270 likes | 286 Views
Chapter 5. Basic System Errors (Alireza Tavakkoli). Outline. Matching The Receiver Operating Curves (ROC) Error Conditions Specific to Biometrics Negative Authentication Trade-offs. Matching. Definition Notations:. Biometric Uniqueness. Similarity measure Prob (B=B’)
E N D
Chapter 5 Basic System Errors (Alireza Tavakkoli)
Outline • Matching • The Receiver Operating Curves (ROC) • Error Conditions Specific to Biometrics • Negative Authentication • Trade-offs
Matching • Definition • Notations: Biometric Uniqueness
Similarity measure Prob (B=B’) Higher match score Higher Prob. Similarity d(B’,B) [0,Inf.) [0,1] Matching Scores
The Tail of Two Errors • Hypothesis Test and Errors: • Two Errors: • False Match (Type I) • Flase Non-match (Type II)
Score Distributions Hard Decision Reliability of s
Estimating Error from Data • Access to G(y) & F(x) • Estimation: • Need to be studied more
Error Rates of Match Engines • FM and FNM • Accept/Reject Object • FA and FR • Accept/Reject Null Hypothesis
Positive Authentication • Errors in Pos. Authentication: • False Accept (FA) • False Reject (FR) • Problems: • FA Security Breach • FR Convenience Problems
ROC - Design vs Application - Security vs Convenience FMR ↑ FNMR ↓
Semi-log plots Log-log plot Variations of ROCs
Using the ROC Curve • Comparing matchers • Tradeoff between FMR & FNMR. • Specific Threshold FMR(T)/FNMR(T)
Expressing Quality of ROC • The Equal Error Rate: • d-prime: • Expected Overall Error • Cost Function
Expressing Quality of ROC • The Equal Error Rate:
Expressing Quality of ROC • d-prime:
Expressing Quality of ROC • Expected Overall Error
Expressing Quality of ROC • Cost Function
Error Conditions Specific to Biometrics • FTAFTEFTU Significant Cost. • FTA: • FTE: • Manual vs Automatic Authentication • CMC or RPM
Negative Authentication • Negative Hypotheses: • The Two Errors: • Falsely missing B • Incorrectly matching B and B’.
Negative Authentication • Detection Theory Terminology: • False Negative • False Positive
Different Errors Different Outcomes False Accept Security Breach. False Reject Inconvenience. Convenience vs Security Cost vs Security Cost of Negative Authentication Trade Offs
Convenience vs Security • Convenience of a Biometric • Convenience of Implementation
Cost vs Security in Pos. Auth. • Why it is important • FRR ↑ Service denial Exception handling • Dynamic Authentication Protocol
Cost of Negative Authentication • Screening: • Higher FPR&FNR Inconvenient to all