BioEVA: An Evaluation Tool for Biometric Algorithms

  • Luiz H. R. SucupiraJr.
  • Lívia C. F. Araújo
  • Miguel G. Lizárraga
  • Lee L. Ling
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3072)


This paper presents a tool, named BioEVA, to apply two forms of evaluation processes in biometric algorithms: comparative and qualitative. BioEVA has an internal engine that implements some metrics that we called quality parameters. We define some simple submission rules (protocol) must be followed before to submit a biometric algorithm to BioEVA’s evaluation. The tool receives a biometric algorithm as a ”black-box” and performs its automated evaluation. Using BioEVA, three biometric algorithms were evaluated: two based on static signatures and one based on keystroke dynamics.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Maio, D., Maltoni, D., Cappeli, R., Wayman, J.L., Jain, A.K.: FVC2002: Second Fingerprint Verification Competition. In: Proc. of Int. Conf. on Pattern Recognition, Quebec City (2002)Google Scholar
  2. 2.
    Sucupira Jr., L.H., Araújo, L.C.F., Lizárraga, M.G., Ling, L.L.: Evaluating Biometric Software Packages using a Practioners Methodology. In: Proc. of ISCA 16th Int. Conference on Computer Applications in Industry and Engineering (CAINE 2003), USA, pp. 310–313 (2003)Google Scholar
  3. 3.
    Wirtz, B.: Average Prototypes for stroke-based signature verification. In: ICDAR 1997, Germany, vol. 1, pp. 268–272 (1997)Google Scholar
  4. 4.
    Lee, L.L., Lizárraga, M.G.: Off-line methods for human signature verification. In: Proceedings of IASTED International Conference on Signal and Image Processing SIP- 1996, USA (1996) Google Scholar
  5. 5.
    Lizárraga, M.G.: Um Sistema Biométrico de Identificação Pessoal via Internet com ênfase em Assinaturas Estáticas. Doctorade Thesis, UNICAMP (August 2000)Google Scholar
  6. 6.
    Plamondon, R., Srihari, S.N.: On-Line and Off-Line Handwriting Recognition: Compreensive Survey. IEEE Trans. Patt. Anal. Mach. Intell. 22(1), 63–84 (2000)CrossRefGoogle Scholar
  7. 7.
    Joyce, R., Gupta, G.: Identity authorization based on keystroke latencies. Communications of the ACM 33(2), 168–176 (1990)CrossRefGoogle Scholar
  8. 8.
    De Ru, W.G., Eloff, J.H.P.: Enhanced Password Authentication through Fuzzy Logic. IEEE Expert / Intelligent Systems & Their Applications 17(6), 38–45 (1997)Google Scholar
  9. 9.
    Robinson, J.A., Liang, V.M., Michael, J.A.: Computer User Verification Login String Keystroke Dynamics. IEEE Trans. Syst., Man, Cybern. 28(2), 236–241 (1998)CrossRefGoogle Scholar
  10. 10.
    Lin, D.T.: Computer-Access Authentication with Neural Network Based on Keystroke Identity Verification. International Conference on Neural Networks 1, 174–178 (1997)Google Scholar
  11. 11.
    Bleha, S., Slivinsky, C., Hussain, B.: Computer-Access Security Systems Using Keystroke Dynamics. IEEE Trans. Pattern Anal. Machine Intell. 12(12), 1217–1222 (1990)CrossRefGoogle Scholar
  12. 12.
    Haidar, S., Abbas, A., Zaidi, A.K.: A Multi-Technique Approach for User Identification through Keystroke Dynamics. IEEE Int. Conf Syst.,Man Cybern. 2, 1336–1341 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Luiz H. R. SucupiraJr.
    • 1
  • Lívia C. F. Araújo
    • 1
  • Miguel G. Lizárraga
    • 1
  • Lee L. Ling
    • 1
  1. 1.School of Electrical and Computer EngineeringState University of CampinasCampinasBrazil

Personalised recommendations