Usability evaluation of multi-modal biometric verification systems

As a result of the evolution in the field of biometrics, a new breed of techniques and methods for user identity recognition and verification has appeared based on the recognition and verification of several biometric features considered unique to each individual. Signature and voice characteristics, facial features, and iris and fingerprint patterns have all been used to identify a person or just to verify that the person is who he/she claims to be. Although still relatively new, these new technologies have already reached a level of development that allows its commercialization. However, there is a lack of studies devoted to the evaluation of these technologies from a user-centered perspective. This paper is intended to promote user-centered design and evaluation of biometric technologies. Towards this end, we have developed a platform to perform empirical evaluations of commercial biometric identity verification systems, including fingerprint, voice and signature verification. In this article, we present an initial empirical study in which we evaluate, compare and try to get insights into the factors that are crucial for the usability of these systems.

[1]  Sharon L. Oviatt,et al.  Multimodal interface research: a science without borders , 2000, INTERSPEECH.

[2]  H. Gish,et al.  Text-independent speaker identification , 1994, IEEE Signal Processing Magazine.

[3]  Fernando L. Podio Biometrics - Technologies for Highly Secure Personal Authentication , 2001 .

[4]  David Zhang Biometric solutions : for authentication in an E-world , 2002 .

[5]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[6]  Václav Matyás,et al.  Biometric authentication - security and usability , 2002, Communications and Multimedia Security.

[7]  Takeo Kanade,et al.  Picture Processing System by Computer Complex and Recognition of Human Faces , 1974 .

[8]  R. Khanna,et al.  Evaluation of automated biometrics-based identification and verification systems , 1997, Proc. IEEE.

[9]  D. Reynolds,et al.  Authentication gets personal with biometrics , 2004, IEEE Signal Processing Magazine.

[10]  Paul van Schaik,et al.  Using on-line surveys to measure three key constructs of the quality of human-computer interaction in web sites: psychometric properties and implications , 2003, Int. J. Hum. Comput. Stud..

[11]  J. L. Wayman,et al.  Best practices in testing and reporting performance of biometric devices. , 2002 .

[12]  Mary Ellen Zurko,et al.  User-centered security , 1996, NSPW '96.

[13]  Bruce Schneier,et al.  Beyond fear - thinking sensibly about security in an uncertain world , 2003 .

[14]  Roberto Brunelli,et al.  Person identification using multiple cues , 1995, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  Gilbert Cockton,et al.  People and Computers XIV — Usability or Else! , 2000, Springer London.

[16]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[17]  Douglas A. Reynolds,et al.  The NIST speaker recognition evaluation - Overview, methodology, systems, results, perspective , 2000, Speech Commun..

[18]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[19]  Kasper Hornbæk,et al.  Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? , 2000, CHI.

[20]  P. Jonathon Phillips,et al.  An Introduction to Evaluating Biometric Systems , 2000, Computer.

[21]  B.S. Atal,et al.  Automatic recognition of speakers from their voices , 1976, Proceedings of the IEEE.

[22]  Daniel Vogel,et al.  Interactive public ambient displays: transitioning from implicit to explicit, public to personal, interaction with multiple users , 2004, UIST '04.

[23]  Samy Bengio,et al.  A multi-sample multi-source model for biometric authentication , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.

[24]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[25]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[26]  Batya Friedman,et al.  Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[27]  Andrew S. Patrick,et al.  Usability and Acceptability of Biometric Security Systems , 2004, Financial Cryptography.

[28]  M. Angela Sasse,et al.  Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.

[29]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.