INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER

Size: px
Start display at page:

Download "INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER"

Transcription

1 INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER Fidelica Microsystems, Inc. 423 Dixon Landing Rd. Milpitas, CA

2 INTRODUCTION The fingerprint-imaging segment of the biometrics industry is in its embryonic state; a myriad of technologies and concepts have fostered slow but steady growth. As the number of applications and level of acceptance grow, biometric developers are faced with the task of evaluating and contrasting the various solutions on the market. To date, developers of fingerprint authentication products, such as sensors and algorithms, have developed tests tailored to their particular devices and software. Since the relative performance of the fingerprint authentication systems is crucial in the evaluation process, it is imperative that the results be analyzed with care. A comprehensive discussion of performance results is the subject of this white paper. The focus is on the entire authentication system, including the fingerprint image sensor and verification algorithm. In the process, some common definitions and test procedure pitfalls are discussed. PERFORMANCE METRICS Performance tests of fingerprint authentication systems come in many varieties. Some tests are done in the laboratory; others are performed in the field. In addition, these systems usually can be operated under different security settings producing a spread of performance results. There are many different variables to be aware of when testing performance or analyzing test results provided by different vendors. Using any authentication system requires two steps: enrollment and verification. For a passwordbased authentication system, the enrollment is simply the creation of a password. Often times, the enrollment requires the user to re-enter the password to assure that the stored password is what the user intended. Verification in such an authentication system would comprise nothing more than the submission of a password in order to gain access to restricted areas. Similarly, for a fingerprint authentication system, the enrollment step would consist of the user submitting fingerprint image samples to the system. The system would then analyze the samples and generate a template to be stored. Once a user has been enrolled in the system, verification of the user can take place. This would involve the user submitting a fingerprint image sample to be compared with the enrolled template. If the newly submitted image sample matches the stored template, the user is accepted. Otherwise, the user is rejected. Sometimes, the system s decision to reject or accept a user is erroneous. How frequently systems make an incorrect decision is of great importance. There are four basic error rates employed in fingerprint authentication systems: the False Accept Rate (FAR); the False Reject Rate (FRR); the Equal Error Rate (EER); the Failure to Enroll Rate (FER). The FAR represents the probability that a false match occurs, for example, an unauthorized user is erroneously accepted as an authorized user by the system. Its complement is the FRR, which represents the probability that a false rejection occurs, for example, an authorized user is 2

3 erroneously mistaken for an unauthorized user. The FER represents the probability that a single fingerprint cannot be enrolled in the system, such as when an individual wants to use his right thumb with the fingerprint authentication system, but for some reason the system determines that his right thumb is not usable for this purpose. Before the EER can be described, some additional background information must be provided about the performance of these systems. First, understand that there is a trade-off between the FAR and FRR. If a system has various security settings at which it can be operated, then the FAR and FRR will vary in accordance with the security setting selected. In general, as the FAR is reduced the system becomes more secure the FRR is increased. A consequence of a higher FRR is user inconvenience, since successful authentication of an authorized user may require additional access attempts. For a given system, there may be only a handful of security settings available, but the error rates from an infinite number of these settings can be interpolated to form a continuous FAR/FRR trade-off curve. The trade-off curve most often associated with fingerprint authentication systems is known as a Receiver Operating Characteristics (ROC) curve. The ROC curve plots the FAR against the FRR. It can be generated by obtaining FAR and FRR data points under many different security settings on a given system (sensor and verification algorithm). Fig. 1 shows an example of a ROC curve. From this curve, one can easily see the trade-off between FAR and FRR. Fig. 1. With a basic understanding of ROC curves and the FAR-FRR trade-off, the EER can now be described. The EER is the datum on the ROC curve where the FAR is equal to the FRR. In the ROC curve shown in Fig. 1, the EER is approximately The EER is often used for comparisons because it is simpler to obtain and compare a single value characterizing the system performance, as opposed to generating and using full ROC curves. Unfortunately, the EER is 3

