This paper discusses the implementation issues of installing a commercially available hand geometry system in the current infrastructure of Purdue University's Recreational Sports Center. In addition to a performance analysis of the system, a pre- and post- data collection survey was distributed to the 129 test subjects gathering information on perceptions of biometrics, in particular hand geometry, as well as participants' thoughts and feelings during their interaction with the hand geometry device. The results of the survey suggest that participants were accepting of hand geometry. Additionally, analyses of the participants' survey responses revealed that 93% liked using hand geometry, 98% thought it was easy to use, and 87% preferred it to the existing card-based system, while nobody thought the device invaded their personal privacy. System performance achieved a 3-try match rate of 99.02% (FRR 0.98%) when "gaming"/potential impostor attempts were removed from analysis. The failure to enroll rate was zero. Statistical analyses exposed a significant difference in the scores of attempts made by users with prior hand geometry usage, and subjects that could not straighten out their hand on the device. However, there were no statistical difference in the effects of rings/no rings, improper hand placements/proper hand placements, or gender on hand geometry score.
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics
Role of fuzzy in multimodal biometrics systemKishor Singh
Person identification is possible through the biometrics using their physiological and behavioral characteristics such
as face, ear, thumb print, voice, signature and key stock. Unimodal biometric systems face a range of problems, including noisy
data, intra-class versions, small liberty, non-university, spoof assaults, and unsustainable error rates. Some of these drawbacks
can be overcome by multimodal biometric technologies, which incorporate data from various information sources. In this paper
we work on multimodal biometric using three modalities face, ear and foot to find the optimal results using fuzzy fusion
mechanism and produces final identification decision via a fuzzy rules that enhance the quality of multimodalities biometric
system.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
The Artificial Intelligence approach is used for Iris recognition by understanding the distinctive and measurable characteristics of the human body such as a person’s face, iris, DNA, fingerprints, etc. AI methods analyzed the attributes like iris images. Privacy and Security being a major concern nowadays, Recognition Technique can find numerous applications.
Biometrics is the science and technology of
measuring and analyzing biological data. In information
technology, biometrics refers to technologies that measure and
analyze human body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial patterns and hand
measurements, for authentication purposes. This paper is about
the applications of biometric especially in the field of healthcare
and its future uses
Research has shown for some age groups, quality of fingerprints can impact the performance of biometric systems. A
desirable feature of biometrics is that they are suitable for use across the population. This applied study examines the performance of a fingerprint recognition system in a healthcare environment. Anecdotal evidence suggested front line healthcare workers may have lower image quality due to continued hand washing which may remove oils from their skin. During training, individuals are told to add oil to their fingers by wiping oil from their foreheads to improve the resulting quality of the
fingerprints. In the healthcare population the authors tested, compared to two general populations (collected on optical and
capacitance sensors) there was a significant difference in skin oiliness, but not in image quality. There was a difference across
healthcare and non-healthcare groups in the performance of the fingerprint algorithm when compared against the capacitance dataset.
ENGINEERING STANDARDS AND REQUIREMENTS FOR RADIATION PROTECTION IN DESIGN OF ...IAEME Publication
The aim of this study is directed to the application of engineering standards and requirements in the design of diagnostic and/or radiation therapy units. These requirements shall be fulfilled by the architectural perspective for the protection of workers and patients without unduly limiting the beneficial practices of radiation exposure. Therefore, the different functions of ionizing radiation units must be integrated with engineering elements in specialized treatment diagnosis. The study reveals deficiencies in some analytical cases. The weakness of radiation safety in the design is evaluated compared with standard requirements. According to the engineering requirements and standards the different elements and functions in these units are rearranged.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Eye tracking system has played a significant role in many of today’s applications ranging from military
applications to automotive industries and healthcare sectors. In this paper, a novel system for eye tracking and
estimation of its direction of movement is performed. The proposed system is implemented in real time using an
arduino uno microcontroller and a zigbee wireless device. Experimental results show a successful eye tracking and
movement estimation in real time scenario using the proposed hardware interface.
Role of fuzzy in multimodal biometrics systemKishor Singh
Person identification is possible through the biometrics using their physiological and behavioral characteristics such
as face, ear, thumb print, voice, signature and key stock. Unimodal biometric systems face a range of problems, including noisy
data, intra-class versions, small liberty, non-university, spoof assaults, and unsustainable error rates. Some of these drawbacks
can be overcome by multimodal biometric technologies, which incorporate data from various information sources. In this paper
we work on multimodal biometric using three modalities face, ear and foot to find the optimal results using fuzzy fusion
mechanism and produces final identification decision via a fuzzy rules that enhance the quality of multimodalities biometric
system.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
The Artificial Intelligence approach is used for Iris recognition by understanding the distinctive and measurable characteristics of the human body such as a person’s face, iris, DNA, fingerprints, etc. AI methods analyzed the attributes like iris images. Privacy and Security being a major concern nowadays, Recognition Technique can find numerous applications.
