Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications

被引:30
作者
Eastwood, Shawn C. [1 ]
Shmerko, V. P. [1 ]
Yanushkevich, S. N. [1 ]
Drahansky, M. [2 ]
Gorodnichy, D. O. [3 ]
机构
[1] Univ Calgary, Dept Elect & Comp Engn, Biometr Technol Lab, Calgary, AB T2N 1N4, Canada
[2] Brno Univ Technol, Dept Intelligent Syst, Brno 60190, Czech Republic
[3] Canada Border Serv Agcy, Sci & Engn Directorate, Edmonton, AB T5J 2T2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Authentication machine; biometrics; e-border; e-training; human-machine interaction; risk assessment; SITUATIONAL AWARENESS; AGENTS;
D O I
10.1109/THMS.2015.2412944
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper revisits the concept of an authentication machine (A-machine) that aims at identifying/verifying humans. Although A-machines in the closed-set application scenario are well understood and commonly used for access control utilizing human biometrics (face, iris, and fingerprints), open-set applications of A-machines have yet to be equally characterized. This paper presents an analysis and taxonomy of A-machines, trends, and challenges of open-set real-world applications. This paper makes the following contributions to the area of open-set A-machines: 1) a survey of applications; 2) new novel life cycle metrics for theoretical, predicted, and operational performance evaluation; 3) a new concept of evidence accumulation for risk assessment; 4) new criteria for the comparison of A-machines based on the notion of a supporting assistant; and 5) a new approach to border personnel training based on the A-machine training mode. It offers a technique for modeling A-machines using belief (Bayesian) networks and provides an example of this technique for biometric-based e-profiling.
引用
收藏
页码:231 / 242
页数:12
相关论文
共 93 条
[71]  
Nuppeney M., 2014, AUTOMATED BORDER CON
[72]  
Palmer A. J., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P311, DOI 10.1109/EISIC.2012.31
[73]   User evaluation: Synthetic talking faces for interactive services [J].
Pandzic, IS ;
Ostermann, J ;
Millen, D .
VISUAL COMPUTER, 1999, 15 (7-8) :330-340
[74]  
Pato J.N., 2010, Biometric recognition: Challenges and opportunities, V1st
[75]   Thermal image analysis for polygraph testing [J].
Pavlidis, I ;
Levine, J .
IEEE ENGINEERING IN MEDICINE AND BIOLOGY MAGAZINE, 2002, 21 (06) :56-64
[76]   Haboe KAIST robot theatre: Learning rules of interactive robot behavior as a multiple-valued logic synthesis problem [J].
Perkowski, M ;
Sasao, T ;
Kim, JH ;
Lukac, M ;
Allen, J ;
Gebauer, S .
35TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC, PROCEEDINGS, 2005, :236-248
[77]  
Poole Jr R. W., 2003, 308 REAS FDN, V308
[78]   Facial biometrics for situational awareness systems [J].
Poursaberi, Ahmad ;
Vana, Jan ;
Mracek, Stepan ;
Dvora, Radim ;
Yanushkevich, Svetlana N. ;
Drahansky, Martin ;
Shmerko, Vlad P. ;
Gavrilova, Marina L. .
IET BIOMETRICS, 2013, 2 (02) :35-47
[79]   Situational Awareness through Biometrics [J].
Poursaberi, Ahmad ;
Yanushkevich, Svetlana ;
Gavrilova, Marina L. ;
Shmerko, Vlad P. ;
Wang, Patrick S. P. .
COMPUTER, 2013, 46 (05) :102-104
[80]  
Rausand M, 2011, STAT PRACT, P1, DOI 10.1002/9781118281116