Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications

This paper revisits the concept of an authentication machine (A-machine) that aims at identifying/verifying humans. Although A-machines in the closed-set application scenario are well understood and commonly used for access control utilizing human biometrics (face, iris, and fingerprints), open-set applications of A-machines have yet to be equally characterized. This paper presents an analysis and taxonomy of A-machines, trends, and challenges of open-set real-world applications. This paper makes the following contributions to the area of open-set A-machines: 1) a survey of applications; 2) new novel life cycle metrics for theoretical, predicted, and operational performance evaluation; 3) a new concept of evidence accumulation for risk assessment; 4) new criteria for the comparison of A-machines based on the notion of a supporting assistant; and 5) a new approach to border personnel training based on the A-machine training mode. It offers a technique for modeling A-machines using belief (Bayesian) networks and provides an example of this technique for biometric-based e-profiling.

[1]  Veneta MacLeod,et al.  Methodology for the Evaluation of an International Airport Automated Border Control Processing System , 2011 .

[2]  Arun Ross,et al.  Multibiometric systems , 2004, CACM.

[3]  Serge Gutwirth,et al.  Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .

[4]  Brendan J. Frey,et al.  A comparison of algorithms for inference and learning in probabilistic graphical models , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Sheldon H. Jacobson,et al.  Risk-Based Policies for Airport Security Checkpoint Screening , 2010, Transp. Sci..

[6]  Andrea F. Abate,et al.  MUBAI: multiagent biometrics for ambient intelligence , 2011, J. Ambient Intell. Humaniz. Comput..

[7]  George W. Quinn,et al.  Report on the Evaluation of 2D Still-Image Face Recognition Algorithms , 2011 .

[8]  Jörn Ostermann,et al.  User evaluation: Synthetic talking faces for interactive services , 1999, The Visual Computer.

[9]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..

[10]  Jonghun Baek,et al.  Posture Monitoring System for Context Awareness in Mobile Computing , 2010, IEEE Transactions on Instrumentation and Measurement.

[11]  Marina L. Gavrilova,et al.  Situational Awareness through Biometrics , 2013, Computer.

[12]  George N. Votsis,et al.  Emotion recognition in human-computer interaction , 2001, IEEE Signal Process. Mag..

[13]  Stephen Coulthart Using social media for global security , 2016 .

[14]  Dmitry O. Gorodnichy,et al.  Automated border control: Problem formalization , 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[15]  Marvin Rausand,et al.  Risk Assessment: Theory, Methods, and Applications , 2011 .

[16]  Bir Bhanu,et al.  Computer Vision Beyond the Visible Spectrum , 2004 .

[17]  Gonzalo Bailador,et al.  Secure access control by means of human stress detection , 2011, 2011 Carnahan Conference on Security Technology.

[18]  John Daugman,et al.  Iris Recognition at Airports and Border-Crossings , 2009, Encyclopedia of Biometrics.

[19]  Bojan Cukic,et al.  Combined performance and risk analysis for border management applications , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[20]  Lynette I. Millett,et al.  Biometric Recognition: Challenges and Opportunities , 2010 .

[21]  Bartholomew Elias Airport Passenger Screening: Background and Issues for Congress , 2009 .

[22]  Marina L. Gavrilova,et al.  Facial biometrics for situational awareness systems , 2013, IET Biom..

[23]  C. Pelachaud,et al.  Emotion-Oriented Systems: The Humaine Handbook , 2011 .

[24]  Shawn Eastwood,et al.  Risk profiler in automated human authentication , 2014, 2014 IEEE Symposium on Computational Intelligence for Engineering Solutions (CIES).

[25]  S.N. Yanushkevich,et al.  Experience of Design and Prototyping of a Multi-Biometric Early Warning Physical Access Control Security System (PASS) and a Training System (T-PASS) , 2006, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics.

[26]  Terje Aven,et al.  Foundations of Risk Analysis: Aven/Foundations of Risk Analysis , 2012 .

[27]  Robert W Poole,et al.  A Risk-based Airport Security Policy , 2003 .

[28]  Ronald R. Yager,et al.  Dempster–Shafer belief structures with interval valued focal weights , 2001, Int. J. Intell. Syst..

[29]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[30]  Giulio Sandini,et al.  Cognitive Systems , 2005 .

[31]  Tsutomu Sasao,et al.  Hahoe KAIST Robot Theatre: learning rules of interactive robot behavior as a multiple-valued logic synthesis problem , 2005, 35th International Symposium on Multiple-Valued Logic (ISMVL'05).

[32]  B. Miller,et al.  Vital signs of identity [biometrics] , 1994, IEEE Spectrum.

