Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels

Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data employed in such evaluation is also collected by the same developer/evaluator. In most cases such database will not be made public and consequent...

Full description

Saved in:
Bibliographic Details
Published in2010 IEEE International Conference on Systems, Man and Cybernetics pp. 3186 - 3193
Main Authors Gafurov, D, Bian Yang, Bours, P, Busch, C
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2010
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data employed in such evaluation is also collected by the same developer/evaluator. In most cases such database will not be made public and consequently test results cannot be verified by independent institutions. This paper presents an independent report on fingerprint performance evaluation that has been conducted in the context of the TURBINE project. In this study the algorithm developer and system evaluator are represented by separate and independent entities. In addition, the algorithm developer does not have access to the primary test database. All these provide pre-conditions to unbiased and trustworthy performance reports. Furthermore, this paper introduces biometric performance testing on a level of biometric references, which is complementary to image- or minutiae-based references. Biometric references in the TURBINE project are pseudonymous identifiers that have been generated by the template protection algorithms. The results of the performance evaluation in this paper are generated by applying the algorithm developers (binary) algorithms at the minutiae (traditional) and pseudonymous identifier levels. The test data set consists of almost 72000 fingerprint images from 100 subjects acquired by several fingerprint scanners to which the algorithm developers did not have access.
AbstractList Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data employed in such evaluation is also collected by the same developer/evaluator. In most cases such database will not be made public and consequently test results cannot be verified by independent institutions. This paper presents an independent report on fingerprint performance evaluation that has been conducted in the context of the TURBINE project. In this study the algorithm developer and system evaluator are represented by separate and independent entities. In addition, the algorithm developer does not have access to the primary test database. All these provide pre-conditions to unbiased and trustworthy performance reports. Furthermore, this paper introduces biometric performance testing on a level of biometric references, which is complementary to image- or minutiae-based references. Biometric references in the TURBINE project are pseudonymous identifiers that have been generated by the template protection algorithms. The results of the performance evaluation in this paper are generated by applying the algorithm developers (binary) algorithms at the minutiae (traditional) and pseudonymous identifier levels. The test data set consists of almost 72000 fingerprint images from 100 subjects acquired by several fingerprint scanners to which the algorithm developers did not have access.
Author Bours, P
Gafurov, D
Bian Yang
Busch, C
Author_xml – sequence: 1
  givenname: D
  surname: Gafurov
  fullname: Gafurov, D
  email: Davrondzhon.Gafurov@hig.no
  organization: Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway
– sequence: 2
  surname: Bian Yang
  fullname: Bian Yang
  email: Bian.Yang@hig.no
  organization: Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway
– sequence: 3
  givenname: P
  surname: Bours
  fullname: Bours, P
  email: Patrick.Bours@hig.no
  organization: Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway
– sequence: 4
  givenname: C
  surname: Busch