4 rarely a good choice for comparing the performance of various fingerprint authentication systems. In particular, the efficacy of a given fingerprint authentication system is highly dependent on its intended application. Some applications require higher security and can sacrifice some convenience, but in others convenience is a top priority. This is the main problem with using the EER as a basis for comparing system performance. Since the EER only gives information that is useful for a single application requirement, it will vary from system to system. Therefore, EERs often compare systems developed for potentially different applications. To further clarify this point, let us consider an example. Say that a company is evaluating several fingerprint authentication systems with the intention of deployment in a high security environment. The company is willing to accept a higher FRR in order to ensure that the chances an unauthorized user can gain access is minimal (for example, an FAR of 1 in 250,000). If the systems being evaluated had the EERs given in Table I, none would clearly stand out as the best because nothing would be known about them for the intended high security application. From this example, one can quickly see the limitations of the EER. Table I. An illustration of the limitations of the EER. Fingerprint Authentication System EER Fingerprint System A 0.2% Fingerprint System B 0.7% Fingerprint System C 1.0% Similar problems plague the FAR and FRR numbers often reported by fingerprint authentication algorithm vendors. With a single reported FAR and FRR, the performance cannot be properly assessed for a given application. This is why it is necessary to compare systems using a family of ROC curves. ROC curves allow for the comparison of various authentication systems for a given application. It is not unusual for one system to outperform another in one application and have their roles reversed in another. This scenario would manifest itself as a crossover in the ROC curves as seen in Fig. 2. These ROC curves show one system performing better than the other in a lower security (higher FAR) environment and worse than the other in a higher security (lower FAR) environment. 4

5 Fig. 2. TESTING PITFALLS Having described some of the fundamental issues in comparing the performance of fingerprint authentication systems, our attention can now be shifted to actual test practices. It is important to understand exactly how the FAR and FRR that make up the ROC curves are determined. Unfortunately, a widely accepted biometrics testing standard currently does not exist. Because of this, it is easy for a specific vendor to skew test results to benefit their own system. In fact, results from fingerprint authentication tests will undoubtedly be biased by a number of uncontrollable factors. The performance results from the test of a fingerprint authentication system are largely affected by the test population. Error rates gathered from a test population containing more individuals with poor quality fingerprints are likely to be worse than a similar test with a population containing more individuals with much higher quality fingerprints. Population selection is highly unscientific. Often times the population is limited to those who volunteer their time. Little or no control of the population is a common occurrence in the testing of authentication systems. Typically, the reported FRR and FAR are determined by the number of failing fingerprint match trials and the number of failing non-match trials, respectively. Say the test to determine the FRR of the system for a given security setting consisted of 20,000 match trials. The FRR is determined by dividing the number of trials that failed to produce the correct result (true match) by the total number of trials. Suppose that of the 20,000 match trials, 250 of them resulted in rejected access. Then the FRR for this example is 250 / 20,000 =.0125 or 1.25%. A similar test could be used to determine the FAR of the system. However, since false accepts occur a lot less frequently than FRRs, many more trials must be run in order to obtain a reasonably accurate FAR. 5

6 There is a mathematical rule of thumb known as Doddington s 30-error criterion, which states that for a measured error rate to lie within 25% of the true error rate with high confidence (90%) then at least 30 instances of that error should have been observed. For example, one can t put too much confidence in a measured FAR rate for some system at a specified security setting of 1 in 100,000 if only 100,000 trials were performed. This is because only one false accept was observed after 100,000 trials. However, if the measured FAR was 1 in 100,000 after 3,000,000 trials, then it can be said that the true error rate is within 25% of the observed error rate with a much higher degree of confidence. In this particular case, the FAR can be said to be 0.001% ± % with 90% confidence based on the Doddington 30-error criterion. Thus, with this rule in mind, one can get a sense of the accuracy of reported error rates from various system vendors once the number of matching trials is known. The independence of trials is another topic to consider when performing due diligence on vendors error rate claims. Ideally, a test of a fingerprint authentication system should consist of what are known as Bernoulli trials. A Bernoulli trial is one that returns a binary output (in the case of a fingerprint authentication system, either a MATCH or a NO MATCH) and is statistically independent from other trials. This is not feasible for large tests, because as soon as an single individual s fingerprint is used in more than a single trial, the independence requirement of a Bernoulli trial is violated. This is because each individual fingerprint s has an error probability distribution with respect to those of another individual. As an example, say Individual A s fingerprints are more likely to match against those of Individual B. Then by having multiple trials of matching fingerprint images from Individuals A and B, the FAR will be inflated. Finally, careful attention must be paid to other factors that could affect test results. One must understand that sources of testing bias cannot be completely eliminated. They are a part of any test involving fingerprint authentication systems. However, it is important to be aware of any bias that might affect the test results. When comparing error rates published by different vendors, one should be conscious of the differences between test parameters and the definitions of the various errors. For example, one vendor might allow three retries in a given trial before considering the trial to be a single failed attempt to match; another vendor might count this as three failed attempts to match. Some consider the FRR to be a measure of false rejects of those who could be enrolled in the system; others consider any failed enrollment to be a contributor to the FRR. Therefore, it is important to have a strong grasp of what the precise definitions of the error rates are when making comparisons of ROC curves. In the absence of published testing standards, this is a very real issue. 6

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...

More information

The Expected Performance Curve: a New Assessment Measure for Person Authentication

The Expected Performance Curve: a New Assessment Measure for Person Authentication R E S E A R C H R E P O R T I D I A P The Expected Performance Curve: a New Assessment Measure for Person Authentication Samy Bengio 1 Johnny Mariéthoz 2 IDIAP RR 03-84 March 10, 2004 submitted for publication

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

The Expected Performance Curve: a New Assessment Measure for Person Authentication

The Expected Performance Curve: a New Assessment Measure for Person Authentication The Expected Performance Curve: a New Assessment Measure for Person Authentication Samy Bengio Johnny Mariéthoz IDIAP CP 592, rue du Simplon4 192 Martigny, Switzerland {bengio,marietho}@idiap.ch Abstract

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

Bio-FactsFigures.docx Page 1

Bio-FactsFigures.docx Page 1 Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS

MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS I. Introduction James L. Wayman, Director U.S. National Biometric Test Center College of Engineering San

More information

CHAPTER 6 RESULTS AND DISCUSSIONS

CHAPTER 6 RESULTS AND DISCUSSIONS 151 CHAPTER 6 RESULTS AND DISCUSSIONS In this chapter the performance of the personal identification system on the PolyU database is presented. The database for both Palmprint and Finger Knuckle Print

More information

Lecture 11: Human Authentication CS /12/2018

Lecture 11: Human Authentication CS /12/2018 Lecture 11: Human Authentication CS 5430 3/12/2018 Classes of Countermeasures Authentication: mechanisms that bind principals to actions Authorization: mechanisms that govern whether actions are permitted

More information

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu

More information

Park, Jun Woo KISA / IT Security Evaluation Center

Park, Jun Woo KISA / IT Security Evaluation Center 2005. 9. 29 Park, Jun Woo (junupark@kisa.or.kr) KISA / IT Security Evaluation Center Contents Ⅰ Protection Profile Ⅱ Analysis of SOF Ⅲ Analysis Of Vulnerability I. Protection Profile 1. Protection Profile

More information

Basic Concepts of Reliability

Basic Concepts of Reliability Basic Concepts of Reliability Reliability is a broad concept. It is applied whenever we expect something to behave in a certain way. Reliability is one of the metrics that are used to measure quality.

