WO2006128162A2 - Multimodal authorization method, system and device - Google Patents

Multimodal authorization method, system and device Download PDF

Info

Publication number
WO2006128162A2
WO2006128162A2 PCT/US2006/020898 US2006020898W WO2006128162A2 WO 2006128162 A2 WO2006128162 A2 WO 2006128162A2 US 2006020898 W US2006020898 W US 2006020898W WO 2006128162 A2 WO2006128162 A2 WO 2006128162A2
Authority
WO
WIPO (PCT)
Prior art keywords
biometric
specimens
ccv
far
sample
Prior art date
Application number
PCT/US2006/020898
Other languages
French (fr)
Other versions
WO2006128162A3 (en
Inventor
John K. Schneider
Fred W. Kiefer
Leonard Pratt
James T. Baker
Original Assignee
Ultra-Scan Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ultra-Scan Corporation filed Critical Ultra-Scan Corporation
Priority to CA002604201A priority Critical patent/CA2604201A1/en
Priority to GB0718625A priority patent/GB2441237B/en
Publication of WO2006128162A2 publication Critical patent/WO2006128162A2/en
Publication of WO2006128162A3 publication Critical patent/WO2006128162A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2415Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/254Fusion techniques of classification results, e.g. of results related to same input data

Definitions

  • the present invention relates to authorization systems, such as those that are used to authorize a purchase transaction.
  • Biometrics offers a reliable alternative. Biometrics is the method of identifying an individual based on his or her physiological and/or behavioral characteristics. Examples of biometrics include fingerprint, face recognition, hand geometry, voice, iris, and signature verification. Biometrics may be used for immigration, airport, border, and homeland security. Wide scale deployments of biometric applications such as the US-VISIT program are already being done in the United States and elsewhere in the world.
  • biometric identification systems Despite advances in biometric identification systems, several obstacles have hindered their deployment. For example, for every biometric modality there may be some users who have illegible biometrics. For example a recent NIST (National Institute of Standards and Technology) study indicates that approximately 2 to 5% of the population does not have legible fingerprints. Such users would be rejected by a biometric fingerprint identification system during enrollment and verification. Handling such exceptions is time consuming and costly, especially in high volume scenarios such as in retail stores where thousands of transactions may be subject to authentication each day. Using multiple biometrics to authenticate an individual will alleviate this problem; and, using multiple biometrics in a data fusion logic process may achieve a quicker means of acquiring an accurate identification match.
  • NIST National Institute of Standards and Technology
  • biometric systems inherently yield probabilistic results and are therefore not fully accurate. In effect, a certain percentage of the genuine users will be rejected (false non-match) and a certain percentage of impostors will be accepted (false match) by the system.
  • the invention includes a method of authorizing a transaction.
  • at least two biometric specimens are enrolled.
  • a first one of the specimens is a first type, and a second one of the specimens is a second type.
  • a false acceptance ratio (“FAR") is determined for each of the specimens.
  • Authorization options are identified, each option requiring a match to one or more of the biometric specimens.
  • a cost value is calculated for at least one of the options to provide a calculated cost value (“CCV").
  • the CCV may be a function of the FAR(s) of the specimen(s) corresponding to the option.
  • An acceptable cost value range (“ACV range”) may be identified, and compared to the CCV. If it is determined that the CCV is in the ACV range, then the option is selected. If it is determined that the CCV is not in the ACV range, then the option may be discarded for use in authorizing that transaction.
  • ACV range An acceptable cost value range
  • sample set a set of biometric samples is provided (the "sample set").
  • the sample set has biometric samples of the same types as those corresponding to the selected option.
  • the biometric samples are compared to the biometric specimens, and it is determined whether the biometric samples match the biometric specimens. If the biometric samples match the biometric specimens, then the transaction is authorized.
  • the invention may be embodied as a computer readable memory device or a system which is capable of carrying out methods according to the invention.
  • a computer capable of executing computer-readable instructions
  • at least one biometric specimen reader in communication with the computer
  • at least one biometric sample reader in communication with the computer
  • a database in communication with the computer
  • computer- readable instructions provided to the computer for causing the computer to execute certain functions.
  • the instructions may be stored on a memory device and provided from the memory device to the computer.
  • Those functions may include (i) enrolling in the database at least two biometric specimens via one or more of the biometric specimen readers, a first one of the specimens being a first type, and a second one of the specimens being a second type, (ii) determining a false acceptance ratio ("FAR") for each of the specimens, (iii) identifying authorization options, each option requiring a match to one or more of the biometric specimens (iv) calculating a cost value for at least one of the options to provide a calculated cost value ("CCV”), wherein the CCV is a function of the FAR(s) of the specimen(s) corresponding to the option (v) identifying an acceptable cost value range (“ACV range”),
  • the false acceptance ratios may be determined using the following equation
  • the cost values may be determined using the following equation
  • FIG 1 is a schematic diagram of a bimodal biometric point-of-sale system according to the invention.
  • This system uses biometric authentication to authorize a purchase/sale transaction that is being validated by the use of fingerprint and signature biometrics.
  • FIG 2 is a schematic diagram of another biometric point-of-sale system according to the invention.
  • this system it is possible to use several biometric modalities to validate the identification of someone using the system.
  • FIG. 3 illustrates a method according to the invention.
  • Figure 4 illustrates a method according to the invention.
  • Figure 6 which represents example PDFs for three biometrics data sets
  • Figure 9 which is a plot of the two-dimensional fusions of the three biometrics taken two at a time versus the single systems
  • Figure 12 which is a plot of the scores versus signature densities
  • Figure 13 which is a plot of the scores versus facial recognition densities
  • Figure 15 which is the two-dimensional ROC - Histogram interpolations for the three biometrics singly and taken two at a time;
  • Figure 18 which is the three-dimensional ROC similar to Figure 17 but using the Parzen Window method
  • Figure 19 which is a cost function for determining the minimum cost given a desired
  • FIG. 21 which depicts another method according to the invention.
  • FIGS. 1 and 2 illustrate generally systems 10 that may be used to carry out the invention.
  • biometric input devices 13 may be used to provide biometric samples.
  • a network server 16 may provide the samples to a computer 19.
  • the computer 19 may be in communication with a database 22 of biometric specimens, and the computer 19 may be able to determine whether the biometric samples provided at a point- of-sale terminal 25 match biometric specimens stored in the database 22.
  • Figure 3 illustrates a generally a method that may be used to carry out the invention.
  • a buyer registers 50 biometric specimens using one or more biometric readers.
  • the specimens are provided 53 to and stored in a database for later use.
  • the buyer provides 56 biometric samples corresponding to the biometric specimens that were previously stored in the database.
  • the computer compares 59 the specimens to the samples to determine 62 whether there is a match between the set of samples and the set of specimens. If a match is determined 62, the transaction is authorized 65, and funds may be transferred 68 from the buyer's financial institution to the seller's financial institution.
  • Figure 4 illustrates in more detail how such a transaction may be authorized.
  • Figure 3 illustrates the invention with regard to a purchase/sale transaction
  • the invention is not limited to such a transaction, and so Figure 4 illustrates a method according to the invention in general terms.
  • the invention may be implemented as a method executed by an authorization system, such as a facility- access system or a point-of-sale system.
  • the authentication system may be used to determine whether a person should be allowed access to a facility, or whether a financial transaction should be allowed to proceed.
  • the financial transaction may be the purchase of goods or services using a credit account or a debit account maintained by a financial institution such as a bank.
  • biometric identification may be accomplished using multiple biometric types.
  • biometrics include fingerprints, facial images, retinal images, iris scans, hand geometry scans, voice prints, signatures, signature gaits, keystroke tempos, blood vessel patterns, palm prints, skin composition spectrums, lip shape, and ear shape.
  • At least two biometric specimens are enrolled 100.
  • a first one of the specimens maybe a first type, and a second one of the specimens may be a second type.
  • the specimens may be from different body parts.
  • one of the specimens may be a fingerprint and another of the specimens may be an iris scan.
  • one of the specimens may be a fingerprint from a person's thumb, and one of the specimens may be a fingerprint from the person's index finger.
  • the biometric specimens may be saved in a database for later use.
  • a false acceptance ratio (“FAR”) may be determined 103 for each of the specimens in the database. Determining 103 an FAR may be done in a number of ways, but a particular way would be to determine 103 false acceptance ratios using the following equation:
  • Authorization options may be identified 106. Each option may require a match to one or more of the biometric specimens in order for a transaction to be authorized. For example, if three biometric specimens (Sl, S2 and S3) are enrolled 100 in the database, the following authorization options maybe identified 106:
  • Option 1 use Sl by itself to authorize a transaction
  • Option 2 use S2 by itself to authorize a transaction
  • Option 3 use S 1 and S2 together to authorize a transaction
  • Option 4 use S2 and S3 together to authorize a transaction
  • Option 5 use Sl and S3 together to authorize a transaction
  • Option 6 use Sl, S2 and S3 together to authorize a transaction.
  • an authorization option may correspond to a permutation of the set of biometric specimens.
  • a cost value may be calculated 109 for at least one of the options to provide a calculated cost value ("CCV").
  • the CCV may be a function of the specimen FAR or specimen FARs (as the case may be), which correspond to the option. Calculating 109 a CCV may be done in a number of ways, but a particular way would be to calculate the CCV using the following equation:
  • An acceptable cost value range (“ACV range”) may be identified 112 and the CCV for the option may be compared 112 to the ACV range.
  • the ACV may be identified based on experience. For example, it may be known from experience that requiring an ACV of a particular value will produce an indication as to whether a match exists between specimens and samples in a reasonable amount of time and with an acceptable number of false acceptances. If so, then a system administrator may identify 112 and provide the ACV range.
  • the CCV may be compared 115 to the ACV range, and a determination may be made 118 as to whether the CCV is within the ACV.
  • the option corresponding to the CCV may be selected 121, and a request for a set of biometric samples may be made.
  • the samples may be provided 124 and the specimens corresponding to the selected option may be compared 127 to the samples.
  • a determination 130 may be made as to whether each specimen matches one of the samples. If the specimens and samples are determined 130 to match, then the transaction may be authorized 133.
  • Sl is a fingerprint and S2 is an iris scan
  • the user would be prompted to provide a fingerprint sample and an iris scan sample, and these samples would then be provided 121 to a matching process in order to determine 130 whether a match exists between Sl and the fingerprint sample, and also whether a match exists between S2 and the iris scan sample. If a match for the fingerprint and a match for the iris scan are determined 130, then the transaction would be authorized 133. For example, if the transaction is authorized 133, the buyer that supplied the samples would be allowed to purchase goods on credit from a vendor.
  • Figure 5 illustrates a device 200 and a system 201 according to the invention.
  • the invention may be implemented as a computer readable memory device 200 having stored thereon instructions 203 that are executable by a computer 206 that is part of an authorization system 201, which may be used to authorize a transaction.
  • the computer readable memory device 200 may be read-only-memory, such as a compact disc.
  • the memory device 200 may have stored thereon instructions for carrying out a method that is in keeping with the description provided above.
  • the instructions may be executable by the computer 206 to cause the computer 206 to (a) enroll into a database 209 at least two biometric specimens, a first one of the specimens being a first type, and a second one of the specimens being a second type, (b) determine an FAR for each of the specimens, (c) identify authorization options, each option requiring a match to one or more of the biometric specimens, (d) calculate a CCV for at least one of the options, wherein the CCV is a function of the FAR(s) of the specimen(s) corresponding to the option, (e) identify an ACV, (f) compare the CCV to the ACV range, (g) determine whether the CCV is in the ACV range (h) select the option if the CCV is in the ACV range (i) receive and provide a set of biometric sample(s) (the "sample set") corresponding to the specimen type(s) of the selected option (j) compare the biometric sample(s) to the biometric