Biometrics is the science and technology of
measuring and analyzing biological data. In information
technology, biometrics refers to technologies that measure and
analyze human body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial patterns and hand
measurements, for authentication purposes. This paper is about
the applications of biometric especially in the field of healthcare
and its future uses
Research has shown for some age groups, quality of fingerprints can impact the performance of biometric systems. A
desirable feature of biometrics is that they are suitable for use across the population. This applied study examines the performance of a fingerprint recognition system in a healthcare environment. Anecdotal evidence suggested front line healthcare workers may have lower image quality due to continued hand washing which may remove oils from their skin. During training, individuals are told to add oil to their fingers by wiping oil from their foreheads to improve the resulting quality of the
fingerprints. In the healthcare population the authors tested, compared to two general populations (collected on optical and
capacitance sensors) there was a significant difference in skin oiliness, but not in image quality. There was a difference across
healthcare and non-healthcare groups in the performance of the fingerprint algorithm when compared against the capacitance dataset.
ENGINEERING STANDARDS AND REQUIREMENTS FOR RADIATION PROTECTION IN DESIGN OF ...IAEME Publication
The aim of this study is directed to the application of engineering standards and requirements in the design of diagnostic and/or radiation therapy units. These requirements shall be fulfilled by the architectural perspective for the protection of workers and patients without unduly limiting the beneficial practices of radiation exposure. Therefore, the different functions of ionizing radiation units must be integrated with engineering elements in specialized treatment diagnosis. The study reveals deficiencies in some analytical cases. The weakness of radiation safety in the design is evaluated compared with standard requirements. According to the engineering requirements and standards the different elements and functions in these units are rearranged.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Eye tracking system has played a significant role in many of today’s applications ranging from military
applications to automotive industries and healthcare sectors. In this paper, a novel system for eye tracking and
estimation of its direction of movement is performed. The proposed system is implemented in real time using an
arduino uno microcontroller and a zigbee wireless device. Experimental results show a successful eye tracking and
movement estimation in real time scenario using the proposed hardware interface.
Face Recognition Based Automated Student Attendance Systemijtsrd
Face recognition system is very beneficial in real time applications, concentrated in security control systems. Face Detection and Recognition is a vital area in the province of validation. In this project, the Open CV based face recognition strategy has been proposed. This model integrates a camera that captures an input image, an algorithm Haar Cascade Algorithm for detecting face from an input image, identifying the face and marking the attendance in an excel sheet. The proposed system implements features such as detection of faces, extraction of the features, exposure of extracted features, analysis of students attendance, and monthly attendance report generation. Faces are recognized using advanced LBP using the database that contains images of students and is used to identify students using the captured image. Better precision is accomplished in results and the system takes into account the changes that occurs in the face over some time. Ms. Pranitha Prabhakar | Mr. Kathireshan "Face Recognition Based Automated Student Attendance System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38083.pdf Paper URL : https://www.ijtsrd.com/computer-science/other/38083/face-recognition-based-automated-student-attendance-system/ms-pranitha-prabhakar
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEJournal For Research
Until today, most lecturers in universities are found still using the conventional methods of taking students attendance either by calling out the student names or by passing around an attendance sheet for students to sign confirming their presence.This project is absolutely on the android-based attendance management system. Android based attendance system provides efficient means of determining eligibility criteria for students to meet examination requirements. [1] The core idea of research project is to implement Android based application for attendance management system for advancement of institution and educational system [2]. This system enables student to learn anywhere, anytime and at their own convenience. This system makes students to be active, responsive while learning their academic. Another application that is provided by this system is smart attendance evaluation and report generation. [2]This makes the work even easier for the lecturers. Also there is a separate module for analyzing the results of the test exams of the students. There is a certain criterion to be met for each and every student to appearing for the test exam. The main objective of this paper is to provide an overview on the data mining techniques that have been used to predict students performance. [3]A certain action can be taken on students not fulfilling the criteria. This process basically aims at improving the overall student performance by taking into consideration student attendance and test marks.
Increasingly sophisticated biometric methods are being used for a
variety of applications in which accurate authentication of people is necessary.
Because all biometric methods require humans to interact with a device of some
type, effective implementation requires consideration of human factors issues.
One such issue is the training needed to use a particular device appropriately.
In this paper, we review human factors issues in general that are associated with
biometric devices and focus more specifically on the role of training.
Similar to (2005) Implementation of Hand Geometry at Purdue University's Recreational Center: An Analysis of User Perspectives and System Performance (20)
This research focused on classifying Human-Biometric Sensor Interaction errors in real-time. The Kinect 2 was used as a measuring device to track the position and movements of the subject through a simulated border control environment. Knowing, in detail, the state of the subject ensures that the human element of the HBSI model is analyzed accurately. A network connection was established with the iris device to know the state of the sensor and biometric system elements of the model. Information such as detection rate, extraction rate, quality, capture type, and more metrics was available for use in classifying HBSI errors. A Federal Inspection Station (FIS) booth was constructed to simulate a U.S. border control setting in an International airport. The subjects were taken through the process of capturing iris and fingerprint samples in an immigration setting. If errors occurred, the Kinect 2 program would classify the error and saved these for further analysis.
IT 34500 is an undergraduate course offered to Purdue West Lafayette students. The course gives an introduction into biometrics and automatic identification and data capture technologies
The human signature provides a natural and publically-accepted legally-admissible method for providing authentication to a process. Automatic biometric signature systems assess both the drawn image and the temporal aspects of signature construction, providing enhanced verification rates over and above conventional outcome assessment. To enable the capture of these constructional data requires the use of specialist ‘tablet’ devices. In this paper we explore the enrolment performance using a range of common signature capture devices and investigate the reasons behind user preference. The results show that writing feedback and familiarity with conventional ‘paper and pen’ donation configurations are the primary motivation for user preference. These results inform the choice of signature device from both technical performance and user acceptance viewpoints.
