Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Algorithm to estimate biometric performance change over time

The authors present an algorithm that models the rate of change of biometric performance over time on a subject-dependent basis. It is called ‘homomorphic users grouping algorithm’. Although the model is based on very simplistic assumptions that are inherent in linear regression, it has been applied successfully to estimate the performance of talking face and speech identity verification modalities, as well as their fusion, over a period of more than 600 days. Their experiments carried out on the MOBIO database show that subjects exhibit very different performance trends. Although the performance of some users degrades over time, which is consistent with the literature, they also found that for a similar proportion of users, their performance actually improves with use. The latter finding has never been reported in the literature. Hence, their findings suggest that the problem of biometric performance degradation may be not as serious as previously thought, and so far, the community has ignored the possibility of improved biometric performance over time. The findings also suggest that adaptive biometric systems, that is, systems that attempt to update biometric templates, should be subject-dependent.

References

    1. 1)
    2. 2)
      • 8. Poh, N., Bengio, S.: ‘F-ratio client-dependent normalisation on biometric authentication tasks’. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Philadelphia, 2005, pp. 721724.
    3. 3)
      • 2. Wang, H., Flynn, P.J.: ‘Experimental evaluation of eye location accuracies and time-lapse effects on face recognition systems’. Fifth Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA 2005), New York, 2005 (LNCS, 3546), pp. 627636.
    4. 4)
    5. 5)
    6. 6)
      • 10. Hicklin, A., Ulery, B.: ‘The myth of goats: How many people have fingerprints that are hard to match?’. Technical Report, NISTIR 7271, National Institute of Standards and Technology, 2005.
    7. 7)
      • 1. Flynn, P.J., Bowyer, K.W., Phillips, P.J.: ‘Assessment of time dependency in face recognition: an initial study’. Fourth Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA 2003), Guildford, 2003 (LNCS, 2688), pp. 4451.
    8. 8)
      • 19. Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: ‘Target dependent score normalisation techniques and their application to signature verification’. Int. Conf. on Biometric Authentication (ICBA), Hong Kong, 2004 (LNCS, 3072), pp. 498504.
    9. 9)
    10. 10)
      • 9. Daugman, J.: ‘Biometric decision landscapes’. Technical Report, TR482, University of Cambridge Computer Laboratory, 2000.
    11. 11)
      • 11. Wittman, M., Davis, P., Flynn, P.: ‘Empirical studies of the existence of the biometric menagerie in the FRGC 2.0 color image corpus’. Conf. on Computer Vision and Pattern Recognition Workshop, June 2006, p. 33.
    12. 12)
      • 16. Saeta, J., Hernando, J.: ‘On the use of score pruning in speaker verification for speaker dependent threshold estimation’. The Speaker and Language Recognition Workshop (Odyssey), Toledo, 2004, pp. 215218.
    13. 13)
      • 20. Poh, N., Kittler, J.: ‘On the use of log-likelihood ratio based model-specific score normalisation in biometric authentication’. IEEE/IAPR Proc. Int. Conf. Biometrics (ICB'07), Seoul, 2007 (LNCS, 4542), pp. 614624.
    14. 14)
    15. 15)
      • 17. Genoud, D.: ‘Reconnaissance et Transformation de Locuteur’. PhD dissertation, Ecole Polythechnique Federale de Lausanne (EPFL), Switzerland, 1998.
    16. 16)
    17. 17)
      • 30. Box, G.E., Cox, D.R.: ‘An analysis of transformations’. 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 1964, vol. B, no. 26, pp. 211246.
    18. 18)
    19. 19)
      • 34. McCool, C., Marcel, S., Hadid, A., et al: ‘Bi-modal person recognition on a mobile phone: using mobile phone data’. IEEE ICME Workshop on Hot Topics in Mobile Multimedia, July 2012.
    20. 20)
      • 35. Le, Q., Bengio, S.: ‘Client dependent GMM-SVM models for speaker verification’. ICANN, 2003, pp. 443451.
    21. 21)
      • 3. Poh, N., Kittler, J.: ‘A method for estimating authentication performance over time, with applications to face biometrics’. 12th IAPR Iberoamerican Congress on Pattern Recognition (CIARP), Via del Mar-Valparaiso, Chile, 2007, pp. 360369.
    22. 22)
      • 23. Rattani, A., Marcialis, G.-L., Roli, F.: ‘An experimental analysis of the relationship between biometric template update and the Doddington's zoo: a case study in face verification’. ICIAP ‘09: Proc. of the 15th Int. Conf. on Image Analysis and Processing, Berlin, Heidelberg, 2009, pp. 434442.
    23. 23)
    24. 24)
    25. 25)
    26. 26)
      • 31. Poh, N., Kittler, J.: ‘On using error bounds to optimize cost-sensitive multimodal biometric authentication’. Proc. 19th Int. Conf. Pattern Recognition (ICPR), 2008, pp. 14.
    27. 27)
      • 7. Bishop, C.: ‘Neural networks for pattern recognition’ (Oxford University Press, New York, NY, 1999).
    28. 28)
      • 36. Hastie, T., Tibshirani, R., Friedman, J.: ‘The elements of statistical learning’ (Springer-Verlag, New York, NY, 2001).
    29. 29)
      • 6. Poh, N., Kittler, J.: ‘A methodology for separating sheep from goats for controlled enrollment and multimodal fusion’. Proc. of the Sixth Biometrics Symp., Tampa, 2008, pp. 1722.
    30. 30)
      • 24. Teli, M.N., Beveridge, J.R., Phillips, P.J., Givens, G.H., Bolme, D.S., Draper, B.A.: ‘Biometric zoos: theory and experimental evidence’. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, 2009. BTAS ‘09, 2011, pp. 18.
    31. 31)
    32. 32)
    33. 33)
      • 14. Pierrot, J.-B.: ‘Elaboration et Validation d'Approaches en Verification du Locuteur’. PhD dissertation, ENST, Paris, September1998.
    34. 34)
      • 4. Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: ‘Sheep, goats, lambs and wolves: a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation’. Int. Conf. Spoken Language Processing (ICSLP), Sydney, 1998.
    35. 35)
      • 5. Yager, N., Dunstone, T.: ‘Worms, chameleons, phantoms and doves: new additions to the biometric menagerie’. 2007 IEEE Workshop on Automatic Identification Advanced Technologies, June 2007, pp. 16.
    36. 36)
      • 29. Cardinaux, F., Sanderson, C., Marcel, S.: ‘Comparison of MLP and GMM classifiers for face verification on XM2VTS’. Fourth Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA 2003), Guildford, 2003 (LNCS, 2688), pp. 911920.
    37. 37)
      • 33. Poh, N., Bengio, S.: ‘Why do multi-stream, multi-band and multi-modal approaches work on biometric user authentication tasks?’. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Montreal, 2004, vol. V, pp. 893896.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2014.0107
Loading

Related content

content/journals/10.1049/iet-bmt.2014.0107
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address