System Design and Performance Assessment: A Biometric Menagerie Perspective. Norman Poh Lecturer Dept of Computing
|
|
- Winifred Fleming
- 6 years ago
- Views:
Transcription
1 System Design and Performance Assessment: A Biometric Menagerie Perspective Norman Poh n.poh@surrey.ac.uk Lecturer Dept of Computing 1
2 2
3 Biometric menagerie Terms & performance metrics Variability vs Repeatability Biometric score theory Procedures User-specific score calibration Biblio note DET confidence intervals Performance synthesis User-specific fusion Doddington s classification Yager and Dunston s Biometric Menagerie Index User-ranking User-specific fusion with modality selection Concluding remarks User-ranking on unseen data Tricks of the trade
4 Is biometric menagerie persistent? Yes Assumption: Is the template fixed? No If you update your template, you need to recompute the separability criterion Yes Will the system operate in the same environment as the development set? No You need to compute the separability criterion for the expected operating condition Yes Is the system expected to operate for less than 1 year? The menagerie is likely to persist No At some point, you will throw away the template anyway. Menu 4
5 Thank you 5
6 TERMS AND PERFORMANCE METRICS 6
7 Some basic terms Gallery Template or Template or Template reference or reference reference Query or probe Biometric matcher Score 7
8 Genuine score Template Query or probe Biometric matcher Match score Genuine score (Mated score) 8
9 Zero-effort impostor score Template Query or probe Biometric matcher Non-match Score Zero-effort impostor score (Non-mated score) 9
10 Nonzero-effort impostor score Fake/spoofed sample Template Query or probe Biometric matcher Spoof score Nonzero-effort impostor score 10
11 Biometric Menagerie scope Future research Rattani, Ajita, Norman Poh, and Arun Ross. "Analysis of userspecific score characteristics for spoof biometric attacks." Computer Vision and Pattern Recognition Workshops (CVPRW), 2012 IEEE Computer Society Conference on. IEEE,
12 likelihood p(y ω = I) p(y ω = G) pdf: probabilistic density function Score, y 12
13 likelihood p(y ω = I) p(y ω = G) Score, y 13
14 Probability likelihood Decision threshold, Δ y > Δ p(y ω = I) p(y ω = G) False rejection False acceptance 1 False match rate, FMR (False Acceptance Rate, FAR) False non-match Rate, FNMR (False Rejection Rate, FRR) FMR Δ = P(y > Δ ω = I) FNMR Δ = P(y Δ ω = G) = 1 P(y Δ ω = I) P y Δ ω = p y ω dy Δ Score, y 14
15 1) ROC FMR Δ FMR Δ FNMR Δ 2) ROC (variant) True Acceptance Rate 3) DET FAR Δ False Alarm Rate Note: Φ is the PDF of a normal distribution; Φ 1 is its inverse Φ 1 (FMR Δ ) 15
16 FNMR[%] FNMR[%] ROC versus DET Receiver s Operating Characteristic (ROC) curve EER Detection Error Trade-off (DET) curve EER FMR[%] EER: Equal Error Rate or Cross-over error rate Further reading: Biometric Testing and Statistics FMR[%] Menu 16
17 VARIABILITY AND REPEATABILITY OF BIOMETRIC PERFORMANCE 17
18 Skill of the operator Quality of the template emographics of target users Stochastic nature of the algorithms Sources of variability Template We are trying to collect the scores and measure the system performance Sensor type Sensor type Session variability Biometric matcher Match score Demographics of impostor Query or probe Environment Lighting Temperature Application scenario Covert vs overt Level of user s cooperation Mounted or mobile Biometric features of the design population Wayman, James L., Antonio Possolo, and Anthony J. Mansfield. "Modern statistical and philosophical framework for uncertainty assessment in biometric performance testing." IET biometrics 2.3 (2013):
19 Three types of biometric tests Technology test Use a (sequestered) database to test/compare algorithms Repeatable because many factors are fixed once data is collected Scenario testing Measure the overall system (sensor + algorithm) performance in a typical realworld application domain It is not repeatable because another field test will not give exactly the same result Operational testing Model the performance in a specific application using a specific biometric system Not repeatable Source: Philips, P.J., Martin, A., Wilson, C., Przybocki, M.: An introduction to the evaluation of biometric systems, IEEE Comput., 2000, 33, (2), pp Comments: Wayman, James L., Antonio Possolo, and Anthony J. Mansfield. "Modern statistical and philosophical framework for uncertainty assessment in biometric performance testing." IET biometrics 2.3 (2013):
20 Repeatability Same SOP for enrolment, same operators Same biometric system & sensor Same application scenario Similar (controlled) environment Comparable user size but different subjects Installation site A Installation site B Will the two curves be the same? How much do they vary? 20
21 Clients-based bootstrapping 200 clients 100 clients 100 clients 100 clients 100 clients Variability due to the user composition is observed under technology test Questions: How much do they vary? Why do they vary? Can we extrapolate (generalize) to another scenario? 21
22 Session variability why it matters? Queries of genuine samples are from the same day or different days Dev set Eva set Would the performance be similar? 22
23 With vs without session variability Same session Different session Biosecure DS2 score database 23
24 Quiz Should we consider session variability when testing a biometric system? A: No, we should not because we want to fix all parameters in favour of experimental repeatability B: Yes, we must do so in every biometric testing Need a hint? Explanation Do you know of any biometric system that is designed to operate only on the same day as enrolment? We must acknowledge that we can never fix all parameters and fixing all is not always desirable Menu 24
25 BIOMETRIC SCORE THEORY 25
26 likelihood What assumptions? The demographic composition of the zeroeffort impostors Nonzero-effort impostor Adverse conditions The quality of the environment may vary User interaction A myriad # of unmeasurable factors Score, y Samples are independently and identically distributed (i.i.d.) 26
27 likelihood Formation of nonmatch scores Zero effort impostors Client templates/ models Y 1 I Impostor scores Y 2 I Y 3 I score 27
28 likelihood Formation of match scores Client accesses Client template/ model Client scores Y 1 G Y 2 G Y 3 G score Scores of 3 clients 28
29 likelihood An Observed Experimental Outcome Impostor scores Y 1 I Client scores Y 1 G Strong correlation exists among scores generated by the common client model Y 2 I Y 2 G Y 3 I Y 3 G Samples are independently and identically distributed (i.i.d.) given the claimant ID score 29
30 likelihood How would i.i.d. samples look like? Impostor scores Y I Client scores Y G Samples are independently and identically distributed (i.i.d.) score 30