The inherent differences between secret-based authentication (such as passwords and PINs) and biometric authentication have left gaps in the credibility of biometrics. These gaps are due, in large part, to the inability to adequately cross-compare the two types of authentication. This paper provides a comparison between the two types of authentication by equating biometric entropy in the same way entropy of secrets are represented. Similar to the method used by Ratha, Connell, and Bolle [1], the x and y dimensions of the fingerprints were examined to determine all possible locations of minutiae. These locations were then examined based on the observed probability of minutiae occurring in each of the designated locations. The results of this work show statistically significant differences in the frequencies and probabilities of occurrence for minutiae location, type, and angle, across all possible minutiae locations. These components were applied to Shannon’s Information Theory [2] to determine the entropy of fingerprint biometrics, which was estimated to be equivalent to an 8.3-character, randomly chosen password
In this research, intra-visit match score stability was examined for the human iris. Scores were found to be statistically stable in this short time frame.
In this research, intra-visit match score stability was examined for the human iris. Scores were found to be statistically stable in this short time frame.
In this research, intra-visit match score stability was examined for the human iris. Scores were found to be statistically stable in this short time frame.
In this research, intra-visit match score stability was examined for the human iris. Scores were found to be statistically stable in this short time frame.
A lot of work done in Center recently has focused around different topics concerning "time". Iris stability across different "times" has been in the forefront due to work in the undergraduate class, IT345, the graduate class IT545, as well as work in Ben Petry's thesis. Of course "time" is a fairly inaccurate word to use. Assessing stability over time is very ambiguous to the research question. For example time may mean millisecond, months, years, or even life of the user. Upon further examination of other academic literature, the reporting of research duration, collection interval, and specific time frame of interest are sporadic at best and missing completely at worst. To solve this issue, the Center has created the biometric duration scale (BDS) model with associated suggested best practices for reporting time duration in biometrics.
The BDS model marries the general biometric model with HBSI model to create a logical flow of five phases: the presentation definition phase, sample phase, processing phase, and enrollment or matching phase. By tracking information through this progression such as specific subject presentations made, HBSI error, and FTE/Enrollment score (to name a few), performance within the general biometric model can be examined. The BDS model goes one step further by creating specific durations to report research specific metrics. By creating this model, outcomes that effect a yearly performance metrics can be looked at by examining monthly performance, daily performance, or even specific user presentations and how those subcomponents effect the whole system.
Additionally, best practices for the reporting of duration is also included. The reporting methodology stems from ISO 8601 and is in compliance with ISO 21920. In the common reporting structure, start date, duration, number of visits at how many intervals, and time scope of interest for the specific research are given in a logical, readily available format along with the very specific, detailed ISO 8601 methodology. The goal of creating a formal script for reporting research duration was to eliminate ambiguity and create an environment where replication and drawing parallels between research is encouraged.
The stability score index, conceptualized in 2013, was designed to address the weaknesses of the zoo menagerie and other performance metrics by quantifying the relative stability of a user from on condition to another. In this paper, the measure of interoperability is the stability score from enrolling on one sensor and verifying on multiple sensors. The results showed that like performance, individual performance were not stable across these sensors. When examining stability by sensor family (capacitance, optical and thermal) we find that capacitive as the enrollment sensor were the least stable. Both enrolling and verifying on a thermal sensor, individuals were the most stable of the three family types. With respect to interaction type, enrolling on touch and verifying on swipe was more stable than enrolling on swipe and verifying on swipe, which was an interesting finding. Individuals using the thermal sensor generated the most stable stability scores.
According to a report by Frost and Sullivan in 2007, revenues for non-AFIS fingerprint devices in notebook PC's and wireless devices is anticipated to grow from $148.5 million to $1588.0 million by 2014, a compound annual growth rate of 40.3% [1]. The AFIS market has a compound annual growth rate of 15.2% with revenues of $445.0 million in 2007. With the development of mobile applications in a number of different market segments, such as healthcare, retail, and law enforcement, this paper analyzed the performance of fingerprints of different sizes, from different sensors...
This is a preview of the databases we use in the Center. The presentation overviews our data collection GUI, data storage (datawarehouse), and our project management database. Each of these databases work together to allow us to efficiently run our operations.
More from International Center for Biometric Research (20)
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
(2005) Implementation of Hand Geometry at Purdue University's Recreational Center: An Analysis of User Perspectives and System Performance
1. Implementation of Hand Geometry at Purdue University's Recreational Center:
An Analysis of User Perspectives and System Performance
Eric Kukula & Stephen Elliott, Ph.D.
kukula@purdue.edu & elliott@purdue.edu
Biometric Standards, Performance, & Assurance Laboratory
College ofTechnology, Purdue University, 401 N. Grant Street, West Lafayette, IN 47906 USA
ABSTRACT
This paper discusses the implementation issues of installing a
commercially available hand geometry system in the current
infrastructure of Purdue University's Recreational Sports Center.
In addition to a performance analysis of the system, a pre- and
post- data collection survey was distributed to the 129 test
subjects gathering information on perceptions of biometrics, in
particular hand geometry, as well as participants' thoughts and
feelings during their interaction with the hand geometry device.
