometry Recognition Sing Entropy-Based Discretization. In: IEEE Transactions On Information Forensics And Security, Vol. 2, pp. 181-187, 2007.

H. Liau, D. Isa. Feature Selection For Support Vector Machine-Based Face-Iris Multimodal Biometric System. In: Elsevier, Vol. 38, pp. 11105–11111, 2011.

M. Hazem, E. Bakry. Face Detection Using Fast Neural Processors And Image Decomposition. In: International Journal Of Computational Intelligence, Vol. 1, pp. 313-316, 2004.

M. Hazem, E. Bakry, M. Hamada. Fast Principal Component Analysis For Face Detection Using Cross-Correlation And Image Decomposition. In: Proc. Of IEEE Ijcnn’09, Atlanta, Usa, Vol. 1, pp. 751-756, 2009.

M. Hazem, E. Bakry, N. Mastorakis. Personal Identification Through Biometric Technology. In: Proceedings Of The 9th Wseas International Conference On Applied Informatics And Communications, Vol. 2, pp. 325-340, 2009.

S. Hariprasath. Multimodal Biometric Recognition Using Iris Feature Extraction and Palmprint Features. In: IEEE Advances in Engineering, Science and Management, pp.174-179, 2012.

L. Ma, T. Tan, Y. Wang, D. Zhang. Efficient Iris Recognition By Characterizing Key Local Variations. In: IEEE Transactions On Image Processing, Vol. 13, pp. 739-750, 2004.

A. Jain, A. Ross, Sh. Pankanti. Biometrics: A Tool for Information Security. In: IEEE Transactions On Information Forensics And Security, Vol. 1, pp. 125-143, 2006.

J. Daugman, C. Downing. Effect Of Severe Image Compression On Iris Recognition Performance. In: IEEE Transactions On Information Forensics And Security, Vol. 3, pp. 52-61, 2008.

A. Sana, P. Gupta. Ear Biometrics: A New Approach. In: Paper Presented At The Sixth International Conference On Advances In Pattern Recognition Held At Indian Statistical Institute, Kolkata, pp. 46-50, 2007.

S. Sonkamble, R. Thool, B. Sonkamble. Survey Of Biometric Recognition Systems And Their Applications. in: Journal Of Theoretical And Applied Information Technology,Vol. 11, pp. 45-51, 2010.

K. Delac, M. Grgic. A Survey Of Biometric Recognition Methods. In: IEEE International Symposium Electronics, pp. 184-193, 2004.

Saghafian, S. and Hejazi , S. R., "MultiCriteria Group Decision Making a Modified Fuzzy TOPSIS Procedure", Web Technologies and Internet Commerce, 2,215‐221,(2005).

color,J.J.,color,U.S.,Uann,B.,"fuzzy sets theory,principles and yields".

NURANI,.M., "fuzzy numbers and their comparing methods", the AM thesis , kerman university,1999.

mohammadi,a., shohani,j.,jahanshahi,h.,"numerical taxonomy analysis with triangular fuzzy data",the 10th conference of fuzzy systems,iran,shahid beheshti university,2010.

N. Ates, S. Cevik, C. Kahremman. Multi Attribute Performance Evaluation Using a Hierachical Fuzzy Topsis Method. In: Springer Berlin Heidelberg, Vol. 201, pp. 537-572, 2006.

R. Bell man, L. Zadeh. Decision-Making In A Fuzzy Environment. In: Management Science, Vol. 17, pp. 141-164, 1970.

T. Chu, Y. Lin. An Extension To Fuzzy MCDM. In: Computers and mathematics with applications, Vol. 57, pp. 445-454, 2009.

S. Opricovic, G. Tzeng. Compromise Solution By MCDM Methods: A Comparative Analysis Of VIKOR and TOPSIS. In: Elsevier European journal of Operational Research, Vol. 156, pp. 445-455, 2004.

L. Zadeh. Fuzzy Sets. In: Elsevier Information and Control, Vol. 8, pp. 338-353, 1965.

Full Text: PDF


  • There are currently no refbacks.


All Rights Reserved © 2012 IJARCSEE

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.