Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels
Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data employed in such evaluation is also collected by the same developer/evaluator. In most cases such database will not be made public and consequent...
Saved in:
Published in | 2010 IEEE International Conference on Systems, Man and Cybernetics pp. 3186 - 3193 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.10.2010
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data employed in such evaluation is also collected by the same developer/evaluator. In most cases such database will not be made public and consequently test results cannot be verified by independent institutions. This paper presents an independent report on fingerprint performance evaluation that has been conducted in the context of the TURBINE project. In this study the algorithm developer and system evaluator are represented by separate and independent entities. In addition, the algorithm developer does not have access to the primary test database. All these provide pre-conditions to unbiased and trustworthy performance reports. Furthermore, this paper introduces biometric performance testing on a level of biometric references, which is complementary to image- or minutiae-based references. Biometric references in the TURBINE project are pseudonymous identifiers that have been generated by the template protection algorithms. The results of the performance evaluation in this paper are generated by applying the algorithm developers (binary) algorithms at the minutiae (traditional) and pseudonymous identifier levels. The test data set consists of almost 72000 fingerprint images from 100 subjects acquired by several fingerprint scanners to which the algorithm developers did not have access. |
---|---|
AbstractList | Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data employed in such evaluation is also collected by the same developer/evaluator. In most cases such database will not be made public and consequently test results cannot be verified by independent institutions. This paper presents an independent report on fingerprint performance evaluation that has been conducted in the context of the TURBINE project. In this study the algorithm developer and system evaluator are represented by separate and independent entities. In addition, the algorithm developer does not have access to the primary test database. All these provide pre-conditions to unbiased and trustworthy performance reports. Furthermore, this paper introduces biometric performance testing on a level of biometric references, which is complementary to image- or minutiae-based references. Biometric references in the TURBINE project are pseudonymous identifiers that have been generated by the template protection algorithms. The results of the performance evaluation in this paper are generated by applying the algorithm developers (binary) algorithms at the minutiae (traditional) and pseudonymous identifier levels. The test data set consists of almost 72000 fingerprint images from 100 subjects acquired by several fingerprint scanners to which the algorithm developers did not have access. |
Author | Bours, P Gafurov, D Bian Yang Busch, C |
Author_xml | – sequence: 1 givenname: D surname: Gafurov fullname: Gafurov, D email: Davrondzhon.Gafurov@hig.no organization: Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway – sequence: 2 surname: Bian Yang fullname: Bian Yang email: Bian.Yang@hig.no organization: Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway – sequence: 3 givenname: P surname: Bours fullname: Bours, P email: Patrick.Bours@hig.no organization: Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway – sequence: 4 givenname: C surname: Busch fullname: Busch, C email: Christoph.Busch@hig.no organization: Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway |
BookMark | eNo1UF9LwzAcjDjBbe4L6Eu-QGeSpmnzKMU_g4kPKvg2fml-0Uib1rQd7Ntb2Xy547jjOG5BZqENSMg1Z2vOmb7dlK_P5VqwSWdKCpGrM7LSecGlkFJlRcHOyeJfKD0jc86USLQQH5dk0fffjAkmeTEnP5tgscMJwkA7jK6NDYQKKe6hHmHwbaCto86HT4xd9FNqj9E7Xx09GOjwhbTxYRw8IIVgadfjaNtwaNqxp_6vecpjpDXuse6vyIWDusfViZfk_eH-rXxKti-Pm_Jum3jB9ZBYaYxIq5wbyAwHYcFal1WSZ7nNtHYguDHKCABpVF44WxkmHFOGValSqkqX5ObY6xFxN01vIB52p7vSX2EAYtI |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/ICSMC.2010.5642276 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISBN | 9781424465880 1424465877 1424465885 9781424465873 |
EndPage | 3193 |
ExternalDocumentID | 5642276 |
Genre | orig-research |
GroupedDBID | 29F 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
ID | FETCH-LOGICAL-i219t-d4bb23c71ba5b1a2daddf5c4157d599fa21bb6b2aa4b678fdcb02f06b0c3666c3 |
IEDL.DBID | RIE |
ISBN | 1424465869 9781424465866 |
ISSN | 1062-922X |
IngestDate | Wed Aug 27 02:48:38 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i219t-d4bb23c71ba5b1a2daddf5c4157d599fa21bb6b2aa4b678fdcb02f06b0c3666c3 |
OpenAccessLink | https://zenodo.org/record/3432028 |
PageCount | 8 |
ParticipantIDs | ieee_primary_5642276 |
PublicationCentury | 2000 |
PublicationDate | 2010-Oct. |
PublicationDateYYYYMMDD | 2010-10-01 |
PublicationDate_xml | – month: 10 year: 2010 text: 2010-Oct. |
PublicationDecade | 2010 |
PublicationTitle | 2010 IEEE International Conference on Systems, Man and Cybernetics |
PublicationTitleAbbrev | ICSMC |
PublicationYear | 2010 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0020418 ssj0000527319 |
Score | 1.762859 |
Snippet | Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 3186 |
SubjectTerms | Erbium Magnetic resonance |
Title | Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels |
URI | https://ieeexplore.ieee.org/document/5642276 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwGLXaTrBAD8QtDwwgkTZxEgfPFVWLVIQElbpVPqUKSEubLPx6PjtHATGw5VCU2Pns7_B7zwhdSZrIkGrqMSGkFwVaegLyEI8rBgbCJA2dlNL0kY5n0cM8njfQbc2F0Vo78Jnu20O3lq9WMrelskEMwTJJaBM1IXEruFp1PcW3SmJWmqxMtvwoKGhwlHiMkHlF6gKPS1ml9VSe04pN47PBZPg8HRaQr_J1P_ZdcW5ndICm1QcXaJPXfp6Jvvz8peX43xYdot6O4IefatfVRg2ddtD-N23CDmqXo36Lr0tp6psu-pjUu-ZmeL3jHOCdaDheGWxcrdCWDDMMQ8WikYp7PMMQcOL3ZQr2zjXmqcLrrc5VWYPAS1Wgl_QGv1k407aHZqP7l-HYKzdt8JYw-WWeioQgoUwCwWMRcKJgAjWxhDghUTFjhpNACCoI55EAR2mUFD4xPhU-2AylMjxCrXSV6mOEBcx9gbL6_XcGfpRmSvsSAkpj4AnO-Qnq2h5drAtdjkXZmad_Xz5De27l3wHxzlEr2-T6AgKKTFw6S_oCY_vHLg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHtSL8jC-3YMHTSy2S7u4ZyIBBWIiJNzIPhOiFoRy8dc72xZQ48FbH2nabmdnZqff9w3AlWINVWeGeVxK5YWBUZ7EdYgnNEcD4YrVUymlXp-1h-HjKBoV4HbNhTHGpOAzU3Ob6b98PVVLVyq7izBZpg22BdsY9yOasbXWFRXfaYk5cbJ8ueWHQUaEY9TjlI5WtC6MuYyv1J7yfbbi0_j8rtN86TUz0Fd-wx-dV9LA09qH3uqRM7zJa22ZyJr6_KXm-N93OoDqhuJHntfBqwQFE5dh75s6YRlK-bxfkOtcnPqmAh-ddd_chMw2rAOykQ0nU0tsWi10RcOE4GRxeKTsnEgIppzkfRKjxQtDRKzJbGGWOq9CkInO8EtmTt4coGlRhWHrYdBse3nbBm-C7i_xdCglratGIEUkA0E1ulAbKcwUGjri3AoaSMkkFSKUGCqtVtKn1mfSR6thTNUPoRhPY3MERKL3C7RT8L-3-KEM18ZXmFJai1cIIY6h4kZ0PMuUOcb5YJ78ffgSdtqDXnfc7fSfTmE3xQGksLwzKCbzpTnH9CKRF6lVfQH4Ysp4 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+IEEE+International+Conference+on+Systems%2C+Man+and+Cybernetics&rft.atitle=Independent+performance+evaluation+of+fingerprint+verification+at+the+minutiae+and+pseudonymous+identifier+levels&rft.au=Gafurov%2C+D&rft.au=Bian+Yang&rft.au=Bours%2C+P&rft.au=Busch%2C+C&rft.date=2010-10-01&rft.pub=IEEE&rft.isbn=9781424465866&rft.issn=1062-922X&rft.spage=3186&rft.epage=3193&rft_id=info:doi/10.1109%2FICSMC.2010.5642276&rft.externalDocID=5642276 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1062-922X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1062-922X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1062-922X&client=summon |