The results of the survey suggest that participants were
accepting of hand geometry. Additionally, analyses of the
participants' survey responses revealed that 93% liked using
hand geometry, 98% thought it was easy to use, and 87%
preferred it to the existing card-based system, while nobody
thought the device invaded their personal privacy. System
performance achieved a 3-try match rate of 99.02% (FRR
0.98%) when "gaming"/potential impostor attempts were
removed from analysis. The failure to enroll rate was zero.
Statistical analyses exposed a significant difference in the scores
of attempts made by users with prior hand geometry usage, and
subjects that could not straighten out their hand on the device.
However, there were no statistical difference in the effects of
rings/no rings, improper hand placements/proper hand
placements, or gender on hand geometry score.
1. INTRODUCTION
This paper explores the feasibility and performance related to
implementing a hand geometry system for access and audit
control at Purdue University's Recreational Sports Center
(RSC). The current access control system requires a user to
swipe a student identification card through a magnetic strip
reader to gain access to the recreational center. Since the
decision is based solely on a token, which can be stolen, lost,
handed to others, or copied; accurate auditing is not possible,
causing a two fold problem: (1) an insurance risk - as accurate
records of members in the facility are not available, and (2) a
loss of revenue for the recreational center - as multiple people
could use the same identification card. The use of biometrics,
particularly hand geometry, removes the token (something
members "have") and replaces or adds to it a physical or
behavioral trait (something members "are"), which removes the
possibility for lost or stolen tokens to be used for fraudulent
access.
This paper describes a modified operational evaluation of
Recognition Systems Handkey II hand geometry system at
Purdue University's Recreational Sports Center (RSC) during
the Spring semester of 2005. The project began in Fall 2003 as a
class project for IT 545, a graduate level biometrics course in the
College of Technology, with the purpose of assessing the
facility's environment and infrastructure, as well as the
management team and potential users [1]. Initially, a survey of
453 participants was distributed and analyzed during the Fall of
2003 to determine RSC usage patterns, perceptions of
biometrics, and thoughts about the current access control system.
The results revealed that 55% of the participants felt fingerprint
recognition was least intrusive, followed by hand geometry
(30%), eye - iris and retinal imaging (7%), and face (6%), which
is shown in Figure 1. [1] also conducted an environmental
assessment of the Purdue RSC, which investigated four
biometric applications based on assumed user familiarity, ease
of use, and climate conditions at the two entrance locations - the
front gate located indoors, and the back gate located outdoors.
No
Multiple Response - 1%
Moda ities - 1% I
Hand -30%
7TA.
Figure 1: 2003 Biometric gym access survey - Responses for
the least intrusive biometric technology [1]
The recommendations by the IT545 class to RSC Management
were to install hand geometry due to its track record for access
control applications (AC) and use in outdoor environments. It
was determined by RSC Management that Purdue University
Facilities Services would install the hand geometry device
separate from the current access control system, so testing and
evaluation would not interfere with students and faculty
attempting to gain access to the facility. Further discussion on
the environment and system setup occurs later in this paper.
2. MOTIVATION
The motivation behind the research was four-fold: 1) To collect
prior biometric use information, as well as participants
perceptions of biometrics before using the hand geometry
system, to establish implementation feasibility and user
acceptance of the technology; 2) To monitor participants initial
perceptions and interactions during training and enrollment; 3)
To collect user perception and interaction data after the
evaluation concluded, and 4) To measure the performance of the
0-7803-9245-O/05/$20.00 C2005 IEEE
Authorized licensed use limited to: Purdue University. Downloaded on February 28,2010 at 16:52:06 EST from IEEE Xplore. Restrictions apply.
2. hand geometry system, including: the failure to enroll rate
(FTE), failure to acquire rate (FTA), and the false reject rate
(FRR).
3. ENVIRONMENT OVERVIEW
The hand geometry system was installed in the front entrance of
Purdue University's RSC. The implementation was isolated
from the current access control system (magnetic ID cards), so it
would not interfere with members trying to enter the RSC. In
addition, the current design of the access control area was not
suitable to accommodate the commercially off the shelf (COTS)
hand geometry device without significantly affecting
performance, which will be discussed in section 3.2. The
environment, which the hand geometry system was installed, is
shown in Figure 2.
Figure 2: Purdue RSC access control area
3.1 Characteristics of Current System
The current access control system at the Purdue University RSC
uses magnetic strip readers mounted on top of a turnstile. To
gain access to the facility, a member swipes their identification
card through the magnetic strip reader. If the card is active, the
turnstile will unlock and the member can gain access. The
current system involving the magnetic card readers has two
lanes or stations. One of the stations is depicted on the left side
of Figure 3.
Figure 3: Experimental setup
3.2. Characteristics of Operational System Evaluated
Figure 3 depicts the hand geometry unit placement in the front
entranceway. It was noted by the authors that by separating the
hand geometry device from the turnstile, participant interaction
with the hand geometry device would not be identical to that of
a real-world deployment. There are two significant explanations
for this. First, the COTS hand geometry unit was a right-handed
model and the base of the turnstile was located on the left.
Therefore if a user were to use the hand geometry device, they
would have to reach across their body to use the device,
influencing users' interaction with the device. The results of this
incorrect setup could possibly cause inconsistent hand
placements on the device ultimately affecting the performance of
the algorithm, which in turn could influence users' perceptions
of hand geometry. Installation was performed by Purdue's
Facility Services, which closely followed the protocol developed
in the Fall 2003 feasibility study.
