Study of Applicability of Virtual Users in Evaluating Multimodal Biometrics

  • Franziska Wolf
  • Tobias Scheidat
  • Claus Vielhauer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4105)


A new approach of enlarging fused biometric databases is presented. Fusion strategies based upon matching score are applied on active biometrics verification scenarios. Consistent biometric data of two traits are used in test scenarios of handwriting and speaker verification. The fusion strategies are applied on multimodal biometrics of two different user types. The real users represent two biometric traits captured from one person. The virtual users are considered as the combination of two traits captured from two discrete users. These virtual users are implemented for database enlargement. In order to investigate the impact of these virtual users, test scenarios using three different semantics of handwriting and speech are accomplished. The results of fused handwriting and speech of exclusively real users and additional virtual users are compared and discussed.


Fusion Strategy Equal Error Rate Real User Biometric System Speaker Verification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ross, A., Jain, A.K.: Multimodal Biometrics: An Overview. In: Proc. of the 12th European Signal Processing Conference (EUSIPCO), Vienna, Austria, pp. 1221–1224 (2004)Google Scholar
  2. 2.
    Jain, A.K., Ross, A.: Multibiometric Systems. Communications of The ACM 47(1), 34–40 (2004)CrossRefGoogle Scholar
  3. 3.
    Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: Fusion strategies in multimodal biometric verification. In: Proc. IEEE Intl. Conf. on Multimedia and Expo., ICME, Baltimore, USA, vol. 3, pp. 5–8 (2003)Google Scholar
  4. 4.
    Vielhauer, C., Schimke, S., Valsamakis, A., Stylianou, Y.: Fusion Strategies for Speech and Handwriting Modalities in HCI. In: Proceedings of SPIE-IS&T Electronic Imaging, vol. 5684, pp. 63–71 (2005)Google Scholar
  5. 5.
    Vielhauer, C., Scheidat, T.: Multimodal Biometrics for Voice and Handwriting. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 191–199. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    The BANCA Database (April 2006),
  7. 7.
    The XM2VTS Database (requested April 2006),
  8. 8.
    DIUF - BIOMETRICS – MyIDea (requested April 2006),
  9. 9.
    Moreno, A., Lindberg, B., Draxler, C., Richard, G., Choukri, K., Euler, S., Allen, J.: SPEECH DAT CAR. A Large Speech Database For Automotive Environments. In: Proceedings of the II Language Resources European Conference, Athens, Greece (2000)Google Scholar
  10. 10.
    Ross, A., Jain, A.K.: Information Fusion in Biometrics. Pattern Recognition Letters 24(13), 2115–2125 (2003)CrossRefGoogle Scholar
  11. 11.
    Poh, N., Bengio, S.: Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments? In: Renals, S., Bengio, S. (eds.) MLMI 2005. LNCS, vol. 3869, pp. 87–100. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Vielhauer, C.: Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Springer, New York (2005)Google Scholar
  13. 13.
    Stevens, S.S., Volkmann, J., Newman, E.B.: A Scale for the Measurement of the Psychological Magnitude Pitch. Journal of the Acoustic Society of America 8, 185–190 (1937)CrossRefGoogle Scholar
  14. 14.
    Tukey, J.W., Bogert, B.P., Healy, J.R.: The quefrency alanysis of time series for echoes: cepstrum, pseudo-autovariance, cross-cepstrum and saphe cracking. In: Proceedings of the Symposium on Time Series Analysis, pp. 209–243 (1963)Google Scholar
  15. 15.
    Scheidat, T., Vielhauer, C., Dittmann, J.: Distance-Level Fusion Strategies for Online Signature Verification. In: Proceedings of the IEEE International Conference on Multimedia and Expo. (ICME), Amsterdam, The Netherlands (2005)Google Scholar
  16. 16.
    Vielhauer, C., Scheidat, T., Lang, A., Schott, M., Dittmann, J., Basu, T.K., Dutta, P.K.: Multimodal Speaker Authentication – Evaluation of Recognition Performance of Watermarked References. In: Proceedings of MMUA, Toulouse, France (to appear, 2006)Google Scholar
  17. 17.
    Scheidat, T., Wolf, F., Vielhauer, C.: Analyzing Handwriting Biometrics in Metadata Context. In: Proceedings SPIE conference at the Security, Steganography, and Watermarking of Multimedia Contents VIII, IS&T/SPIE Symposium on Electronic Imaging, San Jose, USA (2006)Google Scholar
  18. 18.
    The Culture Tech Project, Cultural Dimensions in digital Multimedia Security Technology, a project funded under the EU-India Economic Cross Cultural Program (March 2006),

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Franziska Wolf
    • 1
  • Tobias Scheidat
    • 1
  • Claus Vielhauer
    • 1
  1. 1.Department of Computer Science, ITI Research Group on Multimedia and SecurityOtto-von-Guericke University of MagdeburgMagdeburgGermany

Personalised recommendations