Identification performance of evidential value estimation for ridge-based biometrics
نویسندگان
چکیده
Law enforcement agencies around the world use ridge-based biometrics, especially fingerprints, to fight crime. Fingermarks that are left at a crime scene and identified as potentially having evidential value (EV) in a court of law are recorded for further forensic analysis. Here, we test our evidential value algorithm (EVA) which uses image features trained on forensic expert decisions for 1428 fingermarks to produce an EV score for an image. First, we study the relationship between whether a fingermark is assessed as having EV, either by a human expert or by EVA, and its correct and confident identification by an automatic identification system. In particular, how often does an automatic system achieve identification when the mark is assessed as not having evidential value? We show that when the marks are captured by a mobile phone, correct and confident automatic matching occurs for 257 of the 1428. Of these, 236 were marked as having sufficient EV by experts and 242 by EVA thresholded on equal error rate. Second, we test four relatively challenging ridge-based biometric databases and show that EVA can be successfully applied to give an EV score to all images. Using EV score as an image quality value, we show that in all databases, thresholding on EV improves performance in closed set identification. Our results suggest an EVA application that filters fingermarks meeting a minimum EV score could aid forensic experts at the point of collection, or by flagging difficult latents objectively, or by pre-filtering specimens before submission to an AFIS.
منابع مشابه
A MODIFICATION ON RIDGE ESTIMATION FOR FUZZY NONPARAMETRIC REGRESSION
This paper deals with ridge estimation of fuzzy nonparametric regression models using triangular fuzzy numbers. This estimation method is obtained by implementing ridge regression learning algorithm in the La- grangian dual space. The distance measure for fuzzy numbers that suggested by Diamond is used and the local linear smoothing technique with the cross- validation procedure for selecting t...
متن کاملFingerprint Binarization using Convex Threshold
A fingerprint identification system is popular and important in biometric identification applications. Its process is composed of two stages: feature extraction and matching. Most fingerprint features include ending points and bifurcation called minutiaes. In this paper, we propose a new fingerprint binarization method based on convex threshold for effective minutiaes extraction. The proposed m...
متن کاملPerformance Analysis and Designing of Technique for Enhancement of Fingerprints based on the Estimated Local Ridge Orientation and Frequency
Fingerprint identification is a growing and popular biometric identification technology. It includes two steps one is fingerprint verification and other is fingerprint recognition. Both of them use minutiae, such as end points and bifurcation points, as features. Therefore, how to appropriately extract minutiae from fingerprint images becomes an important step in fingerprint identification. Ext...
متن کاملA Study on Various Methods Based on Gender Classification through Fingerprints
This paper is proposed of determining the gender through fingerprints.Finger prints verification is one of the most reliable personal identification method and it plays a very important role in forensic application like criminal investigation. Finger prints has been used as a biometric for the gender identification because of its unique nature and do not change throughout the life of an individ...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Information Security
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016