An introduction evaluating biometric systems
PJ Phillips, A Martin, CL Wilson, M Przybocki - Computer, 2000 - ieeexplore.ieee.org
PJ Phillips, A Martin, CL Wilson, M Przybocki
Computer, 2000•ieeexplore.ieee.orgOn the basis of media hype alone, you might conclude that biometric passwords will soon
replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost,
or given to another person. But what if the actual performance of these systems falls short of
the estimates? The authors designed this article to provide sufficient information to know
what questions to ask when evaluating a biometric system, and to assist in determining
whether performance levels meet the requirements of an application. For example, a low …
replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost,
or given to another person. But what if the actual performance of these systems falls short of
the estimates? The authors designed this article to provide sufficient information to know
what questions to ask when evaluating a biometric system, and to assist in determining
whether performance levels meet the requirements of an application. For example, a low …
On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual performance of these systems falls short of the estimates? The authors designed this article to provide sufficient information to know what questions to ask when evaluating a biometric system, and to assist in determining whether performance levels meet the requirements of an application. For example, a low-performance biometric is probably sufficient for reducing-as opposed to eliminating-fraud. Likewise, completely replacing an existing security system with a biometric-based one may require a high-performance biometric system, or the required performance may be beyond what current technology can provide. Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing-and therefore occupy the bulk of this discussion. This article also covers the tools and techniques of biometric testing.
ieeexplore.ieee.org
Showing the best result for this search. See all results