Abstract
A multi-stage biometric verification system serially activates its verifiers and improves performance-cost trade-off by allowing users to submit a subset of the available biometrics. In the heart of a verifier in multi-stage systems lies the concept of ‘reject option’ where a reject region is used to identify a bad quality test sample. If the match-score falls inside the reject region, no binary (genuine/impostor) decision is made in the current stage and the verifier in the next stage is activated. Recent studies have demonstrated a significant promise of the ‘symmetric rejection method’ in choosing a suitable reject region for multi-stage verification systems. In this paper, we delve into the symmetric rejection method to gain more insights into its error reduction capabilities. Specifically, we develop a theory which mathematically proves that the symmetric rejection method reduces the false accept rate and false reject rate. Then, we empirically validate our theory. Results show that the symmetric rejection method significantly reduces the error rates, both the false accept rate and false reject rate.
Similar content being viewed by others
Data availability
The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.
References
Hossain M, Chen J, Rahman K (2018) On enhancing serial fusion based multi-biometric verification system. Appl Intell 48(12):4824–4833
Allano L, Dorizzi B, Garcia-Salicetti S (2010) Tuning cost and performance in multi-biometric systems: a novel and consistent view of fusion strategies based on the sequential probability ratio test (SPRT). Pattern Recognit Lett 31(9):884–890
Hossain M, Balagani K, Phoha V (2021) Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system. Pattern Anal Appl 24:49–60
Takahashi K, Mimura M, Isobe Y, Seto Y (2004) A secure and user-friendly multimodal biometric system. In: Proceedings of the SPIE, pp 12–19
Hossain M, Phoha V (2021) Enhancing performance and user convenience of multi-biometric verification systems. Pattern Anal Appl 24:1569–1582
Akhtar Z, Fumera G, Marcialis GL, Roli F (2012) Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: International conference on biometrics: theory, applications and systems (BTAS), pp 283–288
Poh N, Bourlai T, Kittler J, Allano L, Alonso-Fernandez F, Ambekar O, Baker J, Dorizzi B, Fatukasi O, Fierrez J, Ganster H, Ortega-Garcia J, Maurer D, Salah AA, Scheidat T, Vielhauer C (2009) Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms. IEEE TIFS 4(4):849–866
Popescu-Bodorin N, Balas VE, Motoc IM (2011) 8-valent fuzzy logic for iris recognition and biometry. In: International symposium on computational intelligence and intelligent informatics (ISCIII), pp 149–154
Popescu-Bodorin N, Noaica CM, Penariu P (2015) Iris recognition with 4 or 5 fuzzy sets. In: IFSA-EUSFLAT
Vatsa M, Singh R, Noore A (2009) Context switching algorithm for selective multibiometric fusion. In: Proceedings of international conference on pattern recognition and machine intelligence, pp 452–457
Vatsa M, Singh R, Noore A, Ross A (2010) On the dynamic selection of biometric fusion algorithms. IEEE Trans Inf Forensics Secur 5(3):470–479
Bhatt HS, Bharadwaj S, Vatsa M, Singh R, Ross A, Noore A (2011) A framework for quality-based biometric classifier selection. In: 2011 International joint conference on biometrics (IJCB), pp 1–7
Bharadwaj S, Bhatt HS, Singh R, Vatsa M, Noore A (2015) Qfuse: online learning framework for adaptive biometric system. Pattern Recognit 48(11):3428–3439
Sabri M, Moin M, Razzazi F (2019) A new framework for match on card and match on host quality based multimodal biometric authentication. J Signal Process Syst 91:163–177. https://doi.org/10.1007/s11265-018-1385-4
Zhang Q, Yin Y, Zhan D-C, Peng J (2014) A novel serial multimodal biometrics framework based on semisupervised learning techniques. IEEE Trans Inf Forensics Secur 9(10):1681–1694
Hossain MS, Balagani KS, Phoha VV (2013) On controlling genuine reject rate in multi-stage biometric verification. In: CVPRW, pp 194–199
