13.07.2015 Views

FACIAL SOFT BIOMETRICS - Library of Ph.D. Theses | EURASIP

FACIAL SOFT BIOMETRICS - Library of Ph.D. Theses | EURASIP

FACIAL SOFT BIOMETRICS - Library of Ph.D. Theses | EURASIP

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

97scared <strong>of</strong> their PIN being spying. Regarding face and s<strong>of</strong>t biometrics, two users reported not to befully comfortable to be captured by a camera in front <strong>of</strong> colleagues. It is interesting to comparethe two scenarios (see Figure 8.3 with Figure 8.4), where the task was basically the same, given adifferent environment. The ratings though are partly significantly different (see FP and PIN).Figure 8.4: User preference <strong>of</strong> access methods in crowded environment: MOS and confidenceintervals for a confidence <strong>of</strong> 0.95.8.2.3 Time to Acquire, Ease <strong>of</strong> Use and Data SecurityTo evaluate statistical significance <strong>of</strong> the differences between the access methods, we performedadditionally Wilcoxon tests [Sie56], due to the relatively small sample size. Hence weasked users to rank the four access methods (1 to 4, 1 being the number one) in terms <strong>of</strong> speed,ease to access and data security. For the following graphs, the smaller the bars are the better theaccess method was ranked.Figure 8.5: User comparison <strong>of</strong> presented access methods in terms <strong>of</strong> speed, simplicity and datasecurity: MOS and standard deviation. Small bars represent high rankings.In terms <strong>of</strong> acquisition time and simplicity s<strong>of</strong>t biometrics were ranked significantly better thanthe other methods. In respect to privacy, users were made aware that their data, in particular faceimage, list <strong>of</strong> s<strong>of</strong>t features, PIN and fingerprint, would be stored on a database. This data can beon the one hand misused by operators, and on the other hand hacked. Users felt most comfortablewith providing both, PIN or a s<strong>of</strong>t biometrics based list for storage on a database. Users wereambiguous about which they found is the riskiest trait to give away, fingerprint or a face image.8.2.4 Ranking <strong>of</strong> favorite access methodsThe last question regarded the overall satisfaction <strong>of</strong> the methods. Users named in this contextdifferent priorities. On the one hand privacy preservation was named by three users as justificationfor their ranking, on the other hand the easiness <strong>of</strong> use. The results on this ranking are displayed in

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!