http://iet.metastore.ingenta.com
1887

Algorithm to estimate biometric performance change over time

Algorithm to estimate biometric performance change over time

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The authors present an algorithm that models the rate of change of biometric performance over time on a subject-dependent basis. It is called ‘homomorphic users grouping algorithm’. Although the model is based on very simplistic assumptions that are inherent in linear regression, it has been applied successfully to estimate the performance of talking face and speech identity verification modalities, as well as their fusion, over a period of more than 600 days. Their experiments carried out on the MOBIO database show that subjects exhibit very different performance trends. Although the performance of some users degrades over time, which is consistent with the literature, they also found that for a similar proportion of users, their performance actually improves with use. The latter finding has never been reported in the literature. Hence, their findings suggest that the problem of biometric performance degradation may be not as serious as previously thought, and so far, the community has ignored the possibility of improved biometric performance over time. The findings also suggest that adaptive biometric systems, that is, systems that attempt to update biometric templates, should be subject-dependent.

References

    1. 1)
      • 1. Flynn, P.J., Bowyer, K.W., Phillips, P.J.: ‘Assessment of time dependency in face recognition: an initial study’. Fourth Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA 2003), Guildford, 2003 (LNCS, 2688), pp. 4451.
    2. 2)
      • 2. Wang, H., Flynn, P.J.: ‘Experimental evaluation of eye location accuracies and time-lapse effects on face recognition systems’. Fifth Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA 2005), New York, 2005 (LNCS, 3546), pp. 627636.
    3. 3)
      • 3. Poh, N., Kittler, J.: ‘A method for estimating authentication performance over time, with applications to face biometrics’. 12th IAPR Iberoamerican Congress on Pattern Recognition (CIARP), Via del Mar-Valparaiso, Chile, 2007, pp. 360369.
    4. 4)
      • 4. Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: ‘Sheep, goats, lambs and wolves: a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation’. Int. Conf. Spoken Language Processing (ICSLP), Sydney, 1998.
    5. 5)
      • 5. Yager, N., Dunstone, T.: ‘Worms, chameleons, phantoms and doves: new additions to the biometric menagerie’. 2007 IEEE Workshop on Automatic Identification Advanced Technologies, June 2007, pp. 16.
    6. 6)
      • 6. Poh, N., Kittler, J.: ‘A methodology for separating sheep from goats for controlled enrollment and multimodal fusion’. Proc. of the Sixth Biometrics Symp., Tampa, 2008, pp. 1722.
    7. 7)
      • 7. Bishop, C.: ‘Neural networks for pattern recognition’ (Oxford University Press, New York, NY, 1999).
    8. 8)
      • 8. Poh, N., Bengio, S.: ‘F-ratio client-dependent normalisation on biometric authentication tasks’. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Philadelphia, 2005, pp. 721724.
    9. 9)
      • 9. Daugman, J.: ‘Biometric decision landscapes’. Technical Report, TR482, University of Cambridge Computer Laboratory, 2000.
    10. 10)
      • 10. Hicklin, A., Ulery, B.: ‘The myth of goats: How many people have fingerprints that are hard to match?’. Technical Report, NISTIR 7271, National Institute of Standards and Technology, 2005.
    11. 11)
      • 11. Wittman, M., Davis, P., Flynn, P.: ‘Empirical studies of the existence of the biometric menagerie in the FRGC 2.0 color image corpus’. Conf. on Computer Vision and Pattern Recognition Workshop, June 2006, p. 33.
    12. 12)
    13. 13)
    14. 14)
      • 14. Pierrot, J.-B.: ‘Elaboration et Validation d'Approaches en Verification du Locuteur’. PhD dissertation, ENST, Paris, September1998.
    15. 15)
    16. 16)
      • 16. Saeta, J., Hernando, J.: ‘On the use of score pruning in speaker verification for speaker dependent threshold estimation’. The Speaker and Language Recognition Workshop (Odyssey), Toledo, 2004, pp. 215218.
    17. 17)
      • 17. Genoud, D.: ‘Reconnaissance et Transformation de Locuteur’. PhD dissertation, Ecole Polythechnique Federale de Lausanne (EPFL), Switzerland, 1998.
    18. 18)
    19. 19)
      • 19. Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: ‘Target dependent score normalisation techniques and their application to signature verification’. Int. Conf. on Biometric Authentication (ICBA), Hong Kong, 2004 (LNCS, 3072), pp. 498504.
    20. 20)
      • 20. Poh, N., Kittler, J.: ‘On the use of log-likelihood ratio based model-specific score normalisation in biometric authentication’. IEEE/IAPR Proc. Int. Conf. Biometrics (ICB'07), Seoul, 2007 (LNCS, 4542), pp. 614624.
    21. 21)
    22. 22)
    23. 23)
      • 23. Rattani, A., Marcialis, G.-L., Roli, F.: ‘An experimental analysis of the relationship between biometric template update and the Doddington's zoo: a case study in face verification’. ICIAP ‘09: Proc. of the 15th Int. Conf. on Image Analysis and Processing, Berlin, Heidelberg, 2009, pp. 434442.
    24. 24)
      • 24. Teli, M.N., Beveridge, J.R., Phillips, P.J., Givens, G.H., Bolme, D.S., Draper, B.A.: ‘Biometric zoos: theory and experimental evidence’. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, 2009. BTAS ‘09, 2011, pp. 18.
    25. 25)
    26. 26)
    27. 27)
    28. 28)
    29. 29)
      • 29. Cardinaux, F., Sanderson, C., Marcel, S.: ‘Comparison of MLP and GMM classifiers for face verification on XM2VTS’. Fourth Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA 2003), Guildford, 2003 (LNCS, 2688), pp. 911920.
    30. 30)
      • 30. Box, G.E., Cox, D.R.: ‘An analysis of transformations’. 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 1964, vol. B, no. 26, pp. 211246.
    31. 31)
      • 31. Poh, N., Kittler, J.: ‘On using error bounds to optimize cost-sensitive multimodal biometric authentication’. Proc. 19th Int. Conf. Pattern Recognition (ICPR), 2008, pp. 14.
    32. 32)
    33. 33)
      • 33. Poh, N., Bengio, S.: ‘Why do multi-stream, multi-band and multi-modal approaches work on biometric user authentication tasks?’. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Montreal, 2004, vol. V, pp. 893896.
    34. 34)
      • 34. McCool, C., Marcel, S., Hadid, A., et al: ‘Bi-modal person recognition on a mobile phone: using mobile phone data’. IEEE ICME Workshop on Hot Topics in Mobile Multimedia, July 2012.
    35. 35)
      • 35. Le, Q., Bengio, S.: ‘Client dependent GMM-SVM models for speaker verification’. ICANN, 2003, pp. 443451.
    36. 36)
      • 36. Hastie, T., Tibshirani, R., Friedman, J.: ‘The elements of statistical learning’ (Springer-Verlag, New York, NY, 2001).
    37. 37)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2014.0107
Loading

Related content

content/journals/10.1049/iet-bmt.2014.0107
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address