2010
DOI: 10.1109/tpami.2008.291
|View full text |Cite
|
Sign up to set email alerts
|

The Biometric Menagerie

Abstract: It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user's genuine and imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
111
0
2

Year Published

2011
2011
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 143 publications
(120 citation statements)
references
References 13 publications
3
111
0
2
Order By: Relevance
“…These factors also comprise the intrinsic characteristics of each user which include users particularly vulnerable to impersonation or users difficult to match, among others. The literature refer to this as biometric zoo [16] or menagerie [17]. -Sensor factors: related with the sensor, human-machine interactions, ease of use or maintenance.…”
Section: Quality Assessment For Keystroke Dynamicsmentioning
confidence: 99%
See 2 more Smart Citations
“…These factors also comprise the intrinsic characteristics of each user which include users particularly vulnerable to impersonation or users difficult to match, among others. The literature refer to this as biometric zoo [16] or menagerie [17]. -Sensor factors: related with the sensor, human-machine interactions, ease of use or maintenance.…”
Section: Quality Assessment For Keystroke Dynamicsmentioning
confidence: 99%
“…4b). The researchers analyzed and defined these classes of users as the biometric menagerie [17] or biometric zoo [16].…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…8). PSEI spans the analogue of a biometric/forensic menagerie [50]. It expands on the type of attacks and also addresses covariate shift (e.g., changes in the data distributions characteristic of the arm race encountered during evolution) on one side, and change and drift detection, on the other side.…”
Section: Immunity and Detectionmentioning
confidence: 99%
“…It is method in which user uses body for authentication. It uses psychological or behavioral characteristic like facial or fingerprints scans and iris or voice recognition to identify users [1]. For example retina scans or finger prints.…”
Section: Literature Surveymentioning
confidence: 99%