31 Which is correct? Y I Y G Y 1 I Y 1 G Y 2 I Y 2 G Y 3 I Y 3 G Samples are i.i.d. Samples are i.i.d. given the claimed ID 31
32 Local pdf = Claimant-specific pdf Global pdf = System-level pdf Global, p(y ω = G) Global: p(y ω = I) Local, p(y ω = I, j) Local, p(y ω = G, j) XM2VTS face system (DCTmod2,GMM) 200 users/clients 3 genuine scores per user (blue curve) 400 impostor scores per user (red curve) 32
33 How are the local and global models related? J p y ω = p y ω, j P(j ω) j=1 for ω {G, I} The class-conditional pdf associated to claimant j The prior probability of claimant j given the class label ω There is no reason why one claimant is more important than another; so, P(j ω) should be uniform: P j ω = 1 J p y ω = 1 J J j=1 p y ω, j The system-level class-conditional pdf score is simply an average of the pdf of the claimant-specific pdf. 33
34 Consequence The user composition has direct influence on the system performance even when all experimental conditions are fixed P y Δ ω = G J = 1 P y Δ ω = G, j J j=1 P y > Δ ω = I J = 1 P y > Δ ω = I, j J Menu j=1 34
35 Classification of literature BIBLIOGRAPHY NOTES 35
36 Studies of biometric menagerie Classification of research in Biometric Menagerie Measuring the phenomenon Looking at the extremes of distribution Relative ranking Doddington s zoo Yager and Dunstone s classification User discrimination Directly characterising the variability Biometric menagerie index Reducing the impact Score normalisation Fusion Parametric: Z-norm, F- norm, Group-based F-norm Training-based: MS-LLR, logistic regression 36
37 Studies of biometric menagerie Measuring the phenomenon Looking at the extremes of distribution Relative ranking Doddington s zoo Yager and Dunstone s classification User discrimination Directly characterising the variability Biometric menagerie index Reducing the impact Score normalisation Fusion Parametric: Z-norm, F- norm, Group-based F-norm Training-based: MS-LLR, logistic regression 37
38 Some references Doddington s zoo Yager and Dunstone s classification User discrimination Biometric menagerie index Parametric: Z-norm, F- norm, Group-based F-norm Training-based: MS-LLR, logistic regression Doddington, George, et al. Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. NATIONAL INST OF STANDARDS AND TECHNOLOGY GAITHERSBURG MD, Yager, Neil, and Ted Dunstone. "The biometric menagerie." Pattern Analysis and Machine Intelligence, IEEE Transactions on 32.2 (2010): * N. Poh and J. Kittler, A Methodology for Separating Sheep from Goats for Controlled Enrollment and Multimodal Fusion, in 6th Biometrics Symposium, pp , * N. Poh, A. Ross, W. Li, and J. Kittler, A User-Specific and Selective Multimodal Biometric Fusion Strategy by Ranking Subjects, Pattern Recognition 46(12): , N. Poh and J. Kittler, A Biometric Menagerie Index for Characterising Template/Modelspecific Variation, in Int l Conf. on Biometrics (ICB'09), * N. Poh, A. Rattani, M. Tistarelli and J. Kittler, Group-specific Score Normalization for Biometric Systems, in IEEE Computer Society Workshop on Biometrics (CVPR), pages 38-45, * N. Poh and S. Bengio, An Investigation of F-ratio Client-Dependent Normalisation on Biometric Authentication Tasks, in IEEE Int'l Conf. Acoustics, Speech, and Signal Processing (ICASSP), volume I, pages , 2005 * N. Poh and M. Tistarelli, Customizing Biometric Authentication Systems via Discriminative Score Calibration, IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2012 * N. Poh and J. Kittler, Incorporating Variation of Model-specific Score Distribution in Speaker Verification Systems, IEEE Trans. Audio, Speech and Language Processing, 16(3): , Menu 38
39 DODDINGTON S ZOO 39
40 likelihood Doddington s Zoo Strong impostor High FAR High FRR Good clients p y ω = I, j (the majority of p y ω = G, j the claimants) p y ω = I p y ω = G Score, y Doddington, George, et al. Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. NATIONAL INST OF STANDARDS AND TECHNOLOGY GAITHERSBURG MD,
41 likelihood Characterising claimant-specific pdf Need more and more data First moment: μ j I Second moment: σ j I 2 Skewness: m 3 j I Kurtosis: m 4 j I First moment: μ j G Second moment: σ j G 2 Skewness: m 3 j G Kurtosis: m 4 j G p y ω = I, j p y ω = G, j Score, y 41
42 Mean μ = E y [y] Variance σ 2 = E y [ μ y 2 ] Skewness E y y μ 3 σ 3 Kurtosis E y y μ 4 σ 4 Peakedness Source: Wikipedia entries: mean, variance, skewness,and kurtosis 42
43 Claimants What s the difference between a wolf and a lamb??? Each subject may have multiple query images p y ω = I, j = 1 p y ω = I, j = p y ω = I, j = 3 1 Y 1 G Y 1 I 2 3 Y 3 I Y 2 G Y 3 G Y 1 I Lambs are claimants whose zero-effort impostor scores are relatively high (1 template each) Goats are claimants whose genuine scores are relatively low 43
44 Claimants (1 template each) What s the difference between a wolf and a lamb??? queries 1 Y 1 G Y 2 G 3 Y 3 G Wolves are those who can generate very high ZE impostor scores Claimants can be wolves, too! 44
45 Wolves are lambs and lambs are wolves when We use a symmetric matcher and consider a closed set G Y 1 2 G Y 2 3 G Y G Y 1 2 G Y 2 3 G Y 3 A symmetric matcher is one that satisfies: M(a,b) = M(b,a) 45
46 likelihood Why do wolves matter? p y ω = I, j is a wolf p y ω = I p y ω = G Score, y Murakami, Takao, Kenta Takahashi, and Kanta Matsuura. "Towards optimal countermeasures against wolves and lambs in biometrics." Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE,
47 Claimants Summary: Goats and lamb detection Each subject may have multiple query images Gen Y 1 G Y 1 I Y 1 G Y 1 I 100 G Y 100 I Y 100 G Y 100 I Y
48 Summary: Goats and lamb detection Y 1 G Y 1 I G Y 100 I Y
49 Sort Sort Summary: Goats and lamb detection Goats Statistic Scores Scores Statistic μ 1 G Y 1 G The original Goat test was implemented using nonparametric Kruskal-Wallis rank sum test; we use a simplified test here Y 1 I μ 1 I G μ 100 G Y 100 I Y 100 I μ Lamb 49
50 Claimants Summary: Wolves detection Each subject may have multiple query images 1 Y 1 G Gen G Y 100 W W W W μ 1000 μ 1001 μ 4999 μ 5000 Wolves Sort Menu 50
51 YAGER AND DUNSTONE S CLASSIFICATION 51
52 Mean Genuine score Biometric Menagerie Mean Impostor Score Yager, Neil, and Ted Dunstone. "The biometric menagerie." Pattern Analysis and Machine Intelligence, IEEE Transactions on 32.2 (2010):
53 Mean Genuine score Mean Impostor Score N. Poh, A. Rattani, M. Tistarelli and J. Kittler, Group-specific Score Normalization for Biometric Systems, in IEEE Computer Society Workshop on Biometrics (CVPR), pages 38-45,
54 Group-based F-norm N. Poh, A. Rattani, M. Tistarelli and J. Kittler, Group-specific Score Normalization for Biometric Systems, in IEEE Computer Society Workshop on Biometrics (CVPR), pages 38-45, Menu 54
55 CONCLUDING REMARKS 55
56 Concluding remarks Are subjects inherently hard to match? Match score analysis: This question depends on how well we understand the environment in which biometric operates, thus requiring some generalization capability to unseen data Non-match score analysis: This can be answered! Why biometric menagerie: a conjecture 56
57 Application Scenario Are subjects inherently hard to match? Match score analysis {U j 1, U j 2, U j 3, U j 4 } U j 1 U j 2 M(U j 1, U j 2 ) U j 1 U j 2 U j 3 U j 4 U j 1 U j 2 U j 3 U j 4 template queries n-1 scores n 2 = n(n 1) scores 2 User-specific score calibration: to reduce the menagerie effect Template selection: to find a representative template Poh, Norman, and Josef Kittler. "Incorporating variation of model-specific score distribution in speaker verification systems." IEEE Transactions on Audio, Speech and Language Processing 16.3 (2008): Jain, Anil, Umut Uludag, and Arun Ross. "Biometric template selection: a case study in fingerprints." Audio-and Video-Based Biometric Person Authentication. Springer Berlin Heidelberg,
58 Sort Sort Are subjects inherently hard to match? Non-match score analysis Set A queries Set B queries Statistic μ 1 I Y 1 I A Y 1 I B Statistic μ 1 I I μ I Y 200 A I Y 200 B I μ 100 Claimants Impostor-based Uniqueness Measure Compare Impostor-based Uniqueness Measure 58
59 Non-match scores are very stable 100 impostors 1000 impostors 4000 impostors 8000 impostors Klare, Brendan F., and Anil K. Jain. "Face recognition: Impostor-based measures of uniqueness and quality." Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE,
60 XM2VTS score-level benchmark database 200 claimants 13 experiments Download the database here: μ j ω=i μ j ω=c Norman Poh and Samy Bengio, Database, Protocol and Tools for Evaluating Score-Level Fusion Algorithms in Biometric Authentication, Pattern Recognition, Volume 39, Issue 2, Pages , σ j ω=i σ j ω=c One data set 60
61 Generalisation ability of biometric menagerie ~ 1 month apart 25 impostors 8 samples 70 impostors 8 samples 2 genuine samples from a 3 genuine samples (from a different different session then enrolment) session then enrolment) Can we predict the statistics? N. Poh, A. Ross, W. Li, and J. Kittler, A User-Specific and Selective Multimodal Biometric Fusion Strategy by Ranking Subjects, Pattern Recognition 46(12): ,
62 One of the 13 experiments μ j ω=c σ j ω=c μ j ω=i σ j ω=i μ j ω dev σ j ω dev 62
63 How predictable are the statistics? μ j ω=i μ j ω=c σ j ω=i σ j ω=c One of the 13 experiments 63
64 L.J.P. van der Maaten and G.E. Hinton. Visualizing High-Dimensional Data Using t-sne. Journal of Machine Learning Research 9(Nov): ,
65 Conjectures Biometric menagerie is systemdependent Feature space It is related to subject representativeness Poor quality enrolment Even with well-controlled enrolment, the menagerie still exists User-specific schemes can reduce the effect Changing menagerie membership Teli, Mohammad Nayeem, et al. "Biometric zoos: Theory and experimental evidence." Biometrics (IJCB), 2011 International Joint Conference on. IEEE, Wittman et al, Empirical Studies of the Existence of the Biometric Menagerie in the FRGC 2.0 Color Image Corpus, CVPRW 2006 * Paone, Liberating the Biometric Menagerie Through Score Normalization, PhD thesis, 2013 * N. Poh and J. Kittler, Incorporating Variation of Model-specific Score Distribution in Speaker Verification Systems, IEEE Trans. Audio, Speech and Language Processing, 16(3): , Popescu-Bodorin, Nicolaie, Valentina Emilia Balas, and Iulia Maria Motoc. "The Biometric Menagerie A Fuzzy and Inconsistent Concept." Soft Computing Applications. Springer Berlin Heidelberg,
66 Scenario Should the menagerie classify the users or their templates? Classify users Classify templates Algorithm U j 1 U j 2 U j 3 U j 4 Users score characteristics persist! Number of goats overlapped out of 50 trials Teli, Mohammad Nayeem, et al. "Biometric zoos: Theory and experimental evidence." Biometrics (IJCB), 2011 International Joint Conference on. IEEE, N. Poh, A. Ross, W. Li, and J. Kittler, A User-Specific and Selective Multimodal Biometric Fusion Strategy by Ranking Subjects, Pattern Recognition 46(12): , Popescu-Bodorin, Nicolaie, Valentina Emilia Balas, and Iulia Maria Motoc. "The Biometric Menagerie A Fuzzy and Inconsistent Concept." Soft Computing Applications. Springer Berlin Heidelberg, Menu 66
67 BIOMETRIC MENAGERIE INDEX 67
68 Desirable properties of a menagerie index index = 0 0 index 1 index=1 68
69 Biometric Menagerie Index Client i Between client variance Client j Between client variance Within client variance Within client variance μ i μ μ j Total variance N. Poh and J. Kittler, A Biometric Menagerie Index for Characterising Template/Modelspecific Variation, in Int l Conf. on Biometrics (ICB'09),
70 BMI= E Mean of between client variance = Total variance Total variance 70
71 Global mean = client mean Within-client variance dominates Between client variance dominates 71
72 XM2VTS database Nonmatch comparisons Match comparisons N. Poh and J. Kittler, A Biometric Menagerie Index for Characterising Template/Modelspecific Variation, in Int l Conf. on Biometrics (ICB'09), Get the data set: 72
73 Findings Impostor BMI is insensitive to the choice of (zero-effort) impostor client BMI > Impostor BMI High client BMI values suggest that client-specific threshold or normalization is essential Menu 73
74 USER RANKING 74
75 Sort User ranking Genuine ZE Impostor 1 Y 1 G Y 1 I Calculate the statistic μ 1 G μ 1 I, σ 1 I Rank the users 100 G I Y 100 Y 100 G μ 100 I I μ 100, σ
76 Why rank the subjects? N. Poh and J. Kittler, A Methodology for Separating Sheep from Goats for Controlled Enrollment and Multimodal Fusion, in 6th Biometrics Symposium, pp , Quality control during enrollment If the newly acquired template is not representative of the person, acquire a better (more representative) sample A tool to assess the worstscenario DET curve How bad could a system perform for a group of weak (the weakest) users? The experience of each user in interacting with a biometric device matters! A modality selection criterion in fusion Use only the more representative biometric modality instead. Novel group specific decision An optimal decision threshold for each group of users N. Poh, A. Ross, W. Li, and J. Kittler, A User-Specific and Selective Multimodal Biometric Fusion Strategy by Ranking Subjects, Pattern Recognition 46(12): , N. Poh, A. Rattani, M. Tistarelli and J. Kittler, Group-specific Score Normalization for Biometric Systems, in IEEE Computer Society Workshop on Biometrics (CVPR), pages 38-45,
77 EER Criteria to rank the users Calculate the performance of each user template and rank them somehow! For each user/template! [IEEE Trans. SP, 2006] F-ratio 77