3.2.1 Scenario Testing in an Operational Environment
The primary goal of the hand geometry implementation was to
examine the performance of the hand geometry system at the
Purdue RSC on a population of students and faculty. This goal is
harmonious with the ISO/IEC Biometric Performance Testing
and Reporting definition that states operational testing is an
"evaluation in which the performance of a complete biometric
system is determined in a specific application environment with
a specific target population [2]. However the end result of a user
interacting with the hand geometry system did not affect them
entering the facility, thus was not a true operational test; and was
classified as a modified scenario test.
3.2.2 Operational Environment during Testing
The operational environment shown in Figure 2 had a mean
temperature in the evaluation area ofroughly 74°F. Since Purdue
is located in Indiana and the test was conducted between
February and May, outdoor temperatures were variable
throughout the evaluation with a mean high of 65°F and low of
43°F [3], however quantitative measures on the effects of
temperature changes on hand geometry scores were not recorded
as the evaluation type was unattended. Illumination levels were
not monitored during the evaluation, but were consistent with a
building entrance with glass doors. Quantitative measures on the
effects of illumination on the performance of the hand geometry
system were also outside the scope ofthis evaluation.
3.3 Future State
The RSC has plans to remodel the front entrance within the next
two years. Regardless of whether or not hand geometry is
adopted and implemented system wide, the re-design should
include a reversal of the turnstiles to accommodate COTS hand
geometry readers allowing members to walk up to the turnstile,
stop in front of the barrier, type their ID number or swipe their
ID card, place their hand on the platen, and proceed. Figure 4
depicts an entranceway modeled in this fashion at another
university recreational sport facility in the United States.
Figure 4: Future hand geometry access control system [5]
Authorized licensed use limited to: Purdue University. Downloaded on February 28,2010 at 16:52:06 EST from IEEE Xplore. Restrictions apply.
3. 4. TECHNOLOGY OVERVIEW
Hand geometry is one of the oldest commercialized biometric
modalities, with foundation patent applications dating from the
late 1960s [4]. The technology came of age in the 1980s when it
was selected for deployment in several US nuclear power plants.
Since then, over 100,000 devices have been installed for
physical access control (AC), identity management (IM), and
time & attendance (TA) applications. Typical AC and IM sites
include airports, prisons, hospitals, military bases, commercial
buildings, dining applications, and health clubs. In TA
applications, hand geometry units replace traditional time clocks
to eliminate "buddy punching" (in which one employee signs
in/out for another employee so they are paid for more hours than
they actually worked) and to control/authorize overtime
expenses.
Hand geometry devices measure the size and shape of human
hands. They do not measure palm prints, fingerprints, vein
patterns, or other traits. The type ofhand reader used at the RSC
is shown in Figure 5. This device uses a CMOS sensor and near
infrared illumination to image the hand from above and from the
side (the side-view is captured via a mirror adjoining the hand
surface). These views are converted to binary silhouettes that
are traversed to calculate over 90 length, width, thickness, and
area measurements. These measurements are "compressed" into
a proprietary 9-byte template in such a way that only the unique
characteristics of each hand are stored; a hand image cannot be
uniquely reconstructed from its 9-byte template.
Figure 5: Recognition Systems Handkey II
The Handkey II is generally considered a verification device
(where the user proves a claim of identity), not an identification
device (where the user is selected from a list of possible
identities). Due to the small 9-byte template, the Handkey II can
store up to 32,516 users in its internal database (without an
external PC). Hand geometry can also be used in smartcard
applications, where memory and processing power are at a
premium. For a more detailed discussion on hand geometry, see
[5, 6].
4.1 Hand Geometry Modifications for Data Collection
In this evaluation, a COTS hand geometry device was modified
for testing purposes by adding a data logging card containing a
flash memory card similar to those used in digital cameras.
After each hand placement, the hand reader's main processor
spent approximately two seconds writing to flash. During this
time, the processor did not respond to network requests,
including enrollment or verification requests. For this reason
some users were enrolled at the hand reader, but the PC auditing
software occasionally timed out waiting for the enrollment
notification. Subsequently, these users were considered invalid
by the auditing software and were summarily rejected during the
verification attempts following enrollment. Re-enrolling these
users solved the problem.
Because re-enrollment was triggered by a software timeout
caused by using a non-standard hand reader, not by image
acquisition or algorithm problems, these cases were not
considered failures to enroll (FTE). Moreover, enrollment trials
without the auditing software were conducted offline in a
laboratory environment and no enrollment problems were
apparent. See section 7.1 for further enrollment analysis.
5. EXPERIMENTAL SETUP
Before the experimental setup is discussed, the application under
which this evaluation occurred must be defined. The taxonomy
for an application falls under six categories: cooperative/non-
cooperative, covert/overt, habituated/non-habituated, attended/
unattended, public/private, and open/closed. For further
information on application taxonomies, refer to [7, 8]. For this
access control evaluation, the taxonomy was cooperative, overt,
habituated and non-habituated, unattended - except for training
and enrollment, private, and closed.
As discussed previously, all aspects ofthis evaluation took place
in the front entrance of the Purdue University RSC (Figure 2),
including training, enrollment, and unattended verification. In
addition, two surveys were distributed before and after the
evaluation to collect demographic information, RSC usage
patterns, prior knowledge, and/or use of biometrics, perceptions
toward hand geometry, and feelings towards the current access
control system.
