Abstract
This paper presents a tool, named BioEVA, to apply two forms of evaluation processes in biometric algorithms: comparative and qualitative. BioEVA has an internal engine that implements some metrics that we called quality parameters. We define some simple submission rules (protocol) must be followed before to submit a biometric algorithm to BioEVA’s evaluation. The tool receives a biometric algorithm as a ”black-box” and performs its automated evaluation. Using BioEVA, three biometric algorithms were evaluated: two based on static signatures and one based on keystroke dynamics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Maio, D., Maltoni, D., Cappeli, R., Wayman, J.L., Jain, A.K.: FVC2002: Second Fingerprint Verification Competition. In: Proc. of Int. Conf. on Pattern Recognition, Quebec City (2002)
Sucupira Jr., L.H., Araújo, L.C.F., Lizárraga, M.G., Ling, L.L.: Evaluating Biometric Software Packages using a Practioners Methodology. In: Proc. of ISCA 16th Int. Conference on Computer Applications in Industry and Engineering (CAINE 2003), USA, pp. 310–313 (2003)
Wirtz, B.: Average Prototypes for stroke-based signature verification. In: ICDAR 1997, Germany, vol. 1, pp. 268–272 (1997)
Lee, L.L., Lizárraga, M.G.: Off-line methods for human signature verification. In: Proceedings of IASTED International Conference on Signal and Image Processing SIP- 1996, USA (1996)
Lizárraga, M.G.: Um Sistema Biométrico de Identificação Pessoal via Internet com ênfase em Assinaturas Estáticas. Doctorade Thesis, UNICAMP (August 2000)
Plamondon, R., Srihari, S.N.: On-Line and Off-Line Handwriting Recognition: Compreensive Survey. IEEE Trans. Patt. Anal. Mach. Intell. 22(1), 63–84 (2000)
Joyce, R., Gupta, G.: Identity authorization based on keystroke latencies. Communications of the ACM 33(2), 168–176 (1990)
De Ru, W.G., Eloff, J.H.P.: Enhanced Password Authentication through Fuzzy Logic. IEEE Expert / Intelligent Systems & Their Applications 17(6), 38–45 (1997)
Robinson, J.A., Liang, V.M., Michael, J.A.: Computer User Verification Login String Keystroke Dynamics. IEEE Trans. Syst., Man, Cybern. 28(2), 236–241 (1998)
Lin, D.T.: Computer-Access Authentication with Neural Network Based on Keystroke Identity Verification. International Conference on Neural Networks 1, 174–178 (1997)
Bleha, S., Slivinsky, C., Hussain, B.: Computer-Access Security Systems Using Keystroke Dynamics. IEEE Trans. Pattern Anal. Machine Intell. 12(12), 1217–1222 (1990)
Haidar, S., Abbas, A., Zaidi, A.K.: A Multi-Technique Approach for User Identification through Keystroke Dynamics. IEEE Int. Conf Syst.,Man Cybern. 2, 1336–1341 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
H. R. Sucupira, L., Araújo, L.C.F., Lizárraga, M.G., Ling, L.L. (2004). BioEVA: An Evaluation Tool for Biometric Algorithms. In: Zhang, D., Jain, A.K. (eds) Biometric Authentication. ICBA 2004. Lecture Notes in Computer Science, vol 3072. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25948-0_97
Download citation
DOI: https://doi.org/10.1007/978-3-540-25948-0_97
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22146-3
Online ISBN: 978-3-540-25948-0
eBook Packages: Springer Book Archive