78 Many parametric discrimination criteria available Multivariate statistics 78
79 Sort User-ranking algorithm Calculate the statistics Apply separability criterion Rank the users Group their scores Plot performance Worst perf μ 1 G μ 1 I, σ 1 I C G μ 100 I I μ 100, σ 10 C Best perf N. Poh and J. Kittler, A Methodology for Separating Sheep from Goats for Controlled Enrollment and Multimodal Fusion, in 6th Biometrics Symposium, pp ,
80 Results on Face, Fingerprints & Iris Biosecure database a face example F-ratio d-prime random N. Poh and J. Kittler, A Methodology for Separating Sheep from Goats for Controlled Enrollment and Multimodal Fusion, in 6th Biometrics Symposium, pp ,
81 Performance disparity across users
82 Findings Very few weak users; but they dominate the errors F-ratio and d-prime can be used to rank the users Can we rank the subject with maximal stability (on unseen data)? B-ratio (PRJ 2013) ranks users on unseen data Menu 82
83 USER RANKING ON UNSEEN DATA 83
84 Rank the users on unseen data! Independent data sets (different sessions) C 1 C 1 Dev set Eva set C 100 C 100 Unseen data Can we predict the statistics? We designed 6 criteria and searched the best one N. Poh, A. Ross, W. Li, and J. Kittler, A User-Specific and Selective Multimodal Biometric Fusion Strategy by Ranking Subjects, Pattern Recognition 46(12): ,
85 Predictability of user ranking on unseen data F-ratio B-ratio (in F- norm domain) XM2VTS 13 systems 85
86 Sort Sort Summary Calculate the statistics μ 1 G μ 1 I, σ 1 I Apply separability criterion C 1 Rank the users We should be able to predict problematic users before they use the technology Re-enrol with new samples G μ 100 I I μ 100, σ 10 C 100 Use a different biometric modality μg I I 101 μ 101, σ 101 C 101 Recommend another authentication mechanism Menu 86
87 BIOMETRIC MENAGERIE PROCEDURE 87
88 Biometric Menagerie Procedures Definition 1: Interventions that allow us to exploit Biometric Menagerie to improve the system s future operation User ranking user tailoring Definition 2: Algorithms that exploit Biometric Menagerie to estimate the system s future operational performance Performance intervals estimation Performance synthesis Menu 88
89 PERFORMANCE CONFIDENCE ESTIMATION 89
90 DET confidence intervals Different subjects, different demographics Dev set Eva set How well is the predicted curve? Measure coverage 90
91 Coverage 91
92 likelihood Conventional bootstrap Impostor scores Client scores score 92
93 Bootstrap 1 Bootstrap 2 Bootstrap 3 93
94 A two-level bootstrap Handle between model variance by boostrapping the enrolled identities Handle within model variance by bootstrapping the within-model scores N. Poh and S. Bengio, Performance Generalization in Biometric Authentication Using Joint User-specific and Sample Bootstraps, IEEE Trans. on Pattern Analysis and Machine Intelligence, 29(3): , March
95 likelihood Subset Bootstrap Impostor scores Client scores Bolle, Ratha & Pakanti, Error analysis of pattern recognition systems: the subsets bootstrap, CVIU 2014 score 95
96 Two-level Bootstrap Bootstrap users/models U=3 times 1 2 Bootstrap samples within a model: S=4 times Plot DET Level 1 Level 2 96
97 DET confidence via bootstrapping 97
98 98
99 User-specific bootstrap Sample bootstrap DET angle Fix the users (claimants), bootstrap only the samples Bootstrap the claimants, and keep all the scores due to the chosen claimants 99
100 Effect of subject samples Increased subject Better precision 100
101 Findings User-induced variability is more important than the sample variability Increasing the subject population reduces the uncertainty Coverage achieved 70-90% on NIST 2005 Speaker Evaluation data set 101
102 Average coverage of 24 NIST 2005 systems Two-level Bootstrap Bootstrap subset S=1, U varies Conventional bootstrap, S varies Within model variability, U=1, S varies Configuration: Trained on 31 users; tested on another 62 users 102
103 Quiz How to best generate 10,000 genuine score samples in order to conduct a biometric test? Recruit 10 subjects each contribute samples Recruit 100 subjects each contribute samples Recruit 1000 subjects each contribute 10+1 samples Menu 103
104 On-going research PERFORMANCE SYNTHESIS 104
105 Synthesizing DET curves to other operating conditions Data with recorded conditions Operational data that we haven t collected Previous operational data Application specs A new installation Performance synthesis Compare prediction quality 105
106 Benefits of performance synthesis Liberates performance curves from its assessment data set Provides a framework for test reporting that promotes documentation and measurement of experimental conditions Potentially reduces cost in testing 106
107 Negative (impostor) scores Positive (genuine) scores Negative scores (cond 1) Negative scores (cond Q ) Calculate DET Positive scores (cond 1) Positive scores (cond Q ) Estimate cdf Estimate cdf Estimate cdf Estimate cdf Estimate confidence Bootstrap Bootstrap Bootstrap Bootstrap Combine Combine Set the priors of P Q ω 107
108 The underpinning theory p y ω = p y ω, Q P(Q ω) Q P y Δ ω = P y Δ ω, Q P(Q ω) Q 108
109 P y Δ ω = G J = 1 P y Δ ω = G, j J j=1 P y > Δ ω = I = 1 J J j=1 P y > Δ ω = I, j 109
110 Study 1: Fingerprint with NFIQ 4&
111 Simulated DET curves of varying quality High quality tendency [ ] Low quality tendency [ ] Equal prior quality [ ] Relative weights of the 4 curves: [Q1 Q2 Q3 Q4&5] 111
112 Study II: Cross-sensor performance Cross-sensor Sensor 1 (Biometrika) Sensor 2 (Ital) 112
113 Simulated DET curves with mixture of data Sensor 1 Sensor 2 Sensor 1 + Senso 2 + Cross-sensor [1 0 0] [0 1 0] [1 1 1] The ratio shows [ S1 S2 cross-sensor] 113
114 Assessment with DET angles 114
115 Achievable coverage Coverage achieved between 60% and 80% Menu 115
116 USER-SPECIFIC SCORE NORMALISATION 116
117 Score normalisation Original matching scores Z-norm F-norm Bayesian classifier [IEEE TASLP 08] 117
118 Menu 118
119 USER-SPECIFIC FUSION 119
120 Client-specific fusion 120
121 Some results Menu [IEEE TASLP 08] 121
122 USER-SPECIFIC & SELECTIVE FUSION 122
123 System architecture Recommend usage Compute criterion Criterion = B-norm of Fratio Modality 1 Modality 2 F-norm F-norm Fusion with selection Compute criterion Recommend usage 123
124 Rationale: The B-ratio of F-norm F-ratio = μ j G μ j I σ j G +σ j I B-ratio = μ j G μ j I σ j I The discrimination power of the user is fully captured by σ F j I σ F j G unknown The B-norm of F-ratio = μ Fj G μ F j I = 1 σ F j I σ F j I μ F j I =0 μ F j G =1 124
125 Cost savings XM2VTS database. # of users J = 200 # of system = 2 125
126 A user-specific and selective multimodal biometric fusion strategy by ranking subjects, PRJ
127 EER (%) Performance on test set Computational savings 10 of 15 fusion experiments shown here Menu 127
