Skip to main content

Combining Verification Decisions in a Multi-vendor Environment

  • Conference paper
Audio- and Video-Based Biometric Person Authentication (AVBPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 3546))

  • 2290 Accesses

Abstract

Building access control represents an important application for biometric verification but often requires greater accuracy than can be provided by a single verifier. Even as algorithms continue to improve, poor samples and environmental factors will continue to impact performance in the building environment. We aim to improve verification accuracy by combining decisions from multiple verifiers spread throughout a building. In particular, we combine verifiers along the path traced out by each subject. When combining these decisions, the assumption of conditional independence simplifies implementation but can potentially lead to suboptimal performance. Through empirical evaluation of two related algorithms, we show that the assumption of conditional independence does not significantly impact verification accuracy. We argue that such a small reduction in accuracy can be attributed to the relative accuracy of each verifier. As a result, decisions can be combined using low complexity fusion rules without concerns of degraded accuracy.

This work has been supported in part by the National Institute of Standards and Technology (NIST) Building and Fire Research Laboratory

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kittler, J., Messer, K.: Fusion of multiple experts in multimodal biometric personal identity verification systems. In: Proc. 12th IEEE Workshop on Neural Networks for Signal Processing, pp. 3–12 (2002)

    Google Scholar 

  2. Ben-Yacoub, S.: Multi-modal data fusion for person authentication using SVM. In: Proc. of the Second International Conference on Audio- and Video-based Biometric Person Authentication (AVBPA 1999), pp. 25–30 (1999)

    Google Scholar 

  3. Hong, L., Jain, A.: Integrating faces and fingerprints for personal identification. IEEE Trans. on Pattern Analysis and Machine Intelligence 20, 1295–1307 (1998)

    Article  Google Scholar 

  4. Ross, A., Jain, A.: Information fusion in biometrics. Pattern Recognition Letters 24, 2115–2125 (2003)

    Article  Google Scholar 

  5. Beattie, M., Kumar, B.V.K., Vijaya, L.S., Tonguz, O.: Building access control using coordinated biometric verification. In: Biometrics: Challenges arising from Theory to Practice (BCTP) Workshop, Proceedings (2004)

    Google Scholar 

  6. Domingos, P., Pazzani, M.: On the optimality of the simple bayesian classifier under zero-one loss. Machine Learning 29, 103–130 (1997)

    Article  MATH  Google Scholar 

  7. Luettin, J., Maitre., G.: Evaluation protocol for the extended M2VTS database (XM2VTSDB). Technical Report IDIAP-COM 05, Dalle Molle Institute for Perceptual Artificial Intelligence, IDIAP (1998)

    Google Scholar 

  8. Matas, J., et al.: Comparison of face verification results on the XM2VTS database. In: Proceedings of 15th International Conference on Pattern Recognition, vol. 4, pp. 858–863 (2000)

    Google Scholar 

  9. Kuncheva, L.I., Ten, C.W.: measures of diversity in classifier ensembles: limits for two classifiers. In: A DERA/IEE Workshop on Intelligent Sensor Processing (2001)

    Google Scholar 

  10. Chang, C., Lin, C.: LIBSVM: a library for support vector machines (2001), Software available at http://www.csie.ntu.edu.tw/cjlin/libsvm

  11. Bailly-Bailliere, E., et al.: The BANCA database and evaluation protocol. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, Springer, Heidelberg (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beattie, M., Kumar, B.V.K.V., Lucey, S., Tonguz, O.K. (2005). Combining Verification Decisions in a Multi-vendor Environment. In: Kanade, T., Jain, A., Ratha, N.K. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2005. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527923_42

Download citation

  • DOI: https://doi.org/10.1007/11527923_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27887-0

  • Online ISBN: 978-3-540-31638-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics