SlideShare uma empresa Scribd logo
1 de 52
BIOMETRICS LAB
Biometric Standards, Performance and Assurance Laboratory
Department of Technology, Leadership and Innovation
AUTOMATIC DETECTION OF
BIOMETRIC TRANSACTION
TIMES
MICHAEL BROCKLY
STEPHEN ELLIOTT PH.D.
HAND GEOMETRY
• Measures length,
width, and thickness
of hand [1]
• Engages 1:1 matching by entering a
Personal Identification Number (PIN)
[1]
USES
• Joins a PIN number with the security of
biometric verification
• Commonly used in time and attendance
and access control
• Hand geometry has proven to be very
popular in time and attendance recording
[2]
BENEFITS
• Hand geometry functions as a medium
cost system with fast computational
speeds, low template size, and good
ease of use [3]
• The convenience of hand geometry
stems from the fact that users cannot
lose or forget their biometric credential
[4]
TIME ON TASK
• Computational speed is always a
primary concern
• Slow throughput times may eliminate the
cost savings proposed by device
installation
• Higher costs are associated with a
higher time to acquire or process a
biometric sample [5]
VIDEO CODING
• Previous studies suggest video
recording in order to capture subject time
on task [6]
• Time consuming process to manually
record timing data
• Potential for errors and inconsistencies
INTERRATER RELIABILITY
• Represents the degree to which the
ratings of different judges are
proportional when expressed as
deviations from their means [7]
• Not all video coders will report the same
result
OPERATIONAL TIMES
• Previous research has suggested
models for biometric transaction times
• Biometric transaction time includes:
– Subject interaction time
– Biometric subsystem processing time
– Biometric subsystem decision time
– External control access time
OPERATIONAL TIME MODEL
[8]
BIOMETRICS LAB
Biometric Standards, Performance and Assurance Laboratory
Department of Technology, Leadership and Innovation
EXPERIMENTAL SETUP
DEVICE
• Ingersoll Rand
Handkey II
• Hand geometry
biometric device
CAMERA
• Logitech HD Pro C910
Webcam
– 1080p recording
• Used to video record
interaction changes on
hand geometry device
SETUP
• Camera placed 24 cm above
hand geometry machine
• Device placed 90 cm above
ground level
EXPERIMENT
• Hand geometry data was collected as
part of a larger multi-modal study
• This data collection included 35 subjects
• Other modalities collected include
fingerprint, iris, face, signature, and palm
vein
BIOMETRICS LAB
Biometric Standards, Performance and Assurance Laboratory
Department of Technology, Leadership and Innovation
VIDEO ANALYSIS
USES
• An automated tool was created to
analyze the videos
• Analyzes videos to 15 frames per
second
• Detects light changes on device as pixel
color thresholds are crossed
• Writes results without human coder
CROPPING
FRAME SELECTION
LIGHT SELECTION
BIOMETRICS LAB
Biometric Standards, Performance and Assurance Laboratory
Department of Technology, Leadership and Innovation
TRANSACTION TIME
USE CASE – HAND
GEOMETRY
SYSTEM READY
• System
ready
USER MAKES A CLAIM OR
PRESENTS AN IDENTITY
• User
enters
PIN
SAMPLE ACQUISITION
• Lights all
on
SAMPLE ACQUISITION
• User
places
hand
SAMPLE ACQUISITION
• Lights
change
SAMPLE ACQUISITION
• Lights
continue
to
change
SAMPLE ACQUISITION
• Lights all
off
BIOMETRIC SUBSYSTEM
DECISION
• Green or
red light
EXTERNAL CONTROL ACTION
• Not used in this study
• External control may be opening door or
granting access to system
COMBINATION OF MODELS
BIOMETRICS LAB
Biometric Standards, Performance and Assurance Laboratory
Department of Technology, Leadership and Innovation
TERMINOLOGY
CONFLICTING TERMINOLOGY
• Along with the model, we include specific
terminology and emphasize the linkages
between the two versions
TRANSACTION
• The sequence of attempts to the system
on the part of the user for the purpose of
enrollment, verification or identification
• This definition follows ISO/IEC FCD
19795-1’s definition of a transaction
ATTEMPT
• The submission of one (or a sequence
of) biometric samples to the system on
the part of the user
– One or more attempts as allowed by the
biometric system will create one transaction
• This definition follows ISO/IEC FCD
19795-1’s definition of an attempt
PRESENTATION
• The submission of a single biometric
sample to the system on the part of the
user
– One or more presentations as allowed by the
biometric system will create one attempt
• This definition follows ISO/IEC FCD
19795-1’s definition of a presentation
INTERACTION
• The action(s) that take place within a
presentation
– One or more interactions will create one
presentation
• This definition conflicts with ISO/IEC
FCD 19795-1’s definition as “a sequence
of transactions”
HIERARCHY
Transaction
Attempt 1
Presentation
1
Interaction 1
Attempt 2
Presentation
2
Interaction 2
………
Attempt N
Presentation
N
Interaction N
BIOMETRICS LAB
Biometric Standards, Performance and Assurance Laboratory
Department of Technology, Leadership and Innovation
RESULTS
ENROLLMENT TIME
INDIVIDUAL VERIFICATION TIME
VERIFICATION TIME
BIOMETRICS LAB
Biometric Standards, Performance and Assurance Laboratory
Department of Technology, Leadership and Innovation
CONCLUSIONS
BENEFITS OF AUTOMATIC
CODING
• Eliminates need for manual video coding
• Video coding is a time consuming task
and has potential for errors
• Goal is to create a consistent measure of
biometric transactions
LESSONS LEARNED
• Experimental test conditions are not
always stable
– Due to cameras being moved/bumped, they
will not always be in the same location
• Original version of software did not take
this into account
• Second version allowed the area of
interest to be selected based on a frame
of the video
RELATION TO HBSI
• This experiment addresses the need to
automate the error detection in the
Human Biometric Sensor Interaction
(HBSI) model
• HBSI is concerned with classifying
correct and incorrect presentations into
quantifiable metrics
HBSI ERROR METRICS
HBSI
• This philosophy can be duplicated to
record these error metrics
• Ex. 1 If all lights are extinguished and
green light is shown, SPS
• Ex 2. If all lights remain on until system
time out and red light is shown, FTD
NEXT STEPS
• Methodology can be replicated for other
modalities as well
• Any system that provides feedback can
be video recorded and analyzed
• Automatically code HBSI error metrics
CONTACT INFORMATION
• Michael Brockly
– mbrockly@purdue.edu
• Stephen Elliott Ph.D.
– elliott@purdue.edu
BIOMETRICS LAB
Biometric Standards, Performance and Assurance Laboratory
Department of Technology, Leadership and Innovation
QUESTIONS?
REFERENCES
[1] Sidlauskas, D., Tamer, S., (2007). Hand Geometry Recognition.
Handbook of Biometrics. Springer US. doi: 10.1007/978-0-387-
71041-9_5
[2] Liu, S., & Silverman, M. (2001). A practical guide to biometric security
technology. IT Professional, 3(1), 27–32. Retrieved from
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=899930
[3] Sanchez-Reillo, R., & Gonzalez-Marcas, A. (2000). Access control
system with hand geometry verification and smart cards. Aerospace
and Electronic Systems Magazine, IEEE, 15(45), 45–48. Retrieved
from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=82 5671
[4] Tamer, S., Elliott, S., (2009, July) Time and Attendance.
Encyclopedia of Biometrics. Springer US. doi:10.1007/978-0-387-
73003-5_114
REFERENCES
[5] Poh, N., Bourlai, T., & Kittler, J. (2010). A multimodal biometric test bed
for quality-dependent, cost-sensitive and client-specific score-level
fusion algorithms. Pattern Recognition, 43(3), 1094–1105.
doi:10.1016/j.patcog.2009.09.011
[6] Bailey, B. P., Konstan, J. a., & Carlis, J. V. (2000). Measuring the
effects of interruptions on task performance in the user interface. SMC
2000 Conference Proceedings. 2000 IEEE International Conference
on Systems, Man and Cybernetics. “Cybernetics Evolving to Systems,
Humans, Organizations, and their Complex Interactions” (Cat.
No.00CH37166), 2, 757–762. doi:10.1109/ICSMC.2000.885940
[7] Reliability and Agreement of Subjective Judgments. Journal of
Counseling Psychology, 22(4), 358–376.
[8] Lazarick, R. T., Kukula, E. P., & Elliott, S. J. (2009, July).
Operational Times. Encyclopedia of Biometrics. Springer US.
doi:10.1007/978-0-387-73003-5_114