  • Biometric specimen readers 212 and biometric sample readers 215 may interface with the computer 206 for the purpose of obtaining biometric specimens and biometric samples, respectively, and providing the specimens and samples to the computer 206.
  • the equations for FAR and CCV identified above may be used in the instructions to the computer 206.
  • the invention may be used to provide tokened or tokenless authorization of commercial transactions between a buyer and seller using a computer network system and multiple biometrics.
  • a system may or may not also include a token of some type, such as a credit card, driver's license, identification instrument or the like.
  • a system may also include a PIN or other indexing device to speed the authentication process.
  • biometric fusion is the study of how two or more biometric types (sometimes referred to as modalities) may be used.
  • Algorithms may be used to combine information from two or more biometric modalities.
  • the combined information may allow for more reliable and more accurate identification of an individual than is possible with systems based on a single biometric modality.
  • biometric fusion The combination of information from more than one biometric modality is sometimes referred to herein as "biometric fusion”.
  • Reliable personal authentication is becoming increasingly important. The ability to accurately and quickly identify an individual is important to immigration, law enforcement, computer use, and financial transactions.
  • Biometrics offers a reliable alternative for identifying an individual. Biometrics is the method of identifying an individual based on his or her physiological and behavioral characteristics. Common biometric modalities include fingerprint, face recognition, hand geometry, voice, iris and signature verification. The Federal government will be a leading consumer of biometric applications deployed primarily for immigration, airport, border, and homeland security. Wide scale deployments of biometric applications such as the US-VISIT program are already being done in the United States and else where in the world.
  • biometric identification systems Despite advances in biometric identification systems, several obstacles have hindered their deployment. Every biometric modality has some users who have illegible biometrics. For example a recent NIST (National Institute of Standards and Technology) study indicates that nearly 2 to 5% of the population does not have legible fingerprints. Such users would be rejected by a biometric fingerprint identification system during enrollment and verification. Handling such exceptions is time consuming and costly, especially in high volume scenarios such as an airport. Using multiple biometrics to authenticate an individual may alleviate this problem.
  • NIST National Institute of Standards and Technology
  • biometric systems inherently yield probabilistic results and are therefore not fully accurate. In effect, a certain percentage of the genuine users will be rejected (false non-match) and a certain percentage of impostors will be accepted (false match) by existing biometric systems. High security applications require very low probability of false matches. For example, while authenticating immigrants and international passengers at airports, even a few false acceptances can pose a severe breach of national security. On the other hand false non matches lead to user inconvenience and congestion.
  • the invention may be used to determine whether a set of biometrics is acceptable for making a decision about whether a transaction should be authorized.
  • the data set may be comprised of information pieces about objects, such as people. Each object may have at least two types of information pieces, that is to say the data set may have at least two modalities.
  • each object represented in the database may by represented by two or more biometric samples, for example, a fingerprint sample and an iris scan sample.
  • a first probability partition array (“Pm(i J)”) may be provided.
  • the Pm(i,j) may be comprised of probability values for information pieces in the data set, each probability value in the Pm(i,j) corresponding to the probability of an authentic match.
  • Pm(i,j) may be similar to a Neyman- Pearson Lemma probability partition array.
  • a second probability partition array (“Pfm(i J)”) may be provided, the Pfm(i j) being comprised of probability values for information pieces in the data set, each probability value in the Pfm(i,j) corresponding to the probability of a false match.
  • Pfm(i,j) may be similar to a Neyman-Pearson Lemma probability partition array.
  • a method may identify a no-match zone.
  • the no-match zone may be identified by identifying a first index set ("A"), the indices in set A being the (i j) indices that have values in both Pfm(i j) and Pm(ij).
  • a second index set (“Z ⁇ ") may be identified, the indices of Z ⁇ being the (ij) indices in set A where both Pfm(ij) is larger than zero and Pm(i j) is equal to zero.
  • FAR z ⁇ may be determined, where
  • FAR 2 1 - / P fm (z,/) .
  • FAR z ⁇ may be compared to a desired false-acceptance- rate ("FAR"), and if FAR z ⁇ is greater than the desired false-acceptance-rate, than the data set may be rejected for failing to provide an acceptable false-acceptance-rate. IfFAR z ⁇ is less than or equal to the desired false-acceptance-rate, then the data set may be accepted, if false- rejection-rate is not important.
  • FAR false-acceptance- rate
  • the method may further include identifying a third index set ZM ⁇ , the indices of ZM ⁇ being the (ij) indices in Z ⁇ plus those indices where both Pfm(ij) and Pm(ij) are equal to zero.
  • a fourth index set (“C") may be identified, the indices of C being the (i,j) indices that are in A but not ZM ⁇ .
  • the indices of C may be arranged 1 suc ih x tihat . i-nd iex.
  • a _ fi c-ftmh i •nd iex set (“Cn") may be identified.
  • the indices of Cn may be the first N (i,j) indices of the arranged C index, where N is a number for which the following is true: he FRRmaybe
  • the data set may be rejected, even though FAR z ⁇ is less than or equal to the desired false-acceptance-rate. Otherwise, the data set may be accepted.
  • the false-rejection-rate calculations and comparisons may be executed before the false-acceptance-rate calculations and comparisons.
  • a first index set (“A") may be identified, the indices in A being the (i,j) indices that have values in both Pfm(i,j) and Pm(i,j).
  • a second index set (“Z ⁇ ") may be identified, the indices of Zoo being the (i,j) indices of A where Pm(i,j) is equal to zero.
  • a third index set (“C”) maybe identified, the indices of C being the (i,j) indices that are in A
  • the indices of C may be arranged such tha provide an arranged C index, and a fourth index set ("Cn") may be identified.
  • the indices of Cn may be the first N (i,j) indices of the arranged C index, where N is a number for which the following is true: ⁇
  • FRR may be det ed false- rejection-rate. If the FRR is greater than the desired false-rejection-rate, then the data set may be rejected. If the FRR is less than or equal to the desired false-rejection-rate, then the data set may be accepted, if false- acceptance-rate is not important. If false-acceptance-rate is important, then the FAR z ⁇ may be determined, where The FAR z ⁇ may be compared to a desired false-acceptance-rate, and if FAR z ⁇ is greater than the desired false-acceptance-rate, then the data set may be rejected even though FRR is less than or equal to the desired false-rejection-rate. Otherwise, the data set may be accepted.
  • the invention may also be embodied as a computer readable memory device for executing any of the methods described above.
  • Biometric fusion may be viewed as an endeavor in statistical decision theory [1] [2]; namely, the testing of simple hypotheses.
  • This disclosure uses the term simple hypothesis as used in standard statistical theory: the parameter of the hypothesis is stated exactly.
  • the hypotheses that a biometric score "is authentic” or "is from an impostor” are both simple hypotheses.
  • the test observation x e S, where S c R N (Euclidean N-space) is the score sample space, is a vector function of a random variable X from which is observed a random sample (X 1 , X 2 , ... , X N ) .
  • the distribution of scores is provided by the joint class-conditional probability density function ("pdf ') :
  • the decision logic is to accept H 1 (declare a match) if a test observation, x, belongs to R Au or to accept Ho (declare no match and hence reject H 1 ) if x belongs to R Ira .
  • Each hypothesis is associated with an error type: A Type I error occurs when Ho is rejected (accept H 1 ) when Ho is true; this is a false accept (FA); and a Type II error occurs when H 1 is rejected (accept Ho) when H 1 is true; this is a false reject (FR).
  • F false accept
  • FR false reject
  • the impostor score's pdf is integrated over the region which would declare a match (Equation 2).
  • the false-rejection-rate (FRR) is computed by integrating the pdf for the authentic scores over the region in which an impostor (Equation 3) is declared.
  • the correct-acceptance-rate (CAR) is 1-FRR.
  • the class-conditional pdf for each individual biometric is assumed to have finite support; that is, the match scores produced by the i th biometric belong to a closed interval of the real line where Two observations are made.
  • the marginal pdf, which we will often reference, for any of the individual biometrics can be written in terms of the joint pdf:
  • Identification is a one-to-many template comparison to recognize an individual (identification attempts to establish a person's identity without the person having to claim an identity).
  • the receiver operation characteristics (ROC) curve is a plot of CAR versus FAR, an example of which is shown in Figure 8. Because the ROC shows performance for all possible specifications of FAR, as can be seen in the Figure 8, it is an excellent tool for comparing performance of competing systems, and we use it throughout our analyses.
  • Biometrics may or may not be statistically independent of each other.
  • the class conditional pdf can be multi-modal (have local maximums) or have no modes.
  • the underlying pdf is assumed to be nonparametric (no set of parameters define its shape, such as the mean and standard deviation for a Gaussian distribution).
  • a fixed threshold is used as the decision making process to accept or reject H 1 at each sensor and solve for thresholds that minimize the cost function. It will obtain settings that minimize cost, but it will not necessarily be the cheapest cost. Given a more accurate way to make decisions, the cost will drop. And if the decision method guarantees the most powerful test at each decision point it will have the optimal cost.
  • This test may be used as the centerpiece of the biometric fusion logic employed in the invention.
  • the Neyman-Pearson Lemma guarantees the validity of the test.
  • the proof of the Lemma is slightly different than those found in other sources, but the reason for presenting it is because it is immediately amenable to proving the Corollary to the Neyman Pearson Lemma.
  • the corollary is extended to state that fusing N biometric scores is better than fusing N-I scores
  • u is a maximum if ⁇ is chosen such tha s satisfied.
  • the Neyman-Pearson Lemma Proofs of the Neyman-Pearson Lemma can be found in their paper [4] or in many texts [1] [2]. The proof presented here is somewhat different. An "in-common" region, R IC is established between two partitions that have the same FAR. It is possible this region is empty. Having R, c makes it easier to prove the corollary presented.
  • R ⁇ is the best critical region for declaring a match - it gives the largest correct- acceptance-rate (CAR), hence R ⁇ gives the smallest FRR.
  • R ⁇ 1 is the only region for which Equation (7) holds.
  • Neyman-Pearson Test Accuracy Improves with Additional Biometrics: The fact that accuracy improves with additional biometrics is an extremely important result of the Neyman-Pearson Lemma. Under the assumed class conditional densities for each biometric, the Neyman-Pearson Test provides the most powerful test over any other test that considers less than all the biometrics available. Even if a biometric has relatively poor performance and is highly correlated to one or more of the other biometrics, the fused CAR is optimal. The corollary for N-biometrics versus a single component biometric follows.
  • the corollary can be extended to the general case.
  • Proposition #5 Recall that the r is an ordered sequence of decreasing ratios with known numerators and denominators. We sum the first N numerators to get S n and sum the first N denominators to get Sa- We will show that for the value S n , there is no other collection
  • Cost Functions for Optimal Verification and Identification In the discussion above, it is assumed that all N biometric scores are simultaneously available for fusion. The Neyman- Pearson Lemma guarantees that this provides the most powerful test for a fixed FAR. In practice, however, this could be an expensive way of doing business. If it is assumed that all aspects of using a biometric system, time, risk, etc., can be equated to a cost, then a cost function can be constructed. The inventive process described below constructs the cost function and shows how it can be minimized using the Neyman-Pearson test. Hence, the Neyman-Pearson theory is not limited to "all-at-once" fusion; it can be used for serial, parallel, and hierarchal systems.
  • a first cost function for a verification system and a second cost function for an identification system are described.
  • an algorithm is presented that uses the Neyman-Pearson test to minimize the cost function for a second order biometric system, that is a biometric system that has two modalities.
  • the cost functions are presented for the general case of N- biometrics. Because minimizing the cost function is recursive, the computational load grows exponentially with added dimensions. Hence, an efficient algorithm is needed to handle the general case.
  • a cost function for a 2-stage biometric verification (one-to-one) system will be described, and then an algorithm for minimizing the cost function will be provided.
  • a subject may attempt to be verified by a first biometric device. If the subject's identity cannot be authenticated, the subject may attempt to be authenticated by a second biometric. If that fails, the subject may resort to manual authentication. For example, manual authentication may be carried out by interviewing the subject and determining their identity from other means.
  • the cost for attempting to be authenticated using a first biometric, a second biometric, and a manual check are C 1 , c 2 , and C 3 , respectively.
