© The Institution of Engineering and Technology
The authors consider the problem of ‘re-identification’ where a biometric system answers the question ‘Has this person been encountered before?’ without actually deducing the person's identity. Such a system is vital in biometric surveillance applications and applicable to biometric de-duplication. In such a system, identifiers are created dynamically as and when the system encounters an input probe. Consequently, multiple probes of the same identity may be mistakenly assigned different identifiers, whereas probes from different identities may be mistakenly assigned the same identifier. In this study, they describe a re-identification system and develop terminology as well as mathematical expressions for prediction of matching errors. Furthermore, they demonstrate that the sequential order in which the probes are encountered by the system has a great impact on its matching performance. Experimental analysis based on unimodal and multimodal faces and fingerprint scores confirms the validity of the designed error prediction model, as well as demonstrates that traditional metrics for biometric recognition fail to accurately characterise the error dynamics of a re-identification system.
References
-
-
1)
-
7. Nappi, M., Wechsler, H.: ‘Robust re-identification using randomness and statistical learning: quo vadis’, Pattern Recognit. Lett., 2012, 33, (14), pp. 1820–1827 (doi: 10.1016/j.patrec.2012.02.005).
-
2)
-
17. Mansfield, A., Wayman, J.: ‘Best practices in testing and reporting performance of biometric devices’ (UK Govt. Biometrics Working Group, 2002).
-
3)
-
21. Jain, A.K., Ross, A., Pankanti, S.: ‘Biometrics: a tool for information security’, IEEE Trans. Inf. Forensics Sec., 2006, 1, (2), pp. 125–143 (doi: 10.1109/TIFS.2006.873653).
-
4)
-
22. Doddington, G., Liggett, W., Martin, A., et al: ‘Sheep, goats, lambs and wolves: a statistical analysis of speaker performance’. IEEE Int. Conf. on Language and Speech Processing, 1998, pp. 1351–1354.
-
5)
-
26. Jain, A.K., Ross, A., Prabhakar, S.: ‘An introduction to biometric recognition’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), pp. 4–20 (doi: 10.1109/TCSVT.2003.818349).
-
6)
-
2. Doretto, G., Sebastian, T., Tu, P., et al: ‘Appearance-based person reidentification in camera networks: problem overview and current approaches’, J. Ambient Intell. Humanized Comput., 2011, 2, pp. 127–157 (doi: 10.1007/s12652-010-0034-y).
-
7)
-
29. Wayman, J., Possolo, A., Mansfield, A.: ‘Fundamental issues in biometric performance testing: a modern statistical and philosophical framework for uncertainty assessment’. First Int. Biometric Performance Conf. (IBPC), 2010.
-
8)
-
23. Ross, A., Rattani, A., Tistarelli, M.: ‘Exploiting the Doddington zoo effect in biometric fusion’. Third IEEE Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), 2009, pp. 1–7.
-
9)
-
6. Satta, R., Fumera, G., Roli, F.: ‘Fast person re-identification based on dissimilarity representations’, Pattern Recognit. Lett., 2012, 33, (14), pp. 1838–1848 (doi: 10.1016/j.patrec.2012.03.026).
-
10)
-
18. Wayman, J., Jain, A., Maltoni, D., et al: ‘Biometric systems: technology design and performance evaluation’ (Springer-Verlag, 2005).
-
11)
-
3. Gheissari, N., Sebastian, T., Hartley, R.: ‘Person reidentification using spatiotemporal appearance’. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, 2006, vol. 2, pp. 1528–1535.
-
12)
-
20. Ross, A., Nandakumar, K., Jain, A.K.: ‘Handbook of multibiometrics’ (Springer, 2006).
-
13)
-
27. Grother, P., Quinn, G., Phillips, P.: ‘Report on the evaluation of 2d still-image face recognition algorithms’ (National Institute of Standards and Technology (NIST), 2010).
