Skip to main content

Independent Performance Evaluation of Pseudonymous Identifier Fingerprint Verification Algorithms

  • Conference paper
Image Analysis and Recognition (ICIAR 2013)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 7950))

Included in the following conference series:

Abstract

To develop a biometric product the system evaluator is in many cases the same entity as the system developer. Besides, the test data used for evaluation could be also collected from the same entity. Such databases are in most cases not public ones and thus the test results are hard to be independently verified. This work reports an independent evaluation on fingerprint verification accuracy performance within the context of the EU-FP7 project TURBINE. This paper represents the algorithm developers and evaluators with independent entities. The algorithm developers are assumed not to have the right to accessing the test database consisting of more than 70000 fingerprint samples from 100 subjects captured by 6 fingerprint sensors during months. These controls provide an unbiased and trustworthy performance evaluation. This work evaluates biometric performance on the protected reference level, in addition to the sample- or minutiae- based references. The biometric references evaluated are fingerprint pseudonymous identifiers generated by the template protection algorithms. The performance evaluation results in this work are generated from different template protection algorithms at the pseudonymous identifier levels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. TURBINE project - TrUsted Revocable Biometric IdeNtitiEs, http://www.turbine-project.eu/index.php

  2. Delvaux, N., Chabanne, H., Bringer, J., Kindarji, B., Lindeberg, P., Midgren, J., Breebaart, J., Akkermans, T., van der Veen, M., Veldhuis, R., Kindt, E., Simoens, K., Busch, C., Bours, P., Gafurov, D., Yang, B., Stern, J., Rust, C., Cucinelli, B., Skepastianos, D.: Pseudo identities based on fingerprint characteristics. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)

    Google Scholar 

  3. Gafurov, D., Busch, C., Yang, B., Bours, P.: Test report - interoperability performance evaluation #1. Technical report, Gjovik University College (Turbine deliverable D421), confidential (2010)

    Google Scholar 

  4. Gafurov, D., Yang, B., Bours, P., Busch, C.: Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels. In: IEEE International Conference on Systems, Man, and Cybernetics (2010)

    Google Scholar 

  5. ISO/IEC 19795-2:2007, Information technology - Biometric performance testing and reporting - part 2: Testing methodologies for technology and scenario evaluation (2007)

    Google Scholar 

  6. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence (2002)

    Google Scholar 

  7. Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance evaluation of fingerprint verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence (2006)

    Google Scholar 

  8. Breebaart, J., Busch, C., Grave, J., Kindt, E.: A reference architecture for biometric template protection based on pseudo identities. In: BIOSIG 2008 (2008)

    Google Scholar 

  9. Bringer, J., Chabanne, H., Kindarji, B.: Anonymous identification with cancelable biometrics. In: International Symposium on Image and Signal Processing and Analysis (2009)

    Google Scholar 

  10. Kelkboom, E., de Groot, K., Breebaart, J., Chen, C., Veldhuis, R.: Pitfall of optimal bit allocation within template protection and remedy. In: IEEE Third International Conference on Biometrics: Theory, Applications and Systems, BTAS (2009)

    Google Scholar 

  11. Yang, B., Gafurov, D., Busch, C., Bours, P.: Encrypting fingerprint minutiae templates by random quantization. In: 2nd International Conference on Networked Digital Technologies (2010) Special Session on Real Time Biometric Solutions for Networked Society

    Google Scholar 

  12. Yang, B., Busch, C., Gafurov, D., Bours, P.: Renewable minutiae templates with tunable size and security. In: 20th International Conference on Pattern Recognition, ICPR (2010)

    Google Scholar 

  13. ISO/IEC JTC 1/SC 27 CD 24745 Information technology - security techniques - biometric template protection (2009)

    Google Scholar 

  14. Simoens, K., Yang, B., Zhou, X., Beato, F., Busch, C., Newton, E.M., Preneel, B.: Criteria towards metrics for benchmarking template protection algorithms. In: ICB (2012)

    Google Scholar 

  15. Gafurov, D., Bours, P., Yang, B., Busch, C.: GUC100 multisensor fingerprint database for in-house (semipublic) performance test. EURASIP Journal on Information Security (2010)

    Google Scholar 

  16. Gafurov, D., Busch, C., Yang, B., Bours, P.: Testbed preparation report. Technical report, Gjovik University College (Turbine deliverable D411), confidential (2009)

    Google Scholar 

  17. Garris, M.D., Tabassi, E., Wilson, C.L.: NIST Fingerprint evaluations and developments. Proceedings of the IEEE (2006)

    Google Scholar 

  18. Gafurov, D., Busch, C., Yang, B., Bours, P.: Test report - interoperability performance evaluation #2. Technical report, Gjovik University College (Turbine deliverable D422), confidential (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gafurov, D., Bours, P., Yang, B., Busch, C. (2013). Independent Performance Evaluation of Pseudonymous Identifier Fingerprint Verification Algorithms. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2013. Lecture Notes in Computer Science, vol 7950. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39094-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39094-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39093-7

  • Online ISBN: 978-3-642-39094-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics