Evaluation of Biometric Systems

Biometrics is considered as a promising solution among traditional methods based on "what we own" (such as a key) or "what we know" (such as a password). It is based on "what we are" and "how we behave". Few people know that biometrics have been used for ages for identification or signature purposes. In 1928 for example, fingerprints were used for women clerical employees of Los Angeles police department as depicted in Figure 1. Fingerprints were also already used as a signature for commercial exchanges in Babylon (-3000 before JC). Alphonse Bertillon proposed in 1879 to use anthropometric information for police investigation. Nowadays, all police forces in the world use this kind of information to resolve crimes. The first prototypes of terminals providing an automatic processing of the voice and digital fingerprints have been defined in the middle of the years 1970. Nowadays, biometric authentication systems have many applications [1]: border control, e-commerce, etc. The main benefits of this technology are to provide a better security, and to facilitate the authentication process for a user. Also, it is usually difficult to copy the biometric characteristics of an individual than most of other authentication methods such as passwords. Despite the obvious advantages of biometric systems, their proliferation was not as much as attended. The main drawback is the uncertainty of the verification result. By contrast to password checking, the verification of biometric raw data is subject to errors and represented by a similarity percentage (100% is never reached). Others drawbacks related to vulnerabilities and usability issues exist. In addition, in order to be used in an industrial context, the quality of a biometric system must be precisely quantified. We need a reliable evaluation methodology in order to put into obviousness the benefit of a new biometric system. Moreover, many questions remain: Shall we be confident in this technology? What kind of biometric modalities can be used? What are the trends in this domain? The objective of this chapter is to answer these questions, by presenting an evaluation methodology of biometric systems.

[1]  D. Scheuermann,et al.  On security evaluation of fingerprint recognition systems , 2010 .

[2]  Despina Polemi,et al.  Application of Multi-criteria Analysis for the Creation of a Risk Assessment Knowledgebase for Biometric Systems , 2004, ICBA.

[3]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[4]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[5]  Julian Fiérrez,et al.  A Comparative Study of Fingerprint Image-Quality Estimation Methods , 2007, IEEE Transactions on Information Forensics and Security.

[6]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[7]  Touradj Ebrahimi,et al.  A new analysis method for paired comparison and its application to 3D quality assessment , 2011, ACM Multimedia.

[8]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[9]  Chulhan Lee,et al.  Model-Based Quality Estimation of Fingerprint Images , 2006, ICB.

[10]  Baptiste Hemery,et al.  Computation EvaBio: A Tool for Performance Evaluation in Biometrics , 2011 .

[11]  Stan Z. Li,et al.  Face Image Quality Evaluation for ISO/IEC Standards 19794-5 and 29794-5 , 2009, ICB.

[12]  Alexander P. Pons,et al.  Understanding user perspectives on biometric technology , 2008, CACM.

[13]  Mary F. Theofanos,et al.  Usability Testing of Ten-Print Fingerprint Capture | NIST , 2007 .

[14]  Natalia A. Schmid,et al.  Image quality assessment for iris biometric , 2006, SPIE Defense + Commercial Sensing.

[15]  Alfred C. Weaver,et al.  Biometric authentication , 2006, Computer.

[16]  Christophe Rosenberger,et al.  Biohashing for securing fingerprint minutiae templates , 2010, ICPR 2010.

[17]  Alberto Del Bimbo,et al.  A Set of Selected SIFT Features for 3D Facial Expression Recognition , 2010, 2010 20th International Conference on Pattern Recognition.

[18]  Mary F. Theofanos,et al.  Usability Testing of Ten-Print Fingerprint Capture , 2007 .

[19]  Hong Chang,et al.  SVC2004: First International Signature Verification Competition , 2004, ICBA.

[20]  Angela Sasse,et al.  Humans in the Loop Human – Computer Interaction and Security , 2022 .

[21]  Baptiste Hemery,et al.  Evaluation of biometric systems: a study of users' acceptance and satisfaction , 2012, Int. J. Biom..

