21.02.2013 Views

Single-sensor hand and footprint-based multimodal biometric ...

Single-sensor hand and footprint-based multimodal biometric ...

Single-sensor hand and footprint-based multimodal biometric ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.1 Identification versus Verification<br />

Definition 2.1.4 (Verification system). Given a <strong>biometric</strong> sample X ∈ X <strong>and</strong> a<br />

claimed identity i ∈ {1, . . . , m}, a verification system is a function V : X × M →<br />

{genuine, imposter} determining whether the claim is true by returning the class<br />

genuine or whether the claim is false by returning imposter, <strong>based</strong> on a threshold η:<br />

V (X, mi) :=<br />

�<br />

genuine, if S(E(X), ii) ≥ η;<br />

imposter, otherwise.<br />

2. Identification: Only the acquired <strong>biometric</strong> sample is used for reliable determination<br />

of the identity of the access claiming person. Thus, screening against all stored<br />

reference templates (one-to-many comparison) is needed, see [14].<br />

Definition 2.1.5 (Identification system). Given a <strong>biometric</strong> sample X ∈ X , an<br />

identification system is a function I : X → M ∪ {reject} determining the identity<br />

mi, i ∈ {1, . . . , m} if existing or the state reject in case of no suitable identity can be<br />

determined:<br />

⎧<br />

⎨ mi, if i = arg max{S(E(X),<br />

ij)} ∧ S(E(X), ii) ≥ η;<br />

I(X) :=<br />

j<br />

⎩<br />

reject, otherwise.<br />

Apart from this definition of identification systems, the following variants exist [1]:<br />

sometimes the whole set of matching identities, i.e. the set {mi : S(E(X), ii) ≥ η},<br />

is considered (threshold-<strong>based</strong> identification). Another variant, not necessarily <strong>based</strong><br />

on scores, is rank-<strong>based</strong> identification where the matcher is expected to return a<br />

fixed size k-dimensional ranking vector (mπ(1), mπ(2), . . . , mπ(k)) with π a permutation<br />

of {1, . . . , m}. Finally, there are also hybrid approaches returning a variable-sized<br />

ranking vector of maximum length k containing only templates exceeding the defined<br />

threshold.<br />

It is clear, that running systems in identification mode is more challenging for the following<br />

reasons:<br />

• Security: System error rates largely depend on the number of enroled members.<br />

This circumstance is illustrated by the following experiment: assuming a system<br />

operates at 0.1% False Accept Rate (FAR, the rate of falsely accepted imposter<br />

authentication attempts) with a member database size of n = 250, a single imposter<br />

trying to cheat the system will be lucky in approximately 1 − 0.999 250 ≈ 22.13%<br />

of the cases (assuming a simplified model with equal FAR for each identity in the<br />

system database [1]). However, using a database size of n = 2500 the probability of<br />

being falsely accepted increases to 91.8%;<br />

• Performance: The number of necessary comparisons increases with the number<br />

of enroled members. Large databases, such as the FBI Integrated Automated Fingerprint<br />

Identification System [48] with fingerprints of over 47 million subjects as of<br />

July 2007, need fast matching algorithms in order to be able to respond in reasonable<br />

time.<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!