Revisiting Doddington s Zoo: A Systematic Method to Assess User-dependent Variabilities
Revisiting Doddington s Zoo: A Systematic Method to Assess User-dependent Variabilities, Norman Poh,, Samy Bengio and Arun Ross, IDIAP Research Institute, CP 59, 9 Martigny, Switzerland, Ecole Polytechnique
More informationScore Normalization in Multimodal Biometric Systems
Score Normalization in Multimodal Biometric Systems Karthik Nandakumar and Anil K. Jain Michigan State University, East Lansing, MI Arun A. Ross West Virginia University, Morgantown, WV http://biometrics.cse.mse.edu
More informationA Biometric Menagerie Index for Characterising Template/Model-specific Variation
A Biometric Menagerie Index for Characterising Template/Model-specific Variation Norman Poh and Josef Kittler CVSSP, University of Surrey, Guildford, GU2 7XH, Surrey, UK normanpoh@ieee.org, j.kittler@surrey.ac.uk
More informationLikelihood Ratio Based Biometric Score Fusion
1 To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007 Based Biometric Score Fusion Karthik Nandakumar, Student Member, IEEE, Yi Chen, Student Member, IEEE, Sarat C. Dass,
More informationWhen enough is enough: early stopping of biometrics error rate testing
When enough is enough: early stopping of biometrics error rate testing Michael E. Schuckers Department of Mathematics, Computer Science and Statistics St. Lawrence University and Center for Identification
More informationDynamic Linear Combination of Two-Class Classifiers
Dynamic Linear Combination of Two-Class Classifiers Carlo Lobrano 1, Roberto Tronci 1,2, Giorgio Giacinto 1, and Fabio Roli 1 1 DIEE Dept. of Electrical and Electronic Engineering, University of Cagliari,
More informationIf you wish to cite this paper, please use the following reference:
This is an accepted version of a paper published in Proceedings of the st IEEE International Workshop on Information Forensics and Security (WIFS 2009). If you wish to cite this paper, please use the following
More informationI D I A P R E S E A R C H R E P O R T. Samy Bengio a. November submitted for publication
R E S E A R C H R E P O R T I D I A P Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks? Norman Poh Hoon Thian a IDIAP RR 03-59 November 2003 Samy Bengio
More informationBIOMETRIC verification systems are used to verify the
86 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 Likelihood-Ratio-Based Biometric Verification Asker M. Bazen and Raymond N. J. Veldhuis Abstract This paper
More informationBiometric Fusion: Does Modeling Correlation Really Matter?
To appear in Proc. of IEEE 3rd Intl. Conf. on Biometrics: Theory, Applications and Systems BTAS 9), Washington DC, September 9 Biometric Fusion: Does Modeling Correlation Really Matter? Karthik Nandakumar,
More informationScore calibration for optimal biometric identification
Score calibration for optimal biometric identification (see also NIST IBPC 2010 online proceedings: http://biometrics.nist.gov/ibpc2010) AI/GI/CRV 2010, Ottawa Dmitry O. Gorodnichy Head of Video Surveillance
More informationHas this Person Been Encountered Before? : Modeling an Anonymous Identification System
A version of this paper appears in the IEEE Computer Society Workshop on Biometrics at the Computer Vision and Pattern Recognition Conference (CVPR 1, Providence, RI, USA, June 1 Has this Person Been Encountered
More informationA Contrario Detection of False Matches in Iris Recognition
A Contrario Detection of False Matches in Iris Recognition Marcelo Mottalli, Mariano Tepper, and Marta Mejail Departamento de Computación, Universidad de Buenos Aires, Argentina Abstract. The pattern of
More informationThis is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference:
This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference: T. Murakami, T. Ohki, K. Takahashi, Optimal sequential
More informationCitation for published version (APA): Susyanto, N. (2016). Semiparametric copula models for biometric score level fusion
UvA-DARE (Digital Academic Repository) Semiparametric copula models for biometric score level fusion Susyanto, N. Link to publication Citation for published version (APA): Susyanto, N. (2016). Semiparametric
More informationA Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification
Pattern Recognition Letters journal homepage: www.elsevier.com A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification Mohammad Rafiqul Alam a,, Mohammed Bennamoun a, Roberto
More informationInformation Fusion for Local Gabor Features Based Frontal Face Verification
Information Fusion for Local Gabor Features Based Frontal Face Verification Enrique Argones Rúa 1, Josef Kittler 2, Jose Luis Alba Castro 1, and Daniel González Jiménez 1 1 Signal Theory Group, Signal
More informationFingerprint Individuality
Fingerprint Individuality On the Individuality of Fingerprints, Sharat Pankanti, Anil Jain and Salil Prabhakar, IEEE Transactions on PAMI, 2002 US DOJ, Office of the Inspector General, A Review of the
More informationBiometrics: Introduction and Examples. Raymond Veldhuis
Biometrics: Introduction and Examples Raymond Veldhuis 1 Overview Biometric recognition Face recognition Challenges Transparent face recognition Large-scale identification Watch list Anonymous biometrics
More informationSpeaker Verification Using Accumulative Vectors with Support Vector Machines
Speaker Verification Using Accumulative Vectors with Support Vector Machines Manuel Aguado Martínez, Gabriel Hernández-Sierra, and José Ramón Calvo de Lara Advanced Technologies Application Center, Havana,
More informationMixtures of Gaussians with Sparse Regression Matrices. Constantinos Boulis, Jeffrey Bilmes
Mixtures of Gaussians with Sparse Regression Matrices Constantinos Boulis, Jeffrey Bilmes {boulis,bilmes}@ee.washington.edu Dept of EE, University of Washington Seattle WA, 98195-2500 UW Electrical Engineering
More informationIBM Research Report. The Relation between the ROC Curve and the CMC
RC23885 (W0602-49) February 7, 2006 Mathematics IBM Research Report The Relation between the ROC Curve and the CMC R. M. Bolle, J. H. Connell, S. Pankanti, N. K. Ratha, A. W. Senior IBM Research Division
More informationError Rates. Error vs Threshold. ROC Curve. Biometrics: A Pattern Recognition System. Pattern classification. Biometrics CSE 190 Lecture 3
Biometrics: A Pattern Recognition System Yes/No Pattern classification Biometrics CSE 190 Lecture 3 Authentication False accept rate (FAR): Proportion of imposters accepted False reject rate (FRR): Proportion
More informationMaximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems
Maximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems Chin-Hung Sit 1, Man-Wai Mak 1, and Sun-Yuan Kung 2 1 Center for Multimedia Signal Processing Dept. of