Mais conteúdo relacionado

Semelhante a (2013) Automatic Detection of Biometrics Transaction Times

Semelhante a (2013) Automatic Detection of Biometrics Transaction Times (20)

DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
 
BCC 2006 - NSTC
BCC 2006 - NSTCBCC 2006 - NSTC
BCC 2006 - NSTC
 
(ATS6-APP08) ADQM Solution Deployment
(ATS6-APP08) ADQM Solution Deployment(ATS6-APP08) ADQM Solution Deployment
(ATS6-APP08) ADQM Solution Deployment
 
Aktuelle BPM-Erfahrungen aus komplexen Branchen. Rainer Elvermann, cbprocess
Aktuelle BPM-Erfahrungen aus komplexen Branchen. Rainer Elvermann, cbprocessAktuelle BPM-Erfahrungen aus komplexen Branchen. Rainer Elvermann, cbprocess
Aktuelle BPM-Erfahrungen aus komplexen Branchen. Rainer Elvermann, cbprocess
 
CI/CT/CD and Role of Quality Engineering
CI/CT/CD and Role of Quality EngineeringCI/CT/CD and Role of Quality Engineering
CI/CT/CD and Role of Quality Engineering
 
VET4SBO Level 2 module 6 - unit 3 - v1.0 en
VET4SBO Level 2   module 6 - unit 3 - v1.0 enVET4SBO Level 2   module 6 - unit 3 - v1.0 en
VET4SBO Level 2 module 6 - unit 3 - v1.0 en
 
HSI Implementation in complex systems design
HSI Implementation in complex systems designHSI Implementation in complex systems design
HSI Implementation in complex systems design
 
Simulation technology, speed up your iterative process (by Jan Buytaert)
Simulation technology, speed up your iterative process (by Jan Buytaert)Simulation technology, speed up your iterative process (by Jan Buytaert)
Simulation technology, speed up your iterative process (by Jan Buytaert)
 
Embedded intro india_2018-02-v1
Embedded intro india_2018-02-v1Embedded intro india_2018-02-v1
Embedded intro india_2018-02-v1
 
Reliability Levels of Subsea Production Systems During Operations
Reliability Levels of Subsea Production Systems During OperationsReliability Levels of Subsea Production Systems During Operations
Reliability Levels of Subsea Production Systems During Operations
 
Fitman webinar 2015 06 Verification and Validation methodology
Fitman webinar 2015 06 Verification and Validation methodologyFitman webinar 2015 06 Verification and Validation methodology
Fitman webinar 2015 06 Verification and Validation methodology
 
Voler capabilities presentation with examples 2019-4 md rev wm 10-12
Voler capabilities presentation with examples   2019-4 md rev wm 10-12Voler capabilities presentation with examples   2019-4 md rev wm 10-12
Voler capabilities presentation with examples 2019-4 md rev wm 10-12
 