  • the specified FAR sys is a system false- acceptance-rate, i.e. the rate of falsely authenticating an impostor includes the case of it happening at the first biometric or the second biometric. This implies that the first-biometric station test cannot have a false-acceptance-rate, FAR 1 , that exceeds FAR sys .
  • FRR 1 false-rejection-rate
  • FAR 2 is a function of the specified FAR sys and the freely chosen FAR 1 ; FAR 2 is not a free parameter.
  • FRR 2 false-rejection-rate
  • the Cost in Equation 30 is a function OfFAR 1 .
  • OfFAR 1 that yields the smallest cost and we present an algorithm to find that value.
  • a modified version of the Neyman-Pearson decision test has been developed so that the smallest cost is optimally small.
  • Equation 30 An algorithm is outlined below. The algorithm seeks to optimally minimize Equation 30. To do so, we (a) set the initial cost estimate to infinity and, (b) for a specified FAR sys , loop over all possible values O In practice, the algorithm may use a uniformly spaced finite sample of the infinite possible values. The algorithm may proceed as follows: (c) set nd (e) loop over possible FAR 1 values.
  • the algorithm may proceed to (f) find the optimal Match-Zzone, R 1 , and (g) compute the correct-acceptance-rate over R 1 by:
  • the algorithm may test against the second biometric. Note that the region R 1 of the score space is no longer available since the first biometric test used it up.
  • the final steps in the algorithm are (j) to compute the cost using Equation 30 at the current setting of FAR 1 using FRR 1 and FRR 2 , and (k) to reset the minimum cost if cheaper, and keep track of the FAR 1 responsible for the minimum cost.
  • the authentic distributions for the three biometric systems may be forced to be highly correlated and the impostor distributions to be lightly correlated.
  • the correlation coefficients (p) are shown in Table 2. The subscripts denote the connection.
  • a plot of the joint pdf for the fusion of system #1 with system #2 is shown in Figure 7, where the correlation between the authentic distributions is quite evident.
  • Figure 10 depicts the results when fusing all three systems and comparing its performance with the performance of the 2-system pairs.
  • the addition of the third biometric system gives substantial improvement over the best performing pair of biometrics.
  • Tests were conducted on individual and fused biometric systems in order to determine whether the theory presented above accurately predicts what will happen in a real-world situation. The performance of three biometric systems were considered. The numbers of score samples available are listed in Table 3. The scores for each modality were collected independently from essentially disjoint subsets of the general population.
  • the initial thought was to build a "virtual" match from the data of Table 3. Assuming independence between the biometrics, a 3 -tuple set of data was constructed.
  • the 3 -tuple set was an ordered set of three score values, by arbitrarily assigning a fingerprint score and a facial recognition score to each signature score for a total of 990 authentic score 3-tuples and 325,710 impostor score 3-tuples.
  • the class condition density functions for each of the three modalities, f stgnat ⁇ e ( ⁇ I ⁇ ) an d / fac i al ( x I ⁇ ) were estimated using the available sampled data.
  • the authentic score densities were approximated using two methods: (1) the histogram- interpolation technique and (2) the Parzen-window method.
  • the impostor densities were approximated using the histogram-interpolation method. Although each of these estimation methods are guaranteed to converge in probability to the true underlying density as the number of samples goes to infinity, they are still approximations and can introduce error into the decision making process, as will be seen in the next section.
  • the densities for fingerprint, signature, and facial recognition are shown in Figure 11, Figure 12 and Figure 13 respectively. Note that the authentic pdf for facial recognition is bimodal.
  • the Neyman- Pearson test was used to determine the optimal ROC for each of the modalities.
  • the ROC curves for fingerprint, signature, and facial recognition are plotted in Figure 14.
  • the Neyman-Pearson Lemma guarantees that this provides the most powerful test for a fixed FAR. In practice, however, this could be an expensive way of doing business. If it is assumed that all aspects of using a biometric system, time, risk, etc., can be equated to a cost, then a cost function can be constructed. Below, we construct the cost function and show how it can be minimized using the Neyman-Pearson test. Hence, the Neyman-Pearson theory is not limited to "all-at-once" fusion - it can be used for serial, parallel, and hierarchal systems.
  • the costs for using the first biometric, the second biometric, and the manual check arec, ,c 2 , andc 3 , respectively, and FAR sys is specified.
  • the first-station test cannot have a false-acceptance- rate, FAR 1 , that exceeds FAR sys .
  • FAR 1 false-acceptance- rate
  • FRR 1 false-rejection-rate
  • FAR 2 FAR sys - FAR 1 .
  • Step 1 set the initial cost estimate to infinity and, for a specified FAR sys , loop over all possible values of FAR 1 ⁇ FAR sys .
  • Step 2
  • FAR 2 FAR sys - FAR j is computed.
  • Step 3 FAR 2 is used in the Neyman-Pearson test to determine the most powerful test, CAR 2 , for the second biometric fused with the first biometric over the reduced decision space R 1 0 .
  • the critical region for CAR 2 is R 2 , which is disjoint from R 1 by the construction. Score pairs that result in the failure to be
  • Step 4 compute the cost at the current setting of FAR 1 using FRR 1 andFRR 2 .
  • Step 20 5 reset the minimum cost if cheaper, and keep track of the FAR, responsible for the minimum cost.
  • a typical cost function is shown in Figure 19.
  • Equation 35 there is 1 degree of freedom, namely FAR 1 .
  • Equation 35 has N-I degrees of freedom.
  • FAR 1 ⁇ FAR sys are set, then FAR 2 ⁇ FAR 1 can bet set, then FAR 3 ⁇ FAR 2 , and so on - and to minimize thus, N-I levels of recursion.
  • Identification one-to-many systems are discussed. With this construction, each station attempts to discard impostors. Candidates that cannot be discarded are passed on to the next station. Candidates that cannot be discarded by the biometric systems arrive at the manual checkout. The goal, of course, is to prune the number of impostor templates thus limiting the number that move on to subsequent steps. This is a logical AND process - for an authentic match to be accepted, a candidate must pass the test at station 1 and station 2 and station 3 and so forth. In contrast to a verification system, the system administrator must specify a system false-rejection-rate, FRR sys instead of a FAR sys .
  • equation 37 may be written as:
  • Equations 34 and 35 are a mathematical dual of Equations 34 and 35 are thus minimized using the logic of the algorithm that minimizes the verification system.
  • the optimal fusion algorithm uses the probability of an authentic match and the probability of a false match for each P 0 - e P . These probabilities may be arrived at by numerical integration of the sampled surface of the joint pdf. A sufficient number of samples may be generated to get a "smooth" surface by simulation. Given a sequence of matching score pairs and non-matching score pairs, it is possible to construct a numerical model of the marginal cumulative distribution functions (cdf). The distribution functions may be used to generate pseudo random score pairs. If the marginal densities are independent, then it is straightforward to generate sample score pairs independently from each cdf. If the densities are correlated, we generate the covariance matrix and then use Cholesky factorization to obtain a matrix that transforms independent random deviates into samples that are appropriately correlated.
  • cdf marginal cumulative distribution functions
  • the joint pdf for both the authentic and impostor cases may be built by mapping simulated score pairs to the appropriate j> tJ e P and incrementing a counter for that sub-square. That is, it is possible to build a 2-dimensional histogram, which is stored in a 2-dimensional array of appropriate dimensions for the partition. If we divide each array element by the total number of samples, we have an approximation to the probability of a score pair falling within the associated sub-square. We call this type of an array the probability partition array (PPA). Let P fm be the PPA for the joint false match distribution and let P m be the PPA for the authentic match distribution.
  • Step 1 Assume a required FAR has been given.
  • Step 2 Allocate the array P inz to have the same dimensions as P 1n and
  • Step 5 e process only those indices in B. This does not affect optimality because there is most likely zero probability that either a false match score pair or a false reject score pair falls into any sub-square indexed by elements of Z. Step 6. Identify all indices in B such that nd store those indices in mply put, this index set includes the indexes to all the sub-squares that have zero probability of a match but 5 non-zero probability of false match.
  • Step 7 Tag all the sub-squares in P m2 indexed by Z 00 as belonging to the no-match zone. At this point, the probability of a matching score pair falling into the no-match zone is zero. The probability of a non- matching score pair falling into the match zone is:
  • Step 8 Otherwise, we construct a new index set
  • Step 9 Let CN be the index set that contains the first N indices in C. We 0 determine N so that:
  • Step 10 Label elements OfP m2 indexed by members of CN as belonging to the no-match zone. This results in a FRR given by
  • the notation "(i,j)” is used to identify arrays that have at least two modalities. Therefore, the notation “(i,j)” includes more than two modalities, for example (ij,k), (ij,k,l), (i,j,k,l,m), etc.
  • Figure 20 illustrates one method according to the invention in which
  • a first index set (“A") may be identified.
  • the indices in set A maybe the (i,j) indices that have values in both Pfm(i,j) and Pm(i,j).
  • a second index set (“Zoo") maybe identified, the indices of Z ⁇ being the (i,j) indices in set A where both Pfm(ij) is larger than zero and Pm(ij) is equal to zero.
  • FAR z ⁇ 319 where should be noted that the indices of Z ⁇ may be the indices in set A where Pm(i,j) is equal to zero, since the indices where both
  • FAR z ⁇ may be compared 322 to a desired false-acceptance-rate ("FAR"), and if FAR Z oo is less than or equal to the desired false-acceptance-rate, then the data set may be accepted, if false-rejection-rate is not important. IfFAR z ⁇ is greater than the desired false-acceptance- rate, then the data set may be rejected 325.
  • FAR false-acceptance-rate
  • indices in a match zone may be selected, ordered, and some of the indices may be selected for further calculations 328.
  • the method may further include identifying a third index set ZM ⁇ , which may be thought of as a modified Z ⁇ , that is to say a modified no-match zone.
  • ZM ⁇ may be thought of as a modified Z ⁇ , that is to say a modified no-match zone.
  • the indices of ZM ⁇ may be the (i,j) indices in Z ⁇ plus those indices where both Pfm(i,j) and Pm(i,j) are equal to zero.
  • the indices of C may be the (i,j) indices that are in A but not ZM ⁇ .
  • the indices of C may be arranged
  • Cn may be identified.
  • the indices of Cn may be the first N (i j) indices of the arranged C index, where N is a number for which the following is true:
  • the FRR may be determined 331, where and compared
  • the data set may be rejected 337, even though FAR z ⁇ is less than or equal to the desired false-acceptance-rate. Otherwise, the data set maybe accepted.
  • Figure 21 illustrates another method according to the invention in which the FRR may be calculated first.
  • a first index set (“A") may be identified, the indices in A being the (i j) indices that have values in both Pfm(i j) and Pm(i j).
  • a second index set (“Z ⁇ "), which is the no match zone, may be identified 316.
  • the indices of Z ⁇ may be the (i j) indices of A where Pm(i j) is equal to zero.
  • a third index set (“C”) may be identified, the indices of C being the (i,j) indices that are in A but not Z ⁇ .
  • the indices of C may be arranged such that
  • a fourth index set ( Cn ) may be identified.
  • the indices of Cn may be the first N (i j) indices of the arranged C index, W
  • N is a number for which the following is true: he FRR may be
  • the data set may be rejected. If the FRR is less than or equal to the desired false-rejection-rate, then the data set may be accepted, if false-acceptance-rate is not important. If false-acceptance-rate is important, the
  • FAR z ⁇ may be determined, where Since the more inclusive definition is used for Z ⁇ in this method, and that more contributingi affect the value of FAR z ⁇ , we need not add back the indices where both The FAR z ⁇ may be compared to a desired false-acceptance-rate, and if FAR zoo is greater than the desired false-acceptance-rate, then the data set may be rejected. Otherwise, the data set may be accepted.
  • step 1 provide a first probability partition array the Pm(ij) being comprised of probability values for information pieces in the data set, each probability value in the Pm(i,j) corresponding to the probability of an authentic match;
  • step 2 provide a second probability partition array he Pfm(i,j) being comprised of probability values for information pieces in the data set, each probability value in the Pfm(i,j) corresponding to the probability of a false match;
  • step 3 identify a first index set ("A") ? the indices in set A being the (i,j) indices that have values in both Pfm(ij) and Pm(ij);
  • step 4 execute at least one of the following: (a) identify a first no-match zone ("Zl ⁇ ") that includes at least the indices of set A for which both Pfm(ij) is larger than zero and Pm(Ij) is equal to zero, and use Zl ⁇ to determine FAR zoo, wher nd compare FAR z ⁇ to a desired false-acceptance-rate, and if FAR z ⁇ is greater than the desired false-acceptance-rate, then reject the data set;
  • Zl ⁇ a first no-match zone
  • (b) identify a second no-match zone ("Z2 ⁇ ") that includes the indices of set A for which Pm(i,j) is equal to zero, and use Z2 ⁇ to identify a second index set ("C"), the indices of C being the (i,j) indices that are in A but not Z2 ⁇ , and arrange i t. 1 he ( / i•,i - ⁇ ) i •nd J i-ces o mf C suc 1 h , t.
  • the data set may be accepted.
  • Zl ⁇ may be expanded to include additional indices of set A by including in Zl ⁇ the indices of A for which Pm(ij) is equal to zero. In this manner, a single no-match zone may be defined and used for the entire step 4.