Sajjad M, Khan S, Hussain T, Muhammad K, Sangaiah AK, Castiglione A, Esposito C, Baik SW (2019) CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recognit Lett 126:123–131. https://doi.org/10.1016/j.patrec.2018.02.015
Dwivedi R, Dey S (2019) A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification. Appl Intell 49:1016–1035. https://doi.org/10.1007/s10489-018-1311-2
Jomaa RM, Islam MS, Mathkour H (2018) Improved sequential fusion of heart-signal and fingerprint for anti-spoofing. In: Proceedings of IEEE conference on identity, security, and behavior analysis (ISBA), pp 1–7
Jomaa RM, Islam MS, Mathkour H, Al-Ahmadi S (2022) A multilayer system to boost the robustness of fingerprint authentication against presentation attacks by fusion with heart-signal. J King Saud Univ Comput Inf Sci 34(8):5132–5143. https://doi.org/10.1016/j.jksuci.2022.01.004
Abd El-Rahiem B, Abd El Samie FE, Amin M (2022) Efficient cancellable multi-biometric recognition system based on deep learning and bio-hashing. Appl Intell. https://doi.org/10.1007/s10489-021-03153-0
Murakami T, Takahashi K, Matsuura K (2012) Towards optimal countermeasures against wolves and lambs in biometrics. In: IEEE conference on biometrics: theory, application and system (BTAS), pp 69–76
Marcialis GL, Roli F, Didaci L (2009) Personal identity verification by serial fusion of fingerprint and face matchers. Pattern Recognit 42(11):2807–2817
Marcialis GL, Mastinu P, Roli F (2010) Serial fusion of multi-modal biometric systems. In: IEEE workshop on BIOMS, pp 1–7
Fumera G, Roli F, Giacinto G (2000) Reject option with multiple thresholds. Pattern Recognit 33:2099–2101
Tortorella F (2000) An optimal reject rule for binary classifiers. In: Proceedings of the joint IAPR workshops, pp 611–620
Santos-Pereira CM, Pires AM (2005) On optimal reject rules and roc curves. Pattern Recognit Lett 26:943–952
Hossain MS, Balagani KS, Phoha VV (2012) New impostor score based rejection methods for continuous keystroke verification with weak templates. In: IEEE conference on biometrics: theory, application and system (BTAS)
Landgrebe TCW, Tax DMJ, Paclík P, Duin RPW (2006) The interaction between classification and reject performance for distance-based reject-option classifiers. Pattern Recognit Lett 27:908–917
Bartlett PL, Wegkamp MH (2008) Classification with a reject option using a hinge loss. J Mach Learn Res 9:1823–1840
Chow CK (1970) On optimum recognition error and reject tradeoff. IEEE Trans Inf Theory 16(1):41–46
Edwards T, Hossain MS (2021) Effectiveness of deep learning on serial fusion based biometric systems. IEEE Trans Artif Intell 2(1):28–41. https://doi.org/10.1109/TAI.2021.3064003
NIST: Biometric Scores Set (2011). http://www.nist.gov/itl/iad/ig/biometricscores.cfm
Wald A (1947) Sequential analysis, 1st edn. Wiley
Nandakumar K, Chen Y, Dass SC, Jain A (2008) Likelihood ratio-based biometric score fusion. IEEE Trans Pattern Anal Mach Intell 30:342–347
Phoha V, Joshi S (2013) Method and system of Identifying users based upon free text keystroke (US Patent No. 8489635, Issued July 16, 2013)
Ilonen J (2003) Keystroke dynamics. Advanced Topics in Information Processing—Lecture
Kumar A (2008) Incorporating cohort information for reliable palmprint authentication. In: Sixth Indian conference on computer vision, graphics image processing, 2008. ICVGIP’08, pp 583–590
Schuckers ME (2003) Using the beta-binomial distribution to assess performance of a biometric identification device. Int J Image Gr 3(3):523–529
Funding
Part of this study was conducted under the Southern Connecticut State University (SCSU) Mid-Level Faculty Research Fellowship.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A Proofs of Lemma 1 and Lemma 2
Appendix A Proofs of Lemma 1 and Lemma 2
In the proofs of Lemma 1 and Lemma 2, we assume that \(f_G(x)\) is monotonically decreasing inside the confusion region and \(f_I(y)\) is monotonically increasing inside the confusion region. For example, in Fig. 6, \(f_G(x)\) and \(f_I(y)\) in (a), (b), (c), and (d) follow the assumption. However, \(f_G(x)\) and \(f_I(y)\) in (e) do not follow the assumption because there are ups and downs inside the confusion region \(E_{1}E_{2}\).
