Independent Performance Evaluation of Biometric Systems
نویسندگان
چکیده
Often in the development of a biometric product the evaluator of the system is the same institution who developed the algorithm. Furthermore, usually the test data set is also collected by the same developer/evaluator and in most cases such database will not be public. Consequently, test results cannot be verified by independent institutions. Although this can be justifiable (e.g. in the optimization phase of an algorithm), from the perspective of a potential customer it reduces trustworthiness of the developed system and reported performances. Therefore, for performance evaluation the availability of independent databases and desirably independent evaluators are very important. It is also essential that algorithm developers do not have access to the testing database and thus the risk of tuned algorithms is minimized. Pseudonymous identifiers (PI) are complementary to imageor minutiaebased references and provide a level that is both more privacy protective and more efficient than symmetric or asymmetric encryption of a biometric reference image or minutiae template record [1]. With PI an individual retains complete control of its biometric data as multiple PI can be generated from a single biometric characteristic without any risk that these can be linked together. At the same time any of these identifiers can be cancelled and replaced by a new one if needed. Research on such PI is a core objective of the TURBINE project [2]. This work presents the biometric performance test report on a fingerprint performance evaluation that has been generated in the context of the TURBINE project [2]. It is worth to emphasize that this performance report is results of the first testing round which are not final results of the project. For the second and final testing round, project partners will submit their improved algorithms, and its results will be available in year 2011. Furthermore, here we only report the ”biometric performance” per se of the algorithms while the ”security performance” of the PI algorithms is evaluated by others in TURBINE.
منابع مشابه
Performance Evaluation Of Behavioral Biometric Systems
We present in this chapter an overview of techniques for the performance evaluation of behavioral biometric systems. The BioAPI standard that defines the architecture of a biometric system is presented in the first part of the chapter... The general methodology for the evaluation of biometric systems is given including statistical metrics, definition of benchmark databases and subjective evalua...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملEvaluation of biometric systems: a study of users' acceptance and satisfaction
This paper presents a modality-independent evaluation methodology to study users’ acceptance and satisfaction of biometric systems. It uses a survey questionnaire for data collection, and some data-mining tools for their analysis. We have applied it on two biometric systems developed in our research laboratory. The results from this survey show the necessity of taking users’ point of view when ...
متن کاملAn Introduction to Evaluating Biometric Systems
O n the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten , lost, or given to another person. But what if the performance estimates of these systems are far more impressive than their actual performance? To measure the real-life performance of biometric systems—and to understand...
متن کامل