Abstract

The invention includes methods, systems and devices for authenticating transactions. A method may begin by enrolling at least two biometric specimens to a database. A false acceptance ratio ('FAR') is determined for each of the specimens, and authorization options are identified. A cost value is calculated for at least one of the options to provide a calculated cost value ('CCV'). The CCV may be a function of the FAR(s) of the specimen(s) corresponding to the option. An acceptable cost value range ('ACV range') may be identified, and compared to the CCV. If it is determined that the CCV is in the ACV range, then the option is selected. If the CCV is in the ACV range, then a set of biometric samples is provided (the 'sample set'). The sample set is compared to the biometric specimens, and it is determined whether the biometric samples match the biometric specimens. If the biometric samples match the biometric specimens, then the transaction is authorized.

Description

MULTIMODAL AUTHORIZATION METHOD, SYSTEM AND DEVICE Cross-Reference to Related Applications
This application claims the benefit of priority to U.S. provisional patent application serial number 60/685,429, filed on May 27, 2005.
Field of the Invention
The present invention relates to authorization systems, such as those that are used to authorize a purchase transaction.
Background of the Invention
Reliable personal authentication is becoming increasingly important. For example, transactions that rely man-made personalized tokens or other identifying instruments to verify the identity of an individual are being targeted by criminals to engage in identity theft. Traditional security measures rely on knowledge-based approaches such as passwords and PINs or on token-based approaches such as swipe cards and photo identification to establish the identity of individuals. Despite being widely used, these are not very secure forms of identification. It is estimated that hundreds of millions of dollars are lost annually in credit card fraud in the United States due to consumer misidentification and identity theft. Biometrics offers a reliable alternative. Biometrics is the method of identifying an individual based on his or her physiological and/or behavioral characteristics. Examples of biometrics include fingerprint, face recognition, hand geometry, voice, iris, and signature verification. Biometrics may be used for immigration, airport, border, and homeland security. Wide scale deployments of biometric applications such as the US-VISIT program are already being done in the United States and elsewhere in the world.
Despite advances in biometric identification systems, several obstacles have hindered their deployment. For example, for every biometric modality there may be some users who have illegible biometrics. For example a recent NIST (National Institute of Standards and Technology) study indicates that approximately 2 to 5% of the population does not have legible fingerprints. Such users would be rejected by a biometric fingerprint identification system during enrollment and verification. Handling such exceptions is time consuming and costly, especially in high volume scenarios such as in retail stores where thousands of transactions may be subject to authentication each day. Using multiple biometrics to authenticate an individual will alleviate this problem; and, using multiple biometrics in a data fusion logic process may achieve a quicker means of acquiring an accurate identification match.
Furthermore, unlike password or PIN based systems, biometric systems inherently yield probabilistic results and are therefore not fully accurate. In effect, a certain percentage of the genuine users will be rejected (false non-match) and a certain percentage of impostors will be accepted (false match) by the system.
Summary of the Invention
The invention includes a method of authorizing a transaction. In one such method, at least two biometric specimens are enrolled. A first one of the specimens is a first type, and a second one of the specimens is a second type. A false acceptance ratio ("FAR") is determined for each of the specimens. Authorization options are identified, each option requiring a match to one or more of the biometric specimens. A cost value is calculated for at least one of the options to provide a calculated cost value ("CCV"). The CCV may be a function of the FAR(s) of the specimen(s) corresponding to the option.
An acceptable cost value range ("ACV range") may be identified, and compared to the CCV. If it is determined that the CCV is in the ACV range, then the option is selected. If it is determined that the CCV is not in the ACV range, then the option may be discarded for use in authorizing that transaction.
If the CCV is in the ACV range, then a set of biometric samples is provided (the "sample set"). The sample set has biometric samples of the same types as those corresponding to the selected option. The biometric samples are compared to the biometric specimens, and it is determined whether the biometric samples match the biometric specimens. If the biometric samples match the biometric specimens, then the transaction is authorized. The invention may be embodied as a computer readable memory device or a system which is capable of carrying out methods according to the invention. In one such system, there is (a) a computer capable of executing computer-readable instructions, (b) at least one biometric specimen reader in communication with the computer, (c) at least one biometric sample reader in communication with the computer, (d) a database, and (e) computer- readable instructions provided to the computer for causing the computer to execute certain functions. The instructions may be stored on a memory device and provided from the memory device to the computer. Those functions may include (i) enrolling in the database at least two biometric specimens via one or more of the biometric specimen readers, a first one of the specimens being a first type, and a second one of the specimens being a second type, (ii) determining a false acceptance ratio ("FAR") for each of the specimens, (iii) identifying authorization options, each option requiring a match to one or more of the biometric specimens (iv) calculating a cost value for at least one of the options to provide a calculated cost value ("CCV"), wherein the CCV is a function of the FAR(s) of the specimen(s) corresponding to the option (v) identifying an acceptable cost value range ("ACV range"),
(vi) comparing the CCV to the ACV range, (vii) determining whether the CCV is in the ACV range, (viii) selecting the option if the CCV is in the ACV range, (ix) providing a set of biometric sample(s) (the "sample set") via one or more of the biometric sample readers, the sample set having biometric sample(s) of the same type(s) as those corresponding to the selected option (x) comparing the biometric sample(s) to the biometric specimen(s) (xi) determining whether the biometric sample(s) match the biometric specimen(s) (xi) if the biometric sample(s) match the biometric specimen(s), then authorizing the transaction.
The false acceptance ratios may be determined using the following equation The cost values may be determined using
Figure imgf000004_0002
the following equation Cost .
Figure imgf000004_0001
Brief Description Of The Drawings For a fuller understanding of the nature and objects of the invention, reference should be made to the accompanying drawings and the subsequent description. Briefly, the drawings are:
Figure 1, which is a schematic diagram of a bimodal biometric point-of-sale system according to the invention. This system uses biometric authentication to authorize a purchase/sale transaction that is being validated by the use of fingerprint and signature biometrics.
Figure 2, which is a schematic diagram of another biometric point-of-sale system according to the invention. In this system, it is possible to use several biometric modalities to validate the identification of someone using the system.
Figure 3 illustrates a method according to the invention.
Figure 4 illustrates a method according to the invention.
Figure 5, which illustrates certain aspects of a device and a system according to the invention;
Figure 6, which represents example PDFs for three biometrics data sets;
Figure 7, which represents a joint PDF for two systems;
Figure 8, which is a plot of the receiver operating curves (ROC) for three biometrics;
Figure 9, which is a plot of the two-dimensional fusions of the three biometrics taken two at a time versus the single systems;
Figure 10, which is a plot the fusion of all three biometric systems;
Figure 11, which is a plot of the scores versus fingerprint densities;
Figure 12, which is a plot of the scores versus signature densities; Figure 13, which is a plot of the scores versus facial recognition densities;
Figure 14, which is the ROC for the three individual biometric systems;
Figure 15, which is the two-dimensional ROC - Histogram interpolations for the three biometrics singly and taken two at a time;
Figure 16, which is the two-dimensional ROC similar to Figure 15 but using the
Parzen Window method;
Figure 17, which is the three-dimensional ROC similar to Figure 15 and interpolation;
Figure 18, which is the three-dimensional ROC similar to Figure 17 but using the Parzen Window method;
Figure 19, which is a cost function for determining the minimum cost given a desired
FAR and FRR;
Figure 20, which depicts a method according to the invention; and
Figure 21, which depicts another method according to the invention.
Further Description of the Invention Figures 1 and 2 illustrate generally systems 10 that may be used to carry out the invention. In these figures there are shown biometric input devices 13, which may be used to provide biometric samples. A network server 16 may provide the samples to a computer 19. The computer 19 may be in communication with a database 22 of biometric specimens, and the computer 19 may be able to determine whether the biometric samples provided at a point- of-sale terminal 25 match biometric specimens stored in the database 22.
Figure 3 illustrates a generally a method that may be used to carry out the invention. In Figure 3 a buyer registers 50 biometric specimens using one or more biometric readers. The specimens are provided 53 to and stored in a database for later use. When a buyer desires to purchase goods or services from a seller, the buyer provides 56 biometric samples corresponding to the biometric specimens that were previously stored in the database. The computer then compares 59 the specimens to the samples to determine 62 whether there is a match between the set of samples and the set of specimens. If a match is determined 62, the transaction is authorized 65, and funds may be transferred 68 from the buyer's financial institution to the seller's financial institution.
Figure 4 illustrates in more detail how such a transaction may be authorized. Although Figure 3 illustrates the invention with regard to a purchase/sale transaction, the invention is not limited to such a transaction, and so Figure 4 illustrates a method according to the invention in general terms. The invention may be implemented as a method executed by an authorization system, such as a facility- access system or a point-of-sale system. The authentication system may be used to determine whether a person should be allowed access to a facility, or whether a financial transaction should be allowed to proceed. For example, the financial transaction may be the purchase of goods or services using a credit account or a debit account maintained by a financial institution such as a bank.
According to the invention, biometric identification may be accomplished using multiple biometric types. For example, the types of biometrics that may be used include fingerprints, facial images, retinal images, iris scans, hand geometry scans, voice prints, signatures, signature gaits, keystroke tempos, blood vessel patterns, palm prints, skin composition spectrums, lip shape, and ear shape.
In one such method or authorizing a transaction, at least two biometric specimens are enrolled 100. A first one of the specimens maybe a first type, and a second one of the specimens may be a second type. For example, the specimens may be from different body parts. For example, one of the specimens may be a fingerprint and another of the specimens may be an iris scan. Or, one of the specimens may be a fingerprint from a person's thumb, and one of the specimens may be a fingerprint from the person's index finger. The biometric specimens may be saved in a database for later use. A false acceptance ratio ("FAR") may be determined 103 for each of the specimens in the database. Determining 103 an FAR may be done in a number of ways, but a particular way would be to determine 103 false acceptance ratios using the following equation:
Figure imgf000008_0001
Details corresponding to this equation are given later in this document.
Authorization options may be identified 106. Each option may require a match to one or more of the biometric specimens in order for a transaction to be authorized. For example, if three biometric specimens (Sl, S2 and S3) are enrolled 100 in the database, the following authorization options maybe identified 106:
Option 1: use Sl by itself to authorize a transaction, Option 2: use S2 by itself to authorize a transaction,
Option 3 : use S 1 and S2 together to authorize a transaction,
Option 4: use S2 and S3 together to authorize a transaction,
Option 5: use Sl and S3 together to authorize a transaction, and
Option 6: use Sl, S2 and S3 together to authorize a transaction.
It will be noted that the possible options may correspond to an arrangement of all or part of the set of biometric specimens. As such, an authorization option may correspond to a permutation of the set of biometric specimens.
To illustrate the concept, consider that if Option 1 is selected, then in order to authorize a transaction, a person would need to provide a biometric sample of the same type as specimen S 1 , and the sample would need to match specimen S 1. There are many ways to determine matches between specimens and samples, and those will not be detailed herein.
As another example, if Option 4 is selected, then in order to authorize a transaction, a person would need to provide a first biometric sample of the same type as specimen S2, as well as a second biometric sample of the same type as specimen S3. In addition, the first sample would need to match S2 and the second sample would need to match S3. A cost value may be calculated 109 for at least one of the options to provide a calculated cost value ("CCV"). The CCV may be a function of the specimen FAR or specimen FARs (as the case may be), which correspond to the option. Calculating 109 a CCV may be done in a number of ways, but a particular way would be to calculate the CCV using the following equation:
Figure imgf000009_0001
Details corresponding to this equation are given later in this document.
An acceptable cost value range ("ACV range") may be identified 112 and the CCV for the option may be compared 112 to the ACV range. The ACV may be identified based on experience. For example, it may be known from experience that requiring an ACV of a particular value will produce an indication as to whether a match exists between specimens and samples in a reasonable amount of time and with an acceptable number of false acceptances. If so, then a system administrator may identify 112 and provide the ACV range. The CCV may be compared 115 to the ACV range, and a determination may be made 118 as to whether the CCV is within the ACV.
If the CCV is in the ACV range, the option corresponding to the CCV may be selected 121, and a request for a set of biometric samples may be made. Upon receiving biometric samples of the same type required by the selected option the samples may be provided 124 and the specimens corresponding to the selected option may be compared 127 to the samples. A determination 130 may be made as to whether each specimen matches one of the samples. If the specimens and samples are determined 130 to match, then the transaction may be authorized 133.
For example, if the cost values of the six options identified above are:
CVl = 1.2
CV2 = 2.2
CV3 = 0.3 CV4 = 0.9
CV5 - 5.0
CV6 = 3.4
and if the ACV range is selected to be cost values that are less than 2.1, then Options 1, 3 and 4 would be identified as acceptable because they each have a CCV that is less than the ACV. Options 2, 5 and 6 would be deemed unacceptable because they each have a CCV that is above 2.1. Of those options that are identified as acceptable, one of the options may be selected 121, for example, Option 3 may be selected 121 because it has the lowest cost value. The user would then be prompted to provide samples according to Option 3, that is one sample of the same type as Sl and one sample of the same type as S2. If Sl is a fingerprint and S2 is an iris scan, the user would be prompted to provide a fingerprint sample and an iris scan sample, and these samples would then be provided 121 to a matching process in order to determine 130 whether a match exists between Sl and the fingerprint sample, and also whether a match exists between S2 and the iris scan sample. If a match for the fingerprint and a match for the iris scan are determined 130, then the transaction would be authorized 133. For example, if the transaction is authorized 133, the buyer that supplied the samples would be allowed to purchase goods on credit from a vendor.
Figure 5 illustrates a device 200 and a system 201 according to the invention. The invention may be implemented as a computer readable memory device 200 having stored thereon instructions 203 that are executable by a computer 206 that is part of an authorization system 201, which may be used to authorize a transaction. For example, the computer readable memory device 200 may be read-only-memory, such as a compact disc. The memory device 200 may have stored thereon instructions for carrying out a method that is in keeping with the description provided above. For example, the instructions may be executable by the computer 206 to cause the computer 206 to (a) enroll into a database 209 at least two biometric specimens, a first one of the specimens being a first type, and a second one of the specimens being a second type, (b) determine an FAR for each of the specimens, (c) identify authorization options, each option requiring a match to one or more of the biometric specimens, (d) calculate a CCV for at least one of the options, wherein the CCV is a function of the FAR(s) of the specimen(s) corresponding to the option, (e) identify an ACV, (f) compare the CCV to the ACV range, (g) determine whether the CCV is in the ACV range (h) select the option if the CCV is in the ACV range (i) receive and provide a set of biometric sample(s) (the "sample set") corresponding to the specimen type(s) of the selected option (j) compare the biometric sample(s) to the biometric specimen(s), (k) determine whether the biometric sample(s) match the biometric specimen(s), and (1) if the biometric sample(s) match the biometric specimen(s), then authorize the transaction. Biometric specimen readers 212 and biometric sample readers 215 may interface with the computer 206 for the purpose of obtaining biometric specimens and biometric samples, respectively, and providing the specimens and samples to the computer 206. The equations for FAR and CCV identified above may be used in the instructions to the computer 206.
It should be noted that the invention may be used to provide tokened or tokenless authorization of commercial transactions between a buyer and seller using a computer network system and multiple biometrics. Such a system may or may not also include a token of some type, such as a credit card, driver's license, identification instrument or the like. Such a system may also include a PIN or other indexing device to speed the authentication process.
Having identified two equations that may be used in the invention, further details of those equations are now provided. The FAR and CCV equations are part of a larger discussion about biometric fusion, which is the study of how two or more biometric types (sometimes referred to as modalities) may be used. Algorithms may be used to combine information from two or more biometric modalities. The combined information may allow for more reliable and more accurate identification of an individual than is possible with systems based on a single biometric modality. The combination of information from more than one biometric modality is sometimes referred to herein as "biometric fusion". Reliable personal authentication is becoming increasingly important. The ability to accurately and quickly identify an individual is important to immigration, law enforcement, computer use, and financial transactions. Traditional security measures rely on knowledge- based approaches, such as passwords and personal identification numbers ("PINs"), or on token-based approaches, such as swipe cards and photo identification, to establish the identity of an individual. Despite being widely used, these are not very secure forms of identification. For example, it is estimated that hundreds of millions of dollars are lost annually in credit card fraud in the United States due to consumer misidentification.
Biometrics offers a reliable alternative for identifying an individual. Biometrics is the method of identifying an individual based on his or her physiological and behavioral characteristics. Common biometric modalities include fingerprint, face recognition, hand geometry, voice, iris and signature verification. The Federal government will be a leading consumer of biometric applications deployed primarily for immigration, airport, border, and homeland security. Wide scale deployments of biometric applications such as the US-VISIT program are already being done in the United States and else where in the world.
Despite advances in biometric identification systems, several obstacles have hindered their deployment. Every biometric modality has some users who have illegible biometrics. For example a recent NIST (National Institute of Standards and Technology) study indicates that nearly 2 to 5% of the population does not have legible fingerprints. Such users would be rejected by a biometric fingerprint identification system during enrollment and verification. Handling such exceptions is time consuming and costly, especially in high volume scenarios such as an airport. Using multiple biometrics to authenticate an individual may alleviate this problem.
Furthermore, unlike password or PIN based systems, biometric systems inherently yield probabilistic results and are therefore not fully accurate. In effect, a certain percentage of the genuine users will be rejected (false non-match) and a certain percentage of impostors will be accepted (false match) by existing biometric systems. High security applications require very low probability of false matches. For example, while authenticating immigrants and international passengers at airports, even a few false acceptances can pose a severe breach of national security. On the other hand false non matches lead to user inconvenience and congestion.
Existing systems achieve low false acceptance probabilities (also known as False Acceptance Rate or "FAR") only at the expense of higher false non-matching probabilities (also known as False-Rejection-Rate or "FRR"). It has been shown that multiple modalities can reduce FAR and FRR simultaneously. Furthermore, threats to biometric systems such as replay attacks, spoofing and other subversive methods are difficult to achieve simultaneously for multiple biometrics, thereby making multimodal biometric systems more secure than single modal biometric systems.
Systematic research in the area of combining biometric modalities is nascent and sparse. Over the years there have been many attempts at combining modalities and many methods have been investigated, including "Logical And", "Logical Or", "Product Rule", "Sum Rule", "Max Rule", "Min Rule", "Median Rule", "Majority Vote", "Bayes' Decision", and "Neyman-Pearson Test". None of these methods has proved to provide low FAR and FRR that is needed for modern security applications.
The need to address the challenges posed by applications using large biometric databases is urgent. The US-VISIT program uses biometric systems to enforce border and homeland security. Governments around the world are adopting biometric authentication to implement National identification and voter registration systems. The Federal Bureau of Investigation maintains national criminal and civilian biometric databases for law enforcement.
Although large-scale databases are increasingly being used, the research community's focus is on the accuracy of small databases, while neglecting the scalability and speed issues important to large database applications. Each of the example applications mentioned above require databases with a potential size in the tens of millions of biometric records. In such applications, response time, search and retrieval efficiency also become important in addition to accuracy. As noted above, the invention may be used to determine whether a set of biometrics is acceptable for making a decision about whether a transaction should be authorized. The data set may be comprised of information pieces about objects, such as people. Each object may have at least two types of information pieces, that is to say the data set may have at least two modalities. For example, each object represented in the database may by represented by two or more biometric samples, for example, a fingerprint sample and an iris scan sample. A first probability partition array ("Pm(i J)") may be provided. The Pm(i,j) may be comprised of probability values for information pieces in the data set, each probability value in the Pm(i,j) corresponding to the probability of an authentic match. Pm(i,j) may be similar to a Neyman- Pearson Lemma probability partition array. A second probability partition array ("Pfm(i J)") may be provided, the Pfm(i j) being comprised of probability values for information pieces in the data set, each probability value in the Pfm(i,j) corresponding to the probability of a false match. Pfm(i,j) may be similar to a Neyman-Pearson Lemma probability partition array.
A method according to the invention may identify a no-match zone. For example, the no-match zone may be identified by identifying a first index set ("A"), the indices in set A being the (i j) indices that have values in both Pfm(i j) and Pm(ij). A second index set ("Z∞") may be identified, the indices of Z∞ being the (ij) indices in set A where both Pfm(ij) is larger than zero and Pm(i j) is equal to zero. FAR z may be determined, where
FAR2 = 1 - / Pfm(z,/) . FAR z may be compared to a desired false-acceptance- rate ("FAR"), and if FAR z is greater than the desired false-acceptance-rate, than the data set may be rejected for failing to provide an acceptable false-acceptance-rate. IfFAR z∞ is less than or equal to the desired false-acceptance-rate, then the data set may be accepted, if false- rejection-rate is not important.
If false-rejection-rate is important, further steps maybe executed to determine whether the data set should be rejected. The method may further include identifying a third index set ZM∞, the indices of ZM∞ being the (ij) indices in Z∞ plus those indices where both Pfm(ij) and Pm(ij) are equal to zero. A fourth index set ("C") may be identified, the indices of C being the (i,j) indices that are in A but not ZM∞. The indices of C may be arranged 1 suc ih x tihat . i-nd iex. A _ fi c-ftmh i •nd iex
Figure imgf000015_0001
set ("Cn") may be identified. The indices of Cn may be the first N (i,j) indices of the arranged C index, where N is a number for which the following is true:
Figure imgf000015_0006
he FRRmaybe
determined, where d compared to a desired false-rejection-rate.
Figure imgf000015_0005
IfFRR is greater than the desired false-rejection-rate, then the data set may be rejected, even though FAR z is less than or equal to the desired false-acceptance-rate. Otherwise, the data set may be accepted.
In another method according to the invention, the false-rejection-rate calculations and comparisons may be executed before the false-acceptance-rate calculations and comparisons. In such a method, a first index set ("A") may be identified, the indices in A being the (i,j) indices that have values in both Pfm(i,j) and Pm(i,j). A second index set ("Z∞") may be identified, the indices of Zoo being the (i,j) indices of A where Pm(i,j) is equal to zero. A third index set ("C") maybe identified, the indices of C being the (i,j) indices that are in A
but not Zco. The indices of C may be arranged such tha
Figure imgf000015_0002
provide an arranged C index, and a fourth index set ("Cn") may be identified. The indices of Cn may be the first N (i,j) indices of the arranged C index, where N is a number for which the following is true: ■ The
FRR may be det ed false-
Figure imgf000015_0003
rejection-rate. If the FRR is greater than the desired false-rejection-rate, then the data set may be rejected. If the FRR is less than or equal to the desired false-rejection-rate, then the data set may be accepted, if false- acceptance-rate is not important. If false-acceptance-rate is important, then the FAR z may be determined, where The
Figure imgf000015_0004
FAR z∞ may be compared to a desired false-acceptance-rate, and if FAR z is greater than the desired false-acceptance-rate, then the data set may be rejected even though FRR is less than or equal to the desired false-rejection-rate. Otherwise, the data set may be accepted.
The invention may also be embodied as a computer readable memory device for executing any of the methods described above.
Preliminary Considerations: To facilitate discussion of the invention it may be beneficial to establish some terminology and a mathematical framework. Biometric fusion may be viewed as an endeavor in statistical decision theory [1] [2]; namely, the testing of simple hypotheses. This disclosure uses the term simple hypothesis as used in standard statistical theory: the parameter of the hypothesis is stated exactly. The hypotheses that a biometric score "is authentic" or "is from an impostor" are both simple hypotheses.
In a match attempt, the N-scores reported from N<∞ biometrics is called the test observation. The test observation, x e S, where S c RN (Euclidean N-space) is the score sample space, is a vector function of a random variable X from which is observed a random sample (X1 , X2 , ... , XN ) . The distribution of scores is provided by the joint class-conditional probability density function ("pdf ') :
(1)
Figure imgf000016_0001
where θ equals either Au to denote the distribution of authentic scores or Im to denote the distribution of impostor scores. So, if θ = Au, Equation (1) is the pdf for authentic distribution of scores and if θ = Im it is the pdf for the impostor distribution. It is assumed that
Figure imgf000016_0002
Given a test observation, the following two simple statistical hypotheses are observed: The null hypothesis, Ho, states that a test observation is an impostor; the alternate hypothesis, H1, states that a test observation is an authentic match. Because there are only two choices, the fusion logic will partition S into two disjoint sets: RAu e S andRIm e S , where Denoting tlie compliment of a set so that
Figure imgf000017_0003
Figure imgf000017_0002
The decision logic is to accept H1 (declare a match) if a test observation, x, belongs to RAu or to accept Ho (declare no match and hence reject H1) if x belongs to RIra . Each hypothesis is associated with an error type: A Type I error occurs when Ho is rejected (accept H1) when Ho is true; this is a false accept (FA); and a Type II error occurs when H1 is rejected (accept Ho) when H1 is true; this is a false reject (FR). Thus denoted, respectively, the probability of making a Type I or a Type II error follows:
Figure imgf000017_0004
So, to compute the false-acceptance-rate (FAR), the impostor score's pdf is integrated over the region which would declare a match (Equation 2). The false-rejection-rate (FRR) is computed by integrating the pdf for the authentic scores over the region in which an impostor (Equation 3) is declared. The correct-acceptance-rate (CAR) is 1-FRR.
The class-conditional pdf for each individual biometric, the marginal pdf, is assumed to have finite support; that is, the match scores produced by the ith biometric belong to a closed interval of the real line where
Figure imgf000017_0005
Two observations
Figure imgf000017_0006
are made. First, the sample space, S, is the Cartesian product of these intervals, i.e., S = γλ x γ 2 x • • • x ^N . Secondly, the marginal pdf, which we will often reference, for any of the individual biometrics can be written in terms of the joint pdf:
Figure imgf000017_0001
For the purposes of simplicity the following definitions are stated: • Definition 1: In a test of simple hypothesis, the correct-acceptance-rate, CAR=I- FRR is known as the power of the test.
• Definition 2: For a fixed FAR, the test of simple Ho versus simple H1 that has the largest CAR is called most powerful. • Definition 3: Verification is a one-to-one template comparison to authenticate a person's identity (the person claims their identity).
• Definition 4: Identification is a one-to-many template comparison to recognize an individual (identification attempts to establish a person's identity without the person having to claim an identity).
The receiver operation characteristics (ROC) curve is a plot of CAR versus FAR, an example of which is shown in Figure 8. Because the ROC shows performance for all possible specifications of FAR, as can be seen in the Figure 8, it is an excellent tool for comparing performance of competing systems, and we use it throughout our analyses.
Fusion and Decision Methods: Because different applications have different requirements for error rates, there is an interest in having a fusion scheme that has the flexibility to allow for the specification of a Type-I error yet have a theoretical basis for providing the most powerful test, as defined in Definition 2. Furthermore, it would be beneficial if the fusion scheme could handle the general problem, so there are no restrictions on the underlying statistics. That is to say that:
• Biometrics may or may not be statistically independent of each other.
• The class conditional pdf can be multi-modal (have local maximums) or have no modes. • The underlying pdf is assumed to be nonparametric (no set of parameters define its shape, such as the mean and standard deviation for a Gaussian distribution).
A number of combination strategies were examined, all of which are listed by Jain [4] on page 243. Most of the schemes, such as "Demptster-Shafer" and "fuzzy integrals" involve training. These were rejected mostly because of the difficulty in analyzing and controlling their performance mechanisms in order to obtain optimal performance. Additionally, there was an interest in not basing the fusion logic on empirical results. Strategies such as SUM, MEAN, MEDIAN, PRODUCT, MIN, MAX were likewise rejected because they assume independence between biometric features.
When combining two biometrics using a Boolean "AND" or "OR" it is easily shown to be suboptimal when the decision to accept or reject H1 is based on fixed score thresholds. However, the "AND" and the "OR" are the basic building blocks of verification (OR) and identification (AND). Since we are focused on fixed score thresholds, making an optimal decision to accept or reject Hi depends on the structure of: RAu c S andRIm c S , and simple thresholds almost always form suboptimal partitions.
If one accepts that accuracy dominates the decision making process and cost dominates the combination strategy, certain conclusions may be drawn. Consider a two- biometric verification system for which a fixed FAR has been specified. In that system, a person's identity is authenticated if H1 is accepted by the first biometric OR if accepted by the second biometric. IfH1 is rejected by the first biometric AND the second biometric, then manual intervention is required. If a cost is associated with each stage of the verification process, a cost function can be formulated. It is a reasonable assumption to assume that the fewer people that filter down from the first biometric sensor to the second to the manual check, the cheaper the system.
Suppose a fixed threshold is used as the decision making process to accept or reject H1 at each sensor and solve for thresholds that minimize the cost function. It will obtain settings that minimize cost, but it will not necessarily be the cheapest cost. Given a more accurate way to make decisions, the cost will drop. And if the decision method guarantees the most powerful test at each decision point it will have the optimal cost.
It is clear to us that the decision making process is crucial. A survey of methods based on statistical decision theory reveals many powerful tests such as the Maximum- Likelihood Test and Bayes' Test. Each requires the class conditional probability density function, as given by Equation 1. Some, such as the Bayes' Test, also require the a priori probabilities P(Ho) and P(H1), which are the frequencies at which we would expect an impostor and authentic match attempt. Generally, these tests do not allow the flexibility of specifying a FAR - they minimize making a classification error.
In their seminal paper of 1933 [3], Neyman and Pearson presented a lemma that guarantees the most powerful test for a fixed FAR requiring only the joint class conditional pdf for Ho and H1. This test may be used as the centerpiece of the biometric fusion logic employed in the invention. The Neyman-Pearson Lemma guarantees the validity of the test. The proof of the Lemma is slightly different than those found in other sources, but the reason for presenting it is because it is immediately amenable to proving the Corollary to the Neyman Pearson Lemma. The corollary states that fusing two biometric scores with Neyman-Pearson, always provides a more powerful test than either of the component biometrics by themselves. The corollary is extended to state that fusing N biometric scores is better than fusing N-I scores
Deriving the Neyman-Pearson Test: Let FAR=α be fixed. It is desired to find most powerful. To do this the
Figure imgf000020_0005
objective set function is formed that is analogous to Lagrange's Method:
Figure imgf000020_0004
where λ ≥ 0 is an undetermined Lagrange multiplier and the external value of u is subject to the constraint a = j/(x | lm)dx . Rewriting the above equation as
Figure imgf000020_0002
which ensures that the integrand in the above equation is positive for a
Figure imgf000020_0003
and, recalling that the class conditional pdf is positive on S is assumed, define
Figure imgf000020_0001
Then u is a maximum if λ is chosen such tha s satisfied.
Figure imgf000021_0004
The Neyman-Pearson Lemma: Proofs of the Neyman-Pearson Lemma can be found in their paper [4] or in many texts [1] [2]. The proof presented here is somewhat different. An "in-common" region, R IC is established between two partitions that have the same FAR. It is possible this region is empty. Having R,c makes it easier to prove the corollary presented.
Neyman-Pearson Lemma: Given the joint class conditional probability density functions for a system of order N in making a decision with a specified FAR=α, let λ be a positive real number, and let
Figure imgf000021_0001
such that
Figure imgf000021_0002
then R^ is the best critical region for declaring a match - it gives the largest correct- acceptance-rate (CAR), hence R^ gives the smallest FRR.
Proof. The lemma is trivially true if R^1 is the only region for which Equation (7) holds. Suppose R^ ≠ RAu with this excludes sets that are the same as
Figure imgf000021_0006
R A, except on a set of measure zero that contribute nothing to the integration), is any other region such that
Figure imgf000021_0003
Let which is the "in common" region of the two sets and may be empty.
Figure imgf000021_0005
The following is observed:
Figure imgf000022_0001
If R A(has a better CAR than R^ then it is sufficient to prove that
Figure imgf000022_0005
From Equatio
Figure imgf000022_0002
Equations (7),
Figure imgf000022_0003
When x e R^ -Rlc e R^ it is observed from (5) that
Figure imgf000022_0006
and whe t is observed from (6) that
Figure imgf000022_0008
Figure imgf000022_0004
Equations (14) and (15) give
Figure imgf000022_0007
This establishes (12) and hence (11)5 which proves the lemma. // In this disclosure, the end of a proof is indicated by double slashes "//."
Corollary. Neyman-Pearson Test Accuracy Improves with Additional Biometrics: The fact that accuracy improves with additional biometrics is an extremely important result of the Neyman-Pearson Lemma. Under the assumed class conditional densities for each biometric, the Neyman-Pearson Test provides the most powerful test over any other test that considers less than all the biometrics available. Even if a biometric has relatively poor performance and is highly correlated to one or more of the other biometrics, the fused CAR is optimal. The corollary for N-biometrics versus a single component biometric follows.
Corollary to the Neyman Pearson Lemma: Given the joint class conditional probability density functions for an N-biometric system, choose Ot=FAR and use the Neyman- Pearson Test to find the critical region R Au that gives the most powerful test for the N- biometric system
(17)
Figure imgf000023_0002
Consider the ith biometric. For the same α=FAR, use the Neyman-Pearson Test to find the critical collection of disjoint intervals lAu a R1 that gives the most powerful test for the single biometric, that is,
(18) then ( V19) '
Figure imgf000023_0004
Proof: where the Cartesian products are taken over all
Figure imgf000023_0005
the Yk except for k=i. From (4) the marginal pdf can be recast in terms of the joint pdf
Figure imgf000023_0001
First, it will be shown that equality holds in (19) if and only if R Au = R , . Given that R^1, = R1 except on a set of measure zero, i.e.
Figure imgf000023_0006
then clearly
Figure imgf000023_0007
On the other hand,' assume nd
Figure imgf000023_0008
Figure imgf000023_0009
that is, the two sets are measurably different. But this is exactly the same condition previously set forth in the proof of the Neyman-Pearson Lemma from which from which it was concluded that which is a contradiction. Hence equality holds if and
Figure imgf000023_0010
only i Examining the inequality situation in equation (19), given that
Figure imgf000023_0011
Figure imgf000023_0012
such that
Figure imgf000024_0004
then it is shown again that the exact conditions as in the proof of the Neyman-Pearson Lemma have been obtained from which we conclude that
Figure imgf000024_0005
which proves the corollary.
Examples have been built such that ut it is hard to do and it is
Figure imgf000024_0007
unlikely that such densities would be seen in a real world application. Thus, it is safe to assume that is almost always true.
Figure imgf000024_0006
The corollary can be extended to the general case. The fusion of N biometrics using Neyman-Pearson theory always results in a test that is as powerful as or more powerful than a test that uses any combination of M<N biometrics. Without any loss to generality, arrange the labels so that the first M biometrics are the ones used in the M<N fusion. Choose α=FAR and use the Neyman-Pearson Test to find ost powerful test for the M-biometric system.
Figure imgf000024_0008
where the Cartesian products are taken over all the γ-intervals not used in the M biometrics combination. Then writing
Figure imgf000024_0001
gives the same construction as in (20) and the proof flows as it did for the corollary.
We now state and prove the following five mathematical propositions. The first four propositions are necessary to proving the fifth proposition, which will be cited in the section that details the invention. For each of the propositions we will use the following: Let e a sequence of real valued ratios suc
Figure imgf000024_0003
know the numerator and denominator of the ratio, so tha
Figure imgf000024_0002
Proposition #1: Fo
Figure imgf000025_0004
Proof: Because we have
Figure imgf000025_0005
Figure imgf000025_0001
//
Propositio
Figure imgf000025_0006
and r, .
Figure imgf000025_0002
Proof The proof is the same as for proposition #1 except the order is reversed.
Proposition #3 Proof:
Figure imgf000025_0007
The proof is by induction. We know from proposition #1 that the result holds for N=I, that
Now assume it holds for any N>1 , we need to show that it holds for N+l .
Figure imgf000025_0008
Let m = 2 and M = N + 1 (note that this is the Nth case and not the N+l case), then we assume
Figure imgf000025_0003
Figure imgf000026_0001
which is the N+l case as was to be shown.
//
Proposition #4: For Proof:
Figure imgf000026_0002
As with proposition #3, the proof is by induction. We know from proposition #2 that the
result holds fo The rest of the proof follows the same format
Figure imgf000026_0003
as for proposition #3 with the order reversed.
//
Proposition #5: Recall that the r is an ordered sequence of decreasing ratios with known numerators and denominators. We sum the first N numerators to get Sn and sum the first N denominators to get Sa- We will show that for the value Sn, there is no other collection
of ratios in r that gives the same Sn and a smaller Sd. et S be the
Figure imgf000026_0004
sequence of the first N terms of r, with the sum of numerators given b , and the
Figure imgf000026_0005
sum of denominators by Let S' be any other sequence of ratios in r,
Figure imgf000026_0006
with numerator sum and denominator sum uch that S]1 = Sn , then we
Figure imgf000027_0005
Figure imgf000027_0006
hav
Figure imgf000027_0007
roof: The proof is by contradiction. Suppose the proposition is not true, that is, assume another sequence, S', exists such that or this sequence, define the
Figure imgf000027_0009
indexing sets A= {indices that can be between 1 and N inclusive} and B= {indices that can be between N+l and n inclusive}. We also define the indexing set Ac= {indices between 1 and N inclusive and not in A), which means
Figure imgf000027_0008
{all indices between 1 and N inclusive}. Then our assumption states:
and
Figure imgf000027_0002
This implies that
(22)
Figure imgf000027_0003
Because the numerators of both sequences are equal, we can write
Figure imgf000027_0001
Combining (22) and (23), and from propositions #3 and #4, we have
Figure imgf000027_0004
which contradicts the fact that ence the validity of the proposition follows.
Figure imgf000027_0010
//
Cost Functions for Optimal Verification and Identification: In the discussion above, it is assumed that all N biometric scores are simultaneously available for fusion. The Neyman- Pearson Lemma guarantees that this provides the most powerful test for a fixed FAR. In practice, however, this could be an expensive way of doing business. If it is assumed that all aspects of using a biometric system, time, risk, etc., can be equated to a cost, then a cost function can be constructed. The inventive process described below constructs the cost function and shows how it can be minimized using the Neyman-Pearson test. Hence, the Neyman-Pearson theory is not limited to "all-at-once" fusion; it can be used for serial, parallel, and hierarchal systems.
Having laid a basis for the invention, a description of two cost functions is now provided as a mechanism for illustrating an embodiment of the invention. A first cost function for a verification system and a second cost function for an identification system are described. For each system, an algorithm is presented that uses the Neyman-Pearson test to minimize the cost function for a second order biometric system, that is a biometric system that has two modalities. The cost functions are presented for the general case of N- biometrics. Because minimizing the cost function is recursive, the computational load grows exponentially with added dimensions. Hence, an efficient algorithm is needed to handle the general case.
First Cost Function - Verification System. A cost function for a 2-stage biometric verification (one-to-one) system will be described, and then an algorithm for minimizing the cost function will be provided. In a 2-stage verification system, a subject may attempt to be verified by a first biometric device. If the subject's identity cannot be authenticated, the subject may attempt to be authenticated by a second biometric. If that fails, the subject may resort to manual authentication. For example, manual authentication may be carried out by interviewing the subject and determining their identity from other means.
The cost for attempting to be authenticated using a first biometric, a second biometric, and a manual check are C1 , c2 , and C3 , respectively. The specified FARsys is a system false- acceptance-rate, i.e. the rate of falsely authenticating an impostor includes the case of it happening at the first biometric or the second biometric. This implies that the first-biometric station test cannot have a false-acceptance-rate, FAR1 , that exceeds FARsys . Given a test with a specified FAR1 , there is an associated false-rejection-rate, FRR1, which is the fraction of subjects that, on average, are required to move on to the second biometric station. The FAR required at the second station is FAR2 = FARsys - FAR1 . It is known tha utation of FAR2 appears imperfect. Ho in the construction of the decision space, it i
Figure imgf000029_0002
Note that FAR2 is a function of the specified FARsys and the freely chosen FAR1 ; FAR2 is not a free parameter. Given a biometric test with the computed FAR2 , there is an associated false-rejection-rate, FRR2 by the second biometric test, which is the fraction of subjects that are required to move on to a manual check. This is all captured by the following cost function:
(30)
Figure imgf000029_0001
There is a cost for every choice OfFAR1 < FARsys, so the Cost in Equation 30 is a function OfFAR1 . For a given test method, there exists a value OfFAR1 that yields the smallest cost and we present an algorithm to find that value. In a novel approach to the minimization of Equation 30, a modified version of the Neyman-Pearson decision test has been developed so that the smallest cost is optimally small.
An algorithm is outlined below. The algorithm seeks to optimally minimize Equation 30. To do so, we (a) set the initial cost estimate to infinity and, (b) for a specified FARsys, loop over all possible values O In practice, the algorithm may use a
Figure imgf000029_0004
uniformly spaced finite sample of the infinite possible values. The algorithm may proceed as follows: (c) set nd (e) loop over possible FAR1 values.
Figure imgf000029_0003
For the first biometric at the current FAR1 value, the algorithm may proceed to (f) find the optimal Match-Zzone, R1 , and (g) compute the correct-acceptance-rate over R1 by:
Figure imgf000030_0001
and (h) detennine FRR1 using FRR1 = 1 - CAR1.
Next, the algorithm may test against the second biometric. Note that the region R1 of the score space is no longer available since the first biometric test used it up. The Neyman- Pearson test may be applied to the reduced decision space, which is the compliment OfR1 . So, at this time, (h) the algorithm may compute FAR2 = FARsys - FAR1 , and FAR2 may be (i) used in the Neyman-Pearson test to determine the most powerful test, CAR2 , for the second biometric fused with the first biometric over the reduced decision space Rf . The critical region for CAR2 is R2 , which is disjoint from R1 by our construction. Score pairs that result in the failure to be authenticated at either biometric station must fall within the region R3 = (R1 U R2 )c , from which it is shown that
Figure imgf000030_0002
The final steps in the algorithm are (j) to compute the cost using Equation 30 at the current setting of FAR1 using FRR1 and FRR2 , and (k) to reset the minimum cost if cheaper, and keep track of the FAR1 responsible for the minimum cost.
To illustrate the algorithm, an example is provided. Problems arising from practical applications are not to be confused with the validity of the Neyman-Pearson theory. Jain states in [5]: "In case of a larger number of classifiers and relatively small training data, a classifier my actually degrade the performance when combined with other classifiers ..." This would seem to contradict the corollary and its extension. However, the addition of classifiers does not degrade performance because the underlying statistics are always true and the corollary assumes the underlying statistics. Instead, degradation is a result of inexact estimates of sampled densities. In practice, a user may be forced to construct the decision test from the estimates, and it is errors in the estimates that cause a mismatch between predicted performance and actual performance.
Given the true underlying class conditional pdf for, H0 and H1, the corollary is true. This is demonstrated with a challenging example using up to three biometric sensors. The marginal densities are assumed to be Gaussian distributed. This allows a closed form expression for the densities that easily incorporates correlation. The general nu order form is well known and is given by
Figure imgf000031_0001
where μ is the mean and C is the covariance matrix. The mean (μ) and the standard deviation (σ) for the marginal densities are given in Table 1. Plots of the three impostor and three authentic densities are shown in Error! Reference source not found..
Figure imgf000031_0002
Table 1
Figure imgf000031_0003
Table 2
To stress the system, the authentic distributions for the three biometric systems may be forced to be highly correlated and the impostor distributions to be lightly correlated. The correlation coefficients (p) are shown in Table 2. The subscripts denote the connection. A plot of the joint pdf for the fusion of system #1 with system #2 is shown in Figure 7, where the correlation between the authentic distributions is quite evident.
The single biometric ROC curves are shown in Figure 8. As could be predicted from the pdf curves plotted in Figure 6, System #1 performs much better than the other two systems, with System #3 having the worst performance.
Fusing 2 systems at a time; there are three possibilities: #l+#2, #l+#3, and #2+#3. The resulting ROC curves are shown in Figure 9. As predicted by the corollary, each 2- system pair outperforms their individual components. Although the fusion of system #2 with system #3 has worse performance than system #1 alone, it is still better than the single system performance of either system #2 or system #3.
Finally, Figure 10 depicts the results when fusing all three systems and comparing its performance with the performance of the 2-system pairs. The addition of the third biometric system gives substantial improvement over the best performing pair of biometrics.
Tests were conducted on individual and fused biometric systems in order to determine whether the theory presented above accurately predicts what will happen in a real-world situation. The performance of three biometric systems were considered. The numbers of score samples available are listed in Table 3. The scores for each modality were collected independently from essentially disjoint subsets of the general population.
Figure imgf000032_0001
Table 3
To simulate the situation of an individual obtaining a score from each biometric, the initial thought was to build a "virtual" match from the data of Table 3. Assuming independence between the biometrics, a 3 -tuple set of data was constructed. The 3 -tuple set was an ordered set of three score values, by arbitrarily assigning a fingerprint score and a facial recognition score to each signature score for a total of 990 authentic score 3-tuples and 325,710 impostor score 3-tuples.
By assuming independence, it is well known that the joint pdf is the product of the marginal e joint class conditional pdf for the three biometric systems,
Figure imgf000033_0002
can be written as
Figure imgf000033_0001
So it is not necessary to dilute the available data. It is sufficient to approximate the appropriate marginal density functions for each modality using all the data available, and compute the j oint pdf using Equation 33.
The class condition density functions for each of the three modalities,
Figure imgf000033_0004
Figure imgf000033_0003
fstgnatωe (χ I ^) and /facial (x I ^) were estimated using the available sampled data. The authentic score densities were approximated using two methods: (1) the histogram- interpolation technique and (2) the Parzen-window method. The impostor densities were approximated using the histogram-interpolation method. Although each of these estimation methods are guaranteed to converge in probability to the true underlying density as the number of samples goes to infinity, they are still approximations and can introduce error into the decision making process, as will be seen in the next section. The densities for fingerprint, signature, and facial recognition are shown in Figure 11, Figure 12 and Figure 13 respectively. Note that the authentic pdf for facial recognition is bimodal. The Neyman- Pearson test was used to determine the optimal ROC for each of the modalities. The ROC curves for fingerprint, signature, and facial recognition are plotted in Figure 14.
There are three possible unique pairings of the three biometric systems: (1) fingerprints with signature, (2) fingerprints with facial recognition, and (3) signatures with facial recognition. Using the marginal densities (above) to create the required 2-D joint class conditional density functions, two sets of 2-D joint density functions were computed - one in which the authentic marginal densities were approximated using the histogram method, and one in which the densities were approximated using the Parzen window method. Using the Neyman-Pearson test, an optimal ROC was computed for each fused pairing and each approximation method. The ROC curves for the histogram method are shown in Figure 15 and the ROC curves for the Parzen window method are shown in Figure 16.
As predicted by the corollary, the fused performance is better than the individual performance for each pair under each approximation method. But, as we cautioned in the example, error due to small sample sizes can cause pdf distortion. This is apparent when fusing fingerprints with signature data (see Figure 15 and Figure 16). Notice that the Parzen- window ROC curve (Figure 16) crosses over the curve for fingerprint-facial-recognition fusion, but does not cross over when using the histogram interpolation method (Figure 15). Small differences between the two sets of marginal densities are magnified when using their product to compute the 2-dimensional joint densities, which is reflected in the ROC.
