hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Benchmarking Quality-dependent and Cost-sensitive Score-level Multimodal Biometric Fusion Algorithms
University of Surrey, United Kingdom.
West Virginia University, United States.
University of Surrey, United Kingdom.
CEA LIST, CEA Saclay, PC 72-91191 Gif-sur-Yvette Cedex, France.
Show others and affiliations
2009 (English)In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 4, no 4, p. 849-866Article in journal (Refereed) Published
Abstract [en]

Automatically verifying the identity of a person by means of biometrics (e.g., face and fingerprint) is an important application in our day-to-day activities such as accessing banking services and security control in airports. To increase the system reliability, several biometric devices are often used. Such a combined system is known as a multimodal biometric system. This paper reports a benchmarking study carried out within the framework of the BioSecure DS2 (Access Control) evaluation campaign organized by the University of Surrey, involving face, fingerprint, and iris biometrics for person authentication, targeting the application of physical access control in a medium-size establishment with some 500 persons. While multimodal biometrics is a well-investigated subject in the literature, there exists no benchmark for a fusion algorithm comparison. Working towards this goal, we designed two sets of experiments: quality-dependent and cost-sensitive evaluation. The quality-dependent evaluation aims at assessing how well fusion algorithms can perform under changing quality of raw biometric images principally due to change of devices. The cost-sensitive evaluation, on the other hand, investigates how well a fusion algorithm can perform given restricted computation and in the presence of software and hardware failures, resulting in errors such as failure-to-acquire and failure-to-match. Since multiple capturing devices are available, a fusion algorithm should be able to handle this nonideal but nevertheless realistic scenario. In both evaluations, each fusion algorithm is provided with scores from each biometric comparison subsystem as well as the quality measures of both the template and the query data. The response to the call of the evaluation campaign proved very encouraging, with the submission of 22 fusion systems. To the best of our knowledge, this campaign is the first attempt to benchmark quality-based multimodal fusion algorithms. In the presence of changing image quality which may be due to a change of acquisition devices and/or device capturing configurations, we observe that the top performing fusion algorithms are those that exploit automatically derived quality measurements. Our evaluation also suggests that while using all the available biometric sensors can definitely increase the fusion performance, this comes at the expense of increased cost in terms of acquisition time, computation time, the physical cost of hardware, and its maintenance cost. As demonstrated in our experiments, a promising solution which minimizes the composite cost is sequential fusion, where a fusion algorithm sequentially uses match scores until a desired confidence is reached, or until all the match scores are exhausted, before outputting the final combined score. © 2009 IEEE.

Place, publisher, year, edition, pages
Piscataway, N.J.: IEEE Press, 2009. Vol. 4, no 4, p. 849-866
Keywords [en]
Biometric database, Cost-sensitive fusion, Multimodal biometric authentication, Quality-based fusion
National Category
Signal Processing
Identifiers
URN: urn:nbn:se:hh:diva-21237DOI: 10.1109/TIFS.2009.2034885ISI: 000271968200009Scopus ID: 2-s2.0-70450258039OAI: oai:DiVA.org:hh-21237DiVA, id: diva2:589357
Available from: 2013-02-05 Created: 2013-01-17 Last updated: 2017-12-06Bibliographically approved

Open Access in DiVA

fulltext(1962 kB)237 downloads
File information
File name FULLTEXT01.pdfFile size 1962 kBChecksum SHA-512
05082f304b8d54a7c27bcc6d4aba80011fddafffe8a8607319edfbae2a9927f5453ba03a0401f1dcc95dd5715f72484dc0d344966ebc5a33016609adec9c2366
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records BETA

Alonso-Fernandez, Fernando

Search in DiVA

By author/editor
Alonso-Fernandez, Fernando
In the same journal
IEEE Transactions on Information Forensics and Security
Signal Processing

Search outside of DiVA

GoogleGoogle Scholar
Total: 237 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 138 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf