Performance Evaluation of Behavioral Biometric Systems

We present in this chapter an overview of techniques for the performance evaluation of behavioral biometric systems. The BioAPI standard that defines the architecture of a biometric system is presented in the first part of the chapter... The general methodology for the evaluation of biometric systems is given including statistical metrics, definition of benchmark databases and subjective evaluation. These considerations rely with the ISO/IEC19795-1 standard describing the biometric performance testing and reporting. The specificity of behavioral biometric systems is detailed in the second part of the chapter in order to define some additional constraints for their evaluation. This chapter is dedicated to researchers and engineers who need to quantify the performance of such biometric systems.

[1]  Abdulmotaleb El-Saddik,et al.  Haptic-Based Biometrics: A Feasibility Study , 2006, 2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems.

[2]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[3]  Juan J. Igarza,et al.  MCYT baseline corpus: a bimodal biometric database , 2003 .

[4]  Alfred C. Weaver,et al.  Biometric authentication , 2006, Computer.

[5]  Thierry Pun,et al.  Performance evaluation in content-based image retrieval: overview and proposals , 2001, Pattern Recognit. Lett..

[6]  Terence Sim,et al.  Keystroke Dynamics in a General Setting , 2007, ICB.

[7]  Hyoungjoo Lee,et al.  Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication , 2006, WISI.

[8]  Gérard Chollet,et al.  Text-Independent Speaker Verification: State of the Art and Challenges , 2005, WNSP.

[9]  Davide Maltoni Generation of Synthetic Fingerprint Image Databases , 2004 .

[10]  C. Rosenberger,et al.  Comparative study of invariant descriptors for face recognition , 2006, 2006 8th international Conference on Signal Processing.

[11]  Dario Maio,et al.  Synthetic fingerprint-database generation , 2002, Object recognition supported by user interaction for service robots.

[12]  Neil A. Thacker,et al.  Performance characterization in computer vision: A guide to best practices , 2008, Comput. Vis. Image Underst..

[13]  J. Hanley,et al.  The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.

[15]  Sudeep Sarkar,et al.  The humanID gait challenge problem: data sets, performance, and analysis , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[16]  Jean-Yves Ramel,et al.  User Classification for Keystroke Dynamics Authentication , 2007, ICB.

[17]  Andy Adler,et al.  Comparing Human and Automatic Face Recognition Performance , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[18]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  Takashi Matsumoto,et al.  Effectiveness of Pen Pressure, Azimuth, and Altitude Features for Online Signature Verification , 2007, ICB.

[20]  Issa Traoré,et al.  Detecting Computer Intrusions Using Behavioral Biometrics , 2005, PST.

[21]  Bir Bhanu,et al.  Individual recognition using gait energy image , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.