As a final step, all three modalities were fused. The resulting ROC using histogram interpolating is shown in Figure 17, and the ROC using the Parzen window is shown in Figure 18. As might be expected, the Parzen window pdf distortion with the 2-dimensional fingerprint-signature case has carried through to the 3 -dimensional case. The overall performance, however, is dramatically better than any of the 2-dimensional configurations as predicted by the corollary.
In the material presented above, it was assumed that all N biometric scores would be available for fusion. Indeed, the Neyman-Pearson Lemma guarantees that this provides the most powerful test for a fixed FAR. In practice, however, this could be an expensive way of doing business. If it is assumed that all aspects of using a biometric system, time, risk, etc., can be equated to a cost, then a cost function can be constructed. Below, we construct the cost function and show how it can be minimized using the Neyman-Pearson test. Hence, the Neyman-Pearson theory is not limited to "all-at-once" fusion - it can be used for serial, parallel, and hierarchal systems.
In the following section, a review of the development of the cost function for a verification system is provided, and then a cost function for an identification system is developed. For each system, an algorithm is presented that uses the Neyman-Pearson test to minimize the cost function for a second order modality biometric system. The cost function is presented for the general case of N-biometrics. Because minimizing the cost function is recursive, the computational load grows exponentially with added dimensions. Hence, an efficient algorithm is needed to handle the general case.
From the prior discussion of the cost function for a 2-station system, the costs for using the first biometric, the second biometric, and the manual check arec, ,c2 , andc3 , respectively, and FARsys is specified. The first-station test cannot have a false-acceptance- rate, FAR1 , that exceeds FARsys . Given a test with a specified FAR1 , there is an associated false-rejection-rate, FRR1 , which is the fraction of subjects that, on average, are required to move on to the second station. The FAR required at the second station is FAR2 = FARsys - FAR1 . It is known thatP(A U β) = P(A) + P(B) - P(A)P(B) , so the computation of FAR2 appears imperfect. However, if FARsys = P(A U B) and FAR1 = P(A), in the construction of the decision space, it is intended that FAR2 = P(B) - P(A)P(B) .
Given a test with the computed FAR2 , there is an associated false-rejection- rate, FRR2 by the second station, which is the fraction of subjects that are required to move on to a manual checkout station. This is all captured by the following cost function
(30)
Figure imgf000035_0001
There is a cost for every choice OfFAR1 < FARsys , so the Cost in Equation 30 is a function of FAR1 . For a given test method, there exists a value of FAR1 that yields the smallest cost and we develop an algorithm to find that value.
Using a modified Neyman-Pearson test to optimally minimize Equation 30, an algorithm can be derived. Step 1 : set the initial cost estimate to infinity and, for a specified FARsys , loop over all possible values of FAR1 < FARsys . To be practical, in the algorithm a finite sample of the infinite possible values may be used. The first step in the loop is to use the Neyman-Pearson test at FAR1 to determine the most powerful test, CAR1 , for the first biometric, and FRR1 = 1 - CAR1 is computed. Since it is one dimensional, the critical region is a collection of disjoint intervals IAu . As in the proof to the corollary, the 1- dimensional IAu is recast as a 2-dimensional region, R1 = lAu x χ2 a. R2 , so that
' 5
Figure imgf000036_0002
When it is necessary to test against the second biometric, the region R1 of the decision space is no longer available since the first test used it up. The Neyman-Pearson test
10 can be applied to the reduced decision space, which is the compliment of R1 . Step 2:
FAR2 = FARsys - FARj is computed. Step 3: FAR2 is used in the Neyman-Pearson test to determine the most powerful test, CAR2 , for the second biometric fused with the first biometric over the reduced decision space R1 0. The critical region for CAR2 is R2 , which is disjoint from R1 by the construction. Score pairs that result in the failure to be
15 authenticated at either biometric station must fall within the region R3 = (R1 U R2 )c , from which it is shown that
Figure imgf000036_0001
Step 4: compute the cost at the current setting of FAR1 using FRR1 andFRR2 . Step 20 5: reset the minimum cost if cheaper, and keep track of the FAR, responsible for the minimum cost. A typical cost function is shown in Figure 19.
Two special cases should be noted. In the first case, if C1 > 0 , c2 > 0 , and C3 = 0 , the algorithm shows that the minimum cost is to use only the first biometric - that is, FAR1 = FARsys . This makes sense because there is no cost penalty for authentication failures to bypass the second station and go directly to the manual check.
In the second case, C1 = c2 = 0 and c3 > 0 , the algorithm shows that scores should be collected from both stations and fused all at once; that is, FAR1 = 1.0. Again, this makes sense because there is no cost penalty for collecting scores at both stations, and because the Neyman-Pearson test gives the most powerful CAR (smallest FRR) when it can fuse both scores at once.
To extend the cost function to higher dimensions, the logic discussed above is simply repeated to arrive at
Figure imgf000037_0001
In minimizing Equation 35, there is 1 degree of freedom, namely FAR1 . Equation 35 has N-I degrees of freedom. When FAR1 < FARsys are set, then FAR2 < FAR1 can bet set, then FAR3 < FAR2 , and so on - and to minimize thus, N-I levels of recursion.
Identification System: Identification (one-to-many) systems are discussed. With this construction, each station attempts to discard impostors. Candidates that cannot be discarded are passed on to the next station. Candidates that cannot be discarded by the biometric systems arrive at the manual checkout. The goal, of course, is to prune the number of impostor templates thus limiting the number that move on to subsequent steps. This is a logical AND process - for an authentic match to be accepted, a candidate must pass the test at station 1 and station 2 and station 3 and so forth. In contrast to a verification system, the system administrator must specify a system false-rejection-rate, FRRsys instead of a FARsys .
But just like the verification system problem the sum of the component FRR values at each decision point cannot exceed FRRsys . IfFRR with FAR are replaced in Equations 34 or 35 the following cost equations are arrived at for 2-biometric and an N-biometric identification system
Figure imgf000038_0002
Alternately, equation 37 may be written as:
Figure imgf000038_0001
These equations are a mathematical dual of Equations 34 and 35 are thus minimized using the logic of the algorithm that minimizes the verification system.
Algorithm: Generating Matching and Non-Matching PDF Surfaces. The optimal fusion algorithm uses the probability of an authentic match and the probability of a false match for each P0- e P . These probabilities may be arrived at by numerical integration of the sampled surface of the joint pdf. A sufficient number of samples may be generated to get a "smooth" surface by simulation. Given a sequence of matching score pairs and non-matching score pairs, it is possible to construct a numerical model of the marginal cumulative distribution functions (cdf). The distribution functions may be used to generate pseudo random score pairs. If the marginal densities are independent, then it is straightforward to generate sample score pairs independently from each cdf. If the densities are correlated, we generate the covariance matrix and then use Cholesky factorization to obtain a matrix that transforms independent random deviates into samples that are appropriately correlated.
Assume a given partition P. The joint pdf for both the authentic and impostor cases may be built by mapping simulated score pairs to the appropriate j>tJ e P and incrementing a counter for that sub-square. That is, it is possible to build a 2-dimensional histogram, which is stored in a 2-dimensional array of appropriate dimensions for the partition. If we divide each array element by the total number of samples, we have an approximation to the probability of a score pair falling within the associated sub-square. We call this type of an array the probability partition array (PPA). Let Pfm be the PPA for the joint false match distribution and let Pm be the PPA for the authentic match distribution. Then, the probability of an impostor' s score pair, (^1 , s 2 ) e ptJ. , resulting in a match is P6n (i, j) , Likewise, the probability of a score pair resulting in a match when it should be a match is P1n (i, j) . The PPA for a false reject (does not match when it should)
Figure imgf000039_0002
Consider the partition arrays, Pgn and Pm, defined in Section #5. Consider the ratio
Figure imgf000039_0001
The larger this ratio the more the sub-square indexed by (i,j) favors a false match over a false reject. Based on the propositions presented in Section 4, it is optimal to tag the sub-square with the largest ratio as part of the no-match zone, and then tag the next largest, and so on. Therefore, an algorithm that is in keeping with the above may proceed as:
Step 1. Assume a required FAR has been given.
Step 2. Allocate the array Pinz to have the same dimensions as P1n and
Pun. This is the match zone array. Initialize all of its elements as belonging to the match zone. Step 3. Let the index set A= {all the (ij) indices for the probability partition arrays}.
Step 4. Identify all indices in A such that and
Figure imgf000039_0003
store those indices in the indexing set Z= {(/,/):
Figure imgf000039_0004
. Tag each element in Pmz indexed by Z as part of the no-match zone.
Step 5. e process
Figure imgf000039_0005
only those indices in B. This does not affect optimality because there is most likely zero probability that either a false match score pair or a false reject score pair falls into any sub-square indexed by elements of Z. Step 6. Identify all indices in B such that nd store those indices in
Figure imgf000040_0003
Figure imgf000040_0002
mply put, this index set includes the indexes to all the sub-squares that have zero probability of a match but 5 non-zero probability of false match.
Step 7. Tag all the sub-squares in Pm2 indexed by Z00 as belonging to the no-match zone. At this point, the probability of a matching score pair falling into the no-match zone is zero. The probability of a non- matching score pair falling into the match zone is:
O
Figure imgf000040_0004
Furthermore, if FARZ∞ <= FAR then we are done and can exit the algorithm.
Step 8. Otherwise, we construct a new index set
r
Figure imgf000040_0005
We see that C holds the indices of the non-zero probabilities in a sorted order - the ratios of false-match to match probabilities occur in descending order.
Step 9. Let CN be the index set that contains the first N indices in C. We 0 determine N so that:
Figure imgf000040_0006
Step 10. Label elements OfPm2 indexed by members of CN as belonging to the no-match zone. This results in a FRR given by
Figure imgf000040_0001
5 and furthermore this FRR is optimal. It will be recognized that other variations of these steps may be made, and still be within the scope of the invention. For clarity, the notation "(i,j)" is used to identify arrays that have at least two modalities. Therefore, the notation "(i,j)" includes more than two modalities, for example (ij,k), (ij,k,l), (i,j,k,l,m), etc.
For example, Figure 20 illustrates one method according to the invention in which
Pm(ij) is provided 310 and Prm(ij) is provided 313. As part of identifying 316 indices (ij) corresponding to a no-match zone, a first index set ("A") may be identified. The indices in set A maybe the (i,j) indices that have values in both Pfm(i,j) and Pm(i,j). A second index set ("Zoo") maybe identified, the indices of Z∞ being the (i,j) indices in set A where both Pfm(ij) is larger than zero and Pm(ij) is equal to zero. Then determine FAR z 319, where should be noted that the indices of Z∞ may be the
Figure imgf000041_0001
indices in set A where Pm(i,j) is equal to zero, since the indices where both
Pfm(i j)=Pm(ij)=0 will not affect FAR z, and since there will be no negative values in the probability partition arrays. However, since defining the indices of Z∞ to be the (i,j) indices in set A where both Pfm(ij) is larger than zero and Pm(i,j) is equal to zero yields the smallest number of indices for Z∞, we will use that definition for illustration purposes since it is the least that must be done for the mathematics of FAR z to work correctly. It will be understood that larger no-match zones may be defined, but they will include Z∞, so we illustrate the method using the smaller Z∞ definition believing that definitions of no-match zones that include Z∞ will fall within the scope of the method described.
FAR z may be compared 322 to a desired false-acceptance-rate ("FAR"), and if FAR Zoo is less than or equal to the desired false-acceptance-rate, then the data set may be accepted, if false-rejection-rate is not important. IfFAR z is greater than the desired false-acceptance- rate, then the data set may be rejected 325.
If false-rejection-rate is important to determining whether a data set is acceptable, then indices in a match zone may be selected, ordered, and some of the indices may be selected for further calculations 328. Toward that end, the following steps may be carried out. The method may further include identifying a third index set ZM∞, which may be thought of as a modified Z∞, that is to say a modified no-match zone. Here we modify Z∞ so that ZM∞ includes indices that would not affect the calculation for FAR z, but which might affect calculations related to the false-rejection-rate. The indices of ZM∞ may be the (i,j) indices in Z∞ plus those indices where both Pfm(i,j) and Pm(i,j) are equal to zero. The indices where PmI(Ij)=Pm(Ij)=O are added to the no-match zone because in the calculation of a fourth index set ("C"), these indices should be removed from consideration. The indices of C may be the (i,j) indices that are in A but not ZM∞. The indices of C may be arranged
such that o provide an arranged C index. A fifth index set
Figure imgf000042_0001
("Cn") may be identified. The indices of Cn may be the first N (i j) indices of the arranged C index, where N is a number for which the following is true:
Figure imgf000042_0002
The FRR may be determined 331, where and compared
Figure imgf000042_0003
334 to a desired false-rejection-rate. IfFRR is greater than the desired false-rejection-rate, then the data set may be rejected 337, even though FAR z∞ is less than or equal to the desired false-acceptance-rate. Otherwise, the data set maybe accepted.
Figure 21 illustrates another method according to the invention in which the FRR may be calculated first. In Figure 21, the reference numbers from Figure 20 are used, but some of the steps in Figure 21 may vary somewhat from those described above. In such a method, a first index set ("A") may be identified, the indices in A being the (i j) indices that have values in both Pfm(i j) and Pm(i j). A second index set ("Z∞"), which is the no match zone, may be identified 316. The indices of Z∞ may be the (i j) indices of A where Pm(i j) is equal to zero. Here we use the more inclusive definition for the no-match zone because the calculation of set C comes earlier in the process. A third index set ("C") may be identified, the indices of C being the (i,j) indices that are in A but not Z∞. The indices of C may be arranged such that
provide an arranged C index, and a fourth index set ( Cn )
Figure imgf000042_0004
may be identified. The indices of Cn may be the first N (i j) indices of the arranged C index, W
where N is a number for which the following is true: he FRR may be
ired false-rejection-rate.
Figure imgf000043_0001
If the FRR is greater than the desired false-rejection-rate, then the data set may be rejected. If the FRR is less than or equal to the desired false-rejection-rate, then the data set may be accepted, if false-acceptance-rate is not important. If false-acceptance-rate is important, the
FAR z may be determined, where
Figure imgf000043_0002
Since the more inclusive definition is used for Z∞ in this method, and that more inclusi
Figure imgf000043_0004
affect the value of FAR z∞, we need not add back the indices where both The FAR z may be compared to a desired false-acceptance-rate, and if FAR zoo is greater than the desired false-acceptance-rate, then the data set may be rejected. Otherwise, the data set may be accepted.
It may now be recognized that a simplified form of a method according to the invention may be executed as follows:
step 1 : provide a first probability partition array
Figure imgf000043_0003
the Pm(ij) being comprised of probability values for information pieces in the data set, each probability value in the Pm(i,j) corresponding to the probability of an authentic match;
step 2: provide a second probability partition array
Figure imgf000043_0005
he Pfm(i,j) being comprised of probability values for information pieces in the data set, each probability value in the Pfm(i,j) corresponding to the probability of a false match;
step 3: identify a first index set ("A")? the indices in set A being the (i,j) indices that have values in both Pfm(ij) and Pm(ij);
step 4: execute at least one of the following: (a) identify a first no-match zone ("Zl∞") that includes at least the indices of set A for which both Pfm(ij) is larger than zero and Pm(Ij) is equal to zero, and use Zl∞ to determine FAR zoo, wher
Figure imgf000044_0003
nd compare FAR z to a desired false-acceptance-rate, and if FAR z is greater than the desired false-acceptance-rate, then reject the data set;
(b) identify a second no-match zone ("Z2∞") that includes the indices of set A for which Pm(i,j) is equal to zero, and use Z2∞ to identify a second index set ("C"), the indices of C being the (i,j) indices that are in A but not Z2∞, and arrange i t.1he ( /i•,i -\ ) i •nd Ji-ces o mf C suc 1h , t.1ha xt t ,o
Figure imgf000044_0001
provide an arranged C index, and identify a third index set ("Cn"), the indices of Cn being the first N (i,j) indices of the arranged C index, where N is a number for which the following is true:
Figure imgf000044_0002
compare FRR to a desired false-rejection-rate, and if FRR is greater than the desired false-rejection-rate, then reject the data set.
IfFAR zoo is less than or equal to the desired false-acceptance-rate, and FRR is less than or equal to the desired false-rejection-rate, then the data set may be accepted. Zl∞ may be expanded to include additional indices of set A by including in Zl∞ the indices of A for which Pm(ij) is equal to zero. In this manner, a single no-match zone may be defined and used for the entire step 4. Although the present invention has been described with respect to one or more particular embodiments, it will be understood that other embodiments of the present invention maybe made without departing from the spirit and scope of the present invention. Hence, the present invention is deemed limited only by the appended claims and the reasonable interpretation thereof.