More information

FVC2004: Third Fingerprint Verification Competition

FVC2004: Third Fingerprint Verification Competition FVC2004: Third Fingerprint Verification Competition D. Maio 1, D. Maltoni 1, R. Cappelli 1, J.L. Wayman 2, A.K. Jain 3 1 Biometric System Lab - DEIS, University of Bologna, via Sacchi 3, 47023 Cesena -

More information

Lecture 3: Linear Classification

Lecture 3: Linear Classification Lecture 3: Linear Classification Roger Grosse 1 Introduction Last week, we saw an example of a learning task called regression. There, the goal was to predict a scalar-valued target from a set of features.

More information

ViGo Architecture and Principles. Mobile Voice Biometrics as-a-service

ViGo Architecture and Principles. Mobile Voice Biometrics as-a-service ViGo Architecture and Principles Mobile Voice Biometrics as-a-service Part number: VV/VIGO/DOC/183/C Copyright 2015 VoiceVault Inc. All rights reserved. This document may not be copied, reproduced, transmitted

More information

6 TOOLS FOR A COMPLETE MARKETING WORKFLOW

6 TOOLS FOR A COMPLETE MARKETING WORKFLOW 6 S FOR A COMPLETE MARKETING WORKFLOW 01 6 S FOR A COMPLETE MARKETING WORKFLOW FROM ALEXA DIFFICULTY DIFFICULTY MATRIX OVERLAP 6 S FOR A COMPLETE MARKETING WORKFLOW 02 INTRODUCTION Marketers use countless

More information

Software Quality. Chapter What is Quality?

Software Quality. Chapter What is Quality? Chapter 1 Software Quality 1.1 What is Quality? The purpose of software quality analysis, or software quality engineering, is to produce acceptable products at acceptable cost, where cost includes calendar

More information

2. On classification and related tasks

2. On classification and related tasks 2. On classification and related tasks In this part of the course we take a concise bird s-eye view of different central tasks and concepts involved in machine learning and classification particularly.

More information

Week 10 Part A MIS 5214

Week 10 Part A MIS 5214 Week 10 Part A MIS 5214 Agenda Project Authentication Biometrics Access Control Models (DAC Part A) Access Control Techniques Centralized Remote Access Control Technologies Project assignment You and your

More information

Call for participation. FVC2004: Fingerprint Verification Competition 2004

Call for participation. FVC2004: Fingerprint Verification Competition 2004 Call for participation FVC2004: Fingerprint Verification Competition 2004 WEB SITE: http://bias.csr.unibo.it/fvc2004/ The Biometric System Lab (University of Bologna), the Pattern Recognition and Image

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 11, November ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 11, November ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 11, November-2016 483 On Securing Automatic Teller Machine Transactions Using Bank Verification Number Ojulari Hakeem, Oke Alice

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI Adaptive Authentication in IBM Tivoli Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

Integration With the Business Modeler

Integration With the Business Modeler Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design

More information

No more than six tables, pictures or figures can be considered for the paper version, although

No more than six tables, pictures or figures can be considered for the paper version, although Archaeometry Thank you for your interest in Archaeometry, we look forward to receiving your paper. We are aiming for the printed edition of Archaeometry to publish papers of no more than 15 pages. We have

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

How accurate is AGNITIO KIVOX Voice ID?

How accurate is AGNITIO KIVOX Voice ID? How accurate is AGNITIO KIVOX Voice ID? Overview Using natural speech, KIVOX can work with error rates below 1%. When optimized for short utterances, where the same phrase is used for enrolment and authentication,

More information

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING A GUIDE TO 12 CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING There is a major difference between perceived and actual security. Perceived security is what you believe to be in place at

More information

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based Mobile Biometric Authentication: Pros and Cons of Server and Device-Based Table of Contents 01 Introduction 01 The Ongoing Debate 02 Server-Centric Architecture 02 Device-Centric Architecture 02 Advantages

More information

Metrics for Performance Evaluation How to evaluate the performance of a model? Methods for Performance Evaluation How to obtain reliable estimates?