5.1 Training
Before training, each subject was presented an IRB human
subjects consent form to read and sign. Once this was signed
training began. Training consisted of a 5-10 minute briefing
including: the purpose of the project, a technology overview, a
hand placement tutorial, instruction on specific enrollment and
verification procedures to follow, and a question and answer
period. For repeatability purposes a manual was created,
ensuring that each individual received the same orientation and
training.
5.2 Enrollment
Enrollment was attended by one of the authors to ensure each
test subject followed the test protocol for enrollment. Each
subject was asked to provide a four digit number that they could
remember for subsequent verification attempts. Enrollment
consisted of three hand placements, to create a unique template
for that test subject; however the device may have required
additional hand placements if the first three did not satisfy the
enrollment criteria. It was observed by the authors that
enrollment generally took thirty seconds or less, although this
data was not collected or documented.
5.3 Unattended Verification
The COTS hand geometry unit functions as a one-to-one
(verification) system. During each verification attempt, the test
subject entered the four digit number provided during
Authorized licensed use limited to: Purdue University. Downloaded on February 28,2010 at 16:52:06 EST from IEEE Xplore. Restrictions apply.
4. enrollment, and when prompted by the system - placed their
hand on the platen around the guide pins. Since the hand
geometry system was separated from the functioning access
control system, as discussed earlier in the paper, a failed
verification attempt did not result in a user not entering the
facility. To enter, a test subject still had to provide her/his
Purdue ID card and follow the access control procedure.
Furthermore, as one of the purposes of the evaluation was to
examine participants' interactions and perceptions of the device,
they were allowed to use the device repeatedly at their
discretion. This resulted in some participants never using the
device after the first visit, while others used the device once a
week, once per day, and even multiple times per day.
5.4 Survey Distribution
Two electronic surveys were distributed during the evaluation to
gather demographic information, RSC usage patterns, prior
knowledge and/or use of biometrics, feelings toward hand
geometry, and feelings towards the current access control system
of the test subjects. The first survey was given after the
participant enrolled using the hand geometry device. At the
conclusion of the test period, each test subject was asked to
complete a follow-up survey to assess if their interaction with
the device over a two-month period changed their thoughts or
perceptions of hand geometry. As the surveys were voluntary
and electronic, response rates varied, which is discussed in the
next section.
6. TEST POPULATION & SURVEY RESULTS
The evaluation involved 129 test subjects from Purdue
University, including students, faculty, and full-time RSC
employees. The pre- evaluation survey resulted in a 92%
response rate, while the survey distributed after the evaluation
ended was 42%. The latter survey was available for a month
after data collection ended, but reduced response rates were
expected by the authors due to the end ofthe academic semester,
although multiple email messages were sent prior to the survey
distribution, as well as three reminder messages after
distribution.
6.1 Demographics
From the 119 out of 129 respondents, 88% were 18-25 years of
age, with 71% male and 29% female. 88% were students, 8%
were Purdue University faculty, and the remaining 3% were
RSC employees. 104 test subjects, or 87%, classified themselves
as right-handed. 87% of the respondents were Caucasian, 9%
Asian, 2% African American, and 1% Native American.
Moreover, none of the participants had missing digits. Refer to
[9] for a complete listing ofthe demographic survey results.
6.2. Results for Subjects' Prior Use & Perceptions of
Biometrics
Test subjects were asked seven questions regarding prior usage
and perceptions of biometrics after training and enrollment.
From the 119 survey respondents 37% stated they have never
used biometrics, while 42% stated they had used fingerprint
recognition, followed by dynamic signature verification (28%),
voice recognition (21%), and hand geometry (18%). From the
test subjects that have previous biometric experience, 34% used
multiple biometric technologies. A complete analysis of the
responses can be found in [9]. It should be noted that there are
fingerprint ATM's on campus, and near the vicinity of students,
which might account for prior usage.
With regards to hand geometry, 94 of the 119 responses from
test subjects never used hand geometry prior to this study (79%),
98% stated that the hand geometry device did not look hard to
use, and 92% stated the device did not look invasive to them.
However, there were conversations with some subjects during
the training and enrollment sessions that revealed many common
misconceptions such as: hand geometry collected fingerprints,
the platen scanned their fingerprints, "people or government
could steal their fingerprints from the hand reader", and "that
government agencies were collecting their data from the hand
reader".
6.3 User Experiences
After the data collection concluded, a post data collection survey
was released to all participants. Of the 129 participants, 55
responded (42% response rate). The results from the survey
dealing with participant experiences can be found in Table 1.
Analysis of the user experiences survey results revealed that
85% remembered how to use the hand geometry device each
time they used it, while 15% forgot the correct procedure or how
to place their hand on the device correctly. From the
respondents, 71% used the hand geometry device up to 20 times
in a two-month period. When participants did use the device, 19
of the 55 respondents performed multiple verification attempts
in the same day; either in succession or over a period of time.
More generally, 93% of the survey respondents liked using the
device, and 98% stated the hand geometry device was easy to
use. Furthermore, all 55 survey responses stated they felt the
hand geometry device did not invade their privacy or personal
space.
Another interesting point is that 64% of the responding
participants showed either their friends or co-workers how the
hand geometry device worked. It is hypothesized that during
these explanations to friends and co-workers that imposter
attempts and experimental or "game" hand placements took
place. While this cannot be proven due to the unattended nature
of this test, analysis of the raw images stored with each hand
placement strongly supports this theory. Lastly, when asked
whether participants preferred to use hand geometry or magnetic
strip cards to access the RSC, 87% responded with hand
geometry, 5% responded with the magnetic strip cards, 7% were
undecided, and 1% did not respond.