Claims

What is claimed is:
1. A method of authorizing a transaction, comprising: enrolling at least two biometric specimens, a first one of the specimens being a first type, and a second one of the specimens being a second type; determining a false acceptance ratio ("FAR") for each of the specimens; identifying authorization options, each option requiring a match to one or more of the biometric specimens; calculating a cost value for at least one of the options to provide a calculated cost value
("CCV"), wherein the CCV is a function of the FAR(s) of the specimen(s) corresponding to the option; identifying an acceptable cost value range ("ACV range"); comparing the CCV to the ACV range; determining whether the CCV is in the ACV range; selecting the option if the CCV is in the ACV range; providing a set of biometric sample(s) (the "sample set"), the sample set having biometric sample(s) of the same type(s) as those corresponding to the selected option; comparing the biometric sample(s) to the biometric specimen(s); determining whether the biometric sample(s) match the biometric specimen(s); if the biometric sample(s) match the biometric specimen(s), then authorizing the transaction.
2. The method of claim 1 , wherein the types are selected from fingerprint, facial image, retinal image, iris scan, hand geometry scan, voice print, signature, signature gait, keystroke tempo, blood vessel pattern, palm print, skin composition spectrum, lip shape and ear shape.
3. The method of claim 1 , wherein a first type corresponds to a first body part and a second type corresponds to a second body part.
4. The method of claim 1, wherein at least one of the false acceptance ratios is determined using the following equation
Figure imgf000047_0002
5. The method of claim 1 , wherein the biometric specimens comprise a set, and the options comprise permutations of the set.
6. The method of claim 1, wherein at least one of the cost values is calculated using the
following equation
Figure imgf000047_0001
7. The method of claim 1 , wherein the ACV range is provided by an administrator.
8. A computer readable memory device having stored thereon instructions that are executable by a computer to cause the computer to: enroll at least two biometric specimens, a first one of the specimens being a first type, and a second one of the specimens being a second type; determine a false acceptance ratio ("FAR") for each of the specimens; identify authorization options, each option requiring a match to one or more of the biometric specimens; calculate a cost value for at least one of the options to provide a calculated cost value
("CCV"), wherein the CCV is a function of the FAR(s) of the specimen(s) corresponding to the option; identify an acceptable cost value range ("ACV range"); compare the CCV to the ACV range; determine whether the CCV is in the ACV range; select the option if the CCV is in the ACV range; provide a set of biometric sample(s) (the "sample set"), the sample set having biometric sample(s) of the same type(s) as those corresponding to the selected option; compare the biometric sample(s) to the biometric specimen(s); determine whether the biometric sample(s) match the biometric specimen(s); if the biometric sample(s) match the biometric specimen(s), then authorize the transaction.
9. The memory device of claim 8, wherein the instructions cause the computer to determine at least one of the false acceptance ratios using the following equation .
Figure imgf000048_0002
10. The memory device of claim 8, wherein the instructions cause the computer to calculate at least one of the cost values using the following equation
Figure imgf000048_0001
11. An authorization system, comprising: a computer capable of executing computer-readable instructions; at least one biometric specimen reader in communication with the computer; at least one biometric sample reader in communication with the computer; a database; computer-readable instructions provided to the computer for causing the computer to: enroll in the database at least two biometric specimens via one or more of the biometric specimen readers, a first one of the specimens being a first type, and a second one of the specimens being a second type; determine a false acceptance ratio ("FAR") for each of the specimens; identify authorization options, each option requiring a match to one or more of the biometric specimens; calculate a cost value for at least one of the options to provide a calculated cost value
("CCV"), wherein the CCV is a function of the FAR(s) of the sρecimen(s) corresponding to the option; identify an acceptable cost value range ("ACV range"); compare the CCV to the ACV range; determine whether the CCV is in the ACV range; select the option if the CCV is in the ACV range; provide a set of biometric sample(s) (the "sample set") via one or more of the biometric sample readers, the sample set having biometric sample(s) of the same type(s) as those corresponding to the selected option; compare the biometric sample(s) to the biometric specimen(s); determine whether the biometric sample(s) match the biometric specimen(s); if the biometric sample(s) match the biometric specimen(s), then authorize the transaction.
12. The system of claim 11 , wherein the instructions cause the computer to determine at least one of the false acceptance ratios using the following equation
Figure imgf000049_0002
13. The system of claim 11 , wherein the instructions cause the computer to calculate at least one of the cost values using the following equation
CoS
Figure imgf000049_0001
PCT/US2006/020898 2005-05-27 2006-05-26 Multimodal authorization method, system and device WO2006128162A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CA002604201A CA2604201A1 (en) 2005-05-27 2006-05-26 Multimodal authorization method, system and device
GB0718625A GB2441237B (en) 2005-05-27 2006-05-26 Multimodal Authorization Method, System and Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US68542905P 2005-05-27 2005-05-27
US60/685,429 2005-05-27

Publications (2)

Publication Number Publication Date
WO2006128162A2 true WO2006128162A2 (en) 2006-11-30
WO2006128162A3 WO2006128162A3 (en) 2009-04-23

Family

ID=37452983

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2006/020898 WO2006128162A2 (en) 2005-05-27 2006-05-26 Multimodal authorization method, system and device

Country Status (3)

Country Link
CA (1) CA2604201A1 (en)
GB (1) GB2441237B (en)
WO (1) WO2006128162A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140056487A1 (en) * 2012-08-24 2014-02-27 Fujitsu Limited Image processing device and image processing method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5719950A (en) * 1994-03-24 1998-02-17 Minnesota Mining And Manufacturing Company Biometric, personal authentication system
US20040068342A1 (en) * 2002-10-02 2004-04-08 Bedont William James Method of designing and manufacturing rubber process tooling using an interface to a CAD/CAM software program

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006078343A2 (en) * 2005-01-14 2006-07-27 Ultra-Scan Corporation Multimodal fusion decision logic system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5719950A (en) * 1994-03-24 1998-02-17 Minnesota Mining And Manufacturing Company Biometric, personal authentication system
US20040068342A1 (en) * 2002-10-02 2004-04-08 Bedont William James Method of designing and manufacturing rubber process tooling using an interface to a CAD/CAM software program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
OSADCIW, L. ET AL. OPTIMUM FUSION RULES FOR MULTIMODAL BIOMETRIC SYSTEMS. 01 April 2004, pages 1 - 28 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140056487A1 (en) * 2012-08-24 2014-02-27 Fujitsu Limited Image processing device and image processing method
US9292752B2 (en) * 2012-08-24 2016-03-22 Fujitsu Limited Image processing device and image processing method

Also Published As

Publication number Publication date
WO2006128162A3 (en) 2009-04-23
GB2441237B (en) 2010-11-24
CA2604201A1 (en) 2006-11-30
GB0718625D0 (en) 2007-10-31
GB2441237A (en) 2008-02-27

Similar Documents

Publication Publication Date Title
US7440929B2 (en) Multimodal authorization method, system and device
US7287013B2 (en) Multimodal fusion decision logic system
US8190540B2 (en) Multimodal fusion decision logic system for determining whether to accept a specimen
US7558765B2 (en) Multimodal fusion decision logic system using copula model
El-Sayed Multi-biometric systems: a state of the art survey and research directions
Bolle et al. Guide to biometrics
Nandakumar Multibiometric systems: Fusion strategies and template security
He et al. Performance evaluation of score level fusion in multimodal biometric systems
Wayman et al. An introduction to biometric authentication systems
US7356168B2 (en) Biometric verification system and method utilizing a data classifier and fusion model
Jaafar et al. A review of multibiometric system with fusion strategies and weighting factor
Kaur et al. Fusion in multimodal biometric system: A review
Sabri et al. A new framework for match on card and match on host quality based multimodal biometric authentication
WO2010047685A1 (en) Multimodal fusion decision logic system for determining whether to accept a specimen
WO2009032020A1 (en) Multimodal fusion decision logic system using copula model
Sharma et al. Multimodal classification using feature level fusion and SVM
Lai et al. Mass evidence accumulation and traveler risk scoring engine in e-border infrastructure
Alghamdi et al. Artificial intelligence Techniques based learner authentication in cybersecurity higher education institutions
WO2006128162A2 (en) Multimodal authorization method, system and device
Soviany et al. A biometric security model with identities detection and local feature-level fusion
Singh et al. Fingerprint identification using modified capsule network
GB2468798A (en) Multimodal authorization method, system and device
Sharma et al. Multimodal biometric system fusion using fingerprint and face with fuzzy logic
Kumar et al. Biometric based personal authentication using fuzzy binary decision tree
Pathak et al. Performance of multimodal biometric system based on level and method of fusion

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 0718625

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20060526

WWE Wipo information: entry into national phase

Ref document number: 0718625.7

Country of ref document: GB

ENP Entry into the national phase

Ref document number: 2604201

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

122 Ep: pct application non-entry in european phase

Ref document number: 06760550

Country of ref document: EP

Kind code of ref document: A2