More informationTest Sample and Size. Synonyms. Definition. Main Body Text. Michael E. Schuckers 1. Sample Size; Crew designs
Test Sample and Size Michael E. Schuckers 1 St. Lawrence University, Canton, NY 13617, USA schuckers@stlawu.edu Synonyms Sample Size; Crew designs Definition The testing and evaluation of biometrics is
More informationSemi-parametric Distributional Models for Biometric Fusion
Semi-parametric Distributional Models for Biometric Fusion Wenmei Huang and Sarat C. Dass Department of Statistics and Probability, Michigan State University, East Lansing, MI, 48824, USA Abstract The
More informationEEL 851: Biometrics. An Overview of Statistical Pattern Recognition EEL 851 1
EEL 851: Biometrics An Overview of Statistical Pattern Recognition EEL 851 1 Outline Introduction Pattern Feature Noise Example Problem Analysis Segmentation Feature Extraction Classification Design Cycle
More informationPerformance Evaluation and Comparison
Outline Hong Chang Institute of Computing Technology, Chinese Academy of Sciences Machine Learning Methods (Fall 2012) Outline Outline I 1 Introduction 2 Cross Validation and Resampling 3 Interval Estimation
More informationBiometric Data Fusion Based on Subjective Logic 1
Biometric Data Fusion Based on Subjective Logic 1 Audun Jøsang University of Oslo Norway josang@mn.uio.no Thorvald H. Munch-Møller University of Oslo Norway thorvahm@ifi.uio.no Abstract Biometric identification
More informationMixtures of Gaussians with Sparse Structure
Mixtures of Gaussians with Sparse Structure Costas Boulis 1 Abstract When fitting a mixture of Gaussians to training data there are usually two choices for the type of Gaussians used. Either diagonal or
More informationLecture 3: Pattern Classification
EE E6820: Speech & Audio Processing & Recognition Lecture 3: Pattern Classification 1 2 3 4 5 The problem of classification Linear and nonlinear classifiers Probabilistic classification Gaussians, mixtures
More informationIntroduction to Signal Detection and Classification. Phani Chavali
Introduction to Signal Detection and Classification Phani Chavali Outline Detection Problem Performance Measures Receiver Operating Characteristics (ROC) F-Test - Test Linear Discriminant Analysis (LDA)
More informationHow to Deal with Multiple-Targets in Speaker Identification Systems?
How to Deal with Multiple-Targets in Speaker Identification Systems? Yaniv Zigel and Moshe Wasserblat ICE Systems Ltd., Audio Analysis Group, P.O.B. 690 Ra anana 4307, Israel yanivz@nice.com Abstract In
More informationTechnical Report. Results from 200 billion iris cross-comparisons. John Daugman. Number 635. June Computer Laboratory
Technical Report UCAM-CL-TR-635 ISSN 1476-2986 Number 635 Computer Laboratory Results from 200 billion iris cross-comparisons John Daugman June 2005 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom
More informationAnalytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System
Volume Issue 8, November 4, ISSN No.: 348 89 3 Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System Divya Singhal, Ajay Kumar Yadav M.Tech, EC Department,
More informationPramod K. Varshney. EECS Department, Syracuse University This research was sponsored by ARO grant W911NF
Pramod K. Varshney EECS Department, Syracuse University varshney@syr.edu This research was sponsored by ARO grant W911NF-09-1-0244 2 Overview of Distributed Inference U i s may be 1. Local decisions 2.
More information1 Biometric Authentication: A Copula Based Approach
1 Biometric Authentication: A Copula Based Approach Satish G. Iyengar a, Pramod K. Varshney a and Thyagaraju Damarla b a EECS Department, Syracuse University, Syracuse, NY 13244, USA b Army Research Laboratory,
More informationEstimation of Relative Operating Characteristics of Text Independent Speaker Verification
International Journal of Engineering Science Invention Volume 1 Issue 1 December. 2012 PP.18-23 Estimation of Relative Operating Characteristics of Text Independent Speaker Verification Palivela Hema 1,
More informationLikelihood Ratio in a SVM Framework: Fusing Linear and Non-Linear Face Classifiers
Likelihood Ratio in a SVM Framework: Fusing Linear and Non-Linear Face Classifiers Mayank Vatsa, Richa Singh, Arun Ross, and Afzel Noore Lane Department of Computer Science and Electrical Engineering West
More informationMultimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification
Multimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification Jugurta R. Montalvão Filho and Eduardo O. Freire Abstract Identity verification through fusion of features from keystroke dynamics
More informationLecture 3: Pattern Classification. Pattern classification
EE E68: Speech & Audio Processing & Recognition Lecture 3: Pattern Classification 3 4 5 The problem of classification Linear and nonlinear classifiers Probabilistic classification Gaussians, mitures and
More informationRobust Speaker Identification
Robust Speaker Identification by Smarajit Bose Interdisciplinary Statistical Research Unit Indian Statistical Institute, Kolkata Joint work with Amita Pal and Ayanendranath Basu Overview } } } } } } }
More informationFusion of Dependent and Independent Biometric Information Sources
Fusion of Dependent and Independent Biometric Information Sources Dongliang Huang ECE, University of Calgary Henry Leung ECE, University of Calgary Winston Li ECE, University of Calgary Department of Electrical
More informationEXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER
17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen,
More informationAutomatic Identity Verification Using Face Images
Automatic Identity Verification Using Face Images Sabry F. Saraya and John F. W. Zaki Computer & Systems Eng. Dept. Faculty of Engineering Mansoura University. Abstract This paper presents two types of
More informationISCA Archive
ISCA Archive http://www.isca-speech.org/archive ODYSSEY04 - The Speaker and Language Recognition Workshop Toledo, Spain May 3 - June 3, 2004 Analysis of Multitarget Detection for Speaker and Language Recognition*
More informationSUBJECTIVE EVALUATION OF IMAGE UNDERSTANDING RESULTS
18th European Signal Processing Conference (EUSIPCO-2010) Aalborg, Denmark, August 23-27, 2010 SUBJECTIVE EVALUATION OF IMAGE UNDERSTANDING RESULTS Baptiste Hemery 1, Hélène Laurent 2, and Christophe Rosenberger
More informationUsually the estimation of the partition function is intractable and it becomes exponentially hard when the complexity of the model increases. However,
Odyssey 2012 The Speaker and Language Recognition Workshop 25-28 June 2012, Singapore First attempt of Boltzmann Machines for Speaker Verification Mohammed Senoussaoui 1,2, Najim Dehak 3, Patrick Kenny
More informationAutomated Statistical Recognition of Partial Discharges in Insulation Systems.