[33]  Andry Tanoto,et al.  FaceBots: Steps towards enhanced long-term human-robot interaction by utilizing and publishing online social information , 2009, Paladyn J. Behav. Robotics.

[34]  Himanshu S. Bhatt,et al.  Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm , 2013, IEEE Transactions on Information Forensics and Security.

[35]  Konstantinos N. Plataniotis,et al.  DecisionMaking Support in BiometricBased Physical Access Control Systems: Design Concept, Architecture, and Applications , 2010 .

[36]  Kathryn B. Laskey,et al.  Terrorism Risk Management , 2008 .

[37]  Anthony J. Palmer,et al.  Ten Reasons Why IRIS Needed 20:20 Foresight: Some Lessons for Introducing Biometric Border Control Systems , 2012, 2012 European Intelligence and Security Informatics Conference.

[38]  Li Lin,et al.  Passenger grouping with risk levels in an airport security system , 2009, Eur. J. Oper. Res..

[39]  Marvin Rausand,et al.  Risk Assessment: Rausand/Risk Assessment , 2011 .

[40]  Karin Rothschild Computer Vision Beyond The Visible Spectrum , 2016 .

[41]  N. Poh,et al.  Multibiometrics for Identity Authentication: Issues, Benefits and Challenges , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[42]  Michael S. Hsiao,et al.  Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.

[43]  Ronald R. Yager,et al.  On the valuation of alternatives for decision‐making under uncertainty , 2002, Int. J. Intell. Syst..

[44]  Ronald R. Yager,et al.  Uncertainty modeling and decision support , 2004, Reliab. Eng. Syst. Saf..

[45]  L. Fiondella,et al.  Security and performance analysis of a passenger screening checkpoint for mass-transit systems , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[46]  Daniel Cuesta Cantarero,et al.  A Multi-modal Biometric Fusion Implementation for ABC Systems , 2013, 2013 European Intelligence and Security Informatics Conference.

[47]  Russell Beale,et al.  Affective interaction: How emotional agents affect users , 2009, Int. J. Hum. Comput. Stud..

[48]  Jon M. Kleinberg,et al.  Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review] , 2013, IEEE Technol. Soc. Mag..

[49]  Danny Weyns,et al.  Multi-Agent Systems , 2009 .

[50]  Marina L. Gavrilova,et al.  Belief trees and networks for biometric applications , 2011, Soft Comput..

[51]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[52]  Didier Bigo,et al.  Justice and Home Affairs databases and a Smart Borders System at EU external borders. An evaluation of current and forthcoming proposals. CEPS Paper in Liberty and Security No. 52/December 2012 , 2012 .

[53]  I. Pavlidis,et al.  Thermal image analysis for polygraph testing. , 2002, IEEE engineering in medicine and biology magazine : the quarterly magazine of the Engineering in Medicine & Biology Society.

[54]  Adrian Stoica,et al.  Support of Interviewing Techniques in Physical Access Control Systems , 2008, IWCF.

[55]  Matthew L. Jensen,et al.  Detecting Concealment of Intent in Transportation Screening: A Proof of Concept , 2009, IEEE Transactions on Intelligent Transportation Systems.

[56]  Mark S. Nixon,et al.  Targeted impersonation as a tool for the detection of biometric system vulnerabilities , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[57]  Jay F. Nunamaker,et al.  Embodied Conversational Agent-Based Kiosk for Automated Interviewing , 2011, J. Manag. Inf. Syst..

[58]  Finn V. Jensen,et al.  Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.

[59]  Adrian Stoica,et al.  Fundamentals of Biometric-Based Training System Design , 2007, Image Pattern Recognition.

[60]  Eddie Y K Ng,et al.  Analysis of IR thermal imager for mass blind fever screening. , 2004, Microvascular research.

[61]  Sadie Creese,et al.  Tools for understanding identity , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[62]  Ronald R. Yager,et al.  Uncertainty representation using fuzzy measures , 2002, IEEE Trans. Syst. Man Cybern. Part B.

[63]  Mervyn A. Jack,et al.  Evaluating humanoid synthetic agents in e-retail applications , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[64]  Norbert Reithinger,et al.  The SmartKom Architecture: A Framework for Multimodal Dialogue Systems , 2006, SmartKom.

[65]  Svetlana N. Yanushkevich,et al.  Biometric Intelligence in Authentication Machines: from Talking Faces to Talking Robots , 2014, 2014 IIAI 3rd International Conference on Advanced Applied Informatics.

[66]  I. Pavlidis,et al.  Noncontact measurement of breathing function , 2006, IEEE Engineering in Medicine and Biology Magazine.