While the above assumption simplifies our proofs, we note that our assumption is true for a wide range of distributions, including Gaussian, certain parameters of beta, binomial, and beta-binomial, and Gaussian mixture model (except when a mode is inside the confusion region). The abovementioned distributions have also been used in various studies to model score distributions of various biometric modalities (see [35,36,37,38,39]).
The sole purpose of the above assumption is to prove Lemmas 1 and 2. It is not required in the formulation of the symmetric rejection method. Hence, irrespective of this assumption, the symmetric rejection method is applicable in multi-stage biometric verification systems.
Proof for Lemma1: Below, we show that \(FRR^{r}_i<EER_i\). The proof of \(FAR^{r}_i<EER_i\) is similar.
First, we introduce two notations. Let PQ be any region in the scoreline [Z, O]. Then, \(P_{G,PQ}\) refers to the proportion of genuine scores in PQ, which is calculated by (the number of genuine scores in PQ)/(total number of genuine scores). Similarly, \(P_{I,PQ}\) refers to the proportion of impostor scores in PQ, which is calculated by (the number of impostor scores in PQ)/(total number of impostor scores).
We use Fig. 7 to explain the proof. In Fig. 7, let genuine scores and impostor scores originate from verifier \(v_i\), AC be the reject region, \(E_1E_2\) be the confusion region, and B be the threshold where \(EER_i\) occurs.
Using (4), false reject rate obtained with the symmetric rejection method,
Because C lies inside \((B,E_{2}]\), it follows that \(\mu \ge 1\). From (A2) we get, \(P_{G,BC}=P_{G,BE_{2}}/\mu\). Hence, we can present the numerator on the right side of (A1) as follows:
Therefore, we can rewrite (A1) as:
Because \(EER_i\) occurs at threshold B,
We will prove that \(FRR^{r}_i<EER_i\). For contradiction, we assume that \(FRR^{r}_i \ge EER_i\). This implies–
After algebraic manipulation we get,
Because \(ZE_2\) contains all genuine scores, \(P_{G,ZE_{2}}=1\). Hence, \(1-P_{G,BE_{2}}=P_{G,ZE_{2}}-P_{G,BE_{2}}=P_{G,ZB}\). Therefore, we can rewrite (A5) as follows:
Because \(f_{G}(x)\) is monotonically decreasing and \(f_{I}(y)\) is monotonically increasing inside \(E_{1}B\), the following statement is true:
From (A4), \(P_{I,E_{1}B}=P_{G,BE_{2}}\) and using the symmetric rejection method, \(P_{I,AB}=P_{G,BC}\). Then,
Hence, we can rewrite (A7) as follows:
Because \(E_{1}B\) is a part of ZB (see Fig. 7), \(P_{G,ZB}>P_{G,E_{1}B}\). Because \(P_{G,ZB}>P_{G,E_{1}B}\) and \(P_{G,E_{1}B} \ge \mu P_{G,AB}\), it follows that \(P_{G,ZB} > \mu P_{G,AB}\). However, this contradicts (A6). Therefore, we conclude that \(FRR^{r}_i<EER_i\).
Proof for Lemma 2: We use Fig. 8 to explain the proof.
In Fig. 8, B is the EER-threshold and reject region \(A_2C_2\) is greater than reject region \(A_1C_1\). We need to prove that
We can rewrite (A8) as follows:
Now we will prove that (A9) is true.
Because \(A_2C_2\) is greater than \(A_1C_1\), \(P_{G,BC_2}>P_{G,BC_1}\). Let
where \(\rho\) is a real number greater than 1.
Because \(f_{G}(x)\) is monotonically decreasing and \(f_{I}(y)\) is monotonically increasing inside the confusion region, when we increase the width of a reject region, the proportion of genuine scores on the left side increases at a higher rate than the proportion of genuine scores on the right. Hence, we can write
where \(\epsilon\) is a real number greater than 0.
Now,
Using (A10) and (A11), we can rewrite (A12) as follows:
Because \(\epsilon P_{G,A_1B}>0\), the right-hand side of (A13) is less than \(\frac{1}{\rho }\). Hence, we can rewrite (A13) as follows:
However, using (A10) we get
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hossain, M.S., Chen, J. & Rahman, K. On error reduction by the symmetric rejection method in multi-stage biometric verification systems. Pattern Anal Applic 26, 505–516 (2023). https://doi.org/10.1007/s10044-022-01118-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-022-01118-8