Automated Statistical Recognition of Partial Discharges in Insulation Systems. Massih-Reza AMINI, Patrick GALLINARI, Florence d ALCHE-BUC LIP6, Université Paris 6, 4 Place Jussieu, F-75252 Paris cedex
More informationECE521 Lecture7. Logistic Regression
ECE521 Lecture7 Logistic Regression Outline Review of decision theory Logistic regression A single neuron Multi-class classification 2 Outline Decision theory is conceptually easy and computationally hard
More informationBayesian decision making
Bayesian decision making Václav Hlaváč Czech Technical University in Prague Czech Institute of Informatics, Robotics and Cybernetics 166 36 Prague 6, Jugoslávských partyzánů 1580/3, Czech Republic http://people.ciirc.cvut.cz/hlavac,
More informationMachine Learning (CS 567) Lecture 2
Machine Learning (CS 567) Lecture 2 Time: T-Th 5:00pm - 6:20pm Location: GFS118 Instructor: Sofus A. Macskassy (macskass@usc.edu) Office: SAL 216 Office hours: by appointment Teaching assistant: Cheol
More informationLogistic Regression. Machine Learning Fall 2018
Logistic Regression Machine Learning Fall 2018 1 Where are e? We have seen the folloing ideas Linear models Learning as loss minimization Bayesian learning criteria (MAP and MLE estimation) The Naïve Bayes
More informationMultivariate statistical methods and data mining in particle physics
Multivariate statistical methods and data mining in particle physics RHUL Physics www.pp.rhul.ac.uk/~cowan Academic Training Lectures CERN 16 19 June, 2008 1 Outline Statement of the problem Some general
More informationSelection of Classifiers based on Multiple Classifier Behaviour
Selection of Classifiers based on Multiple Classifier Behaviour Giorgio Giacinto, Fabio Roli, and Giorgio Fumera Dept. of Electrical and Electronic Eng. - University of Cagliari Piazza d Armi, 09123 Cagliari,
More informationKernel Based Text-Independnent Speaker Verification
12 Kernel Based Text-Independnent Speaker Verification Johnny Mariéthoz 1, Yves Grandvalet 1 and Samy Bengio 2 1 IDIAP Research Institute, Martigny, Switzerland 2 Google Inc., Mountain View, CA, USA The
More informationDynamic Data Modeling, Recognition, and Synthesis. Rui Zhao Thesis Defense Advisor: Professor Qiang Ji
Dynamic Data Modeling, Recognition, and Synthesis Rui Zhao Thesis Defense Advisor: Professor Qiang Ji Contents Introduction Related Work Dynamic Data Modeling & Analysis Temporal localization Insufficient
More informationEnsemble Methods. NLP ML Web! Fall 2013! Andrew Rosenberg! TA/Grader: David Guy Brizan
Ensemble Methods NLP ML Web! Fall 2013! Andrew Rosenberg! TA/Grader: David Guy Brizan How do you make a decision? What do you want for lunch today?! What did you have last night?! What are your favorite
More informationBayesian Decision Theory
Introduction to Pattern Recognition [ Part 4 ] Mahdi Vasighi Remarks It is quite common to assume that the data in each class are adequately described by a Gaussian distribution. Bayesian classifier is
More informationTwo-Layered Face Detection System using Evolutionary Algorithm
Two-Layered Face Detection System using Evolutionary Algorithm Jun-Su Jang Jong-Hwan Kim Dept. of Electrical Engineering and Computer Science, Korea Advanced Institute of Science and Technology (KAIST),
More informationLikelihood Ratio-Based Biometric Verification
Likelihood Ratio-Based Biometric Verification Asker M. Bazen and Raymond N.J. Veldhuis University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 27, 75 AE
More informationEstimation and sample size calculations for correlated binary error rates of biometric identification devices
Estimation and sample size calculations for correlated binary error rates of biometric identification devices Michael E. Schuckers,11 Valentine Hall, Department of Mathematics Saint Lawrence University,
More informationPredicting large population data cumulative match characteristic performance from small population data
Predicting large population data cumulative match characteristic performance from small population data Amos Y. Johnson, Jie Sun, and Aaron F. Bobick GVU Center / College of Computing Georgia Tech, Atlanta,
More informationSensitivity of the Elucidative Fusion System to the Choice of the Underlying Similarity Metric
Sensitivity of the Elucidative Fusion System to the Choice of the Underlying Similarity Metric Belur V. Dasarathy Dynetics, Inc., P. O. Box 5500 Huntsville, AL. 35814-5500, USA Belur.d@dynetics.com Abstract
More informationClassification and Pattern Recognition
Classification and Pattern Recognition Léon Bottou NEC Labs America COS 424 2/23/2010 The machine learning mix and match Goals Representation Capacity Control Operational Considerations Computational Considerations
More informationTheoretical Statistical Correlation for Biometric Identification Performance
Theoretical Statistical Correlation for Biometric Identification Performance Michael E. Schuckers schuckers@stlawu.edu Theoretical Statistical Correlation for Biometric Identification Performance p. 1/20
More informationMachine Learning Linear Classification. Prof. Matteo Matteucci
Machine Learning Linear Classification Prof. Matteo Matteucci Recall from the first lecture 2 X R p Regression Y R Continuous Output X R p Y {Ω 0, Ω 1,, Ω K } Classification Discrete Output X R p Y (X)
More informationSignificance Tests for Bizarre Measures in 2-Class Classification Tasks
R E S E A R C H R E P O R T I D I A P Significance Tests for Bizarre Measures in 2-Class Classification Tasks Mikaela Keller 1 Johnny Mariéthoz 2 Samy Bengio 3 IDIAP RR 04-34 October 4, 2004 D a l l e
More informationPredictive analysis on Multivariate, Time Series datasets using Shapelets
1 Predictive analysis on Multivariate, Time Series datasets using Shapelets Hemal Thakkar Department of Computer Science, Stanford University hemal@stanford.edu hemal.tt@gmail.com Abstract Multivariate,
More informationLinear Combiners for Fusion of Pattern Classifiers
International Summer School on eural ets duardo R. Caianiello" SMBL MTHODS FOR LARIG MACHIS Vietri sul Mare(Salerno) ITALY 22-28 September 2002 Linear Combiners for Fusion of Pattern Classifiers Lecturer
More informationCorrespondence. The Effect of Correlation and Performances of Base-Experts on Score Fusion
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS 1 Correspondence The Effect of Correlation and Performances of Base-Experts on Score Fusion Yishu Liu, Lihua Yang, and Ching Y. Suen Abstract
More informationMachine Learning Basics Lecture 7: Multiclass Classification. Princeton University COS 495 Instructor: Yingyu Liang
Machine Learning Basics Lecture 7: Multiclass Classification Princeton University COS 495 Instructor: Yingyu Liang Example: image classification indoor Indoor outdoor Example: image classification (multiclass)
More informationData Mining: Concepts and Techniques. (3 rd ed.) Chapter 8. Chapter 8. Classification: Basic Concepts
Data Mining: Concepts and Techniques (3 rd ed.) Chapter 8 1 Chapter 8. Classification: Basic Concepts Classification: Basic Concepts Decision Tree Induction Bayes Classification Methods Rule-Based Classification
More informationBiometric scores fusion based on total error rate minimization
