12.07.2015 Views

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

532 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 3, MAY 2010TABLE IEER (IN PERCENTS) FOR DIFFERENT HMM CONFIGURATIONSCONSIDERING SKILLED FORGERIES, IN UNPROTECTEDAND PROTECTED SYSTEMS (E = 10)Fig. 3. ROC curves <strong>for</strong> an unprotected system, and <strong>for</strong> protected systems<strong>with</strong> W =2, 3, and 4 convolved segments, considering skilled <strong>for</strong>geriesand E =10.c) per<strong>for</strong>mance comparison between the baseline approachdescribed in Section III-A and the extendedmethods in Section III-B;2) Renewabilitya) evaluation of the diversity between two templatesoriginated by applying two different trans<strong>for</strong>mationson the same original data. The analysis is conducted<strong>for</strong> the baseline approach described in Section III-A,as well as <strong>for</strong> the extended methods in Section III-B.The per<strong>for</strong>mance analysis is detailed in Section VIII, whilethe renewability capabilities of the proposed protection methodsare presented in Section IX.VIII. AUTHENTICATION PERFORMANCE ANALYSISThe authentication per<strong>for</strong>mances achievable <strong>with</strong> the proposedprotected on-line signature protection methods are herediscussed. The system per<strong>for</strong>mances are evaluated through thefalse rejection rate (FRR), the false acceptance rate (FAR)<strong>for</strong> skilled <strong>for</strong>geries (FAR SF ), the FAR <strong>for</strong> random <strong>for</strong>geries(FAR RF ), and the equal error rate (EER). These figures of meritare obtained by considering, <strong>for</strong> each user in the enrollmentstage, E =10signatures taken from the first two acquisitionsets of MCYT. The FRR is estimated on the basis of thesignatures belonging to the third, fourth, and fifth availableacquisition sets. The FAR SF is computed by using the 25 skilled<strong>for</strong>geries available <strong>for</strong> each user. The FAR RF is computed bytaking, <strong>for</strong> each user, one signature from each of the remainingusers.A. Dependence on the HMM ParametersWithin the described experimental setup, the dependenceof the authentication per<strong>for</strong>mances on the HMM parametersis first discussed. Specifically, the EERs obtained by varyingthe HMM parameters H and M, considering skilled <strong>for</strong>geries,are summarized in Table I, <strong>for</strong> both unprotected systems and<strong>for</strong> protected systems employing the baseline approach describedin Section III-A, <strong>with</strong> W ∈{2, 3, 4}. Specifically, thevalues of H reported in Table I are H ∈{8, 16}, since thebest recognition rates are achieved when using, <strong>for</strong> the HMMmodelization, a number of states comprised between 8 and 16,as observed in [5] and [10]. When employing the proposedbaseline protection approach, the key vector d is randomlyselected <strong>for</strong> each considered user, taking the values d j ,j =1,...,W − 1, in the range of integers [5, 95]. As described in[34], this reflects how the protected system should be used ina practical implementation, where different trans<strong>for</strong>mations aretypically used <strong>for</strong> different individuals.The best EERs achievable <strong>for</strong> each configuration (unprotectedand protected systems) are highlighted in Table I andare employed to select the best HMM configurations, which areconsidered in the following to illustrate the per<strong>for</strong>mances of theproposed approaches. Specifically, the selected configurationsare as follows:1) unprotected approach: H =16 and M =4 (EER SF =6.33%);2) baseline protected approach, <strong>with</strong> W =2: H =8 andM =8(EER SF =7.95%);3) baseline protected approach, <strong>with</strong> W =3: H =8 andM =4(EER SF =11.84%);4) baseline protected approach, <strong>with</strong> W =4: H =8 andM =2(EER SF =15.40%).The receiver operating characteristic (ROC) curves related tothe best authentication rates, achievable using the a<strong>for</strong>ementionedselected configurations, are shown in Fig. 3. From thesketched ROC curves and from the results in Table I, it can beseen that the recognition per<strong>for</strong>mances <strong>for</strong> protected systemsworsen when the number W of segments in which the signaturesare segmented increases. The loss in per<strong>for</strong>mance canbe explained as follows. The segmentation of the consideredsignature time sequences is accomplished by using a set of fixedparameters d j ,j =1,...,W − 1. They express, in terms of thepercentage of the total sequence length, the points where thesegmentation has to be done. However, due to the characteristicsof signature biometrics, sequences extracted from differentAuthorized licensed use limited to: Univ Autonoma de Madrid. Downloaded on May 06,2010 at 15:31:46 UTC from IEEE Xplore. Restrictions apply.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!