Technical Testing and Evaluation of Biometric Identification Devices

Although the technical evaluation of biometric identification devices has a history spanning over two decades, it is only now that a general consensus on test and reporting measures and methodologies is developing in the scientific community. By “technical evaluation”, we mean the measurement of the five parameters generally of interest to engineers and physical scientists: false match and false non-match rates, binning error rate, penetration coefficient and transaction times. Additional measures, such as “failure to enroll” or “failure to acquire”, indicative of the percentage of the general population unable to use any particular biometric method, are also important. We have not included in this chapter measures of more interest to social scientists, such as user perception and acceptability. Most researchers now accept the “Receiver Operating Characteristic” (ROC) curve as the appropriate measure of the application-dependent technical performance of any biometric identification device. Further, we now agree that the error rates illustrated in the ROC must be normalized to be independent of the database size and other “accept/reject” decision parameters of the test. This chapter discusses the general approach to application-dependent, decision-policy independent testing and reporting of technical device performance and gives an example of one practical test. System performance prediction based on test results is also discussed.

[1]  J. S. Ahrens,et al.  Laboratory evaluation of the IriScan prototype biometric identifier , 1996 .

[2]  B.S. Atal,et al.  Automatic recognition of speakers from their voices , 1976, Proceedings of the IEEE.

[3]  Sandor Z. Der,et al.  FERET (Face Recognition Technology) Recognition Algorithm Development and Test Results. , 1996 .

[4]  G.R. Doddington,et al.  Speaker recognition—Identifying people by their voices , 1985, Proceedings of the IEEE.

[5]  William H. Press,et al.  Numerical recipes , 1990 .

[6]  R. Khanna,et al.  Evaluation of automated biometrics-based identification and verification systems , 1997, Proc. IEEE.

[7]  J. Swets,et al.  A decision-making theory of visual detection. , 1954, Psychological review.

[8]  D. Owen Handbook of Mathematical Functions with Formulas , 1965 .

[9]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[10]  D. M. Green,et al.  Signal detection theory and psychophysics , 1966 .

[11]  David A. Patterson,et al.  Computer Architecture: A Quantitative Approach , 1969 .

[12]  W. W. Peterson,et al.  The theory of signal detectability , 1954, Trans. IRE Prof. Group Inf. Theory.

[13]  J.M. Naik,et al.  Speaker verification: a tutorial , 1990, IEEE Communications Magazine.

[14]  R. A. Leibler,et al.  On Information and Sufficiency , 1951 .

[15]  James P. Egan,et al.  Signal detection theory and ROC analysis , 1975 .

[16]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[17]  J. P. Holmes,et al.  A performance evaluation of biometric identification devices , 1990 .

[18]  David A. Patterson,et al.  Computer Architecture - A Quantitative Approach, 5th Edition , 1996 .

[19]  Thomas B. Martin,et al.  Automatic Speech and Speaker Recognition , 1979 .

[20]  A.E. Rosenberg,et al.  Automatic speaker verification: A review , 1976, Proceedings of the IEEE.