Solving the 3 Biggest Questions in Continuous Testing
Solving the 3 Biggest Questions in Continuous TestingSolving the 3 Biggest Questions in Continuous Testing
Solving the 3 Biggest Questions in Continuous Testing
 
Challenges to Effective Performance Testing in CI
Challenges to Effective Performance Testing in CIChallenges to Effective Performance Testing in CI
Challenges to Effective Performance Testing in CI
 
Beating the product credit crunch
Beating the product credit crunchBeating the product credit crunch
Beating the product credit crunch
 
NERC CIP - Top Testing & Compliance Challenges, How to Address Them
NERC CIP - Top Testing & Compliance Challenges, How to Address ThemNERC CIP - Top Testing & Compliance Challenges, How to Address Them
NERC CIP - Top Testing & Compliance Challenges, How to Address Them
 
DevOps Workshop - Addressing Quality Challenges of Highly Complex and Integra...
DevOps Workshop - Addressing Quality Challenges of Highly Complex and Integra...DevOps Workshop - Addressing Quality Challenges of Highly Complex and Integra...
DevOps Workshop - Addressing Quality Challenges of Highly Complex and Integra...
 
2. product usability & testing
2. product usability & testing2. product usability & testing
2. product usability & testing
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
Continuous Delivery for people who do not write code - Matthew Skelton - Conflux
Continuous Delivery for people who do not write code - Matthew Skelton - ConfluxContinuous Delivery for people who do not write code - Matthew Skelton - Conflux
Continuous Delivery for people who do not write code - Matthew Skelton - Conflux
 

Mais de International Center for Biometric Research

Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
International Center for Biometric Research
 

Mais de International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 
Understanding Fingerprint Skin Characteristics and Image Quality
Understanding Fingerprint Skin Characteristics and Image QualityUnderstanding Fingerprint Skin Characteristics and Image Quality
Understanding Fingerprint Skin Characteristics and Image Quality
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