Metrics for Performance Evaluation How to evaluate the performance of a model? Methods for Performance Evaluation How to obtain reliable estimates? Model Evaluation Metrics for Performance Evaluation How to evaluate the performance of a model? Methods for Performance Evaluation How to obtain reliable estimates? Methods for Model Comparison How to

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

Functional Programming in Haskell Prof. Madhavan Mukund and S. P. Suresh Chennai Mathematical Institute

Functional Programming in Haskell Prof. Madhavan Mukund and S. P. Suresh Chennai Mathematical Institute Functional Programming in Haskell Prof. Madhavan Mukund and S. P. Suresh Chennai Mathematical Institute Module # 02 Lecture - 03 Characters and Strings So, let us turn our attention to a data type we have

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

About HP Quality Center Upgrade... 2 Introduction... 2 Audience... 2

About HP Quality Center Upgrade... 2 Introduction... 2 Audience... 2 HP Quality Center Upgrade Best Practices White paper Table of contents About HP Quality Center Upgrade... 2 Introduction... 2 Audience... 2 Defining... 3 Determine the need for an HP Quality Center Upgrade...

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE Verifi ENTERPRISE Start Here IMPORTANT. Always install the Software prior to Hardware Installation Quick Installation Guide Windows XP Fast User Switching Compatible QAS 097 022505 PG1 RA About the Reader

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Fingerprint Authentication for SIS-based Healthcare Systems

Fingerprint Authentication for SIS-based Healthcare Systems Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it

More information

PostalOne! System. Release Release Notes

PostalOne! System. Release Release Notes PostalOne! System Release 47.2.0.0 Release Notes CHANGE 5.0 DEPLOYMENT DATE: MAY 20, 2018 RELEASE NOTES PUBLISH DATE: MAY 21, 2018 The following trademarks are owned by the United States Postal Service:

More information

Towards Systematic Usability Verification

Towards Systematic Usability Verification Towards Systematic Usability Verification Max Möllers RWTH Aachen University 52056 Aachen, Germany max@cs.rwth-aachen.de Jonathan Diehl RWTH Aachen University 52056 Aachen, Germany diehl@cs.rwth-aachen.de

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Using Code Coverage to Improve the Reliability of Embedded Software. Whitepaper V

Using Code Coverage to Improve the Reliability of Embedded Software. Whitepaper V Using Code Coverage to Improve the Reliability of Embedded Software Whitepaper V2.0 2017-12 Table of Contents 1 Introduction... 3 2 Levels of Code Coverage... 3 2.1 Statement Coverage... 3 2.2 Statement

More information

WELCOME! Lecture 3 Thommy Perlinger

WELCOME! Lecture 3 Thommy Perlinger Quantitative Methods II WELCOME! Lecture 3 Thommy Perlinger Program Lecture 3 Cleaning and transforming data Graphical examination of the data Missing Values Graphical examination of the data It is important

More information

Technical Report. Cross-Sensor Comparison: LG4000-to-LG2200

Technical Report. Cross-Sensor Comparison: LG4000-to-LG2200 Technical Report Cross-Sensor Comparison: LG4000-to-LG2200 Professors: PhD. Nicolaie Popescu-Bodorin, PhD. Lucian Grigore, PhD. Valentina Balas Students: MSc. Cristina M. Noaica, BSc. Ionut Axenie, BSc

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

Bits, Words, and Integers

Bits, Words, and Integers Computer Science 52 Bits, Words, and Integers Spring Semester, 2017 In this document, we look at how bits are organized into meaningful data. In particular, we will see the details of how integers are

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

FUNCTIONS AND MODELS

FUNCTIONS AND MODELS 1 FUNCTIONS AND MODELS FUNCTIONS AND MODELS 1.5 Exponential Functions In this section, we will learn about: Exponential functions and their applications. EXPONENTIAL FUNCTIONS The function f(x) = 2 x is

More information

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

A Biometric Authentication System That Automatically Generates Feature Points

A Biometric Authentication System That Automatically Generates Feature Points A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,

More information

Effective Threat Modeling using TAM

Effective Threat Modeling using TAM Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models