Pattern Recognition 4 (28) 66 82 www.elsevier.com/locate/pr Biometric scores fusion based on total error rate minimization Kar-Ann Toh, Jaihie Kim, Sangyoun Lee Biometrics Engineering Research Center,
More informationA Unified Bayesian Framework for Face Recognition
Appears in the IEEE Signal Processing Society International Conference on Image Processing, ICIP, October 4-7,, Chicago, Illinois, USA A Unified Bayesian Framework for Face Recognition Chengjun Liu and
More informationA Modified Incremental Principal Component Analysis for On-Line Learning of Feature Space and Classifier
A Modified Incremental Principal Component Analysis for On-Line Learning of Feature Space and Classifier Seiichi Ozawa 1, Shaoning Pang 2, and Nikola Kasabov 2 1 Graduate School of Science and Technology,
More informationOn the Individuality of Fingerprints: Models and Methods
On the Individuality of Fingerprints: Models and Methods Dass, S., Pankanti, S., Prabhakar, S., and Zhu, Y. Abstract Fingerprint individuality is the study of the extent of uniqueness of fingerprints and
More informationSpeaker recognition by means of Deep Belief Networks
Speaker recognition by means of Deep Belief Networks Vasileios Vasilakakis, Sandro Cumani, Pietro Laface, Politecnico di Torino, Italy {first.lastname}@polito.it 1. Abstract Most state of the art speaker
More informationMaximum Likelihood, Logistic Regression, and Stochastic Gradient Training
Maximum Likelihood, Logistic Regression, and Stochastic Gradient Training Charles Elkan elkan@cs.ucsd.edu January 17, 2013 1 Principle of maximum likelihood Consider a family of probability distributions
More informationMultiple Similarities Based Kernel Subspace Learning for Image Classification
Multiple Similarities Based Kernel Subspace Learning for Image Classification Wang Yan, Qingshan Liu, Hanqing Lu, and Songde Ma National Laboratory of Pattern Recognition, Institute of Automation, Chinese
More informationLecture 1: Bayesian Framework Basics
Lecture 1: Bayesian Framework Basics Melih Kandemir melih.kandemir@iwr.uni-heidelberg.de April 21, 2014 What is this course about? Building Bayesian machine learning models Performing the inference of
More informationDesign of Robust Classifiers for Adversarial Environments
Design of Robust Classifiers for Adversarial Environments Battista Biggio, Giorgio Fumera, Fabio Roli Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 9123 Cagliari,
More informationA Generative Model Based Kernel for SVM Classification in Multimedia Applications
Appears in Neural Information Processing Systems, Vancouver, Canada, 2003. A Generative Model Based Kernel for SVM Classification in Multimedia Applications Pedro J. Moreno Purdy P. Ho Hewlett-Packard
More informationEngineering Part IIB: Module 4F10 Statistical Pattern Processing Lecture 6: Multi-Layer Perceptrons I
Engineering Part IIB: Module 4F10 Statistical Pattern Processing Lecture 6: Multi-Layer Perceptrons I Phil Woodland: pcw@eng.cam.ac.uk Michaelmas 2012 Engineering Part IIB: Module 4F10 Introduction In
More informationSCORE CALIBRATING FOR SPEAKER RECOGNITION BASED ON SUPPORT VECTOR MACHINES AND GAUSSIAN MIXTURE MODELS
SCORE CALIBRATING FOR SPEAKER RECOGNITION BASED ON SUPPORT VECTOR MACHINES AND GAUSSIAN MIXTURE MODELS Marcel Katz, Martin Schafföner, Sven E. Krüger, Andreas Wendemuth IESK-Cognitive Systems University
More informationTNO SRE-2008: Calibration over all trials and side-information
Image from Dr Seuss TNO SRE-2008: Calibration over all trials and side-information David van Leeuwen (TNO, ICSI) Howard Lei (ICSI), Nir Krause (PRS), Albert Strasheim (SUN) Niko Brümmer (SDV) Knowledge
More informationNaïve Bayes classification
Naïve Bayes classification 1 Probability theory Random variable: a variable whose possible values are numerical outcomes of a random phenomenon. Examples: A person s height, the outcome of a coin toss
More informationOrientation Map Based Palmprint Recognition
Orientation Map Based Palmprint Recognition (BM) 45 Orientation Map Based Palmprint Recognition B. H. Shekar, N. Harivinod bhshekar@gmail.com, harivinodn@gmail.com India, Mangalore University, Department
More informationCombining evidence in personal identity verification systems
Pattern Recognition Letters ELSEVIER Pattern Recognition Letters 18 (1997) 845-852 Combining evidence in personal identity verification systems J. Kittler *, J. Matas 1, K. Jonsson, M.U. Ramos S~nchez
More informationUnsupervised Anomaly Detection for High Dimensional Data
Unsupervised Anomaly Detection for High Dimensional Data Department of Mathematics, Rowan University. July 19th, 2013 International Workshop in Sequential Methodologies (IWSM-2013) Outline of Talk Motivation
More informationProbabilistic Graphical Models for Image Analysis - Lecture 1
Probabilistic Graphical Models for Image Analysis - Lecture 1 Alexey Gronskiy, Stefan Bauer 21 September 2018 Max Planck ETH Center for Learning Systems Overview 1. Motivation - Why Graphical Models 2.
More informationPattern Recognition and Machine Learning. Learning and Evaluation of Pattern Recognition Processes
Pattern Recognition and Machine Learning James L. Crowley ENSIMAG 3 - MMIS Fall Semester 2016 Lesson 1 5 October 2016 Learning and Evaluation of Pattern Recognition Processes Outline Notation...2 1. The
More informationComputer Vision Group Prof. Daniel Cremers. 10a. Markov Chain Monte Carlo
Group Prof. Daniel Cremers 10a. Markov Chain Monte Carlo Markov Chain Monte Carlo In high-dimensional spaces, rejection sampling and importance sampling are very inefficient An alternative is Markov Chain
More informationParameter Estimation. Industrial AI Lab.
Parameter Estimation Industrial AI Lab. Generative Model X Y w y = ω T x + ε ε~n(0, σ 2 ) σ 2 2 Maximum Likelihood Estimation (MLE) Estimate parameters θ ω, σ 2 given a generative model Given observed
More informationResearch Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization
Hindawi Publishing Corporation EURASIP Journal on Information Security Volume, Article ID 5436, 6 pages doi:.55//5436 Research Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization
More informationAnomaly Detection. Jing Gao. SUNY Buffalo
Anomaly Detection Jing Gao SUNY Buffalo 1 Anomaly Detection Anomalies the set of objects are considerably dissimilar from the remainder of the data occur relatively infrequently when they do occur, their
More informationClick Prediction and Preference Ranking of RSS Feeds
Click Prediction and Preference Ranking of RSS Feeds 1 Introduction December 11, 2009 Steven Wu RSS (Really Simple Syndication) is a family of data formats used to publish frequently updated works. RSS
More informationUniversität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Bayesian Learning. Tobias Scheffer, Niels Landwehr
Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen Bayesian Learning Tobias Scheffer, Niels Landwehr Remember: Normal Distribution Distribution over x. Density function with parameters
More informationPerformance Comparison of K-Means and Expectation Maximization with Gaussian Mixture Models for Clustering EE6540 Final Project
Performance Comparison of K-Means and Expectation Maximization with Gaussian Mixture Models for Clustering EE6540 Final Project Devin Cornell & Sushruth Sastry May 2015 1 Abstract In this article, we explore
More information