[22]  LinLin Shen,et al.  Quality Measures of Fingerprint Images , 2001, AVBPA.

[23]  Václav Matyás,et al.  Biometric authentication - security and usability , 2002, Communications and Multimedia Security.

[24]  Josef Kittler,et al.  A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms , 2010, Pattern Recognit..

[25]  Josef Kittler,et al.  Quality-Based Score Normalization With Device Qualitative Information for Multimodal Biometric Fusion , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[26]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[27]  Baptiste Hemery,et al.  A SVM-based model for the evaluation of biometric sample quality , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[28]  B. Dorizzi,et al.  A new probabilistic Iris Quality Measure for comprehensive noise detection , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[29]  Doug Mahar,et al.  Perceived acceptability of biometric security systems , 1995, Comput. Secur..

[30]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[31]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[32]  Daniel Riccio,et al.  Biometric Authentication , 2014, Lecture Notes in Computer Science.

[33]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[34]  Bruce A. Draper,et al.  Overview of the Multiple Biometrics Grand Challenge , 2009, ICB.

[35]  Christophe Rosenberger,et al.  Keystroke dynamics authentication for collaborative systems , 2009, 2009 International Symposium on Collaborative Technologies and Systems.

[36]  Qian He,et al.  A hierarchical model for the evaluation of biometric sample quality , 2008, 2008 19th International Conference on Pattern Recognition.

[37]  Rohit Miri,et al.  A Fuzzy Approach to Multimodal Biometric Authentication , 2012 .

[38]  Christophe Rosenberger,et al.  Analysis of template update strategies for keystroke dynamics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[39]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[40]  Mary F. Theofanos,et al.  Usability Testing of Height and Angles of Ten-Print Fingerprint Capture , 2008 .

[41]  Elham Tabassi,et al.  Performance of Biometric Quality Measures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[42]  Anil K. Jain,et al.  Fingerprint Quality Indices for Predicting Authentication Performance , 2005, AVBPA.

[43]  Stephen J. Elliott,et al.  The Perception of Biometric Technology: A Survey , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[44]  Christophe Rosenberger,et al.  Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[45]  Janette Moody Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use , 2004 .

[46]  Li Zi-qing Standardization of Face Image Sample Quality , 2009 .

[47]  Charles L. Wilson,et al.  A novel approach to fingerprint image quality , 2005, IEEE International Conference on Image Processing 2005.

[48]  Annie I. Antón,et al.  Towards understanding user perceptions of authentication technologies , 2007, WPES '07.

[49]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[50]  Anil K. Jain,et al.  Localized Iris Image Quality Using 2-D Wavelets , 2006, ICB.

[51]  James P. Egan,et al.  Signal detection theory and ROC analysis , 1975 .

[52]  Baptiste Hemery,et al.  A study of users' acceptance and satisfaction of biometric systems , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[53]  Antonella De Angeli,et al.  Honest, it’s me! Self-service verification , 2003 .

[54]  Christophe Rosenberger,et al.  Biohashing for Securing Minutiae Template , 2010, 2010 20th International Conference on Pattern Recognition.

[55]  Bernadette Dorizzi,et al.  Guide to Biometric Reference Systems and Performance Evaluation , 2009 .

[56]  Albert Ali Salah,et al.  Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion Algorithms , 2009, IEEE Transactions on Information Forensics and Security.

[57]  Christophe Rosenberger,et al.  Evaluation of Cancelable Biometric Systems: Application to Finger-Knuckle-Prints , 2011, 2011 International Conference on Hand-Based Biometrics.

[58]  Yunhong Wang,et al.  Asymmetry-Based Quality Assessment of Face Images , 2009, ISVC.

[59]  Ton van der Putte,et al.  Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.

[60]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[61]  Baptiste Hemery,et al.  Towards the Security Evaluation of Biometric Authentication Systems , 2011 .

[62]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.