(2013) Automatic Detection of Biometrics Transaction Times

  • 1. BIOMETRICS LAB Biometric Standards, Performance and Assurance Laboratory Department of Technology, Leadership and Innovation AUTOMATIC DETECTION OF BIOMETRIC TRANSACTION TIMES MICHAEL BROCKLY STEPHEN ELLIOTT PH.D.
  • 2. HAND GEOMETRY • Measures length, width, and thickness of hand [1] • Engages 1:1 matching by entering a Personal Identification Number (PIN) [1]
  • 3. USES • Joins a PIN number with the security of biometric verification • Commonly used in time and attendance and access control • Hand geometry has proven to be very popular in time and attendance recording [2]
  • 4. BENEFITS • Hand geometry functions as a medium cost system with fast computational speeds, low template size, and good ease of use [3] • The convenience of hand geometry stems from the fact that users cannot lose or forget their biometric credential [4]
  • 5. TIME ON TASK • Computational speed is always a primary concern • Slow throughput times may eliminate the cost savings proposed by device installation • Higher costs are associated with a higher time to acquire or process a biometric sample [5]
  • 6. VIDEO CODING • Previous studies suggest video recording in order to capture subject time on task [6] • Time consuming process to manually record timing data • Potential for errors and inconsistencies
  • 7. INTERRATER RELIABILITY • Represents the degree to which the ratings of different judges are proportional when expressed as deviations from their means [7] • Not all video coders will report the same result
  • 8. OPERATIONAL TIMES • Previous research has suggested models for biometric transaction times • Biometric transaction time includes: – Subject interaction time – Biometric subsystem processing time – Biometric subsystem decision time – External control access time
  • 10. BIOMETRICS LAB Biometric Standards, Performance and Assurance Laboratory Department of Technology, Leadership and Innovation EXPERIMENTAL SETUP
  • 11. DEVICE • Ingersoll Rand Handkey II • Hand geometry biometric device
  • 12. CAMERA • Logitech HD Pro C910 Webcam – 1080p recording • Used to video record interaction changes on hand geometry device
  • 13. SETUP • Camera placed 24 cm above hand geometry machine • Device placed 90 cm above ground level
  • 14. EXPERIMENT • Hand geometry data was collected as part of a larger multi-modal study • This data collection included 35 subjects • Other modalities collected include fingerprint, iris, face, signature, and palm vein
  • 15. BIOMETRICS LAB Biometric Standards, Performance and Assurance Laboratory Department of Technology, Leadership and Innovation VIDEO ANALYSIS
  • 16. USES • An automated tool was created to analyze the videos • Analyzes videos to 15 frames per second • Detects light changes on device as pixel color thresholds are crossed • Writes results without human coder
  • 20. BIOMETRICS LAB Biometric Standards, Performance and Assurance Laboratory Department of Technology, Leadership and Innovation TRANSACTION TIME USE CASE – HAND GEOMETRY
  • 22. USER MAKES A CLAIM OR PRESENTS AN IDENTITY • User enters PIN
  • 29. EXTERNAL CONTROL ACTION • Not used in this study • External control may be opening door or granting access to system
  • 31. BIOMETRICS LAB Biometric Standards, Performance and Assurance Laboratory Department of Technology, Leadership and Innovation TERMINOLOGY
  • 32. CONFLICTING TERMINOLOGY • Along with the model, we include specific terminology and emphasize the linkages between the two versions
  • 33. TRANSACTION • The sequence of attempts to the system on the part of the user for the purpose of enrollment, verification or identification • This definition follows ISO/IEC FCD 19795-1’s definition of a transaction
  • 34. ATTEMPT • The submission of one (or a sequence of) biometric samples to the system on the part of the user – One or more attempts as allowed by the biometric system will create one transaction • This definition follows ISO/IEC FCD 19795-1’s definition of an attempt
  • 35. PRESENTATION • The submission of a single biometric sample to the system on the part of the user – One or more presentations as allowed by the biometric system will create one attempt • This definition follows ISO/IEC FCD 19795-1’s definition of a presentation
  • 36. INTERACTION • The action(s) that take place within a presentation – One or more interactions will create one presentation • This definition conflicts with ISO/IEC FCD 19795-1’s definition as “a sequence of transactions”
  • 37. HIERARCHY Transaction Attempt 1 Presentation 1 Interaction 1 Attempt 2 Presentation 2 Interaction 2 ……… Attempt N Presentation N Interaction N
  • 38. BIOMETRICS LAB Biometric Standards, Performance and Assurance Laboratory Department of Technology, Leadership and Innovation RESULTS
  • 42. BIOMETRICS LAB Biometric Standards, Performance and Assurance Laboratory Department of Technology, Leadership and Innovation CONCLUSIONS
  • 43. BENEFITS OF AUTOMATIC CODING • Eliminates need for manual video coding • Video coding is a time consuming task and has potential for errors • Goal is to create a consistent measure of biometric transactions
  • 44. LESSONS LEARNED • Experimental test conditions are not always stable – Due to cameras being moved/bumped, they will not always be in the same location • Original version of software did not take this into account • Second version allowed the area of interest to be selected based on a frame of the video
  • 45. RELATION TO HBSI • This experiment addresses the need to automate the error detection in the Human Biometric Sensor Interaction (HBSI) model • HBSI is concerned with classifying correct and incorrect presentations into quantifiable metrics
  • 47. HBSI • This philosophy can be duplicated to record these error metrics • Ex. 1 If all lights are extinguished and green light is shown, SPS • Ex 2. If all lights remain on until system time out and red light is shown, FTD
  • 48. NEXT STEPS • Methodology can be replicated for other modalities as well • Any system that provides feedback can be video recorded and analyzed • Automatically code HBSI error metrics
  • 49. CONTACT INFORMATION • Michael Brockly – mbrockly@purdue.edu • Stephen Elliott Ph.D. – elliott@purdue.edu
  • 50. BIOMETRICS LAB Biometric Standards, Performance and Assurance Laboratory Department of Technology, Leadership and Innovation QUESTIONS?
  • 51. REFERENCES [1] Sidlauskas, D., Tamer, S., (2007). Hand Geometry Recognition. Handbook of Biometrics. Springer US. doi: 10.1007/978-0-387- 71041-9_5 [2] Liu, S., & Silverman, M. (2001). A practical guide to biometric security technology. IT Professional, 3(1), 27–32. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=899930 [3] Sanchez-Reillo, R., & Gonzalez-Marcas, A. (2000). Access control system with hand geometry verification and smart cards. Aerospace and Electronic Systems Magazine, IEEE, 15(45), 45–48. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=82 5671 [4] Tamer, S., Elliott, S., (2009, July) Time and Attendance. Encyclopedia of Biometrics. Springer US. doi:10.1007/978-0-387- 73003-5_114
  • 52. REFERENCES [5] Poh, N., Bourlai, T., & Kittler, J. (2010). A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms. Pattern Recognition, 43(3), 1094–1105. doi:10.1016/j.patcog.2009.09.011 [6] Bailey, B. P., Konstan, J. a., & Carlis, J. V. (2000). Measuring the effects of interruptions on task performance in the user interface. SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. “Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions” (Cat. No.00CH37166), 2, 757–762. doi:10.1109/ICSMC.2000.885940 [7] Reliability and Agreement of Subjective Judgments. Journal of Counseling Psychology, 22(4), 358–376. [8] Lazarick, R. T., Kukula, E. P., & Elliott, S. J. (2009, July). Operational Times. Encyclopedia of Biometrics. Springer US. doi:10.1007/978-0-387-73003-5_114

