Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels

Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data employed in such evaluation is also collected by the same developer/evaluator. In most cases such database will not be made public and consequently test results cannot be verified by independent institutions. This paper presents an independent report on fingerprint performance evaluation that has been conducted in the context of the TURBINE project. In this study the algorithm developer and system evaluator are represented by separate and independent entities. In addition, the algorithm developer does not have access to the primary test database. All these provide pre-conditions to unbiased and trustworthy performance reports. Furthermore, this paper introduces biometric performance testing on a level of biometric references, which is complementary to image- or minutiae-based references. Biometric references in the TURBINE project are pseudonymous identifiers that have been generated by the template protection algorithms. The results of the performance evaluation in this paper are generated by applying the algorithm developers (binary) algorithms at the minutiae (traditional) and pseudonymous identifier levels. The test data set consists of almost 72000 fingerprint images from 100 subjects acquired by several fingerprint scanners to which the algorithm developers did not have access.

[1]  Raymond N. J. Veldhuis,et al.  Pseudo Identities Based on Fingerprint Characteristics , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[2]  J. Bringer,et al.  Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[3]  Christoph Busch,et al.  GUC100 Multi-scanner Fingerprint Database for In-House (Semi-public) Performance and Interoperability Evaluation , 2010, 2010 International Conference on Computational Science and Its Applications.

[4]  Michael D. Garris,et al.  NIST Fingerprint Evaluations and Developments , 2006, Proceedings of the IEEE.

[5]  Christoph Busch,et al.  Encrypting Fingerprint Minutiae Templates by Random Quantization , 2010, NDT.

[6]  Christoph Busch,et al.  A Reference Architecture for Biometric Template Protection based on Pseudo Identities , 2008, BIOSIG.

[7]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[8]  Anil K. Jain,et al.  Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Christoph Busch,et al.  Renewable Minutiae Templates with Tunable Size and Security , 2010, 2010 20th International Conference on Pattern Recognition.

[10]  E.J.C. Kelkboom,et al.  Pitfall of the Detection Rate Optimized Bit Allocation within template protection and a remedy , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.