220 likes | 402 Views
Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition - 1.4 Presented By: Chris Miles. Identification System Errors. Extending to Identification. How do we extend our numerical models for verification errors for identificatation? FNMR – False Non Match Rate
E N D
Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition - 1.4 Presented By: Chris Miles Identification System Errors
Extending to Identification • How do we extend our numerical models for verification errors for identificatation? • FNMR – False Non Match Rate • FMR – False Match Rate • What Issues are presented
Identification System • Maintains a database of enrolled users • Tries to match input against the database • Positive Identification == Negative Identification • Output • List of best matches – Ideally just the true identity • Best Match • yes/no in the list
Example • Casino using face detection to identify people on the Nevada Gaming Commission's black list • http://gaming.nv.gov/loep_main.htm • Basis for other government biometrics systems • N = the number of people on the list • M = number of people through the casino daily • Calculate FNMRN and FMRN
Matching System • Parallel version of your favorite verification algorithm • Attempt to match all users against the database
FNMRN • The chance of being falsely rejected is the same as verification • Chance of not matching against your template – chance of matching someone else's template • Assuming no FMR, FNMRN = FNMR
FMRN • FMRN = Chance of matching someones template ^ number of templates • FMRN = 1 – (1 – FMR)N • Number of daily false matches = M * FMRN= M (1 - (1-FMR)N)
Accuracy Scales Worse then Computation • The chance of being falsely accepted rises exponentially with the number of templates • Suppose algorithm is 99.99% accurate • 100 people in the database • Each has 8 templates • 10,000 people through the casino a day • FMRN = 1 - .9999800 = 0.076 • FMRN * 10000 = 768 False accepts a day
Winnowing • True identification is exponentially hard, so generally we compromise and just return a list of probable matches. • Input -> System -> List of Candidate Matches • A second system, biometric or a human supervisor, then tries to identify the user from the new List / Database of candidates • Candidates -> Second System -> Identity • “Passing the buck” so to speak
Who's on the list? • Threshold • Apply a threshold to the similarity metric • similarity > threshold -> On the list • Rank • Take the K most similar templates • Hybrid • Take the K most similar templates so long as there similarity > threshold
Weaknesses • Threshold • If several users kind of match the input, but not quite, a threshold based system would return nothing • Rank • Impostor -> List of bad matches • Solution: Generic Impostor Model -> Additional Template representing a non-match situation, if a user matches this -> returns nothing. • Hybrid • Strengths of both techniques cover the weaknesses
Hybridization Ideas • Adjust K based upon how many are above the threshold • Adjust the threshold based upon the distribution of similarities
Multiple Templates • Example had multiple templates per individual • Input might match mutiple templates from one person • Only one might need to be in the list • Domain Dependent
Characterizing Identification • FNMR and FMR ~= Reliability and Selectivity • Reliability • 1 - FRR • How often we correctly identify someone who is in the database • Selectivity • K – Rel or • (m-1) FAR • Number of incorrect matches returned
RSC, ROC, RPC Curves • These curves show the compromises involved • ROC Compromises between FAR and FRR rate • Should the vending machine take my ripped dollar and someone elses forgery? • RPC Curves • If google returned more results it would be less likely to miss relavant ones • Would include more irrelevant results however • RSC Curves
Three systems • Theshold Based – Previous Example • Rank-Based identification • Rank-order statistics • Rank Probability Mass Function
Threshold System Errors • Similar to previous example only returns a list of individuals above the threshold • Errors • FARM = m * FAR * (1-FAR)m-1 -Falsely Match one individual • Ambiguous answer -> List has length > 1 • P(Ambiguous) = 1 – [1 – (m+1) * FAR](1 - FAR)m-1 • FRRM = 1 - (1 – FRR) * (1 – FAR) m-1 ~= FRR
Rank Based System Errors • Only works in very restricted close world scenarios (No Impostors) • Only one error – Misidentification by the correct user being ranked below another • Analyze probabilistic distribution of ranks – Rank Probability Mass Function