Notas do Editor

  1. 1. Sidlauskas, D., Tamer, S., (2007). Hand Geometry Recognition. Handbook of Biometrics. Springer US. doi: 10.1007/978-0-387-71041-9_5
  2. 2. Liu, S., & Silverman, M. (2001). A practical guide to biometric security technology. IT Professional, 3(1), 27–32. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=899930
  3. 3. Sanchez-Reillo, R., & Gonzalez-Marcas, A. (2000). Access control system with hand geometry verification and smart cards. Aerospace and Electronic Systems Magazine, IEEE, 15(45), 45–48. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=8256714. Tamer, S., Elliott, S., (2009, July) Time and Attendance. Encyclopedia of Biometrics. Springer US. doi:10.1007/978-0-387-73003-5_114
  4. 5. Poh, N., Bourlai, T., & Kittler, J. (2010). A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms. Pattern Recognition, 43(3), 1094–1105. doi:10.1016/j.patcog.2009.09.011
  5. 6. Bailey, B. P., Konstan, J. a., & Carlis, J. V. (2000). Measuring the effects of interruptions on task performance in the user interface. SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. “Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions” (Cat. No.00CH37166), 2, 757–762. doi:10.1109/ICSMC.2000.885940
  6. 7. Tinsley, H. E. A., & Weiss, D. J. (1975). Interrater Reliability and Agreement of Subjective Judgments. Journal of Counseling Psychology, 22(4), 358–376.
  7. 8. Lazarick, R. T., Kukula, E. P., & Elliott, S. J. (2009, July). Operational Times. Encyclopedia of Biometrics. Springer US. doi:10.1007/978-0-387-73003-5_114
  8. This process begins when the PIN is enteredFor hand geometry verification only one attempt is given in the transaction.
  9. In verification, one attempt contains one presentation.
  10. Hand geometry enrollment is made up of 3 presentations of sufficient quality.
  11. Signified by the lights on the hand geometry machine changing color. This may happen many times within a presentation to the systemInteraction occurs between the subject and the system.Instructions should be provided to the subject before the first interaction begins.
  12. Video coding provides consistency.Bullet 2 is a rehash from the introduction