  fullname: Busch, C
  email: Christoph.Busch@hig.no
  organization: Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway
BookMark eNo1UF9LwzAcjDjBbe4L6Eu-QGeSpmnzKMU_g4kPKvg2fml-0Uib1rQd7Ntb2Xy547jjOG5BZqENSMg1Z2vOmb7dlK_P5VqwSWdKCpGrM7LSecGlkFJlRcHOyeJfKD0jc86USLQQH5dk0fffjAkmeTEnP5tgscMJwkA7jK6NDYQKKe6hHmHwbaCto86HT4xd9FNqj9E7Xx09GOjwhbTxYRw8IIVgadfjaNtwaNqxp_6vecpjpDXuse6vyIWDusfViZfk_eH-rXxKti-Pm_Jum3jB9ZBYaYxIq5wbyAwHYcFal1WSZ7nNtHYguDHKCABpVF44WxkmHFOGValSqkqX5ObY6xFxN01vIB52p7vSX2EAYtI
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ICSMC.2010.5642276
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISBN 9781424465880
1424465877
1424465885
9781424465873
EndPage 3193
ExternalDocumentID 5642276
Genre orig-research
GroupedDBID 29F
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i219t-d4bb23c71ba5b1a2daddf5c4157d599fa21bb6b2aa4b678fdcb02f06b0c3666c3
IEDL.DBID RIE
ISBN 1424465869
9781424465866
ISSN 1062-922X
IngestDate Wed Aug 27 02:48:38 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i219t-d4bb23c71ba5b1a2daddf5c4157d599fa21bb6b2aa4b678fdcb02f06b0c3666c3
OpenAccessLink https://zenodo.org/record/3432028
PageCount 8
ParticipantIDs ieee_primary_5642276
PublicationCentury 2000
PublicationDate 2010-Oct.
PublicationDateYYYYMMDD 2010-10-01
PublicationDate_xml – month: 10
  year: 2010
  text: 2010-Oct.
PublicationDecade 2010
PublicationTitle 2010 IEEE International Conference on Systems, Man and Cybernetics
PublicationTitleAbbrev ICSMC
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020418
ssj0000527319
Score 1.762859
Snippet Often in the development of a biometric product an evaluator of the system is the same entity who developed the algorithm. Moreover, usually the test data...
SourceID ieee
SourceType Publisher
StartPage 3186
SubjectTerms Erbium
Magnetic resonance
Title Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels
URI https://ieeexplore.ieee.org/document/5642276
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwGLXaTrBAD8QtDwwgkTZxEgfPFVWLVIQElbpVPqUKSEubLPx6PjtHATGw5VCU2Pns7_B7zwhdSZrIkGrqMSGkFwVaegLyEI8rBgbCJA2dlNL0kY5n0cM8njfQbc2F0Vo78Jnu20O3lq9WMrelskEMwTJJaBM1IXEruFp1PcW3SmJWmqxMtvwoKGhwlHiMkHlF6gKPS1ml9VSe04pN47PBZPg8HRaQr_J1P_ZdcW5ndICm1QcXaJPXfp6Jvvz8peX43xYdot6O4IefatfVRg2ddtD-N23CDmqXo36Lr0tp6psu-pjUu-ZmeL3jHOCdaDheGWxcrdCWDDMMQ8WikYp7PMMQcOL3ZQr2zjXmqcLrrc5VWYPAS1Wgl_QGv1k407aHZqP7l-HYKzdt8JYw-WWeioQgoUwCwWMRcKJgAjWxhDghUTFjhpNACCoI55EAR2mUFD4xPhU-2AylMjxCrXSV6mOEBcx9gbL6_XcGfpRmSvsSAkpj4AnO-Qnq2h5drAtdjkXZmad_Xz5De27l3wHxzlEr2-T6AgKKTFw6S_oCY_vHLg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHtSL8jC-3YMHTSy2S7u4ZyIBBWIiJNzIPhOiFoRy8dc72xZQ48FbH2nabmdnZqff9w3AlWINVWeGeVxK5YWBUZ7EdYgnNEcD4YrVUymlXp-1h-HjKBoV4HbNhTHGpOAzU3Ob6b98PVVLVyq7izBZpg22BdsY9yOasbXWFRXfaYk5cbJ8ueWHQUaEY9TjlI5WtC6MuYyv1J7yfbbi0_j8rtN86TUz0Fd-wx-dV9LA09qH3uqRM7zJa22ZyJr6_KXm-N93OoDqhuJHntfBqwQFE5dh75s6YRlK-bxfkOtcnPqmAh-ddd_chMw2rAOykQ0nU0tsWi10RcOE4GRxeKTsnEgIppzkfRKjxQtDRKzJbGGWOq9CkInO8EtmTt4coGlRhWHrYdBse3nbBm-C7i_xdCglratGIEUkA0E1ulAbKcwUGjri3AoaSMkkFSKUGCqtVtKn1mfSR6thTNUPoRhPY3MERKL3C7RT8L-3-KEM18ZXmFJai1cIIY6h4kZ0PMuUOcb5YJ78ffgSdtqDXnfc7fSfTmE3xQGksLwzKCbzpTnH9CKRF6lVfQH4Ysp4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+IEEE+International+Conference+on+Systems%2C+Man+and+Cybernetics&rft.atitle=Independent+performance+evaluation+of+fingerprint+verification+at+the+minutiae+and+pseudonymous+identifier+levels&rft.au=Gafurov%2C+D&rft.au=Bian+Yang&rft.au=Bours%2C+P&rft.au=Busch%2C+C&rft.date=2010-10-01&rft.pub=IEEE&rft.isbn=9781424465866&rft.issn=1062-922X&rft.spage=3186&rft.epage=3193&rft_id=info:doi/10.1109%2FICSMC.2010.5642276&rft.externalDocID=5642276
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1062-922X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1062-922X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1062-922X&client=summon