Abstract
To develop a biometric product the system evaluator is in many cases the same entity as the system developer. Besides, the test data used for evaluation could be also collected from the same entity. Such databases are in most cases not public ones and thus the test results are hard to be independently verified. This work reports an independent evaluation on fingerprint verification accuracy performance within the context of the EU-FP7 project TURBINE. This paper represents the algorithm developers and evaluators with independent entities. The algorithm developers are assumed not to have the right to accessing the test database consisting of more than 70000 fingerprint samples from 100 subjects captured by 6 fingerprint sensors during months. These controls provide an unbiased and trustworthy performance evaluation. This work evaluates biometric performance on the protected reference level, in addition to the sample- or minutiae- based references. The biometric references evaluated are fingerprint pseudonymous identifiers generated by the template protection algorithms. The performance evaluation results in this work are generated from different template protection algorithms at the pseudonymous identifier levels.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
TURBINE project - TrUsted Revocable Biometric IdeNtitiEs, http://www.turbine-project.eu/index.php
Delvaux, N., Chabanne, H., Bringer, J., Kindarji, B., Lindeberg, P., Midgren, J., Breebaart, J., Akkermans, T., van der Veen, M., Veldhuis, R., Kindt, E., Simoens, K., Busch, C., Bours, P., Gafurov, D., Yang, B., Stern, J., Rust, C., Cucinelli, B., Skepastianos, D.: Pseudo identities based on fingerprint characteristics. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)
Gafurov, D., Busch, C., Yang, B., Bours, P.: Test report - interoperability performance evaluation #1. Technical report, Gjovik University College (Turbine deliverable D421), confidential (2010)
Gafurov, D., Yang, B., Bours, P., Busch, C.: Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels. In: IEEE International Conference on Systems, Man, and Cybernetics (2010)
ISO/IEC 19795-2:2007, Information technology - Biometric performance testing and reporting - part 2: Testing methodologies for technology and scenario evaluation (2007)
Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence (2002)
Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance evaluation of fingerprint verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence (2006)
Breebaart, J., Busch, C., Grave, J., Kindt, E.: A reference architecture for biometric template protection based on pseudo identities. In: BIOSIG 2008 (2008)
Bringer, J., Chabanne, H., Kindarji, B.: Anonymous identification with cancelable biometrics. In: International Symposium on Image and Signal Processing and Analysis (2009)
Kelkboom, E., de Groot, K., Breebaart, J., Chen, C., Veldhuis, R.: Pitfall of optimal bit allocation within template protection and remedy. In: IEEE Third International Conference on Biometrics: Theory, Applications and Systems, BTAS (2009)
Yang, B., Gafurov, D., Busch, C., Bours, P.: Encrypting fingerprint minutiae templates by random quantization. In: 2nd International Conference on Networked Digital Technologies (2010) Special Session on Real Time Biometric Solutions for Networked Society
Yang, B., Busch, C., Gafurov, D., Bours, P.: Renewable minutiae templates with tunable size and security. In: 20th International Conference on Pattern Recognition, ICPR (2010)
ISO/IEC JTC 1/SC 27 CD 24745 Information technology - security techniques - biometric template protection (2009)
Simoens, K., Yang, B., Zhou, X., Beato, F., Busch, C., Newton, E.M., Preneel, B.: Criteria towards metrics for benchmarking template protection algorithms. In: ICB (2012)
Gafurov, D., Bours, P., Yang, B., Busch, C.: GUC100 multisensor fingerprint database for in-house (semipublic) performance test. EURASIP Journal on Information Security (2010)
Gafurov, D., Busch, C., Yang, B., Bours, P.: Testbed preparation report. Technical report, Gjovik University College (Turbine deliverable D411), confidential (2009)
Garris, M.D., Tabassi, E., Wilson, C.L.: NIST Fingerprint evaluations and developments. Proceedings of the IEEE (2006)
Gafurov, D., Busch, C., Yang, B., Bours, P.: Test report - interoperability performance evaluation #2. Technical report, Gjovik University College (Turbine deliverable D422), confidential (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gafurov, D., Bours, P., Yang, B., Busch, C. (2013). Independent Performance Evaluation of Pseudonymous Identifier Fingerprint Verification Algorithms. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2013. Lecture Notes in Computer Science, vol 7950. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39094-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-39094-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39093-7
Online ISBN: 978-3-642-39094-4
eBook Packages: Computer ScienceComputer Science (R0)