Framework for biometric match score fusion using statistical and belief models


Book Description

This chapter presents a framework for multi-biometric match score fusion when non-ideal conditions cause conflict in the results of different unimodal biometrics classifiers. The proposed framework uses belief function theory to effectively fuse the match scores and density estimation technique to compute the belief assignments.







Fusion of Multimodal Biometrics using Feature and Score Level Fusion


Book Description

Biometrics is used to uniquely identify a person‘s individual based on physical and behavioural characteristics. Unimodal biometric system contains various problems such as degree of freedom, spoof attacks, non-universality, noisy data and error rates. Multimodal biometrics is introduced to overcome the limitations in Unimodal biometrics.




Advances and Applications of DSmT for Information Fusion, Vol. 3


Book Description

This volume has about 760 pages, split into 25 chapters, from 41 contributors. First part of this book presents advances of Dezert-Smarandache Theory (DSmT) which is becoming one of the most comprehensive and flexible fusion theory based on belief functions. It can work in all fusion spaces: power set, hyper-power set, and super-power set, and has various fusion and conditioning rules that can be applied depending on each application. Some new generalized rules are introduced in this volume with codes for implementing some of them. For the qualitative fusion, the DSm Field and Linear Algebra of Refined Labels (FLARL) is proposed which can convert any numerical fusion rule to a qualitative fusion rule. When one needs to work on a refined frame of discernment, the refinement is done using Smarandache¿s algebraic codification. New interpretations and implementations of the fusion rules based on sampling techniques and referee functions are proposed, including the probabilistic proportional conflict redistribution rule. A new probabilistic transformation of mass of belief is also presented which outperforms the classical pignistic transformation in term of probabilistic information content. The second part of the book presents applications of DSmT in target tracking, in satellite image fusion, in snow-avalanche risk assessment, in multi-biometric match score fusion, in assessment of an attribute information retrieved based on the sensor data or human originated information, in sensor management, in automatic goal allocation for a planetary rover, in computer-aided medical diagnosis, in multiple camera fusion for tracking objects on ground plane, in object identification, in fusion of Electronic Support Measures allegiance report, in map regenerating forest stands, etc.




Computational Methods in Biometric Authentication


Book Description

Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of bioauthentication devices, supplying a set of rigorous statistical methods for evaluating biometric authentication systems. This framework of methods can be extended and generalized for a wide range of applications and tests. This is the first single resource on statistical methods for estimation and comparison of the performance of biometric authentication systems. The book focuses on six common performance metrics: for each metric, statistical methods are derived for a single system that incorporates confidence intervals, hypothesis tests, sample size calculations, power calculations and prediction intervals. These methods are also extended to allow for the statistical comparison and evaluation of multiple systems for both independent and paired data. Topics and features: * Provides a statistical methodology for the most common biometric performance metrics: failure to enroll (FTE), failure to acquire (FTA), false non-match rate (FNMR), false match rate (FMR), and receiver operating characteristic (ROC) curves * Presents methods for the comparison of two or more biometric performance metrics * Introduces a new bootstrap methodology for FMR and ROC curve estimation * Supplies more than 120 examples, using publicly available biometric data where possible * Discusses the addition of prediction intervals to the bioauthentication statistical toolset * Describes sample-size and power calculations for FTE, FTA, FNMR and FMR Researchers, managers and decisions makers needing to compare biometric systems across a variety of metrics will find within this reference an invaluable set of statistical tools. Written for an upper-level undergraduate or master’s level audience with a quantitative background, readers are also expected to have an understanding of the topics in a typical undergraduate statistics course. Dr. Michael E. Schuckers is Associate Professor of Statistics at St. Lawrence University, Canton, NY, and a member of the Center for Identification Technology Research.




Unification of Evidence Theoretic Fusion Algorithms: A Case Study in Level-2 and Level-3 Fingerprint Features


Book Description

This paper formulates an evidence-theoretic multimodal unification approach using belief functions that takes into account the variability in biometric image characteristics. While processing non-ideal images the variation in the quality of features at different levels of abstraction may cause individual classifiers to generate conflicting genuine-impostor decisions. Existing fusion approaches are non-adaptive and do not always guarantee optimum performance improvements.




Biometric Systems


Book Description

Biometric Systems provides practitioners with an overview of the principles and methods needed to build reliable biometric systems. It covers three main topics: key biometric technologies, design and management issues, and the performance evaluation of biometric systems for personal verification/identification. The four most widely used technologies are focused on - speech, fingerprint, iris and face recognition. Key features include: in-depth coverage of the technical and practical obstacles which are often neglected by application developers and system integrators and which result in shortfalls between expected and actual performance; and protocols and benchmarks which will allow developers to compare performance and track system improvements.




Iris Biometrics


Book Description

Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference.




Multibiometric Systems


Book Description

Multibiometric systems are gaining popularity because they are able to overcome limitations such as non-universality, noisy sensor data and susceptibility to spoof attacks common in unibiometric systems. We address two critical issues in the design of a multibiometric system, namely, fusion methodology and template security. We propose a fusion methodology based on the Neyman-Pearson theorem for combination of match scores provided by multiple biometric matchers. The likelihood ratio (LR) test used in the Neyman-Pearson theorem directly maximizes the genuine accept rate (GAR) at any desired false accept rate (FAR). We extend the likelihood ratio based fusion scheme to incorporate the quality of the biometric samples. The LR framework can be used for designing sequential multibiometric systems by constructing a binary decision tree classifier based on the marginal likelihood ratios of the individual matchers. The use of image quality information further improves the GAR to 90% at a FAR of 0:001%. Next, we show that the proposed likelihood ratio based fusion framework is also applicable to a multibiometric system operating in the identification mode. We investigate rank level fusion strategies and propose a hybrid scheme that utilizes both ranks and scores to perform fusion in the identification scenario. Fusion of multiple biometric sources requires storage of multiple templates for the same user corresponding to the individual biometric sources. Template security is an important issue because stolen biometric templates cannot be revoked. We propose a scheme for securing multibiometric templates as a single entity using the fuzzy vault framework. We have developed fully automatic implementa- tions of a ngerprint-based fuzzy vault that secures minutiae templates and an iris cryptosystem that secures iris code templates. We also demonstrate that a multibiometric vault achieves better recognition performance and higher security compared to a unibiometric vault.




Biometric Recognition


Book Description

Biometric recognition-the automated recognition of individuals based on their behavioral and biological characteristic-is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric recognition has been applied to identification of criminals, patient tracking in medical informatics, and the personalization of social services, among other things. In spite of substantial effort, however, there remain unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. Moreover, the general public has been exposed to biometrics largely as high-technology gadgets in spy thrillers or as fear-instilling instruments of state or corporate surveillance in speculative fiction. Now, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. A focus on fighting insurgencies and terrorism has led to the military deployment of biometric tools to enable recognition of individuals as friend or foe. Commercially, finger-imaging sensors, whose cost and physical size have been reduced, now appear on many laptop personal computers, handheld devices, mobile phones, and other consumer devices. Biometric Recognition: Challenges and Opportunities addresses the issues surrounding broader implementation of this technology, making two main points: first, biometric recognition systems are incredibly complex, and need to be addressed as such. Second, biometric recognition is an inherently probabilistic endeavor. Consequently, even when the technology and the system in which it is embedded are behaving as designed, there is inevitable uncertainty and risk of error. This book elaborates on these themes in detail to provide policy makers, developers, and researchers a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development.