Table 1: User experiences survey results post data collection
Hw anytimes didyou gse tie handgeometry d_ev?
Less than 10 22 40%
11-20 times 17 31%
21-30 times 7 13%
31-40 times 5 9%
41-50 times 0 0%
More than 50 times 4 7%
How mnytimesdidnyouforget how to use the handdgonetry
device?
Never 47 85%
1-3 6 11%
4-6
More than 6 times.
0 0%
2 4%
Didyou1 perfrm multple attemts on the handreade duig the
sne visit,either in suesion or once enteriWn andonce leavin
No 36 65%
Yes 19 35%
Authorized licensed use limited to: Purdue University. Downloaded on February 28,2010 at 16:52:06 EST from IEEE Xplore. Restrictions apply.
5. Didyou ike usig handgemetry devie.?
No 3 5%
Yes 51 93%
No Response 1 2%
Was the hand_geoer device hard to use?
No 54 98%
Yes 0 0%
No Response 1 2%
Did the haidgeotrd_evice feel ike i Ilinvdedyour brivacy or
pernoal space?
No 55 100%
Yes 0 0%
Didylo rhow ay oWyurfriends or co-wokers how thge devie
worked?
No 20 31
Yes
36%
35 64%
7. SYSTEM PERFORMANCE
7.1 Enrollment Analysis
As stated in section 4, a conflict arose between the auditing
software and the flash card inside the hand geometry device,
which collected the raw images. The result of this conflict
caused 16 test subjects' unique user identification numbers not
to be recognized, causing additional enrollment sessions for
these participants. Moreover, an analysis of the enrollment
images of these 16 subjects revealed that there were no problems
in the acquired images, as the samples were of sufficient quality
thus these 16 subjects who enrolled more than once were
deemed not be classified as failure to enroll (FTE) attempts. For
further explanation, please refer back to sections 4 and 5.2.
The analysis of the enrollment data confirmed 156 enrollment
sequences were completed during the evaluation. The flash card
and auditing software error required one subject to perform 3
additional enrollment sequences, 8 subjects requiring 2
additional enrollment sequences, and 7 subjects requiring 1
additional enrollment sequence. Four test subjects were required
to provide 4 hand placements, as the device deemed the standard
3 enrollment images as not sufficient. In summary, the hand
geometry device had a 0% FTE, when the additional enrollments
due to the external software data communication error were
removed.
7.2 Failure to Acquire Analysis
The failure to acquire (FTA) rate is the percentage of attempts
where the system fails to capture a biometric sample of
sufficient quality; including attempts where extracted features
are substandard [5]. As such, the ground truth ofthe FTA cannot
be ascertained, as this was an unattended evaluation.
7.3 Verification System Analysis
Since this was a simulated scenario evaluation, it is essential to
report the false reject rate (FRR) and the false accept rate (FAR).
However, since the evaluation was unattended, the ground truth
FAR could not be ascertained since it was untenable to
differentiate impostor attempts from subjects "gaming" the
device. Thus, the analysis below represents the authors' best
efforts to remove imposter and gaming attempts from the data to
predict biometric performance. For all analyses the system
threshold was set at 100.
7.3.1 Performance analysis ofthe handgeometry system
After analyzing the data for specific hand placements
constituting imposter attempts or "gaming" of the system, the
authors removed 37 placements from the dataset. Seventeen
other placements were removed for reasons including: multiple
hands present at the same time, jacket sleeves occluding the
hand, and grossly incorrect hand placements.
The remaining 1788 hand placements were analyzed for 1-try, 2-
try, and 3-try rejection rates. For users placing the hand more
than 3 times in close succession (within 15 minutes and no other
users utilizing the system in-between), only the first 3
placements from that session were analyzed. Figure 6 shows the
resulting rejection rates versus hand reader threshold. The
Handkey II deployed at Purdue's RSC was set at a global
threshold of 100, therefore the 1-try false reject rate was 2.26%,
the 2-try rate was 1.18%, and the 3-try rate was 0.98%.
Extremely low 3-try false rejection rates of 0.1% were possible,
but only at a false acceptance rate approaching 2%.
10
C-,
a-
(a
a.
o
wL
9
8
7
6
5
4
3
2
1
0
50 100 150
Threshold
- FAR
1 try
2try
-3try
200
Figure 6: Error Rates vs. Threshold
The false acceptance rate was estimated by comparing the same
1788 verification attempts against the enrollment database. This
is only an estimate, as imposter attempts may be present in the
data since the installation was unattended. At the default
threshold of 100, the predicted false accept rate was 0.87%.
The large number of gaming attempts, as well as the survey
result that 65% of users were excited about hand geometry
technology to show their friends how it worked, questions the
validity of the unattended dataset. This may account for the
discrepancy in performance reported here and claims made by
the device manufacturer. The authors made a best-effort attempt
to identify all gaming of the system, but if 17 placements went
undetected, the FRR would be overstated by more than 1%.
7.3.2 Unique characteristic performance analysis
During image analysis, it was noticed that there were
problematic attempts. These attempts were classified into 3
categories, including: shirt/coat sleeves covering the hand,
ring(s) present, improper thumb placement, and little fingers that
would not straighten. One-way analysis of variance (ANOVA)
tests were conducted on each of the categories to determine if
the group had an effect on the score. Results were compared
based at alpha=.05.
