Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition - 1.4 Presented By: Chris Miles.

Slides:



Advertisements
Similar presentations
Chapter 5 Errors Bjarne Stroustrup
Advertisements

Dr. Marc Valliant, VP & CTO
Parametric measures to estimate and predict performance of identification techniques Amos Y. Johnson & Aaron Bobick STATISTICAL METHODS FOR COMPUTATIONAL.
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Linear Classifiers (perceptrons)
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
© Tan,Steinbach, Kumar Introduction to Data Mining 4/18/ Other Classification Techniques 1.Nearest Neighbor Classifiers 2.Support Vector Machines.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Creating and Maintaining Databases Dr. Pushkin Kachroo.
Cos 429: Face Detection (Part 2) Viola-Jones and AdaBoost Guest Instructor: Andras Ferencz (Your Regular Instructor: Fei-Fei Li) Thanks to Fei-Fei Li,
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Cost-Sensitive Classifier Evaluation Robert Holte Computing Science Dept. University of Alberta Co-author Chris Drummond IIT, National Research Council,
Biometrics II CUBS, University at Buffalo
Cbio course, spring 2005, Hebrew University (Alignment) Score Statistics.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.

SE 450 Software Processes & Product Metrics 1 Defect Removal.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Chapter 5 Basic System Errors (Alireza Tavakkoli).
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.
User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Biometrics: Ear Recognition
Digital Camera and Computer Vision Laboratory Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, R.O.C.
Intermediate Statistical Analysis Professor K. Leppel.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Chapter 14 Speaker Recognition 14.1 Introduction to speaker recognition 14.2 The basic problems for speaker recognition 14.3 Approaches and systems 14.4.
NIST Update: Part Deux Elaine Newton, PhD NIST
ISV Innovation Presented by ISV Innovation Presented by Business Intelligence Fundamentals: Data Cleansing Ola Ekdahl IT Mentors 9/12/08.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005.
PeptideProphet Explained Brian C. Searle Proteome Software Inc SW Bertha Blvd, Portland OR (503) An explanation.
BLAST: Basic Local Alignment Search Tool Altschul et al. J. Mol Bio CS 466 Saurabh Sinha.
Statistical Inference for the Mean Objectives: (Chapter 9, DeCoursey) -To understand the terms: Null Hypothesis, Rejection Region, and Type I and II errors.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Computational Intelligence: Methods and Applications Lecture 16 Model evaluation and ROC Włodzisław Duch Dept. of Informatics, UMK Google: W Duch.
G53SEC 1 Authentication and Identification Who? What? Where?
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
Neural Network Implementation of Poker AI
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Biometric for Network Security. Finger Biometrics.
Machine Learning Tutorial-2. Recall, Precision, F-measure, Accuracy Ch. 5.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
1 SMU EMIS 7364 NTU TO-570-N Control Charts Basic Concepts and Mathematical Basis Updated: 3/2/04 Statistical Quality Control Dr. Jerrell T. Stracener,
Digital Camera and Computer Vision Laboratory Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, R.O.C.
Chapter 9, Part E. VII. Calculating the Probability of Type II Errors A common decision in business is whether to accept a shipment or not, based upon.
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
Statistical Inference for the Mean Objectives: (Chapter 8&9, DeCoursey) -To understand the terms variance and standard error of a sample mean, Null Hypothesis,
ISA Kim Hye mi. Introduction Input Spectrum data (Protein database) Peptide assignment Peptide validation manual validation PeptideProphet.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Hand Geometry Recognition
Lecture 7 Constructing hypotheses
A review of audio fingerprinting (Cano et al. 2005)
FACE RECOGNITION TECHNOLOGY
Secure and Privacy-Preserving User Authentication Using Biometrics
Hybrid Finger print recognition
Sequence comparison: Multiple testing correction
Presentation transcript:

Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles

Extending to Identification ● How do we extend our numerical models for verification errors for identificatation? ● FNMR – False Non Match Rate ● FMR – False Match Rate ● What Issues are presented

Identification System ● Maintains a database of enrolled users ● Tries to match input against the database ● Positive Identification == Negative Identification ● Output – List of best matches – Ideally just the true identity – Best Match – yes/no in the list

Example ● Casino using face detection to identify people on the Nevada Gaming Commission's black list – – Basis for other government biometrics systems ● N = the number of people on the list ● M = number of people through the casino daily ● Calculate FNMR N and FMR N

Matching System ● Parallel version of your favorite verification algorithm ● Attempt to match all users against the database

FNMR N ● The chance of being falsely rejected is the same as verification ● Chance of not matching against your template – chance of matching someone else's template ● Assuming no FMR, FNMR N = FNMR

FMR N ● FMR N = Chance of matching someones template ^ number of templates ● FMR N = 1 – (1 – FMR) N ● Number of daily false matches = M * FMR N = M (1 - (1-FMR) N )

Accuracy Scales Worse then Computation ● The chance of being falsely accepted rises exponentially with the number of templates ● Suppose algorithm is 99.99% accurate – 100 people in the database – Each has 8 templates – 10,000 people through the casino a day ● FMR N = = ● FMR N * = 768 False accepts a day

Winnowing ● True identification is exponentially hard, so generally we compromise and just return a list of probable matches. ● Input -> System -> List of Candidate Matches ● A second system, biometric or a human supervisor, then tries to identify the user from the new List / Database of candidates ● Candidates -> Second System -> Identity ● “Passing the buck” so to speak

Who's on the list? ● Threshold – Apply a threshold to the similarity metric – similarity > threshold -> On the list ● Rank – Take the K most similar templates ● Hybrid – Take the K most similar templates so long as there similarity > threshold

Weaknesses ● Threshold – If several users kind of match the input, but not quite, a threshold based system would return nothing ● Rank – Impostor -> List of bad matches – Solution: Generic Impostor Model -> Additional Template representing a non-match situation, if a user matches this -> returns nothing. ● Hybrid – Strengths of both techniques cover the weaknesses

Hybridization Ideas ● Adjust K based upon how many are above the threshold ● Adjust the threshold based upon the distribution of similarities

Multiple Templates ● Example had multiple templates per individual ● Input might match mutiple templates from one person ● Only one might need to be in the list ● Domain Dependent

Characterizing Identification ● FNMR and FMR ~= Reliability and Selectivity ● Reliability – 1 - FRR – How often we correctly identify someone who is in the database ● Selectivity – K – Rel or – (m-1) FAR – Number of incorrect matches returned

RSC, ROC, RPC Curves ● These curves show the compromises involved ● ROC Compromises between FAR and FRR rate – Should the vending machine take my ripped dollar and someone elses forgery? ● RPC Curves – If google returned more results it would be less likely to miss relavant ones – Would include more irrelevant results however ● RSC Curves

Three systems ● Theshold Based – Previous Example ● Rank-Based identification ● Rank-order statistics ● Rank Probability Mass Function

Threshold System Errors ● Similar to previous example only returns a list of individuals above the threshold ● Errors – FAR M = m * FAR * (1-FAR) m-1 - Falsely Match one individual – Ambiguous answer -> List has length > 1 – P(Ambiguous) = 1 – [1 – (m+1) * FAR](1 - FAR) m-1 – FRR M = 1 - (1 – FRR) * (1 – FAR) m-1 ~= FRR

Rank Based System Errors ● Only works in very restricted close world scenarios (No Impostors) ● Only one error – Misidentification by the correct user being ranked below another ● Analyze probabilistic distribution of ranks – Rank Probability Mass Function