More information

PostalOne! System. Release Pre-Release Notes

PostalOne! System. Release Pre-Release Notes PostalOne! System Release 47.2.0.0 Pre-Release Notes CHANGE 4.0 SCHEDULED DEPLOYMENT DATE: MAY 20, 2018 SCHEDULED PRE-RELEASE NOTES PUBLISH DATE: MAY 18, 2018 The following trademarks are owned by the

More information

US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004)

US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) 83% of incidents executed from within organization, during normal business hours Financial loss in almost all insider

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

UNIT V *********************************************************************************************

UNIT V ********************************************************************************************* Syllabus: 1 UNIT V 5. Package Diagram, Component Diagram, Deployment Diagram (08 Hrs, 16 Marks) Package Diagram: a. Terms and Concepts Names, Owned Elements, Visibility, Importing and Exporting b. Common

More information

Biometric quality for error suppression

Biometric quality for error suppression Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?

More information

Mobile ID, the Size Compromise

Mobile ID, the Size Compromise Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption

More information

How to Choose the Right Designer: A Checklist for Professional Web Design

How to Choose the Right Designer: A Checklist for Professional Web Design How to Choose the Right Designer: A Checklist for Professional Web Design How to Choose the Right Designer 2 The Internet has changed the way the world does business and that s just as true for the business

More information

Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment

Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment Highest security, easy use on all modern phones Adaptive Trust Level for big and small payments

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Distributions of random variables

Distributions of random variables Chapter 3 Distributions of random variables 31 Normal distribution Among all the distributions we see in practice, one is overwhelmingly the most common The symmetric, unimodal, bell curve is ubiquitous

More information

HP Application Lifecycle Management. Upgrade Best Practices

HP Application Lifecycle Management. Upgrade Best Practices HP Application Lifecycle Management Upgrade Best Practices Document Release Date: October 2010 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty

More information

Distributed Sampling in a Big Data Management System

Distributed Sampling in a Big Data Management System Distributed Sampling in a Big Data Management System Dan Radion University of Washington Department of Computer Science and Engineering Undergraduate Departmental Honors Thesis Advised by Dan Suciu Contents

More information

BECOME A LOAD TESTING ROCK STAR

BECOME A LOAD TESTING ROCK STAR 3 EASY STEPS TO BECOME A LOAD TESTING ROCK STAR Replicate real life conditions to improve application quality Telerik An Introduction Software load testing is generally understood to consist of exercising

More information

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,

More information

CS Authentication of Humans. Prof. Clarkson Spring 2017

CS Authentication of Humans. Prof. Clarkson Spring 2017 CS 5430 Authentication of Humans Prof. Clarkson Spring 2017 Review Course so far: Introduction to security Cryptography Rest of semester: Accountability, both for Prevention and Deterrance Accountability

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

The Bizarre Truth! Automating the Automation. Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER

The Bizarre Truth! Automating the Automation. Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER The Bizarre Truth! Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER By Kimmo Nupponen 1 TABLE OF CONTENTS 1. The context Introduction 2. The approach Know the difference

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Zodiac Max OPERATOR GUIDE

Zodiac Max OPERATOR GUIDE Zodiac Max OPERATOR GUIDE February 2015 Table of Contents INTRODUCTION... 5 PC Requirements... 6 USB Driver Installation... 7 ZODIAC SINGLE-STATION SOFTWARE... 8 Software Installation... 8 Communications

More information

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust Wise Athena Security Team Contents Abstract... 3 Security, privacy and trust... 3 Artificial Intelligence in the cloud and

More information

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief Adaptive Authentication Adapter for Juniper SSL VPNs Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

Chapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger.

Chapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger. Chapter 2: Access Control and Site Security ACIS 5584 E-Commerce Security Dr. France Belanger Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall Access Control Definitions Access

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

Authenticating Nuclear Warheads With High Confidence

Authenticating Nuclear Warheads With High Confidence Authenticating Nuclear Warheads With High Confidence Moritz Kütt,, Sebastien Philippe, Boaz Barak, Alexander Glaser, and Robert J. Goldston, Princeton University Technische Universität Darmstadt, Germany

More information

Understanding Fingerprint Biometrics

Understanding Fingerprint Biometrics TECHNICAL SPECIFICATIONS Understanding Fingerprint Biometrics A brief look at fingerprints, how they are processed and how the accuracy of a biometric system is measured. ipulse Systems 7/1/2014 CONTENTS

More information

CS240 Fall Mike Lam, Professor. Algorithm Analysis

CS240 Fall Mike Lam, Professor. Algorithm Analysis CS240 Fall 2014 Mike Lam, Professor Algorithm Analysis HW1 Grades are Posted Grades were generally good Check my comments! Come talk to me if you have any questions PA1 is Due 9/17 @ noon Web-CAT submission

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Evaluating Alternatives to Passwords

Evaluating Alternatives to Passwords Security PS Evaluating Alternatives to Passwords Bruce K. Marshall, CISSP, IAM Senior Security Consultant bmarshall@securityps.com Key Topics Key Presentation Topics Authentication Model Authenticator

More information

Louis Fourrier Fabien Gaie Thomas Rolf

Louis Fourrier Fabien Gaie Thomas Rolf CS 229 Stay Alert! The Ford Challenge Louis Fourrier Fabien Gaie Thomas Rolf Louis Fourrier Fabien Gaie Thomas Rolf 1. Problem description a. Goal Our final project is a recent Kaggle competition submitted

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

Incident Response Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

Incident Response Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014 Incident Requirements and Process Clarification Disposition and FAQ 11/27/2014 Table of Contents 1. Incident Requirements and Process Clarification Disposition... 3 2. Incident Requirements and Process

More information

Applying Context to Web Authentication

Applying Context to Web Authentication Applying Context to Web Authentication John Linn, Burt Kaliski, and Moti Yung, RSA Laboratories; Magnus Nyström, RSA Security Inc. Prepared for W3C Workshop on Transparency and Usability of Web Authentication,

More information

Continuously Discover and Eliminate Security Risk in Production Apps

Continuously Discover and Eliminate Security Risk in Production Apps White Paper Security Continuously Discover and Eliminate Security Risk in Production Apps Table of Contents page Continuously Discover and Eliminate Security Risk in Production Apps... 1 Continuous Application

More information

WHITEPAPER WHAT TO CONSIDER TO SUCCESSFULLY LAUNCH A MOBILE APP! By RG Infotech WHITEPAPER. How to launch a MOBILE APP. Successfully!

WHITEPAPER WHAT TO CONSIDER TO SUCCESSFULLY LAUNCH A MOBILE APP! By RG Infotech WHITEPAPER. How to launch a MOBILE APP. Successfully! WHITEPAPER How to launch a MOBILE APP Successfully! By RG Infotech Since the launch of smartphones, mobile industry embarks several milestones that attracts several industries and developers to enter with

More information

Architectural Documentation 1

Architectural Documentation 1 Architectural Documentation Architectural Documentation 1 The Purpose of Architectural Documentation The documentation shall give the reader good understanding of the application's architecture and design.

More information

Data Mining and Knowledge Discovery Practice notes 2

Data Mining and Knowledge Discovery Practice notes 2 Keywords Data Mining and Knowledge Discovery: Practice Notes Petra Kralj Novak Petra.Kralj.Novak@ijs.si Data Attribute, example, attribute-value data, target variable, class, discretization Algorithms

More information

1 Machine Learning System Design

1 Machine Learning System Design Machine Learning System Design Prioritizing what to work on: Spam classification example Say you want to build a spam classifier Spam messages often have misspelled words We ll have a labeled training

More information

Assignment front sheet

Assignment front sheet Criteria reference To achieve the criteria the evidence must show that the student is able to: Task no. Page numbers P4 Using appropriate design tools, design an interactive website to meet a client need

More information

Structural and Syntactic Pattern Recognition

Structural and Syntactic Pattern Recognition Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent

More information