Authorized licensed use limited to: Purdue University. Downloaded on February 28,2010 at 16:52:06 EST from IEEE Xplore. Restrictions apply.
6. The first ANOVA tested attempts with rings versus attempts
with no rings. The results stated that there was not a significant
difference between scores for attempts with rings and without
rings, F(1, 1686)=.11 (p=.743), however larger rings were
problematic as they fused multiple fingers together changing the
silhouette of the hand. Moreover, there was a significant
difference between correct and incorrect thumb placement on the
score, however only 6 verification attempts were recorded. The
mean scores for correct thumb placement attempts was 39.9
(standard deviation of 173.7) and 1125.2 (1145.6) for incorrect
thumb placement attempts.
Shirt and coat sleeves were easily determined by examining
multiple images of a user. There was a significant difference
between the 40 attempts with shirt/coat sleeves covering the
hand and those attempts without a sleeve present, F(1,
1665)=173.27 (p=.0000). Mean scores for shirt/coat sleeves
were 476.9 (760.8) and 39.8 (173.7) without a shirt/coat sleeve
covering the hand. The last analysis looked at one particular user
who had difficulty straightening out their little finger. The mean
(and standard deviation) for these attempts was 133.1(101.8),
causing false rejections at a threshold of 100. In a real world
deployment, this user would obtain a special threshold setting to
accommodate their variable hand placement.
7.3.3 Demographics andperformance
A statistical analysis was also conducted on gender versus the
score and prior hand geometry use versus the score. The results
revealed that there was no significant difference between gender
and score, F(1, 1840)=.73 (p=.48). Moreover, the mean and
median for gender were approximately the same - 50.6 and 49.6
for females and males respectively. However, there was a
significant difference between the scores of subjects who used
hand geometry prior to this study and those who had not - F(1,
1840)=5.90 (p=.003). In particular, the mean score for subjects
who had used hand geometry before was 25, compared to 62.1
for those who had never used hand geometry prior to this study.
This is expected as users who had used hand geometry prior to
this evaluation have been habituated with the device for a period
of time, where as the rest of the test subjects had never used the
device and had a longer acclimation period.
8. CONCLUSION & FUTURE WORK
The data presented here suggest that participants were accepting
of hand geometry at Purdue University's Recreational Center.
Analyses of the participants' survey responses revealed that 93%
liked using hand geometry, 98% thought the technology was
easy to use, and 87% preferred hand geometry to the existing
card-based system, while nobody thought the device invaded
their personal privacy.
The complexity of analyzing an unattended system was noted
throughout this paper, specifically the difficulty of
differentiating a genuine attempt, a genuine "game" attempt, and
an impostor attempt. These difficulties call into question the
validity of the performance data in Section 7.1. In addition, the
authors will provide these questions to groups such as ISO/IEC
JTC1 SC37 to seek guidance for future operational tests,
including treatment of imposter and "gaming" attempts that may
have corrupted the data. Such guidance is critical to generating
meaningful performance curves for operational tests in the
future. Recommendations for future research would be to
include a monitoring device in the evaluation area to assess who
is actually using the device, differentiating genuine users from
those "gaming" the device and impostors. This would assist in
quantifying the number of attempts attacking the system, so the
FAR and FRR could be calculated with higher confidence.
9. REFERENCES
1. Elliott, S.J. & Scheller, A.R. (2003). Accessing
Recreational Facilities: Choosing the Appropriate
Biometric. Unpublished manuscript, Purdue University,
West Lafayette, IN
2. Mansfield, A.J. (2005). ISO/IEC FCD 19795-1, Biometric
Performance Testing and Reporting, Part 1 - Principles
and Framework (SC37N908): ISO/IEC JTC1 SC37.
3. Indiana State Climate Office, Purdue University. (2005).
West Central Indiana Weather Observation Data.
Available fromh
4. Miller, R.P., (1971). Finger Dimension Comparison
Identification System. United States Patent 3,576,538.
5. Recognition Systems (2004). Hand Geometry. From
6. Zunkel, D. (1999). Hand Geometry Based Verification. In
Biometrics: Personal Identification in a Networked
Society. S. Pankanti, Editors. 1999, Klewer Academic
Publishers Group: Norwell, MA. Pp. 87-101.
7. Wayman, J.L., (2000). A Definition of Biometrics. In
National Biometric Test Center Collected Works. 21-25.
San Jose, CA: National Biometric Test Center
8. Elliott, S., Sickler, N, Kukula, E., & Modi, S. (2004).
Introduction to Biometric Technology. Copymat.
9. Kukula, E. & Elliott, S. (2005) Results ofthe Spring 2005
Hand Geometry Study at the RSC. From
System performance in this study of 129 subjects suggest that
hand geometry would be an appropriate fit for this AC
application. The FTE was 0% as all users were able to enroll.
However, it will be interesting to continue data collection to see
the reactions of users and system performance in a longitudinal
evaluation. Furthermore, the individual analyses reveal that
either more training or stricter policies for subjects interacting
with the device need to be implemented for some users, as
roughly 100 attempts deviated from the training that was given.
Authorized licensed use limited to: Purdue University. Downloaded on February 28,2010 at 16:52:06 EST from IEEE Xplore. Restrictions apply.