Chapter 5 Basic System Errors (Alireza Tavakkoli).
-
date post
21-Dec-2015 -
Category
Documents
-
view
229 -
download
0
Transcript of Chapter 5 Basic System Errors (Alireza Tavakkoli).
![Page 1: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/1.jpg)
Chapter 5
Basic System Errors
(Alireza Tavakkoli)
![Page 2: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/2.jpg)
2
Outline
• Matching
• The Receiver Operating Curves (ROC)
• Error Conditions Specific to Biometrics
• Negative Authentication
• Trade-offs
![Page 3: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/3.jpg)
3
Matching
• Definition
• Notations:Biometric Uniqueness
![Page 4: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/4.jpg)
4
Matching Scores
• Similarity measure Prob (B=B’)– Higher match score Higher Prob.
• Similarity d(B’,B)– [0,Inf.) [0,1]
![Page 5: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/5.jpg)
5
The Tail of Two Errors
• Hypothesis Test and Errors:
• Two Errors:– False Match (Type I)– Flase Non-match (Type II)
NonMatchHhypothesisAlternate
MatchHhypothesisNullThe
a
:
: 0
![Page 6: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/6.jpg)
6
Score Distributions
Hard Decision
Reliability of s
![Page 7: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/7.jpg)
7
FMR and FNMR
x
y
a
xFNMRdsHspxF
yFMRdsHspyG
0|
1|
T
s m
T
s
T
nTs nTs a
dsspdsHspTFNRM
dsspdsspdsHspFMR
0|)(
1|
![Page 8: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/8.jpg)
8
Estimating Error from Data
• Access to G(y) & F(x)
• Estimation:
• Need to be studied more
N
jjj
i
M
ii
sN
sN
sG
sM
sM
sF
1
1
#11ˆ
#11ˆ
YY
XX
![Page 9: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/9.jpg)
9
Error Rates of Match Engines
• FM and FNM – Accept/Reject Object
• FA and FR– Accept/Reject Null Hypothesis
![Page 10: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/10.jpg)
10
Positive Authentication
• Errors in Pos. Authentication:– False Accept (FA)– False Reject (FR)
• Problems:– FA Security Breach– FR Convenience Problems
![Page 11: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/11.jpg)
11
ROC
T
TTROC
TTT
1,0
0,1
FNMR,FMRROC
- Design vs Application
- Security vs Convenience
FMR ↑ FNMR ↓
![Page 12: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/12.jpg)
12
Variations of ROCs
Semi-log plots
Log-log plot
![Page 13: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/13.jpg)
13
Using the ROC Curve
• Comparing matchers– Tradeoff between FMR & FNMR.– Specific Threshold FMR(T)/FNMR(T)
![Page 14: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/14.jpg)
14
Expressing Quality of ROC
• The Equal Error Rate:
• d-prime:
• Expected Overall Error
• Cost Function
![Page 15: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/15.jpg)
15
Expressing Quality of ROC
• The Equal Error Rate:
![Page 16: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/16.jpg)
16
Expressing Quality of ROC
• d-prime:
22'
nm
nmd
![Page 17: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/17.jpg)
17
Expressing Quality of ROC
• Expected Overall Error
TEE
pp
pTFNMRpTFMRTE
T
GI
GI
min
1
)(
min
![Page 18: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/18.jpg)
18
Expressing Quality of ROC
• Cost Function
GFAGFNM PFMRCPFNMRCCost 1
![Page 19: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/19.jpg)
19
Error Conditions Specific to Biometrics
• FTAFTEFTU Significant Cost.
• FTA:
• FTE:
• Manual vs Automatic Authentication
• CMC or RPM
![Page 20: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/20.jpg)
20
Negative Authentication
• Negative Hypotheses:
• The Two Errors:– Falsely missing B– Incorrectly matching B
and B’.
![Page 21: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/21.jpg)
21
Negative Authentication
• Detection Theory Terminology:– False Negative– False Positive
![Page 22: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/22.jpg)
22
Trade Offs
• Different Errors Different Outcomes– False Accept Security Breach.– False Reject Inconvenience.
• Convenience vs Security• Cost vs Security• Cost of Negative Authentication
![Page 23: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/23.jpg)
23
Convenience vs Security
• Convenience of a Biometric
• Convenience of Implementation
FAR1
FRR1
Security
eConvenienc
![Page 24: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/24.jpg)
24
Cost vs Security in Pos. Auth.
• Why it is important
– FRR ↑ Service denial Exception handling
• Dynamic Authentication Protocol
FRRCost
![Page 25: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/25.jpg)
25
Cost of Negative Authentication
• Screening:
• Higher FPR&FNR Inconvenient to all
FPR
FNR1
Cost
Security
![Page 26: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/26.jpg)
26
Neg. Vs Pos. Authentiocation
![Page 27: Chapter 5 Basic System Errors (Alireza Tavakkoli).](https://reader036.fdocuments.in/reader036/viewer/2022081506/56649d6a5503460f94a47fae/html5/thumbnails/27.jpg)
27
• Questions?