-
14)
-
19. Hong, L., Jain, A., Pankanti, S.: ‘Can multibiometrics improve performance?’. Proc. of AutoID, Summit, NJ, USA, October 1999, pp. 59–64.
-
15)
-
15. Phillips, P., Flynn, P., Scruggs, T., et al: ‘Overview of the Face recognition grand challenge’. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition (CVPR), 2005.
-
16)
-
5. Martinel, N., Micheloni, C.: ‘Re-identify people in wide area camera network’. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition (CVPR), 2012, pp. 31–36.
-
17)
-
24. Crihalmeanu, S., Ross, A., Schuckers, S., et al: ‘A protocol for multibiometric data acquisition, storage and dissemination’ (West Virginia University, 2007).
-
18)
-
28. Grother, P., Quinn, G.W., Matey, J.R., et al: ‘IREX III performance of iris identification algorithms’ (National Institute of Standards and Technology (NIST), 2012).
-
19)
-
16. Jain, A., Flynn, P., Ross, A.: ‘Handbook of biometrics’ (Springer, 2008).
-
20)
-
9. Liu, D., Kubala, F.: ‘Online speaker clustering’. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, 2004.
-
21)
-
4. Hamdoun, O., Moutarde, F., Stanciulescu, B., et al: ‘Person re-identification in multi-camera system by signature based on interest point descriptors collected on short video sequences’. IEEE/ACM Int. Conf. on Distributed Smart Cameras (ICSDC), 2008, pp. 1–6.
-
22)
-
13. Jain, A., Kopell, D., Kakligian, K., et al: ‘Using stationary-dynamic camera assemblies for wide-area video surveillance and selective attention’. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition (CVPR), 2006.
-
23)
-
25. Jain, A.K., Nandakumar, K., Ross, A.: ‘Score normalization in multimodal biometric systems’, Pattern Recognit., 2005, 38, (12), pp. 2270–2285 (doi: 10.1016/j.patcog.2005.01.012).
-
24)
-
10. Sudipto, G., Meyerson, A., Mishra, N., et al: ‘Clustering data streams: theory and practice’, IEEE Trans. Knowl. Data Eng., 2003, 15, (3), pp. 515–528 (doi: 10.1109/TKDE.2003.1198387).
-
25)
-
14. Barr, J., Bowyer, K., Flynn, P.: ‘Detecting questionable observers using face track clustering’. IEEE Workshop on Applications of Computer Vision (WACV), 2011.
-
26)
-
1. Jain, A., Bolle, R., Pankanti, S.: ‘Biometrics: personal identification in networked society’ (Heidelberg, 1999).
-
27)
-
8. Charikar, M., Chekuri, C., Feder, T., et al: ‘Incremental clustering and dynamic information retrieval’. Proc. 29th ACM Symp. on Theory of Computing, 1997, pp. 626–635.
-
28)
-
31. DeCann, B., Ross, A.: ‘Has this person been encountered before?: modeling an anonymous identification system’. IEEE Computer Society Workshop on Biometrics at the Computer Vision and Pattern Recognition (CVPR) Conf., 2012.
-
29)
-
11. Hampapur, A., Brown, L., Connell, H., et al: ‘Smart video surveillance: exploring the concept of multi-scale tracking’. IEEE Signal Processing Magazine, March 2005, pp. 38–51.
-
30)
-
12. Shah, M., Javed, O., Shafique, K.: ‘Automated visual surveillance in realistic scenarios’, IEEE Multimedia, 2007, 14, (1), pp. 30–39 (doi: 10.1109/MMUL.2007.3).
-
31)
-
32. Dass, S.C., Zhu, Y., Jain, A.K.: ‘Validating a biometric authentication system: sample size requirements’, IEEE Trans. Pattern Anal. Mach., 2006, 28, (12), pp. 1902–1319 (doi: 10.1109/TPAMI.2006.255).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2015.0061
Related content
content/journals/10.1049/iet-bmt.2015.0061
pub_keyword,iet_inspecKeyword,pub_concept
6
6