The performance of a biometric authentication system is dependent on the choice of users and the application scenario represented by the evaluation database. As a result, the system performance under different application scenarios, e.g., from cooperative user to non-cooperative scenario, from well controlled to uncontrolled one, etc, can be very different. The current solution is to build a database containing as many application scenarios as possible for the purpose of the evaluation. We propose an alternative evaluation methodology that can reuse existing databases, hence can potentially reduce the amount of data needed. This methodology relies on a novel technique that projects the distribution of scores from one operating condition to another. We argue that this can be accomplished efficiently only by modeling the genuine user and impostor score distributions for each user parametrically. The parameters of these model-specific class conditional (MSCC) distributions are found by maximum likelihood estimation. The projection from one operating condition to another is modelled by a regression function between the two conditions in the MSCC parameter space. The regression functions are trained from a small set of users and are then applied to a large database. The implication is that one only needs a small set of users with data reflecting both the reference and mismatched conditions. In both conditions, it is required that the two data sets be drawn from a population with similar demographic characteristics. The regression model is used to predict the performance for a large set of users under the mismatched condition.
[1]
Samy Bengio,et al.
User authentication via adapted statistical models of face images
,
2006,
IEEE Transactions on Signal Processing.
[2]
Samy Bengio,et al.
Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps
,
2007,
IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3]
Hyeonjoon Moon,et al.
The FERET Evaluation Methodology for Face-Recognition Algorithms
,
2000,
IEEE Trans. Pattern Anal. Mach. Intell..
[4]
Jean-Philippe Thiran,et al.
The BANCA Database and Evaluation Protocol
,
2003,
AVBPA.
[5]
Sharath Pankanti,et al.
Error analysis of pattern recognition systems - the subsets bootstrap
,
2004,
Comput. Vis. Image Underst..
[6]
K RathaNalini,et al.
Error analysis of pattern recognition systems
,
2004
.
[7]
Douglas A. Reynolds,et al.
SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation
,
1998
.